• Title/Summary/Keyword: host-based

Search Result 1,615, Processing Time 0.037 seconds

Robotic Agent Design and Application in the Ubiquitous Intelligent Space (유비쿼터스 지능형 공간에서의 로봇 에이전트 설계 및 응용)

  • Yoon Han-Ul;Hwang Se-Hee;Kim Dae-Wook;Lee Doong-Hoon;Sim Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1039-1044
    • /
    • 2005
  • This paper presents a robotic agent design and application in the ubiquitous intelligent space. We set up an experimental environment with Bluetooth host, Bluetooth client, furniture and home appliance, and robotic agents. First, the agents basically performed patrol guard to detect unexpected penetration, and to keep home safely from gas-leakage, electric leakage, and so on. They were out to patrol fur a robbery while navigating in a living room and a private room. In this task, we used an area-based action making and a hexagon-based Q-learning to control the agents. Second, the agents communicate with Bluetooth host device to access and control a home appliance. The Bluetooth host offers a manual control to person by inquiring a client robot when one would like to check some place especially. In this exercise, we organize asynchronous connection less (ACL) between the host and the client robots and control the robot maneuver by Bluetooth host controller interface (HCI).

Computational approaches for prediction of protein-protein interaction between Foot-and-mouth disease virus and Sus scrofa based on RNA-Seq

  • Park, Tamina;Kang, Myung-gyun;Nah, Jinju;Ryoo, Soyoon;Wee, Sunghwan;Baek, Seung-hwa;Ku, Bokkyung;Oh, Yeonsu;Cho, Ho-seong;Park, Daeui
    • Korean Journal of Veterinary Service
    • /
    • v.42 no.2
    • /
    • pp.73-83
    • /
    • 2019
  • Foot-and-Mouth Disease (FMD) is a highly contagious trans-boundary viral disease caused by FMD virus, which causes huge economic losses. FMDV infects cloven hoofed (two-toed) mammals such as cattle, sheep, goats, pigs and various wildlife species. To control the FMDV, it is necessary to understand the life cycle and the pathogenesis of FMDV in host. Especially, the protein-protein interaction between FMDV and host will help to understand the survival cycle of viruses in host cell and establish new therapeutic strategies. However, the computational approach for protein-protein interaction between FMDV and pig hosts have not been applied to studies of the onset mechanism of FMDV. In the present work, we have performed the prediction of the pig's proteins which interact with FMDV based on RNA-Seq data, protein sequence, and structure information. After identifying the virus-host interaction, we looked for meaningful pathways and anticipated changes in the host caused by infection with FMDV. A total of 78 proteins of pig were predicted as interacting with FMDV. The 156 interactions include 94 interactions predicted by sequence-based method and the 62 interactions predicted by structure-based method using domain information. The protein interaction network contained integrin as well as STYK1, VTCN1, IDO1, CDH3, SLA-DQB1, FER, and FGFR2 which were related to the up-regulation of inflammation and the down-regulation of cell adhesion and host defense systems such as macrophage and leukocytes. These results provide clues to the knowledge and mechanism of how FMDV affects the host cell.

Attacker and Host Modeling for Cyber-Attack Simulation (사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Host-Based Malware Variants Detection Method Using Logs

  • Joe, Woo-Jin;Kim, Hyong-Shik
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.851-865
    • /
    • 2021
  • Enterprise networks in the PyeongChang Winter Olympics were hacked in February 2018. According to a domestic security company's analysis report, attackers destroyed approximately 300 hosts with the aim of interfering with the Olympics. Enterprise have no choice but to rely on digital vaccines since it is overwhelming to analyze all programs executed in the host used by ordinary users. However, traditional vaccines cannot protect the host against variant or new malware because they cannot detect intrusions without signatures for malwares. To overcome this limitation of signature-based detection, there has been much research conducted on the behavior analysis of malwares. However, since most of them rely on a sandbox where only analysis target program is running, we cannot detect malwares intruding the host where many normal programs are running. Therefore, this study proposes a method to detect malware variants in the host through logs rather than the sandbox. The proposed method extracts common behaviors from variants group and finds characteristic behaviors optimized for querying. Through experimentation on 1,584,363 logs, generated by executing 6,430 malware samples, we prove that there exist the common behaviors that variants share and we demonstrate that these behaviors can be used to detect variants.

Charge Trapping Host Structure for High Efficiency in Phosphorescent Organic Light-Emitting Diodes

  • Lee, Jun-Yeob
    • Journal of Information Display
    • /
    • v.9 no.2
    • /
    • pp.14-17
    • /
    • 2008
  • A charge trapping host structure was developed to improve the light-emitting efficiency of green phosphorescent organic light-emitting diodes. N, N'-dicarbazolyl-3,5-benzene(mCP) and a spirobifluorene based triplet host(PHl) were co-deposited as hosts in the emitting layer and the device performance was examined according to the composition mCP and PH1. The results showed that the quantum efficiency could be improved by 30 % using a mixed host of mCP and PH1.

De-correlated Compression Filter Based on Time-Propagated Measurement Fusion

  • Lee, Hyung-Keun;Lee, Jang-Gyu;Jee, Gyu-In;Park, Chan-Gook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.76.2-76
    • /
    • 2001
  • In this paper, a new fusion architecture consisting of a host filter and a do-correlated compression filter is proposed based on propagated measurement fusion. In the proposed architecture, the host filter estimates the system states in long-term sense based on the measurements from the beginning to the current time. The de-correlated compression filter assists the host filter by providing fusion results in short-term sense based on the measurements within a block of time. The proposed de-correlated compression filter alleviates computational burden of the host filter by reducing the maximum amount of instantaneous computation, and provides an efficient environment for real-time fault detection and estimation.

