• Title/Summary/Keyword: multiple targets

Search Result 396, Processing Time 0.022 seconds

An Intersection Validation and Interference Elimination Algorithm between Weapon Trajectories in Multi-target and Multi-weapon Environments (다표적-다무장 환경에서 무장 궤적 간 교차 검증 및 간섭 배제 알고리즘)

  • Yoon, Moonhyung;Park, Junho;Yi, JeongHoon;Kim, Kapsoo;Koo, BongJoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.614-622
    • /
    • 2018
  • As multiple weapons are fired simultaneously in multi-target and multi-weapon environments, a possibility always exists in the collision occurred by the intersection between weapon trajectories. The collision between weapons not only hinders the rapid reaction but also causes the loss of the asset of weapons of friendly force to weaken the responsive power against the threat by an enemy. In this paper, we propose an intersection validation and interference elimination algorithm between weapon trajectories in multi-target and multi-weapon environments. The core points of our algorithm are to confirm the possible interference through the analysis on the intersections between weapon trajectories and to eliminate the mutual interference. To show the superiority of our algorithm, we implement the evaluation and verification of performances through the simulation and visualization of our algorithm. Our experimental results show that the proposed algorithm performs effectively the interference elimination regardless of the number of targets and weapon groups by showing that no cross point exists.

Cloning and Functional Characterization of Putative Escherichia coli ABC Multidrug Efflux Transporter YddA

  • Feng, Zhenyue;Liu, Defu;Liu, Ziwen;Liang, Yimin;Wang, Yanhong;Liu, Qingpeng;Liu, Zhenhua;Zang, Zhongjing;Cui, Yudong
    • Journal of Microbiology and Biotechnology
    • /
    • v.30 no.7
    • /
    • pp.982-995
    • /
    • 2020
  • A putative multidrug efflux gene, yddA, was cloned from the Escherichia coli K-12 strain. A drug-sensitive strain of E. coli missing the main multidrug efflux pump AcrB was constructed as a host and the yddA gene was knocked out in wild-type (WT) and drug-sensitive E. coliΔacrB to study the yddA function. Sensitivity to different substrates of WT E.coli, E. coliΔyddA, E. coliΔacrB and E. coliΔacrBΔyddA strains was compared with minimal inhibitory concentration (MIC) assays and fluorescence tests. MIC assay and fluorescence test results showed that YddA protein was a multidrug efflux pump that exported multiple substrates. Three inhibitors, ortho-vanadate, carbonyl cyanide m-chlorophenylhydrazone (CCCP), and reserpine, were used in fluorescence tests. Ortho-vanadate and reserpine significantly inhibited the efflux and increased accumulation of ethidium bromide and norfloxacin, while CCCP had no significant effect on YddA-regulated efflux. The results indicated that YddA relies on energy released from ATP hydrolysis to transfer the substrates and YddA is an ABC-type multidrug exporter. Functional study of unknown ATP-binding cassette (ABC) superfamily transporters in the model organism E. coli is conducive to discovering new multidrug resistance-reversal targets and providing references for studying other ABC proteins of unknown function.

Performance Analysis of the Tracking Filter Employing Jerk Model for Highly Maneuvering Targets (Jerk 모델을 사용한 급격한 기동표적 추적필터의 성능 해석)

  • Joo, Jae-Seok;Lim, Sang-Seok
    • Journal of Advanced Navigation Technology
    • /
    • v.4 no.1
    • /
    • pp.50-66
    • /
    • 2000
  • For a long time target maneuvers in tracking problem have been a difficult task to handle. Once a maneuvering such as abrupt change in target accelerations occur, the tracking fiter no longer yields a reasonable estimate of the target position. In order to resolve this cumbersome maneuvering problem. Advanced methods have here proposed : Colored noise, IE(Input Estimation), VD(Variable Dimension), IMM(Interaction Multiple Model), Jump-type processes and jerk model, etc. In this paper, tracking performance of the jerk model is analyzed. Jerk model in which the derivative of target acceleration is included as a state recently attracted considerable attraction. Firstly 3-dimensional Kalman filter is described on the basis of jerk model. Then using this filter, Monte-Carlo simulations are carried out and the filter formance with respect to the variation of jerk time-constant is analyzed. Especially, since jerk model's transient performance is expected to be poor, the performance of analysis of transient response of the model is included too.

