• Title/Summary/Keyword: IT보안

Search Result 5,432, Processing Time 0.031 seconds

Development of Local Animal BLAST Search System Using Bioinformatics Tools (생물정보시스템을 이용한 Local Animal BLAST Search System 구축)

  • Kim, Byeong-Woo;Lee, Geun-Woo;Kim, Hyo-Seon;No, Seung-Hui;Lee, Yun-Ho;Kim, Si-Dong;Jeon, Jin-Tae;Lee, Ji-Ung;Jo, Yong-Min;Jeong, Il-Jeong;Lee, Jeong-Gyu
    • Bioinformatics and Biosystems
    • /
    • v.1 no.2
    • /
    • pp.99-102
    • /
    • 2006
  • The Basic Local Alignment Search Tool (BLAST) is one of the most established software in bioinformatics research and it compares a query sequence against the libraries of known sequences in order to investigate sequence similarity. Expressed Sequence Tags (ESTs) are single-pass sequence reads from mRNA (or cDNA) and represent the expression for a given cDNA library and the snapshot of genes expressed in a given tissue and/or at a given developmental stage. Therefore, ESTs can be very valuable information for functional genomics and bioinformatics researches. Although major bio database (DB) websites including NCBI are providing BLAST services and EST data, local DB and search system is demanding for better performance and security issue. Here we present animal EST DBs and local BLAST search system. The animal ESTs DB in NCBI Genbank were divided by animal species using the Perl script we developed. and we also built the new extended DB search systems fur the new data (Local Animal BLAST Search System: http://bioinfo.kohost.net), which was constructed on the high-capacity PC Cluster system fur the best performance. The new local DB contains 650,046 sequences for Bos taurus(cattle), 368,120 sequences for Sus scrofa (pig), 693,005 sequences for Gallus gallus (fowl), respectively.

  • PDF

Smart Ship Container With M2M Technology (M2M 기술을 이용한 스마트 선박 컨테이너)

  • Sharma, Ronesh;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.278-287
    • /
    • 2013
  • Modern information technologies continue to provide industries with new and improved methods. With the rapid development of Machine to Machine (M2M) communication, a smart container supply chain management is formed based on high performance sensors, computer vision, Global Positioning System (GPS) satellites, and Globle System for Mobile (GSM) communication. Existing supply chain management has limitation to real time container tracking. This paper focuses on the studies and implementation of real time container chain management with the development of the container identification system and automatic alert system for interrupts and for normal periodical alerts. The concept and methods of smart container modeling are introduced together with the structure explained prior to the implementation of smart container tracking alert system. Firstly, the paper introduces the container code identification and recognition algorithm implemented in visual studio 2010 with Opencv (computer vision library) and Tesseract (OCR engine) for real time operation. Secondly it discusses the current automatic alert system provided for real time container tracking and the limitations of those systems. Finally the paper summarizes the challenges and the possibilities for the future work for real time container tracking solutions with the ubiquitous mobile and satellite network together with the high performance sensors and computer vision. All of those components combine to provide an excellent delivery of supply chain management with outstanding operation and security.

Android Based Mobile Combination Login Application (안드로이드 기반 모바일 통합로그인 애플리케이션)

  • Lim, Jung-Gun;Choi, Chang-Suk;Park, Tae-Eun;Ki, Hyo-Sun;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.151-156
    • /
    • 2013
  • Android that was made by Google and Open Handset Alliance is the open source software toolkit for mobile phone. In a few years, Android will be used by millions of Android mobile phones and other mobile devices, and become the main platform for application developers. In this paper, the integrated login application based on Google's Android platform is developed. The main features of the mobile combination login application content based on Android are as follows. First, the application has more convenient login functionality than the functionality of general web browser as the web browser of the mobile-based applications(web browser style applications) as well as security features and faster screen(view) capability by reducing the amount of data transfer. Second, the application is so useful for management of ID and Password, and it can easily manage multiple ID information such as message, mail, profile. The results of performance evaluation of the developed application show the functionality that can login many kinds of portal sites simultaneously as well as the ability that can maintain login continuously. Currently, we are trying to develope a couple of the technologies that can insert multiple accounts into one ID and check all information on one screen.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.

A Framework of N-Screen Session Manager based N-Screen Service using Cloud Computing in Thin-Client Environment (씬클라이언트 환경에서 클라우드 컴퓨팅을 이용한 N-Screen 세션 관리 기반의 N-Screen 서비스 프레임워크)

  • Alsaffar, Aymen Abdullah;Song, Biao;Hassan, Mohammad Mehedi;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.21-32
    • /
    • 2012
  • We develop architecture of a virtual aggregation gateway (VAG) which enables composite application streaming based on N-Screen-as-a-Service (NaaS) using cloud computing in thin-client environment. We also discuss the problem of server computing burden in large scale multi-client case for screens sharing with composite application streaming over the internet. In particular, we propose an efficient Framework of N-Screen Session Manager which manages all media signaling that are necessary to deliver demanded contents. Furthermore, it will provides user with playback multimedia contents method (TV Drama, Ads, and Dialog etc) which is not considered in other research papers. The objectives of proposing N-Screen Session Manager are to (1) manage session status of all communication sessions (2) manage handling of received request and replies (3) allow users to playback multimedia contents anytime with variety of devices for screen sharing and (4) allow users to transfer an ongoing communication session from one device to another. Furthermore, we discuss the major security issues that occur in Session Initiation Protocol as well as minimizing delay resulted from session initiations (playback or transfer session).

