• Title/Summary/Keyword: Asymmetric Key

Search Result 171, Processing Time 0.037 seconds

Insertion Mutation in HMG-CoA Lyase Increases the Production Yield of MPA through Agrobacterium tumefaciens-Mediated Transformation

  • Dong, Yuguo;Zhang, Jian;Xu, Rui;Lv, Xinxin;Wang, Lihua;Sun, Aiyou;Wei, Dongzhi
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.11
    • /
    • pp.1924-1932
    • /
    • 2016
  • Mycophenolic acid (MPA) is an antibiotic produced by Penicillium brevicompactum. MPA has antifungal, antineoplastic, and immunosuppressive functions, among others. ${\beta}-Hydroxy-{\beta}-methylglutaryl-CoA$ (HMG-CoA) lyase is a key enzyme in the bypass metabolic pathway. The inhibitory activity of HMG-CoA lyase increases the MPA biosynthetic flux by reducing the generation of by-products. In this study, we cloned the P. brevicompactum HMG-CoA lyase gene using the thermal asymmetric interlaced polymerase chain reaction and gene walking technology. Agrobacterium tumefaciens-mediated transformation (ATMT) was used to insert a mutated HMG-CoA lyase gene into P. brevicompactum. Successful insertion of the HMG-CoA lyase gene was confirmed by hygromycin screening, PCR, Southern blot analysis, and enzyme content assay. The maximum MPA production by transformants was 2.94 g/l. This was 71% higher than wild-type ATCC 16024. Our results demonstrate that ATMT may be an alternative practical genetic tool for directional transformation of P. brevicompactum.

A Study on the Design of a Secure Client-Sever System (Secure 클라이언트-서버 시스템 설계에 관한 연구)

  • 이상렬
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.91-96
    • /
    • 1998
  • In this paper we designed a secure client-server system to be able to protect messages between client and server using cryptography We authenticated each other using a asymmetric encryption algorithm on the logon procedure and minimized the time to encrypt and decrypt messages using a symmetric encryption algorithm on exchanging messages. We proved that it is possible to make a digital signature on our secure client-server system. And we suggested the efficient key management method to generate and distribute cryptograpic key securely.

  • PDF

Occlusal deviations in adolescents with idiopathic and congenital scoliosis

  • Zhang, Hao;Ma, Jingbo;Zhang, Zhicheng;Feng, Yafei;Cai, Chuan;Wang, Chao
    • The korean journal of orthodontics
    • /
    • v.52 no.3
    • /
    • pp.165-171
    • /
    • 2022
  • Objective: This cross-sectional study aimed to investigate the characteristics of malocclusions in scoliotic patients through clinical examinations. Methods: Fifty-eight patients with idiopathic scoliosis (IS) and 48 patients with congenital scoliosis (CS) participated in the study. A randomly selected group of 152 orthopedically healthy children served as the control group. Standardized orthodontic and orthopedic examination protocols were used to record the occlusal patterns and type of scoliosis. Assessments were made by three experienced orthodontists and a spinal surgery team. The differences in the frequency distribution of occlusal patterns were evaluated by the chi-squared test. Results: In comparison with patients showing IS, patients with CS showed a higher incidence of Cobb angle ≥ 45° (p = 0.020) and included a higher proportion of patients receiving surgical treatments (p < 0.001). The distribution of the Angle Class II subgroup was significantly higher in the IS (p < 0.001) and CS (p = 0.031) groups than in the control group. In comparison with the healthy controls, the CS and IS groups showed significantly higher (p < 0.05) frequencies of asymmetric molar and asymmetric canine relationships, upper and lower middle line deviations, anterior deep overbite, unilateral posterior crossbite, and canted occlusal plane, with the frequencies being especially higher in CS patients and to a lesser extent in IS patients. Conclusions: Patients with scoliosis showed a high frequency of malocclusions, which were most obvious in patients with CS.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

A Design for Network Security System via Non-security Common Network (일반망과 보안망을 연계한 네트워크 보안체계 설계)

  • Cho, Chang-Bong;Lee, Sang-Guk;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

A Novel Opportunistic Greedy Forwarding Scheme in Wireless Sensor Networks

  • Bae, Dong-Ju;Choi, Wook;Kwon, Jang-Woo;Choo, Hyun-Seung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.753-775
    • /
    • 2010
  • Greedy forwarding is a key mechanism of geographic routing using distance as a metric. As greedy forwarding only uses 1-hop neighbor node information, it minimizes routing overhead and is highly scalable. In existing greedy forwarding schemes, a node selects a next forwarding node based only on the distance. However, the signal strength in a realistic environment reduces exponentially depending on the distance, so that by considering only the distance, it may cause a large number of data packet retransmissions. To solve this problem, many greedy forwarding schemes have been proposed. However, they do not consider the unreliable and asymmetric characteristics of wireless links and thus cause the waste of limited battery resources due to the data packet retransmissions. In this paper, we propose a reliable and energy-efficient opportunistic greedy forwarding scheme for unreliable and asymmetric links (GF-UAL). In order to further improve the energy efficiency, GF-UAL opportunistically uses the path that is expected to have the minimum energy consumption among the 1-hop and 2-hop forwarding paths within the radio range. Comprehensive simulation results show that the packet delivery rate and energy efficiency increase up to about 17% and 18%, respectively, compared with the ones in PRR${\times}$Distance greedy forwarding.

