• 제목/요약/키워드: systems approach method

검색결과 3,708건 처리시간 0.036초

Examination of the Co-evolution of Galaxies and their Central SMBHs at High Redshifts with Gravitational Lensing by QSO Host Galaxies

  • Taak, Yoon Chan;Im, Myungshin;Kang, Juhyeong;Kim, Jae-Woo;Kim, Dohyeong;Kim, Yongjung
    • 천문학회보
    • /
    • 제40권1호
    • /
    • pp.79.2-79.2
    • /
    • 2015
  • The $M_{BH}-{\sigma}$ relation for galaxies is a stand-out illustration of the co-evolution of galaxies and their central supermassive black holes (SMBHs); however, how this co-evolution occurs and whether this relation holds for SMBHs of the early universe is still a matter of debate. In order to study this at higher redshifts, quasi-stellar objects (QSOs) are the best targets, due to their large sample size and effective $M_{BH}$ estimation. Nevertheless, it is difficult to examine properties of their host galaxies, simply due to the sheer brightness of the QSO itself. Here, we discuss a distinctive method in studying these QSO host galaxies, via gravitational lensing (GL). GL offers a unique approach in determining the mass of the lens object, in this case the host galaxy. QSOs from the SDSS quasar catalog were searched in the Hubble Space Telescope archives, and GL features around them were visually inspected. One such candidate is SDSS J1114-00; to increase its robustness as a GL system candidate, it was observed with the Inamori-Magellan Areal Camera & Spectrograph (IMACS) on the Magellan Baade Telescope at Las Campanas Observatory, to check whether the GL features have identical colors, meaning they are likely to originate from the same source. After confirmation of such GL systems, a sufficiently large sample will enable us to examine the $M_{BH}-{\sigma}$ relation at various redshifts, and in turn, investigate the co-evolution of SMBHs and their host galaxies.

  • PDF

Analysis of Improved Cyclostationary Spectrum Sensing with SLC Diversity over Composite Multipath Fading-Lognormal Shadowing Channels

  • Zhu, Ying;Liu, Jia;Feng, Zhiyong;Zhang, Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.799-818
    • /
    • 2014
  • Spectrum sensing is a key technical challenge for cognitive radio (CR). It is well known that multi-cycle cyclostationarity (MC) detector is a powerful method for spectrum sensing. However, conventional MC detector is difficult to implement due to its high computational complexity. This paper pays attention to the fact that the computation complexity can be reduced by simplifying the test statistic of conventional MC detector. Based on this simplification process, an improved MC detector is proposed. Compared with the conventional one, the proposed detector has the low-computational complexity and sufficient-accuracy on sensing performance. Subsequently, the sensing performances are further investigated for the cases of Rayleigh, Nakagami-m, Rician, composite Rayleigh fading-lognormal shadowing and composite Nakagami fading-lognormal shadowing channels, respectively. Furthermore, the square-law combining (SLC) is introduced to improve the detection capability over fading-shadowing channels. The corresponding closed-form expressions of average detection probability are derived for each case by the moment generation function (MGF) approach. Finally, illustrative and analytical results show that the efficiency and reliability of proposed detector and the improvement on sensing performance by SLC over composite fading-shadowing channels.

이기종 컴퓨팅 환경에서 OpenCL을 사용한 포토모자이크 응용의 효율적인 작업부하 분배 (Efficient Workload Distribution of Photomosaic Using OpenCL into a Heterogeneous Computing Environment)

  • 김희곤;사재원;최동휘;김혜련;이성주;정용화;박대희
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제4권8호
    • /
    • pp.245-252
    • /
    • 2015
  • 최근 고성능 컴퓨팅과 모바일 컴퓨팅에서 성능가속기를 사용하는 병렬처리 방법들이 소개되어왔다. 포토모자이크 응용은 내재된 데이터 병렬성을 활용하고 성능가속기를 사용하여 병렬처리가 가능하다. 본 논문에서는 CPU와 GPU로 구성된 이기종 컴퓨팅 환경에서 포토모자이크 수행 시 작업부하 분배 방법을 제안한다. 즉, 포토모자이크 응용을 비동기 방식으로 병렬화하여 CPU와 GPU 자원을 동시에 활용하고, 각 처리기에 할당할 최적의 작업부하량을 예측하기 위해 CPU-only와 GPU-only 작업 분배 환경에서 수행시간을 측정한다. 제안 방법은 간단하지만 매우 효과적이고, CPU와 GPU로 구성된 이기종 컴퓨팅 환경에서 다른 응용을 병렬화하 데에도 적용될 수 있다. 실험 결과, 이기종 컴퓨팅 환경에서 최적의 작업 분배량으로 수행한 경우, GPU-only의 방법과 비교하여 141%의 성능이 개선되었음을 확인한다.

