• Title/Summary/Keyword: Asymmetric key

Search Result 171, Processing Time 0.023 seconds

Insertion Mutation in HMG-CoA Lyase Increases the Production Yield of MPA through Agrobacterium tumefaciens-Mediated Transformation

  • Dong, Yuguo;Zhang, Jian;Xu, Rui;Lv, Xinxin;Wang, Lihua;Sun, Aiyou;Wei, Dongzhi
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.11
    • /
    • pp.1924-1932
    • /
    • 2016
  • Mycophenolic acid (MPA) is an antibiotic produced by Penicillium brevicompactum. MPA has antifungal, antineoplastic, and immunosuppressive functions, among others. ${\beta}-Hydroxy-{\beta}-methylglutaryl-CoA$ (HMG-CoA) lyase is a key enzyme in the bypass metabolic pathway. The inhibitory activity of HMG-CoA lyase increases the MPA biosynthetic flux by reducing the generation of by-products. In this study, we cloned the P. brevicompactum HMG-CoA lyase gene using the thermal asymmetric interlaced polymerase chain reaction and gene walking technology. Agrobacterium tumefaciens-mediated transformation (ATMT) was used to insert a mutated HMG-CoA lyase gene into P. brevicompactum. Successful insertion of the HMG-CoA lyase gene was confirmed by hygromycin screening, PCR, Southern blot analysis, and enzyme content assay. The maximum MPA production by transformants was 2.94 g/l. This was 71% higher than wild-type ATCC 16024. Our results demonstrate that ATMT may be an alternative practical genetic tool for directional transformation of P. brevicompactum.

A Study on the Design of a Secure Client-Sever System (Secure 클라이언트-서버 시스템 설계에 관한 연구)

  • 이상렬
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.91-96
    • /
    • 1998
  • In this paper we designed a secure client-server system to be able to protect messages between client and server using cryptography We authenticated each other using a asymmetric encryption algorithm on the logon procedure and minimized the time to encrypt and decrypt messages using a symmetric encryption algorithm on exchanging messages. We proved that it is possible to make a digital signature on our secure client-server system. And we suggested the efficient key management method to generate and distribute cryptograpic key securely.

  • PDF

Occlusal deviations in adolescents with idiopathic and congenital scoliosis

  • Zhang, Hao;Ma, Jingbo;Zhang, Zhicheng;Feng, Yafei;Cai, Chuan;Wang, Chao
    • The korean journal of orthodontics
    • /
    • v.52 no.3
    • /
    • pp.165-171
    • /
    • 2022
  • Objective: This cross-sectional study aimed to investigate the characteristics of malocclusions in scoliotic patients through clinical examinations. Methods: Fifty-eight patients with idiopathic scoliosis (IS) and 48 patients with congenital scoliosis (CS) participated in the study. A randomly selected group of 152 orthopedically healthy children served as the control group. Standardized orthodontic and orthopedic examination protocols were used to record the occlusal patterns and type of scoliosis. Assessments were made by three experienced orthodontists and a spinal surgery team. The differences in the frequency distribution of occlusal patterns were evaluated by the chi-squared test. Results: In comparison with patients showing IS, patients with CS showed a higher incidence of Cobb angle ≥ 45° (p = 0.020) and included a higher proportion of patients receiving surgical treatments (p < 0.001). The distribution of the Angle Class II subgroup was significantly higher in the IS (p < 0.001) and CS (p = 0.031) groups than in the control group. In comparison with the healthy controls, the CS and IS groups showed significantly higher (p < 0.05) frequencies of asymmetric molar and asymmetric canine relationships, upper and lower middle line deviations, anterior deep overbite, unilateral posterior crossbite, and canted occlusal plane, with the frequencies being especially higher in CS patients and to a lesser extent in IS patients. Conclusions: Patients with scoliosis showed a high frequency of malocclusions, which were most obvious in patients with CS.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Seismic vibration control of an innovative self-centering damper using confined SMA core

  • Qiu, Canxing;Gong, Zhaohui;Peng, Changle;Li, Han
    • Smart Structures and Systems
    • /
    • v.25 no.2
    • /
    • pp.241-254
    • /
    • 2020
  • Using confined shape memory alloy (SMA) bar or plate, this study proposes an innovative self-centering damper. The damper is essentially properly machined SMA core, i.e., bar or plate, that encased in buckling-restrained device. To prove the design concept, cyclic loading tests were carried out. According to the test results, the damper exhibited desired flag-shape hysteretic behaviors upon both tension and compression actions, although asymmetric behavior is noted. Based on the experimental data, the hysteretic parameters that interested by seismic applications, such as the strength, stiffness, equivalent damping ratio and recentering capacity, are quantified. Processed in the Matlab/Simulink environment, a preliminary evaluation of the seismic control effect for this damper was conducted. The proposed damper was placed at the first story of a multi-story frame and then the original and controlled structures were subjected to earthquake excitations. The numerical outcome indicated the damper is effective in controlling seismic deformation demands. Besides, a companion SMA damper which represents a popular type in previous studies is also introduced in the analysis to further reveal the seismic control characteristics of the newly proposed damper. In current case, it was found that although the current SMA damper shows asymmetric tension-compression behavior, it successfully contributes comparable seismic control effect as those having symmetrical cyclic behavior. Additionally, the proposed damper even shows better global performance in controlling acceleration demands. Thus, this paper reduces the concern of using SMA dampers with asymmetric cyclic behavior to a certain degree.

