• Title/Summary/Keyword: Blocking of Access

Search Result 141, Processing Time 0.026 seconds

Dimerization of tert-Butylmercaptan over the Surface of Aerosil? Impregnated with Copper and Manganese

  • Park, Dong Geon;Park, Seon Hui;Lee, Su Jin
    • Bulletin of the Korean Chemical Society
    • /
    • v.21 no.7
    • /
    • pp.715-719
    • /
    • 2000
  • A ceramic powder of destructive adsorbent was synthesized by impregnating copper and manganese on the surface of silica aerosil@. In-site FTIR measurements on pulses of malodorant tert-butylmercaptan injected over the powder showed that rert-butylmercaptan dimerized into di-tert-hutyldisulfide on the surface of the adsorbent in an ambient condition. GC/MS measurement on the gas over the adsorbent showed no tert-butylmercaptan remaining, and showed only the dimerization product of di-tert-butyldisulfide. Most of the dimerization product, di-tert-butyldisulfide,remained on the surface of the adsorbent as physisorbed condense, and apparently Iowered the destruction efficiency by blocking the surface from the access by tert-butylmercaptan. Upon being heated above $100^{\circ}C$ it was observed that the physisorbed di-tert-butyldisulfide dissociated back into tert-butylmercaptan. tert-butylmercaptan physisorbed on the activated carbon, thereby no dimerization was occurring on the surface of the activated carbon. In an argn environment, the dimerization reaction was practically not occurring even on the surface of the adsorbent, indicating the free oxygen in air was also participating in the dimerization reaction. Water was identified as a by-product of the dimerization reaction. Possible reactions on the surface of the adsorbent were proposed.

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF

Automated Detection Technique for Suspected Copyright Infringement Sites

  • Jeong, Hae Seon;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4889-4908
    • /
    • 2020
  • With the advances in Information Technology (IT), users can download or stream copyrighted works, such as videos, music, and webtoons, at their convenience. Thus, the frequency of use of copyrighted works has increased. Consequently, the number of unauthorized copies and sharing of copyrighted works has also increased. Monitoring is being conducted on sites suspected of conducting copyright infringement activities to reduce copyright holders' damage due to unauthorized sharing of copyrighted works. However, suspected copyright infringement sites respond by changing their domains or blocking access requests. Although research has been conducted for improving the effectiveness of suspected copyright infringement site detection by defining suspected copyright infringement sites' response techniques as a lifecycle step, there is a paucity of studies on automation techniques for lifecycle detection. This has reduced the accuracy of lifecycle step detection on suspected copyright infringement sites, which change domains and lifecycle steps in a short period of time. Thus, in this paper, an automated detection technique for suspected copyright infringement sites is proposed for efficient detection and response to suspected copyright infringement sites. Using our proposed technique, the response to each lifecycle step can be effectively conducted by automatically detecting the lifecycle step.

Quality-Oriented Video Delivery over LTE

  • Pande, Amit;Ramamurthi, Vishwanath;Mohapatra, Prasant
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.168-176
    • /
    • 2013
  • Long-term evolution (LTE) is emerging as a major candidate for 4G cellular networks to satisfy the increasing demands for mobile broadband services, particularly multimedia delivery. Multiple-input multiple-output (MIMO) technology combined with orthogonal frequency division multiple access and more efficient modulation/coding schemes (MCS) are key physical layer technologies in LTE networks. However, in order to fully utilize the benefits of the advances in physical layer technologies, the MIMO configuration and MCS need to be dynamically adjusted to derive the promised gains of 4G at the application level. This paper provides a performance evaluation of video traffic with variations in the physical layer transmission parameters to suit the varying channel conditions. A quantitative analysis is provided using the perceived video quality as a video quality measure (evaluated using no-reference blocking and blurring metrics), as well as transmission delay. Experiments are performed to measure the performance with changes in modulation and code rates in poor and good channel conditions. We discuss how an adaptive scheme can optimize the performance over a varying channel.

Ship Tests of PLC and Analysis of Its Signal Characteristics (전력선 통신의 실선시험 및 신호특성 분석)

  • Cho, Seong-Rak;Paik, Bu-Geun;Yi, Ji-Eun;Lee, Dong-Kon;Bae, Byung-Dueg
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.1
    • /
    • pp.93-98
    • /
    • 2010
  • In this paper, PLC which can be installed easily and is stable to transfer datum, is tested for approving its application in a real ship. Internet access service, CCTV monitoring, light control and huge sensor communications are needed for enhancing the convenience and safety of passengers and crew in ships. In order to apply PLC in ships, we surveyed some noises interrupting PLC in ships and investigated the PLC characteristics. The Hannara, a training ship of Korea Maritime University, was used for the test. We measured and analyzed blocking noises using by NI's SCXI-1001. When noises of specific frequency band occurred near the PLC frequency band, PLC transfer capacity was low for mass datum. We developed and verified some methods to apply PLC in a ship under lots of noises.

