• Title/Summary/Keyword: Authenticate

Search Result 292, Processing Time 0.023 seconds

Papaya: A gifted nutraceutical plant - a critical review of recent human health research

  • Karunamoorthi, Kaliyaperumal;Kim, Hyung-Min;Jegajeevanram, Kaliyaperumal;Xavier, Jerome;Vijayalakshmi, Jayaraman
    • CELLMED
    • /
    • v.4 no.1
    • /
    • pp.2.1-2.17
    • /
    • 2014
  • The plant kingdom is considered to be a repository of modern medicine, attributable to their rich source of bio-active molecules and secondary metabolites. It is indeed the Nutraceuticals that enhance immunity and ensure a healthier life because of their prophylactic and therapeutic values. Over centuries, papaya [Caricaceae; (Carica papaya Linn.)] is a renowned nutritious and medicinal plant. Each part of the papaya like root, stem, leaf, flower, fruit, seed, rinds, and latex has its own nutraceutical properties. It serves as food, cooking aid, and Ethnomedicine to prevent and treat wide-range of diseases and disorders. It has also been traditionally used as appetite enhancer, meat tenderizer, purgative, medicinal acne, abortifacient and vermifuge. Over decades, a series of scientific attempts were made to authenticate the nutraceutical properties of papaya. These studies validated that the papaya has antiplasmodial, antitrichochramal, antitrichomonal, antidengue, and anti-cancer activities. They have also exhibited that papaya possesses antiseptic, antiparasitic, anti-inflammatory, antidiabetic, and contraceptive features, and it helps in the management of sickle-cell anaemia, HIV, heart diseases and digestional disorders too. Nevertheless, the responsible bio-active molecules and their mode of actions remain indistinct and imprecise, and this calls for further pharmacological and clinical research on them. Conclusively, papaya is one of the naturally gifted plants; though its nutraceutical properties as a food or as a quasi-drug are poorly understood or undervalued by people. Accordingly, this scrutiny, demand for instigation of public health awareness campaigns to promote papaya consumption, so that the society shall acquire optimal benefits of papaya and in turn prevent and alleviate various diseases and illness.

Implementation of Ubiquitous Robot in a Networked Environment (네트워크 환경에서 유비쿼터스 로봇의 구현)

  • Kim Jong-Hwan;Lee Ju-Jang;Yang Hyun-Seng;Oh Yung-Hwan;Yoo Chang-Dong;Lee Jang-Myung;Lee Min-Cheol;Kim Myung-Seok;Lee Kang-Hee
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1051-1061
    • /
    • 2005
  • This paper proposes a ubiquitous robot, Ubibot, as an integration of three forms of robots: Software robot (Sobot), Embedded robot (Embot) and Mobile robot (Mobot). A Sobot is a virtual robot, which has the ability to move to any place or connect to any device through a network in order to overcome spatial limitations. It has the capacity to interpret the context and thus interact with the user. An Embot is embedded within the environment or within physical robots. It can recognize the locations of and authenticate the user or robot, and synthesize sensing information. Also it has the ability to deliver essential information to the user or other components of Ubibot by using various types of output devices. A Mobot provides integrated mobile service. In addition, Middleware intervenes different protocols between Sobot, Embot, and Mobot in order to incorporate them reliably. The services provided by Ubibot will be seamless, calm and context-aware based on the combination of these components. This paper presents the basic concepts and structure of Ubibot. A Sobot, called Rity, is introduced in order to investigate the usability of the proposed concepts. Rity is a 3D synthetic character which exists in the virtual world, has a unique IP address and interacts with human beings through Vision Embot, Sound Embot, Position Embot and Voice Embot. Rity is capable of moving into a Mobot and controlling its mobility. In doing so, Rity can express its behavior in the virtual world, for example, wondering or moving about in the real world. The experimental results demonstrate the feasibility of implementing a Ubibot in a networked environment.

