• Title/Summary/Keyword: stolen

Search Result 151, Processing Time 0.028 seconds

Influences by position of node and existence of leaf on microtuberization in node culture of potato (감자절간배양에서 마디위치 및 잎의 부착유무에 따른 소괴경형성의 차이)

  • Hwang, Hye-Yeon;Lee, Young-Bok
    • Journal of Plant Biotechnology
    • /
    • v.35 no.1
    • /
    • pp.63-68
    • /
    • 2008
  • Single-node stem pieces ca. 1 cm in length containing a axillary bud were obtained from in vitro plants of potato (Solanum tuberosum L.). The influences by a position of the node and the existence of a leaf at the node were observed in the single-node culture on the 8% sucrose MS medium. The effect of CCC was also investigated for the microtuberization. The apical part node was excellent in the tuberization not to mention shoot length, fresh weight, diameter, the number of node on the in vitro culture of a single-node than the lower part. The differences in the diameter of a tuber formed in the part of the axillary bud on all treatments including the cultivation of the apical part node were not recognized. However, the fresh weight of the tuber showed high value in the tuber formed at the axillary bud of shoot apex part. At 20 days after cultivation, tuberization was promoted in the new stolen that developed from the bud of node with a leaf under SD condition of 8 hours at $20^{\circ}C$. The tuberization from axillary bud of the single-node without leaf was inhibited at high temperature of $28^{\circ}C$ regardless of daylength. Whereas, tuberization at $20^{\circ}C$ and $28^{\circ}C$ was similar without the difference under SD condition but the tuber formation ratio were low. CCC 500 mg/L promoted tuberization and the effect was also showed even under LD condition at $28^{\circ}C$. The inhibiton of tuberization under LD and high temperature condition could be solved by treatment with CCC.

Commercialization of Patented Technology on Turfgrass Production in Korea (잔디 생산 특허기술의 현황 및 산업화)

  • Youn, Jeong-Ho;Lee, Jae-Pil;Kim, Doo-Hwan
    • Asian Journal of Turfgrass Science
    • /
    • v.20 no.1
    • /
    • pp.107-118
    • /
    • 2006
  • This study was carried out to introduce a couple of commercialized patented technologies in the area of turfgrass production. All sod production related patents in Korea during the period from Dec. 20, 1948 to Dec. 30, 2005 were reviewed. Details of two patents (patent No. 0434389 and 0478194) were included. The results are summarized as follows: 1. One of the domestic patents on sod production was the technique using natural and plastic films. Information on topsoil mixtures was also reviewed form foreign patents. 2. Patented multi-purpose sowing equipment can evenly mix soil, sand, fertilizer and other soil conditioners with seed, stolen and rhizome of turfgrass. 3. Patent on cool-season turfgrass sod production provide topsoil mixture combination and mixing ratio for sports field, landscape area and roof garden.

Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 생체 정보 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.147-153
    • /
    • 2014
  • The numerous improved schemes of remote user authentication based on password have been proposed in order to overcome the security weakness in user authentication process. Recently, some of biometric-based user authentication schemes to use personal biometric information have been introduced and they have shown the relatively higher security and the enhanced convenience as compared to traditional password-based schemes. These days wireless sensor network is a fundamental technology in face of the ubiquitous era. The wireless sensor networks to collect and process the data from sensor nodes in increasing high-tech applications require important security issues to prevent the data access from the unauthorized person. Accordingly, the research to apply to the user authentication to the wireless sensor networks has been under the progress. In 2010, Yuan et al. proposed a biometric-based user authentication scheme to be applicable for wireless sensor networks. Yuan et al. claimed that their scheme is effectively secure against the various security flaws including the stolen verifier attack. In this paper, author will prove that Yuan et al.'s scheme is still vulnerable to the password guessing attack, user impersonation attack and the replay attack, by analyzing their security weakness.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

Study on Research Method for Leading-in Public Bike Operation System -Focus on Public Bike System in NaJu City- (공공자전거 운영시스템 도입을 위한 적용방법에 관한 연구 -나주시 공공자전거 시스템을 중심으로-)

  • Hyoung, Sung-Eun;Cho, Un-Dae;Cho, Kwang-Su;Hong, Jung-Pyo
    • Science of Emotion and Sensibility
    • /
    • v.14 no.1
    • /
    • pp.7-16
    • /
    • 2011
  • This is a study on operation system's application method for leading-in public bike operation system through researching on case study at home and abroad, and situation research in Naju city. In the 1st research, studied about the main problems showed at application cases of public bike system at domestic and overseas, such as using time, danger for be stolen and damaged. 2nd research focuses on necessarily of leading-in operation system to be used easily by city residents and travelers of Naju City which is the scheduled city for leading-in public bike system. 3rd research is on the basis of the result showed in 1st and 2nd research, supplied some problems' solving method for France Veblib System, such as lending and rental process using mobile, system operation process, communication process. Also, supplied the application method for problems showed at 1st and 2nd research and civil service proposal. The leading-in method study on public bike operation system was done through above research, also case study at home and abroad, situation study, and rental program module development, and this operation system is worked as an model operation system in Naju City. The future study of leading-in operation system will be more effective by means of summing up test running result.

