http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Wei-Shen Lai,Chu-Hsing Lin,Jung-Chun Liu,Hsun-Chi Huang,Tsung-Che Yang 보안공학연구지원센터 2008 International Journal of Software Engineering and Vol.2 No.4
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or resources of a targeted system. Although it is not possible to exempt entirely from denial of service or distributed denial of service attacks, we can limit the malicious user by controlling the traffic flow. In the paper, we propose to monitor the traffic pattern in order to alleviate distributed denial of service attacks. A bandwidth allocation policy will be adopted to assign normal users to a high priority queue and suspected attackers to a low priority queue. Simulations conducted in network simulator of our proposed priority queue-based scheme shows its effectiveness in blocking attacking traffic while maintaining constant flows for legitimate traffic.
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Wei-Shen Lai,Chu-Hsing Lin,Jung-Chun Liu,Yen-Lin Huang,Mei-Chun Chou 보안공학연구지원센터 2008 International Journal of Multimedia and Ubiquitous Vol.3 No.4
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of a centralized access point. Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of Destination Sequenced Distance Vector routing protocol (DSDV). SEAD provides a robust protocol against attackers trying to create incorrect routing state in the other node. However, it does not provide a way to prevent an attacker from tampering the next hop or the destination field in route update. In this paper, we propose an I-SEAD protocol to solve the problem. A series of simulation experiments are conducted to evaluate the performance.
Zhan Wenzhi,Luo Wei,Zhang Yulong,Xiang Keheng,Chen Xiaomei,Shen Shuirong,Huang Chuqing,Xu Tingting,Ding Wenbin,Chen Yuehan,Lin Mingtong,Pan Xinghua,Lai Kefang 대한천식알레르기학회 2024 Allergy, Asthma & Immunology Research Vol.16 No.1
Purpose: Eosinophilic asthma (EA) and non-asthmatic eosinophilic bronchitis (EB) share similar eosinophilic airway inflammation. Unlike EA, EB did not present airway hyperresponsiveness or airflow obstruction. We aimed to compare the mechanism underlying the different manifestations between EA and EB via sputum transcriptomics analysis. Methods: Induced-sputum cells from newly physician-diagnosed EA, EB patients, and healthy controls (HCs) were collected for RNA sequencing. Results: Bulk RNA sequencing was performed using sputum cells from patients with EA (n = 18), EB (n = 15) and HCs (n = 28). Principal component analysis revealed similar gene expression patterns in EA and EB. The most differentially expressed genes in EB compared with HC were also shared by EA, including IL4, IL5 IL13, CLC, CPA3, and DNASE1L3. However, gene set enrichment analysis showed that the signatures regulating macrophage activation were enriched in EA compared to EB. Sputum cells were profiled using single-cell RNA sequencing. FABP4+ macrophages, SPP1+ macrophages, FCN1+ macrophages, dendritic cells, T cells, B cells, mast cells, and epithelial cells were identified based on gene expression profiling. Analysis of cell-cell communication revealed that interactions between FCN1+ macrophages and other cells were higher in EA than in EB. A wealth of transforming growth factor beta (TGF-β) and vascular endothelial growth factor (VEGF) interactions between FCN1+ macrophages and other cells have been shown in EA. The gene expression levels of EREG, TGFBI, and VEGFA in FCN1+ macrophages of EA were significantly higher than those of EB. Furthermore, signatures associated with the response to TGF-β, cellular response to VEGF stimulus and developmental cell growth were enriched in FCN1+ macrophages of EA compared to those of EB. Conclusions: FCN1+ macrophage activation associated with airway remodeling processes was upregulated in EA compared to that in EB, which may contribute to airway hyperresponsiveness and airflow obstruction.
Video Streaming over HTTP/2: Design and Evaluation of Adaptive Server-Paced Push
Huei-Wen Ferng,Shan-Hsiang Shen,Chih-Wei Lai 한국통신학회 2021 Journal of communications and networks Vol.23 No.2
By using the server push of the hypertext transfer pro tocol (HTTP) version 2.0, i.e., HTTP/2, along with the techniqueof server pacing, a novel scheme is proposed in this paper to de liver video segments. Furthermore, the load of bitrate adaptationis shifted to the server to avoid bandwidth competition and wastagecaused by bitrate switching. It can be explicitly shown that no sig nificant overhead is brought by our proposed scheme via complex ity analysis. Moreover, our proposed scheme generates one HTTPrequest only. With extensive simulations, we successfully demon strate that it is superior over the closely related schemes in termsof the average achievable bitrate, the number of buffer stalls, theratio of unclaimed pushes, etc., in particular, when a harsh networkcondition arises.
