The IEEE 802.11 wireless standard uses the carrier sense multiple access with collision avoidance (CSMA/CA) as its MAC protocol (during the distributed coordination function period). This protocol is an adaptation of the CSMA/CD of the wired networks. CSMA/CA mechanism cannot guarantee quality of service (QoS) required by the application because orits random access method. In this study, we propose a new MAC protocol that considers different types of traffic (e.g., voice and data) and for each traffic type different priority levels are assigned. To improve the QoS of IEEE 802.11 MAC protocols over a multi-channel CSMA/CA, we have developed a new admission policy for both voice and data traffics. This protocol can be performed in direct sequence spread spectrum (DSSS) or frequency hopping spread spectrum (FHSS). For voice traffic we reserve a channel, while for data traffic the access is random using a CSMA/CA mechanism, and in this case a selective reject and push-out mechanism is added to meet the quality of service required by data traffic. To study the performance of the proposed protocol and to show the benefits of our design, a mathematical model is built based on Markov chains. The system could be represented by a Markov chain which is difficult to solve as the state-space is too large. This is due to the resource management and user mobility. Thus, we propose to build an aggregated Markov chain with a smaller state-space that allows performance measures to be computed easily. We have used stochastic comparisons of Markov chains to prove that the proposed access protocol (with selective reject and push-out mechanisms) gives less loss rates of high priority connections (data and voices) than the traditional one (without admission policy and selective reject and push-out mechanisms). We give numerical results to confirm mathematical proofs.
The decision-making by agents in games is commonly based on reinforcement learning. To improve the quality of agents, it is necessary to solve the problems of the time and state space that are required for learning. Such problems can be solved by Macro-Actions, which are defined and executed by a sequence of primitive actions. In this line of research, the learning time is reduced by cutting down the number of policy decisions by agents. Macro-Actions were originally defined as combinations of the same primitive actions. Based on studies that showed the generation of Macro-Actions by learning, Macro-Actions are now thought to consist of diverse kinds of primitive actions. However an enormous amount of learning time and state space are required to generate Macro-Actions. To resolve these issues, we can apply insights from studies on the learning of tasks through Programming by Demonstration (PbD) to generate Macro-Actions that reduce the learning time and state space. In this paper, we propose a method to define and execute Macro-Actions. Macro-Actions are learned from a human subject via PbD and a policy is learned by reinforcement learning. In an experiment, the proposed method was applied to a car simulation to verify the scalability of the proposed method. Data was collected from the driving control of a human subject, and then the Macro-Actions that are required for running a car were generated. Furthermore, the policy that is necessary for driving on a track was learned. The acquisition of Macro-Actions by PbD reduced the driving time by about 16% compared to the case in which Macro-Actions were directly defined by a human subject. In addition, the learning time was also reduced by a faster convergence of the optimum policies.
Journal of the Korea Institute of Information Security & Cryptology
/
v.29
no.2
/
pp.261-273
/
2019
Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.
To gain insight into the structure and function of repressor proteins of bacteriophages of gram-positive bacteria, repressor of temperate Staphylococcus aureus phage ${\phi}11$ was undertaken as a model system here and purified as an N-terminal histidine-tagged variant (His-CI) by affinity chromatography. A ~19 kDa protein copurified with intact His-CI (~ 30 kDa) at low level was resulted most possibly due to partial cleavage at its Ala-Gly site. At ~10 nM and higher concentrations, His-CI forms significant amount of dimers in solution. There are two repressor binding sites in ${\phi}11$ cI-cro intergenic region and binding to two sites occurs possibly by a cooperative manner. Two sites dissected by HincII digestion were designated operators $O_L$ and $O_R$, respectively. Equilibrium binding studies indicate that His-CI binds to $O_R$ with a little more strongly than $O_L$ and binding species is probably dimeric in nature. Interestingly His-CI binding affinity reduces drastically at elevated temperatures ($32-42^{\circ}C$). Both $O_L$ and $O_R$ harbor a nearly identical inverted repeat and studies show that ${\phi}11$ repressor binds to each repeat efficiently. Additional analyses indicate that ${\phi}11$ repressor, like $\lambda$ repressor, harbors an N-terminal domain and a C-terminal domain which are separated by a hinge region. Secondary structure of ${\phi}11$ CI even nearly resembles to that of $\lambda$ phage repressor though they differ at sequence level. The putative N-terminal HTH (helix-turn-helix) motif of ${\phi}11$ repressor belongs to the HTH -XRE-family of proteins and shows significant identity to the HTH motifs of some proteins of evolutionary distant organisms but not to HTH motifs of most S. aureus phage repressors.
