• Title/Summary/Keyword: computer science

Search Result 31,501, Processing Time 0.061 seconds

Bitmap Indexes and Query Processing Strategies for Relational XML Twig Queries (관계형 XML 가지 패턴 질의를 위한 비트맵 인덱스와 질의 처리 기법)

  • Lee, Kyong-Ha;Moon, Bong-Ki;Lee, Kyu-Chul
    • Journal of KIISE:Databases
    • /
    • v.37 no.3
    • /
    • pp.146-164
    • /
    • 2010
  • Due to an increasing volume of XML data, it is considered prudent to store XML data on an industry-strength database system instead of relying on a domain specific application or a file system. For shredded XML data stored in relational tables, however, it may not be straightforward to apply existing algorithms for twig query processing, since most of the algorithms require XML data to be accessed in a form of streams of elements grouped by their tags and sorted in a particular order. In order to support XML query processing within the common framework of relational database systems, we first propose several bitmap indexes and their strategies for supporting holistic twig joining on XML data stored in relational tables. Since bitmap indexes are well supported in most of the commercial and open-source database systems, the proposed bitmapped indexes and twig query processing strategies can be incorporated into relational query processing framework with more ease. The proposed query processing strategies are efficient in terms of both time and space, because the compressed bitmap indexes stay compressed during data access. In addition, we propose a hybrid index which computes twig query solutions with only bit-vectors, without accessing labeled XML elements stored in the relational tables.

A Resource Reservation Protocol for Mobile Hosts in Wireless Mobile Networks (무선 이동망에서의 이동 호스트를 지원하기 위한 자원 예약 프로토콜)

  • Kim, Min-Sun;Suh, Young-Joo;An, Syung-Og
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.428-436
    • /
    • 2002
  • Providing a mobile host with its required QoS is highly influenced by its mobility. The resource ReSerVation Protocol(RSVP) establishes and maintains a reservation state to ensure a given QoS level along the path from the sender to the receiver. However, RSVP is designed for use in fixed networks and thus it is inadequate in the mobile networking environment where a host changes its point of attachment. In this paper, we propose a new resource reservation protocol, RSVP-RA(RSVP by RSVP Agent) for mobile hosts. Our protocol assumes IETF Mobile IP as a mobility support mechanism. The proposed protocol introduce a new protocol entity - RSVP agent - to manage reservations in a mobile host's current visiting network. RSVP Agent is located in a local network and makes resource reservations in neighboring cells that the mobile host is expected to visit in the future. Thus, the proposed Protocol can provide a seamless QoS to the mobile host and significantly improve the scalability problem of RSVP by reducing the end-to-end signalling messages acrossing the backbone networks. The proposed protocols reduce packet delay, bandwidth overhead and the number of RSVP messages to maintain reservation states. We compared the performance of our proposed protocol with other proposed protocols in terms of signalling overhead, packet delay by simulation.

The Protective Effects of IGF-1 on Different Subpopulations of DRG Neurons with Neurotoxicity Induced by gp120 and Dideoxycytidine In Vitro

  • Lu, Lin;Dong, Haixia;Liu, Guixiang;Yuan, Bin;Li, Yizhao;Liu, Huaxiang
    • Biomolecules & Therapeutics
    • /
    • v.22 no.6
    • /
    • pp.532-539
    • /
    • 2014
  • Peripheral neuropathy induced by human immunodeficiency virus (HIV) infection and antiretroviral therapy is not only difficult to distinguish in clinical practice, but also difficult to relieve the pain symptoms by analgesics because of the severity of the disease at the later stage. Hence, to explore the mechanisms of HIV-related neuropathy and find new therapeutic options are particularly important for relieving neuropathic pain symptoms of the patients. In the present study, primary cultured embryonic rat dorsal root ganglion (DRG) neurons were used to determine the neurotoxic effects of HIV-gp120 protein and/or antiretroviral drug dideoxycytidine (ddC) and the therapeutic actions of insulin-like growth factor-1 (IGF-1) on gp120- or ddC-induced neurotoxicity. DRG neurons were exposed to gp120 (500 pmol/L), ddC ($50{\mu}mol/L$), gp120 (500 pmol/L) plus ddC ($50{\mu}mol/L$), gp120 (500 pmol/L) plus IGF-1 (20 nmol/L), ddC ($50{\mu}mol/L$) plus IGF-1 (20 nmol/L), gp120 (500 pmol/L) plus ddC ($50{\mu}mol/L$) plus IGF-1 (20 nmol/L), respectively, for 72 hours. The results showed that gp120 and/or ddC caused neurotoxicity of primary cultured DRG neurons. Interestingly, the severity of neurotoxicity induced by gp120 and ddC was different in different subpopulation of DRG neurons. gp120 mainly affected large diameter DRG neurons (> $25{\mu}m$), whereas ddC mainly affected small diameter DRG neurons (${\leq}25{\mu}m$). IGF-1 could reverse the neurotoxicity induced by gp120 and/or ddC on small, but not large, DRG neurons. These data provide new insights in elucidating the pathogenesis of HIV infection- or antiretroviral therapy-related peripheral neuropathy and facilitating the development of novel treatment strategies.

