• Title/Summary/Keyword: transmission tree

Search Result 244, Processing Time 0.021 seconds

Comparing Two Mycobacterium tuberculosis Genomes from Chinese Immigrants with Native Genomes Using Mauve Alignments

  • Ryoo, Sungweon;Lee, Jeongsoo;Oh, Jee Youn;Kim, Byeong Ki;Kim, Young;Kim, Je Hyeong;Shin, Chol;Lee, Seung Heon
    • Tuberculosis and Respiratory Diseases
    • /
    • v.81 no.3
    • /
    • pp.216-221
    • /
    • 2018
  • Background: The number of immigrants with tuberculosis (TB) increases each year in South Korea. Determining the transmission dynamics based on whole genome sequencing (WGS) to cluster the strains has been challenging. Methods: WGS, annotation refinement, and orthology assignment for the GenBank accession number acquisition were performed on two clinical isolates from Chinese immigrants. In addition, the genomes of the two isolates were compared with the genomes of Mycobacterium tuberculosis isolates, from two native Korean and five native Chinese individuals using a phylogenetic topology tree based on the Multiple Alignment of Conserved Genomic Sequence with Rearrangements (Mauve) package. Results: The newly assigned accession numbers for two clinical isolates were CP020381.2 (a Korean-Chinese from Yanbian Province) and CP022014.1 (a Chinese from Shandong Province), respectively. Mauve alignment classified all nine TB isolates into a discriminative collinear set with matched regions. The phylogenetic analysis revealed a rooted phylogenetic tree grouping the nine strains into two lineages: strains from Chinese individuals and strains from Korean individuals. Conclusion: Phylogenetic trees based on the Mauve alignments were supposed to be useful in revealing the dynamics of TB transmission from immigrants in South Korea, which can provide valuable information for scaling up the TB screening policy for immigrants.

Construction of a Adaptive Domain Profile Parser in the SCA (SCA에서 적응형 도메인 프로파일 파서의 구축 방법)

  • Bae, Myung-Nam;Lee, Byung-Bog;Park, Ae-Soon;Lee, In-Hwan;Kim, Nae-Soo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.103-111
    • /
    • 2009
  • In SCA, the core framework must include the domain parser to parse the domain profile and thus reconstructs the platform on the time including the starting of the platform, the initialization of the new radio, and etc. The domain profile is described in XML and it includes the characteristics about the software component or the hardware device in a platform. Elementarily, the core framework has to have within the domain profile parser in order to parse the domain profile. In this paper, in order to apply to the limited environment like the mobile terminal, we propose the method for reducing the size of the domain profile parser and for strengthening the independency of the XML parser vendor to have with the domain profile parser. Therefore, domain profile parser can be solve the problem like the overhead about the DOM tree creation due to the repetitive parsing of the domain profile, the compatibility degradation by the specific XML parser vender, the dependency about the domain profile technique, and etc.

Representation of Three-dimensional Polygonal Mesh Models Using Hierarchical Partitioning and View dependent Progressive Transmission (계층적 분할을 이용한 삼차원 다각형 메쉬 모델의 표현 및 인간 시점에 따른 점진적 전송 방법)

  • 김성열;호요성
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.132-140
    • /
    • 2003
  • In this paper, we propose a new scheme for view-dependent transmission of three-dimensional (3-D) polygonal mesh models with hierarchial partitioning. In order to make a view-dependent representation of 3-D mesh models, we combine sequential and progressive mesh transmission techniques. By setting higher priorities to visible parts than invisible parts, we can obtain good qualify of 3-D models in a limited transmission bandwidth. In this paper, we use a multi -layer representation of 3-D mesh models based on hierarchical partitioning. After representing the 3-D mesh model in a hierarchical tree, we determine resolutions of partitioned submeshes in the last level. Then, we send 3-D model data by view-dependent selection using mesh merging and mesh splitting operations. By the partitioned mesh merging operation, we can reduce the joint boundary information coded redundantly in the partitioned submeshes. We may transmit additional mesh information adaptively through the mesh spritting operation.

