• Title/Summary/Keyword: virus modeling

Search Result 50, Processing Time 0.02 seconds

Worm Virus Modeling and Simulation Methodology Using Artificial Life. (인공생명기반의 웜 바이러스 모델링 및 시뮬레이션 방법론)

  • Oh Ji-yeon;Chi Sung-do
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.171-179
    • /
    • 2005
  • Computer virus modeling and simulation research has been conducted with focus on the network vulnerability analysis. However, computer virus generally shows the biological virus characters such as proliferation, reproduction and evolution. Therefore it is necessary to research the computer virus modeling and simulation using Artificial Life. The approach of computer modeling and simulation using the Artificial Life technology Provides the efficient analysis method for the effects on the network by computer virus and the behavioral mechanism of the computer virus. Hence this paper proposes the methodology of computer virus modeling and simulation using Artificial Life, which may be contribute the research on the computer virus vaccine.

  • PDF

Worm Virus Modeling and Simu1ation Methodology Using Artificial Life (인공생명 기반의 웜바이러스 모델링 및 시뮬레이선 방법론)

  • You, Yong-Jun;Chae, Soo-Hoan;Chi, Sung-Do;Oh, Ji-Yeon
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.1-10
    • /
    • 2006
  • Computer virus modeling and simulation research has conducted with focus on the network vulnerability analysis. But computer virus shows the biological virus characters such as proliferation, reproduction and evolution. Therefore it is necessary to research the computer virus modeling and simulation using the Artificial life technique. The approach of computer modeling and simulation using Artificial life provides the analysis method about the effects on the network by computer virus and the behavior mechanism of computer virus. Hence this paper proposes the methodology of computer virus modeling and simulation using Artificial life, which is effected to contribute the research on the computer virus vaccine.

  • PDF

Zika Virus: Discovering Effective Protease Inhibitors via Template-Based Modeling

  • Choi, Yongseok
    • Proceeding of EDISON Challenge
    • /
    • 2016.03a
    • /
    • pp.86-89
    • /
    • 2016
  • The Zika virus, which is a member of the flavivirus genus, poses a serious threat to humanity because there is no vaccine or cure. Zika is suspected to cause microcephaly, and it is rapidly spreading throughout parts of Brazil. Surprisingly, there are no known protein structures for the virus which are essential for drug and vaccine development. This paper investigates the Zika virus's nonstructural proteins with template-based modeling by using GalaxyTBM/Refine/SC. GalaxyDock was used to examine the effectiveness of various known serine protease inhibitors in inhibiting the Zika viral protease. In testing five inhibitors, Kunitz soybean trypsin inhibitor showed the strongest binding affinity (-10.082 kcal/mol). This paper provides a rudimentary foundation for further drug discovery research regarding the Zika virus.

  • PDF

The Fuzzy Modeling by Virus-messy Genetic Algorithm (바이러스-메시 유전 알고리즘에 의한 퍼지 모델링)

  • 최종일;이연우;주영훈;박진배
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2000.11a
    • /
    • pp.157-160
    • /
    • 2000
  • This paper deals with the fuzzy modeling for the complex and uncertain system in which conventional and mathematical models may fail to give satisfactory results. mGA(messy Genetic Algorithm) has more effective and adaptive structure than sGA with respect to using changeable-length string and VEGA(Virus Evolution Genetic) Algorithm) can search the global and local optimal solution simultaneously with reverse transcription operator and transduction operator. Therefore in this paper, the optimal fuzzy model is obtained using Virus-messy Genetic Algorithm(Virus-mGA). In this method local information is exchanged in population so that population may sustain genetic divergence. To prove the surperioty of the proposed approach, we provide the numerical example.

  • PDF

Biological Infectious Watermarking Model for Video Copyright Protection

  • Jang, Bong-Joo;Lee, Suk-Hwan;Lim, SangHun;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.280-294
    • /
    • 2015
  • This paper presents the infectious watermarking model (IWM) for the protection of video contents that are based on biological virus modeling by the infectious route and procedure. Our infectious watermarking is designed as a new paradigm protection for video contents, regarding the hidden watermark for video protection as an infectious virus, video content as host, and codec as contagion medium. We used pathogen, mutant, and contagion as the infectious watermark and defined the techniques of infectious watermark generation and authentication, kernel-based infectious watermarking, and content-based infectious watermarking. We experimented with our watermarking model by using existing watermarking methods as kernel-based infectious watermarking and content-based infectious watermarking medium, and verified the practical applications of our model based on these experiments.

Nucleotide Sequence Analysis and Secondary Structure Modeling of the 3'-Noncoding Regions of Two Korean Strains of Turnip Mosaic Virus (순무 모자이크 바이러스 두 한국계통의 3' 말단 비번역부위에 대한 염기서열분석 및 2차구조 모델링)

