• Title/Summary/Keyword: 바이오 데이터

Search Result 1,374, Processing Time 0.022 seconds

논제 부정 Access에 대한 Firewall의 과제와 대책

  • 변성준;서정석;최원석
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.227-238
    • /
    • 2000
  • Firewall은 다양한 부정Access의 방지책으로서 확실히 유효한 수단이지만 이 Firewall은 사용자로부터 지시된 설정을 충실히 실행하는 것으로 설정 오류, 소프트웨어의 정지, 허가된 룰을 악용한 침입 등 반드시 사용자가 바라는 작용을 무조건적 상태에서 보증해 주는 것은 아니다. 따라서 사용자는 도입 후 에도 운용시에 Access log를 감시하고 본래의 Security Policy에 반하는 행위를 매일 매일 체크하지 않으면 안될 상황에 처해 있다. 본 연구는 이러한 부정Access에 대한 이와 같은 Firewall의 현상에 대한 과제 중에서 "부정Access를 어떻게 하면 일찍, 정확히 체크할 수 있는가\ulcorner"라는 주제를 선택하여 Firewall의 한계와 그 대응책을 실제로 부정Access를 시험해 보는 것으로 검증하기로 하였다. 실험결과에서 (1)Port Scan이나 전자메일 폭탄(서비스정지공격)등은 Firewall로 방지하는 것은 불가능하거나 혹은 Checking이 곤란하다. (2)공격마다 로그 수집을 했음에도 관계없이 Firewall의 로그는 번잡하므로 단시간에 사태의 발견이 대단히 곤란하다고 하는 Firewall의 한계를 인식하였다. 그리고 그 대책으로서 우리는 체크 툴의 유효성에 착안하여 조사한 결과, 결국 무엇이 부정Access인가에 대해서는 어디까지나 이용하는 측이 판단하여 Firewall 상에 설정하지 않으면 안되지만 체크 툴은 이 부정Access 정보를 데이터베이스로서 갖고 있음으로써 '무엇이 부정Access인가'를 이용자 대신에 판단하고 툴에 따라서는 설정을 자동적으로 변경하여 부정 Access의 저지율을 향상시킨다. 이처럼 체크 툴은 Firewall의 수비능력을 보강하는 위치에 있다고 생각할 수 있다.다. 4 장에서는 3장에서 제기한 각각의 문제점에 대해 RAD 의 관점에 비추어 e-business 시스템의 단기개발을 실현하기 위한 고려사항이나 조건 해결책을 제안한다. 본 논문이 지금부터 e-business 를 시작하려고 하는 분, e-business 시스템의 개발을 시작하려고 하는 분께 단기간의 e-business 실현을 위한 하나의 지침이 된다면 다행이겠다.formable template is used to optimize the matching. Then, clustering the similar shapes by the distance between each centroid, papaya can be completely detected from the background.uage ("Association of research for algorithm of calculating machine (1992)"). As a result, conventional NN and CNN were available for interpolation of sampling data. Moreover, when nonlinear intensity is not so large under the field condition of small slope, interpolation performance of CNN was a little not so better than NN. However, when nonlinear intensity is large under the field condition of large slope, interpolation performance of CNN was relatively better than NN.콩과 자연 콩이 성분 분석에서 차이를

  • PDF

Perceptual Ad-Blocker Design For Adversarial Attack (적대적 공격에 견고한 Perceptual Ad-Blocker 기법)

  • Kim, Min-jae;Kim, Bo-min;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.871-879
    • /
    • 2020
  • Perceptual Ad-Blocking is a new advertising blocking technique that detects online advertising by using an artificial intelligence-based advertising image classification model. A recent study has shown that these Perceptual Ad-Blocking models are vulnerable to adversarial attacks using adversarial examples to add noise to images that cause them to be misclassified. In this paper, we prove that existing perceptual Ad-Blocking technique has a weakness for several adversarial example and that Defense-GAN and MagNet who performed well for MNIST dataset and CIFAR-10 dataset are good to advertising dataset. Through this, using Defense-GAN and MagNet techniques, it presents a robust new advertising image classification model for adversarial attacks. According to the results of experiments using various existing adversarial attack techniques, the techniques proposed in this paper were able to secure the accuracy and performance through the robust image classification techniques, and furthermore, they were able to defend a certain level against white-box attacks by attackers who knew the details of defense techniques.

