• Title/Summary/Keyword: Common number network

Search Result 210, Processing Time 0.067 seconds

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

Distribution of High Risk Human Papillomavirus Types in Western Kazakhstan - Retrospective Analysis of PCR Data

  • Bekmukhambetov, YZ;Balmagambetova, SK;Jarkenov, TA;Nurtayeva, SM;Mukashev, TZ;Koyshybaev, AK
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.5
    • /
    • pp.2667-2672
    • /
    • 2016
  • Background: Virtually all cases of cervical cancer are caused by persistent infections with a restricted set of human papillomaviruses (HPV). Cancer of the cervix is the third or even the second most common cancer in women worldwide, more than 85% of the cases occurring in developing countries, such as China and India, including the Republic of Kazakhstan. The purpose was to determine the HPV type distribution to evaluate efficacy of vaccination and adjust cancer prevention strategy in Western Kazakhstan in the future. Materials and Methods: A retrospective analysis was conducted of data obtained from PCR laboratories in 4 regional centers for the time period covering 12 months, 2013-2014, using AmpliSens$^{(R)}$ Real-Time PCR kits for HPV testing of 12 genotypes (16, 18, 31, 33, 35, 39, 45, 51, 52, 56, 58, and 59). Results: A total of 1,661 persons were HPV tested within 2013-14, but a proprotion examined for 16 and 18 genotypes only (563) was not been included for statistic analysis of distribution and ratio of the most common genotypes. Males accounted for only a small number (N=90 in total). Conclusions: Total number of the HPV-positive appeared to be 26.0%, or 286 of N=1098. Types distribution was as follows: type 16 (10.7%), 39 (5.83%), 51 (5.27%), 31 (4.85%), 56 (4.58%), 18 (3.61%), 59 (2.64%), 58 (2.22%), 35 (1.94%), 33 (1.25%). Overall the HPV infection was highest in 16-29 years old (62.4%) and decreased with age. Total prevalence of the HR-HPVs amongst male population was 21.4% with top five types 16, 18, 39, 51, 31. Trends forcorrelations between Aktau site and type 33 (Cramer's V 0.2029), between Caucasian ethnicity and type 33 (Cramer's V .1716), and between European ethnicities in Uralsk and type 45 (Cramer's V .1752) were found. Of N 563 tested separately for 16 or 18 types, 13.6% were positive. As a whole, the distribution of 16/18 types had a ratio of 3.53:1. Given the vaccine-targeted type 16 is widely spread amongst this regional population, HPV immunization program of adolescent girls 10-13 years should be implemented appropriately.

Study on the Network System between of the Outpatient and Central Treatment Department of Long Term Care Hospitals (요양병원 외래 및 중앙진료부의 의료영역 간 연결관계에 관한 연구)

  • Bae, Sunmi;Kim, Suktae
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.22 no.4
    • /
    • pp.7-17
    • /
    • 2016
  • Purpose: As our population ages and becomes an elderly society the number of elderly care hospitals is rapidly increasing. Because physical functions and spatial perception in the elderly decrease with age, these hospitals require more systematic and intelligent space designs. The design of these spaces are even more complex because they must accommodate medical programs to treat various different diseases and ailments and also because there are many first time patients and irregular short term patients that seek out outpatient treatment services. Also by analyzing the spatial configuration systems and systematic relationships between each of the functional spaces of the outpatient treatment service departments for hospitals specialized in care for the elderly by focusing on the hallway and corridor systems of these hospitals, the according characteristics and trends were examined. Methods: Based on preceding research, the types of hallway and corridor systems of these hospitals were categorized into five types, including gallery corridors, middle corridors, hall-type, mixed type and cyclic type corridors, and into six types according to function including by medical diagnosis, patient registration, examination, administration and convenience and shared common space to derive any interconnecting relationships between the corridor systems. Also by comprehensively examining the types and combined utilization of the corridor types and the integration and the intelligibility of the space syntax, any trends within the corridor system were derived. The elderly care hospitals examined in this research study were twelve hospitals that opened after the year 2000 in Korea with more that 150 sick beds with areas larger than $1000m^2$ and with all outpatient medical service related rooms located entirely on a single floor of the hospital. Results: The following results could be confirmed based on this research study. 1) The spaces where medical diagnosis and examination occurred were adjacent, and the movement lines for first time patients and re-visiting patients were taken into consideration by separating the treatment space. 2) This research study confirmed that the larger the size of the hospital was, there were more detailed categorizations of treatment services and that there was a tendency for treatment areas to be separated and independent from examination areas. 3) There was a tendency for integration and intelligibility to decrease the more complex and diverse the combination of hall types designed into the corridor systems of these hospitals was. cyclic type corridors dramatically decreased the intelligibility of the corridor systems of these hospitals. 4) The priority rank of these spaces were confirmed to be highest in the order of registration, diagnosis, examination, treatment, administration and shared common spaces. However it was confirmed for the local integration that the diagnosis scope had the highest priority rank. Implications: There were exceptional cases confirmed where the number of unit spaces did not have an absolute effect on integration and intelligibility. These results can be interpreted to mean that this can be overcome through efficient architectural planning.