Topological SLAM Based on Voronoi Diagram and Extended Kalman Filter

  • Choi, Chang-Hyuk;Song, Jae-Bok;Kim, Mun-Sang;Chung, Woo-Jin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.174-179
    • /
    • 2003
  • Through the simultaneous localization and map building (SLAM) technique, a robot can create maps about its unknown environment while it continuously localizes its position. Grid maps and feature maps have been widely used for SLAM together with application of probability methods and POMDP (partially observed Markov decision process). But this approach based on grid maps suffers from enormous computational burden. Topological maps, however, have drawn more attention these days because they are compact, provide natural interfaces, and are easily applicable to path planning in comparison with grid maps. Some topological SLAM techniques like GVG (generalized Voronoi diagram) were introduced, but it enables the robot to decide only whether the current position is part of GVG branch or not in the GVG algorithm. In this paper, therefore, to overcome these problems, we present a method for updating a global topological map from the local topological maps. These local topological maps are created through a labeled Voronoi diagram algorithm from the local grid map built based on the sensor information at the current robot position. And the nodes of a local topological map can be utilized as the features of the environment because it is robust in light of visibility problem. The geometric information of the feature is applied to the extended Kalman filter and the SLAM in the indoor environment is accomplished. A series of simulations have been conducted using a two-wheeled mobile robot equipped with a laser scanner. It is shown that the proposed scheme can be applied relatively well.

  • PDF

Behavior of Poisson Bracket Mapping Equation in Studying Excitation Energy Transfer Dynamics of Cryptophyte Phycocyanin 645 Complex

  • Lee, Weon-Gyu;Kelly, Aaron;Rhee, Young-Min
    • Bulletin of the Korean Chemical Society
    • /
    • 제33권3호
    • /
    • pp.933-940
    • /
    • 2012
  • Recently, it has been shown that quantum coherence appears in energy transfers of various photosynthetic lightharvesting complexes at from cryogenic to even room temperatures. Because the photosynthetic systems are inherently complex, these findings have subsequently interested many researchers in the field of both experiment and theory. From the theoretical part, simplified dynamics or semiclassical approaches have been widely used. In these approaches, the quantum-classical Liouville equation (QCLE) is the fundamental starting point. Toward the semiclassical scheme, approximations are needed to simplify the equations of motion of various degrees of freedom. Here, we have adopted the Poisson bracket mapping equation (PBME) as an approximate form of QCLE and applied it to find the time evolution of the excitation in a photosynthetic complex from marine algae. The benefit of using PBME is its similarity to conventional Hamiltonian dynamics. Through this, we confirmed the coherent population transfer behaviors in short time domain as previously reported with a more accurate but more time-consuming iterative linearized density matrix approach. However, we find that the site populations do not behave according to the Boltzmann law in the long time limit. We also test the effect of adding spurious high frequency vibrations to the spectral density of the bath, and find that their existence does not alter the dynamics to any significant extent as long as the associated reorganization energy is changed not too drastically. This suggests that adopting classical trajectory based ensembles in semiclassical simulations should not influence the coherence dynamics in any practical manner, even though the classical trajectories often yield spurious high frequency vibrational features in the spectral density.

네트워크 분석을 이용한 애플리케이션 서비스 하위 카테고리 분류: 헬스케어 어플리케이션 중심으로 (Categorizing Sub-Categories of Mobile Application Services using Network Analysis: A Case of Healthcare Applications)

  • 하소희;금영정
    • 한국전자거래학회지
    • /
    • 제25권3호
    • /
    • pp.15-40
    • /
    • 2020
  • 모바일 애플리케이션 서비스 시장의 폭발적으로 성장함에 따라 애플리케이션 서비스를 고객과 개발자 관점에서 분류하는 것이 필요한 실정이다. 그러나 모바일 애플리케이션 서비스의 체계적 분류에 관한 연구는 제한적이다. 이에 본 연구에서는 네트워크 모듈성 분석을 통하여 모바일 애플리케이션 서비스의 분류하고 하위 카테고리를 제안하고자 한다. 구글플레이(GooglePlay)를 통해 총 1,607개의 헬스케어 관련 애플리케이션 서비스를 수집한 후 각 애플리케이션 서비스의 설명(description) 텍스트를 활용하여 유사도를 측정하고 이를 바탕으로 네트워크 분석을 수행하였다. 모듈성 분석을 수행하여 전체 네트워크의 커뮤니티를 탐지한 후, 각 클러스터를 기반으로 서비스 분류법을 도출한다. 이번 연구는 모바일 애플리케이션 서비스를 체계적으로 탐색하고자 하는 고객과 모바일 애플리케이션 서비스의 트렌드를 분석하고자 하는 개발자 모두에게 도움이 되는 서비스 분류에 대한 체계적인 접근방식이 될 것으로 기대된다.

