• Title/Summary/Keyword: Asymmetric key

Search Result 171, Processing Time 0.029 seconds

Control of Asymmetric Cell Divisions during Root Ground Tissue Maturation

  • Choi, Ji Won;Lim, Jun
    • Molecules and Cells
    • /
    • v.39 no.7
    • /
    • pp.524-529
    • /
    • 2016
  • Controlling the production of diverse cell/tissue types is essential for the development of multicellular organisms such as animals and plants. The Arabidopsis thaliana root, which contains distinct cells/tissues along longitudinal and radial axes, has served as an elegant model to investigate how genetic programs and environmental signals interact to produce different cell/tissue types. In the root, a series of asymmetric cell divisions (ACDs) give rise to three ground tissue layers at maturity (endodermis, middle cortex, and cortex). Because the middle cortex is formed by a periclinal (parallel to the axis) ACD of the endodermis around 7 to 14 days post-germination, middle cortex formation is used as a parameter to assess maturation of the root ground tissue. Molecular, genetic, and physiological studies have revealed that the control of the timing and extent of middle cortex formation during root maturation relies on the interaction of plant hormones and transcription factors. In particular, abscisic acid and gibberellin act synergistically to regulate the timing and extent of middle cortex formation, unlike their typical antagonism. The SHORT-ROOT, SCARECROW, SCARECROW-LIKE 3, and DELLA transcription factors, all of which belong to the plant-specific GRAS family, play key roles in the regulation of middle cortex formation. Recently, two additional transcription factors, SEUSS and GA- AND ABA-RESPONSIVE ZINC FINGER, have also been characterized during ground tissue maturation. In this review, we provide a detailed account of the regulatory networks that control the timing and extent of middle cortex formation during post-embryonic root development.

The Sensitivity of the Indonesian Islamic Stock Prices to Macroeconomic Variables: An Asymmetric Approach

  • WIDARJONO, Agus;SHIDIQIE, Jannahar Saddam Ash;El HASANAH, Lak Lak Nazhat
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.181-190
    • /
    • 2021
  • This paper empirically examines the asymmetric response of the Indonesian Islamic stock market to macroeconomic variables encompassing money supply, domestic output, exchange rate, and Federal Reserve rate. Our study employs the Jakarta Islamic Index (JII) after the financial crisis in the Southeast Asian country using monthly data from January 2000 to December 2019. Non-linear Autoregressive Distributed lag (NARDL) is applied. Our study considers two models consisting of the model without the Federal Reserve rate and the model with it. Our findings confirm the long-run link between Jakarta Islamic Index and macroeconomic factors being studied. Furthermore, the Jakarta Islamic Index asymmetrically responds to broad money supply and exchange rate, but not to domestic output and Federal Reserve rate. A reduction in the money supply has a worse effect on Islamic stock prices as compared to an increase in the money supply. The Jakarta Islamic Index responds differently to depreciation and appreciation. The transmission of the exchange rate to Islamic stock prices occurs only for appreciation. Our study finds an absence of transmission mechanism from the domestic output and the interest rate to Islamic stock prices. Our results imply that the easy money policy and stabilizing currency are key to supporting Indonesian Islamic stock prices.

Asymmetric Semi-Supervised Boosting Scheme for Interactive Image Retrieval

  • Wu, Jun;Lu, Ming-Yu
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.766-773
    • /
    • 2010
  • Support vector machine (SVM) active learning plays a key role in the interactive content-based image retrieval (CBIR) community. However, the regular SVM active learning is challenged by what we call "the small example problem" and "the asymmetric distribution problem." This paper attempts to integrate the merits of semi-supervised learning, ensemble learning, and active learning into the interactive CBIR. Concretely, unlabeled images are exploited to facilitate boosting by helping augment the diversity among base SVM classifiers, and then the learned ensemble model is used to identify the most informative images for active learning. In particular, a bias-weighting mechanism is developed to guide the ensemble model to pay more attention on positive images than negative images. Experiments on 5000 Corel images show that the proposed method yields better retrieval performance by an amount of 0.16 in mean average precision compared to regular SVM active learning, which is more effective than some existing improved variants of SVM active learning.

