• Title/Summary/Keyword: Data Memory

Search Result 3,347, Processing Time 0.032 seconds

Session Key Agreement Protocol for IoT Home Devices using Shadow Passwords (그림자 패스워드를 사용한 IoT 홈 디바이스 사이의 세션키 공유 프로토콜)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.93-100
    • /
    • 2020
  • Although various home services are developed as increasing the number of home devices with wire and wireless connection, privacy infringement and private information leakage are occurred by unauthorized remote connection. It is almost caused by without of device authentication and protection of transmission data. In this paper, the devices' secret value are stored in a safe memory of a smartphone. A smartphone processes device authentication. In order to prevent leakage of a device's password, a shadow password multiplied a password by the private key is stored in a device. It is proposed mutual authentication between a smartphone and a device, and session key agreement for devices using recovered passwords on SRP. The proposed protocol is resistant to eavesdropping, a reply attack, impersonation attack.

Characteristics of $Ag_x(Ge_2Sb_2Te_5)_{1-x}$ (x= 0, 0.05, 0.1) thin films for PRAM (PRAM을 위한 $Ag_x(Ge_2Sb_2Te_5)_{1-x}$ (x= 0, 0.05, 0.1) 박막의 특성)

  • Kim, Sung-Won;Song, Ki-Ho;Lee, Hyun-Yong
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2008.06a
    • /
    • pp.21-22
    • /
    • 2008
  • In the paper, we report several experimental data capable of evaluating the phase transformation characteristics of $Ag_x(Ge_2Sb_2Te_5)_{1-x}$ (x =0, 0.05, 0.1) thin films. The $Ag_x(Ge_2Sb_2Te_5)_{1-x}$ phase change thin films have been prepared by thermal evaporation. The crystallization characteristics of amorphous$Ag_x(Ge_2Sb_2Te_5)_{1-x}$ thin films were investigated by using nano-pulse scanner with 658 nm laser diode (power; 1~17 mW, pulse duration; 10~460 ns) and XRD measurement. It was found that the more Ag is doped, the more crystallization speed was 50 improved. In comparision with $Ge_2Sb_2Te_5$ thin film, the sheet resistance$(R_{amor})$ of the amorphous $Ag_x(Ge_2Sb_2Te_5)_{1-x}$ thin films were found to be lager than that of $Ge_2Sb_2Te_5$ film($R_{amor}$ $\sim10^7\Omega/\square$ and $R_{cryst}$ 10 $\Omega/\square$). That is, the ratio of $R_{amor}/R_{cryst}$ was evaluates to be $\sim10^6$ This is very helpful to writing current reduction of phase-change random acess memory.

  • PDF

A Recommendation System of Exponentially Weighted Collaborative Filtering for Products in Electronic Commerce (지수적 가중치를 적용한 협력적 상품추천시스템)

  • Lee, Gyeong-Hui;Han, Jeong-Hye;Im, Chun-Seong
    • The KIPS Transactions:PartB
    • /
    • v.8B no.6
    • /
    • pp.625-632
    • /
    • 2001
  • The electronic stores have realized that they need to understand their customers and to quickly response their wants and needs. To be successful in increasingly competitive Internet marketplace, recommender systems are adapting data mining techniques. One of most successful recommender technologies is collaborative filtering (CF) algorithm which recommends products to a target customer based on the information of other customers and employ statistical techniques to find a set of customers known as neighbors. However, the application of the systems, however, is not very suitable for seasonal products which are sensitive to time or season such as refrigerator or seasonal clothes. In this paper, we propose a new adjusted item-based recommendation generation algorithms called the exponentially weighted collaborative filtering recommendation (EWCFR) one that computes item-item similarities regarding seasonal products. Finally, we suggest the recommendation system with relatively high quality computing time on main memory database (MMDB) in XML since the collaborative filtering systems are needed that can quickly produce high quality recommendations with very large-scale problems.