Study on the Compared between u-Learning and e-Learning based SCORM (SCORM 기반 u-Learning과 e-Learning 비교연구)

  • Choi, Sung;Ryu, Gab-Sang
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.495-505
    • /
    • 2006
  • IT기술기반 교육시스템은 인터넷 등장 이전에도 가능성을 인정받아 지속적으로 개발되어 온 분야이며, 교육공학과의 연계로 지식 전날의 이론체계로 각광을 받고 있다. 사이버교유도 인터넷이전부터 다양한 통신방법을 응용하여 개발되었고, 최근 인터넷을 통하여 사이버 교육시스템은 완벽한 기술기반을 갖추게 되였다. 그러나 IT기술의 급격한 변화로 사이버교육시스템은 계속하여 신기술 변화에 적용해야만 한다. 현재 정보통신기술의 변화는 방송 통신망의 융합, 브로드 밴드 네트워킹, 스마트 디바이스의 다양화, 멀티미디어 기술의 고도화로 요약된다. 이 기술의 종합한 작용으로 유비쿼터스 사회의 기반으로 진화되고 있다. 그래서 e-Learning 분야도 기존 인터넷기반 시스템과는 달리 차세대 온라인교육시스템으로 친화되고 있다. IT융합가술 기반의 온라인 교육시스템은 각종 국제표준단체에서 표준안이 제시되고 있다. e-Learning 시스템이란 선기술 기반을 반영한 표준기술을 사용하는 온라인교육시스템을 포괄하는 개념이다. 본 연구에서는 e-Learning 시스템과 유비쿼터스 기술을 반영한 e-Learning을 비교하였다. 그리고 u-Learning 시스템의 기술정립과 EOD(Education On Demand) 시스템에 대하여 연구하였다. 1. u-Learning 정의 정보산업분야를 비롯한 문화, 교육 등 모든 분야에서 유비퀴터스라는 수식어가 붙어 다니고 있다. e- Learning 교육 업계에 따르면 10년 후에는 유비쿼터스는 대중화가 될 것이며, 부가가치 규모는 100조 원에 이를 것으로 추정된다. 그래서 교육산업도 주변 환경이 아날로그 방식에서 IT 기반에 의한 디지털 환경으로 변화되고 있다. 또한 e러닝, T러닝, m러닝, u러닝 등의 용어가 생성되고 있다.키지에어컨에서 사용되고 있는 밀폐형 압축기에 대해서 그림 2에서 나타내고 있는 냉방능력 10tons(120,000Btu/h) 이하를 중심으로 상기의 최근 기술 동향을 간략하게 소개하고자 한다.질표준의 지표성분으로 간주되는 진세노사이드의 절대함량과 그 성분조성 차이에 따른 임상효과의 차별성이 있는지에 대한 검토와, 특히 최근 실험적으로 밝혀지고 있는 사포닌 성분의 장내 세균에 의한 생물전환체의 인체 실험을 통한 효과 검정이 필요하다. 나아가서는 적정 복용량의 설정과 이와 관련되는 생체내 동태 및 생체이용율(bioavilability)에 관한 정보가 거의 없으므로 이것도 금후 검토해야 할 과제로 사료된다. 인삼은 전통약물로서 오랜 역사성과 그동안의 연구결과에 의한 과학성을 가지고 있으므로 건강유지와 병의 예방 및 회복촉진을 위한 보조요법제 또는 기능성 식품으로써의 유용성이 있는 것으로 판단된다. 앞으로 인삼의 활용성 증대를 위해서는 보다 과학적인 임상평가에 의한 안전성 및 유효성 입증과 제품의 엄격한 품질관리의 필요성이 더욱 강조되어야 할 것이다.xyl radical 생성 억제 효과를 보여 주었다. 본 실험을 통하여 BHT 를 제외하고 전반적으로 세포 수준에서의 oxidative stress 에 대한 억제 효과를 확인해 볼 수 있었으며 특히 수용성 항산화제들에서 두드러진 효과를 보여 주었다. 제공하여 내수기반 확충에도 노력해야 할 것 이다.있었다., 인삼이 성장될 때 부분적인 영양상태의 불충분이나 기후 등에 따른 영향을 받을 수 있기 때문에 앞으로 이에 대한 많은 연구가 이루어져야할 것으로 판단된다.태에도 불구하고 [-wh]의미의 겹의문사는 병렬적 관계의 합성어가 아니라 내부구조를 지니지 않은 단순한 단어(minimal $X^{0}$<

