• 제목/요약/키워드: Security screening

검색결과 94건 처리시간 0.025초

Safety Assessment of Ovarian Cryopreservation and Transplantation in Nude Mice Bearing Human Epithelial Ovarian Cancer

  • Zhu, Gen-Hai;Wang, Sheng-Tan;Yang, Zhao-Xin;Cai, Jun-Hong;Chen, Chun-Ying;Yao, Mao-Zhong;Hong, Lan;He, Guo-Li;Yang, Shu-Ying
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제13권9호
    • /
    • pp.4669-4675
    • /
    • 2012
  • Objective: Nude mice with orthotopic transplantation of human ovarian epithelial cancer were used to investigate screening criteria for paraneoplastic normal ovarian tissue and the security of the freezing and thawing for ovarian tissue transplantation. Methods: Expression of CK-7, CA125, P53, survivin, MMP-2/TIMP-2 in paraneoplastic normal ovarian tissues were detected by RT-PCR as well as immunohistochemistry. The tissues of the groups with all negative indicators of RT-PCR, all negative indicators of immunohistochemistry, negative expression of CK-7, CA125 and survivin, positive expression of CK-7, CA125 and survivin, cancer tissues and normal ovarian tissues of nude mice were used for freezing and thawing transplantation, to analyze overt and occult carcinogenesis rates after transplantation. Results: When all indicators or the main indicators, CK-7, CA125 and survivin, were negative, tumorigenesis did not occur after transplantation. In addition the occult carcinogenesis rate was lower than in the group with positive expression of CK-7, CA125 and survivin (P<0.01). After subcutaneous and orthotopic transplantation of ovarian tissues, rates did not change (P>0.05). There was no statistical significance among rates after transplantation of ovarian tissues which were obtained under different severity conditions (P>0.05). Conclusion: Negative expression of CK-7, CA125 and survivin can be treated as screening criteria for security of ovarian tissues for transplantation. Immunohistochemical methods can be used as the primary detection approach. Both subcutaneous and orthotopic transplantation are safe. The initial severity does not affect the carcinogenesis rate after tissue transplantation. Freezing and thawing ovarian tissue transplantation in nude mice with human epithelial ovarian carcinoma is feasible and safe.

클라우드기반 u-헬스케어 시스템을 위한 보안 이슈 및 요구사항 분석 (Security issues and requirements for cloud-based u-Healthcare System)

  • 이영실;김태용;이훈재
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.299-302
    • /
    • 2014
  • 디지털 기기 간 융합과 무선 통신 기술의 발전, 생체신호 측정 센서의 소형화, 종이나 수기로 관리되던 의료관련 정보를 디지털화한 전자의무기록(EMR, Electronic Medical Record) 구축 및 전자건강기록(EHR, Electronic Health Record)의 도입 등으로 인해 '언제 어디서나' 자신의 건강 상태를 모니터링하고 개인 맞춤 건강관리 서비스를 받을 수 있는 Ubiquitous Healthcare (u-헬스케어) 시대가 도래하였다. 또한 클라우드 컴퓨팅(Cloud computing) 기술의 등장은 u-헬스케어 서비스의 발전을 더욱 가속화시키고 있는 요인 중 하나이다. 그러나 이러한 u-헬스케어 서비스 활용 과정에서 개인의 정보가 악의적으로 사용될 경우 정확하고 신뢰성 있는 헬스케어 서비스를 제공받지 못할 뿐만 아니라 단순 건강 검진 및 치료의 수준을 넘어 크게는 개인의 생명과 직결되는 심각한 문제를 초래한다. 이에 본 논문에서는 클라우드 컴퓨팅 환경에서의 u-헬스케어 서비스와 관련된 다양한 보안 이슈를 분석하고 이를 토대로 안전한 보안 의료정보 공유 시스템 구축을 위한 보안 요구사항에 대하여 서술한다. 더불어 향후 국내 u-헬스케어 산업 활성화를 위한 발전방향에 대하여 논하고자 한다.

