• Title/Summary/Keyword: existing network

Search Result 5,697, Processing Time 0.039 seconds

Finding Genes Discriminating Smokers from Non-smokers by Applying a Growing Self-organizing Clustering Method to Large Airway Epithelium Cell Microarray Data

  • Shahdoust, Maryam;Hajizadeh, Ebrahim;Mozdarani, Hossein;Chehrei, Ali
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.1
    • /
    • pp.111-116
    • /
    • 2013
  • Background: Cigarette smoking is the major risk factor for development of lung cancer. Identification of effects of tobacco on airway gene expression may provide insight into the causes. This research aimed to compare gene expression of large airway epithelium cells in normal smokers (n=13) and non-smokers (n=9) in order to find genes which discriminate the two groups and assess cigarette smoking effects on large airway epithelium cells.Materials and Methods: Genes discriminating smokers from non-smokers were identified by applying a neural network clustering method, growing self-organizing maps (GSOM), to microarray data according to class discrimination scores. An index was computed based on differentiation between each mean of gene expression in the two groups. This clustering approach provided the possibility of comparing thousands of genes simultaneously. Results: The applied approach compared the mean of 7,129 genes in smokers and non-smokers simultaneously and classified the genes of large airway epithelium cells which had differently expressed in smokers comparing with non-smokers. Seven genes were identified which had the highest different expression in smokers compared with the non-smokers group: NQO1, H19, ALDH3A1, AKR1C1, ABHD2, GPX2 and ADH7. Most (NQO1, ALDH3A1, AKR1C1, H19 and GPX2) are known to be clinically notable in lung cancer studies. Furthermore, statistical discriminate analysis showed that these genes could classify samples in smokers and non-smokers correctly with 100% accuracy. With the performed GSOM map, other nodes with high average discriminate scores included genes with alterations strongly related to the lung cancer such as AKR1C3, CYP1B1, UCHL1 and AKR1B10. Conclusions: This clustering by comparing expression of thousands of genes at the same time revealed alteration in normal smokers. Most of the identified genes were strongly relevant to lung cancer in the existing literature. The genes may be utilized to identify smokers with increased risk for lung cancer. A large sample study is now recommended to determine relations between the genes ABHD2 and ADH7 and smoking.

Appropriateness of Location of Nuclear Accident Evacuation Shelters based on Population Characteristics and Accessibility -The Case of Busan Gijang-gun, Geumjeong-gu and Haeundae-gu in Korea- (인구특성과 접근성을 고려한 방사능재난 대피시설 입지 적정성 분석 -부산광역시 기장군, 금정구, 해운대구를 대상으로-)

  • DONG, Ah-Hyeon;LEE, Sang-Hyeok;KANG, Jung-Eun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.131-145
    • /
    • 2019
  • Korea has set up a radiation emergency planning zone based on the 「Act on Physical Protection and Radiological Emergency」 to protect residents living near nuclear power plants in the event of nuclear disasters. Little research has been conducted on the appropriateness of existing nuclear evacuation facilities because of a general lack of interest in nuclear accidents. This research addresses this gap by analyzing the location adequacy of evacuation facilities in Busan's emergency protection planning area based on vulnerable populations and accessibility analyses. The Gijang-gun which has the greatest risk, shows that only 4.05% of the total urban area was included in the evacuation service area within 5 minutes while only 36.93% of Geumjeong-gu and 37.23% of Haeundae-gu were included in the evacuation-enabled area. In addition, evaluation facilities in the elderly population hotspots were lacking, and there was a wide gap between dongs within the same Gu. Thus, additional evacuation facilities need to be designated and installed considering the spatial equity between areas and safety of both the public and vulnerable populations.

An Empirical Research how ISO application and Partnership process affect on Business Performance of Import and Export Manufacturing Firms in Korea (한국 수출입 제조 기업의 국제표준인증 활용과 파트너십 프로세스에 대한 연구)

  • Kim, Chang Bong;Koo, Yun Cheol
    • International Commerce and Information Review
    • /
    • v.18 no.2
    • /
    • pp.131-150
    • /
    • 2016
  • As global partnership is recently getting important in order to establish supply chain network in global managing environment, companies tend to improve quality and warranty in SCM(Supply Chain Management) by certifying ISO(International Organization for Standardization). This research investigated structural relationship how strategic and operational ISO application level and trust, immersion, collaborative factors in partnership process affect to companies business performance. This research was surveyed with 147 manufacturing companies in South Korea and conducted empirical analysis using Structural equation model. The research hypothesis and model was derived from the basis of existing theory and empirical research, and obtained the following results. Firstly, the strategic ISO level showed positive(+) effect on trust and immersion factor. Second, the operational ISO level showed positive(+) effect on trust and collaborative factor. Third, trust factor in the partnership process showed positive(+) effect on immersion factor. Lastly, collaborative factor in partnership process showed positive(+) effect on companies business performance. Implication for this research is that companies must consider ISO application in establishing partnership and companies require prolonged effort using trust, immersing, collaborative factors into partnership process to improve business performance.

