• 제목/요약/키워드: variants

Search Result 1,512, Processing Time 0.022 seconds

A Malware Variants Detection Method based on Behavior Similarity (행위 유사도 기반 변종 악성코드 탐지 방법)

  • Joe, Woo-Jin;Kim, Hyong-Shik
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.25-32
    • /
    • 2019
  • While the development of the Internet has made information more accessible, this also has provided a variety of intrusion paths for malicious programs. Traditional Signature-based malware-detectors cannot identify new malware. Although Dynamic Analysis may analyze new malware that the Signature cannot do, it still is inefficient for detecting variants while most of the behaviors are similar. In this paper, we propose a detection method using behavioral similarity with existing malicious codes, assuming that they have parallel patterns. The proposed method is to extract the behavior targets common to variants and detect programs that have similar targets. Here, we verified behavioral similarities between variants through the conducted experiments with 1,000 malicious codes.

Gorlin-Goltz Syndrome: A Case Report and Literature Review with PTCH1 Gene Sequencing

  • Hyo Seong Kim;Seung Heo;Kyung Sik Kim;Joon Choi;Jeong Yeol Yang
    • Archives of Plastic Surgery
    • /
    • v.50 no.4
    • /
    • pp.384-388
    • /
    • 2023
  • Gorlin-Goltz syndrome, also known as nevoid basal cell carcinoma syndrome, is an autosomal dominant disease characterized by multisystemic developmental defects caused by pathogenic variants such as patched-1 (PTCH1) gene variants and/or SUFU gene variants. The presence of either two main criteria or one major and two minor criteria are required for the diagnosis of Gorlin-Goltz syndrome. Recently, a major criterion for molecular confirmation has also been proposed. In this article, we report the case of an 80-year-old male who was admitted at our department for multiple brown-to-black papules and plaques on the entire body. He was diagnosed with Gorlin-Goltz syndrome with clinical, radiologic, and pathologic findings. While the diagnosis was made based on the clinical findings in general, confirmation of the genetic variants makes an ideal diagnosis and suggests a new treatment method for target therapy. We requested a genetic test of PTCH1 to ideally identify the molecular confirmation in the hedgehog signaling pathway. However, no pathogenic variants were found in the coding region of PTCH1, and no molecular confirmation was achieved.

Normal Development and Variants in Pediatric Bone (소아 뼈의 정상 발달과 변이)

  • Hee Jung Kim;Sun Kyoung You
    • Journal of the Korean Society of Radiology
    • /
    • v.85 no.3
    • /
    • pp.488-504
    • /
    • 2024
  • Normal variants refer to imaging findings that are generally asymptomatic and discovered incidentally, yet may exhibit findings similar to those observed in pathological conditions. Recognizing normal variants in pediatric bone requires comprehension of the developmental process of long tubular bones and secondary ossification centers. Familiarity with various radiological findings of normal variants can prevent unnecessary follow-up imaging tests, as well as incorrect diagnosis and treatment. In this review, we will discuss the characteristic imaging findings of normal variants seen in growing pediatric bones, along with strategies for distinguishing them from pathologic conditions.

A NOTE ON THE PAPER TITLED SOME VARIANTS OF OSTROWSKI'S METHOD WITH SEVENTH-ORDER CONVERGENCE

  • Geum, Young Hee
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.24 no.2
    • /
    • pp.141-146
    • /
    • 2011
  • Kou et al. presented a class of new variants of Ostrowski's method in their paper (J. of Comput. Appl. Math., 209(2007), pp.153-159) whose title is "Some variants of Ostrowski's method with seventh-order convergence". They proposed an incorrect error equation, although they showed a correct seventh-order of convergence. The main objective of this note is to establish the correct error equation of the method and confirm its validity via concrete numerical examples.

Isolation and Identification of a Symbiotic Bacterium from Steinernema carpocapsae

  • Park, Sun-Ho;Yu, Yeon-Su
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.4 no.1
    • /
    • pp.12-16
    • /
    • 1999
  • Xenorhabdus nematophilus sp., an insect-pathogenic bacterium, was newly isolated from Korean entomopathogenic nematode of Steinernema carpocapsae, which can be used as a useful bioinsecticide. Primary and secondary form variants of Xenorhabdus nematophilus were observed when cultured in vitro. Primary form variants adsorbed bromothymol blue, while secondary form did not. However, many other characters of two variants were very similar. The variants were all rod-shaped and cell size was highly variable ranging from 0.5 by 2.0 ${\mu}$m to 1.0 by 5.0 ${\mu}$m. Both produced highly toxic substances and killed the insect larva within 20∼38 hr, indicating that insect pathogenicity of Xenorhabdus is not directly associated with its phase variation. In addition, cell-free culture supernatant of Xenorhabdus was sufficient to kill the insect larva by injecting it ito insect hemolymph; however, cell-harboring culture broth was more effective for killing the insect. The use of Xenorhabdus nematophilus may provide a potential alternative to Bacillus thuringiensis (Bt) toxins.