Management Method of an Application License in the Android Platform Based on USIM (USIM 기반 안드로이드 플랫폼에서의 어플리케이션 라이센스 관리 기법)

  • Lee, Yun-Seok;Kim, Eun;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.238-248
    • /
    • 2011
  • Various services through mobile have been expanding since the development of the Smartphones. People freely communicate, remake and redistribute the information through Wi-Fi. People's freedom can cause lots of problems. There are application licenses of various types in the Android platform. However, problems about redistribution are indiscriminately distributed what can't be disentangled commercial and noncommercial use. To solve these problems, an application program has to go through procedures of license check in the Android platform. This method has two problems. One, an exact license authentication is impossible in the place where Wi-Fi does not work. The other thing, this license information is stored directly into the Smartphone. Therefore, attacks are possible about the stored license information, To solve these problems, we designed and implemented the file structure for storing the license information into USIM. We can store and authenticate them. Thus, we propose above the authentication method that can be authenticated the license authentication safely in on or off-line.

Robust 3D Model Hashing Scheme Based on Shape Feature Descriptor (형상 특징자 기반 강인성 3D 모델 해싱 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.6
    • /
    • pp.742-751
    • /
    • 2011
  • This paper presents a robust 3D model hashing dependent on key and parameter by using heat kernel signature (HKS), which is special shape feature descriptor, In the proposed hashing, we calculate HKS coefficients of local and global time scales from eigenvalue and eigenvector of Mesh Laplace operator and cluster pairs of HKS coefficients to 2D square cells and calculate feature coefficients by the distance weights of pairs of HKS coefficients on each cell. Then we generate the binary hash through binarizing the intermediate hash that is the combination of the feature coefficients and the random coefficients. In our experiment, we evaluated the robustness against geometrical and topological attacks and the uniqueness of key and model and also evaluated the model space by estimating the attack intensity that can authenticate 3D model. Experimental results verified that the proposed scheme has more the improved performance than the conventional hashing on the robustness, uniqueness, model space.

Authentication Mechanism Implementation for Information Sharing in Peer-to-Peer Environment (Peer-to-Peer 환경에서의 정보 공유를 위한 인증 메커니즘 구현)

  • Lee, Jeong-Ki;Bae, Il-Ho;Lee, Cheol-Seung;Moon, Jung-Hwan;Park, Chan-Mo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.1120-1125
    • /
    • 2002
  • According as progress by information society, computer network use and enlargement of scale are accelerated more. Also, with good physician increase of information that is exchanged through computer network, security of network is embossed to controversial point that is new. Because P2P as that remove or weakens center server function is open network that can participate between each user, problem about authentication between each users is risen. If certain user in network i3 in open environment, this user must authenticate request about service to user who is admitted between each user to limit connection. This treatise proposed method to keep security in P2P environment to solve this and designed certification mechanism that quote Kerberos certification mechanism to mechanism that can share information safety in P2P environment.

A Multi-hash Chain Scheme for Ensure Data Integirty Nodes in Wireless Sensor Network (무선 센서 네트워크에서 데이터 무결성을 보장하기 위한 다중 해쉬 체인 기법)

  • Park, Gil-Cheol;Jeong, Yoon-Su;Kim, Yong-Tae;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2358-2364
    • /
    • 2010
  • Recently, In the wireless sensor network, a study which guarantees integrity of not only data gathered from sensor node but also energy consumption of it is now going on. However, the existing study cannot guarantee data integrity and overhead of cluster head which merges data from sensor node. This paper proposes multi-path hash chain technique which guarantees integrity of merged data and reduces overhead of cluster head when cluster head merges with data transmitted from sensor node. The proposed technique forms multi-hash chain dividing main-path and assistance-path to guarantee data integrity of cluster head, when merges data. The assistance-path, which is used when main-path is not, supports integrity of sensor node while minimizing overhead of cluster head when sensor node is authenticate.

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment (모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1393-1400
    • /
    • 2017
  • As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.

