• Title/Summary/Keyword: one-to-one computing

Search Result 2,208, Processing Time 0.027 seconds

Analysis of H3K4me3-ChIP-Seq and RNA-Seq data to understand the putative role of miRNAs and their target genes in breast cancer cell lines

  • Kotipalli, Aneesh;Banerjee, Ruma;Kasibhatla, Sunitha Manjari;Joshi, Rajendra
    • Genomics & Informatics
    • /
    • v.19 no.2
    • /
    • pp.17.1-17.13
    • /
    • 2021
  • Breast cancer is one of the leading causes of cancer in women all over the world and accounts for ~25% of newly observed cancers in women. Epigenetic modifications influence differential expression of genes through non-coding RNA and play a crucial role in cancer regulation. In the present study, epigenetic regulation of gene expression by in-silico analysis of histone modifications using chromatin immunoprecipitation sequencing (ChIP-Seq) has been carried out. Histone modification data of H3K4me3 from one normal-like and four breast cancer cell lines were used to predict miRNA expression at the promoter level. Predicted miRNA promoters (based on ChIP-Seq) were used as a probe to identify gene targets. Five triple-negative breast cancer (TNBC)-specific miRNAs (miR153-1, miR4767, miR4487, miR6720, and miR-LET7I) were identified and corresponding 13 gene targets were predicted. Eight miRNA promoter peaks were predicted to be differentially expressed in at least three breast cancer cell lines (miR4512, miR6791, miR330, miR3180-3, miR6080, miR5787, miR6733, and miR3613). A total of 44 gene targets were identified based on the 3'-untranslated regions of downregulated mRNA genes that contain putative binding targets to these eight miRNAs. These include 17 and 15 genes in luminal-A type and TNBC respectively, that have been reported to be associated with breast cancer regulation. Of the remaining 12 genes, seven (A4GALT, C2ORF74, HRCT1, ZC4H2, ZNF512, ZNF655, and ZNF608) show similar relative expression profiles in large patient samples and other breast cancer cell lines thereby giving insight into predicted role of H3K4me3 mediated gene regulation via the miRNA-mRNA axis.

Analysis of K-Defense Cloud Computing Service Availability Considering of Cloud Computing Traffic Growth (클라우드 컴퓨팅 트래픽 증가를 고려한 국방 클라우드 컴퓨팅 서비스 가용성 분석)

  • Lee, Sung-Tae;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.93-100
    • /
    • 2013
  • In 2012, According to 'Cisco Global Cloud Index 2011-2016', the Cisco company forecasted that global data center traffic will nearly quadruple and cloud traffic will nearly sextuple by 2016. Such a rapid growing of traffic is caused by traffic inside the data center and cloud computing workloads. In 2010, the Ministry of National Defense decided to build a Mega Center including the cloud computing technology by 2014, as part of the '2012 Information Service Plan', which is now underway. One of the factors to consider is cloud computing traffic to build a Mega Center. Since the K-defense cloud computing system is built, K-defense cloud computing traffic will increase steadily. This paper, analyzed the availability of K-defense cloud computing service with the K-defense cloud computing traffic increasing using K-Defense cloud computing test system and CloudAnalyst simulation tool. Created 3 scenarios and Simulated with these scenarios, the results are derived that the availability of K-defense cloud computing test system is fulfilled, even cloud workloads are increased as muh as forecasted cloud traffic growth from now until 2016.

A Study on Integrated Binding Service Strategy Based on Name/property in Wide-Area Object Computing Environments (광역 객체 컴퓨팅 환경에서 이름/속성기반의 통합 바이딩 서비스 방안)

  • Jeong, Chang-Won;Oh, Sung-Kwun;Joo, Su-Chong
    • The KIPS Transactions:PartA
    • /
    • v.9A no.2
    • /
    • pp.241-248
    • /
    • 2002
  • With the structure of tilde-area computing system which Is specified by a researching team in Vrije University, Netherlands, lots of researchers and developers have been progressing the studies of global location and interconnection services of distributed objects existing in global sites. Most of them halve focused on binding services of only non-duplicated computational objects existing wide-area computing sites without any consideration of duplication problems. But all of objects existing on the earth rave the duplicated characteristics according to how to categorize their own names or properties. These objects with the same property can define as duplicated computational objects. Up to now, the existing naming or trading mechanism has not supported the binding services of duplicated objects, because of deficiency of independent location service. For this reason, we suggest a new model that can not only manages locations of duplicated objects In wide-area computing environments, but also provide minimum binding time by considering both the optimal selection of one of duplicated objects and load balance among distributed systems. Our model is functionally divided into 2 parts, one part to obtain an unique object handle of duplicated objects with same property as a naming and trading service, and the other to search one or more contact addresses by a node manager using a liven object handle, as a location service For location transparency, these services are independently executing each other. Based on our model, we described structure of wide-area integrated tree and algorithms for searching and updating contact address of distributed object on this tree. finally, we showed a federation structure that can globally bind distributed objects located on different regions from an arbitrary client object.

