• Title/Summary/Keyword: Data Message

Search Result 1,513, Processing Time 0.032 seconds

Endonuclease G is Upregulated and Required in Testicular Germ Cell Apoptosis after Exposure to 60 Hz at 200 μT

  • Park, Sungman;Kim, Min-Woo;Kim, Ji-Hoon;Lee, Yena;Kim, Min Soo;Lee, Yong-Jun;Kim, Young-Jin;Kim, Hee-Sung;Kim, Yoon-Won
    • Journal of electromagnetic engineering and science
    • /
    • v.15 no.3
    • /
    • pp.142-150
    • /
    • 2015
  • Several reports supported that continuous exposure to 60 Hz magnetic field (MF) induces testicular germ cell apoptosis in vivo. We recently evaluated duration- and dose-dependent effects of continuous exposure to a 60 Hz MF on the testes in mice. BALB/c male mice were exposed to a 60 Hz MF at $100{\mu}T$ for 24 hours a day for 2, 4, 6, or 8 weeks, and at 2, 20 or $200{\mu}T$ for 24 hours a day for 8 weeks. To induce the apoptosis of testicular germ cell in mice, the minimum dose is $20{\mu}T$ at continuous exposure to a 60 Hz MF for 8 weeks, and the minimum duration is 6 weeks at continuous exposure of $100{\mu}T$. Continuous exposure to a 60 Hz MF might affect duration- and dose-dependent biological processes including apoptotic cell death and spermatogenesis in the male reproductive system of mice. The safety guideline of the International Commission on Non-Ionizing Radiation Protection (ICNIRP) indicates that the permissible maximum magnetic flux density for general public exposure is $200{\mu}T$ at 60 Hz EMF (ICNIRP Guidelines, 2010). In the present study, we aimed to examine the expression of pro- and anti-apoptotic genes regulated by the continuous exposure to 60 Hz at $200{\mu}T$ in Sprague-Dawley rats for 20 weeks. The continuous exposure to 60 Hz at $200{\mu}T$ does not affect the body and testicular weight in rats. However, exposure to 60 Hz MF significantly affects testicular germ cell apoptosis and sperm count. Further, the apoptosis-related gene was scrutinized after exposure to 60 Hz at $200{\mu}T$ for 20 weeks. We found that the message level of endonuclease G (EndoG) was greatly increased following the exposure to 60 Hz at $200{\mu}T$ compared with sham control. These data suggested that 60 Hz magnetic field induced testicular germ cell apoptosis through mitochondrial protein Endo G.

XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit (자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술)

  • Choi, YongSoo;Kim, HyoungJoong;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.156-163
    • /
    • 2012
  • Recently, Information Hiding Technology are becoming increasingly demanding in the field of international security, military and medical image This paper proposes data hiding technique utilizing parity checker for gray level image. many researches have been adopted LSB substitution and XOR operation in the field of steganography for the low complexity, high embedding capacity and high image quality. But, LSB substitution methods are not secure through it's naive mechanism even though it achieves high embedding capacity. Proposed method replaces LSB of each pixel with XOR(between the parity check bit of other 7 MSBs and 1 Secret bit) within one pixel. As a result, stego-image(that is, steganogram) doesn't result in high image degradation. Eavesdropper couldn't easily detect the message embedding. This approach is applying the concept of symmetric-key encryption protocol onto steganography. Furthermore, 1bit of symmetric-key is generated by the self-reference of each pixel. Proposed method provide more 25% embedding rate against existing XOR operation-based methods and show the effect of the reversal rate of LSB about 2% improvement.

The DEVS-based Detailed Implementation Method of the Command and Fire Control System for the Underwater Vehicle DEVS-HLA Simulation in the Engagement Level (교전급 수중운동체 DEVS-HLA 시뮬레이션을 위한 전술통제체계의 DEVS 기반 상세 구현 방법)

  • Son, Myeong-Jo;Cha, Ju-Hwan;Kim, Tae-Wan;Lee, Kyu-Yeul;Nah, Young-In
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.4
    • /
    • pp.628-645
    • /
    • 2010
  • To perform the engagement level simulation between the underwater vehicle model and the surface model those are constituted with various systems/ sub-systems, we implemented four different federates as a federation according to the IEEE 1516 HLA (High Level Architecture) protocol that is the international standard in the distributed simulation. Those are CFCS (Command and Fire Control System) federate, motion federate, external entities (torpedos, countermeasure and surfaceship) federate, and visualization federate that interacts with OSG (Open Scene Graph)-based visualization rendering module. In this paper, we present the detailed method about the model constitution for discrete event simulation in the distributed environment. For the sake of this purpose, we introduce the DEVS (Discrete Event System Specification)-HLA-based modeling method of the CFCS federate that reflects not only the interations between models, but also commands from user and tactics manager that is separated from the model. The CFCS federate makes decisions in various missions such as the normal diving, the barrier misision, the target motion analysis, the torpedo launch, and the torpedo evasion. In the perspective of DEVS modeling, the CFCS federate is the coupled model that has the tactical data process model, command model and fire control model as an atomic model. The message passing and time synchronization with other three federates are settled by the $m\ddot{a}k$ RTI (Runtime Infrastructure) that supports IEEE 1516. In this paper, we provides the detailed modeling method of the complicated model that has hierarchical relationship such as the CFCS system in the submarine and that satisfies both of DEVS modeling method for the discrete event simulation and HLA modeling method for the distributed simulation.

