• Title/Summary/Keyword: White-list

Search Result 63, Processing Time 0.025 seconds

The Implement of System on Microarry Classification Using Combination of Signigicant Gene Selection Method (정보력 있는 유전자 선택 방법 조합을 이용한 마이크로어레이 분류 시스템 구현)

  • Park, Su-Young;Jung, Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.315-320
    • /
    • 2008
  • Nowadays, a lot of related data obtained from these research could be given a new present meaning to accomplish the original purpose of the whole research as a human genome project. In such a thread, construction of gene expression analysis system and a basis rank analysis system is being watched newly. Recently, being identified fact that particular sub-class of tumor be related with particular chromosome, microarray started to be used in diagnosis field by doing cancer classification and predication based on gene expression information. In this thesis, we used cDNA microarrays of 3840 genes obtained from neuronal differentiation experiment of cortical stem cells on white mouse with cancer, created system that can extract informative gene list through normalization separately and proposed combination method for selecting more significant genes. And possibility of proposed system and method is verified through experiment. That result is that PC-ED combination represent 98.74% accurate and 0.04% MSE, which show that it improve classification performance than case to experiment after generating gene list using single similarity scale.

Method for Evaluating the Security Risk of Website (웹 사이트 보안 위험도 산정 기법)

  • Kim, Young-Gab;Lee, Jun-Sub;Cho, Sanghyun;Kim, Moon Jeong;Lee, Min-Soo;Kim, Sang-Rok;Kim, In Ho;Kim, Sung Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1119-1122
    • /
    • 2007
  • 최근 전자우편이나 해킹을 통한 피싱과 파밍 등 금융 사기가 많이 발생하고 있다. 이에 이러한 피해로부터 사용자의 경제적 손실 및 개인정보 보호를 위하여 웹 사이트 인증, 전자우편 인증 등의 연구가 진행되고 있다. 기존 인증 방법에서는 WBL (Website Black-List) DB를 사용하였는데, 피싱의 짧은 생명주기(life cycle)로 인해 WBL DB의 유효성은 떨어질 뿐만 아니라, 피싱 사건 발생 후 웹 사이트가 WBL DB에 등록되기 전까지는 확인 불가능하다는 단점을 가지고 있다. 이러한 문제점을 극복하기 위해 WWL (Website White-List) DB를 이용한 연구가 진행 중이지만 아직은 미비한 편이다. 이에 본 논문에서는 기존의 WBL DB와 WWL DB를 이용한 방법이 가지고 있는 한계점을 극복하기 위해 WWL DB 항목을 정의하고, 이를 이용하여 웹사이트 보안 위험도를 정량화할 수 있는 웹사이트 위험도 산정 기법을 제안한다.

Analysis and Technical Consideration for the Rules on Television White Space (TVWS 대역 규정에 관한 분석 및 기술적 고려)

  • Kim, Young-Soo;Cho, Sang-In;Jeong, Byung-Jang
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.8
    • /
    • pp.923-933
    • /
    • 2012
  • In this paper, we propose the technical considerations for the rules on television white space(TVWS), that becomes a center of public notice, in terms of incumbent services protection, technical requirements of television band devices (TVBDs) and administration of TV band databases. The basic idea behind the proposed method is based on the perfect protection of incumbent services such as digital television and wireless microphone. It has been found that FCC's approach has the advantage that a list of available channels and transmission power are provided for TVBDs faster than Ofcom's approach that requires DB to perform the algorithm for determining frequencies and transmission power for TVBDs everytime DB is asked from TVBDs.

A Brief overview of Marine Traffic Status on port of Mombasa and Maritime Activities in Kenya

  • Otoi, Onyango Shem;Park, Young-Soo;Mutisya, Kyalo Michael
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.07a
    • /
    • pp.5-8
    • /
    • 2015
  • Kenya is a sovereign country with a vast potential in maritime industry. Though Kenya is known to have made it in IMO white list on $14^{TH}$ May 2010, she is making huge investments in maritime industry in an effort to have a share of booming world maritime industry and sea trade. Statistics has it that 90% of trade volume is carried on the sea, which is strong indication that for any country inspiring to be an economic powerhouse it has to have a lion share of sea trade volume, and one of the proven ways in gaining economic success is by investing heavily in maritime infrastructure. The purpose of this paper is to give a brief description of marine traffic status in port of Mombasa which is the largest port in Kenya, highlight vital features of multi-billion Lamu port investment under taken by the Kenyan government and finally discuss the future of maritime industry and Kenyan seafarer.