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

A Parallel Bulk Loading Method for $B^+$-Tree Using CUDA (CUDA를 활용한 병렬 $B^+$-트리 벌크로드 기법)

  • Sung, Joo-Ho;Lee, Yoon-Woo;Han, A;Choi, Won-Ik;Kwon, Dong-Seop
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.707-711
    • /
    • 2010
  • Most relational database systems provide $B^+$-trees as their main index structures, and use bulk-loading techniques for creating new $B^+$-trees on existing data from scratch. Although bulk loadings are more effective than inserting keys one by one, they are still time-consuming because they have to sort all the keys from large data. To improve the performance of bulk loadings, this paper proposes an efficient parallel bulk loading method for $B^+$-trees based on CUDA, which is a parallel computing architecture developed by NVIDIA to utilize computing powers of graphic processor units for general purpose computing. Experimental results show that the proposed method enhance the performance more than 70 percents compared to existing bulk loading methods.

A Study of Factors Affecting the Performance of Collaborative Cloud SaaS Services (과업특성 및 기술특성이 클라우드 SaaS를 통한 협업 성과에 미치는 영향에 관한 연구)

  • Shim, Sujin
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.253-273
    • /
    • 2015
  • Cloud computing is provided on demand service via the internet, allowing users to pay for the service they actually use. Categorized as one kind of cloud computing, SaaS is computing resource and software sharing model with can be accessed via the internet. Based on virtualization technology, SaaS is expected to improve the efficiency and quality of the IT service level and performance in company. Therefore this research limited cloud services to SaaS especially focused on collaborative application service, and attempts to identify the factors which impact the performance of collaboration and intention to use. This study adopts technological factors of cloud SaaS services and factors of task characteristics to explore the determinants of collaborative performance and intention to use. An experimental study using student subjects with Google Apps provided empirical validation for our proposed model. Based on 337 data collected from respondents, the major findings are following. First, the characteristics of cloud computing services such as collaboration support, service reliability, and ease of use have positive effects on perceived usefulness of collaborative application while accessability, service reliability, and ease to use have positive effects on intention to use. Second, task interdependence has a positive effects on collaborative performance while task ambiguity factor has not. Third, perceived usefulness of collaborative application have positive effects on intention to use.

Study of Real-time Monitoring System Applicable to Heterogeneous Cloud Service Brokerage (이종 Cloud Service Brokerage에 적용 가능한 실시간 모니터링 시스템 연구)

  • Kim, Baul;Jo, Cheolyong;O, Donghwi;Kim, Myungjin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.637-640
    • /
    • 2017
  • 최근 클라우드 기술이 확산되면서 여러 기업이 자신만의 클라우드를 다양하게 제공하고 있으며 세계 각지에 흩어져 있는 다양한 클라우드 공급자들과 여러 프라이빗 클라우드를 연결하여 하나의 서비스를 제공하는 클라우드 서비스 브로커리지(Cloud Services Brokerage) 기술이 등장하게 되었다. 하지만 현재의 CSB 기술은 가상 자원 관리, 가상 머신 라이프 사이클 관리에 초점이 맞추어져 있으며 CSB에서 제공되는 모니터링 요소는 사용자의 복잡한 요구를 만족하기에는 부족한 실정이다. 또한 추가 모니터링 도구를 사용하는 경우도 CSB의 데이터와의 일관성을 만족하지 않는 문제가 있다. 따라서 본 논문에서는 이종 CSB와 연동이 가능한 실시간 모니터링 시스템을 제안한다. 본 논문에서 제안하는 모니터링 기술은 Scalr 및 CompatibleOne을 사용하여 주기적으로 메타데이터 동기화를 진행하며 데이터 일관성을 충족시키고 다양한 모니터링 데이터를 실시간으로 수집하여 사용자에게 제공한다.

2-Phase Dynamic Location Management Based on the Mobility of the Terminals

  • Park, Sang-Joon;Lee, Jong-Chan;Han, Jung-Ahn;Cho, In-Sook;Kim, Byung-Gi
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1590-1593
    • /
    • 2002
  • We propose a dynamic location management scheme and named it Virtual Dynamic Location Area(VDLA) scheme. It allocates LA on the basis of terminal mobility, VDLA consists of two phases: VLA allocation and final LA selection phases. In the first phase it allocates primary and secondary VLAs to the terminal. In the second phase the terminal selects one of them using LA selection criterion. Cost analysis of the proposed scheme is peformed and its location management cost is compared with those of FLA and DBLA.

  • PDF

A Study on the Risk Index Model of Work Type in Architectural Construction Work (건축공사 공종별 위험지수 산정모델에 관한 연구)

  • Chang, Seong-Rok;Go, Seong-Seok;Lee, Jong-Bin
    • Journal of the Korean Society of Safety
    • /
    • v.22 no.6
    • /
    • pp.63-68
    • /
    • 2007
  • The purpose of this study is to verify the relation between the risk index using AHP(Analytic Hierarchy Process) and the risk index using Computing Model. For doing the objective, this research classified 22 work types in architectural construction work from the analysis Korean architectural standard specification and Korea occupational safety & health agency code. Based on the classified 22 work types in architectural construction work, the risk index of each work type was calculated by AHP and Computing Model. For verifying the correlation of risk index between AHP and Computing Model methods, SAS version 8.0 System, which is one of the statistics programs, was used.

Context Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 컨텍스트 접근 제어 고찰)

  • Jung Heon-Man;Lee Se-Hoon
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.175-184
    • /
    • 2006
  • In this paper, we study to two research direction about information security in ubiquitous computing environment. First, researches on context-aware access control using user's context or environment conditions based on role-based control. Second, researches on model for access control about context information in ubiquitous computing utilizing role base access control model. Two research directions are the one of the most important point technology in that embody ubiquitous environment in the actual world.

  • PDF