• Title/Summary/Keyword: discard

Search Result 201, Processing Time 0.022 seconds

Development of RT-PCR and Nested PCR for Detecting Four Quarantine Plant Viruses Belonging to Nepovirus (RT-PCR과 nested PCR을 이용한 Nepovirus속 식물검역 바이러스 4종의 정밀진단)

  • Lee, Siwon;Kang, Eun-Ha;Shin, Yong-Gil;Lee, Su-Heon
    • Research in Plant Disease
    • /
    • v.19 no.3
    • /
    • pp.220-225
    • /
    • 2013
  • For quarantine purpose, we developed the RT- and nested PCR module of Tomato black ring virus (TBRV), Arabis mosaic virus (ArMV), Cherry leafroll virus (CLRV) and Grapevine fanleaf virus (GFLV). The PCR modules, developed in this study make diagnosis more convenient and speedy because of same PCR condition. And also, the methods are more accurate because it can check whether the result is contamination or not using the mutation-positive control. We discard or return the 27 cases of Nepovirus infection seed by employing the module past 3 years. This study provides a rapid and useful method for detection of four quarantine plant viruses.

Evaluation of efficacy of a commercial vaccine stress-relieving agent to reduce the adverse effects of foot-and-mouth disease vaccination site in pig (시판 백신접종 스트레스 완화제의 돼지 구제역 백신 접종부위 부작용 발생 저감 효과 평가)

  • Park, Yu-Ri;Lim, Da-Rae;Kim, Hye-Ryung;Park, Min-Ji;Kim, Bumseok;Kim, Won-Il;Hong, Chang-Ho;Kim, Sung-Nyon;Park, Choi-Kyu
    • Korean Journal of Veterinary Service
    • /
    • v.40 no.3
    • /
    • pp.177-185
    • /
    • 2017
  • In this study, we evaluated the efficacy of a commercial vaccine stress-relieving agent (Anti VS-2 injection) to reduce the adverse effects of foot-and-mouth disease (FMD) vaccination site in 120 pigs on two tested pig farms. The results showed that incidence of pig with abnormal meat, size of abnormal meat and weight of discarded abnormal meat are significantly decreased in Anti VS-2 injection-supplemented FMD vaccinated pig groups (n=60) compared to the non-supplemented FMD vaccinated pig groups (n=60) (P<0.05). And the average economic loss by discard of abnormal meat were estimated 99,382 won or 21,514 won in the non-supplemented FMD vaccinated groups or in the Anti VS-2 injection-supplemented FMD vaccinated groups, respectively, showing that the cost saving effect was 78% (77,869 won). In conclusion, it is expected to reduce the incidence and severity of abnormal meat in the FMD vaccinated pigs and to contribute not only to the reduced economic loss of pig farmers but also to the promotion of food hygiene when the Anti VS-2 injection is mixed with FMD vaccine.

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

Performance analysis of information propagation in DTN-like scale-free mobile social network

  • Wang, Zhifei;Deng, Su;Huang, Hongbin;Wu, Yahui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3984-3996
    • /
    • 2014
  • Mobile social network can be seen as a specific application of the DTN (Delay Tolerant Network), in which the information propagation can be impacted by many social behaviors of the nodes. For a specific node, its social behaviors are various. For example, the node may not be interested in the information before receiving it and may also discard the information after getting it. On the other hand, people are more willing to forward the message to his friends. These interactive behaviors between nodes can be seen as social behaviors. It is easy to see that the impact of the social behaviors is related to the social ties, which can be manifested by the structure of the social network. State of the art works often simply assumes that the social networks can be divided into some communities. At present, some works find that the structure of some social networks is scale-free. To overcome this problem, this paper proposes a theoretical model to evaluate the impact of above social behaviors in the DTN-like scale-free network. Simulation shows the accuracy of the model. Numerical results show that both social behaviors and scale-free character have significant impact on information propagation. Moreover, the impact of social behaviors is related to the scale-free character of the networks.

