• Title/Summary/Keyword: Data integrity

Search Result 1,384, Processing Time 0.026 seconds

Web contents deformation detection method by BHO (BHO 이용한 웹 컨텐츠 변조 탐지 방법)

  • Mo, Jeong-Hoon;Chung, Man-Hyun;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.655-663
    • /
    • 2011
  • Recently, with improvement of internet service technology, web service has been affecting the environment for computing user. Not only current events, economics, game, entertainment, but also personal financial system is processed by web pages through internet. When data transmission is implemented on the internet, webpage acquire text form code and transform them to DOM information, and then shows processed display to user by web browser. However, those information are not only easily accessed by diversified route, but also easily deformed by intentional purpose. Furthermore, it is also possible to acquire logon information of users and certification information by detouring security mechanism. Therefore, this dissertation propose the method to verify integrity of web contents by using BHO which is one of the Add-On program based on MS Internet Explorer platform which is one of major web browser program designed by MicroSoft to detect any action of webpage deformation.

The Experience of People with HIV/AIDS : A Phenomenological Study (HIV 감염자의 생활 경험에 관한 현상학적 연구)

  • Kim, Eun Young;Lee, Myoung Sun
    • Korean Journal of Adult Nursing
    • /
    • v.12 no.4
    • /
    • pp.497-506
    • /
    • 2000
  • The purpose of this phenomenological study was to explore and describe the experience of people with HIV/AIDS. Three men and three women with HIV/AIDS participated in the study. They were asked open-ended and descriptive questions in order for them to talk about their experience in their own terms. Interviews were audiotaped and transcribed to maintain data integrity and to reduce perceptual bias. The transcripts were analyzed by the Colaizzi method. Member checks from the participants were used to validate the emergent themes. Seven themes emerged from the analysis. 1. People with HIV/AIDS have a strong impact and emotional reaction when receiving positive HIV test results. 2. All people with HIV/AIDS attempt to conceal HIV infection because of fear of stigma or rejection. 3. After the initial brief traumatic reaction to HIV/AIDS diagnosis, all participants feel lonely because they had no one to express or share their own experiences. 4. People with HIV/AIDS reflect on their life, think about the death and dying process and they become depressed. 5. Most participants feel that the family members who know his/her diagnosis are a big source of support. 6. According to the normativeness of infection route of HIV, the degree of guilty feeling differs among participants. 7. Although all participants think medication is a lifeline, the adherence to medication is not maintained because of side effects, denial and concealment of HIV/AIDS. The results of this study may help nurses and other health care workers to implement more efficient nursing strategies for people with HIV/AIDS by more deeply understanding their experience.

  • PDF

Comparative Studies to Evaluate Relative in vitro Potency of Luteolin in Inducing Cell Cycle Arrest and Apoptosis in HaCaT and A375 Cells

  • George, Vazhapilly Cijo;Kumar, Devanga Ragupathi Naveen;Suresh, Palamadai Krishnan;Kumar, Sanjay;Kumar, Rangasamy Ashok
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.2
    • /
    • pp.631-637
    • /
    • 2013
  • Luteolin is a naturally occurring flavonoid present in many plants with diverse applications in pharmacology. Despite several studies elucidating its significant anti-cancer activity against various cancer cells, the mechanism of action in skin cancer is not well addressed. Hence, we investigated the effects of luteolin in HaCaT (human immortalized keratinocytes) and A375 (human melanoma) cells. The radical scavenging abilities of luteolin were determined spectrophotometrically, prior to a cytotoxic study (XTT assay). Inhibitory effects were assessed by colony formation assay. Further, the capability of luteolin to induce cell cycle arrest and apoptosis were demonstrated by flow cytometry and cellular DNA fragmentation ELISA, respectively. The results revealed that luteolin possesses considerable cytotoxicity against both HaCaT and A375 cells with $IC_{50}$ values of 37.1 ${\mu}M$ and 115.1 ${\mu}M$, respectively. Luteolin also inhibited colony formation and induced apoptosis in a dose and time-dependent manner by disturbing cellular integrity as evident from morphological evaluation by Wright-Giemsa staining. Accumulation of cells in G2/M (0.83-8.14%) phase for HaCaT cells and G0/G1 (60.4-72.6%) phase for A375 cells after 24 h treatment indicated cell cycle arresting potential of this flavonoid. These data suggest that luteolin inhibits cell proliferation and promotes cell cycle arrest and apoptosis in skin cancer cells with possible involvement of programmed cell death, providing a substantial basis for it to be developed into a potent chemopreventive template for skin cancer.

