• Title/Summary/Keyword: network integration

Search Result 1,067, Processing Time 0.025 seconds

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.

An Empirical Study of effect how COO Factors impact on COO Performance in accordance with Origin Images (원산지 이미지에 따라 원산지 요인들이 원산지제도 성과에 미치는 영향에 관한 연구)

  • Kim, Chang-Bong;Hyun, Hwa-Jung
    • Korea Trade Review
    • /
    • v.41 no.4
    • /
    • pp.131-155
    • /
    • 2016
  • Recently, the global trade environment has been composed of transactions in trade through integration of the global supply chain network. As FTAs are being signed between countries, the country of origin (COO) system on products has become an important issue. Companies are procuring raw materials through global sourcing and supplying to the retail markets. This research deducted major factors regarding the verification and utilization of the COO system through research on domestic and international literatures, and verified the mediating effects on the verification and utilization elements of the country image and the brand image of COO on the performance of the COO system through empirical study. For the purpose of this research, we conducted a survey implementing the COO system and analyzed the 152 data collected. The results of this research is as follows: First, the external verification level of the COO system has an impact on the performance of the COO system, and a mediating effect on the country image and the brand image of the COO. Second, the management capability of the COO has an impact on the performance of the COO system, and a mediating effect on the brand image of the COO. A research comparing and analyzing the difference in establishment of the verification system of the COO depending on the size of a corporation is necessary.

  • PDF

An Empirical Study on the Effect of International Standard Certification Execution and CRM Satisfaction on Business Performance in B2B Transaction (B2B거래에서 국제표준인증 실행과 CRM만족도가 사업성과에 미치는 영향에 대한 실증적 연구)

  • Kim, Chang-Bong;Park, Sang-An;Jung, Jin-Young
    • Korea Trade Review
    • /
    • v.42 no.2
    • /
    • pp.319-344
    • /
    • 2017
  • The international standard certification evaluates the extend to which the supplier satisfies the international standard certification standards of the supplier of the product and the service, recognizes the quality assurance ability and reliability of the supplier, thereby resolving the international trade regulation that can occur to various fields and strengthening the network of the global partnership it is making an important contribution. Therefor, in this study, the survey was conducted on 153 companies of Korean import and export companies. The research method was empirically analyzed by the structural equation model. The results of the hypothesis test of this study are as follows. First, resource management factors among the international standard certification factors in the global trade supply chain integration had a positive effects on CRM satisfaction. Second, the measurement, analysis and improvement factors of international standard certification factors had a positive effects on CRM satisfaction. Third, CRM satisfaction has a positive effects on business performance. Through this study, it is concluded that the Korean import and export companies have an important role in improving the business performance of the global trade partners.

  • PDF

A Study on the K-service Considering Homo Ludens in the Era of King JeongJo (정조시대의 호모 루덴스로 고찰하는 K-서비스 연구)

  • Hye-Jung Jun;Young-Kwan Lee
    • Industry Promotion Research
    • /
    • v.8 no.3
    • /
    • pp.125-136
    • /
    • 2023
  • This study tried to establish a system of service paradigm by re-examining the Korean play culture through the people who play in the era of King Jeongjo and revealing the integration of modern service culture. The results of this study are as follows. First, King Jeongjo inspired the autonomy and creativity of the participants through the patronage of Changdeokgung Palace and led the renaissance era of Joseon as a creative play. The creative play of the service industry is reborn as a place of innovation that realizes development through a communicative intellectual network. Second, the 60th birthday Jin Chan-yeon and the aesthetics of slowness that evoke artistic play are the language of innovation that transcends language and culture. Artistic play becomes a channel of communication to share happiness with people around the world based on absolute beauty and aesthetic sensibility. Third, Jeongjo was a humanist in Joseon. This humanistic ideology leads to humanistic religion. K-service, which uses religious play as a medium, has a turning point towards healing and happiness as all participants in the service experience sacredness. There is an implication in that it pioneered a service culture by presenting a new paradigm by combining play and service, and laid the groundwork for building a unique area in global business.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Cigarette Smoke Extract-Treated Mouse Airway Epithelial Cells-Derived Exosomal LncRNA MEG3 Promotes M1 Macrophage Polarization and Pyroptosis in Chronic Obstructive Pulmonary Disease by Upregulating TREM-1 via m6A Methylation

