• Title/Summary/Keyword: Domain name

Search Result 163, Processing Time 0.021 seconds

ON ϕ-PSEUDO ALMOST VALUATION RINGS

  • Esmaeelnezhad, Afsaneh;Sahandi, Parviz
    • Bulletin of the Korean Mathematical Society
    • /
    • v.52 no.3
    • /
    • pp.935-946
    • /
    • 2015
  • The purpose of this paper is to introduce a new class of rings that is closely related to the classes of pseudo valuation rings (PVRs) and pseudo-almost valuation domains (PAVDs). A commutative ring R is said to be ${\phi}$-ring if its nilradical Nil(R) is both prime and comparable with each principal ideal. The name is derived from the natural map ${\phi}$ from the total quotient ring T(R) to R localized at Nil(R). A prime ideal P of a ${\phi}$-ring R is said to be a ${\phi}$-pseudo-strongly prime ideal if, whenever $x,y{\in}R_{Nil(R)}$ and $(xy){\phi}(P){\subseteq}{\phi}(P)$, then there exists an integer $m{\geqslant}1$ such that either $x^m{\in}{\phi}(R)$ or $y^m{\phi}(P){\subseteq}{\phi}(P)$. If each prime ideal of R is a ${\phi}$-pseudo strongly prime ideal, then we say that R is a ${\phi}$-pseudo-almost valuation ring (${\phi}$-PAVR). Among the properties of ${\phi}$-PAVRs, we show that a quasilocal ${\phi}$-ring R with regular maximal ideal M is a ${\phi}$-PAVR if and only if V = (M : M) is a ${\phi}$-almost chained ring with maximal ideal $\sqrt{MV}$. We also investigate the overrings of a ${\phi}$-PAVR.

A Light-weighted Data Collection Method for DNS Simulation on the Cyber Range

  • Li, Shuang;Du, Shasha;Huang, Wenfeng;Liang, Siyu;Deng, Jinxi;Wang, Le;Huang, Huiwu;Liao, Xinhai;Su, Shen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3501-3518
    • /
    • 2020
  • The method of DNS data collection is one of the most important parts of DNS simulation. DNS data contains a lot of information. When it comes to analyzing the DNS security issues by simulation on the cyber range with customized features, we only need some of them, such as IP address, domain name information, etc. Therefore, the data we need are supposed to be light-weighted and easy to manipulate. Many researchers have designed different schemes to obtain their datasets, such as LDplayer and Thales system. However, existing solutions consume excessive computational resources, which are not necessary for DNS security simulation. In this paper, we propose a light-weighted active data collection method to prepare the datasets for DNS simulation on cyber range. We evaluate the performance of the method and prove that it can collect DNS data in a short time and store the collected data at a lower storage cost. In addition, we give two examples to illustrate how our method can be used in a variety of applications.

Detection Of Unknown Malicious Scripts using Code Insertion Technique (코드 삽입 기법을 이용한 알려지지 않은 악성 스크립트 탐지)

  • 이성욱;방효찬;홍만표
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.663-673
    • /
    • 2002
  • Server-side anti-viruses are useful to protect their domains, because they can detect malicious codes at the gateway of their domains. In prevailing local network, all clients cannot be perfectly controlled by domain administrators, so server-side inspection, for example in e-mail server, is used as an efficient technique of detecting mobile malicious codes. However, current server-side anti-virus systems perform only signature-based detection for known malicious codes, simple filtering, and file name modification. One of the main reasons that they don't have detection features, for unknown malicious codes, is that activity monitoring technique is unavailable for server machines. In this paper, we propose a detection technique that is executed at the server, but it can monitor activities at the clients without any anti-virus features. we describe its implementation.

On UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System (신기통신망 번호체계로서 번호문 번호체계를 이용한 보편개인대표 번호의 구현방안)

  • Ku Jay-Il;Chinn Yong-Ok
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.165-172
    • /
    • 2006
  • This paper describes which UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System. IT is based to UPTN and eNUM and also scribed by NAN of the ortho phonic korean alphabet. other case, in English. the UPAN system is integrated by two kind of numbering system, one is PSTN, another is domain name and address based IP. By this result we contributed personal ID and many kind of numbering of telecommunications services and all kind of personal ID and numbering system by the proper auto-raising registration. Now, we are confirmed this is key solution of ubiquitous networking and defined supra service structures.

  • PDF

Strategic Options for Internationalization in Korean Organizations

  • Yum, Ji-Hwan;Park, Byoung-Jin
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.323-335
    • /
    • 2005
  • Globalization of economy brings both opportunities and threats especially for companies in developing countries such as Korea. Globalization is an opportunity because it may expand the size of market for the company where globalization brings a threat for developing global competitiveness. If the company has already built competitive advantage in its business domain, the company can easily transfer market growth to profit improvement. However, if the company has not developed competitive advantage, globalization of economy will give a serious threat for the survivor of the company. The company might lose its own domestic market share. For the less famous brand of product or company name, international expansion is a challenging strategy. The study evaluated organizational performance of companies that try international expansion by utilizing Miles and Snow's strategy typology. We clustered organizations based on their strategy typology (prospector, analyzer, defender, and reactor) in view of the level of product diversification, new product development instances, level of localization, and autonomy of foreign subsidiary. With the strategy typology, we evaluated international strategy in view of product competitiveness, marketing strategy, human resource strategy, and organizational strategy. The regression result demonstrates that the performance of the company is significantly higher when the company employs prospector strategy. We also found out that product quality and emphasis for developed countries in international expansion are the most important factors for success.

