• Title/Summary/Keyword: aAuthentication

Search Result 3,431, Processing Time 0.03 seconds

Exploring the quality standard of Phellinus spp through β-glucan content and sensory evaluation (β-glucan 함량과 관능검사를 통한 상황버섯 품질기준 모색)

  • Shin, Yong-Wook
    • The Korea Journal of Herbology
    • /
    • v.32 no.4
    • /
    • pp.47-52
    • /
    • 2017
  • Objective : Phellinus spp. mushroom is an object of interest because it has excellent anticancer effect. Owing to the similalarities in the morphology, Phellinus linteus and Phellinus baumii are often used as same Sang Hwang Mushroom in the Korean market.. The quality control for mushrooms is needed because there are many differences in the efficacy according to cultivation method and cultivation area. Therefore, a reliable authentication method of these herbal medicine is necessary to compare and measure the amount of beta-glucan which is known to have a hypoglycemic effect, from the mushrooms collected in various regions Methods : 7 samples of medicinal mushrooms supplying phellinus spp. were collected in Korea, China and Cambodia. We investigated the hardness, colors, extract ratio, ${\alpha}-amylase$ and ${\alpha}-glucosidase$ inhibitory activities, glucose transporter 4 (GLUT-4) expressions of water extracts from Phellinus spp and also MTT assay were examined for cell toxicity. Results : The results revealed that Phellinus spp.water Ext.inhibited ${\alpha}-glucosidase$ activity. glucose transporter 4 (GLUT-4), the key insulin signaling pathway transcription factor, was remarkably increased by the Phellinus baumii water extract Conclusions : These results suggest that The more yellowish the mushroom is, the lower the hardness, the more the content of ${\beta}-glucan$ is proportional. Because the more ${\beta}-glucan$, the greater the effect of hypoglycemia. compared to the hypoglycemic effect, Phellinus Baumii grown at hanging on selves for 7 month in the green house is the best.

Comparative study of external-intenal morphological shape in origins and hybrids for Glycyrrhizae Radix et Rhizoma (감초의 기원 및 교잡종 외내부형태 성상 비교연구)

  • Kim, Young-Sik;Park, Chun-Geon;Choi, Goya;Chang, Jae-Ki;Lee, Jeong-Hoon;Ju, Young-Sung
    • The Korea Journal of Herbology
    • /
    • v.34 no.5
    • /
    • pp.1-12
    • /
    • 2019
  • Objectives : The consumption of licorice is large in Korea, but domestic production is insufficient due to the lack of adaptability. This study aimed to provide a morphological basis for adding interspecific hybrid licorice with improved adaptability to pharmacopoeia. Methods : This study was to establish identification criteria for the original plants, external and internal morphology of the authentic herbal medicines (Glycyrrhiza uralensis, G. glabra and G. inflata), market products and artificially interspecific hybrid forms of licorice. For this purpose, previous studies were investigated and visual and histological observations were carried out. We focused on the internal morphology by microscopic observation for securing objectivity. Finally, we proposed the identification keys for precise classification of each part. Results : 1) Original plant : Licorice species in the compendium were distinguished by the number of leaflets, presence of hair on the fruit, curvature and swelling of the fruit. 2) External morphology : Licorice species were distinguished by degree of powderiness, tearing gap, radial structure in the cross section and existence of protrusion of outer epidermis. 3) Internal morphology : Licorice species were distinguished by the degree of development of phloem fiber bundle, development of obliterated sieve, whether the secondary medullary ray are branched. In the case of interspecific hybrids, the characteristics of both species used for hybridization were mixed in all observation methods. Conclusions : These results suggest that the interspecific crossbred licorice is suitable for the pharmacopoeial standard. Therefore, it can be applied as a herbal medicine through additional supplementary study.

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

  • Gadde, Swetha;Amutharaj, J.;Usha, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.342-347
    • /
    • 2022
  • On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.

