• Title/Summary/Keyword: Access to Information (A2I)

Search Result 194, Processing Time 0.027 seconds

Development of an Analysis Program of Type I Polyketide Synthase Gene Clusters Using Homology Search and Profile Hidden Markov Model

  • Tae, Hong-Seok;Sohng, Jae-Kyung;Park, Kie-Jung
    • Journal of Microbiology and Biotechnology
    • /
    • v.19 no.2
    • /
    • pp.140-146
    • /
    • 2009
  • MAPSI(Management and Analysis for Polyketide Synthase Type I) has been developed to offer computational analysis methods to detect type I PKS(polyketide synthase) gene clusters in genome sequences. MAPSI provides a genome analysis component, which detects PKS gene clusters by identifying domains in proteins of a genome. MAPSI also contains databases on polyketides and genome annotation data, as well as analytic components such as new PKS assembly and domain analysis. The polyketide data and analysis component are accessible through Web interfaces and are displayed with diverse information. MAPSI, which was developed to aid researchers studying type I polyketides, provides diverse components to access and analyze polyketide information and should become a very powerful computational tool for polyketide research. The system can be extended through further studies of factors related to the biological activities of polyketides.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

I/O Performance Analysis about Memory Allocation of the UBIFS (UBIFS 메모리 할당에 관한 I/O 성능 분석)

  • Lee, Jaekang;Oh, Sejin;Chung, Kyungho;Yun, Taejin;Ahn, Kwangseon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.4
    • /
    • pp.9-18
    • /
    • 2013
  • Flash memory is mostly used on smart devices and embedded systems because of its nonvolatile memory, low power, quick I/O, resistant shock, and other benefits. Generally the typical file systems base on the NAND flash memory are YAFFS2, JFFS2, UBIFS, and etc. In this paper, we had variously made an experiment regarding I/O performance using our schemes and the UBIFS of the latest Linux Kernel. The proposed I/O performance analyses were classified as a sequential access and a random access. Our experiment consists of 6 cases using kmalloc(), vmalloc(), and kmem_cache(). As a result of our experiment analyses, the sequential reading and the sequential rewriting increased by 12%, 11% when the Case 2 has applied vmalloc() and kmalloc() to the UBI subsystem and the UBIFS. Also, the performance improved more by 7.82%, 6.90% than the Case 1 at the random read and the random write.

Efficient Hop-based Access Control for Private Social Networks (소셜 네트워크에서 프라이버시를 보호하는 효율적인 거리기반 접근제어)

  • Jung, Sang-Im;Kim, Dong-Min;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.505-514
    • /
    • 2012
  • Because people usually establish their online social network based on their offline relationship, the social networks (i.e., the graph of friendship relationships) are often used to share contents. Mobile devices let it easier in these days, but it also increases the privacy risk such as access control of shared data and relationship exposure to untrusted server. To control the access on encrypted data and protect relationship from the server, M. Atallah et al. proposed a hop-based scheme in 2009. Their scheme assumed a distributed environment such as p2p, and each user in it shares encrypted data on their social network. On the other hand, it is very inefficient to keep their relationship private, so we propose an improved scheme. In this paper, among encrypted contents and relationships, some authenticated users can only access the data in distributed way. For this, we adopt 'circular-secure symmetric encryption' first. Proposed scheme guarantees the improved security and efficiency compared to the previous work.

BADA-$IV/I^2R$: Design & Implementation of an Efficient Content-based Image Retrieval System using a High-Dimensional Image Index Structure (바다-$IV/I^2R$: 고차원 이미지 색인 구조를 이용한 효율적인 내용 기반 이미지 검색 시스템의 설계와 구현)

  • Kim, Yeong-Gyun;Lee, Jang-Seon;Lee, Hun-Sun;Kim, Wan-Seok;Kim, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2S
    • /
    • pp.678-691
    • /
    • 2000
  • A variety of multimedia applications require multimedia database management systems to manage multimedia data, such as text, image, and video, as well as t support content-based image or video retrieval. In this paper we design and implement a content-based image retrieval system, BADA-IV/I$^2$R(Image Information Retrieval), which is developed based on BADA-IV multimedia database management system. In this system image databases can be efficiently constructed and retrieved with the visual features, such as color, shape, and texture, of image. we extend SQL statements to define image query based on both annotations and visual features of image together. A high-dimensional index structure, called CIR-tree, is also employed in the system to provide an efficient access method to image databases. We show that BADA-IV/I$^2$R provides a flexible way to define query for image retrieval and retrieves image data fast and effectively: the effectiveness and performance of image retrieval are shown by BEP(Bull's Eye Performance) that is used to measure the retrieval effectiveness in MPEG-7 and comparing the performance of CIR-tree with those of X-tree and TV-tree, respectively.

