• Title/Summary/Keyword: Internet division

Search Result 1,455, Processing Time 0.027 seconds

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

A Study on the Cognitive/Affective Personality and Experiential Factors Influencing on Smart Phone Users' Emotional Exhaustion and Education Performance (스마트폰 이용자의 정서적 소진과 학습 성과에 영향을 주는 인지·감성 성향과 사용 경험에 관한 연구)

  • Ming-Yuan Sun;Sundong Kwon;Yong-Young Kim
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.69-88
    • /
    • 2016
  • Nowadays, organizations have adopted Smart Work to efficiently manage tasks, such as electronic document approval, customer management, and site inspection, without spatial-temporal constraints. Smartphones, which are commonly used in Smart Work, enable individuals to perform their jobs anytime and anywhere, thus blurring the boundary between work and non-work. To solve the problem of blurred work/non-work boundaries, a construct of self-control and affective factors needs to be considered because business style is changed from command to autonomy in the Smart Work context. Moreover, employees can convey their emotions easily over smartphones. Recent marketing studies have analyzed consumers' behavior based on the combination of cognitive, affective, and behavioral components, and researchers of information systems are also interested in these factors. However, previous research has some limitations, such as not classifying factors into cognitive, affective, and behavioral as well as not covering all three factors. Therefore, we explore the roles of cognitive, affective, and behavioral components in emotional exhaustion and education performance, and conduct a survey on undergraduate and graduate students, who are the major users of smartphones. Findings show that when individuals improve their cognitive capability (self-control) and usage experience (smartphone communication and internet usage), they can decrease emotional exhaustion and increase education performance. In the role of affective capability, increasing education performance is partially accepted. These results imply that organizations should not focus on controlling the usage of smartphones but on promoting appropriate smartphone usage.

With Corona Era, exploring policy measures to prevent non-face-to-face lonely deaths - Focusing on Daegu Metropolitan City's AI and IOT cases of lonely death prevention (With 코로나 시대 비대면 고독사 예방정책 방안 모색 - 대구광역시 AI, IOT 고독사 예방 사례를 중심으로)

  • Ha-Yoon Kim;Tai-Hyun Ha
    • Journal of Digital Convergence
    • /
    • v.21 no.3
    • /
    • pp.49-62
    • /
    • 2023
  • Due to social and cultural changes and the growth of aging people living as a single because of aging, lonely deaths are steadily increasing, and each local government has begun to define them as a social problem. The legal basis began to be established. In order to explore policy measures to prevent lonely deaths, this study examined cases of lonely death prevention policies using smart digital information technology (AI, IOT), which is being promoted by Daegu Metropolitan City to promote non-face-to-face policies to prevent lonely deaths. Policies related to lonely deaths are divided into two axes: lonely death prevention projects and post-excavation support projects. In order to operate these businesses efficiently, the provision of non-face-to-face services through artificial intelligence and the Internet of Things is recognized as a new service delivery system, so the importance and necessity of non-face-to-face services is increasing. It is time that multifaceted changes and preparations are needed, such as establishing a system to expand the non-face-to-face industry at the national level. In order to respond to another national disaster situation in the future, the non-face-to-face smart care system is being expanded in various welfare policies such as preventing lonely deaths. It will have to be activated.

Recent Trends of Immunologic Studies of Herbal Medicine on Rheumatoid Arthritis (류마티스 관절염에 대한 한약의 면역학적 연구동향)