  • PDF

Android App Birthmarking Technique Resilient to Code Obfuscation (난독화에 강인한 안드로이드 앱 버스마킹 기법)

  • Kim, Dongjin;Cho, Seong-Je;Chung, Youngki;Woo, Jinwoon;Ko, Jeonguk;Yang, Soo-Mi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.700-708
    • /
    • 2015
  • A software birthmark is the set of characteristics of a program which can be used to identify the program. Many researchers have studied on detecting theft of java programs using some birthmarks. In case of Android apps, code obfuscation techniques are used to protect the apps against reverse-engineering and tampering. However, attackers can also use the obfuscation techniques in order to conceal a stolen program. A birthmark (feature) of an app can be alterable by code obfuscations. Therefore, it is necessary to detect Android app theft based on the birthmark which is resilient to code obfuscation. In this paper, we propose an effective Android app birthmark and app theft detection through the proposed birthmark. By analyzing some obfuscation tools, we have first selected parameter and the return types of methods as an adequate birthmark. Then, we have measured similarity of target apps using the birthmarks extracted from the apps, where some target apps are not obfuscated and the others obfuscated. The measurement results show that our proposed birthmark is effective for detecting Android app theft even though the apps are obfuscated.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Aboriginal Community Archives in Australia and Current Meaning of "Parallel Provenance" (호주 원주민 공동체 아카이브와 '평행출처주의'의 현재적 의미)

  • Lee, Kyong Rae
    • The Korean Journal of Archival Studies
    • /
    • no.40
    • /
    • pp.29-60
    • /
    • 2014
  • The purpose of this study is to trace the formation process of "parallel provenance" concept in the context of Australia's aboriginal community archives development and draw its implications for contemporary rebuilding of domestic "past affairs-related committee archives". Focused on historical development of aboriginal community archives in Australia, this writing divides its development into three periods: colonial archives, post-colonial archives, and contemporary archives and investigates each period's distinct features in managing and building of aboriginal community archives. First of all, for colonial archives, it pays attention to Australia's archival tradition, which focused on current record-keeping and then development of multiple provenance resulted from this tradition. Second, for post-colonial archives, it examines the appearance of aboriginal people as the subject of documentation category and name indexing on them. Finally, for contemporary archives, it analyzes current activities of Australia's academic world of archival science for overcoming "the otherness" of aboriginal people through conceptualization of "parallel provenance". Conclusively, through current meaning of parallel provenance, this study draws implications for democratic contemporary rebuilding of domestic past affairs-related committee archives, in which historical victims become the subject of archives.

Mysteries and truth of the Major Bibliocaust in the East and West (동서양 주요 비블리오코스트의 미스터리와 진상)

  • Hee-Yoon, Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.29-49
    • /
    • 2022
  • The book is a footnote of life and memory, a sign of knowledge and intelligence, including divinity and reason, idols and destruction, praise and curse, arrogance and prejudice, truth and falsehood. The past emperors, monarchs, priests, and rulers have been controlled or slaughtered by censorship and prohibition, burning and destruction, etc. In ancient history, archaeology, war history, cultural history, and library and information science, many studies have been conducted on the burning and destruction of books, but the Western perspective is dominant, and there are nationalistic approaches and logical leaps. This study traced the truth about the destruction of the Royal Library of Alexandria in Egypt, destruction of the Baghdad libraries by the Mongol Empire, and burning more than 200,000 volumes of Korean historical documents of Japanese Government-General in Korea among the major bibliocausts with many mysteries and controversial issues in the East and West. As a result, the Royal Library of Alexandria is most likely destroyed under the rule of the Roman Empire. The massacre of the Baghdad library by the Mongolian army is a historical fact, not the manipulation and extreme exaggeration of western society. And Korean historical documents have been stolen and burned by the Government-General of Chōsen for 35 years and should be recognized as '200,000 + α'. Lastly, On the premise of excavating historical materials, research to investigate the truth behind the blibiocaust or libricide should be continued.

Industrial Technology Leak Detection System on the Dark Web (다크웹 환경에서 산업기술 유출 탐지 시스템)

  • Young Jae, Kong;Hang Bae, Chang
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.46-53
    • /
    • 2022
  • Today, due to the 4th industrial revolution and extensive R&D funding, domestic companies have begun to possess world-class industrial technologies and have grown into important assets. The national government has designated it as a "national core technology" in order to protect companies' critical industrial technologies. Particularly, technology leaks in the shipbuilding, display, and semiconductor industries can result in a significant loss of competitiveness not only at the company level but also at the national level. Every year, there are more insider leaks, ransomware attacks, and attempts to steal industrial technology through industrial spy. The stolen industrial technology is then traded covertly on the dark web. In this paper, we propose a system for detecting industrial technology leaks in the dark web environment. The proposed model first builds a database through dark web crawling using information collected from the OSINT environment. Afterwards, keywords for industrial technology leakage are extracted using the KeyBERT model, and signs of industrial technology leakage in the dark web environment are proposed as quantitative figures. Finally, based on the identified industrial technology leakage sites in the dark web environment, the possibility of secondary leakage is detected through the PageRank algorithm. The proposed method accepted for the collection of 27,317 unique dark web domains and the extraction of 15,028 nuclear energy-related keywords from 100 nuclear power patents. 12 dark web sites identified as a result of detecting secondary leaks based on the highest nuclear leak dark web sites.