• Title/Summary/Keyword: Validation Server

Search Result 72, Processing Time 0.026 seconds

A Performance Analysis Model of PC-based Software Router Supporting IPv6-IPv4 Translation for Residential Gateway

  • Seo, Ssang-Hee;Kong, In-Yeup
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.62-69
    • /
    • 2005
  • This paper presents a queuing analysis model of a PC-based software router supporting IPv6-IPv4 translation for residential gateway. The proposed models are M/G/1/K or MMPP-2/G/1/K by arrival process of the software PC router. M/G/1/K is a model of normal traffic and MMPP-2/G/1/K is a model of burst traffic. In M/G/1/K, the arriving process is assumed to be a Poisson process, which is independent and identically distributed. In MMPP-2/G/1/K, the arriving process is assumed to be two-state Markov Modulated Poisson Process (MMPP) which is changed from one state to another state with intensity. The service time distribution is general distribution and the service discipline of the server is processor sharing. Also, the total number of packets that can be processed at one time is limited to K. We obtain performance metrics of PC-based software router for residential gateway such as system sojourn time blocking probability and throughput based on the proposed model. Compared to other models, our model is simpler and it is easier to estimate model parameters. Validation results show that the model estimates the performance of the target system.

Monitoring and control of wind-induced vibrations of hanger ropes of a suspension bridge

  • Hua, Xu G.;Chen, Zheng Q.;Lei, Xu;Wen, Qin;Niu, Hua W.
    • Smart Structures and Systems
    • /
    • v.23 no.6
    • /
    • pp.683-693
    • /
    • 2019
  • In August 2012, during the passage of the typhoon Haikui (1211), large amplitude vibrations were observed on long hangers of the Xihoumen suspension Bridge, which destroyed a few viscoelastic dampers originally installed to connect a pair of hanger ropes transversely. The purpose of this study is to identify the cause of vibration and to develop countermeasures against vibration. Field measurements have been conducted in order to correlate the wind and vibration characteristics of hangers. Furthermore, a replica aeroelastic model of prototype hangers consisting of four parallel ropes was used to study the aeroelastic behavior of hanger ropes and to examine the effect of the rigid spacers on vibration mitigation. It is shown that the downstream hanger rope experiences the most violent elliptical vibration for certain wind direction, and the vibration is mainly attributed to wake interference of parallel hanger ropes. Based on wind tunnel tests and field validation, it is confirmed that four rigid spacers placed vertically at equal intervals are sufficient to suppress the wake-induced vibrations. Since the deployment of spacers on hangers, server hanger vibrations and clash of hanger ropes are never observed.

In-silico characterization and structure-based functional annotation of a hypothetical protein from Campylobacter jejuni involved in propionate catabolism

  • Mazumder, Lincon;Hasan, Mehedi;Rus’d, Ahmed Abu;Islam, Mohammad Ariful
    • Genomics & Informatics
    • /
    • v.19 no.4
    • /
    • pp.43.1-43.12
    • /
    • 2021
  • Campylobacter jejuni is one of the most prevalent organisms associated with foodborne illness across the globe causing campylobacteriosis and gastritis. Many proteins of C. jejuni are still unidentified. The purpose of this study was to determine the structure and function of a non-annotated hypothetical protein (HP) from C. jejuni. A number of properties like physiochemical characteristics, 3D structure, and functional annotation of the HP (accession No. CAG2129885.1) were predicted using various bioinformatics tools followed by further validation and quality assessment. Moreover, the protein-protein interactions and active site were obtained from the STRING and CASTp server, respectively. The hypothesized protein possesses various characteristics including an acidic pH, thermal stability, water solubility, and cytoplasmic distribution. While alpha-helix and random coil structures are the most prominent structural components of this protein, most of it is formed of helices and coils. Along with expected quality, the 3D model has been found to be novel. This study has identified the potential role of the HP in 2-methylcitric acid cycle and propionate catabolism. Furthermore, protein-protein interactions revealed several significant functional partners. The in-silico characterization of this protein will assist to understand its molecular mechanism of action better. The methodology of this study would also serve as the basis for additional research into proteomic and genomic data for functional potential identification.

