• Title/Summary/Keyword: vehicle ID

Search Result 65, Processing Time 0.029 seconds

Effects of Polygonatum sibiricum rhizome extract on lipid and energy metabolism in high-fat diet-induced obese mice (고지방 식이 유도 비만 마우스 모델에서 황정 추출물의 지방질 및 에너지 대사 관련 유전자에 대한 효능 연구)

  • Jeon, Woo-Jin;Kim, Ji-Young;Oh, Ik-Hoon;Lee, Do-Seop;Shon, Suh-Youn;Seo, Yun-Ji;Yeon, Seung-Woo;Kang, Jae-Hoon
    • Korean Journal of Food Science and Technology
    • /
    • v.49 no.2
    • /
    • pp.192-202
    • /
    • 2017
  • In this study, factors involved in lipid and energy metabolism following treatment with ethanolic extract of the Polygonatum sibiricum rhizome (ID1216) were evaluated in high-fat diet-induced obese mice. ID1216-treated mice showed a significant reduction in weight gain compared to non-treated mice. ID1216 treatment increased the protein levels of AMP-dependent protein kinase, sirtuin1, peroxisome proliferator-activated receptor ${\gamma}$ coactivator 1-${\alpha}$ ($PGC1{\alpha}$), peroxisome proliferator-activated receptor ${\alpha}$ ($PPAR{\alpha}$) and uncoupling proteins in the adipose tissue, liver and muscle compared to vehicle treatment. Analysis of downstream signals of the sirtuin1 $PGC1{\alpha}$-$PPAR{\alpha}$ pathway showed that ID1216 regulates the expression of ${\beta}$-oxidation related genes such as acyl-CoA oxidase, carnitine palmitoyltransferase1, acyl-CoA dehydrogenase and adipocyte protein 2. In addition, ID1216 increased the expression of adipose triglyceride lipase. These results suggest that ID1216 has anti-obesity effects by regulating the genes involved thermogenesis, ${\beta}$-oxidation and lipolysis in a diet-induced obesity model.

Effects of ethanol extract of Polygonatum sibiricum rhizome on obesity-related genes (황정 에탄올 추출물의 비만 조절 유전자에 대한 효과)

  • Jeon, Woo-Jin;Lee, Do-Seop;Shon, Suh-Youn;Seo, Yun-Ji;Yeon, Seung-Woo;Kang, Jae-Hoon
    • Korean Journal of Food Science and Technology
    • /
    • v.48 no.4
    • /
    • pp.384-391
    • /
    • 2016
  • In previous studies, we confirmed that the ethanol extract of Polygonatum sibiricum (ID1216) has anti-obesity effects on high-fat diet-fed mice. To identify the obesity-related genes affected by ID1216, we studied its effects both in vivo and in vitro. In mice, single administration of ID1216 increased the expression of obesity-related genes including sirtuin1 (SIRT1), peroxisome proliferator-activated receptor ${\gamma}$ coactivator $1{\alpha}$ ($PGC1{\alpha}$) and peroxisome proliferator-activated receptor ${\alpha}$ ($PPAR{\alpha}$) compared to that in mice administered the vehicle; their downstream genes (uncoupling proteins, acyl-CoA oxidase, adipocyte protein 2, and hormone-sensitive lipase) were also increased by ID1216. In fully differentiated 3T3-L1 adipocytes, ID1216 showed the same effects on anti-obesity genes as those in the animal model. Based on these results, we propose that ID1216 has anti-obesity effects by regulating the $SIRT1-PGC1{\alpha}-PPAR{\alpha}$ pathway and their downstream genes, thereby controlling energy and lipid metabolisms.