Analysis on Writing Status of Laboratory Notebook by Science-Gifted High School Students (과학고 및 영재학교에 재학 중인 과학영재의 연구노트 작성실태 분석)

  • Hyeoksang Yu;Jiwon Lee
    • Journal of Science Education
    • /
    • v.46 no.3
    • /
    • pp.266-277
    • /
    • 2022
  • We analyzed the responses of 152 science-gifted high school students by surveying the status and recognition of writing and keeping laboratory notebooks to develop guidelines and education plans. Science-gifted students did not write laboratory notes diligently, despite recognizing that it is crucial to do so. Mentors also tended not to provide faithful guidance and inspection. There was an insufficient practice in using research evidence in laboratory notebooks, such as including names and dates for authentication. In addition, while a high ratio of students owned their own laboratory notebooks, there was not a high level of recognition regarding the retention period, ownership, and responsibility. Based on these results, we propose suggestions for improving educational institutions for gifted students in science. First, it is necessary to strengthen the guidance for science-gifted students to faithfully write laboratory notebooks. Second, education on writing laboratory notebooks should be provided. Third, science-gifted high schools should prepare regulations for the management of lab notes and conduct education based on them.

Software Development Process for Project Complexity and Size (프로젝트 난이도와 규모에 따른 소프트웨어 개발 프로세스)

  • Yoon, Seok-Min;Kim, In-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.33-40
    • /
    • 2009
  • In this thesis, for the assessment of software development process for project complexity and project size : one of digital watermarking algorithm is selected and examined. Digital watermarking provides a solution to illegal copying of digital contents and has many other useful applications, including web broadcast monitoring, transaction tracking, authentication, copy control and device control. This thesis focused on the method for customizing software development path, considering the project environments and characteristics. The selection standard of software development path is composed of process items, based on the ISO/IEC 15721 Information Technology Guide for ISO/IEC 12207 (Software Life Cycle Process) and ISO/IEC 15504 Information technology - Process assessment. To evaluate the algorithm, a system for selecting development path, which reflected algorithm, was examined.

Evaluation of AFDX Certification Support System by both AFDX Tap and AFDX Analyzer (AFDX Tap과 AFDX 프로토콜 분석기를 이용한 AFDX 네트워크 인증 기술)

  • Park, Pusik;Son, Myeonghwan;Lee, Jeongdo;Yoon, Jongho
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • Avionics Full-DupleX Ethernet (AFDX) is a next-generation avionics network interface technology that is widely applied in the latest aircraft to replace ARINC429 and MIL-STD-1553B. However, the criteria for authenticating an avionics network consisting of AFDX are very scarce. Using AFDX Protocol Analyzer developed by the Korea Electronics Technology Research Institute and AFDX Tap developed by the Korea Aerospace University, we proposed a technology of certification practicality that can verify the normal functioning of avionics equipment with AFDX network interface. Our proposed technology provided the ability to collect precision packets, to verify AFDX specification compliance, and perform automatic tests to reduce the time and cost of authentication of AFDX avionics devices.

Smart Centralized Remote Security Service Provisioning Framework for Open ICT Environment (개방형 ICT 환경을 위한 집중식 원격 보안 서비스 프로비저닝 프레임워크 구성 방안)

  • Park, Namje
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.2
    • /
    • pp.81-88
    • /
    • 2016
  • Machine-to-Machine (M2M) communication provides each component (machine) with access to Internet, evolving into the IoT technology. IoT is a trend where numbers of devices provide the communication service, using the Internet protocol. As spreading the concept of IoT(Internet of Things), various objects become home information sources. According to the wide spread of various devices, it is difficult to access data on the devices with unified manners. Under this environment, security is a critical element to create various types of application and service. In this paper propose the inter-device authentication and Centralized Remote Security Provisioning framework in Open M2M environment. The results of previous studies in this task is carried out by protecting it with the latest information on M2M / IoT and designed to provide the ultimate goal of future M2M / IoT optimized platform that can be integrated M2M / IoT service security and security model presents the information.