A Robust Watermark Scheme for Copyright Protection
Jung-Chun Liu,Chu-Hsing Lin,Wei-Shen Lai,Yan-Wei Lee 보안공학연구지원센터 2008 International Journal of Software Engineering and Vol.2 No.4
In this paper, we propose a robust watermark technology to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intellectual property even after serious attacks on the watermarked image. In the proposed watermarking, we embed watermarks by Singular Value Decomposition and Distributed Discrete Wavelet Transformation techniques. Regarding our method, Singular Value Decomposition provides the robustness to protect the image from most attacks except cropping, while Distributed Discrete Wavelet Transformation disperses watermarks all over the image to resist cropping attacks. The robustness of our proposed watermark scheme has been verified experimentally against main kinds of watermark attacks such as geometric and signal processing attacks.
Shun-Feng Cheng,Ling Li,Bo Li,Jing-Cai Liu,Fang-Nong Lai,Yong Zhao,Xi-Feng Zhang,Wei Shen,Lan Li 대한독성 유전단백체 학회 2018 Molecular & cellular toxicology Vol.14 No.2
Backgrounds: Di-(2-ethylhexyl) phthalate (DEHP), as an endocrine-disrupting chemical (EDC), is widely used in plasticizer and other productions. Ubiquitous human exposure to DEHP has been proposed to be a potential risk to public health. Developmental exposure to DEHP could alter epigenetic programming and result in adult-onset disease. Methods: In this study, we investigated whether DEHP exposure to pregnant mice affected epigenetic changes as a result of increase in breast cancer incidence. Results: Our results showed that the expression of total 143 epigenetics-related genes in mammary gland cells, have no significantly altered after short time and low-dose treated with DEHP from 0.5 days post-coitum (dpc) to 3.5 dpc of pregnant mice. DNA methylation status of some neoplastic development genes, such as EGFr, Esr1, Pgr, Fos and Rassf5 also had no obvious change. Conclusion: These finding showed no impact of DEHP on the expressive patterns of epigenetics-related genes and DNA methylation of breast cancer-related genes in pregnant mouse mammary gland cells.
Anomaly Detection Using LibSVM Training Tools
Jung-Chun Liu,Chu-Hsing Lin,Jui-Ling Yu,Wei-Shen Lai,Chia-Han Ho 보안공학연구지원센터 2008 International Journal of Security and Its Applicat Vol.2 No.4
Intrusion detection is the means to identify the intrusive behaviors and provide useful information to intruded systems to respond fast and to avoid or reduce damages. In recent years, learning machine technology is often used as a detection method in anomaly detection. In this research, we use support vector machine as a learning method for anomaly detection, and use LibSVM as the support vector machine tool. By using this tool, we get rid of numerous and complex operations and do not have to use external tools for finding parameters as needed by using other algorithms such as the genetic algorithm. Experimental results show that high average detection rates and low average false positive rates in anomaly detection are achieved by our proposed approach.
Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems
Chu-Hsing Lin,Jung-Chun Liu,Chia-Han Ho,Jui-Ling Yu,Wei-Shen Lai 보안공학연구지원센터 2009 International Journal of Hybrid Information Techno Vol.2 No.1
The route guidance system, which provides driving advice based on traffic information about an origin and a destination, has become very popular along with the advancement of handheld devices and the global position system. Since the accuracy and efficiency of route guidance depend on the accuracy of the traffic conditions, the route guidance system needs to include more variables in calculation, such as real time traffic flows and allowable vehicle speeds. As variables considered by the route guidance system increase, the cost to compute multiplies. Since handheld devices have limited resources, it is not feasible to use them to compute the exact optimal solutions in real time systems by some well-known algorithm, such as the Dijkstra’s algorithm, which is usually used to find the shortest path with a map of reasonable numbers of vertices. To solve this problem, we propose to use the genetic algorithm to alleviate the rising computational cost. We use the genetic algorithm to find the shortest time in driving with diverse scenarios of real traffic conditions and varying vehicle speeds. The effectiveness of the genetic algorithm is clearly demonstrated when applied on a real map of modern city with very large vertex numbers.