• Title/Summary/Keyword: KISA

Search Result 277, Processing Time 0.024 seconds

Physiological Profile of Growing Rats: Effects of Cage Type and Cage Density

  • Yildiz, A.;Hayirli, A.;Okumus, Z.;Kaynar, O.;Kisa, F.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.20 no.2
    • /
    • pp.263-272
    • /
    • 2007
  • This experiment was conducted to examine the effects of cage type (CT) and cage density (CD) on physiological variables in growing rats. Sprague Dawley rats (n=108) weighing an average of 46 g were housed in metallic cage with woodchip bedding (MCWB), metallic cage with wire mesh (MCWM), and plastic shoebox with woodchip bedding (PCWB) separately by sex at normal ($160-cm^2/rat$, ND) and high ($80-cm^2/rat$, HD) CD from 3 to 10 wks of age. All cages were in dimension of $24{\times}40{\times}20$ cm ($W{\times}D{\times}H$). At the end of the experiment, blood samples were collected and 6 rats from each cage were sacrificed. No death was observed among rats at ND, whereas mortality rate at HD was 22.3% for males and 13.9% for females. Heart weight was affected by CT. Doubling CD caused 23, 11.8, 17.9, 8.6, 6.9, and 16.4% decreases in BW and weights of heart, liver, kidney, testis, and ovary, respectively. Except for adrenal gland, other organs for males were heavier than for females. Liver weight of males and females responded differently to CT and CD. Comparing with females, males had 7.3 and 5.2% heavier and 9.9% lighter liver weights in MCWB, MCWM, and PCWB, respectively. As CD doubled, liver weight for males and females decreased by 22.4 and 13.1%, respectively. Mean adrenal gland weight increased by 8.4% and decreased by 9.7% for males and females, respectively, with doubling CD. CT affected glucose, TG, Ca, and ALP levels. However, CD did not alter blood chemistry. Rats housed in metallic cages had greater neutrophil count and neutrophil:lymphocyte ratio than rats housed in plastic cages. Doubling CD caused a 24.2% increase in lymphocyte count. There were CT by CD, CT by sex, and CD by sex interaction effects on lymphocyte count. Doubling CD caused 0.1% decrease and 49.8 and 26.7% increases in lymphocyte count for rats housed in MCWB, MCWM, and PCWB, respectively. Comparing with females, lymphocyte count for males housed in MCWB, MCWM, and PCWB had 8.9 and 12.9% greater and 30.3% less lymphocyte counts, respectively. Lymphocyte count decreased by 4.12% for males, whereas it increased by 61.0% for females as CD doubled. Doubling CD resulted in 2.5 and 2.3% increases in erythrocyte count and hematocrit value. These data suggest that animals perform better in metallic cages than in plastic cages and that cage density had pronounceable effects on physiological parameters in a cage type and sex dependent-manner.

A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services) (SNS(Social Network Services) 내에서 정보보안 지식공유의도에 미치는 영향 요인)

  • Park, Taehwan;Kim, Suhwan;Jang, Jaeyoung
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.1-22
    • /
    • 2015
  • Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.

Development of Video Watermark System for Low-specification System as Android Platforms (저 사양 안드로이드 기반 동영상 보안을 위한 워터마크 시스템 개발)

  • Hwang, Seon-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.141-149
    • /
    • 2014
  • This paper describes a method to insert and detect watermark or fingerprint to/from videos in low-computing powered system as Android platforms. Fingerprint, which is a kind of watermark, has features such as patterns that contain information. The inserting frame numbers in video-stream and the positions in a picture were chosen from the encrypted user ID to insert the watermarks. The used encrypt algorithm is the HIGHT algorithm which was developed for low-computing powered systems by KISA(Korean Internet & Security Agency). Subtracting an inferred picture from the previous picture was used to extract a candidate feature. Median filtering was used to get rid of noise and stabilize the candidate feature. New algorithm that reduces calculating steps of the median filtering was developed and applied for low-specification systems. The stabilized features were accumulated over 150 times and calculated by correlation coefficient method to recognize the patterns. We examined 22 videos and successfully detected the patterns from 21 videos. The correlation coefficient r values that we examined through this study exceeded over 0.79 more than the threshold (0.7).

