• Title/Summary/Keyword: Service identity

Search Result 524, Processing Time 0.028 seconds

Identification of chromosomal translocation causing inactivation of the gene encoding anthocyanidin synthase in white pomegranate (Punica granatum L.) and development of a molecular marker for genotypic selection of fruit colors

  • Jeong, Hyeon-ju;Park, Moon-Young;Kim, Sunggil
    • Horticulture, Environment, and Biotechnology : HEB
    • /
    • v.59 no.6
    • /
    • pp.857-864
    • /
    • 2018
  • Previous studies have not detected transcripts of the gene encoding anthocyanidin synthase (ANS) in white pomegranates (Punica granatum L.) and suggest that a large-sized insertion in the coding region of the ANS gene might be the causal mutation. To elucidate the identity of the putative insertion, 3887-bp 5' and 3392-bp 3' partial sequences of the insertion site were obtained by genome walking and a gene coding for an expansin-like protein was identified in these genome-walked sequences. An identical protein (GenBank accession OWM71963) isolated from pomegranate was identified from BLAST search. Based on information of OWM71963, a 5.8-Mb scaffold sequence with genes coding for the expansin-like protein and ANS were identified. The scaffold sequence assembled from a red pomegranate cultivar also contained all genome-walked sequences. Analysis of positions and orientations of these genes and genome-walked sequences revealed that the 27,786-bp region, including the 88-bp 5' partial sequences of the ANS gene, might be translocated into an approximately 22-kb upstream region in an inverted orientation. Borders of the translocated region were confirmed by PCR amplification and sequencing. Based on the translocation mutation, a simple PCR codominant marker was developed for efficient genotyping of the ANS gene. This molecular marker could serve as a useful tool for selecting desirable plants at young seedling stages in pomegranate breeding programs.

Design Flaws and Cryptanalysis of Cui et al's User Authentication Scheme

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.41-48
    • /
    • 2019
  • In 2018, Cui et al proposed a three-factor remote user authentication scheme using biometrics. Cui et al claimed that their authentication scheme is vulnerable to eavesdropping attack, stolen smart card attack, and especially Dos(denial-of-service) attack. Also they claimed that it is safe to password guessing attack, impersonation attack, and anonymity attack. In this paper, however, we analyze Cui et al's authentication scheme and show that it is vulnerable to replay attack, insider attack, stolen smart card attack, and user impersonation attack, etc. In addition, we present the design flaws in Cui et al's authentication scheme as well.

A Study on Anonymous Authorization based on Short Group Signatures (짧은 그룹 서명 기법 기반의 익명 인가에 대한 연구)

  • Shin, Soo-Yeon;Kwon, Tae-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.11-26
    • /
    • 2011
  • The existing anonymous authentication schemes based on group signatures for protecting privacy do not provide anonymous authorization which is required in the practical environments. In this paper, we propose an anonymous authentication and authorization scheme that enables a service provider both to authenticate anonymously its users and to provide different service according to their authorization. In the proposed scheme, a user's real identity, anonymity and authorization are managed distinctly through the separation of group manager's capabilities and an authorization authority. It is also possible for the proposed scheme to apply various access control models.

Pricing Strategy within the U.S. Streaming Services Market: A Focus on Netflix's Price Plans

  • Kweon, Heaji J;Kweon, Sang Hee
    • International Journal of Contents
    • /
    • v.17 no.2
    • /
    • pp.1-8
    • /
    • 2021
  • Online streaming wars are intensifying. Netflix is known as the market leader in the streaming business. However, since 2019, Netflix has been losing subscribers in the United States and is at a turning point where it needs to reassess its current position in the market. While Netflix is losing dominance, rivals Amazon Prime and Hulu continue to gain market shares. Studies from Deloitte and PricewaterhouseCoopers indicated a new shift in the streaming landscape caused by the abundance of streaming options and rising subscription costs. Recent surveys showed that consumers are excited about new streaming services, such as Disney +. Nearly two-thirds of consumers intend to terminate or downgrade one or more of their current subscriptions to make room for a new service. Moreover, it seems that consumers want ad-supported options. In Deloitte's latest Digital Media Trends survey, 65% responded that they would watch ads to eliminate or reduce subscription costs. Seventy percent of Hulu's subscribers choose its lower-priced ad-supported plan. NBC recently launched its own streaming service, Peacock, with a free ad-supported option. This opposes Netflix's brand identity of "no ads" and premium differentiation. With increasing pressure from competition and the growing risk of subscriber loss, Netflix needs to diversify its price plans. The company could try implementing the lower-priced mobile-only plan they are currently testing or plan to test in other regions. Netflix should also consider features or benefits for loyal subscribers to maintain a stronger consumer base.

An exploratory study on practice-oriented reconceptualization of self-sufficiency : Service providers' reflections on their own experiences from the field (현장의 시각으로부터 구조화된 자활 개념 탐색 연구 : 자활사업 실무자의 이해를 중심으로)