A Stereoselective Asymmetric Synthesis of Antibiotic (-)-Fumagillol Using Claisen Rearrangement and Intramolecular Ester Enolate Alkylation as Key Steps

  • Kim Deukjoon;Ahn Soon Kil;Bae Hoon;Kim Hak Sung
    • Archives of Pharmacal Research
    • /
    • v.28 no.2
    • /
    • pp.129-141
    • /
    • 2005
  • (-)-Fumagillol (1), a hydrolysis product of fumagillin, has been synthesized by several group from commercially available 1,2:5,6-di-O-isopropylidene-${\alpha}$-D-allofuranose in a highly stereoselective manner. Chiral centers on C5 and C6 came from D-allofuranose and the asymmetric center on C4 was accomplished by 1,3-chirality transfer using the Claisen rearrangement on a chiral allyl alcohol. Chirality, which is necessary on an epoxide consisting of the spiro-ring system, was diastereoselectively constructed by the well-known reaction, intramolecular ester enolate alkylation (IEEA), which showed that this reaction can be applied to the alpha-alkoxy ester system. The epoxide on the side chain was regioselectively introduced by the difference between the number of substituents on the vinyl groups. This accomplishment proved that IEEA can be a useful tool for the synthesis of complex molecules.

Asymmetric Synthesis of 12(S)-HETE

  • Suh, Young-Ger;Kim, Jin-Kwan;Min, Kyung-Hoon;Seo, Seung-Yong;Lee, Bo-Young;Han, Young-Taek
    • Proceedings of the PSK Conference
    • /
    • 2002.10a
    • /
    • pp.364.2-364.2
    • /
    • 2002
  • (S) and (R) 12-HETE. endogenous eicosanoids. have recently been discovered to be implicated in a number of important biological activities. In particular. it has recently been reported by us that both the capsaicin-activated channel of sensory neurons and the cloned capsaicin receptor (VR1) are activated by the eicosanoids including these metabolites. We report herein a novel and efficient asymmetric synthesis of highly enantiomerically enriched 12(S)-HETE via enzymatic kinetic resolution of the key allylic alcohol synthon. (omitted)

  • PDF

A Design of Expandable IC Card Operating System (확정성 있는 IC 카드 운영체제의 설계)

  • 박철한
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.49-60
    • /
    • 1999
  • IC 카드의 하드웨어적인 제약으로 대부분의 IC 카드는 대칭키 알고리즘을 사용하고 있지만 IC 카드 하드웨어 제조 기술의 발전으로 앞으로는 보안성이 우수한 비대 칭키 알고리즘이 많이 사용될 것이다. 그리고 IC 카드의 가장 큰 제약적 중 하나는 메모리 용량의 한계이다. 따라서 보안상 안전하면서도 메모리를 적게 사용하는 IC 카드 운영체제의 구현을 중요한 문제이다. 그래서 본 논문에서는 다양한 종류의 키 알고리즘을 수용할 수 있는 키 파일 탐색 기법을 제안하였다. 또한 데이터 파일 헤더에 잠금 필드를 삽입하여 보안성을 향상시켰으며 메모리 사용량을 줄일 수 있도록 데이터 파일 헤더만을 이용한 파일 탐색 기법과 자유 공간 탐색 기법을 제안하였다. Because of the evolution of IC card hardware fabrication technologies IC card will be able to accept asymmetric key encryption algorithm in the future. One of the most restrictive points of IC card is memory capacity. Therefore it is an important problem to design a secure IC card operating system using memory in small. In this paper we proposed a key file search mechanism using a key length field inserted in a key file header structure. The key file search mechanism makes IC card execute any key-based encryption algorithm. In addition we proposed inserting a lock field in data file header structure. The lock field intensifies the security of a data file. Finally we proposed a data file search mechanism and free space search mechanism using only data file header. The file system using these mechanisms spends smaller memory than that using a file description table and record of unallocated space.

Generation and Distribution of Symmetric/Asymmetric Secret Keys for Secure Communications in Koinonia High-rate WPAN (Koinonia 고속 WPAN에서 보안을 위한 대칭/비대칭 비밀 키 교환 방법)

  • Yim Soon-Bin;Jung Ssang-Bong;Lee Tae-Jin;June Sun-Do;Lee Hyeon-Seok;Kwon Tai-Gil;Cho Jin-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.551-560
    • /
    • 2006
  • Security in WPAN is one of the most fundamental issues to overcome the barrier of wireless environment. Although piconet security mechanisms have been defined in the WPAN standards, many remains open and are left for implementation. Koinonia is a high-rate Wireless Personal Area Network (WPAN) technology, and is developed for multimedia traffic transmission in personal area. In Koinonia WPAN, a piconet consists of one master and more than one slave, and piconet security mechanisms is not defined at all. Therefore, we propose a robust piconet security mechanism for secure communications between slaves in a piconet. Based on security requirements analysis, our proposed protocols are shown to meet the security needs for Koinonia high-rate WPAN.

