• Title/Summary/Keyword: Data integrity

Search Result 1,395, Processing Time 0.022 seconds

Effect of a Situational Module Learning Course on Critical Thinking Disposition and Metacognition in Nursing Students: A Quasi-experimental Study (간호대학생의 비판적 사고성향, 메타인지에 대한 상황모듈학습 프로그램 적용 효과)

  • Park, Kwang Ok;Yu, Mi
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.25 no.2
    • /
    • pp.251-262
    • /
    • 2019
  • Purpose: This study aimed to identify the effect of a situational module learning course on critical thinking disposition and metacognition in sophomore nursing students. Methods: This study was a non-equivalent control-group pretest-posttest quasi-experimental design; the participants included 64 nursing students (32 in the experimental and 32 in the control group) from two Korean universities. Critical thinking disposition and metacognition between the control and intervention groups were measured before and after program participation. Data collection was conducted between September 1 and December 15, 2016. An independent t-test was used to determine differences in critical thinking disposition and metacognition between the groups and Pearson's correlations were measured for correlation with critical thinking disposition and metacognition. Results: The intervention group showed higher critical thinking disposition (t=3.16, p=.002); intellectual integrity (t=2.85, p=.006); and open-mindedness (t=3.30, p=.002) relative to those of the control group. However, there were no statistical differences in metacognition between the two groups (t=-0.14, p=.888). A significant positive correlation between metacognition and critical thinking disposition was found. (r=.62, p<.001). Conclusion: The situational module learning course developed in this study could be used to promote critical thinking disposition in nursing students.

Contributions of HO-1-Dependent MAPK to Regulating Intestinal Barrier Disruption

  • Zhang, Zhenling;Zhang, Qiuping;Li, Fang;Xin, Yi;Duan, Zhijun
    • Biomolecules & Therapeutics
    • /
    • v.29 no.2
    • /
    • pp.175-183
    • /
    • 2021
  • The mitogen-activated protein kinase (MAPK) pathway controls intestinal epithelial barrier permeability by regulating tight junctions (TJs) and epithelial cells damage. Heme oxygenase-1 (HO-1) and carbon monoxide (CO) protect the intestinal epithelial barrier function, but the molecular mechanism is not yet clarified. MAPK activation and barrier permeability were studied using monolayers of Caco-2 cells treated with tissue necrosis factor α (TNF-α) transfected with FUGW-HO-1 or pLKO.1-sh-HO-1 plasmid. Intestinal mucosal barrier permeability and MAPK activation were also investigated using carbon tetrachloride (CCl4) administration with CoPP (a HO-1 inducer), ZnPP (a HO-1 inhibitor), CO releasing molecule 2 (CORM-2), or inactived-CORM-2-treated wild-type mice and mice with HO-1 deficiency in intestinal epithelial cells. TNF-α increased epithelial TJ disruption and cleaved caspase-3 expression, induced ERK, p38, and JNK phosphorylation. In addition, HO-1 blocked TNF-α-induced increase in epithelial TJs disruption, cleaved caspase-3 expression, as well as ERK, p38, and JNK phosphorylation in an HO-1-dependent manner. CoPP and CORM-2 directly ameliorated intestinal mucosal injury, attenuated TJ disruption and cleaved caspase-3 expression, and inhibited epithelial ERK, p38, and JNK phosphorylation after chronic CCl4 injection. Conversely, ZnPP completely reversed these effects. Furthermore, mice with intestinal epithelial HO-1 deficient exhibited a robust increase in mucosal TJs disruption, cleaved caspase-3 expression, and MAPKs activation as compared to the control group mice. These data demonstrated that HO-1-dependent MAPK signaling inhibition preserves the intestinal mucosal barrier integrity by abrogating TJ dysregulation and epithelial cell damage. The differential targeting of gut HO-1-MAPK axis leads to improved intestinal disease therapy.