  • PDF

Structure Design of Surveillance Location-Based UAV Motor Primitives (감시 위치 기반의 UAV 모터프리미티브의 구조 설계)

  • Kwak, Jeonghoon;Sung, Yunsick
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.4
    • /
    • pp.181-186
    • /
    • 2016
  • Recently, the surveillance system research has focused because Unmanned Aerial Vehicle(UAV) has the ability to monitor wide area. When the wide area are monitored, controlling UAVs repeatedly by pilots invokes the cost problem to operate UAVs. If monitoring path can be defined in advance, the cost problem can be solved by controlling UAVs autonomously based on the monitoring path. The traditional approach generates multiple motor primitives based on flied GPS locations. However, the monitoring points by UAVs are not considered by the generated motor primitives, the surveillance by UAVs is not performed properly. This paper proposes a motor primitive structure for surveillance UAVs to be flied autonomously. Motor primitives are generated automatically by setting surveillance points to denote surveillance targets accurately.

Molecular Mechanisms of Casticin Action: an Update on its Antitumor Functions

  • Rasul, Azhar;Zhao, Bin-Ji;Liu, Jun;Liu, Bao;Sun, Jia-Xin;Li, Jiang;Li, Xiao-Meng
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.21
    • /
    • pp.9049-9058
    • /
    • 2014
  • Casticin (3', 5-dihydroxy-3, 4', 6, 7-tetramethoxyflavone) is an active compound isolated from roots, stems, leaves, fruits and seeds of a variety of plants. It is well known for its pharmacological properties and has been utilized as an anti-hyperprolactinemia, anti-tumor, anti-inflammatory, neuroprotetective, analgesic and immunomodulatory agent. Recently, the anticancer activity of casticin has been extensively investigated. The resulkts showed that it exerts protective potential by targeting apoptosis, considered important for cancer therapies. In this article, our aim was to review the pharmacological and therapeutic applications of casticin with specific emphasis on its anticancer functions and related molecular mechanisms. Chemotherapeutic effects are dependent on multiple molecular pathways, which may provide a new perspective of casticin as a candidate anti-neoplastic drug. This review suggests that additional studies and preclinical trials are required to determine specific intracellular sites of action and derivative targets in order to fully understand the mechanisms of its antitumor activity and validate this compound as a medicinal agent for the prevention and treatment of various cancers.

Implementation and Design of Port Scan Detecting System Detecting Abnormal Connection Attempts (비정상 연결시도를 탐지한 포트 스캔 탐지 시스템의 설계 및 구현)

  • Ra, Yong-Hwan;Cheon, Eun-Hong
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.63-75
    • /
    • 2007
  • Most of computer systems to be connected to network have been exposed to some network attacks and became to targets of system attack. System managers have established the IDS to prevent the system attacks over network. The previous IDS have decided intrusions detecting the requested connection packets more than critical values in order to detect attacks. This techniques have False Positive possibilities and have difficulties to detect the slow scan increasing the time between sending scan probes and the coordinated scan originating from multiple hosts. We propose the port scan detection rules detecting the RST/ACK flag packets to request some abnormal connections and design the data structures capturing some of packets. This proposed system is decreased a False Positive possibility and can detect the slow scan, because a few data can be maintained for long times. This system can also detect the coordinated scan effectively detecting the RST/ACK flag packets to be occurred the target system.

  • PDF

DEEP-South: Performance of Moving Object Detection Program in Different Observation Modes

  • Oh, Young-Seok;Bae, Yeong-Ho;Kim, Myung-Jin;Roh, Dong-Goo;Jin, Ho;Moon, Hong-Kyu;Park, Jintae;Lee, Hee-Jae;Yim, Hong-Suh;Choi, Young-Jun
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.2
    • /
    • pp.48.3-49
    • /
    • 2016
  • We have five different types of observation modes with regard to the Deep Ecliptic Patrol of the Southern Sky (DEEP-South); Opposition Census (OC) for targeted photometry, Sweet Spot Survey (S1) for discovery and orbit characterization of Atens and Atiras, Ecliptic Survey (S2) for asteroid family studies and comet census, NEOWISE follow-up (NW) for near simultaneous albedo measurements in the visible bands, and Target of Opportunity (TO) observation for follow-up either for unpredictable events or targets of special interests. Different exposures with such different modes result in a wide range of background noise level, the number of background stars and the mover's projected speed in each image. The Moving Object Detection Program (MODP) utilizes multiple mosaic images being taken for the same target fields at different epochs at the three KMTNet sites. MODP employs existing software packages such as SExtractor (Source-Extractor) and SCAMP (Software for Calibrating Astrometry and Photometry); SExtractor generates object catalogs, while SCAMP conducts precision astrometric calibration, then MODP determines if a point source is moving. This package creates animated stamp images for visual inspection with MPC reports, the latter for checking whether an object is known or unknown. We evaluate the astrometric accuracy and efficiency of MODP using the year one dataset obtained from DEEP-South operations.

