• Title/Summary/Keyword: Copy Network

Search Result 139, Processing Time 0.028 seconds

Detection of Colluded Multimedia Fingerprint using LDPC and BIBD (LDPC와 BIBD를 이용한 공모된 멀티미디어 핑거프린트의 검출)

  • Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.68-75
    • /
    • 2006
  • Multimedia fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. Differ from a symmetric/asymmetric scheme, fingerprinting schemes, only regular user can know the inserted fingerprint data and the scheme guarantee an anonymous before recontributed data. In this paper, we present a scheme which is the algorithm using LDPC(Low Density Parity Check) for detection of colluded multimedia fingerprint and correcting errors. This proposed scheme is consists of the LDPC block, Hopfield Network and the algorithm of anti-collusion code generation. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the linear collusion attack(average, AND and OR) and LD% block for the error bits correction confirmed that can correct error until AWGN 0dB.

A Cache Consistency Control for B-Tree Indices in a Database Sharing System (데이타베이스 공유 시스템에서 B-트리 인덱스를 위한 캐쉬 일관성 제어)

  • On, Gyeong-O;Jo, Haeng-Rae
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.593-604
    • /
    • 2001
  • A database sharing system (DSS) refers to a system for high performance transaction processing. In the DSS, the processing nodes are coupled via a high speed network and share a common database at the disk level. Each node has a local memory and a separate copy of operating system. To reduce the number of disk accesses, the node caches data pages and index pages in its memory buffer. In general, B-tree index pages are accessed more often and thus cached at more processing nodes, than their corresponding data pages. There are also complicated operations in the B-tree such as Fetch, Fetch Next, Insertion and Deletion. Therefore, an efficient cache consistency scheme supporting high level concurrency is required. In this paper, we propose cache consistency schemes using identifiers of index pages and page_LSN of leaf page. The propose schemes can improve the system throughput by reducing the required message traffic between nodes and index re-traversal.

  • PDF

Measures to Prevent the Leakage of Military Internal Information through the Analysis of Military Secret Leakage Cases: Focusing on Insider Behaviors (군사기밀 유출 사례 분석을 통한 군 내부정보 유출 방지 방안 : 내부자 행위 중심으로)

  • Eom, Jung-Ho;Kim, Nam-Uk
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.85-92
    • /
    • 2020
  • None of the recent cases of military secret leakages have leaked internal information using networks. This is because the Internet and the Intranet are physically separated, and has a difficult process when transmitting and receiving data through the Internet. Therefore, most of the leaked paths are to copy and hand over secrets, shoot and send them with a smartphone, or disclose after remembering them. So, the technology of blocking and detecting military secret leakages through the network is not effective. The purpose of this research is to propose a method to prevent information leakage by focusing on the insider behaviors, the subject of leakage, rather than the military secret. The first is a preventive measure to prevent the leakage behavior of military secrets, the second is to block suspicious access to the military secret data, and the last is to detect the leakage behavior by insiders.

A Design on Security Model of Domestic Internet-based Broadcasting Service (국내 인터넷기반 방송서비스의 보안 모델 설계)

  • Seo, Hee-Suk;Kim, Sung-Jun;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.183-190
    • /
    • 2012
  • Internet Protocol Television(IPTV) is the use of an IP broadband network to deliver television (cable TV type) services to the end user. Traditional telecommunications service providers as well as alternate service providers and Internet service providers can utilize their IP networks (and broadband consumer access) to deliver broadcast TV, Video on Demand (VOD) and other Internet services to the consumer. As digital technologies progress, illegal copy and redistribution of IPTV content become easier and simpler. Therefore it is required to protect IPTV content or service. In this paper, we analyze the security threats and requirements. We also discuss related issues and solutions for IPTV.

Study on Cartographic Characteristics of Wood Block "DaedongyYeojiJeondo" (목판본 "대동여지전도"의 지도적 특징에 대한 연구)

  • Lee, Kibong
    • Journal of the Korean association of regional geographers
    • /
    • v.20 no.3
    • /
    • pp.300-314
    • /
    • 2014
  • The study is to systematically review "DaedongYeojiJeondo", the mid-sized wood block map of Chosun to shed light on the cartographic characteristics not discovered by previous studies. First it was discovered that Kim Jung-ho is the developer of the map as the distance information from Seoul to towns is identical with the information on "Daedong Jiji" the manuscript map drawn by Kim Jung-ho himself (assumed to live from 1804~1866) that is still remaining unfinished. Second, the information Kim Jung-ho wanted to specify most precisely and specifically was distance from Seoul to towns and for this purpose he invented unique symbols for towns in tiny size on the map. Third, in selecting information to mark on the map including road network, street information, mountain routes and streams and location of islands, "DaedongYeojiJeondo" is not just a simple smaller copy of "DaedongYeojido" but an independent creative work as it is much different in many aspects of quality. Forth, but still "DaedongYeojiJeondo" and "DaedongYeojido" have something in common in the fact both of them tried to mark land and mountain routes and streams most precisely and specifically.