  • PDF

Hybrid Priority Medium Access Control Scheme for Wireless Body Area Networks (무선 인체통신 네트워크를 위한 복합 우선순위 MAC 기법)

  • Lee, In-Hwan;Lee, Gun-Woo;Cho, Sung-Ho;Choo, Sung-Rae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1305-1313
    • /
    • 2010
  • Last few years, wireless personal area network (WPAN) has been widely researched for various healthcare applications. Due to restriction of device hardware (e.g., energy and memory), we need to design a highly-versatile MAC layer protocol for WBAN (Wireless Body Area Network). In addition, when an emergency occurs to a patient, a priority mechanism is necessitated for a urgent message to get through to the final destination. This paper presents a priority mechanism referred to as hybrid priority MAC for WBAN. Through extensive simulation, we show the proposed MAC protocol can minimize the average packet latency for urgent data. Thus, when patients have an emergency situation, our MAC allows adequate assistance time and medical treatment for patients. The simulation based on NS-2 shows that our Hybrid Priority MAC has the good performance and usability.

Study on pathology of Alzheimer's disease, trends and future strategy for research (치매의 병리(病理), 연구동향(硏究動向)과 향후(向後) 연구전략(硏究戰略)에 대(對)한 고찰(考察))

  • Oh, Young-Sun;Kim, Sung-Hoon
    • Journal of Haehwa Medicine
    • /
    • v.8 no.1
    • /
    • pp.793-825
    • /
    • 1999
  • For the development of drugs for alzheimer,s disease, the study was done to review the oriental pathology, clinical data, recent trends for research and strategy for future study. The results were as follows: 1. The medical term Chi-dsi implying alzheimer,s disease was referred for the first time in a medical book, Hwatasheneubijeon written by Hwa-Ta and its differentiation and treatment were studied more in Ming or Ching dynasties. Chi-dai can be differentated as weak(虛) syndrome and Shi(實) syndrome. This can be caused by deficiencies of renal Yin, renal Yang, cardiac Yin and hepatic blood, while that by deficiencies of pathological fluid(痰飮) and clotted blood(瘀血). 2. Dementia can be roughly classified as alzheimer's disease and multi-infarct disease. Its causes were known to be cholinergic transmitter, C-peptide, amyloid-${\beta}$, apolipoprotein, APP(amyloid precursor protein), TGF, MMP-9 and free radical. 3. In Korea experimental studies were chiefly done for the elimataion of C-peptide, amyloid-${\beta}$, apolipoprotein, APP for alzheimer's disease, for the development of drug inhibiting degerative change following CVA and loss of memory and also administrative measure was done by support of government. 4. Drugs of dimentia developed so far were Chi-Dai dan, extracts from aloe, mushroom, green tea, Ganoderma and also folic acid, vitamin C, DHEA and silk amino acid were reported to be effective in dimenta. 5. Future strategic research had better be done on dementia-inducing factors such as acetylcholine, C-peptide, amyloid-${\beta}$, apolipoprotein, APP, TGF, MMP-9 and free radical, development of animal model for dimentia, clinical study, epidemiology, nursing and administrative studies and also consortium for dimentia research should be formed so that repeated investment be avoided.

  • PDF

Post-Intensive Care Syndrome Experience among Critical Care Survivors: A Meta-synthesis of Qualitative Research (집중치료 후 증후군 경험에 관한 질적 통합 연구)

  • Kang, Jiyeon;Jeong, Yeon Jin;Yun, Sun Young;Lee, Min Ju;Baek, Min Jung;Shin, So Yeung;Hong, Hee Jin;Kim, Soo Kyung;Cho, Young Shin
    • Journal of Korean Critical Care Nursing
    • /
    • v.10 no.1
    • /
    • pp.13-30
    • /
    • 2017
  • Purpose: The purpose of this study was to integrate the results of qualitative studies to understand critical care survivors' experience of the post-intensive care syndrome (PICS). Methods: This was a meta-synthesis of primary studies that used qualitative methods. We reviewed 26 qualitative studies on PICS selected from 8 international and Korean databases and from a manual search. Thomas and Harden's 3 stages (free coding, development of descriptive themes, generation of analytical themes) for thematic synthesis were utilized to analyze the collected qualitative data. Results: Four descriptive themes emerged from the thematic synthesis: weak physical conditions, psycho-emotional changes, the painful-memory of intensive care units, and social vulnerability. The analytical theme for the current study was "unfamiliarity with the vulnerable self." Critical care survivors had to confront entirely different "selves" after discharge from intensive care units. They had become physically weak, psychologically unstable, and the critical memories continued to create distress. These changes increased their social vulnerability by making them dependent on others, causing family conflicts, and changing interpersonal relationships. Conclusions: Finding from this qualitative synthesis and other related literature highlight the severity of PICS and the importance of rehabilitative intervention for critical care survivors.

