• Title/Summary/Keyword: Id-1

Search Result 1,044, Processing Time 0.029 seconds

ON FACTORIZATIONS OF THE SUBGROUPS OF SELF-HOMOTOPY EQUIVALENCES

  • Shi, Yi-Yun;Zhao, Hao
    • Journal of the Korean Mathematical Society
    • /
    • v.45 no.4
    • /
    • pp.1089-1100
    • /
    • 2008
  • For a pointed space X, the subgroups of self-homotopy equivalences $Aut_{\sharp}_N(X)$, $Aut_{\Omega}(X)$, $Aut_*(X)$ and $Aut_{\Sigma}(X)$ are considered, where $Aut_{\sharp}_N(X)$ is the group of all self-homotopy classes f of X such that $f_{\sharp}=id\;:\;{\pi_i}(X){\rightarrow}{\pi_i}(X)$ for all $i{\leq}N{\leq}{\infty}$, $Aut_{\Omega}(X)$ is the group of all the above f such that ${\Omega}f=id;\;Aut_*(X)$ is the group of all self-homotopy classes g of X such that $g_*=id\;:\;H_i(X){\rightarrow}H_i(X)$ for all $i{\leq}{\infty}$, $Aut_{\Sigma}(X)$ is the group of all the above g such that ${\Sigma}g=id$. We will prove that $Aut_{\Omega}(X_1{\times}\cdots{\times}X_n)$ has two factorizations similar to those of $Aut_{\sharp}_N(X_1{\times}\cdots{\times}\;X_n)$ in reference [10], and that $Aut_{\Sigma}(X_1{\vee}\cdots{\vee}X_n)$, $Aut_*(X_1{\vee}\cdots{\vee}X_n)$ also have factorizations being dual to the former two cases respectively.

Identity-based key distribution system and conference key distribution system (ID-Based 키 분비방식 및 회의용 키 분배방식)

  • 손기욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.38-46
    • /
    • 1991
  • This paper pro poses a ley distribution system based on identification information. The system uses an indivdual user's identification instead of the public file used in the Diffie-Hellman sustem. It does not require any services of a center to distribute work keys and users to keep directory public file. We propose an identity-based key distribution system for generating a commom secret conference kdy for two or more users. We assume users are connected in a ring network. Message among users authenticated using each user's identification informa-tion. The security of the our proposed system is based on the difficulty of both factoring large numbers and computing discrete logarithms over large finite fields.

Efficient Decoder Model of FTN Signal for (1+7) PSK Modulation based on DVB-S3 (DVB-S3기반 (1+7)PSK 변조방식에서 FTN 신호의 효율적인 복호 모델)

  • Baek, Chang-Uk;Jung, Ji-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.55-61
    • /
    • 2017
  • In DVB-S3 standard of satellite broadcasting systems, FTN technique is applied to LDPC codes with (1+7) PSK modulation. In standard, BICM-ID and BCJR decoding method are considered to alleviate performance degradation due to FTN processing. BICM-ID method improves performance by calculating a new LLR from hard-decision value of decoder output. BCJR also improves performance by calculating forward and backward matrix each other. However these two methods require high computational complexity. Therefore this paper proposed modified decoding method in order to reduce computational complexity without performance degradation.

A Secure Telemedicine System for Smart Healthcare Service (스마트 헬스케어 서비스를 위한 홍채인식기반의 원격의료시스템)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho;Kim, Min-Kang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.205-214
    • /
    • 2017
  • In this paper, we proposed an iris-based authentication for smart healthcare service in secure telemedicine system. The medical and healthcare information's are very important data in telemedicine system from privacy information. thus, the proposed system provides a secure and convenient authentication method than the traditional ID/PW authentication method to a telemedicine system for age-related chronic diseases. When considering the peculiarities of the use of age-related chronic diseases convenience and healthcare environments, the proposed approach is difficult to secure than traditional ID/PW authentication method with the appropriate means to easily change when stolen or lost to others. In addition, the telemedicine system for the smart healthcare services is one of the types of privacy sensitive medical and health data. it is very important security needs in telemedicine system. Thus we protocol are offer high confidentiality and integrity than existing ID/PW method.

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.

Anti-melanogenic effect of Eruca sativa extract (루꼴라(Eruca sativa) 추출물의 멜라닌 생성 저해 효과)

  • Kim, Hyun-Soo
    • Food Science and Preservation
    • /
    • v.23 no.1
    • /
    • pp.74-79
    • /
    • 2016
  • Eruca sativa (known as rocket plant) is a member of the Brassicaceae, which is considered an important chemo-preventive plant family. Although Eruca sativa has positive biological effects such as antioxidant and renal protective activities, the effect of the Eruca sativa extract as a therapeutic agent for skin whitening has not been reported. In this study, we investigated the applicability of the extract of Eruca sativa as a functional materials by examining the its physiological activities. The Eruca sativa extract showed low cytotoxicity against murine melanoma B16F10 cells. At concentrations (below 100 mg/L) that showed none or little cytotoxicity, the Eruca sativa extract showed high DPPH radical scavenging activity (ID50, 17.60 mg/L). In addition, the Eruca sativa extract inhibited tyrosinase activity ($ID_{50}$, 132.54 mg/L) and decreased melanin content ($ID_{50}$, 158.90 mg/L). Finally, the treatment with the Eruca sativa extract suppressed the protein expression of tyrosinase in a concentration-dependent manner. These findings suggested that the Eruca sativa extract inhibited melanin synthesis by not only suppressing intracellular tyrosinase expression but also directly inhibiting tyrosinase activity. Therefore, these results indicate that the Eruca sativa extract may be an effective material for functional cosmetics such as skin whitening materials.