  • PDF

Heterologous Expression of a Model Polyketide Pathway in Doxorubicin-overproducing Streptomyces Industrial Mutants (방선균 항생제 고생산 산업균주를 기반으로 한 모델 폴리케타이드의 이종숙주 발현)

  • Kim, Hye-Jin;Lee, Han-Na;Kim, Eung-Soo
    • Microbiology and Biotechnology Letters
    • /
    • v.40 no.1
    • /
    • pp.10-16
    • /
    • 2012
  • The Streptomyces peucetius OIM (Overproducing Industrial Mutant) strain is a recursively-mutated and optimally-screened strain used for the industrial production of polyketide antibiotics, such as doxorubicin (DXR). Using the S. peucetius OIM mutant strain as a surrogate host, a model minimal polyketide pathway for aloesaponarin II, an actinorhodin shunt product, was cloned in a high-copy conjugative plasmid, followed by functional pathway expression and quantitative metabolite analysis. The level of aloesaponarin II production was noted as being significantly higher in the OIM strain than in the wild-type S. peucetius, as well as in the regulatory network-stimulated S. coelicolor mutant strain. Moreover, the aloesaponarin II production level was seen to be even higher in a down-regulator $wblA_{spe}$-deleted S. peucetius OIM strain, implying that the rationally-engineered S. peucetius OIM mutant strain could be used as an efficient surrogate host for the high expression of foreign polyketide pathways.

Status of Document Delivery, Interlibrary Loan Services and Use of Information Technology in Korean Special Libraries (국내 특수 도서관에서의 원문제공과 상호대차 서비스 및 정보기술의 활용 현황)

  • Rieh Hae-young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.31 no.3
    • /
    • pp.53-73
    • /
    • 1997
  • To find out the status of document delivery and interlibrary loan services and the use of information technology in special libraries, questionnaires were sent to 328 special Libraries nation wide with at least 1 librarian, listed In the Korean Libraries Statistics 1994-1995(1996). $46.6\%$ were returned and 152 Questionnaires were analyzed. For document delivery, $61.3\%$ use BLDSC$47.5\%$ use KINITI. 87 libararies $(57.2\%)$ participate In interlibrary loan activities. To send requests, FAX and telephone is used the most, while FAX and print copy is used the most to receive the requested documents. $45-75\%$ use various information technology including online databases, Internet, e-mail, etc., and the use of information technology was related to the budget of the libraries. The costs, budgets, and slowness was the problems raised by the most. To improve the document delivery services, the most urgent thing is establishing cooperative system using BBS or Internet. Network systems to facilitate interlibrary loan should be established ultimately.

  • PDF

A Study on the Revitalization of Medical School Libraries through the Analysis of Current Situation (의과대학도서관 현황 분석을 통한 활성화 방안 연구)

  • Shin, Youngji;Noh, Yoounhee
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.3
    • /
    • pp.191-216
    • /
    • 2019
  • This study is to suggest the revitalization plan of the medical school libraries in the future, on the basis of analysis for the overall operation situation of the medical school libraries among the medical libraries. So based on the website, it is divided into 1) whether independent homepage exists, 2) service target, 3) books, 4) classification system, 5) manpower, 6) facilities (area, number of seats available), 7) equipment (pc, printer, copy machine, etc.), 8) services, and then analyzed. Consequently, as the ways to revitalize the medical libraries, firstly, it is necessary to establish legal standards and develop guidelines for the medical school library's books, sizes, librarians, etc. Secondly, establishing a cooperative community network between medical school libraries is necessary. Thirdly, policies such as support at the national level, specialization education of librarians, development of operational guidelines, and activation of inter-library networks are needed to revitalize the medical school libraries. It is also expected that research on the actual situation of the medical libraries should be conducted at the national level or at the level of the association of medical libraries.

The design and Implementation of Web Security System using the Cookies (쿠키를 이용한 웹 보안시스템 설계 및 구현)

  • 송기평;박기식;한승희;조인준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.3-14
    • /
    • 2001
  • A Web server makes use of the HTTP(Hyper Text Transfer Protocol) to communicate with a client. The HTTP is a stateless protocol; the server does not maintain any state information for ongoing interactions with the client. Therefore, the HTTP inevitably requires additional overhead as repeating data key-in to user for continuing communications. This overhead in Web environment can be resolved by the cookie technologies. However, the cookie is usually unsecured due to the clear-text to transfer on the network and to store in the file. That is, information in the cookie is easy to exposure, copy, and even change. In this paper, we propose a secure cookie mechanism appropriate to Web environment, and then present a design and implement of secure Web system based on the scheme. The Web system can be used to any web environment. It also provides some security services, such as confidentiality, authentication, integrity.

Ultrastructural changes in cristae of lymphoblasts in acute lymphoblastic leukemia parallel alterations in biogenesis markers

  • Ritika Singh;Ayushi Jain;Jayanth Kumar Palanichamy;T. C. Nag;Sameer Bakhshi;Archna Singh
    • Applied Microscopy
    • /
    • v.51
    • /
    • pp.20.1-20.12
    • /
    • 2021
  • We explored the link between mitochondrial biogenesis and mitochondrial morphology using transmission electron microscopy (TEM) in lymphoblasts of pediatric acute lymphoblastic leukemia (ALL) patients and compared these characteristics between tumors and control samples. Gene expression of mitochondrial biogenesis markers was analysed in 23 ALL patients and 18 controls and TEM for morphology analysis was done in 15 ALL patients and 9 healthy controls. The area occupied by mitochondria per cell and the cristae cross-sectional area was observed to be significantly higher in patients than in controls (p-value=0.0468 and p-value<0.0001, respectively). The mtDNA copy numbers, TFAM, POLG, and c-myc gene expression were significantly higher in ALL patients than controls (all p-values<0.01). Gene Expression of PGC-1α was higher in tumor samples. The analysis of the correlation between PGC-1α expression and morphology parameters i.e., both M/C ratio and cristae cross-sectional area revealed a positive trend (r=0.3, p=0.1). The increased area occupied by mitochondria and increased cristae area support the occurrence of cristae remodelling in ALL. These changes might reflect alterations in cristae dynamics to support the metabolic state of the cells by forming a more condensed network. Ultrastructural imaging can be useful for affirming changes occurring at a subcellular organellar level.