Construction Methods of Switching Network for a Small and a Large Capacity AMT Switching System (소용량 및 대용량의 ATM시스템에 적합한 스위칭 망의 구성 방안)

  • Yang, Chung-Ryeol;Kim, Jin-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.947-960
    • /
    • 1996
  • The primary goal for developing high performance ATM switching systems is to minimized the probability of cell loss, cell delay and deterioration of throughput. ATM switching element that is the most suitable for this purpose is the shared buffer memory switch executed by common random access memory and control logic. Since it is difficult to manufacture VLIS(Very Large Scale Integrated circuit) as the number of input ports increased, the used of switching module method the realizes 32$\times$32, 150 Mb/s switch utilizing 8$\times$8, 600Mb/s os 16$\times$16, 150Mb/s unit switch is latest ATM switching technology for small and large scale. In this paper, buffer capacity satisfying total-memory-reduction effect by buffer sharing in a shared buffer memory switch are analytically evalu ated and simulated by computer with cell loss level at traffic conditions, and also features of switching network utilizing the switching module methods in small and large-capacity ATM switching system is analized. Based on this results, the structure in outline of 32$\times$32(4.9Gb/s throughput), 150Mb/s switches under research in many countries is proposed, and eventually, switching-network structure for ATM switching system of small and large and capacity satisfying with above primary goals is suggested.

  • PDF

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

Resolving the 'Gray sheep' Problem Using Social Network Analysis (SNA) in Collaborative Filtering (CF) Recommender Systems (소셜 네트워크 분석 기법을 활용한 협업필터링의 특이취향 사용자(Gray Sheep) 문제 해결)