An analysis on the S-boxes of block ciphers in 3GPP (3GPP 블록 암호의 S-box 안전성 분석)

  • 장구영;강주성;이옥연;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.67-75
    • /
    • 2001
  • 3GPP proposed f8 and f9 algorithms based on the block cipher KASUMI to provide the data confidentiality and integrity over a radio access link for IMT-2000(W-CDMA). Also 3GPP proposed Milenage algorithm based on the block cipher Rijndael to provide an example set for 3GPP authentication and key generation functions. In order to analyze the security of 3GPP algorithms, we must go ahead an analysis of security of KASUMI and Rijndael. Since S-box is an important point of security of block cipher, in this paper we analyze the S-boxes of KASUMI and Rijndael and compare the S-boxes of KASUMI with the S-box of Rijndael. Although KASUMI S9-box is bad for AC and SAC, we find that AC of KASUMI FI function containing S7-box and S9-box is equal to AC of Rijndael S-box and SAC of KASUMI FI function is better than SAC of Rijndael S-box.

The design and Implementation of Web Security System using the Cookies (쿠키를 이용한 웹 보안시스템 설계 및 구현)

  • 송기평;박기식;한승희;조인준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.3-14
    • /
    • 2001
  • A Web server makes use of the HTTP(Hyper Text Transfer Protocol) to communicate with a client. The HTTP is a stateless protocol; the server does not maintain any state information for ongoing interactions with the client. Therefore, the HTTP inevitably requires additional overhead as repeating data key-in to user for continuing communications. This overhead in Web environment can be resolved by the cookie technologies. However, the cookie is usually unsecured due to the clear-text to transfer on the network and to store in the file. That is, information in the cookie is easy to exposure, copy, and even change. In this paper, we propose a secure cookie mechanism appropriate to Web environment, and then present a design and implement of secure Web system based on the scheme. The Web system can be used to any web environment. It also provides some security services, such as confidentiality, authentication, integrity.

Message Authentication Code based on k-invertible Matrices (k-역행렬을 이용한 메시지 인증 기법)

  • Lee Hee Jung;Kim Tae Gwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.105-110
    • /
    • 2004
  • MAC is used for data origin authentication or message integrity protection. In Crypto'03 Cary and Venkatesan introduced new MAC based on unimodular matrix groups. It is to encrypt messages using private keys and to encrypt them again using public keys which are matrices whose determinants are $\pm$1. These matrices have property called k-invertible. This k effects on the collision probability of this new MAC. The smaller k is, the less collisions occur. Cary shows 6-invertible matrices, and 10-invertible matrices whose components are only 1, 0, -1. In this paper we figure out sufficient conditions about choosing 4 matrices among special 22 matrices. Also, we introduce 5-invertible matrices whose components are 1, 0, -1. Those have better efficiency and security.

A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack (CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘)

  • Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1057-1068
    • /
    • 2012
  • According to advance on vehicle technology, many kinds of ECU(Electronic Control Unit) are equipped inside the vehicle. In-vehicle communication among ECUs is performed through CAN(Controller Area Networks). CAN have high reliability. However, it has many vulnerabilities because there is not any security mechanism for CAN. Recently, many papers proposed attacks of in-vehicle communication by using these vulnerabilities. In this paper, we propose an wireless attack model using a mobile radio communication network. We propose a secure authentication mechanism for in-vehicle network communication that assure confidentiality and integrity of data packets and also protect in-vehicle communication from the replay attack.

Protective effects of curcumin on chromatin quality, sperm parameters, and apoptosis following testicular torsion-detorsion in mice

