• Title, Summary, Keyword: Address translation

Search Result 113, Processing Time 0.151 seconds

Semantic Representation and Translation of Electronic Product Code(EPC) data in EPC Network (EPC 네트워크의 전자물품코드(EPC) 데이터 의미표현과 해석)

  • Park, Dae-Won;Kwon, Hyuk-Chul
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.1
    • /
    • pp.70-81
    • /
    • 2009
  • Ontology is an explicit specification of concepts and relationships between concepts in an interest domain. As considered as one of typical knowledge representation methods, ontology is applied to various studies such as information extraction, information integration, information sharing, or knowledge management. In IT based industries, ontology is applied to research on information integration and sharing in order to enhance interoperability between enterprises. In supply chains or logistics, several enterprises participate as business partners to plan movements of goods, and control goods and logistics flows. A number of researches on information integration and sharing for the effective and efficient management of logistics or supply chains have been addressed. In this paper, we address an ontology as a knowledge-base for semantic-based integration of logistics information distributed in the logistics flow. Especially, we focus on developing an ontology that enables to represent and translate semantic meaning of EPC data in the EPC Network applied logistics. We present a scenario for tracing products in logistics in order to show the value of our ontology.

Crystal Structure of Histidine Triad Nucleotide-Binding Protein from the Pathogenic Fungus Candida albicans

  • Jung, Ahjin;Yun, Ji-Sook;Kim, Shinae;Kim, Sang Ryong;Shin, Minsang;Cho, Dong Hyung;Choi, Kwang Shik;Chang, Jeong Ho
    • Molecules and Cells
    • /
    • v.42 no.1
    • /
    • pp.56-66
    • /
    • 2019
  • Histidine triad nucleotide-binding protein (HINT) is a member of the histidine triad (HIT) superfamily, which has hydrolase activity owing to a histidine triad motif. The HIT superfamily can be divided to five classes with functions in galactose metabolism, DNA repair, and tumor suppression. HINTs are highly conserved from archaea to humans and function as tumor suppressors, translation regulators, and neuropathy inhibitors. Although the structures of HINT proteins from various species have been reported, limited structural information is available for fungal species. Here, to elucidate the structural features and functional diversity of HINTs, we determined the crystal structure of HINT from the pathogenic fungus Candida albicans (CaHINT) in complex with zinc ions at a resolution of $2.5{\AA}$. Based on structural comparisons, the monomer of CaHINT overlaid best with HINT protein from the protozoal species Leishmania major. Additionally, structural comparisons with human HINT revealed an additional helix at the C-terminus of CaHINT. Interestingly, the extended C-terminal helix interacted with the N-terminal loop (${\alpha}1-{\beta}1$) and with the ${\alpha}3$ helix, which appeared to stabilize the dimerization of CaHINT. In the C-terminal region, structural and sequence comparisons showed strong relationships among 19 diverse species from archea to humans, suggesting early separation in the course of evolution. Further studies are required to address the functional significance of variations in the C-terminal region. This structural analysis of CaHINT provided important insights into the molecular aspects of evolution within the HIT superfamily.

A NAT Proxy Server for an Internet Telephony Service (인터넷 전화 서비스를 위한 NAT 프럭시 서버)

  • 손주영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.47-59
    • /
    • 2003
  • The Internet telephony service is one of the commercially successful Internet application services. VoIP technology makes the service come true. VoIP deploys H.323 or SIP as the standard protocol for the distributed multimedia services over the Internet in which QoS is not guaranteed. VoIP carries the packetized voice over the RTP/UDP/IP protocol stack. The data transmission trouble is caused by UDP when the service is provided in private networks and some ISP-provided Internet access networks in the private address space. The Internet telephony users in such networks cannot listen the voices of the other parties in the public Internet or PSTN. Making the problem more difficult, the Internet telephony service considered in this paper gets the incoming voice packets of every session through only one UDP port number. In this paper, three schemes including the terminal proxy, the gateway proxy, and the protocol translation are suggested to solve the problems. The design and implementation of the NAT proxy server based on gateway proxy scheme are described in detail.

Overhead Reduction Methods in Communication between 6LoWPAN and External Node (6LoWPAN 노드와 외부 노드의 통신 시에 오버헤드 감소 방법)

  • Choi, Dae-In;Enkhzul, Doopalam;Park, Jong-Tak;Kahng, Hyun-K.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.437-442
    • /
    • 2011
  • As an Internet Engineering Task Force (IETF) Working Group, 6LoWPAN is standardizing the IPv6 packet transfer technology in accordance with IEEE 802.15.4. It has completed two Request for Comments (RFC) documents, one of which, RFC 4944, addresses fragmentation, reassembly, and header compression technologies. In this paper, a communication mechanism is proposed to provide efficient communication between 6LoWPAN and external nodes. In this mechanism, the gateway between 6LoWPAN and external networks serves as the proxy gateway between nodes. The simulation was conducted using QualNet to compare the performance of the proposed mechanism and the existing RFC 4944 method. The comparative analysis of the proposed mechanism and the existing method showed that the proposed method performed better.