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

CoAP-based Time Synchronization Algorithm in Sensor Network (센서 네트워크에서의 CoAP 기반 시각 동기화 기법)

  • Kim, Nac-Woo;Son, Seung-Chul;Park, Il-Kyun;Yu, Hong-Yeon;Lee, Byung-Tak
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.39-47
    • /
    • 2015
  • In this paper, we propose a new time synchronization algorithm using CoAP(constrained-application protocol) in sensor network environment, which handles a technique that synchronizes an explicit timestamp between sensor nodes not including an additional module for time-setting and sensor node gateway linked to internet time server. CoAP is a standard protocol for sensor data communication among sensor nodes and sensor node gateway to be built much less memory and power supply in constrained network surroundings including serious network jitter, packet losses, etc. We have supplied an exact time synchronization implementation among small and cheap IP-based sensor nodes or non-IP based sensor nodes and sensor node gateway in sensor network using CoAP message header's option extension. On behalf of conventional network time synchronization method, as our approach uses an exclusive protocol 'CoAP' in sensor network, it is not to become an additional burden for synchronization service to sensor nodes or sensor node gateway. This method has an average error about 2ms comparing to NTP service and offers a low-cost and robust network time synchronization algorithm.

Design and Implementation of Bio-data Monitering System Based on ISO/IEEE 11073 DIM/REST for IoT Healthcare Service (IoT 헬스케어 서비스를 위한 ISO/IEEE 11073 DIM/REST 기반 생체정보 모니터링 시스템 설계 및 구현)

  • Choi, Ju-Hyun;Chun, Seung-Man;Jang, Dong-Hyun;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.3-12
    • /
    • 2015
  • Recently, various studies have been attempted to provide a biological information monitoring service through integrating with the web service. The medical information transmission standard ISO/IEEE 11073 PHD defines the optimized exchange protocol ISO/IEEE 11073-20601 based on the No-IP to exchange the biometric information between the ISO/IEEE 11073 agent and the manager. It's system structure based on the No-IP using ISO/IEEE 11073-20601 is not suitable for providing a remote biological information monitoring services. That is because it is difficult to provide to control and manage the biological information measurement devices, which have installed IP protocol stack at the remote. Furthermore, ACSE and CMDISE in ISO/IEEE 11073-20601 are not suitable to provide U-healthcare services based on IoT because they are complicated and difficult to implement it caused by the structural complexity. In order to solve the problems, in this paper, we propose the biological information monitoring architecture based on ISO/IEEE 11073 DIM/REST of IoT environment to provide the biological information monitoring service based on IoT. To do this, we designed biological information monitoring system architecture based on IoT and the message exchange protocol of ISO/IEEE 11073 DIM/REST between the ISO/IEEE 11073 agent and the ISO/IEEE 11073 manager. In order to verify the realistic possibility of the proposed system architecture, we developed the service prototype.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Son, Hong;Jo, In-June;Ju, Young-Ji;Lee, Dal-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.667-671
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can been through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working Group is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, I design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

Applications of SMCRE Model on Social Amplification of MERS Risk Information and its Implications (메르스 위험정보유통의 사회적 확산에 관한 SMCRE 모형의 적용과 함의)

  • Choi, Choong-Ik;Bae, Suk-Kyeong;Kim, Chul-Min
    • Journal of Distribution Science
    • /
    • v.14 no.6
    • /
    • pp.89-98
    • /
    • 2016
  • Purpose - This article tackles risk communication issues and aims to address the characteristics of MERS risk information distribution in South Korea, and secondly to examine the communicative behavior of the public health authority in terms of the quality of communication strategies. Thirdly, the study attempts to figure out the risk communication to cope with MERS through the applications of SMCRE model in chronological order. We employ the social amplification of risk framework for analyzing the emergent public response as one of the main approaches. Research Design, Data and Methodology - The main framework of this study is theoretically based on the social amplification of risk, which describes signals about risk transmitted and processed by individuals and social groups. The model also reflects the interactions between social groups and institutes about disaster-related risk issues, which are potential amplifiers or attenuators of communication signals. S-M-C-R-E Model is methodologically employed to examine the social amplification for MERS risk information in each period, which we defined operationally. The proposed methodology allows the assessment of effectiveness and ineffectiveness on risk communication to be conceptualized as a countermeasure against disasters. The paper focuses on exploring how social risk amplification can be applied and organized in each stage. Results - The SMCRE model describes the exchange of risk information and is also applied to all forms of communication between stakeholders including public health authority, local government and media. Each factor of risk communication includes source, message, channel, receiver and effect. The results support that the effective risk communication involves not only the improved reliability of public health authority as a key factor of risk communication, but also a close cooperation and good collaboration with local governments. It does not seem to be possible that the government-initiated risk communication based on controllability and management cope effectively with infectious disease in early stage. The results of this study imply that the shared risks between local, regional and national authorities can enhance risk communication system. Conclusions - The study supports that the disparities in how disaster-related risk information is interpreted and coded, have made effective risk communication and public sense-making impeded. Our findings support a more communicative discussion about the role of risk information sharing between governments for the improvement of emergency management and underline the importance of social elements in the risk communication, such as relationship and trust building. Findings suggest that trust building between stakeholders could be added to help explain the processes of social amplification and attenuation of risk. It would be recommended that the continuous risk communication with all the involved stakeholders will be able to help national health promotion policy to be improved regarding emergency management. Furthermore, risk communication has to be a scientific approach for the communication pertaining to potentially sensitive or controversial situations with public concerns and low public trust.