• Title/Summary/Keyword: Security Screening

Search Result 95, Processing Time 0.024 seconds

Development of Passive Millimeter-wave Security Screening System (수동 밀리미터파 보안 검색 시스템 개발)

  • Yoon, Jin-Seob;Jung, Kyung Kwon;Chae, Yeon-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.7
    • /
    • pp.138-143
    • /
    • 2016
  • The designed and fabricated millimeter-wave security screening system receives radiation energy from an object and a human body. The imaging system consist of sixteen array antennas, sixteen four-stage LNAs, sixteen detectors, an infrared camera, a CCD camera, reflector, and a focusing lens. This system requires high sensitivity and wide bandwidth to detect the input thermal noise. The LNA module of the system has been measured to have 65.8 dB in average linear gain and 82 GHz~102 GHz in bandwidth to enhance the sensitivity for thermal noise, and to receive it over a wide bandwidth. The detector is used for direct current (DC) output translation of millimeter-wave signals with a zero bias Schottky diode. The lens and front-end of the millimeter-wave sensor are important in the system to detect the input thermal noise signal. The frequency range in the receiving sensitivity of the detectors was 350 to 400 mV/mW at 0 dBm (1 mW) input power. The developed W-band imaging system is effective for detecting and identifying concealed objects such as metal or plastic.

Safety Assessment of Ovarian Cryopreservation and Transplantation in Nude Mice Bearing Human Epithelial Ovarian Cancer

  • Zhu, Gen-Hai;Wang, Sheng-Tan;Yang, Zhao-Xin;Cai, Jun-Hong;Chen, Chun-Ying;Yao, Mao-Zhong;Hong, Lan;He, Guo-Li;Yang, Shu-Ying
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.9
    • /
    • pp.4669-4675
    • /
    • 2012
  • Objective: Nude mice with orthotopic transplantation of human ovarian epithelial cancer were used to investigate screening criteria for paraneoplastic normal ovarian tissue and the security of the freezing and thawing for ovarian tissue transplantation. Methods: Expression of CK-7, CA125, P53, survivin, MMP-2/TIMP-2 in paraneoplastic normal ovarian tissues were detected by RT-PCR as well as immunohistochemistry. The tissues of the groups with all negative indicators of RT-PCR, all negative indicators of immunohistochemistry, negative expression of CK-7, CA125 and survivin, positive expression of CK-7, CA125 and survivin, cancer tissues and normal ovarian tissues of nude mice were used for freezing and thawing transplantation, to analyze overt and occult carcinogenesis rates after transplantation. Results: When all indicators or the main indicators, CK-7, CA125 and survivin, were negative, tumorigenesis did not occur after transplantation. In addition the occult carcinogenesis rate was lower than in the group with positive expression of CK-7, CA125 and survivin (P<0.01). After subcutaneous and orthotopic transplantation of ovarian tissues, rates did not change (P>0.05). There was no statistical significance among rates after transplantation of ovarian tissues which were obtained under different severity conditions (P>0.05). Conclusion: Negative expression of CK-7, CA125 and survivin can be treated as screening criteria for security of ovarian tissues for transplantation. Immunohistochemical methods can be used as the primary detection approach. Both subcutaneous and orthotopic transplantation are safe. The initial severity does not affect the carcinogenesis rate after tissue transplantation. Freezing and thawing ovarian tissue transplantation in nude mice with human epithelial ovarian carcinoma is feasible and safe.

Security issues and requirements for cloud-based u-Healthcare System (클라우드기반 u-헬스케어 시스템을 위한 보안 이슈 및 요구사항 분석)

  • Lee, Young Sil;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.299-302
    • /
    • 2014
  • Due to the convergence between digital devices and the development of wireless communication technology, bit-signal sensor miniaturization, building an Electronic Medical Record (EMR) which is a digital version of a paper chart that contains all of a patient's medical history and the information of Electronic Health Record (EHR), Ubiquitous healthcare (u-Healthcare) that can monitor their health status and provide personal healthcare service anytime and anywhere. Also, the appearance of cloud computing technology is one of the factors that accelerate the development of u-healthcare service. However, if the individual information to be used maliciously during the u-healthcare service utilization, leads to serious problems directly related to the individual's life because if it goes beyond the level of simple health screening and treatment, it may not provide accurate and reliable healthcare services. For this reason, we analyzed a variety of security issues related to u-healthcare service in cloud computing environment and described about directions of secure health information sharing system construction. In addition, we suggest the future developmental direction for th activation of u-healthcare industry.