  • PDF

Efficient Techniques to Secure User Data in the Secure OS for a Multi-user Environment (다중 사용자 환경을 위한 보안운영체제의 효율적인 사용자 자원 보호 방법)

  • Ahn, Sun-Il;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.999-1006
    • /
    • 2005
  • The Secure OS is an operating system which adds security functions to the existing operating system, in order to secure a system from sorority problems originated from inherent frailty of applications or operating systems. With the existing Secure Oses for it is difficult to set an effective security policy securing personal resources in a multi-user environment system. To solve this problem in this paper we present two Techniques to secure user data efficiently in the RBAC-based Secure OS for a multi-user environment. Firstly we utilizes object's owner information in addition to object's filename. Secondly we make use of meta symbol('$\ast$'), which is able to describe multiple access targets. In addition this paper gives some examples to show advantages from these techniques. And these features are implemented in an solaris-based Secure OS called Secusys.

SPATIALLY RESOLVED KINEMATICS OF GAS AND STARS IN HIDDEN TYPE 1 AGNS

  • Son, Donghoon;Woo, Jong-Hak;Eun, Da-In;Cho, Hojin;Karouzos, Marios;Park, Songyeon
    • Journal of The Korean Astronomical Society
    • /
    • v.53 no.5
    • /
    • pp.103-115
    • /
    • 2020
  • We analyze the spatially resolved kinematics of gas and stars for a sample of ten hidden type 1 AGNs in order to investigate the nature of their central sources and the scaling relation with host galaxy stellar velocity dispersion. We select our sample from a large number of hidden type 1 AGNs, which are identified based on the presence of a broad (full width at half maximum ≳1000 km s-1) component in the Hα line profile and which are frequently mis-classified as type 2 AGNs because AGN continuum and broad emission lines are weak or obscured in the optical spectral range. We used the Blue Channel Spectrograph at the 6.5-m Multiple Mirror Telescope to obtain long-slit data with a spatial scale of 0.3 arcsec pixel-1. We detected broad Hβ lines for only two targets; however, the presence of strong broad Hα lines indicates that the AGNs we selected are all low-luminosity type 1 AGNs. We measured the velocity, velocity dispersion, and flux of stellar continuum and gas emission lines (i.e., Hβ and [O III]) as a function of distance from the center. The spatially resolved gas kinematics traced by Hβ or [O III] are generally similar to the stellar kinematics except for the inner center, where signatures of gas outflows are detected. We compare the luminosity-weighted effective stellar velocity dispersions with the black hole masses and find that our hidden type 1 AGNs, which have relatively low back hole masses, follow the same scaling relation as reverberation-mapped type 1 AGN and more massive inactive galaxies.

Optimization Technique using Ideal Target Model and Database in SRS

  • Oh, Seung-Jong;Suh, Tae-Suk;Song, Ju-Young;Choe, Bo-Young;Lee, Hyoung-Koo
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2002.09a
    • /
    • pp.146-149
    • /
    • 2002
  • The aim of stereotactic radiosurgery(SRS) is to deliver a high dose to a target region and a low dose to critical organ through only one or a few irradiation. To satisfy this aim, optimized irradiating conditions must be searched in the planning. Thus, many mathematical methods such as gradient method, simulated annealing and genetic algorithm had been proposed to find out the conditions automatically. There were some limitations using these methods: the long calculation time, and the difficulty of unique solution due to the different shape of tumor. In this study, optimization protocol using ideal models and data base was proposed. Proposed optimization protocol constitutes two steps. First step was a preliminary work. Some possible ideal geometry shapes, such as sphere, cylinder, cone shape or the combination, were assumed to approximate the real tumor shapes. Optimum variables such as isocenter position or collimator size, were determined so that the high dose region could be shaped to fit ideal models with the arrangement of multiple isocenter. Data base were formed with those results. Second, any shaped real targets were approximated to these models using geometry comparison. Then, optimum variables for ideal geometry were chosen from the data base predetermined, and final parameters were obtained by adjusting these data. Although the results of applying the data base to patients were not superior to the result of optimization in each case, it can be acceptable as a starting point of plan.

  • PDF