• Title/Summary/Keyword: Dynamic ID

Search Result 109, Processing Time 0.02 seconds

Big Data Processing and Performance Improvement for Ship Trajectory using MapReduce Technique

  • Kim, Kwang-Il;Kim, Joo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.65-70
    • /
    • 2019
  • In recently, ship trajectory data consisting of ship position, speed, course, and so on can be obtained from the Automatic Identification System device with which all ships should be equipped. These data are gathered more than 2GB every day at a crowed sea port and used for analysis of ship traffic statistic and patterns. In this study, we propose a method to process ship trajectory data efficiently with distributed computing resources using MapReduce algorithm. In data preprocessing phase, ship dynamic and static data are integrated into target dataset and filtered out ship trajectory that is not of interest. In mapping phase, we convert ship's position to Geohash code, and assign Geohash and ship MMSI to key and value. In reducing phase, key-value pairs are sorted according to the same key value and counted the ship traffic number in a grid cell. To evaluate the proposed method, we implemented it and compared it with IALA waterway risk assessment program(IWRAP) in their performance. The data processing performance improve 1 to 4 times that of the existing ship trajectory analysis program.

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

Exploring the Potential of Natural Products as FoxO1 Inhibitors: an In Silico Approach

  • Anugya Gupta;Rajesh Haldhar;Vipul Agarwal;Dharmendra Singh Rajput;Kyung-Soo Chun;Sang Beom Han;Vinit Raj;Sangkil Lee
    • Biomolecules & Therapeutics
    • /
    • v.32 no.3
    • /
    • pp.390-398
    • /
    • 2024
  • FoxO1, a member of the Forkhead transcription factor family subgroup O (FoxO), is expressed in a range of cell types and is crucial for various pathophysiological processes, such as apoptosis and inflammation. While FoxO1's roles in multiple diseases have been recognized, the target has remained largely unexplored due to the absence of cost-effective and efficient inhibitors. Therefore, there is a need for natural FoxO1 inhibitors with minimal adverse effects. In this study, docking, MMGBSA, and ADMET analyses were performed to identify natural compounds that exhibit strong binding affinity to FoxO1. The top candidates were then subjected to molecular dynamics (MD) simulations. A natural product library was screened for interaction with FoxO1 (PDB ID-3CO6) using the Glide module of the Schrödinger suite. In silico ADMET profiling was conducted using SwissADME and pkCSM web servers. Binding free energies of the selected compounds were assessed with the Prime-MMGBSA module, while the dynamics of the top hits were analyzed using the Desmond module of the Schrödinger suite. Several natural products demonstrated high docking scores with FoxO1, indicating their potential as FoxO1 inhibitors. Specifically, the docking scores of neochlorogenic acid and fraxin were both below -6.0. These compounds also exhibit favorable drug-like properties, and a 25 ns MD study revealed a stable interaction between fraxin and FoxO1. Our findings highlight the potential of various natural products, particularly fraxin, as effective FoxO1 inhibitors with strong binding affinity, dynamic stability, and suitable ADMET profiles.

Clustering of Smart Meter Big Data Based on KNIME Analytic Platform (KNIME 분석 플랫폼 기반 스마트 미터 빅 데이터 클러스터링)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.13-20
    • /
    • 2020
  • One of the major issues surrounding big data is the availability of massive time-based or telemetry data. Now, the appearance of low cost capture and storage devices has become possible to get very detailed time data to be used for further analysis. Thus, we can use these time data to get more knowledge about the underlying system or to predict future events with higher accuracy. In particular, it is very important to define custom tailored contract offers for many households and businesses having smart meter records and predict the future electricity usage to protect the electricity companies from power shortage or power surplus. It is required to identify a few groups with common electricity behavior to make it worth the creation of customized contract offers. This study suggests big data transformation as a side effect and clustering technique to understand the electricity usage pattern by using the open data related to smart meter and KNIME which is an open source platform for data analytics, providing a user-friendly graphical workbench for the entire analysis process. While the big data components are not open source, they are also available for a trial if required. After importing, cleaning and transforming the smart meter big data, it is possible to interpret each meter data in terms of electricity usage behavior through a dynamic time warping method.

Synthesis and biological evaluation of diagnostic reagent for prostate cancer using copper-64 radioisotope