Joint routing, link capacity dimensioning, and switch port optimization for dynamic traffic in optical networks

  • Khan, Akhtar Nawaz;Khan, Zawar H.;Khattak, Khurram S.;Hafeez, Abdul
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.799-811
    • /
    • 2021
  • This paper considers a challenging problem: to simultaneously optimize the cost and the quality of service in opaque wavelength division multiplexing (WDM) networks. An optimization problem is proposed that takes the information including network topology, traffic between end nodes, and the target level of congestion at each link/ node in WDM networks. The outputs of this problem include routing, link channel capacities, and the optimum number of switch ports locally added/dropped at all switch nodes. The total network cost is reduced to maintain a minimum congestion level on all links, which provides an efficient trade-off solution for the network design problem. The optimal information is utilized for dynamic traffic in WDM networks, which is shown to achieve the desired performance with the guaranteed quality of service in different networks. It was found that for an average link blocking probability equal to 0.015, the proposed model achieves a net channel gain in terms of wavelength channels (𝛾w) equal to 35.72 %, 39.09 %, and 36.93 % compared to shortest path first routing and 𝛾w equal to 29.41 %, 37.35 %, and 27.47 % compared to alternate routing in three different networks.

Multi-agent Q-learning based Admission Control Mechanism in Heterogeneous Wireless Networks for Multiple Services

  • Chen, Jiamei;Xu, Yubin;Ma, Lin;Wang, Yao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2376-2394
    • /
    • 2013
  • In order to ensure both of the whole system capacity and users QoS requirements in heterogeneous wireless networks, admission control mechanism should be well designed. In this paper, Multi-agent Q-learning based Admission Control Mechanism (MQACM) is proposed to handle new and handoff call access problems appropriately. MQACM obtains the optimal decision policy by using an improved form of single-agent Q-learning method, Multi-agent Q-learning (MQ) method. MQ method is creatively introduced to solve the admission control problem in heterogeneous wireless networks in this paper. In addition, different priorities are allocated to multiple services aiming to make MQACM perform even well in congested network scenarios. It can be observed from both analysis and simulation results that our proposed method not only outperforms existing schemes with enhanced call blocking probability and handoff dropping probability performance, but also has better network universality and stability than other schemes.

Methodology of the Spatial Boundary Determination for Trade Area of Large-scale Discount Stores Using GIS and Road Connectivity (GIS와 도로연결성을 이용한 대형할인점 상권의 공간적 범위 설정 방법)

  • Lee, Yong-Ik;Hong, Sung-Eon;Park, Soo-Hong
    • Spatial Information Research
    • /
    • v.18 no.1
    • /
    • pp.11-17
    • /
    • 2010
  • The present study attempts to provide the practical methodology to determine the spatial boundary of trade area, not depending on conventional circle-based regional analysis, but adopting dimension-diverging conception based on GIS and road connectivity by exemplifying a large-scale discount store with an outlook to enhance accuracy and reliability in trade area analyzing. Unlike the preliminary researches frequently relying on circular form of interpretation which were not likely to exclude obstacles blocking the accessibility to trade areas, the method suggested by the study is to suggest an alternative way for demarcating the trade areas more practically with better access by excluding in-between obstacles. Finally, we show verification of proposed cost models and performance by join strategy.

Coercive Economic Measures and their Implications to Inter-Korean Economic Cooperation (강압적 경제·통상 조치에 대한 분석과 남북한 경제 협력에의 시사점)

  • Lee, Jaewon;Park, Jeongjoon
    • Korea Trade Review
    • /
    • v.44 no.6
    • /
    • pp.327-344
    • /
    • 2019
  • This paper explores the hub-and-spoke system as the structure of the global economic network that presents obstacles for international cooperation. With its exclusive jurisdiction and control over the hub, a powerful state can employ coercive economic measures to compel and deter unwanted behavior of rogue states and even its allies. Against this backdrop, this study analyzes the cases of the US blocking access to its market by Chinese Huawei as well as the case of Japan in restricting trade for highly advanced goods to South Korea. This analysis reveals that both measures are forms of secondary boycotts, which affect not only the entities within their jurisdiction but also others located in third countries. In addition, this paper extends its findings to free trade agreements and offers implications on the outward processing scheme for the Gaeseong Industrial Complex in the KORUS FTA and the Korea-China FTA. These events result in a gray-risk for South Korea, a country that aims to resolve North Korea's denuclearization and inter-Korean economic cooperation.

A Traffic Handling Scheme for Multi-Media Mobile Communication (멀티미디어 서비스를 위한 이동통신 트래픽 처리 기법)

  • Lee, Moon-Ho;Kim, Byung-Gi;Lee, Hyoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.3
    • /
    • pp.493-500
    • /
    • 1996
  • As the greater interests are focused onto wireless message transfer, wireless data base access and mobile computing the techniques for integrating various dat a services into the mobile communication systems are seriously needed. In this paper we propose a traffic handing scheme to provide mixed media services more effectively, and analyze is performance. The proposed scheme was found to improve data performances and, regardless of varying data traffic load, provide acceptable level of blocking rate to voice services simultaneouly. Also it is more effective for message-oriented data services.

  • PDF