  • Choi, Do-young;Lee, Jae-dong;Back, Yong-hyeon;Lee, Song-shil;Yoo, Myung-chul;Han, Chung-soo;Yang, Hyung-in;Park, Sang-do;Ryu, Mi-hyun;Park, Eun-kyung;Park, Dong-seok
    • Journal of Acupuncture Research
    • /
    • v.21 no.4
    • /
    • pp.177-196
    • /
    • 2004
  • Objective : Rheumatoid arthritis is an autoimmune disease that pathogenesis is not fully understood and one of the most intractable musculoskeletal diseases. The concern in the immunopathogenesis of rheumatoid arthritis has been increased since 1980's and many immunotherapeutic agents including disease-modifying antirheumatic drugs (DMARDs) were developed and became the mainstay of treatment of rheumatoid arthritis. However, the cure of the disease has hardly been achieved. In oriental medicine, rheumatoid arthritis is related to Bi-Zheng(痺證), that presents pain, swelling, andlor loss of joint function as major clinical manifestations, and also known to be deeply involved in suppression of immune function related to weakness of Jung-Ki(正氣). The herbal medicine, empirically used, could be a potential resource of development of new immunotherapeutic agents for rheumatoid arthritis. Methods : We developed a search strategy using terms to include "rheumatoid arthritis and herbal medicine" combined with "Chinese medicine" and/or "Oriental medicine". The search was focused on experimental studies of herbal medicine (January 1999 to May 2004), which is known to have effects on immune function of patients with rheumatoid arthritis. Computerized search used Internet databases including KISS and RISS4U (Korea), CNKI (China), MOMJ (Main Oriental Medicine Journal, Japan), and PubMed. The articles were selected from journals of universities or major research institutes. Results : The literature search for experimental studies on effects of herbal medicine on immunity of rheumatoid arthritis retrieved a total of 21 articles (Korea; 8, China ; 12, Japan ; 1). Of 21 articles, 10 were related to single-drug formula, 2 to drug interaction, and 9 to multi-drug formula. Single-drug formula was mainly used for aqua-acupuncture and researches on active components. Studies of drug interaction emphasized harmony of Ki-Hyul(氣血) and balance of Han-Yeul(寒熱). Multi-drug regimen was mainly found among formulas for Bo-Ki-Hyul(補氣血) and Bo-Sin(補腎). Conclusion : Studies on rheumatoid arthritis were performed both in vitro and in vivo in vitro study, LPS-stimulated splenocytes and synoviocytes were treated with herbal medicine, resulting in proliferation and activation of immune cells and suppression of cytokine activities in vivo study CIA animal model demonstrated that herbal medicine decreased antibody production and improved function of immune cells. In cellular and molecular study herbal medicine showed profound effects on the level of mRNA expression of certain cytokines related to immune function. This study revealed that herbal medicine has significant immune modulatory action and could be used for recovery of immune dysfunction of rheumatoid arthritis patients.

  • PDF

The Analysis for Minimum Infective Dose of Foodborne Disease Pathogens by Meta-analysis (메타분석에 의한 식중독 원인 미생물들의 최소감염량 분석)

  • Park, Myoung Su;Cho, June Ill;Lee, Soon Ho;Bahk, Gyung Jin
    • Journal of Food Hygiene and Safety
    • /
    • v.29 no.4
    • /
    • pp.305-311
    • /
    • 2014
  • Minimum infective dose (MID) data has been recognized as an important and absolutely needed in quantitative microbiological assessment (QMRA). In this study, we performed a comprehensive literature review and meta-analysis to better quantify this association. The meta-analysis applied a final selection of 82 published papers for total 12 species foodborne disease pathogens (bacteria 9, virus 2, and parasite 1 species) which were identified and classified based on the dose-response models related to QMRA studies from PubMed, ScienceDirect database and internet websites during 1980-2012. The main search keywords used the combination "food", "foodborne disease pathogen", "minimum infective dose", and "quantitative microbiological risk assessment". The appropriate minimum infective dose for B. cereus, C. jejuni, Cl. perfringens, Pathogenic E. coli (EHEC, ETEC, EPEC, EIEC), L. monocytogenes, Salmonella spp., Shigella spp., S. aureus, V. parahaemolyticus, Hepatitis A virus, Noro virus, and C. pavum were $10^5cells/g$ (fi = 0.32), 500 cells/g (fi = 0.57), $10^7cells/g$ (fi = 0.56), 10 cells/g (fi = 0.47) / $10^8cells/g$ (fi = 0.71) / $10^6cells/g$ (fi = 0.70) / $10^6cells/g$ (fi = 0.60), $10^2{\sim}10^3cells/g$ (fi = 0.23), 10 cells/g (fi = 0.30), 100 cells/g (fi = 0.32), $10^5cells/g$ (fi = 0.45), $10^6cells/g$ (fi = 0.64), $10{\sim}10^2particles/g$ (fi = 0.33), 10 particles/g (fi = 0.71), and $10{\sim}10^2oocyst/g$ (fi = 0.33), respectively. Therefore, these results provide the preliminary data necessary for the development of foodborne pathogens QMRA.

A Study on Dose-Response Models for Foodborne Disease Pathogens (주요 식중독 원인 미생물들에 대한 용량-반응 모델 연구)

