• Title/Summary/Keyword: random protocol

Search Result 334, Processing Time 0.033 seconds

New protocol for the indirect regeneration of the Lilium ledebourii Bioss by using bulb explants

  • Ghanbari, Sina;Fakheri, Barat Ali;Naghavi, Mohammad Reza;Mahdinezhad, Nafiseh
    • Journal of Plant Biotechnology
    • /
    • v.45 no.2
    • /
    • pp.146-153
    • /
    • 2018
  • Lilium ledebourii Bioss is a wild species of Lilium, which grows naturally in some provinces of Iran. Previous studies on Lilium tissue culture have been linked to direct regeneration and a few studies have been conducted on indirect regeneration, which has been studied under bright conditions. In this study, for the first time in the world, all the stages of indirect regeneration (callus induction, shoot and root induction) have been studied under dark conditions. Callus formation and the regeneration levels of L. Ledebourii Bioss were examined for three replicates in an MS (Murashige and Skoog) medium with different hormonal compositions and by using a factorial experiment in the framework of a completely random plan. For callus initiation, 2,4-D and kinetin hormones were used in five and four levels, respectively, as auxin and cytokinin. Results showed that the highest percentage of the callus was found in $3{\mu}M$ of 2,4-D and $0.5{\mu}M$ of kinetin. In terms of callus wet weight, the highest amount was found in $3{\mu}M$ of 2,4-D and $0.5{\mu}M$ of kinetin. In addition, in terms of diameter, the highest amount was found in $3{\mu}M$ of 2,4-D, and $0.5{\mu}M$ of kinetin. In summary, the 2,4-D hormone had a major impact on the percentage of regeneration increase so that the best response was related to the composition of $3{\mu}M$ of 2,4-D, and $0.1{\mu}M$ of kinetin. This study contended that auxin and cytokinin can induce long shoots and roots through cell elongation in dark condition.

Information Right Management System using Secret Splitting of Hardware Dependent Encryption Keys (하드웨어에 종속된 암호키 비밀 분할을 이용한 정보권한관리 시스템)

  • Doo, So-Young;Kong, Eun-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.345-351
    • /
    • 2000
  • This paper presents a right management scheme using secret splitting protocol. Right management schemes combat piracy of proprietary data (such as digital music). In these schemes, encryption has been used and it is essential to protect the keys used in encryption. We introduce a new key protection method in which a secret encryption key is generated using both user's hardware-dependent unique information (such as MAC address) and cryptographically secure random bit strings provided by data owner. This scheme prevents piracy by checking hardware-dependent information during rendering and improves the secrecy of the data by individualizing the encryption key for each data.

  • PDF

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

Acupuncture for Subacute and Chronic Post-thoracotomy Pain in Patients with Traumatic Multiple Rib Fractures: A Study Protocol for a Randomised-controlled, Two-arm, Parallel Design, Pilot Trial

  • Kim, Kun Hyung;Cho, Hyun Min;Lee, Chan Kyu;Seok, JunePill;Kim, Seon Hee;Kim, Jung-Eun;Shin, Yu Kyung;Kim, Min Kyung
    • Journal of Acupuncture Research
    • /
    • v.35 no.2
    • /
    • pp.95-100
    • /
    • 2018
  • Background: The aim of this study is to assess the feasibility of acupuncture treatment for the management of subacute and chronic post-thoracotomy pain in patients with traumatic multiple rib fractures. Methods: A total of 30 participants who have undergone thoracotomy after traumatic multiple rib fractures will be recruited. Participants will be invited and equally randomised into acupuncture plus usual care and usual care alone groups. A computer-generated random number sequence will be used and concealed using opaque, sealed, sequentially numbered envelopes. Twelve sessions of manual and electrical acupuncture performed by Korean medicine doctors will be provided over a span of 3 months to participants allocated to the acupuncture group. Participants in the usual care group will continue pain medication, exercise and physical therapy as required. Study feasibility will be measured based on the proportion of patients who complete the measurement of pain at 12 or 24 weeks after baseline. The clinical outcomes will include; the average pain intensity over the recent week at rest, movement and cough, quality of life, patient's global assessment of recovery, respiratory function measured by the pulmonary function test and use of pain medication at 4, 8, 12 and 24 weeks after enrolment. Adverse events will be recorded for all participants. Written informed consent will be obtained from all participants. The local ethics committee has approved the study. This pilot trial will inform further studies investigating the potential role of acupuncture for subacute and chronic post-thoracotomy pain in patients with traumatic multiple rib fractures.

Slotted Transmissions using Frame aggregation: A MAC protocol for Capacity Enhancement in Ad-hoc Wireless LANs (프레임 집합화를 이용한 애드-혹 무선 랜의 성능 향상을 위한 MAC 프로토콜)

  • Rahman, Md. Mustafizur;Hong, Choong-Seon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.8
    • /
    • pp.33-41
    • /
    • 2007
  • The IEEE 802.11 DCF channel access function allows single transmission inside two-hop network in order to avoid collisions and eliminate the hidden and exposed terminal problems. Singular transmission capability causes data frames waiting for the entire roundtrip time in the transmitter neighborhood, and results in increased frame latency and lower network throughput. Real-time and pervasive applications are severely affected for the lower medium utilization; especially with high network traffic. This work proposes a new scheme with the help of Frame Aggregation technique in IEEE802.11n and overcomes the single transmission barrier maintaining the basic DCF functionality. Proposed scheme allows parallel transmissions in non-interfering synchronized slots. Parallel transmissions bypass the conventional physical carrier sense and random Backoff time for several cases and reduce the frame latency and increase the medium utilization and network capacity.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