Degrees of Freedom of Y Channel with Single-Antenna Users: Transmission Scheme and Beamforming Optimization

  • Long, Wei;Gao, Hui;Lv, Tiejun;Yuen, Chau
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4305-4323
    • /
    • 2014
  • In this paper, we investigate the degrees of freedom (DOF) of the Y channel consisting of three single-antenna users and a two-antenna common access relay, where each user intends to exchange independent messages with the other two users with the assistance of the relay. We show that the DOF of this particular scenario is 1.5. In order to prove this result, we firstly derive a DOF upper bound based on cut-set bound by allowing cooperation among users, which shows that the total DOF is upper bounded by 1.5. Then we propose a novel transmission scheme based on asymmetric signal space alignment (ASSA) to demonstrate the achievability of the upper bound. Theoretical evaluation and numerical results confirm that the upper bound can be achieved by utilizing ASSA, which also proves the optimality of the ASSA-based scheme in terms of DOF. Combining the upper bound and achievability, we conclude that the exact DOF is 1.5. Moreover, we present a novel iterative joint beamforming optimization (I-JBO) algorithm to further improve the sum rate. Numerical simulations have been provided to demonstrate the convergence speed and performance advantage of the I-JBO algorithm.

Asymmetric Temporal Privilege Management on Untrusted Storage Server (네트워크 스토리지에서 비대칭키 방식의 시 분할 권한 권리 (ATPM))

  • Kim, Euh-Mi;Yoon, Hyo-Jin;Cheon, Jung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.31-42
    • /
    • 2005
  • We consider a network storage model whose administrator can not be fully trusted. In this model, we assume that all data stored are encrypted for data confidentiality and one owner distributes the decryption key for each time period to users. In this paper, we propose three privilege management schemes. In the first scheme, called Temporal Privilege Management (TPM), we use a symmetric encryption based on one-way function chains for key encapsulation. In the second scheme, called Asymmetric Temporal Privilege Management (ATPM), anyone can encrypt the data using the public key of owner, but only privileged users can decrypt the encrypted data. Finally, we present a scheme to restrict writers' privilege using ID-based signatures in ATPM. In our schemes, the privilege managements are based on the time and the addition of users is efficient. Specially, applying TPM and ATPM, we can solve the back-issue problem.

Seismic response of a high-rise flexible structure under H-V-R ground motion

  • We, Wenhui;Hu, Ying;Jiang, Zhihan
    • Earthquakes and Structures
    • /
    • v.23 no.2
    • /
    • pp.169-181
    • /
    • 2022
  • To research the dynamic response of the high-rise structure under the rocking ground motion, which we believed that the effect cannot be ignored, especially accompanied by vertical ground motion. Theoretical analysis and shaking table seismic simulation tests were used to study the response of a high-rise structure to excitation of a H-V-R ground motion that included horizontal, vertical, and rocking components. The use of a wavelet analysis filtering technique to extract the rocking component from data for the primary horizontal component in the first part, based on the principle of horizontal pendulum seismogram and the use of a wavelet analysis filtering technique. The dynamic equation of motion for a high-rise structure under H-V-R ground motion was developed in the second part, with extra P-△ effect due to ground rocking displacement was included in the external load excitation terms of the equation of motion, and the influence of the vertical component on the high-rise structure P-△ effect was also included. Shaking table tests were performed for H-V-R ground motion using a scale model of a high-rise TV tower structure in the third part, while the results of the shaking table tests and theoretical calculation were compared in the last part, and the following conclusions were made. The results of the shaking table test were consistent with the theoretical calculation results, which verified the accuracy of the theoretical analysis. The rocking component of ground motion significantly increased the displacement of the structure and caused an asymmetric displacement of the structure. Thus, the seismic design of an engineering structure should consider the additional P-△ effect due to the rocking component. Moreover, introducing the vertical component caused the geometric stiffness of the structure to change with time, and the influence of the rocking component on the structure was amplified due to this effect.