• 제목/요약/키워드: Access to Information (A2I)

검색결과 195건 처리시간 0.024초

Development of an Analysis Program of Type I Polyketide Synthase Gene Clusters Using Homology Search and Profile Hidden Markov Model

  • Tae, Hong-Seok;Sohng, Jae-Kyung;Park, Kie-Jung
    • Journal of Microbiology and Biotechnology
    • /
    • 제19권2호
    • /
    • pp.140-146
    • /
    • 2009
  • MAPSI(Management and Analysis for Polyketide Synthase Type I) has been developed to offer computational analysis methods to detect type I PKS(polyketide synthase) gene clusters in genome sequences. MAPSI provides a genome analysis component, which detects PKS gene clusters by identifying domains in proteins of a genome. MAPSI also contains databases on polyketides and genome annotation data, as well as analytic components such as new PKS assembly and domain analysis. The polyketide data and analysis component are accessible through Web interfaces and are displayed with diverse information. MAPSI, which was developed to aid researchers studying type I polyketides, provides diverse components to access and analyze polyketide information and should become a very powerful computational tool for polyketide research. The system can be extended through further studies of factors related to the biological activities of polyketides.

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • 제12권2호
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.

UBIFS 메모리 할당에 관한 I/O 성능 분석 (I/O Performance Analysis about Memory Allocation of the UBIFS)

  • 이재강;오세진;정경호;윤태진;안광선
    • 한국산업정보학회논문지
    • /
    • 제18권4호
    • /
    • pp.9-18
    • /
    • 2013
  • 플래시 메모리는 비휘발성, 저전력, 빠른 입출력, 충격에 강함 등과 같은 많은 장점으로 스마트 기기 및 임베디드 시스템의 저장매체로 많이 사용되고 있다. 낸드(NAND) 플래시에 사용되는 파일시스템(File System)은 대표적으로 YAFFS2, JFFS2, UBIFS 등이 있다. 본 논문에서는 최근 리눅스 커널에 포함된 UBIFS 파일시스템에 메모리 할당을 달리하여 I/O 성능을 실험한다. 제안한 I/O 성능 분석은 순차접근 방법과 랜덤접근으로 분류하고, 메모리 할당은 kmalloc(), vmalloc(), kmem_cache()를 사용하여 6가지 유형으로 나누어 실험하였다. 실험을 통하여 6가지 유형 중 UBI 서브시스템과 UBIFS에 vmalloc()과 kmalloc()을 적용한 2번째 유형이 순차읽기 12.45%, 순차다시쓰기 11.23%의 빠른 성능을 보였으며 랜덤 읽기에는 7.82% 랜덤 쓰기에서는 6.90%의 성능 향상을 보였다.

소셜 네트워크에서 프라이버시를 보호하는 효율적인 거리기반 접근제어 (Efficient Hop-based Access Control for Private Social Networks)

  • 정상임;김동민;정익래
    • 정보보호학회논문지
    • /
    • 제22권3호
    • /
    • pp.505-514
    • /
    • 2012
  • 싸이월드, 페이스북과 같은 소셜 네트워킹 서비스는 개인적인 데이터를 지인들과 공유하는데 매우 유용하다. 이들은 대부분 중앙 집중형 서버를 기반으로 하는데, 이 같은 시스템은 사용자들의 모든 통신 내역이 서버에게 노출된다는 단점을 가진다. 이러한 문제점을 개선하기 위해서 p2p 시스템에 착안한 분산된 소셜 네트워킹 서비스와 그 안에서 타인의 데이터에 접근하는 것을 제어하는 연구가 진행 중이다. 기존의 접근제어 기법에서는 신뢰하는 제 3기관이 필요하거나 프로토콜에 참여하는 모든 사용자들이 온라인 상태여야 하고, 사용자들이 분산된 방식으로 구축한 소셜 네트워크가 서버에게 노출되는 단점이 존재했다. M. Atallah 등은 처음으로 암호학적인 키 관리 기법을 활용해서 기존의 기법들이 지닌 문제점을 모두 해결했지만, 제안된 기법이 매우 비효율적이라는 한계가 있었다. 본 논문에서는 이 기법이 가진 비효율을 분석하고, 키 관리 기법이 아닌 대칭키 기반의 환형(circular) 암호를 최초로 적용하여 효율적인 접근제어 기법을 제안한다. 제안하는 기법은 온라인 상에 구축된 소셜 네트워크를 통해서 사용자 데이터에 대한 접근을 분산된 방식으로 제어하고, 서버가 그 네트워크를 추론할 수 없도록 기존의 기법보다 향상된 효율성과 안전성을 제공한다.