  • Ahn, Heesu;Kim, Mi Hyun;Han, Sang Jin;Woo, Sang Keun;Kim, Jung Young;Lee, Kyu Chul;Lim, Il Han;Lee, Yong Jin
    • Journal of Radiopharmaceuticals and Molecular Probes
    • /
    • v.4 no.2
    • /
    • pp.65-72
    • /
    • 2018
  • Prostate specific membrane antigen (PSMA) is a cell surface membrane protein, which is overexpressed in most prostate cancer. Recently, PET imaging with $[^{68}Ga]$PSMA-HBED-CC has been widely used for the diagnosis of recurrent prostate cancer and the studies on the diagnostic potential of $^{64}Cu$-labeled PSMA ligands reported actively. In this study, we monitored with biological evaluation in vivo and PET imaging of $^{64}Cu$-labeled PSMA ligand ($[^{64}Cu]$PSMA-617). The radiolabelling efficiency and stability of $[^{64}Cu]$PSMA-617 were confirmed by radio-thin layer chromatography. The radiolabeling efficiency of $[^{64}Cu]$PSMA-617 showed over 95%, and stabilities of intact remained over 98% in both human and mouse serum for 48 h. In normal male mice, in vivo uptake of $[^{64}Cu]$PSMA-617 in several organs was measured at 2, 4, 6, 24, 48 h after injection. Rapid blood clearance was observed for $[^{64}Cu]$PSMA-617. The high uptake was observed in the lung, liver, intestines and kidneys at 2 h postinjection, but was low in the other organs (1-2 %ID/g) at 4 h. The dynamic PET/CT images of 22RV1 tumor-bearing nude mice were acquired during 60 min and additionally acquired 24 h and 48 h after injection. In dynamic PET images, $[^{64}Cu]$PSMA-617 uptake ratio in tumors versus muscle was increased as time elaplsed until 60 minutes and remained in tumors at 48 h. In these results, the PET/CT imaging using $[^{64}Cu]$PSMA-617 in prostate cancer is expected to be useful for the diagnosis and treatment of prostate cancer patients.

Analysis of Holdup Characteristics of Large and Small Bubbles in Three-Phase Fluidized Beds by using a Dynamic Gas Disengagement Method (삼상유동층에서 동력학적 기체유출 측정방법에 의한 큰 기포와 작은 기포의 체류량 특성 해석)

  • Lim, Hyun Oh;Lim, Dae Ho;Seo, Myung Jae;Kang, Yong;Jung, Heon;Lee, Ho Tae
    • Korean Chemical Engineering Research
    • /
    • v.49 no.5
    • /
    • pp.605-610
    • /
    • 2011
  • Phase holdup characteristics of relatively large and small bubbles were investigated in a three-phase(gasliquid-solid) fluidized bed of which diameter was 0.105 m(ID) and 2.5 m in height, respectively. Effects of gas(0.01~0.07 m/s) and liquid velocities(0.01~0.07 m/s) and particle size($0.5{\sim}3.0{\times}10^{-3}m$) on the holdups of relatively large and small bubbles were determined. The holdups of two kinds of bubbles in three phase fluidized beds were estimated by means of static pressure drop method with the knowledge of pressure drops corresponding to each kind of bubble, respectively, which were obtained by dynamic gas disengagement method. Dried and filtered air which was regulated by gas regulator, tap water and glass bead of which density was $2500kg/m^3$ were served as a gas, a liquid and a fluidized solid phase, respectively. The two kinds of bubbles in three-phase fluidized beds, relatively large and small bubbles, were effectively detected and distinguished by measuring the pressure drop variation after stopping the gas and liquid flow into the column as a step function: The increase slope of pressure drop with a variation of elapsed time was quite different from each other. It was found that the holdup of relatively large bubbles increased with increasing gas velocity but decreased with liquid velocity. However, the holdup showed a local minimum with a variation of size of fluidized solid particles. The holdup of relatively small bubbles increased with an increase in the gas velocity or solid particle size, while it decreased slightly with an increase in the liquid velocity. The holdups of two kinds of bubbles were well correlated in terms of operating variables within this experimental conditions, respectively.

Study on WP-IBE compliant Mobile IPSec (WP-IBE 적용 Mobile IPSec 연구)

  • Choi, Cheong Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.11-26
    • /
    • 2013
  • In the wireless Internet, it is so restrictive to use the IPSec. The MIPv4 IPSec's path cannot include wireless links. That is, the IPSec of the wireless Internet cannot protect an entire path of Host-to-Host connection. Also wireless circumstance keeps a path static during the shorter time, nevertheless, the IKE for IPSec SA agreement requires relatively long delay. The certificate management of IPSec PKI security needs too much burden. This means that IPSec of the wireless Internet is so disadvantageous. Our paper is to construct the Mobile IPSec proper to the wireless Internet which provides the host-to-host transport mode service to protect even wireless links as applying excellent WP-IBE scheme. For this, Mobile IPSec requires a dynamic routing over a path with wireless links. FA Forwarding is a routing method for FA to extend the path to a newly formed wireless link. The FA IPSec SA for FA Forwarding is updated to comply the dynamically extended path using Source Routing based Bind Update. To improve the performance of IPSec, we apply efficient and strong future Identity based Weil Pairing Bilinear Elliptic Curve Cryptography called as WP-IBE scheme. Our paper proposes the modified protocols to apply 6 security-related algorithms of WP-IBE into the Mobile IPSec. Particularly we focus on the protocols to be applied to construct ESP Datagram.

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.