A Numerical Study of Flame Spread of A Surface Forest Fire (지표화 산불의 화염전파 수치해석)

  • Kim, Dong-Hyun;Lee, Myung-Bo;Kim, Kwang-Il
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.03b
    • /
    • pp.80-83
    • /
    • 2008
  • The characteristics of the spread of a forest fire are generally related to the attributes of combustibles, geographical features, and meteorological conditions, such as wind conditions. The most common methodology used to create a prediction model for the spread of forest fires, based on the numerical analysis of the development stages of a forest fire, is an analysis of heat energy transmission by the stage of heat transmission. When a forest fire breaks out, the analysis of the transmission velocity of heat energy is quantifiable by the spread velocity of flame movement through a physical and chemical analysis at every stage of the fire development from flame production and heat transmission to its termination. In this study, the formula used for the 1-dimensional surface forest fire behavior prediction model, derived from a numerical analysis of the surface flame spread rate of solid combustibles, is introduced. The formula for the 1-dimensional surface forest fire behavior prediction model is the estimated equation of the flame spread velocity, depending on the condition of wind velocity on the ground. Experimental and theoretical equations on flame duration, flame height, flame temperature, ignition temperature of surface fuels, etc., has been applied to the device of this formula. As a result of a comparison between the ROS(rate of spread) from this formula and ROSs from various equations of other models or experimental values, a trend suggesting an increasing curved line of the exponent function under 3m/s or less wind velocity condition was identified. As a result of a comparison between experimental values and numerically analyzed values for fallen pine tree leaves, the flame spread velocity reveals has a error of less than 20%.

  • PDF

A MAC Scheme for Multimedia Services over ATM-based PON (ATM 기반 PON에서 멀티미디어 서비스를 제공하기 위한 매체 접근 제어방식)

  • 고예윤;조규섭
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.4 no.1
    • /
    • pp.9-14
    • /
    • 2003
  • APON, the subscriber network using bus or tree topology, requires MAC protocol, because it shares the uplink channel for many subscribers to transmit data to OLT. Although various MAC schemes, which consider each QoS characteristics of traffic are proposed considering transmission characteristics of ATM traffic class, existing schemes reduce the network efficiency by increasing transmission overhead in frame. In this paper, we propose new MAC scheme, which shows similar performance as those of existing schemes but does not increase transmission overhead. To prevent increasing transmission overhead, the proposed scheme encodes the information about each cell information of traffic of the local queue in RAU transmitted periodically from ONU to OLT Thus, the proposed MAC scheme shows similar performance as those of existing ones and increases efficiency of entire network.

  • PDF

Classification Tree Analysis to Assess Contributing Factors Influencing Biosecurity Level on Farrow-to-Finish Pig Farms in Korea (분류 트리 기법을 이용한 국내 일괄사육 양돈장의 차단방역 수준에 영향을 미치는 기여 요인 평가)

  • Kim, Kyu-Wook;Pak, Son-Il
    • Journal of Veterinary Clinics
    • /
    • v.33 no.2
    • /
    • pp.107-112
    • /
    • 2016
  • The objective of this study was to determine potential contributing factors associated with biosecurity level of farrow-to-finish pig farms and to develop a classification tree model to explore how these factors related to each other based on prediction model. To this end, the author analyzed data (n = 193) extracted from a cross-sectional study of 344 farrow-to-finish farms which was conducted between March and September 2014 aimed to explore swine disease status at farm level. Standardized questionnaires with information about basic demographical data and management practices were collected in each farm by on-site visit of trained veterinarians. For the classification of the data sets regarding biosecurity level as a dependent variable and predictor variables, Chi-squared Automatic Interaction Detection (CHAID) algorithm was applied for modeling classification tree. The statistics of misclassification risk was used to evaluate the fitness of the model in terms of prediction results. Categorical multivariate input data (40 variables) was used to construct a classification tree, and the target variable was biosecurity level dichotomized into low versus high. In general, the level of biosecurity was lower in the majority of farms studied, mainly due to the limited implementation of on-farm basic biosecurity measures aimed at controlling the potential introduction and transmission of swine diseases. The CHAID model illustrated the relative importance of significant predictors in explaining the level of biosecurity; maintenance of medical records of treatment and vaccination, use of dedicated clothing to enter the farm, installing fence surrounding the farm perimeter, and periodic monitoring of the herd using written biosecurity plan in place. The misclassification risk estimate of the prediction model was 0.145 with the standard error of 0.025, indicating that 85.5% of the cases could be classified correctly by using the decision rule based on the current tree. Although CHAID approach could provide detailed information and insight about interactions among factors associated with biosecurity level, further evaluation of potential bias intervened in the course of data collection should be included in future studies. In addition, there is still need to validate findings through the external dataset with larger sample size to improve the external validity of the current model.