B3 antibody specifically binds the $Lewis^Y$-related carbohydrate antigen of many carcinomas, and it is used as a model antibody in this study. In a previous study, the Fab fragment of the antibody was fused to a 38 kDa truncated form of Pseudomonas exotoxin A, PE38, to make Fab-PE38, where PE38 is fused to the Fd fragment of the Fab domain. This parent monomer molecule, Fab-PE38, had no cysteine in the hinge region, and it could not make a disulfide bond to form a disulfide bond bridged homodimer. In this study, we constructed three different kinds of divalent Fab-toxin fusion homodimers where the toxin is fused to the light chain of Fab, $(Fab-PE38fl)_2$. In addition to the PE38 toxin fused to the light chain, these three molecules have different hinge sequences hi, h2, and h3 making Fabh1-, Fabh2-, and Fabh3-PE38fl monomers, respectively. These hinges contain only one cysteine on different positions of the hinge sequence. The disulfide bond between the hinge region of two monomers forms homodimers $(Fabh1-PE38fl)_2$, $(Fabh2-PE38fl)_2$, and $(Fabh3-PE38fl)_2$. The refolding yields of these dimers were 5-16-fold higher than a previously constructed dimer where the PE38 was fused to the Fd fragment $(Fabh2-PE38)_2$ [8]. Our data suggest that the steric repulsion between the two PE38s in $(Fabh1-PE38)_2$ during disulfide bridge formation is relieved by fusing it at the end of the light chain. The best cytotoxicity value of these dimers showed about 2.5-fold higher on an MCF7 cell line than that of the monovalent reference molecule in ng/ml scale, which is 15-fold higher in pM scale.
Saccharomyces cerevisiae KNU5377 was examined to assay the recovering capacity against heat and other stressors. Along with a particular fermentation ability that is able to produce ethanol even at high temperature such as $40^{\circ}C$ with a comparable rate to the fermentation at $33^{\circ}C$, this strain also exhibited higher viability than a reference strain owing to its own thermotolerance that conferred the survival after the severe heat shock at $60^{\circ}C$ for 30 minutes. Furthermore, this strain showed outstanding tolerances against $H_2O_2$, ethanol and some chemical compounds. But, especially due to the thermotolerance, this strain has been suspected of other species of yeast. However, ITS (internally transcribed spacer) 1 and 2 sequencing data confirmed this strain was a typical strain of S. cerevisiae. The outstanding tolerances to various environmental stressors Indicate this S. cerevisiae KNU5377 is enough to use both as an on-site potential strain for world-wide alcohol fermentation industry and as a model strain for researches into the routes to acquire the tolerance to various stressors.
Kim, Dong-Hwan;Nguyen, Tuyen Van;Heo, Muyoung;Chon, Tae-Soo
Journal of Ecology and Environment
/
v.38
no.1
/
pp.95-107
/
2015
Because an ecological community consists of diverse species that vary nonlinearly with environmental variability, its dynamics are complex and difficult to analyze. To investigate temporal variations of benthic macroinvertebrate community, we used the community data that were collected at the sampling site in Baenae Stream near Busan, Korea, which is a clean stream with minimum pollution, from July 2006 to July 2013. First, we used a self-organizing map (SOM) to heuristically derive the states that characterizes the biotic condition of the benthic macroinvertebrate communities in forms of time series data. Next, we applied the hidden Markov model (HMM) to fine-tune the states objectively and to obtain the transition probabilities between the states and the emission probabilities that show the connection of the states with observable events such as the number of species, the diversity measured by Shannon entropy, and the biological water quality index (BMWP). While the number of species apparently addressed the state of the community, the diversity reflected the state changes after the HMM training along with seasonal variations in cyclic manners. The BMWP showed clear characterization of events that correspond to the different states based on the emission probabilities. The environmental factors such as temperature and precipitation also indicated the seasonal and cyclic changes according to the HMM. Though the usage of the HMM alone can guarantee the convergence of the training or the precision of the derived states based on field data in this study, the derivation of the states by the SOM that followed the fine-tuning by the HMM well elucidated the states of the community and could serve as an alternative reference system to reveal the ecological structures in stream communities.
