• Title/Summary/Keyword: HTTPS

Search Result 120, Processing Time 0.03 seconds

The study of the change of life with Kim's Ajaeng Sanjo Music Playing (ASMP) played by Hyung Min Kim (https://youtu.be/GTfOIJ7bZbo)

  • Ko, Kyung Ja
    • CELLMED
    • /
    • v.8 no.2
    • /
    • pp.9.1-9.3
    • /
    • 2018
  • The purpose of this article is to discuss that ajaeng sanjo music playing (ASMP) can change a person's life. Ajaeng is often called a Korean cello and is the largest and lowest-pitched instrument in the string instrument family in Korean music. From far away it has a deep, low sound. Its low sound adds to its comfort and peace. Listening to a low tone music can help you calm down and heart-easing. As soon as he listened ajaeng sanjo music he felt that low sound is mildly under his patronage. He felt much more interesting energy and vitality about our minds and bodies are in ajaeng sanjo music. He could immerse himself in playing ajaeng sanjo music (ASMP) for several years. The Korean music, tune is one of expression, meaning it is inseparable from the feeling. Many studies show that low tone music not only activates brain power, but soothes minds. Music always stood by him during difficult times. In a word, ASMP leads him to change of life and music is the language of emotion to him.

On Securing Web-based Educational Online Game Using SSL Protocol (SSL 프로토콜을 이용한 안전한 웹기반 교육용 온라인 게임)

  • Yani, Kadek Restu;Priyana, Yoga;Rusmin, Pranoto H.;RHEE, Kyung-Hyune
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.3
    • /
    • pp.790-798
    • /
    • 2016
  • Currently, web-based online games is becoming popular in supporting learning process due to their effective and efficient tool. However, online games have lack of security aspect, in particular due to increase in the number of personal information leakage. Since the data are transmitted over insecure channel, it will be vulnerable of being intercepted by attackers who want to exploit user's identity. This paper aims to propose an online web-based educational game, Vidyanusa which allows the students to register their personal information using a unique code, a user name and a password. It manages the users according to their schools, subject teachers and class levels. In addition, by adopting a unique code, the confidentiality of the user identity can be kept away from attackers. Moreover, in order to provide a secure data communication between client and server, Secure Socket Layer (SSL) protocol is adopted. The performance of the system after implementing SSL protocol is examined by loading a number of requests for various users. From the experiment result, it can be concluded that the SSL protocol can be applied to web-based educational system in order to offer security services and reliable connection.

Genomic and evolutionary analysis with gluten proteins of major food crops in the Triticeae tribe

  • Kim, Sang Heon;Seo, Yong Weon
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.86-86
    • /
    • 2017
  • Prolamins are the main seed storage proteins in cereals. Gluten proteins seem to be prolamins because their primary structure have the meaningful quantity of proline and glutamine amino acid residues. Gluten proteins are found in crops such as wheat (Triticum aestivum), barley (Hordeum vulgare), and rye (Secale cereale) which are major food crops in the Triticeae tribe. Glutenin and gliadin, hordein, and secalin are typical gluten proteins found in wheat, barley, and rye, respectively. Gluten affect grain quality so that many researches, such as isolation or characterization of their genes, have been carried out. To improve the quality of grains in the Triticeae tribe, it is necessary to understand the relationship within their gluten proteins and their evolutionary changes. The sequences of nucleotides and amino acids of gluten protein including glutenins, gliadins, hordeins, and secalins were retrieved from NCBI (https://www.ncbi.nlm.nih.gov/) and Uniprot (http://www.uniprot.org/). The sequence analysis and the phylogenetic analysis of gluten proteins were performed with various website tools. The results demonstrated that gluten proteins were grouped with their homology and were mostly corresponded with the previous reports. However, some genes were moved, duplicated, or disappeared as evolutionary process. The obtained data will encourage the breeding programs of wheat, barley, rye, and other crops in the Triticeae tribe.