  • PDF

Material Discrimination Using X-Ray and Neutron

  • Jaehyun Lee;Jinhyung Park;Jae Yeon Park;Moonsik Chae;Jungho Mun;Jong Hyun Jung
    • Journal of Radiation Protection and Research
    • /
    • 제48권4호
    • /
    • pp.167-174
    • /
    • 2023
  • Background: A nondestructive test is commonly used to inspect the surface defects and internal structure of an object without any physical damage. X-rays generated from an electron accelerator or a tube are one of the methods used for nondestructive testing. The high penetration of X-rays through materials with low atomic numbers makes it difficult to discriminate between these materials using X-ray imaging. The interaction characteristics of neutrons with materials can supplement the limitations of X-ray imaging in material discrimination. Materials and Methods: The radiation image acquisition process for air-cargo security inspection equipment using X-rays and neutrons was simulated using a GEometry ANd Tracking (Geant4) simulation toolkit. Radiation images of phantoms composed of 13 materials were obtained, and the R-value, representing the attenuation ratio of neutrons and gamma rays in a material, was calculated from these images. Results and Discussion: The R-values were calculated from the simulated X-ray and neutron images for each phantom and compared with those obtained in the experiments. The R-values obtained from the experiments were higher than those obtained from the simulations. The difference can be due to the following two causes. The first reason is that there are various facilities or equipment in the experimental environment that scatter neutrons, unlike the simulation. The other is the difference in the neutron signal processing. In the simulation, the neutron signal is the sum of the number of neutrons entering the detector. However, in the experiment, the neutron signal was obtained by superimposing the intensities of the neutron signals. Neutron detectors also detect gamma rays, and the neutron signal cannot be clearly distinguished in the process of separating the two types of radiation. Despite these differences, the two results showed similar trends and the viability of using simulation-based radiation images, particularly in the field of security screening. With further research, the simulation-based radiation images can replace ones from experiments and be used in the related fields. Conclusion: The Korea Atomic Energy Research Institute has developed air-cargo security inspection equipment using neutrons and X-rays. Using this equipment, radiation images and R-values for various materials were obtained. The equipment was reconstructed, and the R-values were obtained for 13 materials using the Geant4 simulation toolkit. The R-values calculated by experiment and simulation show similar trends. Therefore, we confirmed the feasibility of using the simulation-based radiation image.

전산망 보호를 위한 혼합형 방화벽 시스템 구현 (Implementation of Hybrid Firewall System for Network Security)

  • 이용준;김봉한;박천용;오창석;이재광
    • 한국정보처리학회논문지
    • /
    • 제5권6호
    • /
    • pp.1593-1602
    • /
    • 1998
  • 본 논문에서는 스크리닝 라우터, 듀열-홈드 게이크웨이, 스크린드 호스트 게이트웨이, 그리고 응용 레벨 게이트웨이를 사용한 혼합형 방화벽 시스템을 제안하였다. 스크린드 호스트 게이트웨이는 스크리닝 라우터와, DMZ, 그리고 베스쳔 호스트로 구성되었으며, 외부의 모든 트랙픽은 프로토콜 필터링 기능을 가진 스크리닝 라우터에서 필터링되고, 그리고 응용 레벨 필터링을 수행하기 위하여 베스쳔 호스트로 전송된다. 듀얼-홈드 게이트웨이는 외부의 사용자가 내부 네트워크를 직접 접근을 못하도록 중개 역할을 한다. 응용 레벨 게이트웨이는 프럭시 서버를 통해서만 트래픽 전송이 가능하도록 한다. 외부 사용자는 DMZ에 있는 고개 서버를 통해서만 내부 네트워크로의 접근이 가능하지만 내부 사용자는 외부 네트워크를 용이하게 사용할 수 있다. 그리고 DMZ에 있는 시스템의 효율적인 관리를 위하여 시스템 관리자만 Telnet 접속이 가능하도록 규칙기반을 적용하였다. 실험 결과, 접근 거부는 Web, Mail, FTP, Telnet 순으로 나타났으며, DMZ에 있는 공개 서버릴 제외한 나머지 시스템에 대한 접근은 거부되었다. 프로토콜별 접근 거부는 모든 네트워크에 broadcast하는 BOOTP와 NETBIOS를 사용하는 호스트가 많았기 때문에 TCP보다 UDP가 많이 나타났다. 또한 내부 네트워크에 불법적인 Telnet이나 FTP는 거의 없었다.