Genetic Variation and Species Identification of Thai Boesenbergia (Zingiberaceae) Analyzed by Chloroplast DNA Polymorphism

  • Techaprasan, Jiranan;Ngamriabsakul, Chatchai;Klinbunga, Sirawut;Chusacultanachai, Sudsanguan;Jenjittikul, Thaya
    • BMB Reports
    • /
    • v.39 no.4
    • /
    • pp.361-370
    • /
    • 2006
  • Genetic variation and molecular phylogeny of 22 taxa representing 14 extant species and 3 unidentified taxa of Boesenbergia in Thailand and four outgroup species (Cornukaempferia aurantiflora, Hedychium biflorum, Kaempferia parviflora, and Scaphochlamys rubescens) were examined by sequencing of 3 chloroplast (cp) DNA regions (matK, psbA-trnH and petA-psbJ). Low interspecific genetic divergence (0.25-1.74%) were observed in these investigated taxa. The 50% majority-rule consensus tree constructed from combined chloroplast DNA sequences allocated Boesenbergia in this study into 3 different groups. Using psbA-1F/psbA-3R primers, an insertion of 491 bp was observed in B. petiolata. Restriction analysis of the amplicon (380-410 bp) from the remaining species with Rsa I further differentiated Boesenbergia to 2 groupings; I (B. basispicata, B. longiflora, B. longipes, B. plicata, B. pulcherrima, B. tenuispicata, B. thorelii, B. xiphostachya, Boesenbergia sp.1 and Boesenbergia sp.3; phylogenetic clade A) that possesses a Rsa I restriction site and II (B. curtisii, B. regalis, B. rotunda and Boesenbergia sp.2; phylogenetic clade B and B. siamensis; phylogenetic clade C) that lacks a restriction site of Rsa I. Single nucleotide polymorphism (SNP) and indels found can be unambiguously applied to authenticate specie-origin of all investigated samples and revealed that Boesenbergia sp.1, Boesenbergia sp.2 and B. pulcherrima (Mahidol University, Kanchanaburi), B. cf. pulcherrima1 (Prachuap Khiri Khan) and B. cf. pulcherrima2 (Thong Pha Phum, Kanchanaburi) are B. plicata, B. rotunda and B. pulcherrima, respectively. In addition, molecular data also suggested that Boesenbergia sp.3 should be further differentiated from B. longiflora and regarded as a newly unidentified Boesenbergia species.

Development of Duplex PCR Method for Simultaneous Detection of Rabbit (Oryctolagus cuniculus) and Cat (Felis catus) Meats (Duplex PCR을 이용한 토끼(Oryctolagus cuniculus)와 고양이(Felis catus) 육류의 동시 검출법 개발)

  • Hong, Yeun;Kim, Mi-Ju;Yang, Seung-Min;Yoo, In-Suk;Kim, Hae-Yeong
    • Journal of Applied Biological Chemistry
    • /
    • v.58 no.4
    • /
    • pp.383-387
    • /
    • 2015
  • A duplex polymerase chain reaction (PCR) detection method was developed to authenticate the use of cat and rabbit in food and to prevent unlawful distribution of illegally butchered meat in both domestic and imported food market. Species-specific primers were designed targeting mitochondrial cytochrome b gene. The sizes of PCR products were 191 bp for cat and 101 bp for rabbit, which were relatively small for better application of the detection method on processed foods. Specificities of primers were verified using 21 animal species including cat and rabbit. Limit of detection was examined by serial dilution of the sample DNA and confirmed as 0.005 ng for rabbit and 0.0005 ng for cat using Bioanalyzer. The developed duplex PCR method showed specificity and sensitivity in the identification of two target species.

ECbA(Elliptic Curve based Authentication) System on the wireless network environment (무선 네트워크 환경에서의 ECbA(Elliptic Curve based Authentication)시스템 설계)

  • Jeong, Eun-Hee;Yang, Seung-Hae;Kim, Hak-Chun;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.1
    • /
    • pp.67-74
    • /
    • 2008
  • As wireless network market is increasing rapidly, the biggest issue is to transfer safe data and to authenticate users. This paper proposes ECbA(Elliptic Curve based Authentication) which consists of the mutual authentication mechanism that users can ascertain the identity of an authentication server and the user authentication mechanism that an authentication server can make sure users' identity, by using Elliptic Curve algorithms. The proposed ECbA system diminishes the message quantity and the execution time by using the small elliptic curve algorithm with the small key length in authentication. In addition, as this paper reduces the authentication steps of existing EAP_TLS into 6 authentication steps, the communication cost and mutual authentication time can be saved. As this paper distributes new keys, whenever authenticating users by using key exchange mechanism, it provides safe encryption communication and prevents DoS attack by controlling the users authentication request by authentication server.

  • PDF