Replay Attack based Neutralization Method for DJI UAV Detection/Identification Systems (DJI UAV 탐지·식별 시스템 대상 재전송 공격 기반 무력화 방식)

  • Seungoh Seo;Yonggu Lee;Sehoon Lee;Seongyeol Oh;Junyoung Son
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.133-143
    • /
    • 2023
  • As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus, anti-drone systems have been developed to respond to drone threats. In particular, remote identification data (R-ID)-based UAV detection and identification systems that detect and identify illegal drones with R-ID broadcasted by drones have been developed, and are widely employed worldwide. However, this R-ID-based UAV detection/identification system is vulnerable to security due to wireless broadcast characteristics. In this paper, we analyze the security vulnerabilities of DJI Aeroscope, a representative example of the R-ID-based UAV detection and identification system, and propose a replay-attack-based neutralization method using the analyzed vulnerabilities. To validate the proposed method, it is implemented as a software program, and verified against four types of attacks in real test environments. The results demonstrate that the proposed neutralization method is an effective neutralization method for R-ID-based UAV detection and identification systems.

Analysis of Forwarding Schemes to Mitigate Data Broadcast Storm in Connected Vehicles over VNDN

  • Hur, Daewon;Lim, Huhnkuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.69-75
    • /
    • 2021
  • Limitation of the TCP/IP network technology included in the vehicle communication is due to the frequent mobility of the vehicle, the increase in intermittent connection requirements, and the constant presence of the possibility of vehicle hacking. VNDN technology enables the transfer of the name you are looking for using textual information without the need for vehicle identifiers like IP/ID. In addition, intermittent connectivity communication is possible rather than end-to-end connection communication. The data itself is the subject of communication based on name-based forwarding using two types of packets: Interest packet and Data packet. One of the issues to be solved for the realization of infotainment services under the VNDN environment is the traffic explosion caused by data broadcasting. In this paper, we analyze and compare the existing technologies to reduce the data broadcast storm. Through this, we derive and analyze the requirements for presenting the best data mitigation technique for solving the data explosion phenomenon in the VNDN environment. We expect this paper can be utilized as prior knowledge in researching improved forwarding techniques to resolve the data broadcast explosion in connected vehicles over NDN.

GPS to monitor and track vehicle position in steel works

  • Park, Chel-No;Jee, Gyu-In
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.114.2-114
    • /
    • 2001
  • In steel works, Locomotives and torpedo ladle cars are used to convey the smelted iron that comes out Blast Furnace to the steel-making mill. Above conveying vehicles are operated in all steel works area. And to trace their positions, after partitioned their areas, Automatic Vehicle Identification(RF-ID method) is installed on the railroad and identifies vehicle numbers. But AVI facilities have many problem that means that are too expensive, cost too much maintenance fee and inefficient management. This paper is to revamp those inefficient operations and state the status of operations of train positioning system, get to know what the problem is. And also when we use GPS to monitor and trace the vehicle position ...

  • PDF

The Simplified V2V Communication Authentication Service for Privacy Protection (프라이버시 보호를 위한 V2V 통신 인증 서비스의 간략화)

  • Park, Sung-Su;Han, Keun-hee;Kim, Keecheon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.35-40
    • /
    • 2016
  • One of the next generation of automotive V2V communication technology is a core technology for next-generation ITS as a technique used for communications between the vehicle. Looking at the existing V2V communication using the pseudonym certificate authentication service structure to meet the security requirements for privacy protection. Since the issuance of multiple certificates when needed authority in issuing and managing to use the pseudonym certificate issued once and it takes a lot of time. In this paper, we present the method utilizing a vehicle ID to meet the security requirements for the privacy protection without the use of a pseudonym certificate.

Implementation of Communication to Flexibly Configure the Number of Railway Cars (철도차량 수를 유연하게 구성할 수 있는 통신시스템 구현)