  • PDF

TCAM을 이용한 패킷 분류를 위한 효율적인 갱신 알고리즘 (An Efficient Update Algorithm for Packet Classification With TCAM)

  • 정해진;송일섭;이유경;권택근
    • 한국통신학회논문지
    • /
    • 제31권2A호
    • /
    • pp.79-85
    • /
    • 2006
  • 고성능 라우터, 스위치 및 네트워크 보안 장비에서 패킷 포워딩 기능을 고속으로 수행하기 위해서는 효과적인 패킷 분류 기술이 필수적인데, 최근에는 TCAM과 검색엔진 등, 고속의 컨텐트 기반 검색 하드웨어를 이용하는 방법들이 사용되고 있다. 패킷 분류 시에는 트래픽 차단, 트래픽 모니터링 등의 목적을 위해서 많은 규칙들이 사용될 수 있고, 삽입과 삭제가 시스템 운용 중에 발생할 수 있다. 특히, 고속의 네트워크 환경에서 패킷 포워딩의 성능을 저하시키지 않기 위해서는 동적으로 변화하는 규칙들을 효과적으로 갱신하는 방법이 필요하다. 본 논문에서는 TCAM을 이용한 패킷 분류시 효과적인 갱신이나 재배치를 위해서 순서화된 부분 정렬 알고리즘을 제안하고, 실험을 통하여 TCAM의 이용률이 70$\%$까지 높은 상황에서도 갱신으로 인한 재배치가 거의 일어나지 않도록 하여 재배치로 인한 패킷 처리의 지연을 줄일 수 있다는 결과를 보인다.

신변보호사 자격검정제도의 개선방안: 실기시험을 중심으로 (A Study on Improving the System for Qualification of Personal Guardian: Mainly on Practical Examinations)

  • 하정훈
    • 시큐리티연구
    • /
    • 제62호
    • /
    • pp.277-293
    • /
    • 2020
  • 본 연구는 자질과 역량 있는 신변보호사 인력을 양성하여 전문적이고 안정적인 서비스를 국민들에게 제공함으로써, 서비스이용대상자인 국민들이 보다 안전한 삶을 영위할 수 있도록 하고자 한다. 신변보호사 자격검정제도의 시행목적에 부합하는 제도로의 성장을 위해서는 현행 평가 방식에서 다각도로 수정 보완되어져야 할 것이다. 신변보호사 자격검정제도의 실기시험관련 개선방안은 다음과 같다. 첫째, 체력평가항목이 추가되어져야한다. 둘째, 검정기술의 재정립이 필요시 된다. (제2의 위협이 야기되는 기술은 삭제)(민간인 신분으로 사용할 수 있는 기술 추가) 셋째, 낙법 및 응용동작이 추가되어져야한다. 넷째, 다양한 시작자세에서의 평가가 필요시 된다. 다섯째, 상대와의 거리 및 방향을 다양화하여 평가가 이루어져야 한다.

Information Technology Knowledge Management taxonomy to enhance government electronic services in existence of COVID 19 outbreak

  • Badawood, Ashraf;AlBadri, Hamad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.353-359
    • /
    • 2021
  • Information technology and the need for timely and effective communication during the Covid-19 have made most governments adopt technological approaches to provide their services. E-government services have been adopted by most governments especially in developed countries to quickly and effectively share information. This study discusses the reasons why governments in the Gulf region should develop a new model for information technology knowledge management practices. To achieve this, the author identified possible benefits of adopting information technology knowledge management practices and why most governments in the Gulf find it hard to adopt them. Knowledge management allows for learning, transfer as well as sharing of information between government organizations and citizens and with the development of technology, the effectiveness of electronic services can easily be achieved. Also, effective adoption of information technology can improve knowledge management with the help of techniques that enhance capture, storage, retrieval as well as sharing of information. The author used systematic literature review to select 28 journals and articles published post 2019. IEEE, Google Scholar and Science Direct were used to select potential studies from which 722 journals and articles were selected. Through screening and eligibility assessment, 21 articles were retained while the back and forward search had 7 more articles which were also included in the study. Using information gathered from these articles and journals a new conceptual model was developed to help improve information technology knowledge management for governments in the Gulf region to effectively deliver e-services during Covid-19. This model was developed based on the process of KM, Theory of Planned Behavior and Unified Theory of Acceptance and Use of Technology. Based on the developed model. From UTAUT model, performance expectancy, effort expectancy as well as social influence had a great impact.

Investigating Non-Laboratory Variables to Predict Diabetic and Prediabetic Patients from Electronic Medical Records Using Machine Learning

