• Title/Summary/Keyword: Signature Patterns

Search Result 70, Processing Time 0.02 seconds

Comparative review and interpretation of the conventional and new methods in blast vibration analyses

  • Uyar, G. Gulsev;Aksoy, C.O.
    • Geomechanics and Engineering
    • /
    • v.18 no.5
    • /
    • pp.545-554
    • /
    • 2019
  • The customary approach used in the blast vibration analysis is to derive empirical relations between the peak particle velocities of blast-induced waves and the scaled distance, and to develop patterns limiting the amounts of explosives. During the periods when excavations involving blasting were performed at sites far from residential areas and infrastructure works, this method based on empirical correlations could be effective in reducing vibrations. However, blasting procedures applied by the fast-moving mining and construction industries today can be very close to, in particular cities, residential areas, pipelines, geothermal sites, etc., and this reveals the need to minimize blast vibrations not only by limiting the use of explosives, but also employing new scientific and technological methods. The conventional methodology in minimizing blast vibrations involves the steps of i) measuring by seismograph peak particle velocity induced by blasting, ii) defining ground transmission constants between the blasting area and the target station, iii) finding out the empirical relation involving the propagation of seismic waves, and iv) employing this relation to identify highest amount of explosive that may safely be fired at a time for blasting. This paper addresses practical difficulties during the implementation of this conventional method, particularly the defects and errors in data evaluation and analysis; illustrates the disadvantages of the method; emphasizes essential considerations in case the method is implemented; and finally discusses methods that would fit better to the conditions and demands of the present time compared to the conventional method that intrinsically hosts the abovementioned disadvantages.

Generation of Maximum Length Cellular Automata (최대길이를 갖는 셀룰라 오토마타의 생성)

  • Choi Un-Sook;Cho Sung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.25-30
    • /
    • 2004
  • Linear cellular automata(CA) which generate maximum-length cycles, have wide applications in generation of pseudo-random patterns, signature analysis, cryptography and error correcting codes etc. Linear CA whose characteristic polynomial is primitive has been studied. In this paper Ive propose a effective method for generation of a variety of maximum-length CA(MLCA). And we show that the complemented CA's derived from a linear MLCA are all MLCA. Also we analyze the Properties of complemented MLCA. And we prove that the number of n-cell MLCA is ${\phi}(2^{n}-1)2^{n+1}$/n.

A Fast String Matching Scheme without using Buffer for Linux Netfilter based Internet Worm Detection (리눅스 넷필터 기반의 인터넷 웜 탐지에서 버퍼를 이용하지 않는 빠른 스트링 매칭 방법)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.821-830
    • /
    • 2006
  • As internet worms are spread out worldwide, the detection and filtering of worms becomes one of hot issues in the internet security. As one of implementation methods to detect worms, the Linux Netfilter kernel module can be used. Its basic operation for worm detection is a string matching where coming packet(s) on the network is/are compared with predefined worm signatures(patterns). A worm can appear in a packet or in two (or more) succeeding packets where some part of worm is in the first packet and its remaining part is in its succeeding packet(s). Assuming that the maximum length of a worm pattern is less than 1024 bytes, we need to perform a string matching up to two succeeding packets of 2048 bytes. To do so, Linux Netfilter keeps the previous packet in buffer and performs matching with a combined 2048 byte string of the buffered packet and current packet. As the number of concurrent connections to be handled in the worm detection system increases, the total size of buffer (memory) increases and string matching speed becomes low In this paper, to reduce the memory buffer size and get higher speed of string matching, we propose a string matching scheme without using buffer. The proposed scheme keeps the partial matching result of the previous packet with signatures and has no buffering for previous packet. The partial matching information is used to detect a worm in the two succeeding packets. We implemented the proposed scheme by modifying the Linux Netfilter. Then we compared the modified Linux Netfilter module with the original Linux Netfilter module. Experimental results show that the proposed scheme has 25% lower memory usage and 54% higher speed compared to the original scheme.

