• Title/Summary/Keyword: storage management

Search Result 2,631, Processing Time 0.032 seconds

Development of a Risk Assessment Program for Chemical Terrorism (화학적 테러에 대한 위험성 평가 프로그램 개발)

  • Lee, Younghee;Kim, Eunyong;Kim, Jinkyung;Moon, Il
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2008
  • This study focuses on assessing the security ri sk or the terrorism in chemical process industries. This research modifies conventional method for assessing the terrorism risk. The risk assessment method is developed and it is implemented as software to analyze the possibility of terrorism and sabotage. This program includes five steps; asset characterization, threat assessment, vulnerability analysis, risk assessment and new countermeasures. It is a systematic, risk based approach in which risk is a function of the severity of consequences of an undesired event, the likelihood of adversary attack, and the likelihood of adversary success in causing the undesired event. The reliability of the program is verified using a dock zone case. The case dock zone includes a storage farm, a manufacturing plant, an electrical supply utility, a hydrotreater unit, many containers, and administration buildings. This study represents chemical terrorism response technology, the prevention plan, and new countermeasure to mitigate by using risk assessment methods in the chemical industry and public sector. This study suggests an effective approach to the chemical terrorism response management.

  • PDF

Quantitative Proteogenomics and the Reconstruction of the Metabolic Pathway in Lactobacillus mucosae LM1

  • Pajarillo, Edward Alain B.;Kim, Sang Hoon;Lee, Ji-Yoon;Valeriano, Valerie Diane V.;Kang, Dae-Kyung
    • Food Science of Animal Resources
    • /
    • v.35 no.5
    • /
    • pp.692-702
    • /
    • 2015
  • Lactobacillus mucosae is a natural resident of the gastrointestinal tract of humans and animals and a potential probiotic bacterium. To understand the global protein expression profile and metabolic features of L. mucosae LM1 in the early stationary phase, the QExactiveTM Hybrid Quadrupole-Orbitrap Mass Spectrometer was used. Characterization of the intracellular proteome identified 842 proteins, accounting for approximately 35% of the 2,404 protein-coding sequences in the complete genome of L. mucosae LM1. Proteome quantification using QExactiveTM Orbitrap MS detected 19 highly abundant proteins (> 1.0% of the intracellular proteome), including CysK (cysteine synthase, 5.41%) and EF-Tu (elongation factor Tu, 4.91%), which are involved in cell survival against environmental stresses. Metabolic pathway annotation of LM1 proteome using the Kyoto Encyclopedia of Genes and Genomes (KEGG) database showed that half of the proteins expressed are important for basic metabolic and biosynthetic processes, and the other half might be structurally important or involved in basic cellular processes. In addition, glycogen biosynthesis was activated in the early stationary phase, which is important for energy storage and maintenance. The proteogenomic data presented in this study provide a suitable reference to understand the protein expression pattern of lactobacilli in standard conditions

Design and Implementation of U-Health System for Active Oxygen Measurement Data based on Mobile Phone (활성산소 측정 데이터를 위한 모바일 기반의 U헬스 시스템 설계 및 구현)

  • Lee, Chang Moo;Oh, Seung Kyo;Choi, Deok Jai
    • Smart Media Journal
    • /
    • v.1 no.4
    • /
    • pp.52-58
    • /
    • 2012
  • In recent years the combination of IT and BT for U-Healthcare Medical Services has attracted popular attention as an alternative for solving health problems due to aging issue. Active oxygen as free radicals causes unstable state of the body resulting to other disease on which approximate 90% of the diseases are associated with active oxygen. The severity is even higher along with increasing age. Therefore, there is a need for systematic management of active oxygen saturation for the elderly and chronic patients. In this paper, the data about active oxygen measurements from the body measurement is sent to the data storage of medical facilities by the service provider. Medical information is measured by devices provided complying with the standard, support and information using Bluetooth communication. Users can check their health status themselves using the proposed system through 3G/4G mobile devices like smart phone to medical institutions in which the smart phone act as a gateway for medical data transferred from patient to medical institutions and vice versa. Users can get and experience a diagnosis and effective U-Environmental Health Services from Medical institutions anywhere using the proposed built system.

  • PDF

Encapsulation of SEED Algorithm in HCCL for Selective Encryption of Android Sensor Data (안드로이드 센서 정보의 선택적 암호화를 지원하는 HCCL 기반 SEED 암호의 캡슐화 기능 연구)