A Design for Network Security System via Non-security Common Network (일반망과 보안망을 연계한 네트워크 보안체계 설계)

  • Cho, Chang-Bong;Lee, Sang-Guk;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

A Novel Opportunistic Greedy Forwarding Scheme in Wireless Sensor Networks

  • Bae, Dong-Ju;Choi, Wook;Kwon, Jang-Woo;Choo, Hyun-Seung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.753-775
    • /
    • 2010
  • Greedy forwarding is a key mechanism of geographic routing using distance as a metric. As greedy forwarding only uses 1-hop neighbor node information, it minimizes routing overhead and is highly scalable. In existing greedy forwarding schemes, a node selects a next forwarding node based only on the distance. However, the signal strength in a realistic environment reduces exponentially depending on the distance, so that by considering only the distance, it may cause a large number of data packet retransmissions. To solve this problem, many greedy forwarding schemes have been proposed. However, they do not consider the unreliable and asymmetric characteristics of wireless links and thus cause the waste of limited battery resources due to the data packet retransmissions. In this paper, we propose a reliable and energy-efficient opportunistic greedy forwarding scheme for unreliable and asymmetric links (GF-UAL). In order to further improve the energy efficiency, GF-UAL opportunistically uses the path that is expected to have the minimum energy consumption among the 1-hop and 2-hop forwarding paths within the radio range. Comprehensive simulation results show that the packet delivery rate and energy efficiency increase up to about 17% and 18%, respectively, compared with the ones in PRR${\times}$Distance greedy forwarding.

Intermedia Synchronization Protocol for Continuous Media Using MPEG-4 in Mobile Distributed Systems

  • Dominguez, Eduardo Lopez;Hernandez, Saul Eduardo Pomares;Gil, Pilar Gomez;Calleja, Jorge De La;Benitez, Antonio;Marin-Hernandez, Antonio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1689-1706
    • /
    • 2012
  • The preservation of temporal dependencies among a group of processes that exchange continuous media at runtime is a key issue for emerging mobile distributed systems (MDS), such as monitoring of biosignals and interactive multiuser games. Although several works are oriented to satisfy temporal dependencies, most of them are not suitable for MDSs. In general, an MDS is characterized by the absence of global references (e.g. shared memory and wall clock), host mobility, limited processing and storage capabilities in mobile hosts, and limited bandwidth on wireless communication channels. This paper proposes an asymmetric synchronization protocol to be used at runtime in an MDS without using a common reference. One main aspect of our synchronization protocol is that it translates temporal constraints to causal dependencies of the continuous media data as seen by the mobile hosts. We simulate the protocol by considering a cellular network environment and by using MPEG-4 encoders. The simulation results show that our protocol is effective in reducing the synchronization error. In addition, the protocol is efficient in terms of processing and storage costs at the mobile devices, as well as in the overhead attached per message across the wired and wireless channels.

Smart Work: Blurring Work/Nonwork Boundaries and its Consequences (스마트워크: 희미해진 업무/비업무 경계 그리고 그 결과)

  • Oh, Sangjo;Kim, Yong-Young;Lee, Heejin
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.191-198
    • /
    • 2013
  • The interests in alternative office systems and solutions (called smart work in Korea) are growing. With the lens of boundary theory, this paper tries to understand the nature of work/nonwork boundaries which smart work will be expected to blur. Boundary theory provides permeability, boundary strength, and interference as its key concepts and an empirical study is performed about the individual perception on those concepts. The result of the survey from telecommuters and/or smart work center users at the Company K shows that they perceive work/nonwork permeability, boundary strength, and interference are asymmetric. The result suggests that asymmetric nature of the work/nonwork boundaries should be taken into account when alternative office systems are brought into use.

Unsteady Single-Phase Natural Circulation Flow Mixing Prediction Using CATHARE Three-Dimensional Capabilities

  • Salah, Anis Bousbia;Vlassenbroeck, Jacques
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.466-475
    • /
    • 2017
  • Coolant mixing under natural circulation flow regime constitutes a key parameter that may play a role in the course of an accidental transient in a nuclear pressurized water reactor. This issue has motivated some experimental investigations carried out within the OECD/NEA PKL projects. The aim was to assess the coolant mixing phenomenon in the reactor pressure vessel downcomer and the core lower plenum under several asymmetric steady and unsteady flow conditions, and to provide experimental data for code validations. Former studies addressed the mixing phenomenon using, on the one hand, one-dimensional computational approaches with cross flows that are not fully validated under transient conditions and, on the other hand, expensive computational fluid dynamic tools that are not always justified for large-scale macroscopic phenomena. In the current framework, an unsteady coolant mixing experiment carried out in the Rossendorf coolant mixing test facility is simulated using the three-dimensional porous media capabilities of the thermal-hydraulic system CATHARE code. The current study allows highlighting the current capabilities of these codes and their suitability for reproducing the main phenomena occurring during asymmetric transient natural circulation mixing conditions.