• Title/Summary/Keyword: Key chain

Search Result 799, Processing Time 0.025 seconds

Comparative study of thermal gelation properties and molecular forces of actomyosin extracted from normal and pale, soft and exudative-like chicken breast meat

  • Li, Ke;Liu, Jun-Ya;Fu, Lei;Zhao, Ying-Ying;Bai, Yan-Hong
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.32 no.5
    • /
    • pp.721-733
    • /
    • 2019
  • Objective: The objectives of this study were to investigate the thermal gelation properties and molecular forces of actomyosin extracted from two classes of chicken breast meat qualities (normal and pale, soft and exudative [PSE]-like) during heating process to further improve the understanding of the variations of functional properties between normal and PSE-like chicken breast meat. Methods: Actomyosin was extracted from normal and PSE-like chicken breast meat and the gel strength, water-holding capacity (WHC), protein loss, particle size and distribution, dynamic rheology and protein thermal stability were determined, then turbidity, active sulfhydryl group contents, hydrophobicity and molecular forces during thermal-induced gelling formation were comparatively studied. Results: Sodium dodecyl sulphate-polyacrylamide gel electrophoresis showed that protein profiles of actomyosin extracted from normal and PSE-like meat were not significantly different (p>0.05). Compared with normal actomyosin, PSE-like actomyosin had lower gel strength, WHC, particle size, less protein content involved in thermal gelation forming (p<0.05), and reduced onset temperature ($T_o$), thermal transition temperature ($T_d$), storage modulus (G') and loss modulus (G"). The turbidity, reactive sulfhydryl group of PSE-like actomyosin were higher when heated from $40^{\circ}C$ to $60^{\circ}C$. Further heating to $80^{\circ}C$ had lower transition from reactive sulfhydryl group into a disulfide bond and surface hydrophobicity. Molecular forces showed that hydrophobic interaction was the main force for heat-induced gel formation while both ionic and hydrogen bonds were different significantly between normal and PSE-like actomyosin (p<0.05). Conclusion: These changes in chemical groups and inter-molecular bonds affected protein-protein interaction and protein-water interaction and contributed to the inferior thermal gelation properties of PSE-like meat.

Study of Reading Rate & Small UHF RFID Tags in The Key Management System in a Metallic Cabinet (작은 UHF RFID를 이용한 열쇠관리용 철재캐비닛 시스템과 인식률에 관한 연구)

  • Chung, You-Chung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.263-268
    • /
    • 2010
  • This paper shows the key management system in a small metallic cabinet using a small UHF RFID tags. Each key chain with a key has a custom-designed small RFID tag antenna. There are 6 metallic racks in the small cabinet, and each rack can hold 60 key chains. Therefore, the small cabinet can hold 360 key chains with tags. The 360 key chains with RFID tags in a cabinet are recognized by RFID key chain management system. Even though it is hard to recognize 360 tags in the a cabinet, this RFID key management system with small custom designed RFID tags can recognize all the tags in the small cabinet. To read the all the tags, the locations of antennas and tag shapes are optimized. The reading rates based on the bios-version of the reader and the locations of the reader antennas are compared.

A Key Pre-distribution Scheme Using Double Hash Chain for Strong Security Strength of Wireless Sensor Node (무선 센서 노드의 강한 보안 강도를 위해 이중 해쉬 체인을 적용한 키 사전 분배 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8C
    • /
    • pp.633-641
    • /
    • 2008
  • Since WSNs encounter attacks, such as jamming or eavesdropping without physical access occurs, security is one of the important requirements for WSNs. The key pre-distribution scheme that was recently researched for advance of security in WSNs distributes the keys and probability with the use of q-composite random key pre-distribution method, but there is a high probability that no key shared between sensor nodes, and it takes a lot of time and energy to find out the shared key. Therefore, it is not suitable for WSNs. In order to enhance stability of a node that plays a role of gateway without depending on probabilistic key, this paper proposesa key pre-distribution scheme combined with random key pre-distribution scheme and double hash chain. Since the proposed scheme can maintain a small storage place and strong security strengths, it is more efficient than the existing schemes with the same security strengths. In addition, since it uses a small size of key generation key set, it can reduce a great deal of storage overhead.

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

A Review of Current Status and Analysis in Supply Chain Modeling (공급사슬 모델링의 현황 및 분석에 관한 고찰)

  • Kang, Kyung Hwan;Lee, ByungKi;Lee, Young Hoon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.30 no.3
    • /
    • pp.224-240
    • /
    • 2004
  • Supply chain management(SCM) has been recognized as a major strategy in today's market place. A growing number of researchers have begun to realize the strategic importance of model construction, planning, controlling and operation for SCM. Also various researches of supply chain model building are going on. In this paper, we synthesis key elements of supply chain model such as performance factors, decision variables and constraints. We have reviewed past and present supply chain models and then analyzed those in view of environment factors, operations, solution approaches.

