• Title/Summary/Keyword: Internal Network

Search Result 1,166, Processing Time 0.024 seconds

Network Analysis of Herbs that are Frequently Prescribed for Osteoporosis with a Focus on Oasis Platform Research (골다공증 다빈도 처방과 구성 약물의 네트워크 분석 - 오아시스 검색을 중심으로)

  • Shin, Seon-mi;Ko, Heung
    • The Journal of Internal Korean Medicine
    • /
    • v.42 no.4
    • /
    • pp.628-644
    • /
    • 2021
  • Objectives: This study analyzed, through network analysis and data mining analysis, the relationship between herbs used in osteoporosis prescriptions, diversified the analysis of osteoporosis-related prescriptions, and analyzed the combination of herbs used in osteoporosis-related prescriptions. Methods: The prescriptions used in osteoporosis treatment and experiments were established by conducting a full survey of the papers published by the OASIS site. A database for osteoporosis-related prescriptions was established, herbs were extracted, and the frequency of frequent herbs and prescriptions were investigated using Excel (MS offices ver. 2013). Using the freeware R version 4.0.3 (2020-10-10), igraph, and arules package, network analysis was performed in the first second of prescription composition. Results: Among the osteoporosis-related prescriptions, the most studied prescriptions are as follows.: Yukmijihwang-tang (六味地黃湯) and Samul-tang (四物湯). In the osteoporosis prescription network, herbs with connection centrality, proximity centrality, mediation centrality, and eigenvector centrality appeared in the order of Rehmanniae Radix Preparata, Angelicae Gigantis Radix, Poria Sclerotium, Paeoniae Radix, and Glycyrrhizae Radix et Rhizoma. After extracting the herbal combination network, including the corresponding herbs, and clustering it, it can be divided into drugs of the Yukmijihwang-tang (六味地黃湯) series and the Samul-tang (四物湯). Conclusions: This study could assist researchers in diversifyingy formula analysis in future studies. Moreover, the herbal combination used in osteoporosis prescriptions could be used to search for osteoporosis prescriptions in other databases or to create a new prescription.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

KOHONEN NETWORK BASED FAULT DIAGNOSIS AND CONDITION MONITORING OF PRE-ENGAGED STARTER MOTORS

  • BAY O. F.;BAYIR R.
    • International Journal of Automotive Technology
    • /
    • v.6 no.4
    • /
    • pp.341-350
    • /
    • 2005
  • In this study, fault diagnosis and monitoring of serial wound pre-engaged starter motors have been carried out. Starter motors are DC motors that enable internal combustion engine (ICE) to run. In case of breakdown of a starter motor, internal combustion engine can not be worked. Starter motors have vital importance on internal combustion engines. Kohonen network based fault diagnosis system is proposed for fault diagnosis and monitoring of starter motors. A graphical user interface (GUI) software has been developed by using Visual Basic 6.0 for fault diagnosis. Six faults, seen in starter motors, have been diagnosed successfully by using the developed fault diagnosis system. GUI software makes it possible to diagnose the faults in starter motors before they occur by keeping fault records of past occurrences.

Advances in Systems Biology Approaches for Autoimmune Diseases

  • Kim, Ho-Youn;Kim, Hae-Rim;Lee, Sang-Heon
    • IMMUNE NETWORK
    • /
    • v.14 no.2
    • /
    • pp.73-80
    • /
    • 2014
  • Because autoimmune diseases (AIDs) result from a complex combination of genetic and epigenetic factors, as well as an altered immune response to endogenous or exogenous antigens, systems biology approaches have been widely applied. The use of multi-omics approaches, including blood transcriptomics, genomics, epigenetics, proteomics, and metabolomics, not only allow for the discovery of a number of biomarkers but also will provide new directions for further translational AIDs applications. Systems biology approaches rely on high-throughput techniques with data analysis platforms that leverage the assessment of genes, proteins, metabolites, and network analysis of complex biologic or pathways implicated in specific AID conditions. To facilitate the discovery of validated and qualified biomarkers, better-coordinated multi-omics approaches and standardized translational research, in combination with the skills of biologists, clinicians, engineers, and bioinformaticians, are required.

