• Title/Summary/Keyword: real-time mechanism

Search Result 1,052, Processing Time 0.03 seconds

Container Flow Management in Port Logistics Based on BPM Framework

  • Nisafani, Amna Shifia;Park, Jaehun;Bae, Hyerim;Yahya, Bernardo Nugroho
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.1-10
    • /
    • 2012
  • To promote process effectiveness and efficiency, it is necessary that port logistics employ automated equipments for handling containers. There exists a system for automatically managing the container flow, called Control Module. However, it has limitation to assign the execution order to the machine and monitor the container flow in real time process. Business process management (BPM) provides a suitable and effective framework to address this problem including controlling and monitoring the flow of each container. Since the nature of container handling process is different with the common process in BPM that is conducted by human performer, it is necessary to adjust the BPM framework in the domain of port logistic management. This study presents a BPM framework corresponds with both human-based and machine-based activity to enhance the efficiency of port process flow including container flow. This framework is introduced as an integrated approach and mechanism of BPM application into the container handling system for the purpose of port logistics process automation.

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.239-251
    • /
    • 2018
  • In existing cloud services, information security and privacy concerns have been worried, and have become one of the major factors that hinder the popularization and promotion of cloud computing. As the cloud computing infrastructure, the security of virtual machine systems is very important. This paper presents an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted I-VMIDS, to ensure the safety of user-level applications in client virtual machines. The model extracts system call sequences of programs, abstracts them into antigens, fuses environmental information of client virtual machines into danger signals, and implements intrusion detection by immune mechanisms. The model is capable of detecting attacks on processes which are statically tampered, and is able to detect attacks on processes which are dynamically running. Therefore, the model supports high real time. During the detection process, the model introduces information monitoring mechanism to supervise intrusion detection program, which ensures the authenticity of the test data. Experimental results show that the model does not bring much spending to the virtual machine system, and achieves good detection performance. It is feasible to apply I-VMIDS to the cloud computing platform.

Design of Antenna Tracking Software for MSC(Multi-Spectral Camera) Antenna Control

  • Kim, Young-Sun;Yong, Sang-Soon;Kong, Jong-Pil;Heo, Haeng-Pal;Park, Jong-Euk;Paik, Hong-Yul
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.235-240
    • /
    • 2002
  • This paper shows the desist concept of an ATS(Antenna Tracking Software) to control the movement of the MSC(Multi-Spectral Camera) antenna. The MSC has a two-axes directional X-band antenna for image transmission to KGS(KOMSAT2 Ground Station). The main objective of the ATS is to drive the APM(Antenna Pointing Mechanism) to the required elevation and the azimuth position according to an appropriate TPF(Tracking Parameter File). The ATS is implemented as one task of the SBC(Single Board Computer) software, which uses VxWorks as a real time OS. The ATS has several operational modes such as STANDBY mode, First EL mode, First AZ mode, Normal Operation mode, and so on. The ATS uses two PI controllers fur the velocity and the position loop respectively, to satisfy the requirements specification. In order to show the feasibility of the described design concept, the various simulations and the experiments are performed under specific test configuration.

  • PDF

Identification of Differentially Expressed Genes by Exposure of Methylmercury in Neuroblastoma Cell Line Using Suppression Subtractive Hybridization (SSH)

  • Kim, Youn-Jung;Ryu, Jae-Chun
    • Molecular & Cellular Toxicology
    • /
    • v.2 no.1
    • /
    • pp.60-66
    • /
    • 2006
  • Methylmercury (MeHg), one of the heavy metal compounds, can cause severe damage to the central nervous system in humans. Many reports have shown that MeHg is poisonous to human body through contaminated foods and has released into the environment. Despite many studies on the pathogenesis of MeHg-induced central neuropathy, no useful mechanism of toxicity has been established so far. This study, using of suppression subtractive hybridization (SSH) method, was peformed to identify differentially expressed genes by MeHg in SH-SY5Y human neuroblastoma cell line. We prepared to total RNA from SH-SY5Y cells treated with solvent (DMSO) and $6.25\;{\mu}M\;(IC_{50})$ MeHg and performed forward and reverse SSH. Differentially expressed cDNA clones were screened by dot blot, sequenced and confirmed that individual clones indeed represent differentially expressed genes with real time RT-PCR. These sequences were identified by BLAST homology search to known genes or expressed sequence tags (ESTs). Analysis of these sequences may provide an insight into the biological effects of MeHg in the pathogenesis of neurodegenerative disease and a possibility to develop more efficient and exact monitoring system of heavy metals as ubiquitous environmental pollutants.