  • PDF

Ginsenoside Rp1 Exerts Anti-inflammatory Effects via Activation of Dendritic Cells and Regulatory T Cells

  • Bae, Jin-Gyu;Koo, Ji-Hye;Kim, Soo-Chan;Park, Tae-Yoon;Kim, Mi-Yeon
    • Journal of Ginseng Research
    • /
    • v.36 no.4
    • /
    • pp.375-382
    • /
    • 2012
  • Ginsenoside Rp1 (G-Rp1) is a saponin derivate that provides anti-metastatic activities through inhibition of the NF-${\kappa}B$ pathway. In this study, we examined the effects of G-Rp1 on regulatory T cell (Treg) activation. After treatment of splenocytes with G-Rp1, Tregs exhibited upregulation of IL-10 expression, and along with dendritic cells (DCs), these Tregs showed increased cell number compared to other cell populations. The effect of G-Rp1 on Treg number was augmented in the presence of lipopolysaccharide (LPS), which mimics pathological changes that occur during inflammation. However, depletion of DCs prevented the increase in Treg number in the presence of G-Rp1 and/or LPS. In addition, G-Rp1 promoted the differentiation of the memory types of $CD4^+Foxp3^+CD62L^{low}$ Tregs rather than the generation of new Tregs. In vivo experiments also demonstrated that Tregs and DCs from mice that were fed G-Rp1 for 7 d and then injected with LPS exhibited increased activation compared with those from mice that were injected with LPS alone. Expression of TGF-${\beta}$ and CTLA4 in Tregs was increased, and upregulation of IL-2 and CD80/CD86 expression by DCs affected the suppressive function of Tregs through IL-2 receptors and CTLA4. These data demonstrate that G-Rp1 exerts anti-inflammatory effects by activating Tregs in vitro and in vivo.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

Optimization Protocol using Load Balancing for Hierarchical Wireless Sensor Network (무선센서네트워크에서 부하 균등화를 위한 클러스터링 최적화 프로토콜)

  • Choi, Hae-Won;Kim, Sang-Jin;Pye, Su-Young;Chang, Chu-Seock
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.419-429
    • /
    • 2013
  • The Wireless sensor network(WSN) consisting of a large number of sensors aims to gather data in a variety of environments. The sensor nodes operate on battery of limited power. so, To extend network life time is major goals of research in the WSN. In this paper, we state the key point of a energy consumption with minimum&load balancing. The proposed protocol guarantee balance of number of cluster member nodes using the node memory threshold and optimization of distribution of cluster head using the optimized clustering method. The results show that the proposed protocol could support the load balancing and high energy efficiency by distributing the clusters with a reasonable number of member nodes. The simulation results show that our schme ensure longer life time in WSN as compare with existing schemes such as LEACH and CBLM.

A Resource-Aware Mapping Algorithm for Coarse-Grained Reconfigurable Architecture Using List Scheduling (리스트 스케줄링을 통한 Coarse-Grained 재구성 구조의 맵핑 알고리즘 개발)

  • Kim, Hyun-Jin;Hong, Hye-Jeong;Kim, Hong-Sik;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.6
    • /
    • pp.58-64
    • /
    • 2009
  • For the success of the reconfigurable computing, the algorithm for mapping operations onto coarse-grained reconfigurable architecture is very important. This paper proposes a resource-aware mapping system for the coarse-grained reconfigurable architecture and its own underlying heuristic algorithm. The operation assignment and the routing path allocation are simultaneously performed with a cycle-accurate time-exclusive resource model. The proposed algorithm minimizes the communication resource usage and the global memory access with the list scheduling heuristic. The operation to be mapped are prioritized with general properties of data flow. The evaluations of the proposed algorithm show that the performance is significantly enhanced in several benchmark applications.