  • Kim, Minsung;Im, Il
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.137-148
    • /
    • 2014
  • Recommender system has become one of the most important technologies in e-commerce in these days. The ultimate reason to shop online, for many consumers, is to reduce the efforts for information search and purchase. Recommender system is a key technology to serve these needs. Many of the past studies about recommender systems have been devoted to developing and improving recommendation algorithms and collaborative filtering (CF) is known to be the most successful one. Despite its success, however, CF has several shortcomings such as cold-start, sparsity, gray sheep problems. In order to be able to generate recommendations, ordinary CF algorithms require evaluations or preference information directly from users. For new users who do not have any evaluations or preference information, therefore, CF cannot come up with recommendations (Cold-star problem). As the numbers of products and customers increase, the scale of the data increases exponentially and most of the data cells are empty. This sparse dataset makes computation for recommendation extremely hard (Sparsity problem). Since CF is based on the assumption that there are groups of users sharing common preferences or tastes, CF becomes inaccurate if there are many users with rare and unique tastes (Gray sheep problem). This study proposes a new algorithm that utilizes Social Network Analysis (SNA) techniques to resolve the gray sheep problem. We utilize 'degree centrality' in SNA to identify users with unique preferences (gray sheep). Degree centrality in SNA refers to the number of direct links to and from a node. In a network of users who are connected through common preferences or tastes, those with unique tastes have fewer links to other users (nodes) and they are isolated from other users. Therefore, gray sheep can be identified by calculating degree centrality of each node. We divide the dataset into two, gray sheep and others, based on the degree centrality of the users. Then, different similarity measures and recommendation methods are applied to these two datasets. More detail algorithm is as follows: Step 1: Convert the initial data which is a two-mode network (user to item) into an one-mode network (user to user). Step 2: Calculate degree centrality of each node and separate those nodes having degree centrality values lower than the pre-set threshold. The threshold value is determined by simulations such that the accuracy of CF for the remaining dataset is maximized. Step 3: Ordinary CF algorithm is applied to the remaining dataset. Step 4: Since the separated dataset consist of users with unique tastes, an ordinary CF algorithm cannot generate recommendations for them. A 'popular item' method is used to generate recommendations for these users. The F measures of the two datasets are weighted by the numbers of nodes and summed to be used as the final performance metric. In order to test performance improvement by this new algorithm, an empirical study was conducted using a publically available dataset - the MovieLens data by GroupLens research team. We used 100,000 evaluations by 943 users on 1,682 movies. The proposed algorithm was compared with an ordinary CF algorithm utilizing 'Best-N-neighbors' and 'Cosine' similarity method. The empirical results show that F measure was improved about 11% on average when the proposed algorithm was used

    . Past studies to improve CF performance typically used additional information other than users' evaluations such as demographic data. Some studies applied SNA techniques as a new similarity metric. This study is novel in that it used SNA to separate dataset. This study shows that performance of CF can be improved, without any additional information, when SNA techniques are used as proposed. This study has several theoretical and practical implications. This study empirically shows that the characteristics of dataset can affect the performance of CF recommender systems. This helps researchers understand factors affecting performance of CF. This study also opens a door for future studies in the area of applying SNA to CF to analyze characteristics of dataset. In practice, this study provides guidelines to improve performance of CF recommender systems with a simple modification.

  • A Current Research Insight into Function and Development of Adjuvants (면역보조제의 작용 및 개발)

    • Sohn, Eun-Soo;Son, EunWha;Pyo, SuhkNeung
      • IMMUNE NETWORK
      • /
      • v.4 no.3
      • /
      • pp.131-142
      • /
      • 2004
    • In recent years, adjuvants have received much attention because of the development of purified subunit and synthetic vaccines which are poor immunogens and require adjuvants to evoke the immune response. Therefore, immunologic adjuvants have been developed and testing for most of this century. During the last years much progress has been made on development, isolation and chemical synthesis of alternative adjuvants such as derivatives of muramyl dipeptide, monophosphoryl lipid A, liposomes, QS-21, MF-59 and immunostimulating complexes (ISCOMS). Biodegradable polymer microspheres are being evaluated for targeting antigens on mucosal surfaces and for controlled release of vaccines with an aim to reduce the number of doses required for primary immunization. The most common adjuvants for human use today are aluminum hydroxide and aluminum phosphate. Calcium phosphate and oil emulsions have been also used in human vaccination. The biggest issue with the use of adjuvants for human vaccines is the toxicity and adverse side effects of most of the adjuvant formulations. Other problems with the development of adjuvants include restricted adjuvanticity of certain formulations to a few antigens, use of aluminum adjuvants as reference adjuvant preparations under suboptimal conditions, non-availability of reliable animal models, use of non-standard assays and biological differences between animal models and humans leading to the failure of promising formulations to show adjuvanticity in clinical trials. The availability of hundreds of different adjuvants has prompted a need for identifying rational standards for selection of adjuvant formulations based on safety and sound immunological principles for human vaccines. The aim of the present review is to put the recent findings into a broader perspective to facilitate the application of these adjuvants in general and experimental vaccinology.

