• Title/Summary/Keyword: 복제 모델

Search Result 169, Processing Time 0.054 seconds

Personal Information Protection Using Digital Twins in the Fourth Industrial Revolution (4차 산업혁명 시대의 디지털트윈을 활용한 개인정보보호)

  • Kim, Yong-Hun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.279-285
    • /
    • 2020
  • In the era of the Fourth Industrial Revolution, there are many sensors around. People and things are connected to these sensors to the internet. Numerous connected sensors produce the latest data in seconds, and these data are stacked with big data of unimaginable size. Because personal information can be contained in any place of data produced, device and system protection are needed. Digital twins are virtual models that accurately reflect the status information of physical assets and systems that utilize them. The characteristic of digital twin is that digital twin itself has temporal and structural identity enough to represent the object of reality. In the virtual environment the reproduced reality, it continuously simulates and it virtuals of the point of time or the future, the replica can be created. Therefore, this study cited factors threatening personal information in the era of the Fourth Industrial Revolution. And proposed using digital twin technology that can simulate in real-time to overcome the risk of personal information hacking.

Haplotype Inference Using a Genetic Algorithm (유전자 알고리즘을 이용한 하플로타입 추론)

  • Lee See-Young;Han Hyun-Goo;Kim Hee-Chul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.6
    • /
    • pp.316-325
    • /
    • 2006
  • In diploid organisms like human, each chromosome consists of two copies. A haplotype is a SNP(single nucleotide polymorphism) sequence information from each copy. Finding the complete map of haplotypes in human population is one of the important issues in human genome. To obtain haplotypes via experimental methods is both time-consuming and expensive. Therefore, inference methods have been used to infer haplotyes from the genotype samples. In this paper, we propose a new approach using genetic algorithm to infer haplotypes, which is based on the model of finding the minimum number of haplotypes that explain the genotype samples. We show that by doing a computational experiment, our algorithm has the correctness similar to HAPAR[1] which is known to produce good results while the execution time of our algorithm is less than that of HAPAR as the input size is increased. The experimental result is also compared with the result by the recent method PTG[2].

Quorum Consensus Method based on Ghost using Simplified Metadata (단순화된 메타데이타를 이용한 고스트 기반 정족수 동의 기법의 개선)

  • Cho, Song-Yean;Kim, Tai-Yun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.1
    • /
    • pp.34-43
    • /
    • 2000
  • Replicated data that is used for fault tolerant distributed system requires replica control protocol to maintain data consistency. The one of replica control protocols is quorum consensus method which accesses replicated data by getting majority approval. If site failure or communication link failure occurs and any one can't get quorum consensus, it degrades the availability of data managed by quorum consensus protocol. So it needs for ghost to replace the failed site. Because ghost is not full replica but process which has state information using meta data, it is important to simplify meta data. In order to maintain availability and simplify meta data, we propose a method to use cohort set as ghost's meta data. The proposed method makes it possible to organize meta data in 2N+logN bits and to have higher availability than quorum consensus only with cohort set and dynamic linear voting protocol. Using Markov model we calculate proposed method's availability to analyze availability and compare it with existing protocols.

  • PDF

A Study on the Current Issues and Improvements for Document Delivery Services based on the Information Service Networks: Focus on Copyright Issues (국내 정보서비스 협력체를 통한 원문복사서비스 현황과 개선 방안 연구: 저작권 문제를 중심으로)

  • Joung, Kyounghee;Kim, Gyuhwan
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.3
    • /
    • pp.413-432
    • /
    • 2015
  • This study analyzes the copyright problems of document delivery services based on interlibrary loan which are operated by KERIS and KISTI according to the agreements with KORRA. As a result of the study, we found that there are limitations of the libraries and copyright works to implement the document delivery services. Also, the electronic document delivery is the only between librarians and there is no provisions in the agreements for individual users who are not affiliated to libraries. This study suggests introduction of the ground provision for the interlibrary loan in the Copyright Act of Korea and development of authoritative guideline for details of document delivery services. Also, the study suggests that end users to request documents could be print out it but the library have to install systems to avoid copyright infringement. Finally, the study proposes the copyright fee based model for the document delivery services for individual users.

A Web-based Right Management System Considering Execution time and Security (실행시간과 안전성을 고려한 웹 기반의 저작권관리 시스템)

  • Ko, Il-Seok;Cho, Yong-Hwan;Shin, Seung-Soo;Cho, Do-Eun;Kwon, Yong-Ai
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.697-702
    • /
    • 2004
  • As for the digital content, a reproduction is easy and manuscript is identical with original copy. Because of these characteristics, there are difficulties on prevention of an illegal reproduction and an illegal currency. In recent days various digital content service systems based on a web are commercialized. An appropriate copyright protection technology is required so that these systems develop as a profit model. Generally we use encrypted digital content transmission method for the copyright protection on a web base system. At the time of this, it is increased sire of encrypted digital content. As for this, it be increased time required on an execution process. Therefore, a design of the system that considered a execution time and a security is required. In this study, we designed the digital content transmission system that considered execution time and a security through a partial encryption based on a digital content copyright management technique. Also we evaluated performance of a proposed system through analysis.