  • PDF

Material Discrimination Using X-Ray and Neutron

  • Jaehyun Lee;Jinhyung Park;Jae Yeon Park;Moonsik Chae;Jungho Mun;Jong Hyun Jung
    • Journal of Radiation Protection and Research
    • /
    • v.48 no.4
    • /
    • pp.167-174
    • /
    • 2023
  • Background: A nondestructive test is commonly used to inspect the surface defects and internal structure of an object without any physical damage. X-rays generated from an electron accelerator or a tube are one of the methods used for nondestructive testing. The high penetration of X-rays through materials with low atomic numbers makes it difficult to discriminate between these materials using X-ray imaging. The interaction characteristics of neutrons with materials can supplement the limitations of X-ray imaging in material discrimination. Materials and Methods: The radiation image acquisition process for air-cargo security inspection equipment using X-rays and neutrons was simulated using a GEometry ANd Tracking (Geant4) simulation toolkit. Radiation images of phantoms composed of 13 materials were obtained, and the R-value, representing the attenuation ratio of neutrons and gamma rays in a material, was calculated from these images. Results and Discussion: The R-values were calculated from the simulated X-ray and neutron images for each phantom and compared with those obtained in the experiments. The R-values obtained from the experiments were higher than those obtained from the simulations. The difference can be due to the following two causes. The first reason is that there are various facilities or equipment in the experimental environment that scatter neutrons, unlike the simulation. The other is the difference in the neutron signal processing. In the simulation, the neutron signal is the sum of the number of neutrons entering the detector. However, in the experiment, the neutron signal was obtained by superimposing the intensities of the neutron signals. Neutron detectors also detect gamma rays, and the neutron signal cannot be clearly distinguished in the process of separating the two types of radiation. Despite these differences, the two results showed similar trends and the viability of using simulation-based radiation images, particularly in the field of security screening. With further research, the simulation-based radiation images can replace ones from experiments and be used in the related fields. Conclusion: The Korea Atomic Energy Research Institute has developed air-cargo security inspection equipment using neutrons and X-rays. Using this equipment, radiation images and R-values for various materials were obtained. The equipment was reconstructed, and the R-values were obtained for 13 materials using the Geant4 simulation toolkit. The R-values calculated by experiment and simulation show similar trends. Therefore, we confirmed the feasibility of using the simulation-based radiation image.

Implementation of Hybrid Firewall System for Network Security (전산망 보호를 위한 혼합형 방화벽 시스템 구현)

  • Lee, Yong-Joon;Kim, Bong-Han;Park, Cheon-Yong;Oh, Chang-Suk;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1593-1602
    • /
    • 1998
  • In this paper, a hybrid firewall system using the screening router, dual-homed gateway, screened host galeway and the application level gateway is proposed, The screened host gateway is comjXlsed of screening router, DMZ and bastion host. All external input traffics are filtered by screening router with network protrcol filtering, and transmitted to the bastion host performing application level filtering, The dual homed gateway is an internlediate equipment prohibiting direct access from external users, The application level gateway is an equipment enabling transmission using only the proxy server. External users can access only through the public servers in the DMZ, but internal users can aeee through any servers, The rule base which allows Telnet only lo the adrnilllslratol is applied to manage hosts in the DMZ According to the equipmental results, denial of access was in orderof Web. Mail FTP, and Telnet. Access to another servers except for server in DMZ were denied, Prolocol c1mials of UDP was more than that of TCP, because the many hosts broadcasted to networds using BOOTP and NETBIOS, Also, the illegal Telnet and FTP that transfer to inside network were very few.

  • PDF

An Efficient Update Algorithm for Packet Classification With TCAM (TCAM을 이용한 패킷 분류를 위한 효율적인 갱신 알고리즘)

  • Jeong Haejin;Song Ilseop;Lee Yookyoung;Kwon Taeckgeun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.79-85
    • /
    • 2006
  • Generally, it is essential that high-speed routers, switches, and network security appliances should have an efficient packet classification scheme in order to achieve the high-speed packet forwarding capability. For the multi-gigabit packet-processing network equipment the high-speed content search hardware such as TCAM and search engine is recently used to support the content-based packet inspection. During the packet classification process, hundreds and thousands of rules are applied to provide the network security policies regarding traffic screening, traffic monitoring, and traffic shaping. In addition, these rules could be dynamically changed during operations of systems if anomaly traffic patterns would vary. Particularly, in the high-speed network, an efficient algorithm that updates and reorganizes the packet classification rules is critical so as not to degrade the performance of the network device. In this paper, we have proposed an efficient update algorithm using a partial-ordering that can relocate the dynamically changing rules at the TCAM. Experimental results should that our algorithm does not need to relocate existing rules feature until 70$\%$ of TCAM utilization.

A Study on Improving the System for Qualification of Personal Guardian: Mainly on Practical Examinations (신변보호사 자격검정제도의 개선방안: 실기시험을 중심으로)

  • Ha, jeong hoon
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.277-293
    • /
    • 2020
  • The purpose of this study is to select the talented and competent personal caregiver personnel through a professional and rational inspection system, and to provide safer personal care services to the public so that the people who are eligible for service can lead a safe life. The purpose of this study is to cultivate qualified and competent personal guardian personnel and provide professional and stable services to the people so that the people who can use the service can lead a safer life. In order to grow into a system that meets the objectives of the personal guardian qualification screening system, it must be revised and supplemented from various evaluation methods. The improvement measures related to the practical test of the system for qualifying personal guardians are as follows. First, the fitness evaluation items should be added. Second, it is necessary to reestablish the test technology. (Remove technology that causes the second threat) (Adds skills that can be used as civilian status) Third, the fallout and application action must be added. Fourth, evaluation in various starting positions is necessary. Fifth, evaluation should be made by diversifying the distance and direction with the opponent.

