• Title/Summary/Keyword: real-time scan

Search Result 225, Processing Time 0.03 seconds

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.

Development of Radiometric Scanning System for the Evaluation of the Pipeline (배관 검사용 Radiometric Scanning System 제작 및 시험)

  • Kim, Yong-Kyun;Hong, Seok-Boong;Chung, Chong-Eun;Lee, Yoon-Ho;Jung, Yong-Ha;Lee, Jeong-Ki
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.22 no.5
    • /
    • pp.474-482
    • /
    • 2002
  • One dimensional Radiometric scanning system was fabricated and tested as a filmless radiographic inspection system, which could be applied to the evaluation of the corrosion and deposits in the pipeline. This system is composed of the single radioactive source of the collimated focusing beam, and single scintillation detector of BGO, and the mechanical scanning system to transport and align the source and detector, and the operating software to automatically control the mechanical scan system. The performance of the system was simulated using GEANT4 software. This system is applied to one specimen having an artificial falw(flat bottom hole) in the pipe and the other specimen with thickness variation. For the inspection by using the radioactive source in the pipeline, it is possible to evaluate the corrosion and deposits in real time and without film.

Fast and Accurate Rigid Registration of 3D CT Images by Combining Feature and Intensity

  • June, Naw Chit Too;Cui, Xuenan;Li, Shengzhe;Kim, Hak-Il;Kwack, Kyu-Sung
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.1
    • /
    • pp.1-11
    • /
    • 2012
  • Computed tomography (CT) images are widely used for the analysis of the temporal evaluation or monitoring of the progression of a disease. The follow-up examinations of CT scan images of the same patient require a 3D registration technique. In this paper, an automatic and robust registration is proposed for the rigid registration of 3D CT images. The proposed method involves two steps. Firstly, the two CT volumes are aligned based on their principal axes, and then, the alignment from the previous step is refined by the optimization of the similarity score of the image's voxel. Normalized cross correlation (NCC) is used as a similarity metric and a downhill simplex method is employed to find out the optimal score. The performance of the algorithm is evaluated on phantom images and knee synthetic CT images. By the extraction of the initial transformation parameters with principal axis of the binary volumes, the searching space to find out the parameters is reduced in the optimization step. Thus, the overall registration time is algorithmically decreased without the deterioration of the accuracy. The preliminary experimental results of the study demonstrate that the proposed method can be applied to rigid registration problems of real patient images.

Expression and Preliminary Functional Profiling of the let-7 Family during Porcine Ovary Follicle Atresia

  • Cao, Rui;Wu, Wang Jun;Zhou, Xiao Long;Xiao, Peng;Wang, Yi;Liu, Hong Lin
    • Molecules and Cells
    • /
    • v.38 no.4
    • /
    • pp.304-311
    • /
    • 2015
  • Most follicles in the mammalian ovary undergo atresia. Granulosa cell apoptosis is a hallmark of follicle atresia. Our previous study using a microRNA (miRNA) microarray showed that the let-7 microRNA family was differentially expressed during follicular atresia. However, whether the let-7 miRNA family members are related to porcine (Sus scrofa) ovary follicular apoptosis is unclear. In the current study, real-time quantitative polymerase chain reaction showed that the expression levels of let-7 family members in follicles and granulosa cells were similar to our microarray data, in which miRNAs let-7a, let-7b, let-7c, and let-7i were significantly decreased in early atretic and progressively atretic porcine ovary follicles compared with healthy follicles, while let-7g was highly expressed during follicle atresia. Furthermore, flow cytometric analysis and Hoechst33342 staining demonstrated that let-7g increased the apoptotic rate of cultured granulosa cells. In addition, let-7 target genes were predicted and annotated by TargetScan, PicTar, gene ontology and Kyoto encyclopedia of genes and genomes pathways. Our data provide new insight into the association between the let-7 miRNA family in granulosa cell programmed death.

An Active Candidate Set Management Model on Association Rule Discovery using Database Trigger and Incremental Update Technique (트리거와 점진적 갱신기법을 이용한 연관규칙 탐사의 능동적 후보항목 관리 모델)

  • Hwang, Jeong-Hui;Sin, Ye-Ho;Ryu, Geun-Ho
    • Journal of KIISE:Databases
    • /
    • v.29 no.1
    • /
    • pp.1-14
    • /
    • 2002
  • Association rule discovery is a method of mining for the associated item set on large databases based on support and confidence threshold. The discovered association rules can be applied to the marketing pattern analysis in E-commerce, large shopping mall and so on. The association rule discovery makes multiple scan over the database storing large transaction data, thus, the algorithm requiring very high overhead might not be useful in real-time association rule discovery in dynamic environment. Therefore this paper proposes an active candidate set management model based on trigger and incremental update mechanism to overcome non-realtime limitation of association rule discovery. In order to implement the proposed model, we not only describe an implementation model for incremental updating operation, but also evaluate the performance characteristics of this model through the experiment.