A Study on Possibility of International Trade by using of Block Chain (국제 무역거래에서 블록체인의 활용 가능성에 관한 연구)

  • KIM, Jae-Seong;LIM, Sung-Chul
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.75
    • /
    • pp.137-158
    • /
    • 2017
  • Traditional banking systems of transactions are being replaced by FfinTech. Block Chain System can be a key point in Fourth Industrial Revolution such as AI, Big Data, IOT and also can be used as a tools of smart contract or smart payment systems in International Trade. If banking regulation is to be liberalized FinTech would be more activated in Korea and various attempts would be available especially smart payment in business. There are so many levels to be achieved from the time of contract to the time of clearance. We cannot expect speed and range of IT advancement and international trade, Block Chain system will challenge the traditional banking process. First, Block Chain Payment system can be used in P2P, B2B transaction and also T/T in small business. Second, Bit Coin transaction can be available within the parties without the Trusted Third Party. Third, By using of Block Chain system Traditional International Trade process can be altered.

  • PDF

Policy Safety Stock Cost Optimization : Xerox Consumable Supply Chain Case Study (정책적 안전재고의 비용 최적화 : 제록스 소모품 유통공급망 사례연구)

  • Suh, Eun Suk
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.5
    • /
    • pp.511-520
    • /
    • 2015
  • Inventory, cost, and the level of service are three interrelated key metrics that most supply chain organizations are striving to optimize. One way to achieve this goal is to create a simulation model to conduct sensitivity analysis and optimization on several different supply chain policies that can be implemented in actual operation. In this paper, a case of Xerox global supply chain modeling and analysis to assess several "what if" scenarios for the consumable policy safety stock is presented. The simulation model, combined with analytical cost model and optimization module, is used to optimize the policy safety stock level to achieve the lowest total value chain cost. It was shown quantitatively that the policy safety stock can be reduced, but it is offset by the inbound premium transportation cost to expedite supplies in shortage, and the outbound premium transportation cost to send supplies to customers via express shipment, requiring fine balance.

The Mediation Effect of Collaboration on Supply Chain Performance: Mobile Networks Industry in Korea (공급사슬과 성과에 대한 협업의 매개효과에 관한 연구: 이동통신산업의 구매사-공급사를 중심으로)

  • Kim, Chul-Soo;Seo, Chang-Soo
    • Asia pacific journal of information systems
    • /
    • v.16 no.3
    • /
    • pp.1-27
    • /
    • 2006
  • In supply chains, collaboration between buyer and supplier can improve firms' ability of supply chains to their objectives and competitive advantages. A key factor in collaboration in supply chain is to identify buyer relationships and supply relationships as antecedents of the factor collaboration. We analyzed data collected from buyers and suppliers sampled from a mobile networks industry in Korea and found that the level of collaboration comes from strong relationships between two parties and the collaboration enhances the supply chain performances. However, buyer relationships and supplier relationships have indirect impacts on trading partners' performance through collaboration whereas both have direct impacts on one's performance. Therefore to enhance supply chain performances, supplier's operational efficiency and buyer satisfaction, firms of buyers and suppliers should consider pursuing practical and substantial collaboration along with buyer-supplier relationships.

Towards a small language model powered chain-of-reasoning for open-domain question answering

  • Jihyeon Roh;Minho Kim;Kyoungman Bae
    • ETRI Journal
    • /
    • v.46 no.1
    • /
    • pp.11-21
    • /
    • 2024
  • We focus on open-domain question-answering tasks that involve a chain-of-reasoning, which are primarily implemented using large language models. With an emphasis on cost-effectiveness, we designed EffiChainQA, an architecture centered on the use of small language models. We employed a retrieval-based language model to address the limitations of large language models, such as the hallucination issue and the lack of updated knowledge. To enhance reasoning capabilities, we introduced a question decomposer that leverages a generative language model and serves as a key component in the chain-of-reasoning process. To generate training data for our question decomposer, we leveraged ChatGPT, which is known for its data augmentation ability. Comprehensive experiments were conducted using the HotpotQA dataset. Our method outperformed several established approaches, including the Chain-of-Thoughts approach, which is based on large language models. Moreover, our results are on par with those of state-of-the-art Retrieve-then-Read methods that utilize large language models.

Improvements of a Group key Management based on (2,2) Secret Sharing

  • Yong, Seunglim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.73-78
    • /
    • 2016
  • In 2014, Wuu et al. proposed a group key management scheme based on (2,2) secret sharing. They asserted that their scheme satisfies security requirements and mutual authentication. But this paper pointed out that their scheme does not satisfy mutual authentication and impersonating attack. In this paper, we describe the reasons and processes that a malicious group member can impersonate the Group Key Distributor. To fill the gaps, we discuss the problems, and propose an improved protocol.