    Anti-herpes Activity of Vinegar-processed Daphne genkwa Flos Via Enhancement of Natural Killer Cell Activity

    • Uyangaa, Erdenebileg;Choi, Jin Young;Ryu, Hyung Won;Oh, Sei-Ryang;Eo, Seong Kug
      • IMMUNE NETWORK
      • /
      • v.15 no.2
      • /
      • pp.91-99
      • /
      • 2015
    • Herpes simplex virus (HSV) is a common causative agent of genital ulceration and can lead to subsequent neurological disease in some cases. Here, using a genital infection model, we tested the efficacy of vinegar-processed flos of Daphne genkwa (vp-genkwa) to modulate vaginal inflammation caused by HSV-1 infection. Our data revealed that treatment with optimal doses of vp-genkwa after, but not before, HSV-1 infection provided enhanced resistance against HSV-1 infection, as corroborated by reduced mortality and clinical signs. Consistent with these results, treatment with vp-genkwa after HSV-1 infection reduced viral replication in the vaginal tract. Furthermore, somewhat intriguingly, treatment of vp-genkwa after HSV-1 infection increased the frequency and absolute number of $CD3^-NK1.1^+NKp46^+$ natural killer (NK) cells producing interferon (IFN)-${\gamma}$ and granyzme B, which indicates that vp-genkwa treatment induces the activation of NK cells. Supportively, secreted IFN-${\gamma}$ was detected at an increased level in vaginal lavages of mice treated with vp-genkwa after HSV-1 infection. These results indicate that enhanced resistance to HSV-1 infection by treatment with vp-genkwa is associated with NK cell activation. Therefore, our data provide a valuable insight into the use of vp-genkwa to control clinical severity in HSV infection through NK cell activation.

    Switching Element Disjoint Multicast Scheduling for Avoiding Crosstalk in Photonic Banyan-Type Switching Networks(Part I):Graph Theoretic Analysis of Crosstalk Relationship (광 베니언-형 교환 망에서의 누화를 회피하기 위한 교환소자를 달리하는 멀티캐스트 스케줄링(제1부):누화 관계의 그래프 이론적 분석)

    • Tscha, Yeong-Hwan
      • Journal of KIISE:Information Networking
      • /
      • v.28 no.3
      • /
      • pp.447-453
      • /
      • 2001
    • In this paper, we consider the scheduling of SE(switching element)-disjoint multicasting in photonic Banyan-type switching networks constructed with directional couplers. This ensures that at most, one connection holds each SE in a given time thus, neither crosstalk nor blocking will arise in the network. Such multicasting usually takes several routing rounds hence, it is desirable to keep the number of rounds(i.e., scheduling length) to a minimum. We first present the necessary and sufficient condition for connections to pass through a common SE(i.e., make crosstalk) in the photonic Banyan-type networks capable of supporting one-to-many connections. With definition of uniquely splitting a multicast connection into distinct subconnections, the crosstalk relationship of a set of connections is represented by a graph model. In order to analyze the worst case crosstalk we characterize the upper bound on the degree of the graph. The successor paper(Part II)[14] is devoted to the scheduling algorithm and the upper bound on the scheduling length. Comparison with related results is made in detail.

    • PDF

    Handoff Scheme for 'Wibro.WLAN.3G' Integrated Networks in Common Base Station based on SDR (SDR기반 공용기지국환경의 'Wibro.WLAN.3G' 연동망 핸드오프 기법)

    • Kim, Jeong-Seop;Lee, Seung-Ho;Kim, Chang-Bock;Lee, Soon-Hwa
      • The Journal of the Korea Contents Association
      • /
      • v.7 no.1
      • /
      • pp.94-102
      • /
      • 2007
    • Today, packet services for wireless internet is provided by WiBro WLAN 3G, but it is hard to be satisfied seamless connection in each of networks and wide-area service will increase the number of BS(base station) because WiBro and WLAN has been coverage smaller than 3G. that is, communicate which can use continuous and seamless data service is available when user is moving. Therefore, service provider need to integrate network for reducing management expenses. In this paper, we propose advanced handoff algorithm which is considered by 'user demand bandwidth', 'MN(Mobile Node) movement speed' and 'MN service area' and show that simulating result is superior to 'bandwidth allocation', 'QoS(Quality of Service) rate' and 'handoff failure rate'


    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.