• Title/Summary/Keyword: ID Based

Search Result 1,083, Processing Time 0.031 seconds

Anti-obesity Effects of Ethanolic Extract of Polygonatum sibiricum Rhizome in High-fat Diet-fed Mice (고지방식이로 비만이 유도된 마우스에서 황정 주정 추출물의 항비만 효과)

  • Ko, Jong-Hee;Jeon, Woo-Jin;Kwon, Hyuk-Sang;Yeon, Seung-Woo;Kang, Jae-Hoon
    • Korean Journal of Food Science and Technology
    • /
    • v.47 no.4
    • /
    • pp.499-503
    • /
    • 2015
  • We investigated the anti-obesity effects of ethanolic extract (ID1216) of Polygonatum sibiricum rhizome and its potential underlying mechanism in an animal model. ID1216 treatment decreased body weight gain and white adipose tissue weight in the prevention study. The mRNA levels of sirtuin-1 (SIRT1), peroxisome proliferator-activated receptor ${\gamma}$ coactivator-$1{\alpha}$ ($PGC1{\alpha}$), and peroxisome proliferator-activated receptor ${\alpha}$ ($PPAR{\alpha}$) significantly increased in the epididymal white adipose tissue of ID1216-administered mice. The stimulation effects of ID1216 on these gene expressions were also observed in a cell-based assay using differentiated 3T3-L1 adipocytes. In addition, similar to orlistat, ID1216 treatment improved weight gain and reduced epididymal fat in the treatment model. These results suggest that ID1216 has potential as an anti-obesity agent by modulating the expression of genes related to thermogenesis, lipid metabolism and fatty acid oxidation.

The blocking channel to reduce the performance decrease using the low correlation with cyclic delay scheme in LED-ID system (LED-ID 시스템에서 채널 차단에 따른 성능 열화를 줄이기 위한 저 상관 순환 지연 기법)

  • Lee, Kyu-Jin;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.319-325
    • /
    • 2015
  • We proposed the blocking channel to reduce the performance decrease using the low correlation with cyclic delay scheme in LED-ID system. LED-ID is based on the visible light to transmit the data. However, It is occurred the block channel by structure or environment of indoor for light of straightness. LED-ID system is degraded the performance by the block channel as loss of data, and burst error. To solve the block channel, the proposed system is overcome the burst error by low correlation among data, which is able to obtain the maximize time diversity gain to improve the performance of BER by cyclic delay scheme. The BER performance is evaluated by computer simulation according to channel parameter. The simulation results shows that proposed system gives much better performance than conventional system and constant cyclic delay scheme system.

Efficient Digital Signal Processing of DTV TxID Based On Decimation Algorithm (Decimation 알고리즘을 이용한 DTV TxID수신 신호의 효율적인 신호처리 기법에 관한 연구)

  • Son, Ju-Hee;Lee, Yong-Tae;Park, Sung-Ik;Kim, Heung-Mook;Seo, Jae-Hyun;Lee, Jae-Young;Cha, Jae-Sang
    • Journal of Broadcast Engineering
    • /
    • v.12 no.3
    • /
    • pp.266-277
    • /
    • 2007
  • Recently, Transmitter Identification(TxID) technology has been issued as a technology of ATSC DTV. ATSC DTV networks are comprised of a plurality of transmitters, broadcasting the same signal sing one frequency network(SFN) connected to EDOCR. In this single frequency network, TxID technology has been recognized as a technology in the ATSC DTV system since it enables the broadcast authorities and classify multiple transmitters. However, conventional TxID uses extremely long spreading sequence to identifying transmitters, so it increases H/W complexity and registers. Thus, to solve those hardware problems, we propose an efficient signal processing technology using decimation algorithm. Furthermore, we certified the availability of the proposed algorithm via various simulations.

Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System (검색 정보 사전 동기화를 이용한 저비용 RFID 인증 방식)

  • Ha, Jae-Cheol;Park, Jea-Hoon;Ha, Jung-Hoon;Kim, Hwan-Koo;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.77-87
    • /
    • 2008
  • Recently, many hash-based authentication protocols were presented to guarantee mutual authentication between tag and DB in RFID system. To be suitable for distributed DB environment, one generally uses fixed constant value as a tag ID. However, some existing protocols have security flaws or heavy computational loads in DB in order to search a tag ID. We propose a secure authentication protocol which is suitable for distributed DB environment by using unchangeable tag ID. The storage method of pre-synchronized information in DB at previous session is core idea of our proposal which gives low-cost ID search of DB at next session. In normal synchronization state, our protocol only requires 3 hash operations in tag and DB respectively.