바다-$IV/I^2R$: 고차원 이미지 색인 구조를 이용한 효율적인 내용 기반 이미지 검색 시스템의 설계와 구현 (BADA-$IV/I^2R$: Design & Implementation of an Efficient Content-based Image Retrieval System using a High-Dimensional Image Index Structure)

  • 김영균;이장선;이훈순;김완석;김명준
    • 한국정보처리학회논문지
    • /
    • 제7권2S호
    • /
    • pp.678-691
    • /
    • 2000
  • A variety of multimedia applications require multimedia database management systems to manage multimedia data, such as text, image, and video, as well as t support content-based image or video retrieval. In this paper we design and implement a content-based image retrieval system, BADA-IV/I$^2$R(Image Information Retrieval), which is developed based on BADA-IV multimedia database management system. In this system image databases can be efficiently constructed and retrieved with the visual features, such as color, shape, and texture, of image. we extend SQL statements to define image query based on both annotations and visual features of image together. A high-dimensional index structure, called CIR-tree, is also employed in the system to provide an efficient access method to image databases. We show that BADA-IV/I$^2$R provides a flexible way to define query for image retrieval and retrieves image data fast and effectively: the effectiveness and performance of image retrieval are shown by BEP(Bull's Eye Performance) that is used to measure the retrieval effectiveness in MPEG-7 and comparing the performance of CIR-tree with those of X-tree and TV-tree, respectively.

  • PDF

Power Allocation for Half-duplex Relay-based D2D Communication with QoS guarantee

  • Dun, Hui;Ye, Fang;Jiao, Shuhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1311-1324
    • /
    • 2019
  • In the traditional cellular network communication, the cellular user and the base station exchange information through the uplink channel and downlink channel. Meanwhile, device-to-device (D2D) users access the cellular network by reusing the channel resources of the cellular users. However, when cellular user channel conditions are poor, not only D2D user cannot reuse its channel resources to access the network, but also cellular user's communication needs cannot be met. To solve this problem, we introduced a novelty D2D communication mechanism in the downlink, which D2D transmitter users as half-duplex (HD) relays to assist the downlink transmission of cellular users with reusing corresponding spectrum. The optimization goal of the system is to make the cellular users in the bad channel state meet the minimum transmission rate requirement and at the same time maximize the throughput of the D2D users. In addition, i for the purpose of improving the efficiency of relay transmission, we use two-antenna architecture of D2D relay to enable receive and transmit signals at the same time. Then we optimized power of base station and D2D relay separately with consideration of backhaul interference caused by two-antenna architectures. The simulation results show that the proposed HD relay strategyis superior to existing HD and full-duplex (FD) models in the aspects of system throughput and power efficiency.

AAA System for PLMN-WLAN Internetworking

  • Janevski Toni
    • Journal of Communications and Networks
    • /
    • 제7권2호
    • /
    • pp.192-206
    • /
    • 2005
  • Integration of mobile networks and Internet has started with 2.5 generation of mobile cellular networks. Internet traffic is today dominant traffic type worldwide. The hanger for higher data rates needed for data traffic and new IP based services is essential in the development of future wireless networks. In such situation, even 3G with up to 2 Mbit/s has not provided data rates that are used by Internet users with fixed broadband dial-up or through wired local area networks. The solution to provide higher bit rates in wireless access network has been found in wireless LAN although initially it has been developed to extend wired LAN into wireless domain. In this paper, we propose and describe a solution created for interoperability between mobile cellular network and WLAN. The integration between two networks, cellular and WLAN, is performed on the authentication, authorization, and accounting, i.e., AAA side. For that purpose we developed WLAN access controller and WLAN AAA gateway, which provide gateway-type access control as well as charging and billing functionalities for the WLAN service. In the development process of these elements, we have considered current development stadium of all needed network entities and protocols. The provided solution provides cost-effective and easy-to-deploy PLMN-WLAN Internetworking scenario.

