• Title/Summary/Keyword: security component

Search Result 406, Processing Time 0.024 seconds

Population genetic analysis of special purpose dogs: linkage disequilibrium and effective population size

  • Lee, Doo Ho;Lee, Soo Hyun;Kang, Ji Min;Ju, Ho Young;Lee, Cheol Koo;Choi, Bong Hwan;Lee, Seung Hwan
    • Korean Journal of Agricultural Science
    • /
    • v.44 no.4
    • /
    • pp.549-557
    • /
    • 2017
  • As exchanges between countries become more active, new threats such as drugs, illegal imports of food and medicines, and terrorism are present all over the world. From this, increased border security that protects people's safety is becoming a new issue. The activities of special purpose dogs that detect these threats in advance are becoming very important. One of the obstacles in securing superior individuals is musculoskeletal disorders which interfere with the work of special purpose dogs. In order to search for genes associated with these genetic disorders, we conducted genomic analysis using linkage disequilibrium information and investigated genetic characteristics to know heterozygosity and inbreeding status in the population. In this study, two breeds (Malinois, Shepherd) of army dogs and three breeds (Malinois, Shepherd, Retriever) from public databases were used for comparison. The 170K SNP marker panel was used for this study. In the principal component analysis, it was confirmed that clusters were formed for each breed. The number of effective populations differed for each cultivar, but this was due to the difference in numbers of individuals for each breed used for the analysis. The results of heterozygosity decay analysis showed that heterozygous alleles decreased with each generation. In the army dog group, if the population number is maintained properly, the frequency of allele genotype will not decrease significantly.

Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router

  • Yan, Ruo-Yu;Zheng, Qing-Hua;Li, Hai-Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.428-451
    • /
    • 2010
  • Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly, a new type of unidirectional flow called IF flow is proposed. Merits and features of IF flows are analyzed in detail and then two efficient methods are introduced in our DDoS attacks detection and evaluation scheme. The first method uses residual variance ratio to detect DDoS attacks after Recursive Least Square (RLS) filter is applied to predict IF flows. The second method uses generalized likelihood ratio (GLR) statistical test to detect DDoS attacks after a Kalman filter is applied to estimate IF flows. Based on the two complementary methods, an evaluation formula is proposed to assess the seriousness of current DDoS attacks on router ports. Furthermore, the sensitivity of three types of traffic (IF flow, input link and output link) to DDoS attacks is analyzed and compared. Experiments show that IF flow has more power to expose anomaly than the other two types of traffic. Finally, two proposed methods are compared in terms of detection rate, processing speed, etc., and also compared in detail with Principal Component Analysis (PCA) and Cumulative Sum (CUSUM) methods. The results demonstrate that adaptive filter methods have higher detection rate, lower false alarm rate and smaller detection lag time.

Robustness of Face Recognition to Variations of Illumination on Mobile Devices Based on SVM

  • Nam, Gi-Pyo;Kang, Byung-Jun;Park, Kang-Ryoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.1
    • /
    • pp.25-44
    • /
    • 2010
  • With the increasing popularity of mobile devices, it has become necessary to protect private information and content in these devices. Face recognition has been favored over conventional passwords or security keys, because it can be easily implemented using a built-in camera, while providing user convenience. However, because mobile devices can be used both indoors and outdoors, there can be many illumination changes, which can reduce the accuracy of face recognition. Therefore, we propose a new face recognition method on a mobile device robust to illumination variations. This research makes the following four original contributions. First, we compared the performance of face recognition with illumination variations on mobile devices for several illumination normalization procedures suitable for mobile devices with low processing power. These include the Retinex filter, histogram equalization and histogram stretching. Second, we compared the performance for global and local methods of face recognition such as PCA (Principal Component Analysis), LNMF (Local Non-negative Matrix Factorization) and LBP (Local Binary Pattern) using an integer-based kernel suitable for mobile devices having low processing power. Third, the characteristics of each method according to the illumination va iations are analyzed. Fourth, we use two matching scores for several methods of illumination normalization, Retinex and histogram stretching, which show the best and $2^{nd}$ best performances, respectively. These are used as the inputs of an SVM (Support Vector Machine) classifier, which can increase the accuracy of face recognition. Experimental results with two databases (data collected by a mobile device and the AR database) showed that the accuracy of face recognition achieved by the proposed method was superior to that of other methods.