Multiple and Unlinkable Public Key Encryption without Certificates (불연계성을 갖는 다중 공개키 암호 시스템)

  • Park, So-Young;Lee, Sang-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.20-34
    • /
    • 2009
  • We newly propose a multiple and unlinkable identity-based public key encryption scheme which allows the use of a various number of identity-based public keys in different groups or applications while keeping a single decryption key so that the decryption key can decrypt every ciphertexts encrypted with those public keys. Also our scheme removes the use of certificates as well as the key escrow problem so it is functional and practical. Since our public keys are unlinkable, the user's privacy can be protected from attackers who collect and trace the user information and behavior using the known public keys. Furthermore, we suggest a decryption key renewal protocol to strengthen the security of the single decryption key. Finally, we prove the security of our scheme against the adaptive chosen-ciphertext attack under the random oracle model.

Motor Learning Concepts Applied to Occupational Therapy With Adults With Hemiplegia (뇌졸중 편마비환자의 작업치료에 적용되는 운동학습의 원칙)

  • Shim, Sun-Hwa;Park, Ji-Hyuk
    • Therapeutic Science for Rehabilitation
    • /
    • v.1 no.2
    • /
    • pp.14-22
    • /
    • 2012
  • Introduction : The purpose of scholarly paper is to review of motor learning concepts and to examine in integration of motor learning research finding in occupational therapy services for adults with hemiplegia. Body : The principles of motor learning is stage of learning, type of task, practice and feedback. Depending on stage of learning, therapist need to apply of the principles. In early stage of learning, therapists should be promote patient's awareness about therapeutic goals, task performance environment and how to perform. Whole practice, blocked practice and constant practice improve performance skill. In the latter stage of learning, therapists have to design a intervention protocol for patient to use the implicit feedback. Random practice and open task facilitates performance skills. Conclusion : When establishing the a intervention plan for adults with hemiplegia, therapists should systematically developed the principles of motor learning. Intervention program must be established by applying the principles of motor learning in accordance with the learner's level of task performance, and modified depending on the therapeutic progress.

A Packet Forwarding Control Scheme for TCP Performance Improvement in Mobile Networks (모바일 네트워크에서 TCP 성능 향상을 위한 패킷 포워딩 제어 방안)

  • Hur, Kyeong;Eom, Doo-Seop;Lee, Seung-Hyun;Tchah, Kyun-Hyon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4C
    • /
    • pp.353-364
    • /
    • 2002
  • To prevent the performance degradation of TCP due to packet loss in the smooth handoff by the route optimization extension of Mobile If protocol, a buffering of packets at a base station is needed. A buffering of packets at a base station recovers the packets dropped during the handoff by forwarding the buffered packets at the old base station to the mobile user. But, when the mobile user moves to a new foreign network which is connected to a congested router, the buffered packets forwarded by the old base station are dropped and the link utilization performance degraded due to increased congestion by the forwarded packets. In this paper, when the mobile user moves to a new foreign network which is connected to a congested router, Ive propose a packet forwarding control scheme required far the old base station to improve TCP performance in mobile networks. The old base station forwards or discards the buffered packets during handoff by proposed packet forwarding control scheme based on congestion states of RED(Random Early Detection) at the congested router. Simulation results slow that link utilization performance can be improved by applying proposed packet forwarding control scheme.

A Systematic Review of Clinical Researches of Korean Medicine for Alopecia (탈모증의 한약제제 치료효과에 대한 체계적 문헌 고찰)

  • Ryu, Deok-Hyun;Roh, Seok-Sun
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.30 no.2
    • /
    • pp.1-18
    • /
    • 2017
  • Objectives : This review aims to evaluate a risk of bias by risk of bias tool and RoBANS(Risk of Bias Assessment tool for Non-randomized Study) tool for clinical trial papers proving treatment effect of Korean medicines to alopecia and provides the newest reason of effectiveness of herbs to alopecia. Methods : Data were collected through electronic database including NDSL, KISS, KMBASE, Koreantk, OASIS, KoreaMed, KISTI, Pubmed, Cochrane CENTRAL and CINAHL. Two experts in Oriental Medicine assessed risk of bias of randomized controlled trials by Cochrane group's Risk of Bias tool and non-randomized controlled trials by RoBANS tool after searching, reviewing and selecting papers. Results : Total number of selected trials is 20 including 4 randomized controlled trial, 13 non-randomized controlled trials and 3 case reports. This study evaluate the risk of bias of 17 papers including 4 randomized controlled trials and 13 non-randomized controlled trials except 3 case reports by risk of bias tool and RoBANS tool. All papers of randomized controlled trials are evaluated unclear for random sequence generation and allocation concealment as there are no word on them. And all papers of non-randomized controlled trials are evaluated unclear for blinding of outcome assessments and relatively low for others. Conclusions : Korean medicine intervention can be an effective for treatment in alopecia. It was evaluated by hair density, thickness and expert panel assessment of photographs and all results are statistically significant. But enhancing levels of evidence, we must try to reduce bias in researches and report a safety, protocol and IRB.