통계적 채널 Quality 정보를 이용한 직교 주파수분할 다중접속(OFDMA) Part-I: 시스템 및 채널 모델링 (Orthogonal Frequency Division Multiple Access with Statistical Channel Quality Measurements Part-I: System and Channel Modeling)

  • 윤석현
    • 한국통신학회논문지
    • /
    • 제31권2A호
    • /
    • pp.119-127
    • /
    • 2006
  • Part-I과 II를 포함하는 본 연구에서는 하향링크 직교 주파수분할 다중접속(OFDMA) 방식을 위한 실제적인 동적 채널할당 방법에 대해 논의한다. OFDMA 시스템은 채널의 상태정보 궤환을 위한 상향링크에서의 오버헤드를 줄이기 위해 부반송파들의 집합을 하나의 부채널로 정의하고 이를 채널의 상태정보 궤환, 사용자 다중화 및 전력/부호화율 할당의 단위로 사용하는데 본 논문(part-I)에서는 부채널의 일반화된 형태로 연속구조와 분산구조를 정의하고 이들 각 부채널구조의 통계적 특성을 살펴본다. 특히, 각 구조에 대해 부채널상에서의 신호대 잡음비(SNR) 분포를 라이스 분포로 모델링함으로써 각 부채널의 채널 상태를 채널이득의 순시 평균 및 분산의 1, 2차 모멘트로 나타내고 주어진 다중경로 채널 모델에 대해 이 두 파라미터 값의 확률 분포를 유도한다. 본 논문의 결과는 part-II에서 라이스 모델링에 기초한 일반화된 동적자원할당 알고리즘을 제시하고 성능분석을 수행하는데 사용된다.

The Role of People, Information, and Technology in LIS Education: Driving a Call for Action Towards the UN 2030 Agenda

  • Kim, Heesop;Alenzuela, Reysa C.
    • Journal of Information Science Theory and Practice
    • /
    • 제4권4호
    • /
    • pp.16-29
    • /
    • 2016
  • Around the world, public access to information plays a crucial role in improving lives and facilitating development. People, technology, and information, which also represent common themes of i-Schools, are deemed relevant in adapting to these global challenges. The main purpose of this research is to identify the orientation of curriculums in LIS Schools in South Korea toward technology, information, and people for graduate schools of library and information science. This research also correlates the directions of the schools with the UN 2030 Agenda. Using the Wilson model, this study examines the orientation of courses offered. The result of classification and content analysis revealed that courses offered are leaning towards technology and information content. Courses reviewed in the light of developing knowledge and skills of information professionals to facilitate the fulfillment of global goals can make libraries more responsive to the changing times.

A Secure WLAN Authentication Scheme

  • Singh, Rajeev;Sharma, Teek Parval
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권3호
    • /
    • pp.176-187
    • /
    • 2013
  • Message replay, malicious Access Point (AP) associations and Denial of Service (DoS) attacks are the major threats in Wireless LANs. These threats are possible due to a lack of proper authentication and insecure message communications between wireless devices. Current wireless authentication & key exchange (AKE) schemes and security protocols (WEP, WPA and IEEE 802.11i) are not sufficient against these threats. This paper presents a novel Secure WLAN Authentication Scheme (SWAS). The scheme introduces the delegation concept of mobile authentication in WLANs, and provides mutual authentication to all parties (Wireless Station, Access Point and Authentication Server). The messages involved in the process serve both authentication and key refreshing purposes. The scheme enhances the security by protecting the messages through cryptographic techniques and reduces the DoS impact. The results showed that cryptographic techniques do not result in extra latencies in authentication. The scheme also reduces the communication cost and network overhead.

  • PDF