Implementation and Utilization of Decentralized Identity-Based Mobile Student ID (분산 ID 기반 모바일 학생증 구현과 활용)

  • Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1115-1126
    • /
    • 2021
  • In this paper, we developed a mobile student ID providing a self sovereignty identity (SSI) which replaces the conventional plastic-type student ID that includes private information of a student such as a name, a student number, a facial photo, etc. The implemented mobile student ID solves the problem of exposing student's identity due to a loss or a theft of a plastic-type student ID, and it has a structure and process of FRANCHISE model which is developed by a concept of a decentralized Identity(DID) of a Blockchain, in which specialized for convenience as an electronic student ID through an application on a smart phone device. In addition, it protects student's privacy by controlling personal information on oneself. By using a smartphone, not only it easily identifies the student but also it expands to several services such as participation in school events, online authentication, and a student's exchange program among colleges.

VLC-based ESL system design for interference avoidance in 2.4GHz ISM band (2.4GHz ISM 대역의 간섭회피를 위한 VLC 기반 ESL 시스템 설계)

  • Lee, Sang-gwon;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.636-637
    • /
    • 2018
  • The electronic shelf label(ESL) system based on wireless communication can reduce waste of disposable paper, reduce labor force and update real time information. However, the environment in which a large number of ESL modules are installed is exposed to interference from radio frequency(RF) communications in the Industry-Science-Medical(ISM) band. In this paper, we propose an ESL system based on visible light communication to avoid congestion of ESL system using ISM band. In the proposed system, the goods information and ID transmitted from the administrator server are transmitted in the ESL Tag, and the ESL Tag identifies the ID and displays the product information. Experiments show that ESL system using visible light communication is possible.

  • PDF

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

An Efficient Certificateless Public Key Encryption Scheme (인증서 기반이 아닌 효율적인 공개키 암호화 기법)

  • 이영란;이향숙
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.165-176
    • /
    • 2004
  • Al-Riyami and Paterson$^{[1]}$ suggested the new public key paradigm which is called the certificateless public key system. This system takes the advantages of both traditional PKC and ID-based PKC. It does not require the use of certificates of the public key and does not have the key escrow problem caused from the ID-based cryptosystem. In this paper, we propose an efficient certificateless public key encryption scheme which satisfies mutual authentication. The security of our protocol is based on the hardness of two problems; the computational Diffie-Hellman problem(CDHP) and the bilinear Diffie-Hellman problem(BDHP). We also give a formal security model for both confidentiality and unforgeability, and then show that our scheme is probably secure in the random oracle model.

Design of Secure ID-based Micro-Payment Protocol (안정한 ID 기반의 소액 지불 프로토콜 설계)

  • 김석매;이현주;이충세
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.433-435
    • /
    • 2004
  • 무선 환경에서의 전자상거래가 빠르게 성장함에 따라 종단간 보안이 필요하다. 기존 WTLS를 사용하는 WPP 프로토콜에서는 종단간 사용자 안전성을 보장하고 있지 않다. 이 논문에서는 AIP 프로토콜에서 사용자와 서비스 제공자간에 종단간 안전성이 제공되는 무선 인터넷 플랫폼에 독립적인 소액지불 프로토콜을 제안한다. 또한 인증기관이 인증과정에 참여할 경우 ID 기반 공개키 암호 시스템을 적용한 세션키를 생성하여 제안 프로토콜의 안전성 및 효율성을 분석한다.

  • PDF

Secure Routing Protocol for Ad hoc Networks using ID Based Cryptosystem (ID 기반 암호시스템을 이용한 이동적응망에서의 안전한 라우팅 프로토콜)

  • 이윤호;김희열;정병천;이재원;윤현수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.242-244
    • /
    • 2003
  • 이동적응망에서의 안전하고 신뢰성있는 통신을 위하여 안전한 라우팅 프로토콜은 필수적이다. 본 논문에서는 안전한 라우팅 프로토콜을 제안한다. 제안 프로토콜은 기존의 프로토콜과는 달리 ID 기반 암호시스템을 사용하여 전체 경로길이에 관계없이 상수개의 암호학적 인자로서 경로상의 모든 단말의 인증이 가능하며, 이에 따라 경로 발견 과정시 소모되는 네트워크 자원의 양이 이전보다 감소하게 되는 장점이 있다.

  • PDF