  • Park, Myoung Su;Cho, June Ill;Lee, Soon Ho;Bahk, Gyung Jin
    • Journal of Food Hygiene and Safety
    • /
    • v.29 no.4
    • /
    • pp.299-304
    • /
    • 2014
  • The dose-response models are important for the quantitative microbiological risk assessment (QMRA) because they would enable prediction of infection risk to humans from foodborne pathogens. In this study, we performed a comprehensive literature review and meta-analysis to better quantify this association. The meta-analysis applied a final selection of 193 published papers for total 43 species foodborne disease pathogens (bacteria 26, virus 9, and parasite 8 species) which were identified and classified based on the dose-response models related to QMRA studies from PubMed, ScienceDirect database and internet websites during 1980-2012. The main search keywords used the combination "food", "foodborne disease pathogen", "dose-response model", and "quantitative microbiological risk assessment". The appropriate dose-response models for Campylobacter jejuni, pathogenic E. coli O157:H7 (EHEC / EPEC / ETEC), Listeria monocytogenes, Salmonella spp., Shigella spp., Staphylococcus aureus, Vibrio parahaemolyticus, Vibrio cholera, Rota virus, and Cryptosporidium pavum were beta-poisson (${\alpha}=0.15$, ${\beta}=7.59$, fi = 0.72), beta-poisson (${\alpha}=0.49$, ${\beta}=1.81{\times}10^5$, fi = 0.67) / beta-poisson (${\alpha}=0.22$, ${\beta}=8.70{\times}10^3$, fi = 0.40) / beta-poisson (${\alpha}=0.18$, ${\beta}=8.60{\times}10^7$, fi = 0.60), exponential (r=$1.18{\times}10^{-10}$, fi = 0.14), beta-poisson (${\alpha}=0.11$, ${\beta}=6,097$, fi = 0.09), beta-poisson (${\alpha}=0.21$, ${\beta}=1,120$, fi = 0.15), exponential ($r=7.64{\times}10^{-8}$, fi = 1.00), betapoisson (${\alpha}=0.17$, ${\beta}=1.18{\times}10^5$, fi = 1.00), beta-poisson (${\alpha}=0.25$, ${\beta}=16.2$, fi = 0.57), exponential ($r=1.73{\times}10{-2}$, fi = 1.00), and exponential ($r=1.73{\times}10^{-2}$, fi = 0.17), respectively. Therefore, these results provide the preliminary data necessary for the development of foodborne pathogens QMRA.

Development of Method using LC-ESI-MS/MS and KASP for Identification of Gymnema sylvestre in Food (식품에서 당살초 판별을 위한 LC-ESI-MS/MS 분석법과 KASP 마커 개발)

  • Park, Boreum;Lee, Sun Hee;Eom, Kwonyong;Noh, Eunyoung;Moon Han, Kyoung;Hwang, Jinwoo;Kim, Hyungil;Baek, Sun Young
    • Journal of Food Hygiene and Safety
    • /
    • v.37 no.2
    • /
    • pp.46-54
    • /
    • 2022
  • Known for its effectiveness in weight loss and diabetes prevention, Gymnema sylvestre products can be found in the US, Japanese, and Indian markets. However, the recommended dosage or safety of these products has not yet been proven. Therefore, development of an analytical method for detecting the content of Gymnema sylvestre in food products is required. Accordingly, this study proposes an analysis method that can examine Gymnema sylvestre in food using LC-ESI-MS/MS and KASP (Kompetitive Allele-Specific PCR) markers. In LC-ESI-MS/MS, a simultaneous analysis method for gymnemic acid and deacylgymnemic acid was optimized using negative ionization mode, and its validation test was completed for solid and liquid samples. In addition, KASP markers were prepared by finding the specific SNP of G. sylvestre in ITS2 and matK through DNA barcodes. The two KASP markers returned positive FAM fluorescence result when combined with G. sylvestre, and this aspect was confirmed in raw G. sylvestre as well. The applicability of the method was tested on 21 different food and healthy functional products containing G. sylvestre purchased on the internet. As a result, although there was a difference in the ratios of gymnemic acid and deacylgymnemic acid in LC-ESI-MS/MS, the index component was detected in all 21 products samples. In the KASP analysis, 9 products returned positive FAM result, and the rest of the products were found to be containing G. sylvestre extract. This study is the first study to use the dual system of LC-ESI-MS/MS and KASP for the analysis of G. sylvestre. The study has confirmed that these two methods are applicable to the examine G. sylvestre content in food products.

An Examination into the Illegal Trade of Cultural Properties (문화재(文化財)의 국제적 불법 거래(不法 去來)에 관한 고찰)