  • PDF

A Alternative Environmental Value Education Program through GENSANGGAI in JAPAN (연찬방식을 통한 대안적 환경가치교육방안)

  • 김태경
    • Hwankyungkyoyuk
    • /
    • v.12 no.1
    • /
    • pp.322-334
    • /
    • 1999
  • In environmental value education, the difference between Ecological and Economic view-point about environmentmust should be considered. Usually, although the differences are unavoidable, because our lifes are inclined to Economic life. But this propensity have become great obstacles to Environmental value education by diluting the fundamental reasons which the nature should be preserved. Furthermore we can't say that environmental problems are not solved just by economic approach, owing to its limits of solving by incentives. So we can say that it is very important to have equalized view-points in the relations of economics and ecology for balanced environmental value education. This study is to alternative environmental value education program, to have equalized view-points in the relations of economics and ecology through the small community located in Japan. The exact name of that program is GENSANGGAI. They have persued to attain a spiritual state of complete absence of ego through this program, and this spiritual state can be important environmental value educaton goal, which make the student to see the evironment with equalized view-points in the interdependence between economics and ecology. we can say that this program can be a kind affective (sentimentally perceived) environmental education program. It can be good environmental education program in affective domain. we can say that equalized view-points is to attain a spiritual state of complete absence of ego. This program is some similar to Kohlberg's latter term theory and Open educationin theory in substantial aspect, he persued Just Community Approach through Kibbutz in Israel. From the basis of his theory, if the GENSANGGAI program, which means harmony between socialization and development of moral stage, individualism and communism.

  • PDF

An Implementation and Evaluation of FQDN Check System to Filter Junk Mail (정크메일 차단을 위한 FQDN 확인 시스템의 구현 및 평가)

  • Kim Sung-Chan;Lee Sang-Hun;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.361-368
    • /
    • 2005
  • Internet mail has become a common communication method around the world because of tremendous Internet service usage increment. In other respect, Most Internet users' mail addresses are exposed to spammer, and the damage of Junk mail is growing bigger and bigger. These days, Junk mail delivery problem is becoming more serious, because this is used for an attack or propagation scheme of malicious code. It's a most dangerous dominant cause for computer system accident. This paper shows the Junk mail filtering model and implementation which is based on FQDN (Fully Qualified Domain Name) check and evaluates it for proposing advanced scheme against Junk mail.

Cache Reliability Enhancing Method for Recursive DNS (Recursive DNS의 캐쉬 정보 신뢰성 향상 기법)

  • Ju, Yong-Wan;Lee, Eung-Jae;Nam, Kwang-Woo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.227-238
    • /
    • 2008
  • As the internet users rise up rapidly, DNS information forgery can cause severe socio-economic damages. However, most studies on DNS information security reached the breaking point in applying to actual circumstances because of the limit of existing DNS system version, the increasement of management burden and etc. The paper proposes the real-time method for detecting cache poisoning of DNS system independent of analysing the DNS forgery types in the current DNS service environment. It also proposes the method of enhancing the reliability for the cache information of Recursive DNS system by post-verifying the cache information of the DNS system.

Dynamic DNS design for HIP (HIP을 적용한 동적 DNS 설계)

  • Jung-Soo Park;In-June Jo
    • The Journal of Engineering Research
    • /
    • v.6 no.2
    • /
    • pp.125-130
    • /
    • 2004
  • In the current Internet, IP addresses does not support Mobility and Multi-homming because it depend on their topological location. To resolve these problems, IETF hip WG introduces Host Identity Protocol that separates the endpoint identifier and locator roles of IP addresses. However the DNS that was presented for the HIP had only a part of the expansion design from the existing DNS function, so it was not an absolute complete method. This paper propose how the dymanic DNS has been designed so that it support the HIP completely. We added the Host Identity Namespace and the Rendezvous Server Namespace, defined the new PRs in DNS.

  • PDF

Confidence Measure of Depth Map for Outdoor RGB+D Database (야외 RGB+D 데이터베이스 구축을 위한 깊이 영상 신뢰도 측정 기법)

  • Park, Jaekwang;Kim, Sunok;Sohn, Kwanghoon;Min, Dongbo
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.9
    • /
    • pp.1647-1658
    • /
    • 2016
  • RGB+D database has been widely used in object recognition, object tracking, robot control, to name a few. While rapid advance of active depth sensing technologies allows for the widespread of indoor RGB+D databases, there are only few outdoor RGB+D databases largely due to an inherent limitation of active depth cameras. In this paper, we propose a novel method used to build outdoor RGB+D databases. Instead of using active depth cameras such as Kinect or LIDAR, we acquire a pair of stereo image using high-resolution stereo camera and then obtain a depth map by applying stereo matching algorithm. To deal with estimation errors that inevitably exist in the depth map obtained from stereo matching methods, we develop an approach that estimates confidence of depth maps based on unsupervised learning. Unlike existing confidence estimation approaches, we explicitly consider a spatial correlation that may exist in the confidence map. Specifically, we focus on refining confidence feature with the assumption that the confidence feature and resultant confidence map are smoothly-varying in spatial domain and are highly correlated to each other. Experimental result shows that the proposed method outperforms existing confidence measure based approaches in various benchmark dataset.