  • Lijing Wang;Qiao Yu;Jian Xiao;Qiong Chen;Min Fang;Hongjun Zhao
    • IMMUNE NETWORK
    • /
    • v.24 no.2
    • /
    • pp.3.1-3.23
    • /
    • 2024
  • Cigarette smoke extract (CSE)-treated mouse airway epithelial cells (MAECs)-derived exosomes accelerate the progression of chronic obstructive pulmonary disease (COPD) by upregulating triggering receptor expressed on myeloid cells 1 (TREM-1); however, the specific mechanism remains unclear. We aimed to explore the potential mechanisms of CSE-treated MAECs-derived exosomes on M1 macrophage polarization and pyroptosis in COPD. In vitro, exosomes were extracted from CSE-treated MAECs, followed by co-culture with macrophages. In vivo, mice exposed to cigarette smoke (CS) to induce COPD, followed by injection or/and intranasal instillation with oe-TREM-1 lentivirus. Lung function and pathological changes were evaluated. CD68+ cell number and the levels of iNOS, TNF-α, IL-1β (M1 macrophage marker), and pyroptosis-related proteins (NOD-like receptor family pyrin domain containing 3, apoptosis-associated speck-like protein containing a caspase-1 recruitment domain, caspase-1, cleaved-caspase-1, gasdermin D [GSDMD], and GSDMD-N) were examined. The expression of maternally expressed gene 3 (MEG3), spleen focus forming virus proviral integration oncogene (SPI1), methyltransferase 3 (METTL3), and TREM-1 was detected and the binding relationships among them were verified. MEG3 increased N6-methyladenosine methylation of TREM-1 by recruiting SPI1 to activate METTL3. Overexpression of TREM-1 or METTL3 negated the alleviative effects of MEG3 inhibition on M1 polarization and pyroptosis. In mice exposed to CS, EXO-CSE further aggravated lung injury, M1 polarization, and pyroptosis, which were reversed by MEG3 inhibition. TREM-1 overexpression negated the palliative effects of MEG3 inhibition on COPD mouse lung injury. Collectively, CSE-treated MAECs-derived exosomal long non-coding RNA MEG3 may expedite M1 macrophage polarization and pyroptosis in COPD via the SPI1/METTL3/TREM-1 axis.

A Study on the Calculation of Optimal Compensation Capacity of Reactive Power for Grid Connection of Offshore Wind Farms (해상풍력단지 전력계통 연계를 위한 무효전력 최적 보상용량 계산에 관한 연구)

  • Seong-Min Han;Joo-Hyuk Park;Chang-Hyun Hwang;Chae-Joo Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.65-76
    • /
    • 2024
  • With the recent activation of the offshore wind power industry, there has been a development of power plants with a scale exceeding 400MW, comparable to traditional thermal power plants. Renewable energy, characterized by intermittency depending on the energy source, is a prominent feature of modern renewable power generation facilities, which are structured based on controllable inverter technology. As the integration of renewable energy sources into the grid expands, the grid codes for power system connection are progressively becoming more defined, leading to active discussions and evaluations in this area. In this paper, we propose a method for selecting optimal reactive power compensation capacity when multiple offshore wind farms are integrated and connected through a shared interconnection facility to comply with grid codes. Based on the requirements of the grid code, we analyze the reactive power compensation and excessive stability of the 400MW wind power generation site under development in the southwest sea of Jeonbuk. This analysis involves constructing a generation site database using PSS/E (Power System Simulation for Engineering), incorporating turbine layouts and cable data. The study calculates reactive power due to charging current in internal and external network cables and determines the reactive power compensation capacity at the interconnection point. Additionally, static and dynamic stability assessments are conducted by integrating with the power system database.

