• Title/Summary/Keyword: store property

Search Result 64, Processing Time 0.021 seconds

A Study on the Utilization of Intellectual Property Rights Convergence in Mobile Games through Market Analysis (시장분석을 통한 모바일게임 융복합 지식재산권 활용 연구)

  • Lee, Hyun-Ku;Kim, Tae-Gyu
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.309-314
    • /
    • 2020
  • In this study, look into the future prospects of mobile games produced using IP, in the domestic market and to present more effective IP selection criteria when producing new mobile games using IP. To this end, classified IP-enabled mobile games and analyzed IPs used for IP-enabled mobile games by each type for games that are located in the top 200 in sales ranking of Google Play Store. According to the analysis, the mobile game using IP has shown significant performance in terms of sales performance, and the trend will continue in 2020. It was analyzed that 'Game' types of IP using games(based on domestic games) can achieve the highest sales results. Since the success of a game affects a variety of factors other than IP, further research is needed in more diverse ways on the impact of IP on the success.

Store-operated Ca2+ entry in muscle physiology and diseases

  • Pan, Zui;Brotto, Marco;Ma, Jianjie
    • BMB Reports
    • /
    • v.47 no.2
    • /
    • pp.69-79
    • /
    • 2014
  • $Ca^{2+}$ release from intracellular stores and influx from extracellular reservoir regulate a wide range of physiological functions including muscle contraction and rhythmic heartbeat. One of the most ubiquitous pathways involved in controlled $Ca^{2+}$ influx into cells is store-operated $Ca^{2+}$ entry (SOCE), which is activated by the reduction of $Ca^{2+}$ concentration in the lumen of endoplasmic or sarcoplasmic reticulum (ER/SR). Although SOCE is pronounced in non-excitable cells, accumulating evidences highlight its presence and important roles in skeletal muscle and heart. Recent discovery of STIM proteins as ER/SR $Ca^{2+}$ sensors and Orai proteins as $Ca^{2+}$ channel pore forming unit expedited the mechanistic understanding of this pathway. This review focuses on current advances of SOCE components, regulation and physiologic and pathophysiologic roles in muscles. The specific property and the dysfunction of this pathway in muscle diseases, and new directions for future research in this rapidly growing field are discussed.

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

A Comparative Functionality Evaluation of Paulownia Wood Storage Boxes and Acid-free Archival Boxes to Store the Annals of Joseon Dynasty - Indoor and Outdoor Temperature and Relative Humidity Controls, and Heat Release Rate -

  • Park, Hae Jin;Kim, Seong Eun;Lee, Jin Kyung;Chung, Yong Jae
    • Journal of Conservation Science
    • /
    • v.38 no.1
    • /
    • pp.72-79
    • /
    • 2022
  • A paulownia wood has been widely used with various advantages as its low weight, permeability, convenient workability and aesthetic patterns for a long time. However, the related empirical researches and simultaneous evaluations of functionality are insufficient compared with acid-free archival boxes for now. In this study, the indoor and outdoor temperature and relative humidity control and heat release rate were evaluated under the controlled and uncontrolled circumstance in 2018. The paulownia wood storage box showed superior control effect of relative humidity than the acid-free archival box in constantly uncontrolled environment. Also, the possibility of the flame diffusion from the surface of the materials was higher for the paulownia materials, and the acid-free archival box showed more dangerous patterns in the early stages of the fire.

A File System Architecture for Enriched Metadata in Portable Multimedia Devices (휴대용 멀티미디어 기기에서 메타데이터 활용을 강화한 파일 시스템 구조)

  • Yoon, Hyeon-Ju
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.1
    • /
    • pp.1-8
    • /
    • 2007
  • In this paper, we developed a file system architecture for portable multimedia devices. To enhance user convenience, the information about the stored files should be easily retrieved and organized. We defined NMD (Networked MetaData), which can organize the files in networked fashion by attaching user-defined attributes and relation between files. The NMD is stored in flash memory to utilize its nonvolatile property and low-power consumption, while multimedia files are stored in hard disk, an inexpensive mass storage. The experimental implementation showed that this architecture was able to save about 10% power compared to the hard disk NMD-store.