  • PDF

Construction and a Chronological Examination of the Fabrics in the Buddhist (불복장 직물의 구조특성 및 연대규명)

  • Kim, Sun-Kyung;Cho, Hyo-Sook
    • Journal of the Korean Society of Costume
    • /
    • v.55 no.8 s.99
    • /
    • pp.73-84
    • /
    • 2005
  • Collections in the buddhist statue owned by Dr. Jong-Hm Baik(白宗欽) included 3 ancient documents and 2 wooden cylinders that showed a clear historical order. The temple and buddhist statue that these objects were belonged to were not known, however, according to the document, it could be inferred as Chunsukwaneumsang(천수관음상) created in 1322 and reformed in 1614 from the list of donator for the statue. Inside a wooden cylinder, a bundle of ivory, yellow, green, orange, and dark brown fabrics that were folded up and tided up with 5 different colored thread strands and aromatic trees and rice plant was placed on the bottom. All the fabrics were silk. Three thread strands were silk. The white and blue strands were cotton fibers as a result of analysis of IR spectrum and the microscope. According to a radioactive carbon isotope dating by accelerator mass spectroscopy, years before present was 160$\pm$40, and cablibrated ages were 1680-1890 (79.3$\%$), 1910-1960(16.1$\%$) in 95.4$\%$ probability. Accordingly, the fabrics in the buddhist statue proved to be reformed in 1614 not the original ones in 1322.

Effective Rogue Access Point Detection Method in Wireless LAN (무선랜 환경에서 효과적인 Rogue AP 탐지 기법)

  • Kang, Daehyun;Kim, Kangseok;Choi, Okkyung;Kim, Kihyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.733-734
    • /
    • 2011
  • 지난 몇 년 동안 무선랜(Wireless LAN)은 다양한 영역에서 가장 널리 사용 되었으며, 가장 크게 발전을 하였다. 그러나 무선랜의 특성상 해킹과 침투에 취약한 약점을 안고 있다. 아직도 많은 보안적 취약점을 가지고 있으며, 특히 그 중에서도 Rogue AP(Access Point)는 가장 심각한 보안 취약점으로 대두되고 있다. 현재 Rogue AP 탐지를 위하여 넷스텀블러와 같은 스니핑 소프트웨어를 설치하여 주변 지역을 돌아다니는 워드라이빙 형태의 탐지방법은 아직도 사용되고 있다. 그러나, 이러한 방법은 대규모로 확장되어 가는 무선랜 환경에 적합하지 않다. 본 논문은 무선랜 환경에서 Rogue AP 탐지 문제의 해결책을 제시한다. AP의 전파 영역을 이용하는 방식으로, AP가 신호를 받을 수 있도록 수정하여, 주변에 새로운 AP가 탐지될 경우, AP가 서버와 새롭게 발견된 AP에 신호를 보내고, 이를 바탕으로 서버는 WhiteList를 통해서 Rogue AP 여부를 결정한다. 따라서 본 논문의 제안 방식은 기존의 탐지 방식에 비해 Rogue AP의 효과적 탐지가 가능하다.

A study on morphological and pattern analysis in two kinds of Aconiti Radix (부자(附子)와 초오(草烏)의 내외부형태(內外部形態)와 패턴분석연구)

  • Kang, Gyun-Heok;Choi, Go-Ya;Kim, Hong-Jun;Ju, Young-Sung
    • Korean Journal of Oriental Medicine
    • /
    • v.12 no.1
    • /
    • pp.23-38
    • /
    • 2006
  • The taxonomic list of specific features in external and internal shape and the pattern analysis of Aconitum carmichalei $D_{EBX}$ as the original plant of Aconiti Lateralis Radix Preparata and Aconitum cliiare Dc as the original plant of Aconiti Ciliare Tuber are as follows. 1. Aconitum carmichalei $D_{EBX}$ has tri-palmately parted leaves, petiole in lower leaves, and its ovary has short hair. Whereas Aconitum cliare Dc has $3{\sim}4$ parted leaves, long petiole, and its ovary has not hair. 2. Aconitum carmichalei $D_{EBX}$ has cylinder shape is relatively small in length and diameter, is greyish brown blacky brown in outer surface, greyish $white{\sim}dark$ gray in section. 3. According to the collection place, there is a remarkable difference in the physical shape of herbal states. Aconiti Lateralis Radix Preparate(medicated in Korea) is more transparent blacky brown color than Aconiti Lateralis Fadix Preparata(medicated in Chian). Also Black Aconi Radix(墨附片) has exodermis and White Aconi Radix(白附片) has not. 4. The internal characteristics entirely correspond to in internal shape described in the literatures, Only it is possible to discriminate between black Aconi Radix(墨附片) and White Aconi Radix(白附片) by the existence of cork layer. The classification between Aconiti Lateralis Radix Preparata and Aconiti Ciliare Tuber makes entirely Tuber makes entirely remarkable difference in the physical shape of cambium layer Namely, in shape of cambium layer the kinds of Aconiti lateralis Radix Prepala has horn-like shape and the kinds of Aconiti Ciliare Tuber has circle-like shape. 5. In the peak of examination substance in comparison to Rt of the index material diterpene alkaloid mesaconitine, aconitine, hypaconitine chromatogram Aconiti Ciliare Tuber is higher than in Aconiti Lateralis Radix Preparata This explain that the component changes after the process of medicine. 6. In the Content of mesaconitine, aconitine and hypaconitime Aconiti Ciliare Tuber is higher than Aconiti Lateralis Radix Preparata. 7. In Aconiti Lateralis Radix Preparata, aconitine, hypaconitine and mesaconitine each appears in Rf 0.46, 0.54, 0.32. But except Aconiti Ciliare Tuber the band does not appear. For the future, such results will be used as the basic source of additional research, and a far-reaching comparative study is needed to distinguish between many kinds of same genus-degree of relatedness.