In silico detection and characterization of novel virulence proteins of the emerging poultry pathogen Gallibacterium anatis

  • L. G. T. G. Rajapaksha;C. W. R. Gunasekara;P. S. de Alwis
    • Genomics & Informatics
    • /
    • v.20 no.4
    • /
    • pp.41.1-41.9
    • /
    • 2022
  • The pathogen Gallibacterium anatis has caused heavy economic losses for commercial poultry farms around the world. However, despite its importance, the functions of its hypothetical proteins (HPs) have been poorly characterized. The present study analyzed the functions and structures of HPs obtained from Gallibacterium anatis (NCTC11413) using various bioinformatics tools. Initially, all the functions of HPs were predicted using the VICMpred tool, and the physicochemical properties of the identified virulence proteins were then analyzed using Expasy's ProtParam server. A virulence protein (WP_013745346.1) that can act as a potential drug target was further analyzed for its secondary structure, followed by homology modeling and three-dimensional (3D) structure determination using the Swiss-Model and Phyre2 servers. The quality assessment and validation of the 3D model were conducted using ERRAT, Verify3D, and PROCHECK programs. The functional and phylogenetic analysis was conducted using ProFunc, STRING, KEGG servers, and MEGA software. The bioinformatics analysis revealed 201 HPs related to cellular processes (n = 119), metabolism (n = 61), virulence (n = 11), and information/storage molecules (n = 10). Among the virulence proteins, three were detected as drug targets and six as vaccine targets. The characterized virulence protein WP_013745346.1 is proven to be stable, a drug target, and an enzyme related to the citrate cycle in the present pathogen. This enzyme was also found to facilitate other metabolic pathways, the biosynthesis of secondary metabolites, and the biosynthesis of amino acids.

Android Botnet Detection Using Hybrid Analysis

  • Mamoona Arhsad;Ahmad Karim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.704-719
    • /
    • 2024
  • Botnet pandemics are becoming more prevalent with the growing use of mobile phone technologies. Mobile phone technologies provide a wide range of applications, including entertainment, commerce, education, and finance. In addition, botnet refers to the collection of compromised devices managed by a botmaster and engaging with each other via a command server to initiate an attack including phishing email, ad-click fraud, blockchain, and much more. As the number of botnet attacks rises, detecting harmful activities is becoming more challenging in handheld devices. Therefore, it is crucial to evaluate mobile botnet assaults to find the security vulnerabilities that occur through coordinated command servers causing major financial and ethical harm. For this purpose, we propose a hybrid analysis approach that integrates permissions and API and experiments on the machine-learning classifiers to detect mobile botnet applications. In this paper, the experiment employed benign, botnet, and malware applications for validation of the performance and accuracy of classifiers. The results conclude that a classifier model based on a simple decision tree obtained 99% accuracy with a low 0.003 false-positive rate than other machine learning classifiers for botnet applications detection. As an outcome of this paper, a hybrid approach enhances the accuracy of mobile botnet detection as compared to static and dynamic features when both are taken separately.

Behavior-Structure-Evolution Evaluation Model(BSEM) for Open Source Software Service (공개소프트웨어 서비스 평가모델(BSEM)에 관한 개념적 연구)

  • Lee, Seung-Chang;Park, Hoon-Sung;Suh, Eung-Kyo
    • Journal of Distribution Science
    • /
    • v.13 no.1
    • /
    • pp.57-70
    • /
    • 2015
  • Purpose - Open source software has high utilization in most of the server market. The utilization of open source software is a global trend. Particularly, Internet infrastructure and platform software open source software development has increased rapidly. Since 2003, the Korean government has published open source software promotion policies and a supply promotion policy. The dynamism of the open source software market, the lack of relevant expertise, and the market transformation due to reasons such as changes in the relevant technology occur slowly in relation to adoption. Therefore, this study proposes an assessment model of services provided in an open source software service company. In this study, the service level of open source software companies is classified into an enterprise-level assessment area, the service level assessment area, and service area. The assessment model is developed from an on-site driven evaluation index and proposed evaluation framework; the evaluation procedures and evaluation methods are used to achieve the research objective, involving an impartial evaluation model implemented after pilot testing and validation. Research Design, data, and methodology - This study adopted an iteration development model to accommodate various requirements, and presented and validated the assessment model to address the situation of the open source software service company. Phase 1 - Theoretical background and literature review Phase 2 - Research on an evaluation index based on the open source software service company Phase 3 - Index improvement through expert validation Phase 4 - Finalizing an evaluation model reflecting additional requirements Based on the open source software adoption case study and latest technology trends, we developed an open source software service concept definition and classification of public service activities for open source software service companies. We also presented open source software service company service level measures by developing a service level factor analysis assessment. The Behavior-Structure-Evolution Evaluation Model (BSEM) proposed in this study consisted of a rating methodology for calculating the level that can be granted through the assessment and evaluation of an enterprise-level data model. An open source software service company's service comprises the service area and service domain, while the technology acceptance model comprises the service area, technical domain, technical sub-domain, and open source software name. Finally, the evaluation index comprises the evaluation group, category, and items. Results - Utilization of an open source software service level evaluation model For the development of an open source software service level evaluation model, common service providers need to standardize the quality of the service, so that surveys and expert workshops performed in open source software service companies can establish the evaluation criteria according to their qualitative differences. Conclusion - Based on this evaluation model's systematic evaluation process and monitoring, an open source software service adoption company can acquire reliable information for open source software adoption. Inducing the growth of open source software service companies will facilitate the development of the open source software industry.