Development of Nucleic Acid Lateral Flow Immunoassay for Rapid and Accurate Detection of Chikungunya Virus in Indonesia

  • Ajie, Mandala;Pascapurnama, Dyshelly Nurkartika;Prodjosoewojo, Susantina;Kusumawardani, Shinta;Djauhari, Hofiya;Handali, Sukwan;Alisjahbana, Bachti;Chaidir, Lidya
    • Journal of Microbiology and Biotechnology
    • /
    • v.31 no.12
    • /
    • pp.1716-1721
    • /
    • 2021
  • Chikungunya fever is an arboviral disease caused by the Chikungunya virus (CHIKV). The disease has similar clinical manifestations with other acute febrile illnesses which complicates differential diagnosis in low-resource settings. We aimed to develop a rapid test for CHIKV detection based on the nucleic acid lateral flow immunoassay technology. The system consists of a primer set that recognizes the E1 region of the CHIKV genome and test strips in an enclosed cassette which are used to detect amplicons labeled with FITC/biotin. Amplification of the viral genome was done using open-source PCR, a low-cost open-source thermal cycler. Assay performance was evaluated using a panel of RNA isolated from patients' blood with confirmed CHIKV (n = 8) and dengue virus (n = 20) infection. The open-source PCR-NALFIA platform had a limit of detection of 10 RNA copies/ml. The assay had a sensitivity and specificity of 100% (95% CI: 67.56% - 100%) and 100% (95% CI: 83.89% - 100%), respectively, compared to reference standards of any positive virus culture on C6/36 cell lines and/or qRT-PCR. Further evaluation of its performance using a larger sample size may provide important data to extend its usefulness, especially its utilization in the peripheral healthcare facilities with scarce resources and outbreak situations.

A Study On ID-Based Group Signature (신원 정보 기반 그룹 서명)

  • Kim, Dae-Youb;Ju, Hak-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.489-494
    • /
    • 2005
  • In 2002, Shundong Xia proposed a new ID-based group signature scheme with strong separability. The nature of a strong separability is to divide group manager's role into a membership manager and a revocation manager Jianhong et al showed that the scheme was not coalition-resistant. In this letter, we first propose two new attacks, forgery and link attacks, for Xia-You's scheme. We also propose a new ID-based group signature scheme that Is resistant to coalition, forgery and link attacks

One-dimensional Inversion of Electromagnetic Frequency Sounding Data (주파수 수직 전자탐사 자료의 1차원 역산)

  • Cho In-Ky;Lim Jin-Taik
    • Geophysics and Geophysical Exploration
    • /
    • v.6 no.4
    • /
    • pp.180-186
    • /
    • 2003
  • We have developed an one-dimensional (ID) inversion program that can invert multiple frequency small-loop EM data from horizontal coplanar (HCP) and vertical coplanar (VCP) configurations. The inverse problem is solved using least-squares method with active constraint balancing (ACB) method and Jacobian matrix is calculated analytically. Tests using synthetic data from simple ID models indicate that conductivity and depth of each layer can be estimated properly when both real and imaginary data are used together.

Diagnostic Value of the Intradermal Test for the Infection with Clonorchis sinensis (간흡충증 진단을 위한 피내반응검사의 의의)

  • Kim, Jong-Ho;Yun, Bong-Yung;Lee, Heun-Ju;Lee, Hyun-Woo
    • Journal of Yeungnam Medical Science
    • /
    • v.5 no.2
    • /
    • pp.47-52
    • /
    • 1988
  • The intradermal(ID) test has been widely used in Korea and several reports about the results of the ID test are known. We examined the egg of Clonorchis sinensis(C. s.) by ID test in 443, stool's egg-counting technique in 79 and direct smear(cellophane thick smear technique) in 1304 subjects. The results are as follows.: 1. The positive rate of C. s. was 3.8% out of 1304 persons. 2. The sensitivity of ID test was 82.1% out of 39 persons and, the specificity was 64.6% out of 404 persons. 3. The false positive of ID test 35.4% out of 404 persons and, the false negative was 17.9% out of 39 persons. Intradermal test is a rapid, sensitive and useful supplementary diagnostic tool for the detection of Clonorchiasis infection and must be used as screening test with direct smear of stool but cross reaction with other helminth infections and moderate false reaction are the main disadvantages in its practical application.

  • PDF