A Survey on Admission Control Mechanisms for providing QoS in the IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜에서 QoS 제공을 위한 허가 제어 연구)

  • Lee, Kye-Sang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.535-538
    • /
    • 2005
  • Wireless LANs based on the IEEE 802.11 standard are widely spread for use nowadays. Traffic which are conveyed over the WLANs change rapidly from normal data such a Email and Web pages, to multimedia data of high resolution video and voice. To meet QoS (Quality of Service) required by these multimedia traffic, the IEEE 802 committee recently has developed a new standard, IEEE 802.11e. IEEe 802.11.e contains two MAC mechanisms for providing QoS: EDCA(Enhanced Distributed Channel Access) and HCCA (HCF Controlled Channel Access). Using these standardized MAC mechanisms as a building platform, various admission control mechanisms can be combined to offer QoS gurantees for multimedia traffic. This paper surveys these research efforts.

  • PDF

Development of the EM Wave Absorber Using MnZn-Ferrite and Sendust for Wireless LAN at 2.4 GHz (MnZn-Ferrite와 Sendust를 이용한 2.4 GHz 무선LAN용 전파흡수체 개발)

  • Lee, Dae-Hee;Choi, Chang-Mook;Choi, Dong-Han;Kim, Dong-Il
    • Journal of Navigation and Port Research
    • /
    • v.31 no.10
    • /
    • pp.865-868
    • /
    • 2007
  • Recently, wireless LANs are often applied in home or office because of its various of convenience. Frequency range of wireless LANs specified by IEEE 802.11b is at 2.4 GHz. The bluetooth, the microwave oven, and the PDA(Personal Digital Assistants) uses, however, the same frequency band. So problems will be produced in these environments, such as multi-pass interference and system-to-system interference. These problems can be eliminated by using EM wave absorber. In this paper, we designed and fabricated EM wave absorber using MnZn-Ferrite, Sendust, and CPE( Chlorinated Polyethylene). The EM wave absorber with the ratio of material (MnZn-Ferrite : Sendust : CPE = 64 : 16 : 20 wt.%) has thickness of 3.7 mm and absorption ability more than 17 dB at 2.4 GHz.

Collection Fusion Algorithm in Distributed Multimedia Databases (분산 멀티미디어 데이터베이스에 대한 수집 융합 알고리즘)

  • Kim, Deok-Hwan;Lee, Ju-Hong;Lee, Seok-Lyong;Chung, Chin-Wan
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.406-417
    • /
    • 2001
  • With the advances in multimedia databases on the World Wide Web, it becomes more important to provide users with the search capability of distributed multimedia data. While there have been many studies about the database selection and the collection fusion for text databases. The multimedia databases on the Web have autonomous and heterogeneous properties and they use mainly the content based retrieval. The collection fusion problem of multimedia databases is concerned with the merging of results retrieved by content based retrieval from heterogeneous multimedia databases on the Web. This problem is crucial for the search in distributed multimedia databases, however, it has not been studied yet. This paper provides novel algorithms for processing the collection fusion of heterogeneous multimedia databases on the Web. We propose two heuristic algorithms for estimating the number of objects to be retrieved from local databases and an algorithm using the linear regression. Extensive experiments show the effectiveness and efficiency of these algorithms. These algorithms can provide the basis for the distributed content based retrieval algorithms for multimedia databases on the Web.