The Automation Model of Ransomware Analysis and Detection Pattern (랜섬웨어 분석 및 탐지패턴 자동화 모델에 관한 연구)

  • Lee, Hoo-Ki;Seong, Jong-Hyuk;Kim, Yu-Cheon;Kim, Jong-Bae;Gim, Gwang-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1581-1588
    • /
    • 2017
  • Recently, circulating ransomware is becoming intelligent and sophisticated through a spreading new viruses and variants, targeted spreading using social engineering attack, malvertising that circulate a large quantity of ransomware by hacking advertising server, or RaaS(Ransomware-as-a- Service), from the existing attack way that encrypt the files and demand money. In particular, it makes it difficult to track down attackers by bypassing security solutions, disabling parameter checking via file encryption, and attacking target-based ransomware with APT(Advanced Persistent Threat) attacks. For remove the threat of ransomware, various detection techniques are developed, but, it is very hard to respond to new and varietal ransomware. Accordingly, in this paper, find out a making Signature-based Detection Patterns and problems, and present a pattern automation model of ransomware detecting for responding to ransomware more actively. This study is expected to be applicable to various forms in enterprise or public security control center.

A Watermarking Scheme to Extract the Seal Image without the Original Image (원본정보 없이 씰영상의 추출이 가능한 이미지 워터마킹 기법)

  • Kim, Won-Gyum;Lee, Jong-Chan;Lee, Won-Don
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3885-3895
    • /
    • 2000
  • The emergence of digital imaging and digital networks has made duplication of original artwork easier. In order to protect these creations, new methods for signing and copyrighting visual data are needed. In the last few years, a large number of schemes have heen proposed for hiding copyright marks and other information in digital image, video, audio and other multimedia objects. In this paper, we propose a technique for embedding the watermark of visually recognizable patterns into the frequency domain of images. The embedded watermark can be retrieved from the decoded sequence witbout knowledge of the original. Because the source image is not required to extract the watermark, one cannot make the fake original that is invertible to watermarking scheme from the waternlarked image. In order to recover the embedded signature data without knowledge of the original, a prediction of the original value of the pixel containing the information is needed. The prediction is based on a averaging of amplitude values in a neighborhood around the pixel itself. Additionally the projxJsed technique could survive several kinds of image processings including JPEG lossy compression.

  • PDF

Identification of a Novel PGE2 Regulated Gene in SNU1 Gastric Cancer Cell

  • Park, Min-Seon;Kim, Hong-Tae;Min, Byung-Re;Kimm, Ku-Chan;Nam, Myeong-Jin
    • BMB Reports
    • /
    • v.33 no.2
    • /
    • pp.184-187
    • /
    • 2000
  • Prostaglandin $E_2$ ($PGE_2$) plays an important role in the regulation of various gastric functions, and the growth-inhibitory activities on tumor cells are studied in vitro and in vivo. Although the mechanisms have attracted many researchers in the past decade, the molecular mechanisms of cell cycle arrest, or induction of apoptosis by $PGE_2$, is unclear. We investigated the effects of $PGE_2$ on the growth of the human gastric carcinoma cell line SNU1 and genes that are regulated by $PGE_2$ and isolated them using differential display RT-PCR (DD RT-PCR). FACS analysis suggested that SNU1 cells were arrested at the G1 phase by $PGE_2$ treatment. This growth inhibitory effect was in a time- and dose-dependent manner. Treatment of SNU1 cells with $10\;{\mu}g/ml$ $PGE_2$, followed by DD RT-PCR analysis, revealed differently expressed bands patterns from the control. Among the differently expressed clones, we found an unidentified cDNA clone (HGP-27) overexpressed in $PGE_2$-treated cells. The full-length cDNA of HGP-27 was isolated using RACE, which consisted of a 30-nt 5'-noncoding region, a 891-nt ORF encoding the 296 amino acid protein, and a 738-nt 3'-noncoding region including a poly(a) signal. This gene was localized on the short arm of chromosome number 11. Using the Motif Finder program, a myb-DNA binding repeat signature was detected on the ORF region. The COOH-terminal half was shown to have similarity with the $NH_3$-terminal domain of thioredoxin (Trx). This relation between HGP-27 and Trx implied a potential role for HGP-27 in modulating the DNA binding function of a transcription factor, myb.

  • PDF

Fuzzy Cluster Based Diagnosis System for Classifying Computer Viruses (컴퓨터 바이러스 분류를 위한 퍼지 클러스터 기반 진단시스템)

  • Rhee, Hyun-Sook
    • The KIPS Transactions:PartB
    • /
    • v.14B no.1 s.111
    • /
    • pp.59-64
    • /
    • 2007
  • In these days, malicious codes have become reality and evolved significantly to become one of the greatest threats to the modern society where important information is stored, processed, and accessed through the internet and the computers. Computer virus is a common type of malicious codes. The standard techniques in anti-virus industry is still based on signatures matching. The detection mechanism searches for a signature pattern that identifies a particular virus or stain of viruses. Though more accurate in detecting known viruses, the technique falls short for detecting new or unknown viruses for which no identifying patterns present. To cope with this problem, anti-virus software has to incorporate the learning mechanism and heuristic. In this paper, we propose a fuzzy diagnosis system(FDS) using fuzzy c-means algorithm(FCM) for the cluster analysis and a decision status measure for giving a diagnosis. We compare proposed system FDS to three well known classifiers-KNN, RF, SVM. Experimental results show that the proposed approach can detect unknown viruses effectively.