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

Old Water Contributions to a Granitic Watershed, Dorim-cheon, Seoul

  • Kim, Hyerin;Cho, Sung-Hyun;Lee, Dongguen;Jung, Youn-Young;Kim, Young-Hee;Koh, Dong-Chan;Lee, Jeonghoon
    • Journal of Soil and Groundwater Environment
    • /
    • v.20 no.5
    • /
    • pp.34-40
    • /
    • 2015
  • It is reported that the intensity of rainfall will likely increase, on average, over the world on 2000. For water resources security, many studies for flow paths from rainfall or snowmelt to subsurface have been conducted. In Korea, few isotopic studies for characterizations of flow path have been undertaken. For a better understanding of how water derived from atmosphere moves to subsurface and from subsurface to stream, an analysis of precipitation and stream water using oxygen-18 and deuterium isotopes in a small watershed, Dorim-cheon, Seoul, was conducted with high resolution data. Variations of oxygen-18 in precipitation greater than 10‰ (δ18Omax = −1.21‰, δ18Omin = −11.23) were observed. Isotopic compositions of old water (groundwater) assumed as the stream water collected in advance were −8.98‰ and −61.85‰ for oxygen and hydrogen, respectively. Using a two-component mixing model, hydrograph separation of the stream water in Dorim-cheon was conducted based on weighted mean value of δ18O. As a result, except of instant dominance of rainfall, contribution of old water was dominant during the study period. On average, 71.3% of the old water and 28.7% of rainfall contributed to the stream water. The results show that even in the small watershed, which is covered with thin soil layer in granite mountain region, the stream water is considerably influenced by old water inflow rather than rainfall.

Implementation of AMGA GUI Client Toolkit : AMGA Manager (AMGA GUI Client 툴킷 구현 : AMGA Manager)

  • Huh, Tae-Sang;Hwang, Soon-Wook;Park, Guen-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.3
    • /
    • pp.421-433
    • /
    • 2012
  • AMGA service, which is one of the EMI gLite middleware components, is widely used for analysis of distributed large scale experiments data as metadata repository by scientific and technological researchers and the use of AMGA is extended farther to include general industries needing metadata Catalogue as well. However AMGA, based unix and Grid UI, has the weakness of being absence of general-purpose user interfaces in comparison to other commercial database systems and that's why it's difficult to use and diffuse it although it has the superiority of the functionality. In this paper, we developed AMGA GUI toolkit to provide work convenience using object-oriented modeling language(UML). Currently, AMGA has been used as the main component among many user communities such as Belle II, WISDOM, MDM, and so on, but we expect that this development can not only lower the barrier to entry for AMGA beginners to use it, but lead to expand the use of AMGA service over more communities.

Verification of SPACE Code with MSGTR-PAFS Accident Experiment (증기발생기 전열관 다중파단-피동보조급수냉각계통 사고 실험 기반 안전해석코드 SPACE 검증)

  • Nam, Kyung Ho;Kim, Tae Woo
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.4
    • /
    • pp.84-91
    • /
    • 2020
  • The Korean nuclear industry developed the SPACE (Safety and Performance Analysis Code for nuclear power plants) code and this code adpots two-phase flows, two-fluid, three-field models which are comprised of gas, continuous liquid and droplet fields and has a capability to simulate three-dimensional model. According to the revised law by the Nuclear Safety and Security Commission (NSSC) in Korea, the multiple failure accidents that must be considered for accident management plan of nuclear power plant was determined based on the lessons learned from the Fukushima accident. Generally, to improve the reliability of the calculation results of a safety analysis code, verification work for separate and integral effect experiments is required. In this reason, the goal of this work is to verify calculation capability of SPACE code for multiple failure accident. For this purpose, it was selected the experiment which was conducted to simulate a Multiple Steam Generator Tube Rupture(MSGTR) accident with Passive Auxiliary Feedwater System(PAFS) operation by Korea Atomic Energy Research Institute (KAERI) and focused that the comparison between the experiment results and code calculation results to verify the performance of the SPACE code. The MSGR accident has a unique feature of the penetration of the barrier between the Reactor Coolant System (RCS) and the secondary system resulting from multiple failure of steam generator U-tubes. The PAFS is one of the advanced safety features with passive cooling system to replace a conventional active auxiliary feedwater system. This system is passively capable of condensing steam generated in steam generator and feeding the condensed water to the steam generator by gravity. As the results of overall system transient response using SPACE code showed similar trends with the experimental results such as the system pressure, mass flow rate, and collapsed water level in component. In conclusion, it could be concluded that the SPACE code has sufficient capability to simulate a MSGTR accident.