  • PDF

HOST GALAXY OF TIDAL DISRUPTION OBJECT, SWIFT J1644+57

  • YOON, YONGMIN;IM, MYUNGSHIN;LEE, SEONG-KOOK;PAK, SOOJONG
    • Publications of The Korean Astronomical Society
    • /
    • v.30 no.2
    • /
    • pp.475-476
    • /
    • 2015
  • We analyze the host galaxy of the tidal disruption object, Swift J1644+57, based on long-term optical to NIR data obtained with CQUEAN and UKIRT WFCAM observations. We decompose the bulge component using high resolution HST WFC3 images. We conclude that the host galaxy is bulge dominant. We investigate optical to NIR light curves and estimate the multi-band fluxes of the host galaxy. We fit spectral energy distribution (SED) models in order to determine the stellar mass. Finally, we estimate the mass of the black hole in the center of the host galaxy based on several scale relations.

A study on the mobility control in the next generation wireless mobile network (차세대 무선 이동 통신망에서의 이 동성 제어 방안에 관한 고찰)

  • Kim, Duck-Jung;Kim, Jae-Hak;Kim, Hyoung-Taek;Ahn, Gil-Whan
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.273-278
    • /
    • 2007
  • In the next generation wireless mobile network, various methods are studied to offer interworking and mobility between various radio networks. To offer these harmoniously, network adaptation methods based on IP is generalized, and specifications of host-based mobility method with Mobile IPv4 and Mobile IPv6 to offer IP's mobility are defined in IETF specially. However, it is insufficient to satisfy quality of service that should be offered in wireless mobile network environment. Alternatively studies about Network-Based Mobility of Proxy Mobile IPv4, Proxy Mobile IPv6 etc. are preceded. This paper presents optimum plan that can offer mobility in the next generation radio transfer communication network by comparing and analyzing IP mobility methods divided by Host-based Mobility and Network-based Mobility.

  • PDF

A Duplicate Address Resolution Protocol in Mobile Ad Hoc Networks

  • Lin Chunhung Richard;Wang Guo-Yuan Mikko
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.525-536
    • /
    • 2005
  • In an IP-based network, automated dynamic assignment of IP addresses is preferable. In most wired networks, a node relies on a centralized server by using dynamic host configuration protocol (DHCP) to obtain a dynamic IP address. However, the DHCP­based approach cannot be employed in a mobile ad hoc network (MANET) due to the uncertainty of any centralized DHCP server. That is, a MANET may become partitioned due to host mobility. Therefore, there is no guarantee to access a DHCP server. A general approach to address this issue is to allow a mobile host to pick a tentative address randomly, and then use duplicate address resolution (DAR) protocol to resolve any duplicate addresses. In this paper, an innovative distributed dynamic host configuration protocol designed to configure nodes in MANET is presented. The proposed protocol not only can detect the duplicate address, but also can resolve the problem caused by duplicate address. It shows that the proposed protocol works correctly and is more universal than earlier approaches. An enhanced version of DAR scheme is also proposed in this paper to solve the situation of duplicate MAC address. The new and innovative approach proposed in this paper can make the nodes in MANET provide services to other networks and avoid packets from being delivered to incorrect destinations.

Salen-Aluminum Complexes as Host Materials for Red Phosphorescent Organic Light-Emitting Diodes

  • Bae, Hye-Jin;Hwang, Kyu-Young;Lee, Min-Hyung;Do, Young-Kyu
    • Bulletin of the Korean Chemical Society
    • /
    • v.32 no.9
    • /
    • pp.3290-3294
    • /
    • 2011
  • The properties of monomeric and dimeric salen-aluminum complexes, [salen(3,5-$^tBu)_2$Al(OR)], R = $OC_6H_4-p-C_6H_6$ (H1) and R = [salen(3,5-$^tBu$)AlOPh]C$(CH_3)_2$ (H2) (salen = N,N'-bis-(salicylidene)-ethylenediamine) as host layer materials in red phosphorescent organic light-emitting diodes (PhOLEDs) were investigated. H1 and H2 exhibit high thermal stability with decomposition temperature of 330 and $370^{\circ}C$. DSC analyses showed that the complexes form amorphous glasses upon cooling of melt samples with glass transition temperatures of 112 and $172^{\circ}C$. The HOMO (ca. -5.2~-5.3 eV) and LUMO (ca. -2.3~-2.4 eV) levels with a triplet energy of ca. 1.92 eV suggest that H1 and H2 are suitable for a host material for red emitters. The PhOLED devices based on H1 and H2 doped with a red emitter, $Ir(btp)_2$(acac) (btp = bis(2-(2'-benzothienyl)-pyridinato-N,$C^3$; acac = acetylacetonate) were fabricated by vacuum-deposition and solution process, respectively. The device based on vacuum-deposited H1 host displays high device performances in terms of brightness, luminous and quantum efficiencies comparable to those of the device based on a CBP (4,4'-bis(Ncarbazolyl) biphenyl) host while the solution-processed device with H2 host shows poor performance.