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19

  • Choi, Manyong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4163-4183
    • /
    • 2021
  • As measures for protecting users and ensuring security of electronic financial transactions, such as online banking, financial institutions in South Korea have implemented network segregation policies. However, a revision of such domain-centered standardized network segregation policies has been increasingly requested because of: 1) increased demand for remote work due to changes resulting from COVID-19 pandemic; and 2) the difficulty of applying new technologies of fintech companies based on information and communications technologies (ICTs) such as cloud services. Therefore, in this study, problems of the remote work environment arising from the network segregation policy currently applied to the financial sector in South Korea and those from the application of new ICTs such as fintech technology have been investigated. In addition, internal network protection policies of foreign financial sectors, such as those of the United States, United Kingdom, European Union, and Russia, and internal network protection policies of non-financial sectors, such as control systems, have been analyzed. As measures for the effective improvement of the current network segregation policy, we propose a policy change from domain-based to data-centric network segregation. Furthermore, to resolve threats of hacking at remote work, recently emerging as a global problem due to COVID-19 pandemic, a standard model for remote work system development applicable to financial companies and a reinforced terminal security model are presented, and an alternative control method applicable when network segregation is not applied is proposed.

The Effects of Network Capability and the Distribution on Firm Performance of Hotel Businesses in Thailand

  • RATTANABORWORN, Jirayu
    • Journal of Distribution Science
    • /
    • v.20 no.10
    • /
    • pp.51-60
    • /
    • 2022
  • Purpose: The aim of this research is to study 1) the effects of internal factors (technological capability and entrepreneurial orientation) that affect Thailand's hotel business network capability. 2) the effects of external factors (government policy and trust relationship) that affect Thailand's hotel business network capability. 3) the impact of network capability on the firm performance. 4) the moderating effect of absorptive capacity between network capability and firm performance. Research design, data and methodology: The test model collected data from a mail survey of 164 hotel businesses in Thailand. The correlation and multiple regression were adopted to analyze and test the proposed hypotheses. Results: Interestingly, technological capability, entrepreneurship orientation, and trust relationship have a direct impact on network capability. However, network capability still does not have a significant relationship with firm performance in all dimensions. Surprisingly, the absorptive capacity does not have a moderating effect on the relationship of network capability on firm performance of hotel businesses in Thailand. Conclusions: This research found that the hotel business should focus on analyzing the external and internal environment as it affects network building, which will guide the creation of strategies for further increasing hotel distribution channels and competitive advantage.

Formulation of the Neural Network for Implicit Constitutive Model (II) : Application to Inelastic Constitutive Equations

  • Lee, Joon-Seong;Lee, Eun-Chul;Furukawa, Tomonari
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.264-269
    • /
    • 2008
  • In this paper, two neural networks as a material model, which are based on the state-space method, have been proposed. One outputs the rates of inelastic strain and material internal variables whereas the outputs of the other are the next state of the inelastic strain and material internal variables. Both the neural networks were trained using input-output data generated from Chaboche's model and successfully converged. The former neural network could reproduce the original stress-strain curve. The neural network also demonstrated its ability of interpolation by generating untrained curve. It was also found that the neural network can extrapolate in close proximity to the training data.

Unauthorized Software Blocking Techniques in Software Defined Network (SDN) Environments (Software Defined Network(SDN) 환경에서 비인가 소프트웨어 차단 기법)

  • Kang, Nam-Gil;Kwon, TaeWook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.393-399
    • /
    • 2019
  • In a situation where an unauthorized SW brought into the organization without being authorized is emerging as a threat to the network security, the security of the network based on the SDN(Software-Defined Network) can be strengthened through the development of the security application considering the organization's characteristics. Security technology of existing SDN environment has been studied to protect internal network from external networks such as firewalls and Intrusion Detection Systems, but the research for resolving insider threat was insufficient. Therefore, We propose a system that protects the internal network from unauthorized SW, which is one of the insider threats in the SDN environment.

A Study on Methodology for Protection of Malicious Traffic in Groupware Network System (그룹웨어시스템상의 악성트래픽 차단 네트워크구조 설계방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.69-76
    • /
    • 2007
  • The blocking of malicious traffic in groupware network system is used to prevent the spread and distribution of malicious traffic. The method protecting from malicious traffic in groupware system is designed to handle the malicious traffic of various routes with the internal course of groupware, which leads to lighten the load of security and traffic. It was impossible to block this kind of traffic at the traditional structure. When the protection of the proposed groupware system is performed, there appears to be a great change for the rate of a load factor at the CPU of Backbone Switch which is connected to the internal gateway. The load factor of CPU, which was increased with the traffic, is now remarkably reduced after the internal gateway is set up. This is to show that a lot of malicious traffic pass through the internal network and that network environment is faced to the menace of many malicious traffics. This paper is to show the efficiency of protection of internal gateway proposed in this study, for the rate of CPU of Backbone Switch was about 17% a day, but was dropped up to the 4% after the malicious traffic was removed.

  • PDF