  • PDF

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Private Key Recovery on Bitcoin with Duplicated Signatures

  • Ko, Ju-Seong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1280-1300
    • /
    • 2020
  • In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it provides transparency and prevents the tampering of transaction information. However, new security threats can occur because blockchain technology shares all the transaction information. Furthermore, studies have reported that the private keys of users who use the same signature value two or more times can be recovered. Because private keys of blockchain identify users, private key leaks can result in attackers stealing the ownership rights to users' property. Therefore, as more financial services use blockchain technology, actions to counteract the threat of private key recovery must be continually investigated. Private key recovery studies are presented here. Based on these studies, duplicated signatures generated by blockchain users are defined. Additionally, scenarios that generate and use duplicated signatures are applied in an actual bitcoin environment to demonstrate that actual bitcoin users' private keys can be recovered.

Effects of the Coffee Shop Selection Attributes on Revisit Intention Using the Information Search (정보검색을 통한 커피전문점 선택속성이 재방문의도에 미치는 영향)

  • Baek, Young Ju;Lee, Min Jung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.205-206
    • /
    • 2018
  • 오늘날 인터넷 대중화로 다양한 분야에 걸쳐 누구나 쉽게 정보 공유가 가능한 환경 속에 살고 있다. 최근 모바일 기기들의 확산으로 커피전문점 방문 할 때 정보검색의 영향력이 커짐에 따라 인터넷 후기 등이 작성되어 있는 블로그는 목적지 선택에 많은 영향을 미치고 있다. 본 연구에서는 정보검색을 포함한 기존의 커피전문점의 선택속성의 커피전문점의 만족도와의 관계를 살펴보고자 하였다. 정보검색을 통해 방문한 적이 있는 커피전문점 방문자를 대상으로 176개의 설문지를 회수 하였고, SPSS 18.0를 이용하여 분석하였다. 본 연구에서는 정보검색 일치성을 포함한 커피전문점의 기존의 선택속성들을 독립변수로 두고, 커피전문점의 추천도를 종속변수로 두어 회귀분석을 실시하였다. 분석결과, 정보검색을 통해 커피전문점 방문시 '분위기와 정보검색결과의 일치성', '일반적 선택속성', '커피의 맛', '주차 편리성' 요인이 추천에 유의한 영향을 미치는 것으로 나타났다.

  • PDF

Vulnerability Analysis and Research on Digital Contents Storage System (디지털콘텐츠 저장장치시스템의 취약성 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun;Choi, Jae-Wan;Kim, Won-Gil;Lee, Joong-Seok
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.35-41
    • /
    • 2007
  • In accordance with increasing of digital contents and rising of property value, the importance of storing equipment system which can store and control essential contents has been maximized, and securer storing equipment system overcoming various vulnerabilities is now required. Therefore, in this paper, we analyzed misuse, abuse, modification, leak, and various vulnerabilities of storing equipment system that might be damaged, and we researched into an intrusion detection & recovery system which can solve potential vulnerabilities.

  • PDF

The Development of the Refrigerator using a Pottery Vessel (토기 용기를 이용한 저온 저장고 개발)

  • 김진봉
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.3 no.1
    • /
    • pp.44-48
    • /
    • 2002
  • It is necessary to keep Kimchi at 0~5$^{\circ}C$ all around the year to maintain its taste, which is very sensitive to temperature changes. In addition to temperature for maintenance of taste, property of container is also important to control the activity of bacteria involved in Kimchi. As a pottery container is the best one for the bacterial activity, it was used to store Kimchi. Pottery is shielded by cooling pipe directly, and temperature of Kimchi is controlled by the independent temperature controller.

  • PDF