An Analysis of the Economic Effects for the IoT Industry (사물인터넷 산업의 경제적 파급효과 분석)

  • Jeong, Woo-Soo;Kim, Sa-Hyuk;Min, Kyoung-Sik
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.119-128
    • /
    • 2013
  • As ICT technology becomes advanced, the importance of future internet is emphasized and in part of that, M2M (Machine-to Machine communications) is magnified in terms of importance and usage in public and private sector. M2M is emerging as a next generation strategic industry but there is no existing analyzed data or market classification, so it disrupts establishing policies on the M2M industry. As the technology is progressing, the evolution from M2M to IoT (Internet of Things) has started and many countries actively try to find technological trend through market analysis in order to develop new growth engine. Therefore, in order to strengthen competitiveness, we should secure differentiated capabilities in industry and service. This article examines Korea's domestic market and international market trends in IoT and analyses the economic impact of the IoT industry using quantitative methodology and evaluates relations between the IoT industry and other relevant industries. As a result, the effect of IoT industry on production inducement is KRW474.6 billion; the effect on value-added inducement is KRW314.7 billion; and it is measured that 3,628 jobs will be created by the IoT industry.

A Chosen Plaintext Linear Attack On Block Cipher Cipher CIKS-1 (CIKS-1 블록 암호에 대한 선택 평문 선형 공격)

  • 이창훈;홍득조;이성재;이상진;양형진;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.47-57
    • /
    • 2003
  • In this paper, we firstly evaluate the resistance of the reduced 5-round version of the block cipher CIKS-1 against linear cryptanalysis(LC) and show that we can attack full-round CIKS-1 with \ulcorner56-bit key through the canonical extension of our attack. A feature of the CIKS-1 is the use of both Data-Dependent permutations(DDP) and internal key scheduling which consist in data dependent transformation of the round subkeys. Taking into accout the structure of CIKS-1 we investigate linear approximation. That is, we consider 16 linear approximations with p=3/4 for 16 parallel modulo $2^2$ additions to construct one-round linear approximation and derive one-round linear approximation with the probability P=1/2+$2^{-17}$ by Piling-up lemma. Then we present 3-round linear approximation with 1/2+$2^{-17}$ using this one-round approximation and attack the reduced 5-round CIKS-1 with 64-bit block by LC. In conclusion we present that our attack requires $2^{38}$chosen plaintexts with a probability of success of 99.9% and about $2^{67-7}$encryption times to recover the last round key.(But, for the full-round CIKS-1, our attack requires about $2^{166}$encryption times)

The effects of the operation of an information security management system on the performance of information security (정보보호 관리체계의 지속적인 정보보호 관리과정(PDCA)이 정보보호 성과에 미치는 영향에 관한 실증 연구)

  • Jang, Sang-Soo;Lee, Sang-Joon;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1123-1132
    • /
    • 2012
  • Many domestic organizations are introducing and operating various information security management systems capable of coping with technical, administrative, and legal issues comprehensively and systematically, in order to prevent various infringement incidents such as personal information disclosure and hacking preemptively and actively. However, empirical analyses regarding the extent to which an information security management system contributes to information security performance have not been fully conducted, even though enterprises and organizations are actively introducing such systems in order to achieve their information security objectives as a part of their organizational management activities in line with their respective business, by investing considerable effort and resources in developing and operating these systems. This approach can be used to apply, develop, and operate the information management system actively within an organization. this study focused on analyzing how each specific phase of the information security management system affects information security performance, compared with previous studies, which generally focus on the information security control item in analyzing information security performance. The information security management system was analyzed empirically to determine how the Security PCDA cycling model affects information security performance.

Analysis of Educational Elements of Educational Online Games - Focused on Real Farm Games - (교육용 온라인 게임의 교육적 요소 분석 - 레알팜 게임을 중심으로 -)

  • Jung, Mi-A;Jung, Hyung-Won
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.3
    • /
    • pp.173-180
    • /
    • 2020
  • According to KISA, many people play smartphone games. stress relieving, time is the reason to beat. Attempts to combine mobile games and education in the Korean game market are continuing. Studies have shown that using commercial games for education can be effective. Also, researches for activation educational games are increasing. Creating educational games requires a lot of time and money. Due to the nature of mobile games, the service is often terminated without updating. If you are able to acquire a naturally educational part while playing mobile games, you will see the effect of one pair of fun and education, both at once. We analyzed the education factors of the game with 'Real Farm' which is a simulation farm game. We focused on analyzing information acquisition and utilization part through indirect experience which is characteristic of simulation and examined educational factors based on design elements of educational game. This can signal the positive aspects of the game and the educational content of existing games. If you use smartphones as a pedagogy, you can expect a positive perception of games and an increase in the average life expectancy of mobile games.