• Title/Summary/Keyword: Data integrity

Search Result 1,395, Processing Time 0.026 seconds

XML Signature System on Mobile Environment (모바일 환경에서 XML 전자서명 시스템)

  • Cao, Ke-Rang;Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1441-1447
    • /
    • 2008
  • It is possible to transfer huge data in mobile device by advancing mobile technology, and so in this base, various services are offered. Especially, E-commerce service is offering on mobile environment, and this service is based on XML(eXtensible Markup Language) Signature. XML Signature assure that process integrity, message authentication, and/or signer authentication. And WIPI(Wireless Internet Protocol for Interoperability) that is mobile internet integration platform was proposed to integrate mobile device platform. However, because WIPI transmits and exchanges message by tort of XML base, encryption of XML document and necessity of XML signature are increasing because of weakness of security. Therefor in this paper, Encryption and XML signature module of XML document that satisfy standard requirement in WIPI platform base design and implementation. System that was proposed in this paper used standard encryption and XML signature algorithm and supports safe encryption and XML signature through doing security simulation applied various algorithm for XML document of mobile environment.

Study on the Characteristics of Western Rocker style In Early 20th Century (20세기 초기 서양 흔들의자의 양식적 특징)

  • Lim, Seung-Taek
    • Journal of agriculture & life science
    • /
    • v.45 no.6
    • /
    • pp.21-32
    • /
    • 2011
  • This research is intended to study literatures relating to western rocking chairs style in early 20th century in order to provide basic data of designs for rockers of today in Korea and investigate characteristics of rocking chair from academic, formative and pragmatic perspectives. During the first half of 20th century, western rocking chairs (1925~1945) embodied actively the simple functionalism concept that furniture design must follow functionality considerations. Therefore, bare wood rocking chairs were without any surface decoration and tubular steel frame rocking chairs often included black leather upholstery in a bold attempt to express exposed structure. And the fact that tubular steel produced such lightweight furniture was crucial importance. Many Modernist designer created curvaceous lines of new pattern changes in their furniture. The structure of Modern rocking chair became all-important, for stylistic as well as functional reasons. Designers equated exposed structure of tubular steel and wooden frame with integrity and rationality and create an equalitarian style of design. Especially, designers in the early 20th century did use various brilliantly colored upholstery and wooden frame with simple forms of modern characteristics.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

Integrated cable vibration control system using Arduino

  • Jeong, Seunghoo;Lee, Junhwa;Cho, Soojin;Sim, Sung-Han
    • Smart Structures and Systems
    • /
    • v.23 no.6
    • /
    • pp.695-702
    • /
    • 2019
  • The number of cable-stayed bridges has been increasing worldwide, causing issues in maintaining the structural safety and integrity of bridges. The stay cable, one of the most critical members in cable-stayed bridges, is vulnerable to wind-induced vibrations owing to its inherent low damping capacity. Thus, vibration mitigation of stay cables has been an important issue both in academia and practice. While a semi-active control scheme shows effective vibration reduction compared to a passive control scheme, real-world applications are quite limited because it requires complicated equipment, including for data acquisition, and power supply. This study aims to develop an Arduino-based integrated cable vibration control system implementing a semi-active control algorithm. The integrated control system is built on the low-cost, low-power Arduino platform, embedding a semi-active control algorithm. A MEMS accelerometer is installed in the platform to conduct a state feedback for the semi-active control. The Linear Quadratic Gaussian control is applied to estimate a cable state and obtain a control gain, and the clipped optimal algorithm is implemented to control the damping device. This study selects the magnetorheological damper as a semi-active damping device, controlled by the proposed control system. The developed integrated system is applied to a laboratory size cable with a series of experimental studies for identifying the effect of the system on cable vibration reduction. The semi-active control embedded in the integrated system is compared with free and passive mode cases and is shown to reduce the vibration of stay-cables effectively.

Scale Development of Wisdom among Korean Elderly ('한국노인의 지혜척도' 개발에 관한 연구)

  • Sung, Ki-Wol;Lee, Shin-Young;Park, Jong-Han
    • 한국노년학
    • /
    • v.30 no.1
    • /
    • pp.65-80
    • /
    • 2010
  • Purpose: The purpose of this study was to develop a wisdom scale among Korean elderly with high validity and reliability. Method: The process of the development of this scale follows: A conceptual framework was identified based on literature a review of the elderly and discussion with experts in physiology and sociology. Total 128 items were developed. Through reliability testing, factor analysis, 60 preliminary items, and 4-points scale were selected. By a means of the internal consistency for 60 items, 33 items were deleted. Finally, 27 items were remained. To verity 27 items, factor analysis, reliability testing, and correlation were done. Data were collected from 480 elderly subjects in Daegu, Kyungpook Province, and Busan, Kyungnam Province from August, 2008 to February, 2009. Results: From the results of the factor analysis for 27 items, 3 factors were extracted. These factors were labeled as 'empathic emotion', 'self-reflection', and 'bitter experience of life'. Cronbach's Alpha for the 27 items was .921 and correlation coefficient of ego-integrity was .69. Conclusion: An exploratory study of the variables related to wisdom among the elderly is needed for criterion validity of this scale. A study on wisdom for different age groups is needed for re-verification.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

Feasibility Study of Beta Detector for Small Leak Detection inside the Reactor Containment