  • 최장경;류기현;최국선;박원목
    • Korean Journal Plant Pathology
    • /
    • v.11 no.3
    • /
    • pp.271-277
    • /
    • 1995
  • The RNA nucleotide sequences of the 3/-noncoding regions (3'-NCRs) of two Korean strains of turnip mosaic virus (TuMV), Ca and cqs, have been determined from their cDNA clones that encompassed the 3'-terminal regions of the viral genomic RNAs. The 3'-NCRs of both strains were 209 nucleotides long, terminated with GAC residues and poly (A) tails. The potential polyadenylational signal motif, UAUGU, was located 140 nucleotides upstream from the poly (A) tail in each of the virus. A highly conserved hexanucleotide sequence [A G U G A/U G/C], which was common in the 3'-NCRs of the potyvirus RNAs, was also found at the regions of 119 bases upstream from the 3'-end. Comparison of the 3'-NCRs of the two Korean isolates with those of four strains from Canada, China and Japan showed significantly identical genotypes (94.3∼99.5%). The secondary structure of three loops with long stems was found within the 3'-NCRs by sequence analysis. The substituted bases in the region among the six TuMV strains did not alter their secondary structures. Length of the 3'-NCRs of the know 11 potyviral RNAs and TuMV RNAs was different from one another and their nucleotide sequences showed 55.7% to 24.0% of homology. The 3'-NCR, therefore, is considered to be useful for phylogenetic studies in potyviruses.

  • PDF

The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness (정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로)

  • Kim Jong-Ki;Jeon Jin-Hwan;Lim Ho-Seob
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.145-168
    • /
    • 2006
  • Current computer viruses are one of the most serious problems in information age due to their potential demage and impact on use of information systems. To make the problem worse, virus development technology has been advanced rapidly, and use of network systems has expanded widely. Therefore computer viruses are much more complex and use of anti-virus software(AV S/W) is not enough to prrevent virus incidents. It implies that computer viruses as well as other information security matters are not solely a technical problem but also a managerial one. This study emphasized on computer virus controls from managerial perspective of information security and investigated factors influencing the effectiveness of computer virus controls. Organization's comprehensive security policies provide guidelines on how organization or individual can protect themselves from computer viruses. Especially, user's education has positive impact on user's security related characteristics. Based on the analysis of research model using structural equation modeling technique, security policies were influencing security controls and improving user's computer viruses related awareness. Also security controls had positive impact on security effectiveness. However, no significant relationship was found between user's security related characteristics and security effectiveness.

  • PDF

Fuzzy Modeling Using Virus-Evolutionary Genetic Algorithm (바이러스-진화 유전 알고리즘을 이용한 퍼지 모델링)

  • 이승준;주영훈;박진배
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.5
    • /
    • pp.432-441
    • /
    • 2000
  • This paper deals with the fuzzy modeling for the complex and uncertain nonlinear systems, in which conventional and mathematical models may fail to give satisfactory results. Genetic algorithm has been used to identifY parameters and structure of fuzzy model because it has the ability to search optimal solution somewhat globally. The genetic algorithm, however, has a problem, which optimization process can be premature convergence in the case of lack of genetic divergence of population. Virus- evolutionary genetic algorithm(VEGA) could be a strategy against this local convergence. Therefore, we use VEGA for fuzzy modeling. In this method, local information is exchanged in population so that population can sustain genetic divergence. finally, to prove the theoretical hypothesis, we provide numerical examples to evaluate the feasibility and generality of fuzzy modeling using VEGA.

  • PDF

Fuzzy Modeling for Nonlinear Systems Using Virus-Evolutionary Genetic Algorithm (바이러스-진화 유전 알고리즘을 이용한 비선형 시스템의 퍼지모델링)

  • Lee, Seung-Jun;Joo, Young-Hoon;Chang, Wook;Park, Jin-Bae
    • Proceedings of the KIEE Conference
    • /
    • 1999.07b
    • /
    • pp.522-524
    • /
    • 1999
  • This paper addresses the systematic approach to the fuzzy modeling of the class of complex and uncertain nonlinear systems. While the conventional genetic algorithm (GA) only searches the global solution, Virus-Evolutionary Genetic Algorithm(VEGA) can search the global and local optimal solution simultaneously. In the proposed method the parameter and the structure of the fuzzy model are automatically identified at the same time by using VEGA. To show the effectiveness and the feasibility of the proposed method, a numerical example is provided. The performance of the proposed method is compared with that of conventional GA.

  • PDF

The Fuzzy Modeling by Virus-messy Genetic Algorithm (바이러스 메시 유전 알고리즘에 의한 퍼지 모델링)

  • 주영훈;최종일;박직배
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.2
    • /
    • pp.95-100
    • /
    • 2001
  • 비선형 시스템의 성공적인 퍼지 모델을 구성하기 위한 최적의 퍼지 추론 시스템의 동정은 중요하고도 어려운 문제이다. 전통적으로 유전 알고리즘은 어느 정도의 전역 최적해를 찾을 수 있기 때문에 퍼지 모델의 구조와 파라미터를 동정하는데 사용되어 왔다. 그러나, 유전 알고리즘은 개체군 진화 시 우수한 개체의 출현은 지역수렴의 원인이 된다. 따라서, 본 논문에서는 바이러스 메시 유전알고리즘을 이용한 효과적인 퍼지 모델링 방법을 제안한다. 제안된 방법은 지역 정보가 개체군 내에서 교환됨으로써 지역 수렴의 대인아 될 수 있을 뿐 아니라, 가변길이 스트링을 사용함으로써 좀더 효과적이고 적응적인 구조를 가질 수 있다. 또한 본 논문에서 제안한 방법의 우수성과 일반성을 증명하기 위해 복잡한 비선형 시스템과 가스로의 퍼지모델링에 적용하였다.

  • PDF