• Title/Summary/Keyword: Gateway System

Search Result 745, Processing Time 0.024 seconds

Astaxanthin Biosynthesis in Transgenic Arabidopsis by Using Chyb Gene Encoding β-Carotene Hydroxylase (β-Carotene Hydroxylase 관련 Chyb 유전자를 이용한 형질전환 Arabidopsis에서 Astaxanthin의 생합성)

  • Lee, Ho-Jae;Kang, Kwon-Kyoo
    • Journal of Plant Biotechnology
    • /
    • v.31 no.3
    • /
    • pp.231-237
    • /
    • 2004
  • Oxycarotenoids are oxygenated carotenoids that perform critical roles in plants. $\beta$-Carotene hydroxylase adds hydroxyl groups to the $\beta$-rings of carotenes and has been cloned from several bacteria and plants including Arabidopsis. This study was carried out to investigate the effect of $\beta$-carotene hydroxylase gene (Chyb) on the oxycarotenoids biosynthesis in the transgenic Arabidopsis. Construct of pGCHYB containing Chyb was established onto Gateway vector system (pENTR3C gateway vector and pH2GW7 destination vector). Arabidopsis thaliana (cv. Columbia) was transformed with Agrobacterium tumerfacience GV3101 harboring pGCHYB construct driven by 35S promoter and hygromycin resistant gene. Seven hundred bases paired PCR products, indicating the presence of Chyb gene, were found in the transformants by PCR analysis using Chyb primers. Hygromycin resistance assay showed that transgenes were stably inherited to next generation. The overexpression of the Chyb gene resulted in the decrease carotenoid content. Especially, astaxanthin unusual oxycarotenoid in wild type Arabidopsis was detected in the transgenic plants. This means that decreased carotenoids might be converted into astaxanthin metabolism with the aid of silent gene in the host.

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

Algebraic Formal Specification and Formal Validation of the Standard and an Implementation of the OSPF Protocol (OSPF Protocol 표준 및 구현의 대수 정형적 명세 및 정형적 검증)

  • 박재현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.360-374
    • /
    • 2004
  • The OSPF protocol is the most widely used Interior Gateway Routing Protocol. Therefore, for the reliability of behavior of gigabit swiching routers, it is essential to guarantee the interoperability and the safety of the OSPF protocol. In this paper, we analyze the standard document of the OSPF protocol, so that we provide a formal specification that specifies the protocol behaviors by detailed design level using the algebraic formal method. By referring available source codes of the OSPF protocol, we supplement the formal specification to express more detailed behaviors that is not specified definitely in the standard. We also formally verify the interoperability and the safety of the protocol state machine of the specification. By showing that the formal specification specify all of the states and the transition events that appear in the standard document of the OSPF protocol, we prove that the state machine has the completeness, and prove it has the interoperability. To prove that the specification of the protocol has the safety, we formally verify the reachability, the liveness, the livelock-free property, and the deadlock-free property. As a result, we prove the protocol has the consistency. The specification and the validation are also effective to the OSPF Version 3 that inherit the protocol mechanism of the OSPF Version 2.

A Name-based Service Discovering Mechanism for Efficient Service Delivery in IoT (IoT에서 효율적인 서비스 제공을 위한 이름 기반 서비스 탐색 메커니즘)

  • Cho, Kuk-Hyun;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.46-54
    • /
    • 2018
  • The Internet of Things (IoT) is an environment in which various devices provide services to users through communications. Because of the nature of the IoT, data are stored and distributed in heterogeneous information systems. In this situation, IoT end applications should be able to access data without having information on where the data are or what the type of storage is. This mechanism is called Service Discovery (SD). However, some problems arise, since the current SD architectures search for data in physical devices. First, turnaround time increases from searching for services based on physical location. Second, there is a need for a data structure to manage devices and services separately. These increase the administrator's service configuration complexity. As a result, the device-oriented SD structure is not suitable to the IoT. Therefore, we propose an SD structure called Name-based Service-centric Service Discovery (NSSD). NSSD provides name-based centralized SD and uses the IoT edge gateway as a cache server to speed up service discovery. Simulation results show that NSSD provides about twice the improvement in average turnaround time, compared to existing domain name system and distributed hash table SD architectures.

Development of Integrated Wireless Sensor Network Device with Mold for Measurement of Concrete Temperature (콘크리트 온도 측정을 위한 거푸집 일체형 무선센서네트워크 장치 개발)

  • Lee, Sung Bok;Park, Seong Sik
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.16 no.5
    • /
    • pp.129-136
    • /
    • 2012
  • Temperature of fresh concrete can be effectively used to predict the strength of concrete being cured and make an informed decision for stripping the molds. A hygrothermograph and thermo-couple sensors that require an extensive wiring have been applied to measure a temperature of concrete at the early stage of the curing process on site. However, these methods have limits to provide the temperature data in real time due to harsh working environment including frequent cutting of wires. Therefore, this study is aiming at developing a device based on wireless sensor network to measure the temperature of concrete being cured in formwork. The result showed that the wireless sensor with probe type thermistor which is developed had the same temperature data compared to the existed wire type thermistor, and we confirmed the temperature history of concrete in real time for 28 days throughout the gateway by wireless network that collects the temperature data measured from specimens in laboratory. Also, the network device for transmission can be easily separated from the probe sensor part and reused consistently. If the wireless sensor network device developed uses in the field, the temperature management of concrete will be systematically conducted from at the early stage of the curing, and especially be effective for cold weather concrete construction. In addition, it will contribute to the establishment of advanced quality control system for concrete and productivity of supervisors on site will be increased in the future.