In situ Hybridization for the Detection and Localization of the Bitter Taste Receptor Tas2r108 in the Murine Submandibular Gland

  • Ki, Su-Young;Cho, Young-Kyung;Chung, Ki-Myung;Kim, Kyung-Nyun
    • International Journal of Oral Biology
    • /
    • v.41 no.2
    • /
    • pp.97-103
    • /
    • 2016
  • Mammals have 3 pairs of major salivary glands i.e., the parotid, submandibular, and sublingual glands. Saliva secretion of these glands is modulated by taste perception. Salivary glands are composed mainly of acinar and ductal cells. Primary saliva is secreted by acinar cells and modified during ductal flow. Recently, of the murine 35 bitter taste receptors, Tas2r108 was expressed at highest levels in the submandibular gland by qPCR. Further, Tas2r108-transfected cells respond to a range of bitter compounds, such as denatonium, quinine, colchicine, diphenidol, caffeine and dapson. The objective of the present study was to characterize the expression of Tas2r108 mRNA in acinar and/or ductal cells of the submandibular gland using in situ hybridization (ISH). Male 42-60 days old DBA2 mice were used in the study. Messenger RNAs were extracted from the submandibular gland for generating digoxigenin (DIG) labeled-cRNA probes. These probes were transcribed in anti-sense and sense orientation using T7 RNA polymerase. Dot blot hybridization was performed using DIG labeled-cRNA probes, in order to estimate integrity and optimal diluting concentration of these probes. Subsequently, ISH was performed on murine submandibular gland to detect Tas2r108 mRNA. Dot blot hybridization data demonstrated that Tas2r108 DIG labeled-cRNA anti-sense probes specifically detected Tas2r108 cDNA. ISH results showed that the anti-sense probes labeled acinar and ductal cells in the submandibular gland, whereas no staining was visible in sense controls. Interestingly, the Tas2r108 expression levels were higher in acinar than ductal cells. These results suggested that Tas2r108 might be more associated with primary saliva secretion than with ductal modification of saliva composition.

Development of Fiber Optic Accelerometer for Third-Party Damage Detection (타공사 감시를 위한 광섬유 가속도계의 개발)

  • Park, Ho-Rim;Choe, Jae-Bung;Kim, Yeong-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.25 no.10
    • /
    • pp.1551-1558
    • /
    • 2001
  • Recently, a number of underground pipelines have been drastically increased. The integrity of these buried pipelines, especially gas transmitting pipelines, is of importance due to an explosive characteristic of natural gas. The third party damage is known as one of the most critical factor which causes fatal accidents. For this reason, a number of systems detecting third party damage are under development. The major concern in the development of third party damage detection system is to transmit vibration signals out of accelerometer to signal conditioner and data acquisition system without any interference caused by noise. The objective of this paper is to develope a fiber optic accelerometer applicable to third party damage detection system. A fiber optic accelerometer was developed by use of combining principles of one degree of freedom vibration model and an extrinsic Fabry-Perot interferometer. The developed fiber optic accelerometer was designed to perform with a sensitivity of 0.06mVg, a frequency range of less than 6kHz and an amplitude range of -200g to 200g. The developed, accelerometer was compared with a piezoelectric accelerometer and calibrated. In order to verify the developed accelerometer, the field experiment was performed. From the field experiment, vibration signals and the location of impact were successfully detected. The developed accelerometer is expected to be used for the third party damage detection system which requires long distance transmission of signals.

