• Title/Summary/Keyword: 공개소프트웨어

Search Result 436, Processing Time 0.026 seconds

Microarray Probe Design with Multiobjective Evolutionary Algorithm (다중목적함수 진화 알고리즘을 이용한 마이크로어레이 프로브 디자인)

  • Lee, In-Hee;Shin, Soo-Yong;Cho, Young-Min;Yang, Kyung-Ae;Zhang, Byoung-Tak
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.8
    • /
    • pp.501-511
    • /
    • 2008
  • Probe design is one of the essential tasks in successful DNA microarray experiments. The requirements for probes vary as the purpose or type of microarray experiments. In general, most previous works use the simple filtering approach with the fixed threshold value for each requirement. Here, we formulate the probe design as a multiobjective optimization problem with the two objectives and solve it using ${\epsilon}$-multiobjective evolutionary algorithm. The suggested approach was applied in designing probes for 19 types of Human Papillomavirus and 52 genes in Arabidopsis Calmodulin multigene family and successfully produced more target specific probes compared to well known probe design tools such as OligoArray and OligoWiz.

Power Analysis Attacks on Blinding Countermeasure against Horizontal CPA (수평적 상관관계 분석에 안전한 블라인딩 대응기법에 대한 전력 분석 공격)

  • Lee, Sangyub;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.727-738
    • /
    • 2015
  • Until recently, power analysis is one of the most popular research issues among various side channel analyses. Since Differential Power Analysis had been first proposed by Kocher et al., various practical power analyses correspond with software/hardware cryptographic devices have been proposed. In this paper, we analyze vulnerability of countermeasure against power analysis exploiting single power trace of public cryptographic algorithm. In ICICS 2010, Clavier et al. proposed Horizontal Correlation Analysis which can recover secret information from a single exponentiation trace and corresponding countermeasures. "Blind operands in LIM", one of their countermeasures, exploits additive blinding in order to prevent leakage of intermediate value related to secret information. However, this countermeasure has vulnerability of having power leakage that is dependant with the message known by an adversary. In this paper, we analyzed vulnerabilities by three attack scenarios and proved them by practical correlation power analysis experiments.

A Efficient Key Generation and Renewal for Broadcast Encryption (브로드캐스트 암호화에서의 효율적인 키 생성과 갱신 방법)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.149-156
    • /
    • 2004
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. Important thing is that only user who is permitted before only must be able to get digital information in broadcast encryption schemes. If broadcast message transfers, users who authority is get digital information to use private key given in the advance by oneself. Thus, user acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. Take advantage of two technique of proposal system. One is method that server creates key forecasting user without user's agreement, and another is method that server and user agree each other and create key Advantage of two proposal system because uses a secret key broadcast message decryption do can and renewal is available effectively using one information whatever key renewal later.

A Study on Strategies of educating Linux in University (대학의 리눅스 교육 방안 연구)

  • 김정훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.12
    • /
    • pp.1759-1764
    • /
    • 2002
  • Linux was developed by Linus Torvalds at University of Helsinkyi, Finland. Today Linux becomes to compete with windows operation of Microsoft. and is adopted worldwide on IBM products. The British government is viewing Linux as a desktop operating system. In Tunisia, Linux is under consideration as the governmental operating system. Even Sun Microsystems, the powerful supplier in workstation and sewer market, is working on developing ways in using Linux. is now getting further attentions on governmental level in several countries. The growing interests in adopting Linux in computer operating systems are not on a personal preference level any more. A number of companies and organizations, even some governmental administrations start to see its potential capabilities and are looking for ways for its applications. The necessity of teaching Linux in university is, therefore, imminent and should be discussed in course development without delay. The purpose of this paper is showing the things to be considered, problem analysis and some solution as grafting Linux in university education.