  • Mukhtar, Hamid;Al Azwari, Sana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.19-30
    • /
    • 2021
  • Diabetes Mellitus (DM) is one of common chronic diseases leading to severe health complications that may cause death. The disease influences individuals, community, and the government due to the continuous monitoring, lifelong commitment, and the cost of treatment. The World Health Organization (WHO) considers Saudi Arabia as one of the top 10 countries in diabetes prevalence across the world. Since most of the medical services are provided by the government, the cost of the treatment in terms of hospitals and clinical visits and lab tests represents a real burden due to the large scale of the disease. The ability to predict the diabetic status of a patient without the laboratory tests by performing screening based on some personal features can lessen the health and economic burden caused by diabetes alone. The goal of this paper is to investigate the prediction of diabetic and prediabetic patients by considering factors other than the laboratory tests, as required by physicians in general. With the data obtained from local hospitals, medical records were processed to obtain a dataset that classified patients into three classes: diabetic, prediabetic, and non-diabetic. After applying three machine learning algorithms, we established good performance for accuracy, precision, and recall of the models on the dataset. Further analysis was performed on the data to identify important non-laboratory variables related to the patients for diabetes classification. The importance of five variables (gender, physical activity level, hypertension, BMI, and age) from the person's basic health data were investigated to find their contribution to the state of a patient being diabetic, prediabetic or normal. Our analysis presented great agreement with the risk factors of diabetes and prediabetes stated by the American Diabetes Association (ADA) and other health institutions worldwide. We conclude that by performing class-specific analysis of the disease, important factors specific to Saudi population can be identified, whose management can result in controlling the disease. We also provide some recommendations learnt from this research.

SIKE에서의 최신 마스킹 대응기법에 대한 딥러닝 기반 부채널 전력 분석 (Deep Learning Based Side-Channel Analysis for Recent Masking Countermeasure on SIKE)

  • 임우상;장재영;김현일;서창호
    • 정보보호학회논문지
    • /
    • 제33권2호
    • /
    • pp.151-164
    • /
    • 2023
  • 최근 양자 컴퓨터의 개발은 현재 사용 중인 이산대수 문제나 인수분해 문제 기반의 공개키 암호에 큰 위협이 되므로, 이에 NIST(National Institute of Standards and Technology)에서는 현재 컴퓨팅 환경 및 도래하는 양자 컴퓨팅 환경에서 모두 구현이 가능한 양자내성암호를 위해 공모전을 진행하고 있다. 이 중 NIST 양자내성암호 공모전 4라운드에 진출한 SIKE(Supersingular Isogeny Key Encapsulation)는 유일한 Isogeny 기반의 암호로써, 동일한 안전성을 갖는 다른 양자내성암호에 비해 짧은 공개키를 갖는 장점이 있다. 그러나, 기존의 암호 알고리즘과 마찬가지로, SIKE를 포함한 모든 양자내성암호는 현존하는 암호분석에 반드시 안전해야만 한다. 이에 본 논문에서는 SIKE에 대한 전력 분석 기반 암호분석 기술을 연구하였으며, 특히 웨이블릿 변환 및 딥러닝 기반 클러스터링 전력 분석을 통해 SIKE를 분석하였다. 그 결과, 현존하는 클러스터링 전력 분석 기법의 정확도를 50% 내외로 방어하는 마스킹 대응기법이 적용된 SIKE에 대해 100%에 가까운 분석 성공률을 보였으며, 이는 현존하는 SIKE 기법에 대한 가장 강력한 공격임을 확인하였다.

Application of data fusion modeling for the prediction of auxin response elements in Zea mays for food security purposes

  • Nesrine Sghaier;Rayda Ben Ayed;Ahmed Rebai
    • Genomics & Informatics
    • /
    • 제20권4호
    • /
    • pp.45.1-45.7
    • /
    • 2022
  • Food security will be affected by climate change worldwide, particularly in the developing world, where the most important food products originate from plants. Plants are often exposed to environmental stresses that may affect their growth, development, yield, and food quality. Auxin is a hormone that plays a critical role in improving plants' tolerance of environmental conditions. Auxin controls the expression of many stress-responsive genes in plants by interacting with specific cis-regulatory elements called auxin-responsive elements (AuxREs). In this work, we performed an in silico prediction of AuxREs in promoters of five auxin-responsive genes in Zea mays. We applied a data fusion approach based on the combined use of Dempster-Shafer evidence theory and fuzzy sets. Auxin has a direct impact on cell membrane proteins. The short-term auxin response may be represented by the regulation of transmembrane gene expression. The detection of an AuxRE in the promoter of prolyl oligopeptidase (POP) in Z. mays and the 3-fold overexpression of this gene under auxin treatment for 30 min indicated the role of POP in maize auxin response. POP is regulated by auxin to perform stress adaptation. In addition, the detection of two AuxRE TGTCTC motifs in the upstream sequence of the bx1 gene suggests that bx1 can be regulated by auxin. Auxin may also be involved in the regulation of dehydration-responsive element-binding and some members of the protein kinase superfamily.