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

A Blind Watermarking Algorithm of 3D Mesh Model for Rapid Prototyping System Application (RP 시스템 적용을 위한 3차원 메쉬 모델의 블라인드 워터마킹)

  • Ji-Zhe, Cui
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12C
    • /
    • pp.1194-1202
    • /
    • 2007
  • In this paper, we proposed a blind watermarking algorithm to apply to the rapid prototyping system. The 3D mesh model is used in the step of the CAD modeling before the making of the prototype system of the rapid prototyping system. STL type mesh modeling which is used in this system reduces the error of the system and improves the accuracy of the system. In the step of the CAD modeling, some transformations which do not change the model accuracy are used, but some transformations which change the model accuracy are not used because the mesh model error is related to the accuracy of the prototype system. Most watermarking algorithms embedded a specific random noise as the watermark information into the model. These kinds of the algorithms are not proper to the 3D model watermarking. The proposed algorithm can be used for the accurate prototyping system because it does not change the model after the watermark embedding This means it can be used for the copyright marking and the data integrity.

Sigma Hub for Efficiently Integrating USB Storages (USB 저장장치의 효율적인 통합을 위한 시그마 허브)

  • Choi, O-Hoon;Lim, Jung-Eun;Na, Hong-Seok;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.35 no.6
    • /
    • pp.533-543
    • /
    • 2008
  • With technological advances for storage volume size of a semiconductor memory, USB storage is made as products to support a high capacity storage. Hereby, consumers discard pint-sized USB storages which they already had, or do not use them efficiently. To integrate and unify these pint-sized USB storages as one big USB storage, we proposed Sigma Hub. It can be grouping multiple USB storages, which have each different volume size of memory storage, as logical unity Storage through USB Hub. The proposed Sigma Hub includes Sigma Controller as a core management module to unify the multiple USB storages in transaction level layer. Sigma controller can efficiently control transaction packet in Sigma Hub through a USB Storage-Integration algorithms which ensure an integrity for data read and write processes. Consequently, Sigma Hub enables the use of USB storage that is logical unity.

ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation (이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법)

  • Park, Se Jin;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.311-320
    • /
    • 2018
  • Recently, the use of digital audio and video as proof in criminal and all kinds of litigation is increasing, and scientific investigation using digital forensic technique is developing. With the development of computing and file editing technologies, anyone can simply manipulate video files, and the number of cases of manipulating digital data is increasing. As a result, the integrity of the evidence and the reliability of the evidence Is required. In this paper, we propose a technique for extracting the Electrical Network Frequency (ENF) through a grid of power grids according to the geographical environment for power supply, and then performing signal processing for peak detection using QIFFT. Through the detection algorithm using the standard deviation, it was confirmed that the video file was falsified with 73% accuracy and the forgery point was found.

The Integrity Verification of Tube-end Sleeve by ECT (와전류탐상검사에 의한 튜브엔드 슬리브 건전성 검증)

  • Kim, Su Jin;Kwon, Kyung Joo;Suk, Dong Hwa;Park, Ki Tae
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.11 no.1
    • /
    • pp.20-24
    • /
    • 2015
  • Steam generator(S/G) tubes in pressurized water reactor (PWR's) are subject to several types of degradation. This degradation includes denting, pitting, intergranular attack(IGA), intergranular stress corrosion cracking(IGSCC), fatigue, fretting and wear. Degradation can be derived from either the primary side(inside) or the secondary side(outside) of the tube. Recent issue for tube degradation in domestic steam generator is the tube end cracking on seal weld region. The seal weld region at the tube end and tube itself is regarded as a pressure boundary between the primary side and the secondary side. One of the Westinghouse Model-F S/G has experienced tube end cracking and its number of plugging approximately becomes to the operating limit up to 5% due to tube end cracking which was reported as SAI/MAI(single/multiple axial indication) or SCI/MCI(Single/multiple circumferential indication) from the results of eddy current testing. Eddy current mock-up test was carried out to determine the origin of cracking whether it is from weld zone area or parent tube. This result was helpful to analyze crack location on ECT data. Correct action on this problem was the installation of tube-end sleeve. Last year, after removing 340 installed plugs from tubes, selected 269 tubes took tube-end sleeve installation. Tube-end sleeve brought pressure boundary from parent tube to installed sleeve tube. Tube-end sleeve has the benefit of reducing outage period and increasing more revenue than replacing S/G. This paper is provided to assist interest parties in effectively understanding this issue.