  • Shahedi, Abbas;Talebi, Ali Reza;Mirjalili, Aghdas;Pourentezari, Majid
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.48 no.1
    • /
    • pp.27-33
    • /
    • 2021
  • Objective: The chief outcome of testicular torsion in clinical and experimental contexts is testicular ischemia. Curcumin, a compound with anti-inflammatory and antioxidant properties, has fascinated researchers and clinicians for its promise in the treatment of fertility diseases. Methods: Thirty-five fully grown male mice were randomly classified into five groups: control, sham, testicular torsion, treatment group 1 (testicular torsion+short-term curcumin), and treatment group 2 (testicular torsion+long-term curcumin). Thirty-five days later, spermatozoa from the right cauda epididymis were analyzed with regard to count and motility. Toluidine blue (TB), aniline blue (AB), and chromomycin A3 (CMA3) staining assays were used to evaluate the sperm chromatin integrity. In addition, the terminal deoxynucleotidyl transferase-mediated deoxyuridine triphosphate nick-end labeling (TUNEL) test was used to assess apoptosis. Results: Treatment group 1 exhibited a remarkably elevated sperm count compared to the testicular torsion group. Additionally, notably lower sperm motility was found in the testicular torsion group compared to the control, treatment 1, and treatment 2 groups. Staining (CMA3, AB, and TB) and the TUNEL test indicated significantly greater testicular torsion in the torsion group compared to the control group (p<0.05). The data also revealed notably lower results of all sperm chromatin assays and lower apoptosis in both treatment groups relative to the testicular torsion group (p<0.05). Significantly elevated (p<0.05) AB and TB results were noted in treatment group 1 compared to treatment group 2. Conclusion: Curcumin can compensate for the harmful effects of testicular ischemia and improve sperm chromatin quality in mice.

A Study on Implementation of Humane Resource Pool Recruitment system Using Blockchain

  • Lee, Ji-Woon;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.69-78
    • /
    • 2021
  • In this paper, we propose a implementation plan of the human resource pool recruitment system using private (permitted) blockchain. The term Human Resource has become commonly used and has come to recognize human resources as resources. Despite these changes, the use of human resource pools has been sluggish. Once entered, information is often not updated on a regular basis and does not provide sharing, searching, carrier management and anti-counterfeiting. In this research, in order to provide a human resource pool recruitment system that utilizes private (permitted) blockchain, we first used the blockchain network to enable sharing and searching of human resource pools, and to use keywords. Used to get results that meet certain conditions. Second, we added an institutional verification process to ensure the integrity of the input data and prepared preventive measures in the non-technical part by utilizing the structural characteristics of the blockchain to prevent counterfeiting and alteration. Third, we designed and implemented a Dapp (Decentralized application) that includes a Web UI so that each of the three groups can control the blockchain and the predefined processes and business logic.

An Evaluation Management System Using Blockchain

  • Lee, Su-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.229-235
    • /
    • 2021
  • Blockchain, recognized as one of the core technologies of the 4th industrial revolution, is an Internet-based distributed data management system which does not require centralized control. Blockchain is characterized by the integrity and reliability of information, and blockchains can be used where such characteristics are required. Typical applications of blockchain include finance, transaction, and evaluation management. In this paper, we designed a blockchain-based evaluation management system that allows users to freely create and manage evaluation instances. Evaluation managers can create an evaluation instance according to their purpose and allocate evaluation items and evaluators. When the evaluators finish evaluating the evaluation items, the evaluation manager can aggregate the evaluation results for the instance. Someone, who want to perform evaluation for various purposes but do not have an evaluation system, can implement the evaluation system relatively simply by using this system. In addition, due to the characteristic of the blockchain, evaluators cannot modify the evaluation scores they have already recorded, and neither the system administrator nor the evaluation administrator can modify the evaluation scores. For this reason, the reliability of the evaluation increases.

A Design of Blockchain-based LoRa Multi-hop Network for Smart Grid (스마트 그리드를 위한 블록체인 기반 LoRa 멀티홉 네트워크 설계)

  • Jeon, Seongho;Kim, Seungku
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.440-448
    • /
    • 2021
  • This paper presents problems of network technology in smart grid and implements a blockchain-based LoRa multi-hop network to solve them. Since some smart grid applications are operated in harsh environments, it is difficult to establish communication infrastructure. We propose a LoRa network with multi-hop using the Flooding routing protocol. Smart grid environment composes an independent network using various power grid protocols depending on the application. Since this has a problem that an independent infrastructure must be established for each network, a single gateway device supports multiple power grid protocols to implement a method for network integration. Lastly, the author applied Hyperledger-based blockchain to the LoRa network to ensure the integrity of data in a smart grid environment, and strengthened security by physically distributing it. After constructing the three suggestions on the actual test bed, we confirmed that the network operates normally through experiments.