  • PDF

Gender Classification System Based on Deep Learning in Low Power Embedded Board (저전력 임베디드 보드 환경에서의 딥 러닝 기반 성별인식 시스템 구현)

  • Jeong, Hyunwook;Kim, Dae Hoe;Baddar, Wisam J.;Ro, Yong Man
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.37-44
    • /
    • 2017
  • While IoT (Internet of Things) industry has been spreading, it becomes very important for object to recognize user's information by itself without any control. Above all, gender (male, female) is dominant factor to analyze user's information on account of social and biological difference between male and female. However since each gender consists of diverse face feature, face-based gender classification research is still in challengeable research field. Also to apply gender classification system to IoT, size of device should be reduced and device should be operated with low power. Consequently, To port the function that can classify gender in real-world, this paper contributes two things. The first one is new gender classification algorithm based on deep learning and the second one is to implement real-time gender classification system in embedded board operated by low power. In our experiment, we measured frame per second for gender classification processing and power consumption in PC circumstance and mobile GPU circumstance. Therefore we verified that gender classification system based on deep learning works well with low power in mobile GPU circumstance comparing to in PC circumstance.

A Method on Retrieving Personalized Information Based on Mutual Trust in Real and Online World (현실과 가상 세계에서 상호 신뢰도에 기반한 개인화 정보의 식별 방법)

  • Kim, Myeonghun;Kim, Sangwook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.5
    • /
    • pp.257-266
    • /
    • 2017
  • Two remarkable problems of recent online social network are information overflow and information overload. Since the mid-1990s, many researches to overcome these issues have been conducted with information recommender systems and context awareness based personalization techniques, the importance of trust or relationship between users to discover influential information has been increasing as recent online social networks become huge. But almost researches have not regarded trust or relationship in real world while reflecting them in online world. In this paper, we present a novel method how to discover influential and spreadable information that is highly personalized to a user. This valuable information is extracted from an information set that consists of lots of information user missed in the past, and we assumes important information is likely to exist in this set.

Development of HCS(High Contents Screening) Software Using Open Source Library (오픈 소스 라이브러리를 활용한 HCS 소프트웨어 개발)

  • Na, Ye Ji;Ho, Jong Gab;Lee, Sang Joon;Min, Se Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.6
    • /
    • pp.267-272
    • /
    • 2016
  • Microscope cell image is an important indicator for obtaining the biological information in a bio-informatics fields. Since human observers have been examining the cell image with microscope, a lot of time and high concentration are required to analyze cell images. Furthermore, It is difficult for the human eye to quantify objectively features in cell images. In this study, we developed HCS algorithm for automatic analysis of cell image using an OpenCV library. HCS algorithm contains the cell image preprocessing, cell counting, cell cycle and mitotic index analysis algorithm. We used human cancer cell (MKN-28) obtained by the confocal laser microscope for image analysis. We compare the value of cell counting to imageJ and to a professional observer to evaluate our algorithm performance. The experimental results showed that the average accuracy of our algorithm is 99.7%.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

Implementation of Mobile Virtual Colored Overlay for People with Scotopic Sensitivity Syndrome (광과민성 증후군자를 위한 태블릿 PC와 스마트폰 용 가상 색 오버레이 구현)

  • Jang, Young Gun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.145-150
    • /
    • 2013
  • A film colored overlay has been used as an assistive device for dyslexics, Recently, several virtual colored overlays which can be used in computer were developed. But mobile virtual overlay has not been developed yet. In this paper, I implemented a mobile overlay application which is based android operating system and displays a colored overlay of screen all the time while user can freely interact with rest of apps in normal manner by using root window and service. A method is presented to determine the source color of a virtual overlays by estimating alpha value of alpha blending algorithm through measurement of the chromaticity and transmissivity of film overlays and I implemented all colors which are presented by using Intuitive Overlays. Test results of the developed virtual overlay show that all colors of the overlays are almost identical to the colors of Intuitive Overlay by using the chroma meter CS-200A.