  • PDF

Optimized Route Optimization mode of MIPv6 between Domains Based on AAA (관리상의 도메인간 이동시 AAA 기반의 핸드오버 성능향상 방안)

  • Ryu, Seong-Geun;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.9
    • /
    • pp.39-45
    • /
    • 2009
  • When Mobile IPv6 is deployed in commercial network, a mobile node needs AAA services for an authentication, authorization and accounting. AAA and Mobile IPv6 are protocols which are operated independently. Then schemes which merge these protocols have been emerged. These schemes can enable a mobile node to establish a security association between the mobile node and a home agent and to perform a binding update for the home agent using AAA authentication request. But these schemes introduce many signal messages and long handover latency during the handover, since Route Optimization mode for Mobile Ipv6 is performed using Return Routability procedure. To solve this problem, we propose a scheme for Route Optimization mode that the home agent performs the binding update for a correspondent node via the AAA infrastructure between the home agent and the correspondent node instead of Return Routability procedure. For performance evaluation, we analyze signal message transmission costs and handover latencies during handover. We show performance improvement of the proposed scheme which reduces handover latency as 61% compared with the existing scheme.

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.

A Study on the Development of Services Supporting Personal Relationship Management - focusing on relationship management using mobile phones (인간 관계관리 지원 서비스 개발을 위한 연구 - 휴대전화를 이용한 관계 관리를 중심으로)

  • Kim, Ju-Yong;Lee, Chang-Hee;Lee, Se-Young;Lee, Jun-Ho
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.239-244
    • /
    • 2008
  • We lead a life in our community, beginning a new relationship with a stranger or maintaining or stopping existing relationships. Relationships with others are sustained through social activities based on communication. Generally speaking, by exchanging feelings and information through communication, relationships are formed and continued, and strengthened through active communication As a result of the development of technologies and information technology over the recent 10 years, a mobile phone has stood as a communication channel, and now it has become such a universal, and highly intimate and important means of communication that almost all the Koreans use more often than wired phones. Today, people have their communication channel available for others, by using a mobile phone at any time and anywhere. Like this, mobile phones have been playing a key role in helping people maintain, repair and strengthen their personal relationship, but from the perspective of personal relationship management, they still remain as an aid to help communication, failing to provide a positive help for actual relationship management. This study was designed to provide services supporting user's personal relationship management, focusing on the use of mobile phones as a major tool of communication, aiming to enable users to understand current state of their relationship and make relationship management efforts, or communication behaviors, by informing who needs communication, on the basis of data on mobile phone calls. To this end, the study established a method to extract intimacy between users and callers and develop a prototype of services supporting personal relationship management, using relationship characteristics in terms of mobile communication.

  • PDF

Measurement and Analysis of P2P Traffic in Campus Networks Under Firewall (방화벽이 존재하는 캠퍼스 망에서의 P2P 트래픽 측정 및 분석)

  • Lee, Young-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.750-757
    • /
    • 2005
  • This paper reports on the study of P2P traffic behaviors in a high-speed campus network under a simple firewall which drops packets with default port numbers for the well-blown P2P applications. Among several ways of detecting P2P traffic, the easiest method is to filter out packets with the default port number of each P2P application. After deploying the port-based firewall against P2P-traffic, it is expected that the amount of P2P traffic will be decreased. However, during the eight-month measurement period, three new commercial P2P applications have been identified and their traffic usages have reached up to $30/5.6\%$ of the total outbound/inbound traffic volumes at the end of the measurement period. In addition, the most famous P2P application, eDonkey, has adapted and has escaped detection through port hopping. The measurement result shows that the amount of eDonkey traffic is around $6.7/4.0\%$ of the total outbound/inbound traffic volume. From the measurement results, it is observed that the port-based firewall is not effective to limit the usage of P2P applications and that the P2P traffic is steadily growing due to not only the evolution of existing P2P applications such as port hopping but also appearances of new P2P applications.