  • Yeon, Jun Sang;Yang, Oh
    • Journal of the Semiconductor & Display Technology
    • /
    • v.15 no.4
    • /
    • pp.61-66
    • /
    • 2016
  • This paper presents the implementation for a network structure of railway cars using a point to point communication. Most of network's representative specifications for a train are the FIP (Field Bus), MVB (Multifunction Vehicle Bus), CAN and WTB (Wire Train Bus) which is used by ALSOM, SIEMENS and BOMBADIER as major in this field. These networks in a physical layer use a multi-drop method, connected from $1^{st}$ car to $n^{th}$ car of a train through a cable without any extra services such as an electric part, amplifier. However waveforms which is passed through a long cable in the multi-drop are distorted by a capacitance or resistance of the cable or environments. Also since using a cable connected directly from $1^{st}$ car to $n^{th}$ car, if over two trains make double head, it isn't easy to distinguish ID for each railway cars. So by using the point to point network per each car, it is able to reduce a distortion. Also since reducing distortion, this communication speed can be been higher and transmit and receive any packets more stably. Using proposed token in a packet, this can make ID per each railway car automatically. Finally experimental results show the good performance and effectiveness of the proposed method.

Actuator Control based on Interconnected Heterogeneous Networks (이종 통신망에 연결된 네트워크 기반 액추에이터 제어)

  • Kim, Nayeon;Moon, Chanwoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.57-62
    • /
    • 2017
  • Recently, the use of electronic control units in vehicle has increased. The ECUs are connected to in vehicle networks to process a large amount of information. In this paper, for an actuator that is interconnected to CAN and FlexRay, a FlexRay-CAN gateway is presented and a data packing algorithm with a bisection method of a FlexRay slot is proposed. And, a network based actuator control system and packing map is implemented. With the proposed packing method, contact force sensor data are transferred within the maximum allowed delay to ensure the stability. The proposed method is useful for control of distributed system.

THERA: Two-level Hierarchical Hybrid Road-Aware Routing for Vehicular Networks

  • Abbas, Muhammad Tahir;SONG, Wang-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3369-3385
    • /
    • 2019
  • There are various research challenges in vehicular ad hoc networks (VANETs) that need to be focused until an extensive deployment of it becomes conceivable. Design and development of a scalable routing algorithm for VANETs is one of the critical issue due to frequent path disruptions caused by the vehicle's mobility. This study aims to provide a novel road-aware routing protocol for vehicular networks named as Two-level hierarchical Hybrid Road-Aware (THERA) routing for vehicular ad hoc networks. The proposed protocol is designed explicitly for inter-vehicle communication. In THERA, roads are distributed into non-overlapping road segments to reduce the routing overhead. Unlike other protocols, discovery process does not flood the network with packet broadcasts. Instead, THERA uses the concept of Gateway Vehicles (GV) for the discovery process. In addition, a route between source and destination is flexible to changing topology, as THERA only requires road segment ID and destination ID for the communication. Furthermore, Road-Aware routing reduces the traffic congestion, bypasses the single point of failure, and facilitates the network management. Finally yet importantly, this paper also proposes a probabilistical model to estimate a path duration for each road segment using the highway mobility model. The flexibility of the proposed protocol is evaluated by performing extensive simulations in NS3. We have used SUMO simulator to generate real time vehicular traffic on the roads of Gangnam, South Korea. Comparative analysis of the results confirm that routing overhead for maintaining the network topology is smaller than few previously proposed routing algorithms.

An Anonymous Authentication in the Hierarchy for VANET (VANET 환경을 위한 계층적 구조의 익명 인증 기술)

  • Bae, Kyungjin;Lee, Youngkyung;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.563-577
    • /
    • 2018
  • In order to support secure communication in VANET(Vehicular Ad hoc Network), messages exchanged between vehicles or between vehicle and infrastructure must be authenticated. In this paper, we propose a hierarchical anonymous authentication system for VANET. The proposed system model reduces the overhead of PKG, which is a problem of previous system, by generating private keys hierarchically, thereby enhancing practicality. We also propose a two-level hierarchical identity-based signature(TLHIBS) scheme without pairings so that improve efficiency. The proposed scheme protects the privacy of the vehicle by satisfying conditional privacy and supports batch verification so that efficiently verifies multiple signatures. Finally, The security of the proposed scheme is proved in the random oracle model by reducing the discrete logarithm problem(DLP) whereas the security proof of the previous ID-based signatures for VANET was incomplete.