A Novel Bio-inspired Trusted Routing Protocol for Mobile Wireless Sensor Networks

  • Zhang, Mingchuan;Xu, Changqiao;Guan, Jianfeng;Zheng, Ruijuan;Wu, Qingtao;Zhang, Hongke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.74-90
    • /
    • 2014
  • Routing in mobile wireless sensor networks (MWSNs) is an extremely challenging issue due to the features of MWSNs. In this paper, we present a novel bio-inspired trusted routing protocol (B-iTRP) based on artificial immune system (AIS), ant colony optimization (ACO) and Physarum optimization (PO). For trust mechanism, B-iTRP monitors neighbors' behavior in real time and then assesses neighbors' trusts based on AIS. For routing strategy, each node proactively finds routes to the Sink based on ACO. When a backward ant is on the way to return source, it senses the energy residual and trust value of each node on the discovered route, and calculates the link trust and link energy of the route. Moreover, B-iTRP also assesses the availability of route based on PO to maintain the route table. Simulation results show how B-iTRP can achieve the effective performance compared to existing state-of-the-art algorithms.

Slotted ALOHA Based Greedy Relay Selection in Large-scale Wireless Networks

  • Ouyang, Fengchen;Ge, Jianhua;Gong, Fengkui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3945-3964
    • /
    • 2015
  • Since the decentralized structure and the blindness of a large-scale wireless network make it difficult to collect the real-time channel state or other information from random distributed relays, a fundamental question is whether it is feasible to perform the relay selection without this knowledge. In this paper, a Slotted ALOHA based Greedy Relay Selection (SAGRS) scheme is presented. The proposed scheme allows the relays satisfying the user's minimum transmission request to compete for selection by randomly accessing the channel through the slotted ALOHA protocol without the need for the information collection procedure. Moreover, a greedy selection mechanism is introduced with which a user can wait for an even better relay when a suitable one is successfully stored. The optimal access probability of a relay is determined through the utilization of the available relay region, a geographical region consisting of all the relays that satisfy the minimum transmission demand of the user. The average number of the selection slots and the failure probability of the scheme are analyzed in this paper. By simulations, the validation and the effectiveness of the SAGRS scheme are confirmed. With a balance between the selection slots and the instantaneous rate of the selected relay, the proposed scheme outperforms other random access selection schemes.

Design, Analysis and Evaluation of A New Energy Conserving MAC Protocol for Wireless Sensor Networks

  • Lim, Sangsoon;Kang, Young-Myoung;Jeong, Jiwoong;Kim, Chong-Kwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3046-3060
    • /
    • 2012
  • Low power listening (LPL) MAC protocols based on duty-cycling mechanism have been studied extensively to achieve ultra low energy consumption in wireless sensor networks (WSNs). Especially, recent ACK-based LPL schemes such as X-MAC employ strobe preambles and an early ACK, and show fair performances in communications and energy efficiencies. However, the state-of-the-art ACK-based LPL scheme still suffers from collision problems due to the protocol incompleteness. These collision effects are not trivial and make WSNs unstable, aggravate energy consumptions. In this paper, we propose two novel schemes; (i) ${\tau}$-duration CCA to mitigate the collision problem in ACK-based LPL MAC protocols. (ii) Short Preamble Counter (SPC) to conserve more energy by reducing unnecessary overhearing. We demonstrate the performance improvement of our scheme via a mathematical analysis and real-time experiments. Both analysis and experimental results confirm that our proposed scheme saves energy by up to 36% compared to the naive ACK-based LPL MAC protocol thanks to ${\tau}$-duration CCA and SPC.

