• Title/Summary/Keyword: ISMAEL

Search Result 25, Processing Time 0.026 seconds

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL) (취약성 점검 코드를 자동으로 생성하는 에이전트를 통한 통합 취약성 분석 시스템)

  • 김수용;서정석;조상현;김한성;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.111-122
    • /
    • 2002
  • Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.

Experimental Tracheal Replacement: Angiogenesis and Null Apoptosis Promote Stenosis

  • Santibanez-Salgado, J. Alfredo;Sotres-Vega, Avelina;Gaxiola-Gaxiola, Miguel O.;Villalba-Caloca, Jaime;Lozoya, Karen Bobadilla;Zuniga-Ramos, Joaquin A.
    • Journal of Chest Surgery
    • /
    • v.54 no.3
    • /
    • pp.191-199
    • /
    • 2021
  • Background: Tracheal replacement is a challenge for thoracic surgeons due to stenosis in the trachea-prosthesis anastomosis. We propose that stenosis occurs due to fibrosis as a result of an abnormal healing process, characterized by an increased expression of wound healing growth factors (vascular endothelial growth factor [VEGF], survivin, and CD31), which promote angiogenesis and decrease apoptosis. We analyzed the immunoreactivity of VEGF, survivin, CD31, and caspase-3 in the development of fibrotic stenosis in prosthetic tracheal replacement. Methods: Fourteen dogs were operated on: group I (n=7) received a 6-ring cervical tracheal segment autograft, while in group II (n=7), a 6-ring segment of the cervical trachea was resected and tracheal continuity was restored with a Dacron prosthesis. The follow-up was 3 months. Immunoreactivity studies for VEGF, survivin, CD31, and caspase-3 were performed. A statistical analysis was done using the Wilcoxon signed rank test. Results: Four animals in group I were euthanized on the 10th postoperative day due to autograft necrosis. Three animals completed the study without anastomotic stenosis. Moderate expression of VEGF (p=0.038), survivin (p=0.038), and CD31 (p=0.038) was found. All group II animals developed stenosis in the trachea-prosthesis anastomotic sites. Microscopy showed abundant collagen and neovascularization vessels. Statistically significant immunoreactive expression of VEGF (p=0.015), survivin (p=0.017), and CD31 (p=0.011) was observed. No expression of caspase-3 was found. Conclusion: We found a strong correlation between fibrosis in trachea-prosthesis anastomoses and excessive angiogenesis, moderate to intense VEGF, CD31, and survivin expression, and null apoptotic activity. These factors led to uncontrolled collagen production.

Integrated Security Manager with Agent-based automatic vulnErability checking code generating scanner from intermediate vulnerability checking Language (ISMAEL) (매개 취약점 점검 언어로부터 점검 코드를 자동으로 생성하는 에이전트를 이용한 취약점 관리 시스템)

  • 김수용;서정석;김한성;조상현;임채호;차성덕
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.453-458
    • /
    • 2001
  • 악의의 침입자로부터 시스템을 보호하기 위한 첫 번째 단계는 시스템의 취약점을 분석하는 일이다. 기존의 시스템 취약점 분석 방법은 주로 네트워크 기반 취약점 점검 도구에 의존해 왔다. 하지만, 네트워크 기반 취약점 점검 도구는 대상 시스템의 제한된 정보만을 이용하여 취약점을 점검하기 때문에 시스템의 모든 취약점에 대한 검사가 불가능하다는 단점이 있다. 호스트 기반 취약점 점검 도구를 사용하면 시스템 내부의 모든 정보를 이용할 수 있지만, 시스템의 OS 종류나 버전에 따라 각기 다른 호스트 기반 취약점 점검 도구를 개발해야 한다는 단점이 있다. 또한, 호스트 기반 취약점 점검 도구들은 많은 호스트들을 동시에 점검하기 힘들다는 점이 문제로 지적되고 있다. 본 논문에서는 호스트 기반 취약점 점검 도구를 에이전트로 구현하여 대상 시스템에 설치하고, 하나의 관리 프로그램에서 여러 에이전트들을 관리함으로써 동시에 많은 호스트의 취약점들을 관리할 수 있는 모델인 ISMAEL을 제시한다. 또한 ISMAEL은 OS에 맞는 여러 호스트 기반 취약점 점검 도구들을 개발해야 하는 문제를 해결하기 위해 OS에 독립인 부분만을 뽑아내고, 그 외 OS에 종속된 부분은 Library 형태로 제공하여, OS에 독립인 부분에서 이 Library를 참조하여 특정 취약점 점검 코드를 자동 생성하고 이를 실행하여 취약성 여부를 판단할 수 있는 구조를 채택하고 있다.

  • PDF

Effects of Bulb Circumference and Cultivar on the Cut Flower Quality in Lily. (백합의 품종 및 구근크기가 절화품질에 미치는 영향)

  • Kim, Jae Yun;Hong, Jong Won;Han, Koh Woon;Jang, Eu Jean;Pak, Chun Ho
    • FLOWER RESEARCH JOURNAL
    • /
    • v.19 no.4
    • /
    • pp.197-201
    • /
    • 2011
  • This study was carried out to investigate cut flower quality bulb circumference and cultivars affecting 7 different cultivars to produce high quality cut flower lilies. To determine the effects of bulb circumference on growth and cut flower quality of 7 different cultivars, Lilium oriental hybrid 'Chilli', 'Ismael', 'Medusa', 'Mother's Choice', 'Siberia', 'Sorbonne', and 'Yelloween' were tested. After cut flower quality experiment, the highest 1st flower bud length and cut flower height were 'Medusa' and 'Mother's Choice' respectively. Most plants had over $30^{\circ}$ stem bending angle except for 'Mother's Choice', and 'Ismael'. The study shows that the bigger bulb circumference has the better 1st peduncle diameter, inflorescence length, stem diameter, number of flowers, and fresh weight. Bulb circumference affects the 1st flower bud length, cut flower height and number of flowers. Stem bending angle, however, is affected by neither bulb circumference nor cultivar. In conclusion, growth, cut flower quality and vase life were affected by the bulb circumference rather than cultivar.