Adjusting the Retry Limit for Congestion Control in an Overlapping Private BSS Environment

  • Park, Chang Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1881-1900
    • /
    • 2014
  • Since 802.11 wireless LANs are so widely used, it has become common for numerous access points (APs) to overlap in a region, where most of those APs are managed individually without any coordinated control. This pattern of wireless LAN usage is called the private OBSS (Overlapping Basic Service Set) environment in this paper. Due to frame collisions across BSSs, each BSS in the private OBSS environment suffers severe performance degradation. This study approaches the problem from the perspective of congestion control rather than noise or collision resolution. The retry limit, one of the 802.11 attributes, could be used for traffic control in conjunction with TCP. Reducing the retry limit causes early discard of a frame, and it has a similar effect of random early drops at a router, well known in the research area of congestion control. It makes the shared link less crowded with frames, and then the benefit of fewer collisions surpasses the penalty of less strict error recovery. As a result, the network-wide performance improves and so does the performance of each BSS eventually. Reducing the retry limit also has positive effects of merging TCP ACKs and reducing HOL-like blocking time at the AP. Extensive experiments have validated the idea that in the OBSS environment, reducing the retry limit provides better performance, which is contrary to the common wisdom. Since our strategy is basically to sacrifice error recovery for congestion control, it could yield side-effects in an environment where the cost of error recovery is high. Therefore, to be useful in general network and traffic environments, adaptability is required. To prove the feasibility of the adaptive scheme, a simple method to dynamically adjust the value of the retry limit has been proposed. Experiments have shown that this approach could provide comparable performance in unfriendly environments.

Design of An Effective Resource Allocation System in the Satellite Network using MF-TDMA DAMA Method (MF-TDMA DAMA 방식 위성 망에서 효율적인 자원할당 시스템 설계)

  • Heo, Jun;Choi, Yong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.85-93
    • /
    • 2012
  • In this paper, I designed the satellite system, using the MF-TDMA (Multi Frequency-Time Division Multiple Access) DAMA (Demand-Assigned Multiple Access) method, that allocates the satellite resources more effectively to prevent a large quantity data discard when Earth Terminals (ETs) request their satellite network resource to Network Controller (NC) by using their history information, such as traffic pattern or traffic class which have been receiving, and the network controller allocates the satellite network resource and send to earth terminals by using his history information that earth terminals have been requested already. The U.S. Military Warfighter Information Network-Tactical (WIN-T) community has selected the L-3 Linkabit MF-TDMA DAMA Network Centric Waveform (NCW) as the networking standard for full-mesh IP over SHF satellite communications. In the MF-TDMA DAMA satellite network, network controller allocates the satellite network resources and enables maximum 255 earth terminals to communicate each other for periodic satellite network resource requests of earth terminals.

Traffic Classification based on Adjustable Convex-hull Support Vector Machines (조절할 수 있는 볼록한 덮개 서포트 벡터 머신에 기반을 둔 트래픽 분류 방법)

  • Yu, Zhibin;Choi, Yong-Do;Kil, Gi-Beom;Kim, Sung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.67-76
    • /
    • 2012
  • Traffic classification plays an important role in traffic management. To traditional methods, P2P and encryption traffic may become a problem. Support Vector Machine (SVM) is a useful classification tool which is able to overcome the traditional bottleneck. The main disadvantage of SVM algorithms is that it's time-consuming to train large data set because of the quadratic programming (QP) problem. However, the useful support vectors are only a small part of the whole data. If we can discard the useless vectors before training, we are able to save time and keep accuracy. In this article, we discussed the feasibility to remove the useless vectors through a sequential method to accelerate training speed when dealing with large scale data.