Comparative Analysis of Consumption Expenditure Condition of Elderly Persons with and without Physical Disabilities by Social Economic Status and Sociodemographic Characteristics (중노년기 지체장애인과 비장애인의 사회경제적 지위 및 인구사회학적 특성에 따른 소비지출구조 비교분석)

  • Kim, Hye-Gyong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.136-148
    • /
    • 2016
  • This study was carried out to analyze the consumption expenditure condition of elderly persons with and without physical disabilities by social economic status and sociodemographic characteristics and to compare the results of those two groups for making an offer the basic materials to provide political support for elderly persons with physical disabilities. The statistical analysis of collected data was enforced through T-test, ANOVA and Crosstabs with SPSS 19.0 program. The results of this study are summarized as follows. First, the group with disabilities has presumed to be in relative poverty given that disposable income, academic career and total living expenses showed lower than the other group. Second, the component ratios of domestic foods and housing expenses of disabled group showed higher but those of specific spending items of expenditure such as social activities, reserving fund of social security for economic safety net, clothing and eating out expenses showed lower than the other group.

Reliability Optimization of Urban Transit Brake System For Efficient Maintenance (효율적 유지보수를 위한 도시철도 전동차 브레이크의 시스템 신뢰도 최적화)

  • Bae, Chul-Ho;Kim, Hyun-Jun;Lee, Jung-Hwan;Kim, Se-Hoon;Lee, Ho-Yong;Suh, Myung-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.31 no.1 s.256
    • /
    • pp.26-35
    • /
    • 2007
  • The vehicle of urban transit is a complex system that consists of various electric, electronic, and mechanical equipments, and the maintenance cost of this complex and large-scale system generally occupies sixty percent of the LCC (Life Cycle Cost). For reasonable establishing of maintenance strategies, safety security and cost limitation must be considered at the same time. The concept of system reliability has been introduced and optimized as the key of reasonable maintenance strategies. For optimization, three preceding studies were accomplished; standardizing a maintenance classification, constructing RBD (Reliability Block Diagram) of VVVF (Variable Voltage Variable Frequency) urban transit, and developing a web based reliability evaluation system. Historical maintenance data in terms of reliability index can be derived from the web based reliability evaluation system. In this paper, we propose applying inverse problem analysis method and hybrid neuro-genetic algorithm to system reliability optimization for using historical maintenance data in database of web based system. Feed-forward multi-layer neural networks trained by back propagation are used to find out the relationship between several component reliability (input) and system reliability (output) of structural system. The inverse problem can be formulated by using neural network. One of the neural network training algorithms, the back propagation algorithm, can attain stable and quick convergence during training process. Genetic algorithm is used to find the minimum square error.

Optical Security System Based on the Phase Characteristic of Joint Transform Correlator (결합변환 상관기의 위상특성을 이용한 광 암호화 시스템)

  • 박세준;서동환;김수종
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.6
    • /
    • pp.400-407
    • /
    • 2003
  • In this paper an optical encryption system, which can decrypt the original image by using the autocorrelation terms of a JTC, is proposed. Unlike the classical JTC, the joint input plane of the proposed system is composed in a frequency domain not a spatial domain, thus it needs only one Fourier transformation. To use like this, the phase component appeared in the output plane of JTC should be considered. We presents the effect of phase and provides the solution. An original image is encrypted to a complex-valued random image. The original image is reconstructed using the autocorrelation terms which is the main drawback of JTC, therefore the proposed system is more suitable for JTC and real time processing. By computer simulation and optical experiment, the analysis for the phase effect and the performance of the proposed system are confirmed.