• Title/Summary/Keyword: Network Diversification

Search Result 92, Processing Time 0.031 seconds

Intelligent Piracy Site Detection Technique with High Accuracy

  • Kim, Eui-Jin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.285-301
    • /
    • 2021
  • Recently, with the diversification of media services and the development of smart devices, users have more opportunities to use digital content, such as movies, dramas, and music; consequently, the size of the copyright market expands simultaneously. However, there are piracy sites that generate revenue by illegal use of copyrighted works. This has led to losses for copyright holders, and the scale of copyrighted works infringed due to the ever-increasing number of piracy sites has increased. To prevent this, government agencies respond to copyright infringement by monitoring piracy sites using online monitoring and countermeasure strategies for infringement. However, the detection and blocking process consumes a significant amount of time when compared to the rate of generating new piracy sites. Hence, online monitoring is less effective. Additionally, given that piracy sites are sophisticated and refined in the same way as legitimate sites, it is necessary to accurately distinguish and block a site that is involved in copyright infringement. Therefore, in this study, we analyze features of piracy sites and based on this analysis, we propose an intelligent detection technique for piracy sites that automatically classifies and detects whether a site is involved in infringement.

Shaping Heterogeneity of Naive CD8+ T Cell Pools

  • Sung-Woo Lee;Gil-Woo Lee;Hee-Ok Kim;Jae-Ho Cho
    • IMMUNE NETWORK
    • /
    • v.23 no.1
    • /
    • pp.2.1-2.19
    • /
    • 2023
  • Immune diversification helps protect the host against a myriad of pathogens. CD8+ T cells are essential adaptive immune cells that inhibit the spread of pathogens by inducing apoptosis in infected host cells, ultimately ensuring complete elimination of infectious pathogens and suppressing disease development. Accordingly, numerous studies have been conducted to elucidate the mechanisms underlying CD8+ T cell activation, proliferation, and differentiation into effector and memory cells, and to identify various intrinsic and extrinsic factors regulating these processes. The current knowledge accumulated through these studies has led to a huge breakthrough in understanding the existence of heterogeneity in CD8+ T cell populations during immune response and the principles underlying this heterogeneity. As the heterogeneity in effector/memory phases has been extensively reviewed elsewhere, in the current review, we focus on CD8+ T cells in a "naive" state, introducing recent studies dealing with the heterogeneity of naive CD8+ T cells and discussing the factors that contribute to such heterogeneity. We also discuss how this heterogeneity contributes to establishing the immense complexity of antigen-specific CD8+ T cell response.

Transcriptional and Epigenetic Regulation of Context-Dependent Plasticity in T-Helper Lineages

  • Meyer J. Friedman;Haram Lee;June-Yong Lee;Soohwan Oh
    • IMMUNE NETWORK
    • /
    • v.23 no.1
    • /
    • pp.5.1-5.28
    • /
    • 2023
  • Th cell lineage determination and functional specialization are tightly linked to the activation of lineage-determining transcription factors (TFs) that bind cis-regulatory elements. These lineage-determining TFs act in concert with multiple layers of transcriptional regulators to alter the epigenetic landscape, including DNA methylation, histone modification and threedimensional chromosome architecture, in order to facilitate the specific Th gene expression programs that allow for phenotypic diversification. Accumulating evidence indicates that Th cell differentiation is not as rigid as classically held; rather, extensive phenotypic plasticity is an inherent feature of T cell lineages. Recent studies have begun to uncover the epigenetic programs that mechanistically govern T cell subset specification and immunological memory. Advances in next generation sequencing technologies have allowed global transcriptomic and epigenomic interrogation of CD4+ Th cells that extends previous findings focusing on individual loci. In this review, we provide an overview of recent genome-wide insights into the transcriptional and epigenetic regulation of CD4+ T cell-mediated adaptive immunity and discuss the implications for disease as well as immunotherapies.

Research Trend Analysis on Living Lab Using Text Mining (텍스트 마이닝을 이용한 리빙랩 연구동향 분석)

  • Kim, SeongMook;Kim, YoungJun
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.37-48
    • /
    • 2020
  • This study aimed at understanding trends of living lab studies and deriving implications for directions of the studies by utilizing text mining. The study included network analysis and topic modelling based on keywords and abstracts from total 166 thesis published between 2011 and November 2019. Centrality analysis showed that living lab studies had been conducted focusing on keywords like innovation, society, technology, development, user and so on. From the topic modelling, 5 topics such as "regional innovation and user support", "social policy program of government", "smart city platform building", "technology innovation model of company" and "participation in system transformation" were extracted. Since the foundation of KNoLL in 2017, the diversification of living lab study subjects has been made. Quantitative analysis using text mining provides useful results for development of living lab studies.

The Study on a Business Model that Respect the Responsibility of Journalism as Well as Business Profit: Based on Incumbent Senior Reporters (신문기업이 저널리즘의 정체성을 견지하며 수행할 수 있는 수익사업에 관한 연구: 현직 언론사 간부기자들의 인식을 중심으로)

  • Kim, Jin-Kuk;Kim, Young-Hwan
    • Korean journal of communication and information
    • /
    • v.59
    • /
    • pp.162-179
    • /
    • 2012
  • The purpose of this study is to find a way to revive newspaper industry against digital new media revolution such as the internet, SNS(Social Network Service). To this end, indepth-interviews were conducted with the target incumbent senior reporters. The research areas are consisted of four subjects. For instance Awareness about the newspaper business crisis, the need for profitable business, potential conflicts of journalism and business, and desirable business. As a result of my research, executive reporters said that There is no management strategy Against the rapid expansion of social media and Therefore Business diversification is required. In short, They said that alternative business model should be developed, in which public and business interest are commonly respected, such as Information & Culture (internet, broadcasting, film, game, music), play, exhibition, publishing, and education.

  • PDF

Design and Implementation of an Instant Messenger between the two different domain mobile terminal systems (이종(異種) 모바일 단말 간 인스턴트 메신저 설계 및 구현)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.255-262
    • /
    • 2010
  • Recently, we are living in the world of information and ubiquitous technology strayed away from the fixed network systems resulting in an increase of using mobile terminals which is convenient for mobility and functionality. Because the diversification of mobile devices to communicate between disparate mobile terminals is difficult, the two kinds of operating systems and hardware for data communication between the terminals is needed to convert the data. The proposed instant messenger design in MRP-S3C2440A (Windows CE 5.0) and Nexio XP30 (Windows CE .NET 4.1) were tested and applied. Usually the mobile terminal has an information on a central server. Sender terminal receives the message according to the characteristics of the terminal after converting was sent to the receiving terminal. Receiving-side terminal without a separate conversion process, it was the output terminals. This paper deals with the proposal and implementation of designing an instant messenger application program between the two different mobile terminals and network systems.

Integrated Model of the Higher Education Financing Under the Quadruple Helix Concept

  • Kholiavko, Nataliia;Zhavoronok, Artur;Shaposhnykov, Kostiantyn;Krylov, Denys;Morozova, Liudmyla;Babiak, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.125-132
    • /
    • 2021
  • Rapid growth of the higher education role in ensuring the socio-economic and innovative development of the national economy in the context of the development of the information society and the knowledge economy is observed. Achieving positive synergistic effects of the higher education development requires proper funding for university education and research. The existing funding models for national higher education systems in a number of developing countries need modernization in accordance with the modern challenges of economic and innovative development. The purpose of the article is to formulate theoretical - methodological and applied foundations for the development and implementation of the integrated model of the higher education financing under the Quadruple Helix concept. At the center of the developed model are the areas of interaction identified by the authors, namely: Personnel, Science, Management, Innovation, Social area. This made it possible to specify the interests of all stakeholders and orient the activities of higher education institutions to the satisfaction of these interests. Effective implementation of the integrated Model of the higher education financing requires increasing the level of investment attractiveness and practical value of university research; activation of innovative development of enterprises; state stimulation of business participation in university research and education; harmonization of current legislation with EU standards. Implementation of the Model will diversify sources of funding for universities, increase their level of economic security and achieve integrated synergies from the interaction of universities, business, government and the public (as the main stakeholders within the Quadruple Helix concept).

A Study on the Activation Plan for K-Beauty Beauty Industry (K-Beauty 미용산업 활성화 방안에 관한 연구)

  • Pyo, Young-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.229-235
    • /
    • 2021
  • The K-Beauty beauty industry is emerging as a future-oriented growth industry that creates high added value. Therefore, this study analyzed the trends of the K-Beauty beauty industry, the latest cosmetics industry trends, and previous studies and reports related to global competitiveness with the purpose of suggesting a direction to develop into a promising industry with future value needs and competitiveness of consumers. First, it is necessary to induce the demonstration of social and economic value as an export-beneficial industry by enabling division of roles between industries and governments by sector based on innovation and creativity. Second, it is expected to succeed only when beauty and IT are fused to form and expand an innovation network. Finally, if legal and institutional improvements are preceded to solve the task of creating new jobs and fostering professionals that meet the goals of industrial development, it will be possible to strategize the revitalization of the future-oriented K-Beauty beauty industry.

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF

Digitalization and Diversification of Modern Educational Space (Ukrainian case)

  • Oksana, Bohomaz;Inna, Koreneva;Valentyn, Lihus;Yanina, Kambalova;Shevchuk, Victoria;Hanna, Tolchieva
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.11-18
    • /
    • 2022
  • Linking Ukraine's education system with the trends of global digitalization is mandatory to ensure the sustainable, long-term development of the country, as well as to increase the sustainability of the education system and the economy as a whole during the crisis period. Now the main problems of the education system in Ukraine are manifested in a complex context caused by Russian armed aggression. In the context of war, problems include differences in adaptation to online learning among educational institutions, limited access to education for vulnerable groups in the zone of active hostilities, the lack of digital educational resources suitable for online learning, and the lack of basic digital skills and competencies among students and teachers necessary to properly conduct online classes. Some of the problems of online learning were solved in the pandemic, but in the context of war Ukrainian society needs a new vision of education and continuous efforts of all social structures in the public and private environment. In the context of war, concerted action is needed to keep education on track and restore it in active zones, adapting to the needs of a dynamic society and an increasingly digitized economy. Among the urgent needs of the education system are a change in the teaching-learning paradigm, which is based on content presentation, memorization, and reproduction, and the adoption of a new, hybrid educational model that will encourage the development of necessary skills and abilities for students and learners in a digitized society and enable citizens close to war zones to learn.