Schedule Computation Method of Two-way Multiple Overlapping Relationships on BDM Technique (BDM 기법에서 양방향 다중 중복관계 일정계산 방법)

  • Kim, Seon-Gyoo;Noh, Seong-Beom;Lee, Yong-Hyun;Yu, Young-Jeong;Kim, Jin-Bong;Koo, Jae-Oh
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.2
    • /
    • pp.120-127
    • /
    • 2012
  • Today, most construction projects have been higher, bigger, and more complicated gradually. So the domestic construction companies have been trying to understand overall construction process and relationships between activities, and adopted various management techniques and tools in order to perform a systematic and effective scheduling. However numerous problems have been occurred on the practical applications because most existing scheduling softwares adapt ADM and PDM techniques. One of them, PDM, is so uneffective because it represents the overlapping relationships between two consecutive activities only by the combinations of start and finish points between two activities. In order to supplement the demerit of PDM, Beeline Diagramming Method(BDM) is proposed as a new networking technique, it can represent two-way multiple overlapping relationships between two activities directly. However there are occurring a loop phenomenon on applying two-way multiple overlapping relationships. This research proposes and verifies the schedule computation method of two-way multiple overlapping relationships on the BDM network.

$M^2$ MAC: MAC protocol for Real Time Robot Control System based on Underwater Acoustic Communication ($M^2$ MAC(Message Merging): 수중음파통신 기반의 실시간 로봇 제어 시스템을 위한 MAC 프로토콜)

  • Kim, Yung-Pyo;Park, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.88-96
    • /
    • 2011
  • Underwater acoustic communication is applicable in various areas, such as ocean data collection, undersea exploration and development, tactical surveillance, etc. Thus, robot control system construction used for underwater-robot like AUV or ROV is essential in these areas. In this paper, we propose the Message Merging MAC($M^2$-MAC) protocol, which is suitable for real time robot control system, considering energy efficiency in important parts of underwater acoustic sensor network constitution. In this proposed MAC protocol, gateway node receives the data from robot nodes according to the time slots that were allotted previously. And messages delivered from base-station are generated to one MAC frame by buffering process. Finally, generated MAC frames are broadcasted to all robot nodes in the cluster. Our suggested MAC protocol can also be hybrid MAC protocol, which is successful blend of contention based and contention-free based protocol through relevant procedure with Maintenance&Sleep (M&S) period, when new nodes join and leave as an orphan. We propose mathematical analysis model concerned about End-to-End delay and energy consumption, which is important factor in constructing real-time robot control system. We also verify the excellence of performance according to comparison of existing MAC protocols with our scheme.

A Study on the Issues and Improvement of the Existing Environmental Impact Assessment System - Evaluation in an operator Viewpoint - (현행 환경영향평가 제도의 문제점과 개선방안 - 실무자적 관점에서 검토 -)

  • Lee, Seung-Won;Kim, Jung-gun;Seo, Jung-Kuk
    • Journal of Environmental Science International
    • /
    • v.27 no.5
    • /
    • pp.281-289
    • /
    • 2018
  • The Korean environmental impact assessment(EIA) system, and explored ways to improve it as a more efficient and viable institution relevant to the demand of our time and conditions in study. The first problem this study identified is found in the fact that the party to write up the assessment report is itself the business operator or the one who is planning to work out the business plan. This structure translates into placing an order with an agent for EIA report. The reporting job may br subcontracted to the agent at a cost far below the rate specified in the 'Standard for Estimate of Agency Fee for Environmental Impact Assessment.' This practice also causes the vicious circle of producing a report that is written to justify the project or business in question or it leads to rough-and ready and poor documentation to minimize the time required. Second, in order to achieve the goal of the plan or business, which is the target of EIA, the local residents tend to ve regarded as an obstacle. This means elimination of the local people from participating in the EIA or their opinion being frequently ignored. This is the seed of distrust and hostility that sometimes provoke disagreements or fierce conflicts. The first proposal to improve these problem is to improve the factors that cause poor documentation of the assessment report as well as improve the understanding of the EIA system. This study proposes the following measures for improvement. The agency cost for EIA should be paid by the business operator or a third party that can ensure faithful implementation of the payment. A system should be established to verify transparent estimation of the agency cost. In order to enhance the professional quality of EIA agents, there should be implementation of qualification test for industrial engineer of related engineers in addition to the current EIA Qualification Test. The second proposal for improvement is to improve the citizen participation process by instituting a legal framework to make clear the purpose of the briefing session for local residents, which is held as a procedure of EIA, and to ensure more positive publicity during the stage of listening to the opinion of the local community. For a smooth and rational communication process, a moderator and a communicator of opinion, as is the case in a public hearing, could be instituted to clearly get the purpose of the briefing session across to the residents and to help to carry out the explanation and Q & A sessions according to the categories of the opinion of the residents. At present, the notification of the public inspection of the draft of the assessment report and briefing session for the residents is made on the newspaper and internet network. But some people have difficulty with access to this method of announcement. A higher participation rate could be secured if a legal provision is added to specify putting up placards in specific places such as the entrance to the place for the briefing session for residents or the building of administrative agencies of the area concerned.