  • PDF

Implementation of a Large-scale Web Query Processing System Using the Multi-level Cache Scheme (계층적 캐시 기법을 이용한 대용량 웹 검색 질의 처리 시스템의 구현)

  • Lim, Sung-Chae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.669-679
    • /
    • 2008
  • With the increasing demands of information sharing and searches via the web, the web search engine has drawn much attention. Although many researches have been done to solve technical challenges to build the web search engine, the issue regarding its query processing system is rarely dealt with. Since the software architecture and operational schemes of the query processing system are hard to elaborate, we here present related techniques implemented on a commercial system. The implemented system is a very large-scale system that can process 5-million user queries per day by using index files built on about 65-million web pages. We implement a multi-level cache scheme to save already returned query results for performance considerations, and the multi-level cache is managed in 4-level cache storage areas. Using the multi-level cache, we can improve the system throughput by a factor of 4, thereby reducing around 70% of the server cost.

An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment (임베디드 컴퓨팅 환경에서 브로드캐스트 암호화를 위한 효율적인 키 분배)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.

  • PDF

A Study on Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 아키텍처에 관한 연구)

  • Kim, Chang-Su;Kim, Tak-Chen;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.782-785
    • /
    • 2007
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

  • PDF

A Case Study of Developing XML-based Web Contents Supporting PC and PDA Browser (PC 및 PDA 브라우저 지원을 위한 XML 기반의 웹 컨텐츠 개발 사례 연구)

  • Kim Kyung-A;Yong Hwan-Seung
    • Journal of Digital Contents Society
    • /
    • v.3 no.1
    • /
    • pp.59-74
    • /
    • 2002
  • Due to rapid advance of wireless communication technology and popularization of wireless devices, demand on wireless internet contents is gradually increasing. Therefore, there are many researches and solution developments to provide good qualified contents quickly for wireless internet. For example, researches into converting wired web contents into wireless web contents or using integrated markup language like XHTML basic to make contents. In this paper, I propose a method to develop XML-based web contents which uses PHP language for data fetch from MySQL database. This method use open source software for a cost saving. Due to use of PHP extension as a XSLT engine, this method is very easy to apply. For a example of this method, a web content of movie information is implemented for PC and PDA browser. Developing XML-based web contents is useful not only for supporting devices of multiple type, but also for rapid changes of user interface design and for exchange of contents between web sites.

  • PDF

Trend analysis of X Window used in Linux (리눅스에 사용되는 X 윈도 동향 분석)

  • Sung, Kyung
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1393-1401
    • /
    • 2017
  • The Linux operating system is expanding to include desktops and servers, as well as mobile devices, automobiles and embedded devices, and is the dominant operating system category because it is freely available and open source software. However, the desktop market is dominated by Microsoft's Windows, and Apple's Mac OS is increasingly dominated by enthusiasts, but Linux's growth is stagnant. An important element to make up for this deficiency is the X Window System. Most Linux distributions still use the traditional X.org server as the X Window System, but it is heavy and slow. To replace it, a new X window system called Wayland emerged. Wayland is small and light enough to fit on an embedded or mobile device, so it can be mounted on the IoT related device as well as on the desktop. With the advent of Wayland, the change in the X window will accelerate the popularization of Linux.

Development of Intrusion Detection System for GOOSE Protocol Based on the Snort (GOOSE 프로토콜 환경에서 Snort 기반의 침입 탐지 시스템 개발)

  • Kim, Hyeong-Dong;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1181-1190
    • /
    • 2013
  • The GOOSE(Generic Object Oriented Substation Event) is used as a network protocol to communicate between IEDs(Intelligent Electronic Devices) in international standard IEC 61850 of substation automation system. Nevertheless, the GOOSE protocol is facing many similar threats used in TCP/IP protocol due to ethernet-based operation. In this paper, we develop a IDS(Intrusion Detection System) for secure GOOSE Protocol using open software-based IDS Snort. In this IDS, two security functions for keyword search and DoS attack detection are implemented through improvement of decoding and preprocessing component modules. And we also implement the GOOSE IDS and verify its accuracy using GOOSE packet generation and communication experiment.