  • PDF

Study of the Indicators of Dampness-Phlegm Pattern Identification Based on Tentative Korean Standard Differentiation of the Symptoms and Signs for Stroke (한국형 중풍 변증 표준시안의 습담 변증 지표에 대한 연구)

  • Jo, Hyun-Kyung;Kim, Joong-Kil;Kang, Byeong-Kab;Yu, Byeong-Chan;Baek, Kyung-Min;Lee, In;Choi, Sun-Mi;Seol, In-Chan
    • The Journal of Internal Korean Medicine
    • /
    • v.27 no.1
    • /
    • pp.237-252
    • /
    • 2006
  • Objectives : This study was done to investigate clinical frequency and correlation among the indicators of dampness-phlegm pattern identification settled by tentative Korean Standard Differentiation of the Symptoms and Signs for Stroke. Methods : The subjects were 147 hospitalized patients with stroke, and a list of registry was made for each of them. Among the five types of pattern identification, fire-heat, dampness-phlegm, blood-stasis and deficiency of Qi and of Yin, those that have shown a high frequency in dampness-phlegm type were categorized as the dampness-phlegm pattern group. Frequency of dampness-phlegm indicators was compared with those from the non-dampness-phlegm pattern group. Correlations among dampness-phlegm indicators were also studied. Results : 1. Dampness-phlegm pattern group included 26 patients out of 147. 2. Among the indicators of dampness-phlegm pattern. those, in order of highest frequency, were 'tiredness or sluggishness', 'white Coated tongue' and 'sputum'. 3. In comparing dampness-phlegm pattern group with non-dampness-phlegml group, the indicators such as 'lightheadedness', 'nigrescence', 'sputum', 'dermatic dysaesthesia' showed significantly high frequency. 4. Among the indicators, 'sputum' and 'tiredness or sluggishness', 'sputum' and 'yellow coated tongue', and 'white coated tongue' and 'yellow coated tongue' showed significant correlation. 5. In investigation of the correlation of scale in symptoms, various results such as positive correlation and negative correlation were obtained. Conclusion : In this study, more sensitive indicators of dampness-phlegm pattern identification were found. Based on these results, it is suggested that a more practical Korean Standard Differentiation of the Symptoms and Signs of Stroke would be established through continuous clinical studies by giving weight on each specific type of pattern identification.

  • PDF

A Study on Morphological and Pattern Analysis in 2 kinds of Paeoniae Radix (2종(種) 작약류(芍藥類)의 내외부형태(內外部形態)와 패턴분석 연구(硏究))

  • Song, Kyoung-Song;Choi, Go-Ya;Kim, Hong-Jun;Ju, Young-Sung
    • Korean Journal of Oriental Medicine
    • /
    • v.11 no.2
    • /
    • pp.141-154
    • /
    • 2005
  • The following is a taxonomic list of the specific features of external and internal shape and pattern analysis of Paeonia lactiflora PALL. and P. obovata MAX as the standard of herbal medicine. 1. External shape of original plant P. lactiflora has lancelate and elliptical leaves with no hair on both sides. It bears a flower bud at the shoot apex or leaf axil. On the other hand, P. obovata has obovate leaves with hair on the back side. It has a single flower bud at the shoot apex. 2. Physical characteristics of herbal states P. lactiflora has a bright and smooth external surface whose color is light red brown, light gray on its section and it is not easy to cut. On the other hand, P. obovata has a coarse external surface whose color is dark brown, pinkish on its section and it is easy to cut. 3. Physical characteristics of herbal state in currents Paeonia Radix Alba is brown on the external surface, and whitish on its section. On the other hand, Paeonia Radix Rubra is dark brown on the external surface, and yellowish-white on its section. 4. Internal characteristics Internal shape is correspond to that of Paeonia Radix described in literatures. Only P. lactoflora has a concentrated vascular bundle toward centeral cylinder. On the other hand, P. obovata has a scattered vascular bundle at the cortex. 5. Physicochemical pattern by HPLC Both P. lactoflora and P. obovata showed the same pattern. Paeoniforin, a main component, appears upon 13.68 in retention time (Rt) in both. In addition, both contain a large amount of paeoniflorin. Such results will, in the future, be used as basic source for the additional research, such as biological reactions and genetic discrimination.

  • PDF

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF