• Title/Summary/Keyword: Name of the Domain

Search Result 159, Processing Time 0.031 seconds

A New Robust Blind Crypto-Watermarking Method for Medical Images Security

  • Mohamed Boussif;Oussema Boufares;Aloui Noureddine;Adnene Cherif
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.93-100
    • /
    • 2024
  • In this paper, we propose a novel robust blind crypto-watermarking method for medical images security based on hiding of DICOM patient information (patient name, age...) in the medical imaging. The DICOM patient information is encrypted using the AES standard algorithm before its insertion in the medical image. The cover image is divided in blocks of 8x8, in each we insert 1-bit of the encrypted watermark in the hybrid transform domain by applying respectively the 2D-LWT (Lifting wavelet transforms), the 2D-DCT (discrete cosine transforms), and the SVD (singular value decomposition). The scheme is tested by applying various attacks such as noise, filtering and compression. Experimental results show that no visible difference between the watermarked images and the original images and the test against attack shows the good robustness of the proposed algorithm.

Strategic Options for Internationalization in Korean Organizations

  • Yum, Ji-Hwan;Park, Byoung-Jin
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.323-335
    • /
    • 2005
  • Globalization of economy brings both opportunities and threats especially for companies in developing countries such as Korea. Globalization is an opportunity because it may expand the size of market for the company where globalization brings a threat for developing global competitiveness. If the company has already built competitive advantage in its business domain, the company can easily transfer market growth to profit improvement. However, if the company has not developed competitive advantage, globalization of economy will give a serious threat for the survivor of the company. The company might lose its own domestic market share. For the less famous brand of product or company name, international expansion is a challenging strategy. The study evaluated organizational performance of companies that try international expansion by utilizing Miles and Snow's strategy typology. We clustered organizations based on their strategy typology (prospector, analyzer, defender, and reactor) in view of the level of product diversification, new product development instances, level of localization, and autonomy of foreign subsidiary. With the strategy typology, we evaluated international strategy in view of product competitiveness, marketing strategy, human resource strategy, and organizational strategy. The regression result demonstrates that the performance of the company is significantly higher when the company employs prospector strategy. We also found out that product quality and emphasis for developed countries in international expansion are the most important factors for success.

  • PDF

Refined identification of hybrid traffic in DNS tunnels based on regression analysis

  • Bai, Huiwen;Liu, Guangjie;Zhai, Jiangtao;Liu, Weiwei;Ji, Xiaopeng;Yang, Luhui;Dai, Yuewei
    • ETRI Journal
    • /
    • v.43 no.1
    • /
    • pp.40-52
    • /
    • 2021
  • DNS (Domain Name System) tunnels almost obscure the true network activities of users, which makes it challenging for the gateway or censorship equipment to identify malicious or unpermitted network behaviors. An efficient way to address this problem is to conduct a temporal-spatial analysis on the tunnel traffic. Nevertheless, current studies on this topic limit the DNS tunnel to those with a single protocol, whereas more than one protocol may be used simultaneously. In this paper, we concentrate on the refined identification of two protocols mixed in a DNS tunnel. A feature set is first derived from DNS query and response flows, which is incorporated with deep neural networks to construct a regression model. We benchmark the proposed method with captured DNS tunnel traffic, the experimental results show that the proposed scheme can achieve identification accuracy of more than 90%. To the best of our knowledge, the proposed scheme is the first to estimate the ratios of two mixed protocols in DNS tunnels.

Genotyping of HLA-A by Polymerase Chain Reaction-Sequence Specific Primer (Polymerase Chain Reaction-Sequence Specific Primer를 이용한 HLA-A 유전자의 DNA 다형성 조사)

  • Jang, Soon-Mo
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.40 no.2
    • /
    • pp.94-97
    • /
    • 2008
  • The human leukocyte antigen (HLA) is the name of the major histocompatibility complex (MCH) in humans. The superlocus contains a large number of genes related to immune system function in humans. This group of genes resides on chromosome 6. and encode cell surface antigen-presenting proteins and many other genes. HLA class I antigen (A, B & C) present peptides from inside the cell. These peptides are produced from digested proteins that are broken down in the lysozymes. Most expressed HLA loci exhibit a remarkable degree of allelic polymorphism, which derives from sequence differences predominantly localized to discrete hypervariable regions of the amino terminal domain of the molecule. In this sutdy, the HLA-A genotypes were determined in twenty students unrelated koreans using the PCR-SSP (Polymerase Chain Reaction-Sequence Specific Primer) technique. Several specific primer pairs in assigning the HLA-A gene were used (A*0201, A*33, A*2401). The results of PCR-SSP, the HLA-A*0201 primer was detected eleven (55%), the HLA-A*33 were detected seven (35%) and the HLA-A*2401 were detected seven (35%). This study shows that the PCR-SSP technique is relatively simple, fast and a practical tool for the determination of the HLA-A genotypes.

  • PDF

A study on the possibility of using dual task performance as a screening test for driving ability of elderly drivers (노인운전자 운전능력 선별검사로서 이중과제수행의 활용 가능성 연구)

  • Shin, Su-Jung
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.161-167
    • /
    • 2021
  • This study was conducted to identify the relationship between the dual task performance and driving behavior of the elderly driver in order to identify whether the dual task can be utilized as a test to screen the driving ability of the elderly driver. We surveyed general information and driving-related information for 32 normal elderly drivers, and evaluated Y-DuCog(Yonsei-Dual task Cognitive screening) and the K-DBQ (Korean-Driving Behavior Questionnaire). As a result of the study, the performance of the dual task using the pegboard task and the animal name speaking showed a significant correlation with the score of the violation domain of K-DBQ. With this study, it was possible to confirm the possibility as a test for discrimination of driving ability.

