• Title/Summary/Keyword: Shared storage

Search Result 137, Processing Time 0.024 seconds

Differences in Safety Perceptions of Use According to Cosmetic Information of Women

  • SO, Young-Jin;LEE, Ye-Eun;KWON, Young-Eun;JEON, Ye-Won;KWON, Lee-Seung
    • Journal of Wellbeing Management and Applied Psychology
    • /
    • v.3 no.4
    • /
    • pp.11-20
    • /
    • 2020
  • Purposes: This is a study on the perception of safety in use according to cosmetic information. Research design, data and methodology: As a result of analyzing 324 women in their twenties living in the metropolitan area, the following conclusions were drawn. Results: As a result of measuring the awareness of cosmetic information, the awareness of 'cosmetic-related knowledge' (M=3.52) and 'cosmetic performance' (M=3.43) was high, indicating that information on cosmetic knowledge was actively shared with each other. It was understood that the method of use and effect were properly recognized and that the cosmetics were selected. 'Correct cosmetic storage method' is significant in the factors of interest in cosmetics (p<.001), and 'the harmful ingredients of cosmetics that should be avoided' are significant in the factors of cosmetic information (p<0.05) and the factors of interest in cosmetics (p<0.01). 'Trouble-causing ingredients' showed a statistically significant difference in safety perception in all factors except cosmetic performance factors. Conclusion: There is a need to construct a system that allows consumers to easily purchase cosmetics that are necessary for their skin by schematically or simplifying the information on the usage period and trouble-causing ingredients after opening the cosmetics to be easily understood.

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud

  • Hwang, Yong-Woon;Kim, Taehoon;Seo, Daehee;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4042-4061
    • /
    • 2022
  • Recently, various security threats such as data leakage and data forgery have been possible in the communication and storage of data shared in the cloud environment. This paper conducted a study on the CP-ABSC scheme to solve these security threats. In the existing CP-ABSC scheme, if the data is obtained by the unsigncryption of the data user incorrectly, the identity of the data owner who uploaded the ciphertext cannot be known. Also, when verifying the leaked secret key, the identity information of the data user who leaked the secret key cannot be known. In terms of efficiency, the number of attributes can affect the ciphertext. In addition, a large amount of computation is required for the user to unsigncrypt the ciphertext. In this paper, we propose ECP-ABSC that provides data user traceability, and use it in a cloud environment to provide an efficient and secure data sharing scheme. The proposed ECP-ABSC scheme can trace and verify the identity of the data owner who uploaded the ciphertext incorrectly and the data user who leaked the secret key for the first time. In addition, the ciphertext of a constant size is output and the efficiency of the user's unsigncryption computation were improved.

Bio-protective potential of lactic acid bacteria: Effect of Lactobacillus sakei and Lactobacillus curvatus on changes of the microbial community in vacuum-packaged chilled beef

  • Zhang, Yimin;Zhu, Lixian;Dong, Pengcheng;Liang, Rongrong;Mao, Yanwei;Qiu, Shubing;Luo, Xin
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.31 no.4
    • /
    • pp.585-594
    • /
    • 2018
  • Objective: This study was to determine the bacterial diversity and monitor the community dynamic changes during storage of vacuum-packaged sliced raw beef as affected by Lactobacillus sakei and Lactobacillus curvatus. Methods: L. sakei and L. curvatus were separately incubated in vacuumed-packaged raw beef as bio-protective cultures to inhibit the naturally contaminating microbial load. Dynamic changes of the microbial diversity of inoculated or non-inoculated (control) samples were monitored at $4^{\circ}C$ for 0 to 38 days, using polymerase chain reaction-denaturing gradient gel electrophoresis (PCR-DGGE). Results: The DGGE profiles of DNA directly extracted from non-inoculated control samples highlighted the order of appearance of spoilage bacteria during storage, showing that Enterbacteriaceae and Pseudomonas fragi emerged early, then Brochothrix thermosphacta shared the dominant position, and finally, Pseudomonas putida showed up became predominant. Compared with control, the inoculation of either L. sakei or L. curvatus significantly lowered the complexity of microbial diversity and inhibited the growth of spoilage bacteria (p<0.05). Interestingly, we also found that the dominant position of L. curvatus was replaced by indigenous L. sakei after 13 d for L. curvatus-inoculated samples. Plate counts on selective agars further showed that inoculation with L. sakei or L. curvatus obviously reduced the viable counts of Enterbacteraceae, Pseudomonas spp. and B. thermosphacta during later storage (p<0.05), with L. sakei exerting greater inhibitory effect. Inoculation with both bio-protective cultures also significantly decreased the total volatile basic nitrogen values of stored samples (p<0.05). Conclusion: Taken together, the results proved the benefits of inoculation with lactic acid bacteria especially L. sakei as a potential way to inhibit growth of spoilage-related bacteria and improve the shelf life of vacuum-packaged raw beef.