  • PDF

The usability of the MR Breast perfusion image and Time-Signal Intensity curve in Breast cancer patients (유방암 환자에서 MR Breast perfusion 영상과 시간-신호강도 곡선의 유용성)

  • Cho, Jae-Hwan;Lee, Hae-Kag
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.9
    • /
    • pp.4068-4074
    • /
    • 2011
  • The purpose of this study was to examine the usefulness of MR Breast perfusion image and time-signal intensity curve in patients diagnosed with breast cancer. We selected on 20 patients who were histologically diagnosed to have invasive ductal carcinoma (IDC) from March 2009 to December 2010. First, the Breast perfusion mapping image was reconstructed after obtaining the dynamic contrast enhancement image. The reconstructed image measured the slope, maximal relative enhancement, and time to peak on the detail including the lesion region, normal region, back ground region after obtaining the time-signal intensity curve. The lesion region and normal and slope of the back ground part were measured with the quantitive analytical method about the research and the average was compared and was analyze. In the qualitative analysis, the signal strength of each pixel was analyze with the macroscopic and being high it was low, the medium (2) performed the division of (a) by the three-point standard and the average was measured. The findings from the quantitative image analysis are the following: In the lesion region, the slope and maximal relative enhancement were the highestest among and the time to peak was the highestest in the back ground region. In the qualitative analysis, the breast perfusion image showed a diagnostic efficiency.

Respond System for Low-Level DDoS Attack (저대역 DDoS 공격 대응 시스템)

  • Lee, Hyung-Su;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.732-742
    • /
    • 2016
  • This study suggests methods of defense against low-level high-bandwidth DDoS attacks by adding a solution with a time limit factor (TLF) to an existing high-bandwidth DDoS defense system. Low-level DDoS attacks cause faults to the service requests of normal users by acting as a normal service connection and continuously positioning the connected session. Considering this, the proposed method makes it possible for users to show a down-related session by considering it as a low-level DDoS attack if the abnormal flow is detected after checking the amount of traffic. However, the service might be blocked when misjudging a low-level DDoS attack in the case of a communication fault resulting from a network fault, even with a normal connection status. Thus, we made it possible to reaccess the related information through a certain period of blocking instead of a drop through blacklist. In a test of the system, it was unable to block the session because it recognized sessions that are simply connected with a low-level DDoS attack as a normal communication.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

Does Breast Cancer Drive the Building of Survival Probability Models among States? An Assessment of Goodness of Fit for Patient Data from SEER Registries