  • PDF

Provably Secure Length-Saving Public-Key Encryption Scheme under the Computational Diffie-Hellman Assumption

  • Baek, Joon-Sang;Lee, Byoung-Cheon;Kim, Kwang-Jo
    • ETRI Journal
    • /
    • v.22 no.4
    • /
    • pp.25-31
    • /
    • 2000
  • Design of secure and efficient public-key encryption schemes under weaker computational assumptions has been regarded as an important and challenging task. As far as ElGamal-type encryption schemes are concerned, some variants of the original ElGamal encryption scheme based on weaker computational assumption have been proposed: Although security of the ElGamal variant of Fujisaki-Okamoto public -key encryption scheme and Cramer and Shoup's encryption scheme is based on the Decisional Diffie-Hellman Assumption (DDH-A), security of the recent Pointcheval's ElGamal encryption variant is based on the Computational Diffie-Hellman Assumption (CDH-A), which is known to be weaker than DDH-A. In this paper, we propose new ElGamal encryption variants whose security is based on CDH-A and the Elliptic Curve Computational Diffie-Hellman Assumption (EC-CDH-A). Also, we show that the proposed variants are secure against the adaptive chosen-ciphertext attack in the random oracle model. An important feature of the proposed variants is length-efficiency which provides shorter ciphertexts than those of other schemes.

  • PDF

RSA-type Algebra Structures

  • Tran, Long D.;Tran, Thu D.;Choi, Deokjai;Nguyen, Thuc D.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2835-2850
    • /
    • 2016
  • RSA is a public key cryptosystem that is currently the most popularly used in information security. Development of RSA variants has attracted many researchers since its introduction in 1978 by Ron Rivest, Adi Shamir, and Leonard Adleman. In this paper, we propose an algebraic structure for RSA and show that the proposed structure covers all known RSA variants. The usefulness of the proposed structure is then proved by showing that, following the structure we can construct a RSA variant based on the Bergman ring. We compare the original RSA and its variants from the point of view of factoring the modulus to determine why the original RSA is widely used than its variants.

Functional annotation of de novo variants from healthy individuals

  • Lee, Jean;Hong, Sung Eun
    • Genomics & Informatics
    • /
    • v.17 no.4
    • /
    • pp.46.1-46.7
    • /
    • 2019
  • The implications of germline de novo variants (DNVs) in diseases are well documented. Despite extensive research, inconsistencies between studies remain a challenge, and the distribution and genetic characteristics of DNVs need to be precisely evaluated. To address this issue at the whole-genome scale, a large number of DNVs identified from the whole-genome sequencing of 1,902 healthy trios (i.e., parents and progeny) from the Simons Foundation for Autism Research Initiative study and 20 healthy Korean trios were analyzed. These apparently nonpathogenic DNVs were enriched in functional elements of the genome but relatively depleted in regions of common copy number variants, implying their potential function as triggers of evolution even in healthy groups. No strong mutational hotspots were identified. The pathogenicity of the DNVs was not strongly elevated, reflecting the health status of the cohort. The mutational signatures were consistent with previous studies. This study will serve as a reference for future DNV studies.

Designing an Object-Oriented Framework for the Variants of Simulated Annealing Algorithm (Simulated Annealing Algorithm의 변형을 지원하기 위한 객체지향 프레임워크 설계)

  • Jeong, Yeong-Il;Yu, Je-Seok;Jeon, Jin;Kim, Chang-Uk
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.409-412
    • /
    • 2004
  • Today, meta-heuristic algorithms have been much attention by researcher because they have the power of solving combinational optimization problems efficiently. As the result, many variants of a meta-heuristic algorithm (e.g., simulated annealing) have been proposed for specific application domains. However, there are few efforts to classify them into a unified software framework, which is believed to provide the users with the reusability of the software, thereby significantly reducing the development time of algorithms. In this paper, we present an object-oriented framework to be used as a general tool for efficiently developing variants of simulated annealing algorithm. The interface classes in the framework achieve the modulization of the algorithm, and the users are allowed to specialize some of the classes appropriate for solving their problems. The core of the framework is Algorithm Configuration Pattern (ACP) which facilitates creating user-specific variants flexibly. Finally, we summarize our experiences and discuss future research topics.

  • PDF

Effect of {10ī2} Twinning Characteristics on the Deformation Behavior of Rolled AZ31 Mg Alloy ({10ī2} 쌍정 특성이 AZ31 마그네슘 합금 압연재의 변형거동에 미치는 영향)

  • Park, S.H.;Hong, S.G.;Lee, J.H.;Lee, C.S.
    • Transactions of Materials Processing
    • /
    • v.19 no.7
    • /
    • pp.416-422
    • /
    • 2010
  • The $\{10\bar{1}2\}$ twinning characteristics, such as active twin variants, volume fraction of twins with strain, twin morphology, twin texture and angle relationship between twins, were dependent on the activation mode (i.e., tension parallel to the caxis or compression perpendicular to the c-axis). The selection criterion of active twin variants was governed by the Schmid law. This activation of selected twin variants depending on the activation mode consequently caused a totally different plastic deformation behavior in two activation modes. The differences in the deformation characteristics, such as flow stress and work hardening rate, between both activation modes were explained in relation with activation stresses for slips and twinning, relative activities of twinning and slips during plastic deformation, grain refining effect by twin boundaries (Hall-Petch effect), and twinning-induced change in activities of slips.