Genome-Wide Association Study of Metabolic Syndrome in Koreans

  • Jeong, Seok Won;Chung, Myungguen;Park, Soo-Jung;Cho, Seong Beom;Hong, Kyung-Won
    • Genomics & Informatics
    • /
    • v.12 no.4
    • /
    • pp.187-194
    • /
    • 2014
  • Metabolic syndrome (METS) is a disorder of energy utilization and storage and increases the risk of developing cardiovascular disease and diabetes. To identify the genetic risk factors of METS, we carried out a genome-wide association study (GWAS) for 2,657 cases and 5,917 controls in Korean populations. As a result, we could identify 2 single nucleotide polymorphisms (SNPs) with genome-wide significance level p-values (< $5{\times}10^{-8}$), 8 SNPs with genome-wide suggestive p-values ($5{\times}10^{-8}{\leq}$ p < $1{\times}10^{-5}$), and 2 SNPs of more functional variants with borderline p-values ($5{\times}10^{-5}{\leq}$ p < $1{\times}10^{-4}$). On the other hand, the multiple correction criteria of conventional GWASs exclude false-positive loci, but simultaneously, they discard many true-positive loci. To reconsider the discarded true-positive loci, we attempted to include the functional variants (nonsynonymous SNPs [nsSNPs] and expression quantitative trait loci [eQTL]) among the top 5,000 SNPs based on the proportion of phenotypic variance explained by genotypic variance. In total, 159 eQTLs and 18 nsSNPs were presented in the top 5,000 SNPs. Although they should be replicated in other independent populations, 6 eQTLs and 2 nsSNP loci were located in the molecular pathways of LPL, APOA5, and CHRM2, which were the significant or suggestive loci in the METS GWAS. Conclusively, our approach using the conventional GWAS, reconsidering functional variants and pathway-based interpretation, suggests a useful method to understand the GWAS results of complex traits and can be expanded in other genomewide association studies.

Development of Monte Carlo Simulation Code for the Dose Calculation of the Stereotactic Radiosurgery (뇌 정위 방사선수술의 선량 계산을 위한 몬테카를로 시뮬레이션 코드 개발)

  • Kang, Jeongku;Lee, Dong Joon
    • Progress in Medical Physics
    • /
    • v.23 no.4
    • /
    • pp.303-308
    • /
    • 2012
  • The Geant4 based Monte Carlo code for the application of stereotactic radiosurgery was developed. The probability density function and cumulative density function to determine the incident photon energy were calculated from pre-calculated energy spectrum for the linac by multiplying the weighting factors corresponding to the energy bins. The messenger class to transfer the various MLC fields generated by the planning system was used. The rotation matrix of rotateX and rotateY were used for simulating gantry and table rotation respectively. We construct accelerator world and phantom world in the main world coordinate to rotate accelerator and phantom world independently. We used dicomHandler class object to convert from the dicom binary file to the text file which contains the matrix number, pixel size, pixel's HU, bit size, padding value and high bits order. We reconstruct this class object to work fine. We also reconstruct the PrimaryGeneratorAction class to speed up the calculation time. because of the huge calculation time we discard search process of the ThitsMap and used direct access method from the first to the last element to produce the result files.

A Low Memory Bandwidth Motion Estimation Core for H.264/AVC Encoder Based on Parallel Current MB Processing (병렬처리 기반의 H.264/AVC 인코더를 위한 저 메모리 대역폭 움직임 예측 코어설계)

  • Kim, Shi-Hye;Choi, Jun-Rim
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.2
    • /
    • pp.28-34
    • /
    • 2011
  • In this paper, we present integer and fractional motion estimation IP for H.264/AVC encoder by hardware-oriented algorithm. In integer motion engine, the reference block is used to share for consecutive current macro blocks in parallel processing which exploits data reusability and reduces off-chip bandwidth. In fractional motion engine, instead of two-step sequential refinement, half and quarter pel are processed in parallel manner in order to discard unnecessary candidate positions and double throughput. The H.264/AVC motion estimation chip is fabricated on a MPW(Multi-Project Wafer) chip using the chartered $0.18{\mu}m$ standard CMOS 1P5M technology and achieves high throughput supporting HDTV 720p 30 fps.