An Adaptive matrix-based Secure Keypad designed for Rollable and Bendable Display Environments (롤러블 및 벤더블 디스플레이 환경에 적합한 가변행렬 기반 보안 키패드)

  • Dong-Min Choi
    • Journal of Industrial Convergence
    • /
    • v.22 no.2
    • /
    • pp.63-71
    • /
    • 2024
  • Conventional methods like PIN used in conventional smartphone form factor have not considered the variation in display structure or screen size. As a result, when applied to recent variable display-based smartphones, the secret information input unit may get reduced or enlarged, leading to vulnerabilities for social engineering attacks due to deformation of the display area. This study proposes a secure keypad that responds to changes in display size in rollable and bendable smart phones. Firstly, the security problems that may arise when applying classical authentication methods to new form factors were analyzed, and corresponding security requirements were derived. The proposed security keypad addresses the key input error problem that can occur when the screen size is small. The arrangement and size of keys can be deformed with the spacing suitable for input depending on the display size of rollable and bendable smartphones. The study also considered the problem of leaking input information for social engineering attacks by irregularly distributing key input coordinates. The proposed method provides better user experience and security than existing methods and can be used in smartphones of various sizes and shapes.

SaaS Platform Structure Design for Authentication and Accounting based on Trusted Computing Technology (신뢰 컴퓨팅기술 기반 SaaS 인증 및 과금 플랫폼 구조 설계)

  • Lee, Sang Hwan;Kim, Jane Chungyoon;Jun, Sungik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.991-994
    • /
    • 2007
  • 최근 컴퓨터 기술의 발전과 네트워크의 개방화 그리고 무선 모바일 통신 기술의 비약적인 보급으로 인하여 컴퓨팅 환경을 이루고 있는 각종 장치(PC, 모바일 단말, 저장장치, 네트워크 기기 등)가 다양한 형태의 보안 위협에 노출되어 데이터의 유실, 조작, 유출되어 금전적인 피해를 입거나 프라이버시 침해를 받고 있다. 이러한 문제를 근본적으로 해소하기 위하여 설립된 TCG(Trusted Computing Group)는 세계적인 IT 핵심기업들을 중심으로 구성된 비영리 단체로서 PC 혹은 모바일 기기 등의 단말과 서버 장비 그리고 저장 장치 및 네트워크로 구성된 컴퓨팅 환경에서 보안성 향상 및 데이터의 신뢰성을 제고하기 위하여 TPM(Trusted Platform Module)이라는 반도체 칩을 신뢰의 기반(root of trust)으로 한 신뢰 플랫폼을 제안하고 있다. 한편 SaaS(Software as a Service)는 패키지 형태의 소프트웨어를 네트워크 서비스 형태로 바꾸어 사용량에 비례한 요금제로 과금하는 방식을 채택하고 사용자가 온디맨드로 요청한 서비스를 적시에 제공하는 기술로 최근 전세계적으로 각광을 받고 있다. 이때 다양한 컴퓨팅 환경 안의 사용자에게 높은 신뢰성과 보안성 그리고 연속성을 갖는 SaaS 서비스를 제공하고 데이터의 무결성 및 비밀유지와 정확한 서비스 사용시간을 기록하고 업로드하는 기능들을 제공하는 SaaS 플랫폼은 TPM기반의 신뢰컴퓨팅 기술을 통하여 쉽게 구현될 수 있다. 본 논문에서는 일시적으로 네트워크와 차단된 상태의 PC 혹은 모바일 단말에서도 위의 조건들을 만족하는 SaaS 서비스를 지원하는 신뢰 플랫폼이 가져야 할 기능들에 대하여 분석-도출한 후 그러한 기능들을 제공하는 컴포넌트로 구성된 신뢰형 SaaS 사용자 플랫폼을 설계하였다.

Research on Secure Keypads for Mobile Devices with Stretchable Displays (스트레처블 디스플레이가 적용된 모바일 기기의 보안 키패드 연구)

  • Dongmin Choi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.885-890
    • /
    • 2024
  • This study proposes a secure keypad structure that can adapt to screen changes in mobile devices equipped with stretchable display. For this purpose, we compared and analyzed the authentication methods applied to current rigid form factor smartphones with those applied to rollable and bendable display based smartphones, which are the previous stages of stretchable display. Based on the results of this analysis, we identified potential user convenience and security safety issues that may arise in the form factor structure for smart wallets, multitasking, screen expansion and media viewing, and gaming and entertainment applications where stretchable displays will be applied, then proposed a security keypad structure for these form factors. Our keypad structure provides enhanced user convenience and security compared to the structures applied in the smartphone environment based on the conventional rigid display form factor and rollable, bendable display form factor.