Parallel Architecture Design of H.264/AVC CAVLC for UD Video Realtime Processing (UD(Ultra Definition) 동영상 실시간 처리를 위한 H.264/AVC CAVLC 병렬 아키텍처 설계)

  • Ko, Byung Soo;Kong, Jin-Hyeung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.112-120
    • /
    • 2013
  • In this paper, we propose high-performance H.264/AVC CAVLC encoder for UD video real time processing. Statistical values are obtained in one cycle through the parallel arithmetic and logical operations, using non-zero bit stream which represents zero coefficient or non-zero coefficient. To encode codeword per one cycle, we remove recursive operation in level encoding through parallel comparison for coefficient and escape value. In oder to implement high-speed circuit, proposed CAVLC encoder is designed in two-stage {statical scan, codeword encoding} pipeline. Reducing the encoding table, the arithmetic unit is used to encode non-coefficient and to calculate the codeword. The proposed architecture was simulated in 0.13um standard cell library. The gate count is 33.4Kgates. The architecture can support Ultra Definition Video ($3840{\times}2160$) at 100 frames per second by running at 100MHz.

Unification of examination paper switchboard (단일화 스트립지 교환기 개발)

  • Han, hyun-ji;Kim, min-yeong;Lee, gi-young;Lee, sang-sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.5 no.3
    • /
    • pp.138-143
    • /
    • 2012
  • In the study, we were develop unification of examination paper switchboard that reduced the hassle about previously glucose measurement. Examination paper case was produced to magazine for minimize when you use the previously products occurred hand pollution or loss rate. And, Quantity of examination paper can be checked in real time by seeking the convenience of patients. In this study, we selected one model but you can product any examination paper case. Data was construct through surveys to questionnaires and satisfaction. Purchasing was received to high rating 67%. In this study, we were trying minimize inconvenience during self scan for diabetes patient. Further, we were suggest various products that were improve the functionality and practicality through practicality in design.

Overexpression of Long Non-Coding RNA MIR22HG Represses Proliferation and Enhances Apoptosis via miR-629-5p/TET3 Axis in Osteosarcoma Cells

  • Zhao, Haoliang;Zhang, Ming;Yang, Xuejing;Song, Dong
    • Journal of Microbiology and Biotechnology
    • /
    • v.31 no.10
    • /
    • pp.1331-1342
    • /
    • 2021
  • In this study, we evaluated the mechanism of long non-coding RNA MIR22 host gene (LncRNA MIR22HG) in osteosarcoma cells. Forty-eight paired osteosarcoma and adjacent tissues samples were collected and the bioinformatic analyses were performed. Target genes and potential binding sites of MIR22HG, microRNA (miR)-629-5p and tet methylcytosine dioxygenase 3 (TET3) were predicted by Starbase and TargetScan V7.2 and confirmed by dual-luciferase reporter assay. Cell Counting Kit-8, colony formation and flow cytometry assays were utilized to determine the viability, proliferation and apoptosis of transfected osteosarcoma cells. Pearson's analysis was introduced for the correlation analysis between MIR22HG and miR-629-5p in osteosarcoma tissue. Relative expressions of MIR22HG, miR-629-5p and TET3 were measured by quantitative real-time polymerase chain reaction or Western blot. MiR-629-5p could competitively bind with and was negatively correlated with MIR22HG, the latter of which was evidenced by the high expression of miR-629-5p and low expression of MIR22HG in osteosarcoma tissues. Overexpressed MIR22HG repressed the viability and proliferation but enhanced apoptosis of osteosarcoma cells, which was reversed by miR-629-5p upregulation. TET3 was the target gene of miR-629-5p, and the promotive effects of upregulated miR-629-5p on the viability and proliferation as well as its repressive effect on apoptosis were abrogated via overexpressed TET3. To sum up, overexpressed MIR22HG inhibits the viability and proliferation of osteosarcoma cells, which was achieved via regulation of the miR-629-5p/TET3 axis.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

Comparison of Search Performance of SQLite3 Database by Linux File Systems (Linux File Systems에 따른 SQLite3 데이터베이스의 검색 성능 비교)

  • Choi, Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • Recently, IoT sensors are often used to produce stream data locally and they are provided for edge computing applications. Mass-produced data are stored in the mobile device's database for real-time processing and then synchronized with the server when needed. Many mobile databases are developed to support those applications. They are CloudScape, DB2 Everyplace, ASA, PointBase Mobile, etc, and the most widely used database is SQLite3 on Linux. In this paper, we focused on the performance required for synchronization with the server. The search performance required to retrieve SQLite3 was compared and analyzed according to the type of each Linux file system in which the database is stored. Thus, performance differences were checked for each file system according to various search query types, and criteria for applying the more appropriate Linux file system according to the index use environment and table scan environment were prepared and presented.