Damage Monitoring for Wind Turbine Blade using Impedance Technique (임피던스 기법을 이용한 풍력 블레이드 손상 모니터링)

  • Huh, Yong-Hak;Kim, Jongil;Hong, Seonggu
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.33 no.5
    • /
    • pp.452-458
    • /
    • 2013
  • Impedance based monitoring technique was investigated to evaluate the damage occurring in wind turbine blade. In this study, PVDF film piezo sensors were patched on the 10 kW wind turbine blade, and impedance was measured over the frequency range of 1~200 MHz under fatigue loading. With applying fatigue loads on the blade, change in maximum deflection of the blade and local strain values could be obtained from the strain gages attached on the blade, and difference of the impedance signatures was also observed. From these data, it could be found that local damage or geometrical change in the blade structure happened. To quantitatively compare the impedance signature patterns, a statistical algorithm, scalar damage metric M was used. It was calculated from the impedance signatures considering fatigue loads and location of the sensors. The metric values were compared to correlate the metrics with damage in the blade.

A Study on Similarity Comparison for File DNA-Based Metamorphic Malware Detection (파일 DNA 기반의 변종 악성코드 탐지를 위한 유사도 비교에 관한 연구)

  • Jang, Eun-Gyeom;Lee, Sang Jun;Lee, Joong In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.85-94
    • /
    • 2014
  • This paper studied the detection technique using file DNA-based behavior pattern analysis in order to minimize damage to user system by malicious programs before signature or security patch is released. The file DNA-based detection technique was applied to defend against zero day attack and to minimize false detection, by remedying weaknesses of the conventional network-based packet detection technique and process-based detection technique. For the file DNA-based detection technique, abnormal behaviors of malware were splitted into network-related behaviors and process-related behaviors. This technique was employed to check and block crucial behaviors of process and network behaviors operating in user system, according to the fixed conditions, to analyze the similarity of behavior patterns of malware, based on the file DNA which process behaviors and network behaviors are mixed, and to deal with it rapidly through hazard warning and cut-off.

Comparison of Expression Signature of Histone Deacetylases (HDACs) in Mesenchymal Stem Cells from Multiple Myeloma and Normal Donors

  • Ahmadvand, Mohammad;Noruzinia, Mehrdad;Soleimani, Masoud;Abroun, Saeid
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.7
    • /
    • pp.3605-3610
    • /
    • 2016
  • Background: Histone acetylation in chromatin structures plays a key role in regulation of gene transcription and is strictly controlled by histone acetyltransferase (HAT) and deacetylase (HDAC) activities. HDAC deregulation has been reported in several cancers. Materials and Methods: The expression of 10 HDACs (including HDAC class I and II) was studied by quantitative reverse transcription-PCR (qRT-PCR) in a cohort of mesenchymal stem cells (MM-MSCs) from 10 multiple myeloma patients with a median age 60y. The results were compared with those obtained for normal donors. Then, a coculture system was performed between MM-MSCs and u266 cell line, in the presence or absence of sodium butyrate (NaBT), to understand the effects of HDAC inhibitors (HDACi) in MM-MSCs on multiple myeloma cases. Also, the interleukin-6 (IL-6) and vascular endothelial growth factor (VEGFA) gene expression level and apoptotic effects were investigated in MM-MSCs patients and control group following NaBT treatment. Results: The results indicated that upregulated (HDACs) and downregulated (IL6 and VEGFA) genes were differentially expressed in the MM-MSCs derived from patients with multiple myeloma and ND-MSCs from normal donors. Comparison of the MM-MSCs and ND-MSCs also showed distinct HDACs expression patterns. For the first time to our knowledge, a significant increase of apoptosis was observed in coculture with MM-MSCs treated with NaBT. Conclusions: The obtained findings elucidate a complex set of actions in MSCs in response to HDAC inhibitors, which may be responsible for anticancer effects. Also, the data support the idea that MSCs are new therapeutic targets as a potential effective strategy for MM.