• Title/Summary/Keyword: Light client

Search Result 37, Processing Time 0.028 seconds

A chaperone surveillance system in plant circadian rhythms

  • Cha, Joon-Yung;Khaleda, Laila;Park, Hee Jin;Kim, Woe-Yeon
    • BMB Reports
    • /
    • v.50 no.5
    • /
    • pp.235-236
    • /
    • 2017
  • The circadian clock is an internal system that is synchronized by external stimuli, such as light and temperature, and influences various physiological and developmental processes in living organisms. In the model plant Arabidopsis, transcriptional, translational and post-translational processes are interlocked by feedback loops among morning- and evening-phased genes. In a post-translational loop, plant-specific single-gene encoded GIGANTEA (GI) stabilize the F-box protein ZEITLUPE (ZTL), driving the targeted-proteasomal degradation of TIMING OF CAB EXPRESSION 1 (TOC1) and PSEUDO-RESPONSE REGULATOR 5 (PRR5). Inherent to this, we demonstrate the novel biochemical function of GI as a chaperone and/or co-chaperone of Heat-Shock Protein 90 (HSP90). GI prevents ZTL degradation as a chaperone and facilitates ZTL maturation together with HSP90/HSP70, enhancing ZTL activity in vitro and in planta. GI is known to be involved in a wide range of physiology and development as well as abiotic stress responses in plants, but it could also interact with diverse client proteins to increase protein maturation. Our results provide evidence that GI helps proteostasis of ZTL by acting as a chaperone and a co-chaperone of HSP90 for proper functioning of the Arabidopsis circadian clock.

Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment (무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안)

  • Song, Il-Gyu;Hong, Choong-Seon;Lee, Dae-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.219-228
    • /
    • 2004
  • Wireless LAN(wireless Local Area Network) is constructed network environment by radio in indoors or outdoors environment and that to use electric wave or light instead of wire to client such as PC(Personal Computer), notebook, PDA in hub(Hub) in technological side. Now, among IEEE 802.11 WG(Working Group), there is TGf(Task Group F) that develop standard protocol between AP's(Access Point). In this group, proposed IAPP(Inter Access Point Protocol) to secure interoperability between AP producing in different manufacturer, this offers seamless connectivity between STA by sharing Security Context information or Layer 2 forwarding information between AP without passing through re-authentication process when STAs(Station) move by protocol to secure mobility between AP that differ in equal serve network. In this paper, I wish to suggest method that change avenue of communication of message to block information leakage that can occur at security message or WEP Key transmission between above AP, and uses public key to offer wireless area security little more.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

Agricultural Extension Systems in the Coming Years on the Question of Models and Approaches (농업여건 변화에 부응하는 농촌지도기구의 개편방안)

  • Kang, Jae-Tae
    • Journal of Agricultural Extension & Community Development
    • /
    • v.3 no.1
    • /
    • pp.67-81
    • /
    • 1996
  • Our agricultural extension system with all its success and failures, rewards and punishment was introduced 50 years ago with particular reference from United States. Some of the established principles and policies of effective extension work were shaken off for immediate result. But the results were not praiseworthy. The purpose of this study is to throw some light on the question of systems and approaches on agricultural extension that can adequately meet the challenges of the future. Our extension system is `special government type` which administers a nation-wide network of extension and training services in close collaboration with that of the experiment station. This type, however, has innate weakness which inclined to be standardized, inflexible, and irrelevant to actual needs of farming communities and problems of farmers. In this regard, it is necessary to consider another approaches of agricultural extension: `Government Type`, `Agricultural University`, `Farmers Organization`. The characteristics features, advantages and disadvantages of these models have been discussed. Each model has been found wanting in one way or another to meet the needs and interest of the present Korean situation. In view of the agricultural situation, and considering the expected changes of farmers and technologies in the years ahead, the `modification (especially to the direction of provincial government) of preset system` was expected which would be operationally flexible and organizationally unified and decentralized. The modification of present system should include the following characteristics: 1) universal contact with client system, 2) local planning based on the needs of clients, 3) using multiple method of nonformal education, 4) fitting with both general and specialized farming systems, 5) accommodating variable clients, technologies and educational objects.