  • Cho, Boo-Keun
    • Korean Journal of Heritage: History & Science
    • /
    • v.37
    • /
    • pp.371-405
    • /
    • 2004
  • International circulation of cultural assets involves numerous countries thereby making an approach based on international law essential to resolving this problem. Since the end of the $2^{nd}$ World War, as the value of cultural assets evolved from material value to moral and ethical values, with emphasis on establishing national identities, newly independent nations and former colonial states took issue with ownership of cultural assets which led to the need for international cooperation and statutory provisions for the return of cultural assets. UNESCO's 1954 "Convention for the Protection of Cultural Property in the Event of Armed Conflict" as preparatory measures for the protection of cultural assets, the 1970 "Convention on the Means of Prohibiting and Preventing the Illicit Import and Transfer of Ownership of Cultural Property" to regulate transfer of cultural assets, and the 1995 "Unidroit Convention on Stolen or Illegally Exported Cultural Objects" which required the return of illegally acquired cultural property are examples of international agreements established on illegal transfers of cultural assets. In addition, the UN agency UNESCO established the Division of Cultural Heritage to oversee cultural assets related matters, and the UN since its 1973 resolution 3187, has continued to demonstrate interest in protection of cultural assets. The resolution 3187 affirms the return of cultural assets to the country of origin, advises on preventing illegal transfers of works of art and cultural assets, advises cataloguing cultural assets within the respective countries and, conclusively, recommends becoming a member of UNESCO, composing a forum for international cooperation. Differences in defining cultural assets pose a limitation on international agreements. While the 1954 Convention states that cultural assets are not limited to movable property and includes immovable property, the 1970 Convention's objective of 'Prohibiting and preventing the illicit import, export and transfer of ownership of cultural property' effectively limits the subject to tangible movable cultural property. The 1995 Convention also has tangible movable cultural property as its subject. On this point, the two conventions demonstrate distinction from the 1954 Convention and the 1972 Convention that focuses on immovable cultural property and natural property. The disparity in defining cultural property is due to the object and purpose of the convention and does not reflect an inherent divergence. In the case of Korea, beginning with the 1866 French invasion, 36 years of Japanese colonial rule, military rule and period of economic development caused outflow of numerous cultural assets to foreign countries. Of course, it is neither possible nor necessary to have all of these cultural properties returned, but among those that have significant value in establishing cultural and historical identity or those that have been taken symbolically as a demonstration of occupational rule can cause issues in their return. In these cases, the 1954 Convention and the ratification of the first legislation must be actively considered. In the return of cultural property, if the illicit acquisition is the core issue, it is a simple matter of following the international accords, while if it rises to the level of diplomatic discussions, it will become a political issue. In that case, the country requesting the return must convince the counterpart country. Realizing a response to the earnest need for preventing illicit trading of cultural assets will require extensive national and civic societal efforts in the East Asian area to overcome its current deficiencies. The most effective way to prevent illicit trading of cultural property is rapid circulation of information between Interpol member countries, which will require development of an internet based communication system as well as more effective deployment of legislation to prevent trading of illicitly acquired cultural property, subscription to international conventions and cataloguing collections.

Development of Detection Method for Oilfish (Ruvettus pretiosus and Lepidocybirium flavobrunneum) as a Food Materials not Usable in Foods (식품원료로 사용금지 대상인 기름치 (기름갈치꼬치 및 흑갈치꼬치) 판별법 개발)

  • Park, Yong-Chjun;Kim, Mi-Ra;Jung, Yong-Hyun;Shin, Joon-Ho;Kim, Kyu-Heon;Lee, Jae-Hwang;Cho, Tae-Yong;Lee, Hwa-Jung;Lee, Sang-Jae;Han, Sang-Bae
    • Journal of Food Hygiene and Safety
    • /
    • v.28 no.1
    • /
    • pp.50-55
    • /
    • 2013
  • Since 1 June 2012, it is prohibited to sell oilfish as a food material but there are still many illegal cases of selling oilfish as if it is tuna or grilled Patagonian toothfish. So it is absolutely crucial to construct the system to distinguish the real food material from oilfish. There are two sorts of oil fish called Ruvettus pretiosus and Lepidocybirium flavobrunneum involved in Percifomes order and Gempylidae class. 16S DNA gene region in mitochondria was selected to design the specific primers. For design species-specific primer, the theoretical experiment were performed for the sequences of R. pretiosus, L. flavobrunneum, Thunnus thynnus, Thunnus albacores, Makaira mitsukurii and Xiphias gladius, registered at the Gene bank from the National Centre for Biotechnology Information, using BioEdit 7.0.9.0. program. Through the analysis of the result from experiments, it was possible to design the 4 kinds of primers to distinguish R. pretiosus and L. flavobrunneum. As a comparison group, 3 kinds of tuna and 4 kinds of billfishes were selected and experimental verification was performed. As a result, for R. pretiosus and L. flavobrunneum, R.P-16S-006-F/R.P-16S-008-R and L.F-16S-004-F/L.F-16S-006-R primers were selected eventually and PCR condition was established. In addition, 178bp and 238bp of PCR products were confirmed from the established condition and non-specific band was not amplified among similar species. Therefore, the species-specific primers developed in this study would be very useful and used in various ways such as internet shopping mall and illegal distributions with fast and scientific results.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.