  • Choi, Sangmi;Hong, Song-Iee
    • Korean Journal of Social Welfare Studies
    • /
    • v.49 no.3
    • /
    • pp.5-33
    • /
    • 2018
  • A self-sufficiency service has worked as a typical workfare policy combined with public assistance in Korea since 2000. Despite of its long history, three core pillars in administrating the self-sufficiency service, policy, research, and practice, have respectively understood the meaning of self-sufficiency in terms of their own interests. As a result, the self-sufficiency service has recently faced with its own identity issues by showing failures to its environmental changes. The current situation makes it necessary to reconceptualize the definition of self-sufficiency by exploring its in-depth understanding perceived by service providers. Specifically, we analyzed practical reflections on 35 service providers' experiences which were collected via focus group interviews for two hours. The study findings presented that service providers had two antithetical approaches towards self-sufficiency. While a dominant approach to self-sufficiency has been concentrated on improving clients' economic outcomes such as employment, job retention, the escape from welfare trap, and increasing earnings and assets, the other approach has been extended to empower clients and achieve their well-being and quality of life. Yet, these contrary perspectives have led to suffer from their role confusions and identity crisis between the work-ready process and the employment-oriented outcomes. Specifically, they described self-sufficiency in terms of psychological, social, and integrated aspects. The psychological aspect included a process of developing inner strengths, intensifying job motivation, and coping with barriers of employment. The social aspect meant a path toward social integration through recovering human relationships. The integrated aspect covered more comprehensive support for their recovery of daily life and autonomy to make a decision for their own life. In conclusion, the study findings suggest that self-sufficiency should be more extensively considered as a stepwise process towards work-ready preparations beyond ultimate economic outcomes. Such an extended concept of self-sufficiency could contribute to restructuring the whole practice of self-sufficiency including organizational and program changes in the fields.

A Study on the Advocacy System for Service User in Social Welfare (사회복지에서의 이용자 지원을 위한 권리옹호(Advocacy) 시스템에 대한 고찰)

  • Lee, Myoung-Hyun
    • Korean Journal of Social Welfare
    • /
    • v.56 no.2
    • /
    • pp.29-52
    • /
    • 2004
  • Social welfare has transformed from a provider-centered welfare into a user-centered welfare. This trend have to increase the right to welfare and convenience for users. If the goal of social welfare guaranteed the respecting man's life and dignity, we had not regarded service users as the weak in the welfare system. The reinforcement of service users as the reconfirmation of welfare user's identity, mistreatment and violation of another's rights, self-determination must have the advocacy system. The advocacy for social welfare is the activity for benefit of individual, group, and community, and, protection, guarantee and maintenance of client's right. However, the client is hard to realization of right. therefore We have to support the activity for advocacy. The advocacy take aim the basic need of life and need the system for life support and safeguard client's rights. The mission of the advocacy for welfare service user is to advance the dignity, equality, self-determination, and expressed choices of individuals. We promote, expand, protect and seek to ensure the human and legal rights of individuals through the provision of information and advocacy. The advocacy system will carry out this mission in partnership with welfare service users. The goals for the advocacy system are organized into the following focus areas, which are not listed in order of priority: the majority guardian system and the support activity for service users, a predicament solution activity, service assessment, informed concent system.

  • PDF

A Study on Trade Barriers Analysis in the Chinese Audiovisual Service Sectors (중국 시청각서비스분야 통상장벽 분석과 진출 전략 : AHP와 Fuzzy 신뢰도 지수를 이용하여)

  • Jung, Sang-Chul;Rhee, Hae-Chun
    • Review of Culture and Economy
    • /
    • v.17 no.2
    • /
    • pp.63-80
    • /
    • 2014
  • This study evaluates the importance of negotiation agendas and the possibility of reaching the Korea-China FTA agreement. It assesses the current situation of trade barriers in the audiovisual service sector of China and then examines a survey of practitioners and experts to screen important regulations. The results are as follows: First, considering the national economic situation in Korea and the environment of the Chinese trade barrier, an important agenda is to enable the direct service of online games and to reach a co-production agreement in the audiovisual service sector. Second, an agenda regarding the co-production agreement of an audio-visual service sector has high potential to be realized, followed by agendas regarding online game and music services. In the broadcasting and film service sectors, with their high cultural identity, a mutual cooperative approach is needed. Korea bringing up the agenda regarding online service may allow it to gain a net benefit for the next FATs. To realize a mutual cooperative approach, it is necessary to form a frame of mutual interests and cooperation through a co-production agreement of audio-visual service. If both countries agree to acknowledge co-produced content as each country's contents, both would benefit.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Internet Identity Management Service (인터넷 ID 관리 서비스)

  • Choi, D.S.;Jin, S.H.;Chung, K.I.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.73-83
    • /
    • 2005
  • 인터넷에 산재한 id와 개인정보들은 적절한 관리와 보호를 필요로 한다. 인터넷 ID 관리 서비스는 가입자의 id와 개인정보를 관리해 주는 서비스이다. 가입자는 인터넷 ID 관리 서비스에 가입해 id와 개인정보를 등록하면, 이 id로 한 번의 로그인 후 모든 가맹 웹 사이트를 이용할 수 있고, 개인정보의 활용에대한 통제도 할 수 있다. 인터넷 ID 관리 서비스가 도입되면 인터넷 이용이 편리해지고 id 도용을 크게줄이며, 개인정보 보호를 강화할 수 있다. 본 고에서는 인터넷 ID 관리 서비스의 개념과 현재 실시되고있는 서비스 동향, 관련 표준화 동향, 그리고 관련 기술 적용 사례를 소개한다. 또한 인터넷 ID 관리 분야의 연구 프로젝트를 살펴 본다.

Speaker Detection and Recognition for a Welfare Robot

  • Sugisaka, Masanori;Fan, Xinjian
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.835-838
    • /
    • 2003
  • Computer vision and natural-language dialogue play an important role in friendly human-machine interfaces for service robots. In this paper we describe an integrated face detection and face recognition system for a welfare robot, which has also been combined with the robot's speech interface. Our approach to face detection is to combine neural network (NN) and genetic algorithm (GA): ANN serves as a face filter while GA is used to search the image efficiently. When the face is detected, embedded Hidden Markov Model (EMM) is used to determine its identity. A real-time system has been created by combining the face detection and recognition techniques. When motivated by the speaker's voice commands, it takes an image from the camera, finds the face inside the image and recognizes it. Experiments on an indoor environment with complex backgrounds showed that a recognition rate of more than 88% can be achieved.

  • PDF