  • PDF

Light-Weight Password-Based Authenticated Key Exchange for Two Users using Different Passwords (서로 다른 패스워드를 사용하는 두 사용자를 위한 경량 패스워드 기반 키 교환 프로토콜)

  • Kwon, Jeong-Ok;Kim, Ki-Tak;Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.17-30
    • /
    • 2008
  • In the paper, we consider password-based authenticated key exchange with different passwords, where the users do not share a password between themselves, but only with the server. The users make a session key using their different passwords with the help of the server. We propose an efficient password-based authenticated key exchange protocol with different passwords which achieves forward secrecy without random oracles. In fact this amount of computation and the number of rounds are comparable to the most efficient password-based authenticated key exchange protocol in the random oracle model. The protocol requires a client only to memorize a human-memorable password, and all other information necessary to run the protocol is made public.

Characterization of Phenotypic Traits and Evaluation of Glucosinolate Contents in Radish Germplasms (Raphanus sativus L.)

  • Kim, Bichsaem;Hur, Onsook;Lee, Jae-Eun;Assefa, Awraris Derbie;Ko, Ho-Cheol;Chung, Yun-Jo;Rhee, Ju-hee;Hahn, Bum-Soo
    • Korean Journal of Plant Resources
    • /
    • v.34 no.6
    • /
    • pp.575-599
    • /
    • 2021
  • The edible roots of radish (Raphanus sativus L.) are consumed worldwide. For characterization and evaluation of the agronomic traits and health-promoting chemicals in radish germplasms, new germplasm breeding materials need to be identified. The objectives of this study were to evaluate the phenotypic traits and glucosinolate contents of radish roots from 110 germplasms, by analyzing correlations between 10 quantitative phenotypic traits and the individual and total contents of five glucosinolates. Phenotypic characterization was performed based on descriptors from the UPOV and IBPGR, and glucosinolate contents were analyzed using liquid chromatography-tandem mass spectrometry in multiple reaction monitoring mode (MRM). Regarding the phenotypic traits, a significant correlation between leaf length and root weight was observed. Glucoraphasatin was the main glucosinolate, accounting for an average of 71% of the total glucosinolates in the germplasms; moreover, its content was significantly correlated with that of glucoerucin, its precursor. Principal component analysis indicated that the 110 germplasms could be divided into five groups based on their glucosinolate contents. High levels of free-radical scavenging activity (DPPH) were observed in red radishes. These results shed light on the beneficial traits that could be targeted by breeders, and could also promote diet diversification by demonstrating the health benefits of various germplasms.

Blockchain Interoperability Mechanism (블록체인 상호호환성 메커니즘)

  • Zhou, Qing;Lee, Young-seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1676-1686
    • /
    • 2021
  • In this paper, we propose a general cross-chain solution based on the idea of modularity, abstraction, and layering, which decoupling the cross-chain function from the consensus algorithm and specific application logic, and utilize a Merkle proof to ensure the validity and legality of cross-chain operations. Since the underlying implementations of homogeneous and heterogeneous blockchains are different, we treat them separately. For homogeneous blockchains, we suggest a TCP-like cross-chain transport protocol (CCTP). While for heterogeneous blockchains, we present a method to construct the relay chain to realize the cross-chain function. The proposed scheme can enable the correct, effective, reliable, orderly, and timely transmission of cross-chain data. However, the essential difference between the operations within a single blockchain and the interoperability between different blockchains is that the trust domain is different. Cross-chain interoperation itself breaks the completeness of the blockchain, therefore, some efficiency and safety must sacrifice to trade-off.

A Study of Nursing Care Satisfaction and the Image of Nurses As Compared Between Home Health Care and Hospitalized Clients (가정간호대상자와 입원간호대상자의 간호만족도 및 간호사이미지 비교)