  • PDF

Power Allocation for Half-duplex Relay-based D2D Communication with QoS guarantee

  • Dun, Hui;Ye, Fang;Jiao, Shuhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1311-1324
    • /
    • 2019
  • In the traditional cellular network communication, the cellular user and the base station exchange information through the uplink channel and downlink channel. Meanwhile, device-to-device (D2D) users access the cellular network by reusing the channel resources of the cellular users. However, when cellular user channel conditions are poor, not only D2D user cannot reuse its channel resources to access the network, but also cellular user's communication needs cannot be met. To solve this problem, we introduced a novelty D2D communication mechanism in the downlink, which D2D transmitter users as half-duplex (HD) relays to assist the downlink transmission of cellular users with reusing corresponding spectrum. The optimization goal of the system is to make the cellular users in the bad channel state meet the minimum transmission rate requirement and at the same time maximize the throughput of the D2D users. In addition, i for the purpose of improving the efficiency of relay transmission, we use two-antenna architecture of D2D relay to enable receive and transmit signals at the same time. Then we optimized power of base station and D2D relay separately with consideration of backhaul interference caused by two-antenna architectures. The simulation results show that the proposed HD relay strategyis superior to existing HD and full-duplex (FD) models in the aspects of system throughput and power efficiency.

AAA System for PLMN-WLAN Internetworking

  • Janevski Toni
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.192-206
    • /
    • 2005
  • Integration of mobile networks and Internet has started with 2.5 generation of mobile cellular networks. Internet traffic is today dominant traffic type worldwide. The hanger for higher data rates needed for data traffic and new IP based services is essential in the development of future wireless networks. In such situation, even 3G with up to 2 Mbit/s has not provided data rates that are used by Internet users with fixed broadband dial-up or through wired local area networks. The solution to provide higher bit rates in wireless access network has been found in wireless LAN although initially it has been developed to extend wired LAN into wireless domain. In this paper, we propose and describe a solution created for interoperability between mobile cellular network and WLAN. The integration between two networks, cellular and WLAN, is performed on the authentication, authorization, and accounting, i.e., AAA side. For that purpose we developed WLAN access controller and WLAN AAA gateway, which provide gateway-type access control as well as charging and billing functionalities for the WLAN service. In the development process of these elements, we have considered current development stadium of all needed network entities and protocols. The provided solution provides cost-effective and easy-to-deploy PLMN-WLAN Internetworking scenario.

Orthogonal Frequency Division Multiple Access with Statistical Channel Quality Measurements Part-I: System and Channel Modeling (통계적 채널 Quality 정보를 이용한 직교 주파수분할 다중접속(OFDMA) Part-I: 시스템 및 채널 모델링)

  • Yoon, Seo-Khyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.119-127
    • /
    • 2006
  • In this two-part paper, we consider dynamic resource allocation in orthogonal frequency division multiple access(OFDMA). To reduce the reverse link overhead for channel quality information(CQI) feedback, a set of sub-carriers are tied up to a sub-channel to be used as the unit of CQI feedback, user-multiplexing and the corresponding power/rate allocation. Specifically, we focus on two sub-channel structures, either aggregated or distributed, where the SNR distribution over a sub-channel is modeled as Ricean in general, and the channel quality of a sub-channel is summarized as the mean and variance of channel gain envelop divided by noise standard deviation. Then, we develop a generalized two step channel/resource allocation algorithm, which uses the two statistical measurements, and analyze the spectral efficiency of the OFDMA system in terms of average frequency utilization. An extension to proportional fair algorithm will also be addressed. As confirmed by numerical results, the aggregated structure is preferred especially when intending aggressive link adaptation.

The Role of People, Information, and Technology in LIS Education: Driving a Call for Action Towards the UN 2030 Agenda

  • Kim, Heesop;Alenzuela, Reysa C.
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.4
    • /
    • pp.16-29
    • /
    • 2016
  • Around the world, public access to information plays a crucial role in improving lives and facilitating development. People, technology, and information, which also represent common themes of i-Schools, are deemed relevant in adapting to these global challenges. The main purpose of this research is to identify the orientation of curriculums in LIS Schools in South Korea toward technology, information, and people for graduate schools of library and information science. This research also correlates the directions of the schools with the UN 2030 Agenda. Using the Wilson model, this study examines the orientation of courses offered. The result of classification and content analysis revealed that courses offered are leaning towards technology and information content. Courses reviewed in the light of developing knowledge and skills of information professionals to facilitate the fulfillment of global goals can make libraries more responsive to the changing times.

A Secure WLAN Authentication Scheme

  • Singh, Rajeev;Sharma, Teek Parval
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.3
    • /
    • pp.176-187
    • /
    • 2013
  • Message replay, malicious Access Point (AP) associations and Denial of Service (DoS) attacks are the major threats in Wireless LANs. These threats are possible due to a lack of proper authentication and insecure message communications between wireless devices. Current wireless authentication & key exchange (AKE) schemes and security protocols (WEP, WPA and IEEE 802.11i) are not sufficient against these threats. This paper presents a novel Secure WLAN Authentication Scheme (SWAS). The scheme introduces the delegation concept of mobile authentication in WLANs, and provides mutual authentication to all parties (Wireless Station, Access Point and Authentication Server). The messages involved in the process serve both authentication and key refreshing purposes. The scheme enhances the security by protecting the messages through cryptographic techniques and reduces the DoS impact. The results showed that cryptographic techniques do not result in extra latencies in authentication. The scheme also reduces the communication cost and network overhead.

  • PDF