  • PDF

A ChIP-Seq Data Analysis Pipeline Based on Bioconductor Packages

  • Park, Seung-Jin;Kim, Jong-Hwan;Yoon, Byung-Ha;Kim, Seon-Young
    • Genomics & Informatics
    • /
    • v.15 no.1
    • /
    • pp.11-18
    • /
    • 2017
  • Nowadays, huge volumes of chromatin immunoprecipitation-sequencing (ChIP-Seq) data are generated to increase the knowledge on DNA-protein interactions in the cell, and accordingly, many tools have been developed for ChIP-Seq analysis. Here, we provide an example of a streamlined workflow for ChIP-Seq data analysis composed of only four packages in Bioconductor: dada2, QuasR, mosaics, and ChIPseeker. 'dada2' performs trimming of the high-throughput sequencing data. 'QuasR' and 'mosaics' perform quality control and mapping of the input reads to the reference genome and peak calling, respectively. Finally, 'ChIPseeker' performs annotation and visualization of the called peaks. This workflow runs well independently of operating systems (e.g., Windows, Mac, or Linux) and processes the input fastq files into various results in one run. R code is available at github: https://github.com/ddhb/Workflow_of_Chipseq.git.

The effects of Sijo, Korean short lyric song on calm impatience is on YouTube (https://youtu.be/__Ua6p9S0o8) sung by Wol-ha Kim

  • Ko, Kyung Ja
    • CELLMED
    • /
    • v.7 no.3
    • /
    • pp.11.1-11.3
    • /
    • 2017
  • The aim of this article is to argue that a valuable tool to calm impatience is to listen to Sijo. The author seeks to argue that the best way to calm impatience is to listen to Sijo. Sijo refers to a slow and mellow music in the family of Han Ak (Korean music, 韓樂). The term slow is a revered keyword in our culture. "Slow" is a blank word in Han Ak (Korean music, 韓樂). The soul of Wol-ha Kim's Sijo is a beauty of space and easiness. Therefore, her voice will help relax the muscles of the listener and calm the soul. It is akin to the struggles of modern people competing for something excessively but ending up with nothing. We often find that gentle jogging is better than sprinting. Slow music is thus good for one's health. For example, we know that our skin can become beautiful and that real beauty can be obtained only when the body and mind are at rest and in comfort. Physical appearance depends on a healthy mind and body. The author believes that Sijo for music therapy is good for our mental health. If its effectiveness is confirmed after performing tests on animals and humans in an experimental study, we can use this type of music to treat patients with psychological illnesses.

An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks (SSL MITM 프록시 공격에 대한 효과적 방어방법)

  • Lim, Cha-Sung;Lee, Woo-Key;Jo, Tae-Chang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.693-697
    • /
    • 2010
  • In current e-commerce system, it happens that client's confidential information such as credit card numbers, pin numbers, or digital certificate may pass through a web proxy server or an altered proxy server without client's awareness. Even though the confidential information is encrypted and sent through SSL(Secure Sockets Layer) or TLS(Transport Layer Security) protocol, it can be exposed to the risk of sniffing by the digital certificate forgery at the proxy server, which is called the SSL MITM(Man-In-The-Middle) Proxy attack. In this paper, current credit card web-payment systems, which is weak at proxy information alternation attack, are analyzed. A resolution with certificate proxy server is also proposed to prevent the MITM attack.