An Enhanced Text Mining Approach using Ensemble Algorithm for Detecting Cyber Bullying

  • Z.Sunitha Bai;Sreelatha Malempati
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.1-6
    • /
    • 2023
  • Text mining (TM) is most widely used to process the various unstructured text documents and process the data present in the various domains. The other name for text mining is text classification. This domain is most popular in many domains such as movie reviews, product reviews on various E-commerce websites, sentiment analysis, topic modeling and cyber bullying on social media messages. Cyber-bullying is the type of abusing someone with the insulting language. Personal abusing, sexual harassment, other types of abusing come under cyber-bullying. Several existing systems are developed to detect the bullying words based on their situation in the social networking sites (SNS). SNS becomes platform for bully someone. In this paper, An Enhanced text mining approach is developed by using Ensemble Algorithm (ETMA) to solve several problems in traditional algorithms and improve the accuracy, processing time and quality of the result. ETMA is the algorithm used to analyze the bullying text within the social networking sites (SNS) such as facebook, twitter etc. The ETMA is applied on synthetic dataset collected from various data a source which consists of 5k messages belongs to bullying and non-bullying. The performance is analyzed by showing Precision, Recall, F1-Score and Accuracy.

A Alternative Environmental Value Education Program through GENSANGGAI in JAPAN (연찬방식을 통한 대안적 환경가치교육방안)

  • 김태경
    • Hwankyungkyoyuk
    • /
    • v.12 no.1
    • /
    • pp.322-334
    • /
    • 1999
  • In environmental value education, the difference between Ecological and Economic view-point about environmentmust should be considered. Usually, although the differences are unavoidable, because our lifes are inclined to Economic life. But this propensity have become great obstacles to Environmental value education by diluting the fundamental reasons which the nature should be preserved. Furthermore we can't say that environmental problems are not solved just by economic approach, owing to its limits of solving by incentives. So we can say that it is very important to have equalized view-points in the relations of economics and ecology for balanced environmental value education. This study is to alternative environmental value education program, to have equalized view-points in the relations of economics and ecology through the small community located in Japan. The exact name of that program is GENSANGGAI. They have persued to attain a spiritual state of complete absence of ego through this program, and this spiritual state can be important environmental value educaton goal, which make the student to see the evironment with equalized view-points in the interdependence between economics and ecology. we can say that this program can be a kind affective (sentimentally perceived) environmental education program. It can be good environmental education program in affective domain. we can say that equalized view-points is to attain a spiritual state of complete absence of ego. This program is some similar to Kohlberg's latter term theory and Open educationin theory in substantial aspect, he persued Just Community Approach through Kibbutz in Israel. From the basis of his theory, if the GENSANGGAI program, which means harmony between socialization and development of moral stage, individualism and communism.

  • PDF

Cache Reliability Enhancing Method for Recursive DNS (Recursive DNS의 캐쉬 정보 신뢰성 향상 기법)

  • Ju, Yong-Wan;Lee, Eung-Jae;Nam, Kwang-Woo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.227-238
    • /
    • 2008
  • As the internet users rise up rapidly, DNS information forgery can cause severe socio-economic damages. However, most studies on DNS information security reached the breaking point in applying to actual circumstances because of the limit of existing DNS system version, the increasement of management burden and etc. The paper proposes the real-time method for detecting cache poisoning of DNS system independent of analysing the DNS forgery types in the current DNS service environment. It also proposes the method of enhancing the reliability for the cache information of Recursive DNS system by post-verifying the cache information of the DNS system.

A Service Discovery Scheme Based on NAPTR Resource Record (NAPTR 자원레코드 기반의 서비스 탐색기법)

  • 권성호;김희철
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.69-75
    • /
    • 2003
  • NAPRT(Naming Authority Pointer) is a type of resource record specified in IETF RFC 2915. NAPTR enables to register various services in the Domain Name Systems and thus provides a way to discover services available on specific hosts. This paper describes the design and implementation of a Proxy DNS system aimed at supporting NAPTRs. The goal of this work is to study on the feasibility of the service discovery registered in DNS via NAPTR records and provides the result for simplicity and extensibility of implementation through the implementation of a actual Test-bed system This research result can be applied to service discovery in the resource information management for high performance GRE environments as well as to the implementation of DNS infrastructure for the ENUM.

  • PDF

A Scheme to Improve QoS in a Multi-Virtual-Hosting Server (다중 Virtual Hosting Server의 QoS 향상 기법에 관한 연구)

  • Ryou, Sang-Woo;Ko, Soung-Jun;Lee, Sang-Moon;Kim, Hag-Bae;Park, Jin-Bae;Jang, Whie
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.4
    • /
    • pp.303-307
    • /
    • 2002
  • Virtual hosting is a typical service to connect each directory of site and domain name. If traffic amounts may increase at one site present in the server, then it affects traffic amounts of other sites as well (including the sites which have flew requests). To overcome this problem, we suggest a simple feedback-control concept for the system by periodically monitoring the traffic and properly actuating traffic dispersions by investigating the log file. Specifically, large files are to be served in a backup server (to reduce the workload of the main server) by changing their own URL's in html format. In other words, it automatically redistributes the workload by using the URL. Furthermore, we also use the redirecting method by just adding html tags to html header. This method efficiently handles the workload and maintains the capability of the server effectively to the varying workload.