  • Kim, Hyung Jong;Ahn, Jae Yoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.73-81
    • /
    • 2020
  • HCCL stands for Heterogenous Container Class Library. HCCL is a library that allows heterogeneous types of data to be stored in a container as a single record and to be constructed as a list of the records to be stored in database. With HCCL, encryption/decryption can be done based on the unified data type. Recently, IoT sensor which is embedded in smartphone enables developers to provide various convenient services to users. However, it is also true that infringement of personal information may occur in the process of transmitting sensor information to API and users need to be prepared for this situation in some sense. In this study, we developed a data model that enhances existing security using SEED cryptographic algorithms while managing information of sensors based on HCCL. Due to the fact that the Android environment does not provide permission management function for sensors, this study decided whether or not to encrypt sensor information based on the user's choice so that the user can determine the creation and storage of safe data. For verification of this work, we have presented the performance evaluation by comparing with the situation of storing the sensor data in plaintext.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Security Threats in the Mobile Cloud Service Environment (모바일 클라우드 서비스 환경에서의 보안위협에 관한 연구)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.263-269
    • /
    • 2014
  • Mobile Cloud Service will provide cloud services through mobile devices. Because storage space constraints and computing process performance limitations of mobile devices, this service will process in the cloud environment after moving works and data that have to process in mobile terminal. The obstacles of mobile cloud service activity will have concerned high about the reliability service, data security, and the confidentiality security. In particular, in convergence of mobile services and cloud services, each threats are expected to be generated complicatedly. In this paper, we define the type of mobile cloud services as well as security threats that can occur in mobile cloud. Also we suggest security countermeasures in mobile app. and enterprises countermeasures. We suggest verification of mobile applications for user information protection about security countermeasures in mobile app. Also we describe the cloud providers responsibility and user responsibility about enterprises countermeasures.

Testing Implementation of Remote Sensing Image Analysis Processing Service on OpenStack of Open Source Cloud Platform (오픈소스 클라우드 플랫폼 OpenStack 기반 위성영상분석처리 서비스 시험구현)

  • Kang, Sang-Goo;Lee, Ki-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.141-152
    • /
    • 2013
  • The applications and concerned technologies of cloud computing services, one of major trends in the information communication technology, are widely progressing and advancing. OpenStack, one of open source cloud computing platforms, is comprised of several service components; using these, it can be possible to build public or private cloud computing service for a given target application. In this study, a remote sensing image analysis processing service on cloud computing environment has designed and implemented as an operational test application in the private cloud computing environment based on OpenStack. The implemented service is divided into instance server, web service, and mobile app. A instance server provides remote sensing image processing and database functions, and the web service works for storage and management of remote sensing image from user sides. The mobile app provides functions for remote sensing images visualization and some requests.

Implementation of an 8-Channel Statistical Multiplexer (8-채널 통계적 다중화기의 구현)

  • 이종락;조동호
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.21 no.5
    • /
    • pp.79-89
    • /
    • 1984
  • In this paper we present development of microprocessor-based 8-channel statistical multiplexer (SMUX). The hardware design includes one Z-80A CPU board with the clock rate of 4 MHz, one 16 Kbyte ROM board for program storage, one 16 Kbyte dynamic RAM board and three I/O boards, all connected through an S-100 compatible tristate bus. The SMUX can presently multiplex 8 channels with data rates ranging 50 bps to 9600 bps, but can be reduced to accommodate 4 channels by having a slight modification of software and removing one terminal I/O board. The system specifications meet CCITT recommendations X.25 link level, V.24, V.28, X.3 and X.28. Significant features of the SMUX are its capability of handling 4 input codes (ASCII, EBCDIC, Baudot, Transcode), the use of a dynamic buffer management algorithm, a diagnostic facility, and the efficient use of a single CPU for all system operation. Throughout the paper, detailed explanations are given as to how the hardware and software of the SMUX system have been designed efficiently.

  • PDF

Securing the Private Key in the Digital Certificate Using a Graphic Password (그래픽 비밀번호를 활용한 공인인증서 개인키 보호방법에 관한 연구)

  • Kang, Byung-Hoon;Kim, Beom-Soo;Kim, Kyung-Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.1-16
    • /
    • 2011
  • A digital certificate mandated by the Electronic Signature Act has become familiar in our daily lives as 95% of the economically active population hold certificates. Due to upgrades to 256 bit level security that have become effective recently, the security and reliability of digital certificates are expected to increase. Digital certificates based on Public Key Infrastructure (PKI) have been known as "no big problem," but the possibility of password exposure in cases of leaked digital certificates still exists. To minimize this vulnerability, various existing studies have introduced alternative password methods, expansion of certificate storage media, and multiple certification methods. These methods perform enhanced functions but also have limitations including the fact that the secureness of passwords is not guaranteed. This study suggests an alternative method for enhancing the level of password secureness as a way to improve password security. This new method improves security management and enhances the convenience of using digital technologies. The results may be used for developing digital certificate related security technologies and research in the future.

Effect of irrigation reservoir, antecedent soil moisture condition and Huff time distribution on peak discharge in a basin (농업용 저수지, 선행토양함수조건 및 Huff 시간 분포가 유역의 첨두홍수량에 미치는 영향 분석)

  • Kwon, Minsung;Ahn, Jae-Hyun;Jun, Kyung Soo;Kim, Tae-Woong
    • Journal of Korea Water Resources Association
    • /
    • v.51 no.5
    • /
    • pp.417-424
    • /
    • 2018
  • This study analyzed the effect of irrigation reservoirs, antecedent soil moisture conditions (AMC) and Huff time distribution on peak discharge using Monte Carlo simulation. The peak discharge was estimated for four different cases in combination of irrigation reservoir capacity, AMC, and Huff time distribution. Applying 100% reservoir capacity or AMC-III, the peak discharges corresponding return periods of 50~300 years were overestimated by 25~30% compared to those of cases that considered the probability of occurrence for individual condition. Applying the 3rd quantile huff distribution, the peak discharges were overestimated by 5% over the peak discharge that considered the probability of occurrence. The overall results indicated that the effect on the peak flood of Huff distribution was less than AMC and reservoir storage.