Sketch Recognition Using LSTM with Attention Mechanism and Minimum Cost Flow Algorithm

  • Nguyen-Xuan, Bac;Lee, Guee-Sang
    • International Journal of Contents
    • /
    • v.15 no.4
    • /
    • pp.8-15
    • /
    • 2019
  • This paper presents a solution of the 'Quick, Draw! Doodle Recognition Challenge' hosted by Google. Doodles are drawings comprised of concrete representational meaning or abstract lines creatively expressed by individuals. In this challenge, a doodle is presented as a sequence of sketches. From the view of at the sketch level, to learn the pattern of strokes representing a doodle, we propose a sequential model stacked with multiple convolution layers and Long Short-Term Memory (LSTM) cells following the attention mechanism [15]. From the view at the image level, we use multiple models pre-trained on ImageNet to recognize the doodle. Finally, an ensemble and a post-processing method using the minimum cost flow algorithm are introduced to combine multiple models in achieving better results. In this challenge, our solutions garnered 11th place among 1,316 teams. Our performance was 0.95037 MAP@3, only 0.4% lower than the winner. It demonstrates that our method is very competitive. The source code for this competition is published at: https://github.com/ngxbac/Kaggle-QuickDraw.

Robust URL Phishing Detection Based on Deep Learning

  • Al-Alyan, Abdullah;Al-Ahmadi, Saad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2752-2768
    • /
    • 2020
  • Phishing websites can have devastating effects on governmental, financial, and social services, as well as on individual privacy. Currently, many phishing detection solutions are evaluated using small datasets and, thus, are prone to sampling issues, such as representing legitimate websites by only high-ranking websites, which could make their evaluation less relevant in practice. Phishing detection solutions which depend only on the URL are attractive, as they can be used in limited systems, such as with firewalls. In this paper, we present a URL-only phishing detection solution based on a convolutional neural network (CNN) model. The proposed CNN takes the URL as the input, rather than using predetermined features such as URL length. For training and evaluation, we have collected over two million URLs in a massive URL phishing detection (MUPD) dataset. We split MUPD into training, validation and testing datasets. The proposed CNN achieves approximately 96% accuracy on the testing dataset; this accuracy is achieved with URL schemes (such as HTTP and HTTPS) removed from the URL. Our proposed solution achieved better accuracy compared to an existing state-of-the-art URL-only model on a published dataset. Finally, the results of our experiment suggest keeping the CNN up-to-date for better results in practice.

Video Quality Representation Classification of Encrypted HTTP Adaptive Video Streaming

  • Dubin, Ran;Hadar, Ofer;Dvir, Amit;Pele, Ofir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3804-3819
    • /
    • 2018
  • The increasing popularity of HTTP adaptive video streaming services has dramatically increased bandwidth requirements on operator networks, which attempt to shape their traffic through Deep Packet inspection (DPI). However, Google and certain content providers have started to encrypt their video services. As a result, operators often encounter difficulties in shaping their encrypted video traffic via DPI. This highlights the need for new traffic classification methods for encrypted HTTP adaptive video streaming to enable smart traffic shaping. These new methods will have to effectively estimate the quality representation layer and playout buffer. We present a new machine learning method and show for the first time that video quality representation classification for (YouTube) encrypted HTTP adaptive streaming is possible. The crawler codes and the datasets are provided in [43,44,51]. An extensive empirical evaluation shows that our method is able to independently classify every video segment into one of the quality representation layers with 97% accuracy if the browser is Safari with a Flash Player and 77% accuracy if the browser is Chrome, Explorer, Firefox or Safari with an HTML5 player.

Web Application Attack Prevention by Traffic Analysis (트래픽 분석에 의한 웹 어플리케이션 공격 방지)

  • Chang, Moon-Soo;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.139-146
    • /
    • 2008
  • Despite of information security installation, leakage of personal information in web services has not decreased. This is because traffics to web applications are still vulnerable by permitting external sources to access services in port HTTF 80 and HTTPS 443, even with firewall systems in place. This thesis analyzes various attack patterns resulted from web service environment and vulnerable traffic and categorizes the traffics into normal and abnormal traffics. Also this proposes ways to analyze web application attack patterns from those abnormal traffics based on weak points warned in OWASF(Open Web Application Security Project), design a system capable of detect and isolate attacks in real time, and increase efficiency of preventing attacks.

  • PDF