Intermedia Synchronization Protocol for Continuous Media Using MPEG-4 in Mobile Distributed Systems

  • Dominguez, Eduardo Lopez;Hernandez, Saul Eduardo Pomares;Gil, Pilar Gomez;Calleja, Jorge De La;Benitez, Antonio;Marin-Hernandez, Antonio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1689-1706
    • /
    • 2012
  • The preservation of temporal dependencies among a group of processes that exchange continuous media at runtime is a key issue for emerging mobile distributed systems (MDS), such as monitoring of biosignals and interactive multiuser games. Although several works are oriented to satisfy temporal dependencies, most of them are not suitable for MDSs. In general, an MDS is characterized by the absence of global references (e.g. shared memory and wall clock), host mobility, limited processing and storage capabilities in mobile hosts, and limited bandwidth on wireless communication channels. This paper proposes an asymmetric synchronization protocol to be used at runtime in an MDS without using a common reference. One main aspect of our synchronization protocol is that it translates temporal constraints to causal dependencies of the continuous media data as seen by the mobile hosts. We simulate the protocol by considering a cellular network environment and by using MPEG-4 encoders. The simulation results show that our protocol is effective in reducing the synchronization error. In addition, the protocol is efficient in terms of processing and storage costs at the mobile devices, as well as in the overhead attached per message across the wired and wireless channels.

Smart Work: Blurring Work/Nonwork Boundaries and its Consequences (스마트워크: 희미해진 업무/비업무 경계 그리고 그 결과)

  • Oh, Sangjo;Kim, Yong-Young;Lee, Heejin
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.191-198
    • /
    • 2013
  • The interests in alternative office systems and solutions (called smart work in Korea) are growing. With the lens of boundary theory, this paper tries to understand the nature of work/nonwork boundaries which smart work will be expected to blur. Boundary theory provides permeability, boundary strength, and interference as its key concepts and an empirical study is performed about the individual perception on those concepts. The result of the survey from telecommuters and/or smart work center users at the Company K shows that they perceive work/nonwork permeability, boundary strength, and interference are asymmetric. The result suggests that asymmetric nature of the work/nonwork boundaries should be taken into account when alternative office systems are brought into use.

Unsteady Single-Phase Natural Circulation Flow Mixing Prediction Using CATHARE Three-Dimensional Capabilities

  • Salah, Anis Bousbia;Vlassenbroeck, Jacques
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.466-475
    • /
    • 2017
  • Coolant mixing under natural circulation flow regime constitutes a key parameter that may play a role in the course of an accidental transient in a nuclear pressurized water reactor. This issue has motivated some experimental investigations carried out within the OECD/NEA PKL projects. The aim was to assess the coolant mixing phenomenon in the reactor pressure vessel downcomer and the core lower plenum under several asymmetric steady and unsteady flow conditions, and to provide experimental data for code validations. Former studies addressed the mixing phenomenon using, on the one hand, one-dimensional computational approaches with cross flows that are not fully validated under transient conditions and, on the other hand, expensive computational fluid dynamic tools that are not always justified for large-scale macroscopic phenomena. In the current framework, an unsteady coolant mixing experiment carried out in the Rossendorf coolant mixing test facility is simulated using the three-dimensional porous media capabilities of the thermal-hydraulic system CATHARE code. The current study allows highlighting the current capabilities of these codes and their suitability for reproducing the main phenomena occurring during asymmetric transient natural circulation mixing conditions.

Modelling of multidimensional effects in thermal-hydraulic system codes under asymmetric flow conditions - Simulation of ROCOM tests 1.1 and 2.1 with ATHLET 3D-Module

  • Pescador, E. Diaz;Schafer, F.;Kliem, S.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3182-3195
    • /
    • 2021
  • The implementation and validation of multi-dimensional (multi-D) features in thermal-hydraulic system codes aims to extend the application of these codes towards multi-scale simulations. The main goal is the simulation of large-scale three-dimensional effects inside large volumes such as piping or vessel. This novel approach becomes especially relevant during the simulation of accidents with strongly asymmetric flow conditions entailing density gradients. Under such conditions, coolant mixing is a key phenomenon on the eventual variation of the coolant temperature and/or boron concentration at the core inlet and on the extent of a local re-criticality based on the reactivity feedback effects. This approach presents several advantages compared to CFD calculations, mainly concerning the model size and computational efforts. However, the range of applicability and accuracy of the newly implemented physical models at this point is still limited and needs to be further extended. This paper aims at contributing to the validation of the multi-D features of the system code ATHLET based on the simulation of the Tests 1.1 and 2.1, conducted at the test facility ROCOM. Overall, the multi-D features of ATHLET predict reasonably well the evolution from both experiments, despite an observed overprediction of coolant mixing at the vessel during both experiments.