Design and Implementation of 3D Geospatial Open Platform Based on HTML5/WebGL Technology (HTML5/WebGL 기반 3D 공간정보 오픈플랫폼 소프트웨어 설계 및 구현)

  • Kim, Min Soo;Jang, In Sung
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.57-66
    • /
    • 2015
  • Recently, the utilization of geospatial open platforms has been constantly increased and the interest in 3D geospatial data such as terrain, building and shopping mall has been increased significantly. In particular, rather than simplified 3D geospatial data, interest in high-precision 3D geospatial data which similarly represents the real world objects has increased significantly. In order to satisfy the demand for such the high-precision 3D geospatial data, various kinds of 3D geospatial open platforms has been developed and has provided services on the web. However, most of the 3D geospatial open platforms have been used plug-in module in order to ensure a fast 3D rendering performance on the web, despite the many problems such as difficulty of the installation, no supporting of cross browser/operating system and security issues. In addition, recently, the existing 3D geospatial open platforms based on plug-in module are facing a serious problem, by declaring the NPAPI service interruption in Chrome and Firefox browsers. In this study, we presents the design and implementation of a new 3D geospatial open platform based on HTML5/WebGL technology without the use of plug-ins. Such the new 3D geospatial open platform based on HTML5/WebGL may support cross browsers such as IE, Chrome, Firefox, Safari and cross OS platforms such as Windows, Linux, Mac and mobile OS platforms.

Performance Comparison between Random CA Group Authentication and Home CA Authentication in Mobile Ad hoc Network (모바일 애드혹 네트워크에서 임의의 CA 그룹을 이용한 이동노드의 인증과 홈 CA를 이용한 인증방법의 성능 비교)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.40-48
    • /
    • 2008
  • Security of self organized mobile ad hoc networks is an important issue because administration information in the networks is managed by the constituent nodes. Especially authentication mechanism is necessary for trust setup between newly joining nodes and the network. The authentication models and protocols which are based on the wireline infrastructure could not be practical for mobile ad hoc network. Although public key algorithm-based method is widely used for authentication, it is not easy to be applied to mobile ad hoc networks because they do not have infrastructure such as centralized CA which is needed for certificate verification. In this paper, we consider the public key based random CA group method proposed in [1] to provide efficient authentication scheme to mobile ad hoc networks and analyze the performance of the method, which is then compared to the home CA method. From the analysis results, we see that the random CA method where the function of CA is distributed to some mobile nodes and the authentication information is propagated to randomly chosen CAs shows higher reliability and lower cost than home CA method.

Exploring User Attitude to Information Privacy (개인정보 노출에 대한 인터넷 사용자의 태도에 관한 연구)

  • Baek, Seung Ik;Choi, Duk Sun
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.45-59
    • /
    • 2015
  • As many companies have been interested in big data, they have invested a lot of resources to get more customer data. Some companies try to trade the data illegally. In order to collect more customer data, companies provide various incentive programs to customers. However, their results are normally much less than their expectations. This study focuses on exploring the relative importance of the factors which influence customer attitudes to providing his/her personal information. This study conducts a conjoint analysis to assess trade-offs among the five influential factors-monetary reward, concern for data collection, concern for secondary use, concern for unauthorized use, and concern for errors. This study finds that the customer attitude to providing personal information is most influenced by the concern for secondary use. Furthermore, it shows that there are some differences between the light internet user group and the heavy internet user group in the relative importances of these factors. The monetary rewards appeal to the heavy internet users, rather than the light internet users.

A Design on Information Security Occupational Classification for Future Convergence Environment (미래 융합환경 기반의 정보보호 직업군 설계)

  • Lee, Yunsoo;Shin, Yongtae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.201-215
    • /
    • 2015
  • Recently advanced security threats have increasingly occurred, and the necessity and importance of Information Security has been growing with the advent of the era of convergence beyond information-oriented age. Most domestic studies in the field of occupational classification of Information Security have only focused on technology-oriented occupations. Relatively little research has been carried out on the occupational classification in the view of convergence environment. Therefore, in this paper we gave a definition of Information Security occupations, classified them and draw required capabilities by occupations in order to design the occupational classification system of Information Security and the required capabilities for future convergence environment by analyzing the previous studies. We also reclassified the occupational classification and required capabilities by occupations, and verified the validity of them based on National Initiative for Cybersecurity Education's the occupational classification system of Information Security considering the future convertgence environment. It is expected that the results of this study will be employed as base data for manpower demand and supply and improvement of working conditions in the future convergence environments. In the future study we will build standardized instruction methods which provide occupational capabilities by using the required capabilities by occupations.

Factors Affecting Continuous Intention to Use Mobile Wallet : Based on Value-based Adoption Model (모바일 지갑의 가치와 지속사용의도의 영향요인 : VAM 모형을 기반으로)

  • Lee, Chungah;Yun, Haejung;Lee, Chunghun;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.117-135
    • /
    • 2015
  • Mobile wallet that can keep coupons and membership cards for mobile is one of rapidly growing services due to its usability and financial benefit. However, in spite of its rapid growth, the increase of users who do not use continuously it is an important consideration to service providers for making a profit. This study aims to test the effects of factors affecting the continuous use intention of mobile wallet based on VAM (Value-based Adoption Model) which can analyse them in both benefit and sacrifice aspects, so as to suggest considerations to increase the use period of mobile wallet for service providers. The research findings supported the hypotheses regarding to the effects of usefulness, value-expression, perceived security and enjoyment in the benefit aspect and technicality in the sacrifice aspect on perceived value. In addition, the causal path from perceived value to continuous use intention was significant. The study results are expected to be used in marketing or service improvement for short-term users by taking account of emotional factors as well as functional factors.