Optimization of Host Animal Cell Culture Conditions to Produce Protein Using Recombinant Vaccinia Virus (재조합 백시니아 바이러스를 이용한 단백질 생산을 위한 숙주 동물세포의 배양 조건 최적화)

  • 이두훈;박정극
    • KSBB Journal
    • /
    • v.11 no.4
    • /
    • pp.438-444
    • /
    • 1996
  • Using recombinant Vaccinia virus(vSC8) that express ${\beta}$-galactosidase, a model heterologous protein, conditions for virus and protein production were investigated in tissue culture flask. As host animal cells HeLa and HeLa S3 were used. It was demonstrated that cells infected during the exponential growth phase gave higher protein yield than those infected during the stationary growth phase and calf serum concentration after virus infection did not significantly alter protein yield. Pretreatment of cell layer with hypotonic solution enhanced the virus infectivity. Optimum cell growth and recombinant protein production was achieved at $37^{\circ}C$. But, during 2 hours of virus infection period incubation temperature must be lowered to 20∼$30^{\circ}C$ for maximum recombinant protein yield. To enhance virus replication, the effects of adrenal glucocorticoid hormone (Dexamethasone) and silkworm hemolymph were evaluated. Only dexamethasone increased about 20% of ${\beta}$-galactosidase yield in HeLa S3 cells when added with 10-7∼10-5M concentration 24 hours before infection.

  • PDF

The Protection System of Digital Contents using a Frame Filter Information based on Public Key (공개키 기반의 프레임 필터 정보를 이용한 디지털 콘텐츠 보호 시스템)

  • Koh Byoung-Soo;Jang Jae-Hyuk;Kang Seok-Jue;Choi Yong-Rak
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.1-9
    • /
    • 2004
  • The growth of Internet is the main factor that activates the Digital Contents Market and gives the convenience, efficiency and usefulness to the users. However the Digital Contents Market could be shrunk by an illegal reprinting and imprudent using. As a result, recently we can see that using the contents illegally through Internet makes the troubles between providers and customers and finally they are at law. Therefore we urgently need a new technology which can prevent the contents from illegal using, illegal reprinting and imprudent using, We developed the system prohibits a imprudent using in order to activate the Digital Contents Market, We developed the system protects the contents safely by removing the dangerous for the illegal reprinting with providing the encoded contents and the system removes the contents according to the number of usage and the user authentication through network.

  • PDF

Technical analysis of Cloud storage for Cloud Computing (클라우드 컴퓨팅을 위한 클라우드 스토리지 기술 분석)

  • Park, Jeong-Su;Jung, Sung-Jae;Bae, Yu-Mi;Kyung, Ji-Hun;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.757-760
    • /
    • 2012
  • Cloud storage system that cloud computing providers provides large amounts of data storage and processing of cloud computing is a key component. Large vendors (such as Facebook, YouTube, Google) in the mass sending of data through the network quickly and easily share photos, videos, documents, etc. from heterogeneous devices, such as tablets, smartphones, and the data that is stored in the cloud storage using was approached. At time, growth and development of the globally data, the cloud storage business model emerging is getting. Analysis new network storage cloud storage services concepts and technologies, including data manipulation, storage virtualization, data replication and duplication, security, cloud computing core.

  • PDF

FPGA-based Hardware Implementation of Cryptography Algorithm ARIA (암호화 알고리즘 ARIA의 FPGA기반 하드웨어 구현)

  • Kim Young-Soo;Cho Sun-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1229-1236
    • /
    • 2006
  • Group oriented multicast service is a prerequisite for the current application system for remote lecture and customer service. IP multicast is used to be generally accepted as an internet standard. IP multicast which is designed to support network based replication model can efficiently use host and network resource, however it has some weak points that it has to support IP multicast in the internet by adding multicast-capable internet infrastructure such as router and is vulnerable to security by using public IP address for group identifier. Therefore we propose the trigger based application level multicast model that can enhance both scalability and security by separating the functions, which send and receive message to solve these problems. Our suggested model is expected to ensure the promotion of quality of service and reliability.

Design of Framework for Content Distribution in Wireless Environment (무선 환경에서의 콘텐츠 유통 프레임워크 설계)

  • 조광문;한군희
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.4 no.2
    • /
    • pp.71-75
    • /
    • 2003
  • The distribution model of multimedia content is proposed, This solves the problems which are occurred by various multimedia content and the complex distribution structure. The online distribution processes in wireless environments contain many different, companent from the of offline and wire networks. The multimedia content can be very easily propagated illegally. Under these environments the seneme to protect the copyrights of multimedia content and rights of distribution entities is needed. In this paper a distribution framework of content in wireless environment based on MPFG-21 framework if proposed. This model can be adapted to DRM(digital rights management) and utilized to protect the rights of distribution entities.

  • PDF