Planning the Redesign of Inner Harbor by Comparative Analysis and Typological Approach (내항 입지의 비교분석과 유형화를 통한 재개발 방향 모색)

  • Kim, Ju-Il
    • Journal of Navigation and Port Research
    • /
    • v.42 no.6
    • /
    • pp.491-500
    • /
    • 2018
  • Due to changes in the distribution industry, inner harbors have been on a sharp decline in the recent past. However, through the application of the right development plans, such harbors can be revitalized into vibrant urban areas again. The importance of inner harbors has been recognized by the relevant authorities in Korea which are now pushing forward with redevelopment plans for its inner harbors. This study proposes a new approach to redevelopment plans based on the recognition that inner harbors have unique characteristics involving both inland areas and the ocean. In the study, representative inner harbors were selected and analyzed comparatively according to two distinct concepts of location: the Gateway Concept and the Central Place Concept. Based on these concepts, the conditions of the inner harbors were examined. Their location can be typed, and development directions were proposed according to their types and conditions. However, difficult points such as isolation and separation between an urban district and the harbor area, can be obstructions to their potential revival. An inner harbor needs to be considered as an intermediary, connecting place between the ocean and the city, not as another ordinary development area. In addition, a redevelopment plan should be accompanied by a strategic viewpoint to make the most of this feature.

Design and Implementation Middleware of the Home Network based PLC (PLC 기반의 홈 네트워크 미들웨어 설계 및 구현)

  • Jean, Byoung-Chan;Kim, Hyeock-Jin;Kim, Dong-Kyun
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2008
  • Home network service, which is a part of Ubiquitous application service provides remote control and monitoring service, other appliance and peristaltic service, security service of appliance is connected to network in the home. <중략> By using gateway which is implemented undertook control of each function and using main server for controlling and monitoring of appliance, implemented system which is able to control the appliance in home from inter/outside is implemented.

  • PDF

Implementation of TMN Agent for ATM switch : considering integration of agent into ATM switch (ATM 교환기를 위한 TMN 관리 대행 시스템의 구현)

  • 황희산;이병윤;이길행;우왕돈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.5
    • /
    • pp.1360-1371
    • /
    • 1998
  • There are many implementation methods according to models integrating TMN Agent into an ATM switch. In this paper, we evaluate the integrating models for integrating the Agent into an ATM switch in the aspects of the size of MIB(Management Information Base), the internal protocol profiles and the facility of implementation. Based on the evaluation, we choose an integrating model and implment the Agent. To ensure merit of the model, we propose an interface for exchanging management information between the Agent and an ATM switch. We also show the feasibility of our Agent system through some filed testes for the average processing time.

  • PDF

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

NAT-PT Operation for IPv4 and IPv6 Nodes to Coexist (IPv4와 IPv6의 연동과 호환을 위한 NAT-PT에 관한 연구)

  • 이승민;민상원;김용진;박수홍
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.532-534
    • /
    • 2000
  • IPv4(Internet Protocol version 4)의 차세대 버전인 IPv6는 기존 IPv4의 문제점인 주소부족 및 새로운 부가기능 등의 필요성 때문에 IETF(Internet Engineering Task Force)에서 IPv4를 대체하기 위해 개발한 프로토콜이다. 하지만 IPv4를 어느 한순간에 IPv6로 대체하는 것은 불가능하기 때문에 기존 IPv4와의 호환 및 연동을 위한 터널링 및 기타 여러 가지 transition mechanism들이 고려되고 있다. 이러한 mechanism들 중에서 최근 표준으로 발표된 NAT-PT(Network Address Translation $\square$ Protocol Translation)는 DNS-ALG (Domain Name System $\square$ Application Level Gateway)라는 개념을 도입하여 IPv4와 IPv6간의 양방향 주소변환 및 프로토콜 변환기능을 수행한다. 각각의 기능에서 주소 변환은 주소크기와 형식이 다른 IPv4와 Pv6간의 서로 상대 노드를 엑세스할 수 있도록 하고 프로토콜 변환은 다른 버전의 프로토콜을 사용하는 노드들이 상대노드가 보낸 패킷의 헤더정보를 이해할 수 있도록 한다. 그리고 이러한 기본적인 변환 외에 헤더정보의 정확한 전달을 위해서는 기존의 path MTU(Maximum Transgfer Unit) discovery 그리고 pseudo header checksum 등도 고려되어야 한다.

  • PDF