  • Jang, JaeYeong;Schaarschmidt, Thomas;Kim, Yong Kyun
    • Journal of Radiation Protection and Research
    • /
    • v.43 no.4
    • /
    • pp.154-159
    • /
    • 2018
  • Background: To prevent small leakage accidents, a real-time and direct detection system for small leaks with a detection limit below that of existing systems, e.g. $0.5gpm{\cdot}hr^{-1}$, is required. In this study, a small-size beta detector, which can be installed inside the reactor containment (CT) building and detect small leaks directly, was suggested and its feasibility was evaluated using MCNPX simulation. Materials and Methods: A target nuclide was selected through analysis of radiation from radionuclides in the reactor coolant system (RCS) and the spectrum was obtained via a silicon detector simulated in MCNPX. A window was designed to reduce the background signal caused by other nuclides. The sensitivity of the detector was also estimated, and its shielding designed for installation inside the reactor CT. Results and Discussion: The beta and gamma spectrum of the silicon detector showed a negligible gamma signal but it also contained an undesired peak at 0.22 MeV due to other nuclides, not the $^{16}N$ target nuclide. Window to remove the peak was derived as 0.4 mm for beryllium. The sensitivity of silicon beta detector with a beryllium window of 1.7 mm thickness was derived as $5.172{\times}10^{-6}{\mu}Ci{\cdot}cc^{-1}$. In addition, the specification of the shielding was evaluated through simulations, and the results showed that the integrity of the silicon detector can be maintained with lead shielding of 3 cm (<15 kg). This is a very small amount compared to the specifications of the lead shielding (600 kg) required for installation of $^{16}N$ gamma detector in inside reactor CT, it was determined that beta detector would have a distinct advantage in terms of miniaturization. Conclusion: The feasibility of the beta detector was evaluated for installation inside the reactor CT to detect small leaks below $0.5gpm{\cdot}hr^{-1}$. In future, the design will be optimized on specific data.

Antifungal Mechanism of Action of Lauryl Betaine Against Skin-Associated Fungus Malassezia restricta

  • Do, Eunsoo;Lee, Hyun Gee;Park, Minji;Cho, Yong-Joon;Kim, Dong Hyeun;Park, Se-Ho;Eun, Daekyung;Park, Taehun;An, Susun;Jung, Won Hee
    • Mycobiology
    • /
    • v.47 no.2
    • /
    • pp.242-249
    • /
    • 2019
  • Betaine derivatives are considered major ingredients of shampoos and are commonly used as antistatic and viscosity-increasing agents. Several studies have also suggested that betaine derivatives can be used as antimicrobial agents. However, the antifungal activity and mechanism of action of betaine derivatives have not yet been fully understood. In this study, we investigated the antifungal activity of six betaine derivatives against Malassezia restricta, which is the most frequently isolated fungus from the human skin and is implicated in the development of dandruff. We found that, among the six betaine derivatives, lauryl betaine showed the most potent antifungal activity. The mechanism of action of lauryl betaine was studied mainly using another phylogenetically close model fungal organism, Cryptococcus neoformans, because of a lack of available genetic manipulation and functional genomics tools for M. restricta. Our genome-wide reverse genetic screening method using the C. neoformans gene deletion mutant library showed that the mutants with mutations in genes for cell membrane synthesis and integrity, particularly ergosterol synthesis, are highly sensitive to lauryl betaine. Furthermore, transcriptome changes in both C. neoformans and M. restricta cells grown in the presence of lauryl betaine were analyzed and the results indicated that the compound mainly affected cell membrane synthesis, particularly ergosterol synthesis. Overall, our data demonstrated that lauryl betaine influences ergosterol synthesis in C. neoformans and that the compound exerts a similar mechanism of action on M. restricta.

Evaluation of Muscular Atrophy and Fatty Infiltration Using Time-zero Magnetic Resonance Imaging as Baseline Data, After Rotator Cuff Repair

  • Kim, Hyoung Bok;Yoo, Jae Chul;Jeong, Jeung Yeol
    • Clinics in Shoulder and Elbow
    • /
    • v.22 no.2
    • /
    • pp.70-78
    • /
    • 2019
  • Background: This study evaluated postoperative changes in the supraspinatus from time-zero to 6 months, using magnetic resonance imaging (MRI). We hypothesized that restoration of the musculotendinous unit of the rotator cuff by tendon repair immediately improves the rotator cuff muscle status, and maintains it months after surgery. Methods: Totally, 76 patients (29 men, 47 women) with rotator cuff tears involving the supraspinatus tendon who underwent arthroscopic rotator cuff repairs were examined. MRI evaluation showed complete repair with intact integrity of the torn tendon at both time-zero and at 6 months follow-up. All patients underwent standardized MRI at our institution preoperatively, at 1 or 2 days postoperative, and at 6 months after surgery. Supraspinatus muscular (SSP) atrophy (Thomazeau grade) and fatty infiltrations (Goutallier stage) were evaluated by MRI. The cross-sectional area of SSP in the fossa was also measured. Results: As determined by MRI, the cross-sectional area of SSP significantly decreased 11.41% from time-zero (immediate repair) to 6 months post-surgery, whereas the Goutallier stage and Thomazeau grade showed no significant changes (p<0.01). Furthermore, compared to the preoperative MRI, the postoperative MRI at 6 months showed a no statistically significant increase of 8.03% in the cross-sectional area. In addition, morphological improvements were observed in patients with high grade Goutallier and Thomazeau at time-zero, whereas morphology of patients with low grade factors were almost similar to before surgery. Conclusions: Our results indicate that cross-sectional area of the initial repair appears to decrease after a few months postoperatively, possibly due to medial retraction or strained muscle.