HLPSP: A Hybrid Live P2P Streaming Protocol

  • Hammami, Chourouk;Jemili, Imen;Gazdar, Achraf;Belghith, Abdelfettah;Mosbah, Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1035-1056
    • /
    • 2015
  • The efficiency of live Peer-to-Peer (P2P) streaming protocols depends on the appropriateness and the management abilities of their underlying overlay multicast. While a tree overlay structure confines transmission delays efficiently by maintaining deterministic delivery paths, an overlay mesh structure provides adequate resiliency to peers dynamics and easy maintenance. On the other hand, content freshness, playback fluidity and streaming continuity are still challenging issues that require viable solutions. In this paper, we propose a Hybrid Live P2P Streaming Protocol (HLPSP) based on a hybrid overlay multicast that integrates the efficiency of both the tree and mesh structures. Extensive simulations using OMNET++ are conducted to investigate the efficiency of HLPSP in terms of relevant performance metrics, and position HLPSP with respect to DenaCast the enhanced version of the well-known CoolStreaming protocol. Simulation results show that HLPSP outperforms DenaCast in terms of startup delay, end-to-end delay, play-back delay and data loss.

TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications

  • Seo, Seog Chung;Youn, Taek-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2922-2945
    • /
    • 2018
  • Achieving efficient authentication is a crucial issue for stream data commonly seen in content delivery, peer-to-peer, and multicast/broadcast networks. Stream authentication mechanisms need to be operated efficiently at both sender-side and receiver-side at the same time because of the properties of stream data such as real-time and delay-sensitivity. Until now, many stream authentication mechanisms have been proposed, but they are not efficient enough to be used in stream applications where the efficiency for sender and receiver sides are required simultaneously since most of them could achieve one of either sender-side and receiver-side efficiency. In this paper, we propose an efficient stream authentication mechanism, so called TIM, by integrating Trapdoor Hash Function and Merkle Hash Tree. Our construction can support efficient streaming data processing at both sender-side and receiver-side at the same time differently from previously proposed other schemes. Through theoretical and experimental analysis, we show that TIM can provide enhanced performance at both sender and receiver sides compared with existing mechanisms. Furthermore, TIM provides an important feature for streaming authentication, the resilience against transmission loss, since each data block can be verified with authentication information contained in itself.

MRCT: An Efficient Tag Identification Protocol in RFID Systems with Capture Effect

  • Choi, Sunwoong;Choi, Jaehyuk;Yoo, Joon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1624-1637
    • /
    • 2013
  • In RFID systems, one important issue is how to effectively address tag collision, which occurs when multiple tags reply simultaneously to a reader, so that all the tags are correctly identified. However, most existing anti-collision protocols assume isotropic collisions where a reader cannot detect any of the tags from the collided signals. In practice, this assumption turns out to be too pessimistic since the capture effect may take place, in which the reader considers the strongest signal as a successful transmission and the others as interference. In this case, the reader disregards the other collided tags, and in turn, fails to read the tag(s) with weaker signal(s). In this paper, we propose a capture effect-aware anti-collision protocol, called Multi-Round Collision Tree (MRCT) protocol, which efficiently identifies the tags in real RFID environments. MRCT deals with the capture effect as well as channel error by employing a multi-round based identification algorithm. We also analyze the performance of MRCT in terms of the number of slots required for identifying all tags. The simulation results show that MRCT significantly outperforms the existing protocol especially in a practical environment where the capture effect occurs.

Orthogonally multiplexed wavelet packet modulation and demodulation techniques (직교 다중화 Wavelet packet 변복조 기법)

  • 박대철;박태성
    • Journal of Broadcast Engineering
    • /
    • v.4 no.1
    • /
    • pp.1-11
    • /
    • 1999
  • This paper introduces orthogonally multiplexed modulation and demodulation methods based on Wavelet Packet Bases and particularly describes Wavelet Packet Modulation (WPM) techniques that provide the designer of transmission signal set in time-frequency domain with tree structural information which can be adapted to given channel characterristics. Multi-dimensional signaling methods are also contrasted to common and different characteristics of conventional QAM. multi-tone modulation methods. The paper addresses the mothod how to find a best tree structure that has more adaptivity to impulse and narrowband tone pulse noises using a tunning algorithm which arbitrarily partitions the time-frequency space and makes a suitable orthogonal signaling waveforms. Simulation results exhibits a favorable performance over existing mod/demod methods specially for narrowband tone pulse and impulse interferences.

  • PDF