정보보호 관점의 기업 유형 분류 프레임워크 개발에 관한 연구 (Study on Development of Framework of Company Classification in Information Security Perspective)

  • 김희올;백동현
    • 산업경영시스템학회지
    • /
    • 제39권3호
    • /
    • pp.18-29
    • /
    • 2016
  • For most organizations, a security infrastructure to protect company's core information and their technology is becoming increasingly important. So various approaches to information security have been made but many security accidents are still taking place. In fact, for many Korean companies, information security is perceived as an expense, not an asset. In order to change this perception, it is very important to recognize the need for information security and to find a rational approach for information security. The purpose of this study is to present a framework for information security strategies of companies. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. To develope measures to classify the types of companies, 12 information security professionals have done brainstorming, and based on previous studies, among the factors that have been demonstrated to be able to influence the information security of the enterprise, three factors have been selected. Delphi method was applied to 29 security experts in order to determine sub items for each factor, and then final items for evaluation was determined by verifying the content validity and reliability of the components through the SPSS analysis. Then, this study identified characteristics of each type of eight companies from a security perspective by utilizing the developed sub items, and summarized what kind of actual security accidents happened in the past.

Panax ginseng-derived fraction BIOGF1K reduces atopic dermatitis responses via suppression of mitogen-activated protein kinase signaling pathway

  • Lorz, Laura Rojas;Kim, Donghyun;Kim, Mi-Yeon;Cho, Jae Youl
    • Journal of Ginseng Research
    • /
    • 제44권3호
    • /
    • pp.453-460
    • /
    • 2020
  • Background: BIOGF1K, a fraction of Panax ginseng, has desirable antimelanogenic, anti-inflammatory, and antiphotoaging properties that could be useful for treating skin conditions. Because its potential positive effects on allergic reactions in skin have not yet been described in detail, this study's main objective was to determine its efficacy in the treatment of atopic dermatitis (AD). Methods: High-performance liquid chromatography was used to verify the compounds in BIOGF1K, and we used the (3-4-5-dimethylthiazol-2-yl)-2-5-diphenyltetrazolium bromide method to determine its cytotoxicity in RBL-2H3 and HMC-1 cell lines. RBL-2H3 cells were induced using both anti-DNP-IgE/DNP-BSA and calcium ionophore (A2187) treatments, whereas HMC-1 cells were induced using A2187 alone. To measure mast cell degranulation, we performed histamine (enzyme-linked immunosorbent assay) and β-hexosaminidase assays. To quantify interleukin (IL)-4, IL-5, and IL-13 levels in RBL-2H3 cells, we performed quantitative polymerase chain reaction (PCR); to quantify expression levels of IL-4 and IL-13 in HMC-1 cells, we used semiquantitative reverse transcription polymerase chain reaction (RT-PCR). Finally, we detected the total and phosphorylated forms of extracellular signal-regulated kinase, p-38, and c-Jun N-terminal kinase proteins by immunoblotting. Results: BIOGF1K decreased the AD response by reducing both histamine and β-hexosaminidase release as well as reducing the secretion levels of IL-4, IL-5, and IL-13 in RBL-2H3 cells and IL-4 and IL-13 in HMC-1 cells. In addition, BIOGF1K decreased MAPK pathway activation in RBL-2H3 and HMC-1 cells. Conclusions: BIOGF1K attenuated the AD response, hence supporting its use as a promising and natural approach for treating AD.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권6호
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Aeroelastic-aerodynamic analysis and bio-inspired flow sensor design for boundary layer velocity profiles of wind turbine blades with active external flaps

  • Sun, Xiao;Tao, Junliang;Li, Jiale;Dai, Qingli;Yu, Xiong
    • Smart Structures and Systems
    • /
    • 제20권3호
    • /
    • pp.311-328
    • /
    • 2017
  • The characteristics of boundary layers have significant effects on the aerodynamic forces and vibration of the wind turbine blade. The incorporation of active trailing edge flaps (ATEF) into wind turbine blades has been proven as an effective control approach for alleviation of load and vibration. This paper is aimed at investigating the effects of external trailing edge flaps on the flow pattern and velocity distribution within a boundary layer of a NREL 5MW reference wind turbine, as well as designing a new type of velocity sensors for future validation measurements. An aeroelastic-aerodynamic simulation with FAST-AeroDyn code was conducted on the entire wind turbine structure and the modifications were made on turbine blade sections with ATEF. The results of aeroelastic-aerodynamic simulations were combined with the results of two-dimensional computational fluid dynamic simulations. From these, the velocity profile of the boundary layer as well as the thickness variation with time under the influence of a simplified load case was calculated for four different blade-flap combinations (without flap, with $-5^{\circ}$, $0^{\circ}$, and $+5^{\circ}$ flap). In conjunction with the computational modeling of the characteristics of boundary layers, a bio-inspired hair flow sensor was designed for sensing the boundary flow field surrounding the turbine blades, which ultimately aims to provide real time data to design the control scheme of the flap structure. The sensor element design and performance were analyzed using both theoretical model and finite element method. A prototype sensor element with desired bio-mimicry responses was fabricated and validated, which will be further refined for integration with the turbine blade structures.