A Lattice Model Study of Native Contact Restraints in Protein Folding

  • 오원석;신재민
    • Bulletin of the Korean Chemical Society
    • /
    • v.17 no.9
    • /
    • pp.808-813
    • /
    • 1996
  • To explore protein folding mechanism, we simulated a folding pathway in a simplified 3×3×3 cubic lattice. In the lattice folding Monte Carlo simulations, each of the 28 possible native packing pairs that exist in the native conformation was used as a conformational restraint. The native packing restraints in the lattice model could be considered as a disulfide linkage restraint in a real protein. The results suggest that proteins denatured with a small disulfide loop can, but not always, fold faster than proteins without any disulfide linkage and than proteins with a larger disulfide loop. The results also suggest that there is a rough correlation between loop size of the native packing restraint and folding time. That is, the order of native residue-residue packing interaction in protein folding is likely dependent on the residue-residue distance in primary sequence. The strength of monomer-monomer pairwise interaction is not important in the determination of the packing order in lattice folding. From the folding simulations of five strong folding lattice sequences, it was also found that the context encoded in the primary sequence, which we do not yet clearly understand, plays more crucial role in the determination of detailed folding kinetics. Our restrained lattice model approach would provide a useful strategy to the future protein folding experiments by suggesting a protein engineering for the fast or slow folding research.

Expressional Patterns of Adipocyte-Associated Molecules in the Rat Epididymal Fat during Postnatal Development Period

  • Lee, Ki-Ho;Kim, Nan Hee
    • Development and Reproduction
    • /
    • v.22 no.4
    • /
    • pp.351-360
    • /
    • 2018
  • The adipogenesis is a maturation process of pre-adipocyte cell into mature lipid-filled adipocyte cell. The adipogenesis begins at the late prenatal stage and continues until the early postnatal age. Because the adipogenesis and formation of adipose tissue persist during postnatal period and are precisely regulated by the action of numerous gene products, the present research was attempted to determine the expressional patterns of adipose tissue-associated genes in the rat epididymal fat pad at different postnatal ages, from 7 days to 2 years of ages, using a quantitative real-time PCR analysis. The basal expression levels of CCAAT/enhancer binding protein gamma, sterol regulatory element binding transcription factor 1, fatty acid binding protein 4, adiponectin, leptin, and resistin at the early postnatal ages were significantly lower than those at the elderly ages, even though a fluctuation of expressional levels was observed at some ages. The lowest expressional level of delta like non-canonical Notch ligand 1 was detected at 44 days and 5 months of ages. The expression of peroxisome proliferator-activated receptor gamma ($PPAR{\gamma}$) was the highest at 44 days of age, followed by a diminished expression of $PPAR{\gamma}$ at the elderly ages. These results indicate the existence of a complex regulatory mechanism(s) for expression of adipose tissueassociated genes in the rat epididymal fat during postnatal period.

Development of the Educational Micro Gas Turbine Engine Performance Test System (교육용 마이크로 가스터빈 엔진 성능 시험장치 개발)

  • Kho, Seong-Hee;Ki, Ja-Young;Park, Mi-Young;Kong, Chang-Duk;Lee, Kyung-Jae
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.11a
    • /
    • pp.31-35
    • /
    • 2008
  • This test cell is developed to provide the fundamentals of operational mechanism and structural configuration, and further to verify thermodynamic calculation with this test data to the institutes or laboratories research and study gas turbine engine for academic purpose. The test cell is installed to monitor and collect real-time data as to temperature, pressure, thrust, fuel flow, and air flow etc. using by NI DAQ(Data acquisition)device and LabVIEW program based on 30lbf-micro turbojet engine.

  • PDF