Building B2B system using timestamp tree for data change detection in low speed network environment (저속 네트워크 환경에서 데이터 변화 탐지를 위해 타임스탬프 트리를 이용하는 B2B 시스템 구축)

  • Son Sei-Il;Kim Heung-Jun
    • The KIPS Transactions:PartD
    • /
    • v.12D no.6 s.102
    • /
    • pp.915-920
    • /
    • 2005
  • In this paper we expanded a existing web based B2B system to support users in low speed network. To guarantee shared dat a consistency between clients and a server, we proposed a method of data change detection by using a time stamp tree and the performance analysis of the proposed method was proved by a simulation. Under the worst condition that leaf nodes of a times tamp tree were changed uniform distribution, the simulation result showed that the proposed method was more efficient than a sequential detection until the percentage of changed nodes were below $15\%$. According to our observation, the monthly average of data change was below $7\%$ on a web-based construction MRO B2B system or a company A from April 2004 to August 2004. Therefore the Proposed method improved performance of data change detection in practice. The proposed method also reduced storage consumption in a server because it didn't require a server to store replicated data for every client.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

An Analysis of the Development Strategy of Academic Libraries in the U.S., U.K., Australia and Canada (미국, 영국, 호주 및 캐나다 대학도서관의 발전전략의 분석)

  • Yoon, Cheong-Ok
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.1
    • /
    • pp.55-82
    • /
    • 2006
  • The purpose of this study is to analyze the development strategy of academic libraries in the U.S., U.K., Australia, and Canada which have been established in response to the problems faced since the 1990s. Major problems, which academic libraries in various countries have commonly experienced include continuing decrease in library expenditures, changing role of libraries themselves, changing nature of library collections, development of information technology and technological intrastructure on campus, steep increase in prices of scholarly journals, and relative decrease in purchasing powers of libraries. In this study, discussed are the strategic planning and solutions carried out at the national or government level, rather than by individual libraries. Their efforts commonly focus on such measures as resource sharing, shared catalog and storage facilities, cooperative purchasing and negotiation for scholarly journals, etc.

  • PDF

A Power Saving Routing Scheme in Wireless Networks (무선망에서 소비 전력을 절약하는 라우팅 기법)

  • 최종무;김재훈;고영배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.179-188
    • /
    • 2003
  • Advances in wireless networking technology has engendered a new paradigm of computing, called mobile computing, in which users carrying portable devices have access to a shared infrastructure independent of their physical locations. Wireless communication has some restraints such as disconnection, low bandwidth, a variation of available bandwidth, network heterogeneity, security risk, small storage, and low power. Power adaptation routing scheme overcome the shortage of power by adjusting the output power, was proposed. Existing power saving routing algorithm has some minor effect such as seceding from shortest path to minimize the power consumption, and number of nodes that Participate in routing than optimal because it select a next node with considering only consuming power. This paper supplements the weak point in the existing power saving routing algorithm as considering the gradual approach to final destination and the number of optimal nodes that participate in routing.

A Study on the Educational Space in Religeous Buildings (교회(敎會)의 교육공간(敎育空間)을 위한 매체(媒體)센터 시설(施設)에 관(關)한 연구(硏究))

  • Kang, Eun-Hee
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.2 no.1
    • /
    • pp.7-14
    • /
    • 1995
  • The importance of church school education is becoming more emphasized. To maximize the effectiveness and efficiency of church school education, frequent utilization of instructional media is more desirable. Systematic approach to media utilization will be developed by the extabilishment of church media center. The purpose of this study was to review the concept and components of church media center and to survey the current status and hope for the facility of church media center. For the survey the 400 questionnaries were distributed to pastors or missionaries who are responssible for education, or personnels in church media center in Korea. The churches that they belong to have above approximately 500 church members. Among the distributed questionnaires, the 202 were collected. The results of the survey are as follows. The printed media and the AV media were managed separately in most churches. Many church media center was shared the space with other programs. The space was allocated mainly for storage. Most respondants hoped that they have a variety of areas in their churches. Many church media center have no separation between the area for the adults and that for children. However, most respondants hoped the separation of that areas. Followings are suggestions for the plan of church media center facilities. The space only for the church media center should be allocated. Church media center should be located in the first floor of the building as soon as possible. (If there is elevators in the building, it may be located above first floor). If enough space for the church media center is allocated, the areas for the adults and children should be separated by partitions or separate room. The space should consist of various areas like circulation area, reading area, working area for the personnel, production area, and storing area.

  • PDF

Signatures of positive selection underlying beef production traits in Korean cattle breeds

  • Edea, Zewdu;Jung, Kyoung Sub;Shin, Sung-Sub;Yoo, Song-Won;Choi, Jae Won;Kim, Kwan-Suk
    • Journal of Animal Science and Technology
    • /
    • v.62 no.3
    • /
    • pp.293-305
    • /
    • 2020
  • The difference in the breeding programs and population history may have diversely shaped the genomes of Korean native cattle breeds. In the absence of phenotypic data, comparisons of breeds that have been subjected to different selective pressures can aid to identify genomic regions and genes controlling qualitative and complex traits. In this study to decipher genetic variation and identify evidence of divergent selection, 3 Korean cattle breeds were genotyped using the recently developed high-density GeneSeek Genomic Profiler F250 (GGP-F250) array. The three Korean cattle breeds clustered according to their coat color phenotypes and breeding programs. The Heugu breed reliably showed smaller effective population size at all generations considered. Across the autosomal chromosomes, 113 and 83 annotated genes were identified from Hanwoo-Chikso and Hanwoo-Heugu comparisons, respectively of which 16 genes were shared between the two pairwise comparisons. The most important signals of selection were detected on bovine chromosomes 14 (24.39-25.13 Mb) and 18 (13.34-15.07 Mb), containing genes related to body size, and coat color (XKR4, LYN, PLAG1, SDR16C5, TMEM68, CDH15, MC1R, and GALNS). Some of the candidate genes are also associated with meat quality traits (ACSF3, EIF2B1, BANP, APCDD1, and GALM) and harbor quantitative trait locus (QTL) for beef production traits. Further functional analysis revealed that the candidate genes (DBI, ACSF3, HINT2, GBA2, AGPAT5, SCAP, ELP6, APOB, and RBL1) were involved in gene ontology (GO) terms relevant to meat quality including fatty acid oxidation, biosynthesis, and lipid storage. Candidate genes previously known to affect beef production and quality traits could be used in the beef cattle selection strategies.

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.