  • Khan, Hafiz;Saxena, Anshul;Perisetti, Abhilash;Rafiq, Aamrin;Gabbidon, Kemesha;Mende, Sarah;Lyuksyutova, Maria;Quesada, Kandi;Blakely, Summre;Torres, Tiffany;Afesse, Mahlet
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.12
    • /
    • pp.5287-5294
    • /
    • 2016
  • Background: Breast cancer is a worldwide public health concern and is the most prevalent type of cancer in women in the United States. This study concerned the best fit of statistical probability models on the basis of survival times for nine state cancer registries: California, Connecticut, Georgia, Hawaii, Iowa, Michigan, New Mexico, Utah, and Washington. Materials and Methods: A probability random sampling method was applied to select and extract records of 2,000 breast cancer patients from the Surveillance Epidemiology and End Results (SEER) database for each of the nine state cancer registries used in this study. EasyFit software was utilized to identify the best probability models by using goodness of fit tests, and to estimate parameters for various statistical probability distributions that fit survival data. Results: Statistical analysis for the summary of statistics is reported for each of the states for the years 1973 to 2012. Kolmogorov-Smirnov, Anderson-Darling, and Chi-squared goodness of fit test values were used for survival data, the highest values of goodness of fit statistics being considered indicative of the best fit survival model for each state. Conclusions: It was found that California, Connecticut, Georgia, Iowa, New Mexico, and Washington followed the Burr probability distribution, while the Dagum probability distribution gave the best fit for Michigan and Utah, and Hawaii followed the Gamma probability distribution. These findings highlight differences between states through selected sociodemographic variables and also demonstrate probability modeling differences in breast cancer survival times. The results of this study can be used to guide healthcare providers and researchers for further investigations into social and environmental factors in order to reduce the occurrence of and mortality due to breast cancer.

Development of Empowerment Scale Instrument and Needs Assessment of Home Economics Teachers' Empowerment (가정과교사의 임파워먼트 측정도구 개발 및 인식과 요구도 분석)

  • Park, Mi-Jeong
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.3
    • /
    • pp.131-143
    • /
    • 2008
  • The purpose of this study was to develop the empowerment scale instrument and to investigate the perception and needs regarding to the empowerment as home economics(HE) teacher. Respondents in this study were 234 HE teachers. questionnaires were collected by e-mail in the integrating online computer system. SPSS(Statistical Package for the Social Science) 10.0 package and AMOS 6.0 were used to analyze the data. Factor analysis and reliability analysis were used to develop the empowerment scale instrument. Means and Borich requirement analysis were used to describe the perception and needs regarding to the empowerment as HE teacher. The outcome and conclusion of this study after going through the above process were as follows. When classifying the empowerment in 6 factors of class operation capability, influence, specialization, ethics, belief and self-regulation, the HE teachers recognized the ethics and self-regulation as high in the current empowerment, and had high demand on influence and class operation capability in the future empowerment. In other words, influence was to heighten the status and influence in HE education by participating in various local community activities, and the class operation capability was the capability to manage the class for bring out the interests of students, that these requirements could be considered as the expression of desire to recover the price for HE teachers as the professionals before students without the negative social recognition on the HE education. In the same context, most of the HE teachers recognized the execution of the education process as the situational practitioners, and for practicing better HE education at the actual classroom situation.

  • PDF

Bus-only Lane and Traveling Vehicle's License Plate Number Recognition for Realizing V2I in C-ITS Environments (C-ITS 환경에서 V2I 실현을 위한 버스 전용 차선 및 주행 차량 번호판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.87-104
    • /
    • 2015
  • Currently the IoT (Internet of Things) environments and related technologies are being developed rapidly through the networks for connecting many intelligent objects. The IoT is providing artificial intelligent services combined with context recognition based knowledge and communication methods between human and objects and objects to objects. With the help of IoT technology, many research works are being developed using the C-ITS (Cooperative Intelligent Transport System) which uses road infrastructure and traveling vehicles as traffic control infrastructures and resources for improving and increasing driver's convenience and safety through two way communication such as bus-only lane and license plate recognition and road accidents, works ahead reports, which are eventually for advancing traffic effectiveness. In this paper, a system for deciding whether the traveling vehicle is possible or not to drive on bus-only lane in highway is researched using the lane and number plate recognition on the road in C-ITS traffic infrastructure environments. The number plates of vehicles on the straight ahead and sides are identified after the location of bus-only lane is discovered through the lane recognition method. Research results and experimental outcomes are presented which are supposed to be used by traffic management infrastructure and controlling system in future.