Modeling of a Four-Quadrant Switched Reluctance Motor Drive on EMTDC/PSCAD

  • El-Samahy, Ismael;Marei, Mostafa I.;El-Saadany, Ehab F.
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.1
    • /
    • pp.68-78
    • /
    • 2008
  • This paper introduces a complete package for SRM drive on Power System Computer-Aided Design/Electromagnetic Transients (PSCAD/EMTDC). A three-phase SRM drive is modeled and simulated on PSCAD. The motor is modeled using an accurate nonlinear analytical model that takes into consideration the machine nonlinearities. A current control algorithm is applied for torque ripple minimization to achieve a smooth output torque which is necessary for high performance applications. The motor drive is tested for four-quadrant operations. The modeled SRM is capable of operating as a motor or generator during clockwise and counterclockwise motions. The proposed package helps in understanding the operational principles of switched reluctance motors, investigating the dynamic characteristics of SRM drives, and achieving a high performance dynamic control task.

ESSENTIAL EXACT SEQUENCES

  • Akray, Ismael;Zebari, Amin
    • Communications of the Korean Mathematical Society
    • /
    • v.35 no.2
    • /
    • pp.469-480
    • /
    • 2020
  • Let R be a commutative ring with identity and M a unital R-module. We give a new generalization of exact sequences called e-exact sequences. A sequence $0{\rightarrow}A{\longrightarrow[20]^f}B{\longrightarrow[20]^g}C{\rightarrow}0$ is said to be e-exact if f is monic, Imf ≤e Kerg and Img ≤e C. We modify many famous theorems including exact sequences to one includes e-exact sequences like 3 × 3 lemma, four and five lemmas. Next, we prove that for torsion-free module M, the contravariant functor Hom(-, M) is left e-exact and the covariant functor M ⊗ - is right e-exact. Finally, we define e-projective module and characterize it. We show that the direct sum of R-modules is e-projective module if and only if each summand is e-projective.

THE HOMOLOGY REGARDING TO E-EXACT SEQUENCES

  • Ismael Akray;Amin Mahamad Zebari
    • Communications of the Korean Mathematical Society
    • /
    • v.38 no.1
    • /
    • pp.21-38
    • /
    • 2023
  • Let R be a commutative ring with identity. Let R be an integral domain and M a torsion-free R-module. We investigate the relation between the notion of e-exactness, recently introduced by Akray and Zebari [1], and generalized the concept of homology, and establish a relation between e-exact sequences and homology of modules. We modify some applications of e-exact sequences in homology and reprove some results of homology with e-exact sequences such as horseshoe lemma, long exact sequences, connecting homomorphisms and etc. Next, we generalize two special drived functor T or and Ext, and study some properties of them.

Practical investigation of a monopod fabrication method and the numerical investigation of its up-righting process

  • Hafez, Khaled A.;Ismael, Maged M.
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.5 no.3
    • /
    • pp.431-453
    • /
    • 2013
  • The principal purpose of this paper is to present a novel two phases rational scenario applied in constructing an offshore monopod platform; in which the two phases are the all-ground horizontal construction phase and the post-construction phase. Concerning the all-ground construction phase, a brief investigation of its different stages, i.e., pre-fabrication, fabrication, pre-assembling, positioning, assembling, and surface finishing is introduced. The important practical aspects of such construction phase are investigated without going into the nitty-gritty of the details involved therein. Concerning the post-construction phase, a clear investigation of its sequential stages, i.e., lifting, moving and up-righting is introduced. A finite element model (FEM) of the monopod platform is created to perform the structural analysis necessary to decide the suspension points/devices and the handling scenario during the various stages of the post-construction phase on a rational wise. Such structural analysis is performed within the framework of the three dimensional quasi-static modeling and analysis aiming at simulating the realistic handling condition, and hence introducing a reliable physical interpretation of the numerical results. For the whole effort to be demonstrated efficiently, the results obtained are analyzed, the conclusions are presented, and few related recommendations are suggested.

Packet Output and Input Configuration in a Multicasting Session Using Network Coding

  • Marquez, Jose;Gutierrez, Ismael;Valle, Sebastian;Falco, Melanis
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.686-710
    • /
    • 2019
  • This work proposes a model to solve the problem of Network Coding over a one-session multicast network. The model is based on a system of restrictions that defines the packet flows received in the sink nodes as functions of the outgoing flows from the source node. A multicast network graph is used to derive a directed labeled line graph (DLLG). The successive powers of the DLLG adjacency matrix to the convergence in the null matrix permits the construction of the jump matrix Source-Sinks. In its reduced form, this shows the dependency of the incoming flows in the sink nodes as a function of the outgoing flows in the source node. The emerging packets for each outgoing link from the source node are marked with a tag that is a linear combination of variables that corresponds to powers of two. Restrictions are built based on the dependence of the outgoing and incoming flows and the packet tags as variables. The linear independence of the incoming flows to the sink nodes is mandatory. The method is novel because the solution is independent of the Galois field size where the packet contents are defined.