A Study on Auto Inspection System of Cross Coil Movement Using Machine Vision (머신비젼을 이용한 Cross Coil Movement 자동검사 시스템에 관한 연구)

  • Lee, Chul-Hun;Seol, Sung-Wook;Joo, Jae-Heum;Lee, Sang-Chan;Nam, Ki-Gon
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.11
    • /
    • pp.79-88
    • /
    • 1999
  • In this paper we address the tracking method which tracks only target object in image sequence including moving object. We use a contour tracking algorithm based on intensity and motion boundaries. The motion of the moving object contour in the image is assumed to be well describable by an affine motion model with a translation, a change in scale and a rotation. The moving object contour is represented by B-spline, the position and motion of which is estimated along the image sequence. we use pattern recognition to identify target object. In order to use linear Kalman Filters we decompose the estimation process into two filters. One is estimating the affine motion parameters and the other the shape of moving object contour. In some experiments with dial plate we show that this method enables us to obtain the robust motion estimates and tracking trajectories even in case of including obstructive object.

  • PDF

P-HDNS : A New Scheme to Support Multilingual Domain Names (한글도메인이름을 지원하기 위한 Proxy HDNS 구현)

  • Kim, Weon;Chin, Yong-Ohk
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.12
    • /
    • pp.1-10
    • /
    • 1999
  • Given a domain, client applications over the Internet are in support of the DNS (Domain Name System) to get its corresponding IP address. Currently, only domain names expressed by ASCII code are recognized over the Internet. This enforces the usage of ASCII domain names even in countries which use languages based on multilingual code other than ASCII code. In this paper, we present a methodology to support multilingual domain names on top of the existing DNS. The methodology is based on code translation of domain names in multilingual code into ASCII code via UTF5. We implement a gateway, called Proxy Hangul DNS (P-HDNS) based on the proposed methodology. This paper presents the principles of the methodology and the implementation details of P-HDNS.

  • PDF

Design and implementation of an Embedded Network Processor (내장형 네트워크 프로세서의 설계 및 구현)

  • Joung Jinoo;Kim Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1211-1217
    • /
    • 2005
  • Current generation embedded systems are built around only a small number of SOCs, which are again based on general-purpose embedded micro-processors, such as ARM and MIPS. These RISC-based processors are not, however, designed for specific functions such as networking and multimedia processing, whose importances have increased dramatically in recent years. Network devices for small business and home networks, are especially dependent upon such SOCs based on general processors. Except for PHY and MAC layer functions, which are built with hardware, all the network functions are processed by the embedded micro-processor. Enabling technologies such as VDSL and FTTH promise Internet access with a much higher speed, while at the same time explore the limitations of general purpose microprocessors. In this paper we design a network processor, embed it into an SOC for Home gateway, evaluate the performance rigorously, and gauge a possibility for commercialization.

On the Direction of the Application of the Concepts of Computational Thinking for Elementary Education (Computational Thinking의 초등교육 활용 방향)

  • Moon, Gyo Sik
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.518-526
    • /
    • 2013
  • The notion of computational thinking is currently gaining much attention from a variety of disciplines. Accordingly, computer education community needs to address this issue for formal education. In the paper, the translation issue on the terminology - 'computational thinking' - is discussed. As a brief introduction to computational thinking the characteristics and necessities as well as its importance are presented. The types of learning computational thinking are presented, which are learning with computing tools on one hand and without them on the other hand. Furthermore, learning objectives of computational thinking as well as the contents are also investigated for the application of computational thinking in elementary education. A survey was conducted for thirty three elementary school teachers on behalf of investigating directions of teaching computational thinking in elementary education. It shows that almost all respondents agree to teaching computational thinking in formal education and it also shows other interesting results as stated in the paper.

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.

An Ontology-Driven Mapping Algorithm between Heterogeneous Product Classification Taxonomies (이질적인 쇼핑몰 환경을 위한 온톨로지 기반 상품 매핑 방법론)

  • Kim Woo-Ju;Choi Nam-Hyuk;Choi Dae-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.2
    • /
    • pp.33-48
    • /
    • 2006
  • The Semantic Web and its related technologies have been opening the era of information sharing via the Web. There are, however, several huddles still to overcome in the new era, and one of the major huddles is the issue of information integration, unless a single unified and huge ontology could be built and used which could address everything in the world. Particularly in the e-business area, the problem of information integration is of a great concern for product search and comparison at various Internet shopping sites and e-marketplaces. To overcome this problem, we proposed an ontology-driven mapping algorithm between heterogeneous product classification and description frameworks. We also peformed a comparative evaluation of the proposed mapping algorithm against a well-Down ontology mapping tool, PROMPT.

  • PDF