Integration and Reanalysis of Four RNA-Seq Datasets Including BALF, Nasopharyngeal Swabs, Lung Biopsy, and Mouse Models Reveals Common Immune Features of COVID-19

  • Rudi Alberts;Sze Chun Chan;Qian-Fang Meng;Shan He;Lang Rao;Xindong Liu;Yongliang Zhang
    • IMMUNE NETWORK
    • /
    • v.22 no.3
    • /
    • pp.22.1-22.25
    • /
    • 2022
  • Coronavirus disease 2019 (COVID-19), caused by severe acute respiratory syndromecoronavirus-2 (SARS-CoV-2), has spread over the world causing a pandemic which is still ongoing since its emergence in late 2019. A great amount of effort has been devoted to understanding the pathogenesis of COVID-19 with the hope of developing better therapeutic strategies. Transcriptome analysis using technologies such as RNA sequencing became a commonly used approach in study of host immune responses to SARS-CoV-2. Although substantial amount of information can be gathered from transcriptome analysis, different analysis tools used in these studies may lead to conclusions that differ dramatically from each other. Here, we re-analyzed four RNA-sequencing datasets of COVID-19 samples including human bronchoalveolar lavage fluid, nasopharyngeal swabs, lung biopsy and hACE2 transgenic mice using the same standardized method. The results showed that common features of COVID-19 include upregulation of chemokines including CCL2, CXCL1, and CXCL10, inflammatory cytokine IL-1β and alarmin S100A8/S100A9, which are associated with dysregulated innate immunity marked by abundant neutrophil and mast cell accumulation. Downregulation of chemokine receptor genes that are associated with impaired adaptive immunity such as lymphopenia is another common feather of COVID-19 observed. In addition, a few interferon-stimulated genes but no type I IFN genes were identified to be enriched in COVID-19 samples compared to their respective control in these datasets. These features are in line with results from single-cell RNA sequencing studies in the field. Therefore, our re-analysis of the RNA-seq datasets revealed common features of dysregulated immune responses to SARS-CoV-2 and shed light to the pathogenesis of COVID-19.

Integration of virtual screening and proteomics reveals potential targets and pathways for ginsenoside Rg1 against myocardial ischemia

  • Rongfang Xie;Chenlu Li;Chenhui Zhong;Zuan Lin;Shaoguang Li;Bing Chen;Youjia Wu;Fen Hu;Peiying Shi;Hong Yao
    • Journal of Ginseng Research
    • /
    • v.48 no.4
    • /
    • pp.395-404
    • /
    • 2024
  • Background: Ginsenoside Rg1 (Rg1) is one of the main active components in Chinese medicines, Panax ginseng and Panax notoginseng. Research has shown that Rg1 has a protective effect on the cardiovascular system, including anti-myocardial ischemia-reperfusion injury, anti-apoptosis, and promotion of myocardial angiogenesis, suggesting it a potential cardiovascular agent. However, the protective mechanism involved is still not fully understood. Methods: Based on network pharmacology, ligand-based protein docking, proteomics, Western blot, protein recombination and spectroscopic analysis (UV-Vis and fluorescence spectra) techniques, potential targets and pathways for Rg1 against myocardial ischemia (MI) were screened and explored. Results: An important target set containing 19 proteins was constructed. Two target proteins with more favorable binding activity for Rg1 against MI were further identified by molecular docking, including mitogen-activated protein kinase 1 (MAPK1) and adenosine kinase (ADK). Meanwhile, Rg1 intervention on H9c2 cells injured by H2O2 showed an inhibitory oxidative phosphorylation (OXPHOS) pathway. The inhibition of Rg1 on MAPK1 and OXPHOS pathway was confirmed by Western blot assay. By protein recombination and spectroscopic analysis, the binding reaction between ADK and Rg1 was also evaluated. Conclusion: Rg1 can effectively alleviate cardiomyocytes oxidative stress injury via targeting MAPK1 and ADK, and inhibiting oxidative phosphorylation (OXPHOS) pathway. The present study provides scientific basis for the clinical application of the natural active ingredient, Rg1, and also gives rise to a methodological reference to the searching of action targets and pathways of other natural active ingredients.