Information Technology Knowledge Management taxonomy to enhance government electronic services in existence of COVID 19 outbreak

  • Badawood, Ashraf;AlBadri, Hamad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.353-359
    • /
    • 2021
  • Information technology and the need for timely and effective communication during the Covid-19 have made most governments adopt technological approaches to provide their services. E-government services have been adopted by most governments especially in developed countries to quickly and effectively share information. This study discusses the reasons why governments in the Gulf region should develop a new model for information technology knowledge management practices. To achieve this, the author identified possible benefits of adopting information technology knowledge management practices and why most governments in the Gulf find it hard to adopt them. Knowledge management allows for learning, transfer as well as sharing of information between government organizations and citizens and with the development of technology, the effectiveness of electronic services can easily be achieved. Also, effective adoption of information technology can improve knowledge management with the help of techniques that enhance capture, storage, retrieval as well as sharing of information. The author used systematic literature review to select 28 journals and articles published post 2019. IEEE, Google Scholar and Science Direct were used to select potential studies from which 722 journals and articles were selected. Through screening and eligibility assessment, 21 articles were retained while the back and forward search had 7 more articles which were also included in the study. Using information gathered from these articles and journals a new conceptual model was developed to help improve information technology knowledge management for governments in the Gulf region to effectively deliver e-services during Covid-19. This model was developed based on the process of KM, Theory of Planned Behavior and Unified Theory of Acceptance and Use of Technology. Based on the developed model. From UTAUT model, performance expectancy, effort expectancy as well as social influence had a great impact.

Investigating Non-Laboratory Variables to Predict Diabetic and Prediabetic Patients from Electronic Medical Records Using Machine Learning

  • Mukhtar, Hamid;Al Azwari, Sana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.19-30
    • /
    • 2021
  • Diabetes Mellitus (DM) is one of common chronic diseases leading to severe health complications that may cause death. The disease influences individuals, community, and the government due to the continuous monitoring, lifelong commitment, and the cost of treatment. The World Health Organization (WHO) considers Saudi Arabia as one of the top 10 countries in diabetes prevalence across the world. Since most of the medical services are provided by the government, the cost of the treatment in terms of hospitals and clinical visits and lab tests represents a real burden due to the large scale of the disease. The ability to predict the diabetic status of a patient without the laboratory tests by performing screening based on some personal features can lessen the health and economic burden caused by diabetes alone. The goal of this paper is to investigate the prediction of diabetic and prediabetic patients by considering factors other than the laboratory tests, as required by physicians in general. With the data obtained from local hospitals, medical records were processed to obtain a dataset that classified patients into three classes: diabetic, prediabetic, and non-diabetic. After applying three machine learning algorithms, we established good performance for accuracy, precision, and recall of the models on the dataset. Further analysis was performed on the data to identify important non-laboratory variables related to the patients for diabetes classification. The importance of five variables (gender, physical activity level, hypertension, BMI, and age) from the person's basic health data were investigated to find their contribution to the state of a patient being diabetic, prediabetic or normal. Our analysis presented great agreement with the risk factors of diabetes and prediabetes stated by the American Diabetes Association (ADA) and other health institutions worldwide. We conclude that by performing class-specific analysis of the disease, important factors specific to Saudi population can be identified, whose management can result in controlling the disease. We also provide some recommendations learnt from this research.

Deep Learning Based Side-Channel Analysis for Recent Masking Countermeasure on SIKE (SIKE에서의 최신 마스킹 대응기법에 대한 딥러닝 기반 부채널 전력 분석)

  • Woosang Im;Jaeyoung Jang;Hyunil Kim;Changho Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.151-164
    • /
    • 2023
  • Recently, the development of quantum computers means a great threat to existing public key system based on discrete algebra problems or factorization problems. Accordingly, NIST is currently in the process of contesting and screening PQC(Post Quantum Cryptography) that can be implemented in both the computing environment and the upcoming quantum computing environment. Among them, SIKE is the only Isogeny-based cipher and has the advantage of a shorter public key compared to other PQC with the same safety. However, like conventional cryptographic algorithms, all quantum-resistant ciphers must be safe for existing cryptanlysis. In this paper, we studied power analysis-based cryptographic analysis techniques for SIKE, and notably we analyzed SIKE through wavelet transformation and deep learning-based clustering power analysis. As a result, the analysis success rate was close to 100% even in SIKE with applied masking response techniques that defend the accuracy of existing clustering power analysis techniques to around 50%, and it was confirmed that was the strongest attack on SIKE.