This paper presents a procedure for designing command to maneuver flexible structure with very little residual vibration, even in the presence of modeling errors. For the open loop maneuver, the various shaped profiles using multiple step inputs delayed in time are considered for robustness and compared with the responses of rigid body and flexible body in virtue of simulations and experiments. Input shaping generates vibration-reducing shaped commands through convolution of an impulse sequence with the desired command. A flexible model with a cylindrical hub and four symmetric appendages is considered to examine the responses to real plant, and to illustrate the effectiveness of the proposed shapers. The appendages are long and flexible, leading to low frequency vibration under any control action. It is shown by a series of simulation that a properly designed feedback controller with input shaper performs well, as compared with open loop controller with input shaper. The control objective is to achieve a fast settling time of residual vibration to flexible structure and robustness (insensitivity)to plant uncertainty, to eliminate residual vibration.
International Journal of Fluid Machinery and Systems
/
v.10
no.2
/
pp.119-137
/
2017
Although the stall stagnation phenomena have often been experienced in site and also analytically in numerical experiments in surges in systems of compressors and flow paths, the fundamental causes have not been identified yet. In order to clarify the situations, behaviours of infinitesimal disturbance waves superposed on a main flow were studied in a simplified one-dimensional flow model. A ratio of the amplifying rate of the system instability to the characteristic slope of the compressor element was surveyed as the instability enhancement factor. Numerical calculations have shown the following tendency of the factor. In the situation where both the sectional area ratio and the length ratio of the delivery flow-path to the suction duct are sufficiently large, the enhancement factors are greater in magnitude, which means occurrence of ordinary deep surges. However, in the situation where the area ratio and/or the length ratio is relatively smaller, the enhancement factor tends to lessen significantly, which situation tends to suppress deep surges for the same value of the characteristic slope. It could result in the stall stagnation condition. In the domain of area ratio vs. length ratio of the delivery duct to the suction duct, contour-lines of the enhancement factor behave qualitatively similar to those of the stall stagnation boundaries of a fan analytically obtained, suggesting that a certain range of the enhancement factor values could specify the stagnation occurrence. The significant decreases in the factors are observed to accompany appearances of phase lags and travelling waves in the wave motions, which macroscopically suggests breaking down of the complete surge actions of filling and emptying of the air in the delivery duct. The strength of the action is deeply related with acoustic interferences and is evaluated in terms of the volume-modified reduced resonance frequency proposed by the author. These observations have shown the fundamental cause and the sequence of the stall stagnation in principle.
The present study investigated how the kinematics of the /a/-to-/i/ tongue movement in Korean would be influenced by prosodic boundary. The /a/-to-/i/ sequence was used as 'transboundary' test materials which occurred across a prosodic boundary as in /ilnjəʃ$^h$a/ # / minsakwae/ ('일년차#민사과에' 'the first year worker' # 'dept. of civil affairs'). It also tested whether the V-to-V tongue movement would be further influenced by its syllable structure with /m/ which was placed either in the coda condition (/am#i/) or in the onset condition (/a#mi). Results of an EMA (Electromagnetic Articulagraphy) study showed that kinematical parameters such as the movement distance (displacement), the movement duration, and the movement velocity (speed) all varied as a function of the boundary strength, showing an articulatory strengthening pattern of a "larger, longer and faster" movement. Interestingly, however, the larger, longer and faster pattern associated with boundary marking in Korean has often been observed with stress (prominence) marking in English. It was proposed that language-specific prosodic systems induce different ways in which phonetics and prosody interact: Korean, as a language without lexical stress and pitch accent, has more degree of freedom to express prosodic strengthening, while languages such as English have constraints, so that some strengthening patterns are reserved for lexical stress. The V-to-V tongue movement was also found to be influenced by the intervening consonant /m/'s syllable affiliation, showing a more preboundary lengthening of the tongue movement when /m/ was part of the preboundary syllable (/am#i/). The results, together, show that the fine-grained phonetic details do not simply arise as low-level physical phenomena, but reflect higher-level linguistic structures, such as syllable and prosodic structures. It was also discussed how the boundary-induced kinematic patterns could be accounted for in terms of the task dynamic model and the theory of the prosodic gesture ($\pi$-gesture).
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.