A Study on the HSE Monitoring System based on Smart Device for Establishing Evaluation System of the Combined Safety Index (종합 안전지수 평가체계 수립을 위한 스마트디바이스 기반 HSE 모니터링 시스템에 관한 연구)

  • Woo, Jong-Hun;Lim, Hyun-Kyu;Youn, Kyung-Won;Ham, Dong-Kyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.4
    • /
    • pp.437-448
    • /
    • 2015
  • In this paper, smartphone based measuring device was developed by integration of several sonsors such as moving, temperature, pulsation, respiration and hearing and sever/client programs was developed for the data acquisition and communication between smartphone and server computer. Then, the concept of CSI(combined safety index) was proposed for the comprehensive diagnositcs of workers status. For the validation of the proposed concept, the real data was acquired by boarding at training ship of korea maritime and ocean university. The acquired data was analyzed with the stochastical method of regressionn, then the meaningful result was driven that could explain the relation between the risky situation and the measured chronical data.

A Study of Step-by-step Countermeasures Model through Analysis of SQL Injection Attacks Code (공격코드 사례분석을 기반으로 한 SQL Injection에 대한 단계적 대응모델 연구)

  • Kim, Jeom-Goo;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.17-25
    • /
    • 2012
  • SQL Injection techniques disclosed web hacking years passed, but these are classified the most dangerous attac ks. Recent web programming data for efficient storage and retrieval using a DBMS is essential. Mainly PHP, JSP, A SP, and scripting language used to interact with the DBMS. In this web environments application does not validate the client's invalid entry may cause abnormal SQL query. These unusual queries to bypass user authentication or da ta that is stored in the database can be exposed. SQL Injection vulnerability environment, an attacker can pass the web-based authentication using username and password and data stored in the database. Measures against SQL Inj ection on has been announced as a number of methods. But if you rely on any one method of many security hole ca n occur. The proposal of four levels leverage is composed with the source code, operational phases, database, server management side and the user input validation. This is a way to apply the measures in terms of why the accident preventive steps for creating a phased step-by-step response nodel, through the process of management measures, if applied, there is the possibility of SQL Injection attacks can be.

Theoretical Investigations on Structure and Function of Human Homologue hABH4 of E.coli ALKB4

  • Shankaracharya, Shankaracharya;Das, Saibal;Prasad, Dinesh;Vidyarthi, Ambarish Sharan
    • Interdisciplinary Bio Central
    • /
    • v.2 no.3
    • /
    • pp.8.1-8.5
    • /
    • 2010
  • Introduction: Recently identified human homologues of ALKB protein have shown the activity of DNA damaging drugs, used for cancer therapy. Bioinformatics study of hABH2 and hABH3 had led to the discovery of a novel DNA repair mechanism. Very little is known about structure and function of hABH4, one of the members of this superfamily. Therefore, in present study we are intended to predict its structure and function through various bioinformatics tools. Materials and Methods: Modeling was done with modeler 9v7 to predict the 3D structure of the hABH4 protein. This model was validated with the program Procheck using Ramachandran plot statistics and was submitted to PMDB with ID PM0076284. The 3d2GO server was used to predict the functions. Residues at protein ligand and protein RNA binding sites were predicted with 3dLigandSite and KYG programs respectively. Results and Discussion: 3-D model of hABH4, ALKBH4.B99990003.pdb was predicted and evaluated. Validation result showed that 96.4 % residues lies in favored and additional allowed region of Ramachandran plot. Ligand binding residues prediction showed four Ligand clusters, having 24 ligands in cluster 1. Importantly, conserved pattern of Glu196-X-Pro198- Xn-His254 in the functional domain was detected. DNA and RNA binding sites were also predicted in the model. Conclusion and Prospects: The predicted and validated model of human homologue hABH4 resulted from this study may unveil the mechanism of DNA damage repair in human and accelerate the research on designing of appropriate inhibitors aiding in chemotherapy and cancer related diseases.

Development and application of algorithm judging system : analysis of effects on programming learning (알고리즘 자동평가 시스템의 개발 및 적용 : 프로그래밍 학습 효과 분석)

  • Chang, Won-Young;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.4
    • /
    • pp.45-57
    • /
    • 2014
  • Many studies on algorithm judging system which verifies the correctness and the time efficiency of your program have been underway recently, most of which are on an online judging system focused on programming contests. However this study is mainly about development and application of the judging system based on client-server. Especially, we designed to promote metacognition and motivation which are emphasized in CRESST model, and implemented the total system that consists of the problem, data set, validation program, and user service environments. We applied our system to elementary, middle, and high school students, and We noticed a significant difference of average score between the experimental and control group in posttest and concluded that the teaching method using our system gave the bigger positive effects on programming learning.

  • PDF