  • Yong, Jin-Sun;Han, Sung-Suk;Yoo, In-Ja;Hong, Hyun-Ja
    • Journal of Home Health Care Nursing
    • /
    • v.9 no.1
    • /
    • pp.14-26
    • /
    • 2002
  • The purpose of the study was to compare both the nursing care satisfaction and the image of nurses as experienced by home health care clients and hospitalized clients. For the descriptive survey study. data were collected from 69 home heath care clients and 342 in-patients in a university hospital. The tools used for the study were modified by Quality Patient Care Scale(Wandelt & Ager. 1974) and Image of Nurses (송인자, 1993). The data were analyzed using Pearson Correlation. Scheffe test. factor analysis. t-test. and ANOVA. The major findings were as follows: Regarding nursing care satisfaction, the mean score of total nursing care satisfaction in home health care clients was 3.28 out of 4.0. Among five domains, the domain with the highest score was the psychosocial domain, followed by the general. the professional. the physical. and the communication domain. The level of nursing care satisfaction was not significantly different according to demographic variables except for age: the age group of 41-60 showed the highest score (p<0.05). The mean score of total nursing care satisfaction in hospitalized clients was 2.95 out of 4.0. Among five domains, the domain with the highest score was the psychosocial domain, followed by the physical and the communication. the professional. and the general domain. The level of nursing care satisfaction was not significantly different according to demographic variables except age: the higher the age the higher the score (p<0.05). The levels of nursing care satisfaction in all five domains were significantly higher in home health care clients than in hospitalized clients(p=0.0005). Regarding image of nurses, the mean score of total image of nurses in home health care clients was 3.32 out of 4.0. Among four domains, the domain with the highest score was the sincerity domain, followed by the kindness. the spirit. and the knowledge and skill domain. The level of image of nurses was not significantly different according to demographic variables. The mean score of total image of nurses in hospitalized clients was 3.05 out of 4.0. Among four domains. the domain with the highest score was the sincerity domain, followed by the kindness, the knowledge and skill, and the spirit domain. The level of image of nurses was not significantly different according to demographic variables. The levels of image of nurses in all four domains were significantly higher in home health care clients than in hospitalized clients (p=0.001). Both the levels of nursing care satisfaction and image of nurses, part of an evaluation for quality of nursing care were significantly higher in home health care clients than in hospitalized clients. In light of the findings, we could consider that home health care nurses provided client-centered comprehensive nursing care. However, nurses need to have methods that more promote the social recognition of the image of nurses and nursing care services as well as professional knowledge and skills.

  • PDF

Gateway Architecture for Ubiquitous Access to ZigBee-Based Sensor Networks (ZigBee 기반 센서 네트워크로의 유비쿼터스 접근을 위한 게이트웨이 아키텍처)

  • Heo, Ung;Peng, Qiu;You, Kang-Soo;Choi, Jae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.8
    • /
    • pp.73-83
    • /
    • 2010
  • This paper investigates protocol architecture of a Web-ZigBee gateway for interconnecting TCP/IP-based networks and ZigBee/IEEE802.15.4-based wireless sensor networks. The Web-ZigBee gateway delivers data between the TCP/IP network and the ZigBee network. Since those two networks have different communication protocols, a protocol translation mechanism is needed. Herein, we propose a method to deliver query messages from the Internet to the sensor network and receive data from sensors. The protocol translation is performed in the translation layer that is placed above the two application layers, i.e., the Internet application layer and ZigBee application layer. Among various interfaces, we use CGI programming to take care of translation functions efficiently. The CGI manages query information from a client on the Internet and data from the ZigBee sensor network. Whereas the TCP/IP enabled sensor network overlays two heterogeneous communication protocols, overlaying layers increase the complexity and cost of implementing the sensor network. On the contrary, the sensors in our gateway-based system are not only light (because each communication protocol works independently without overlaying), but also efficient because the translation layer mostly alleviates header overloading.

Design of a Service Broker for Large Scale Connections to Support Pubsub QoS between TOS and Mobile Devices (TOS와 Mobile device 간의 펍섭 QoS를 지원하는 대량 커넥션 서비스 브로커 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.137-142
    • /
    • 2016
  • A two-step open system(TOS) was proposed to relay between a healing platform and a repository of personal health documents. TOS was designed by taking into consideration the pubsub service based on large scale connections to monitor a provider's access/request process for health documents in real time. TOS, however, uses WebSocket as a communication protocol in case of pubsub. Given the operational environment of low quality wireless networks for mobile devices that are user terminals in a healing platform, there is a need to add a messaging protocol to support QoS as well as a transmission protocol. As a light messaging protocol optimized for mobile devices, MQTT defines reliable messaging QoS to consider a wireless network situation of low speed/low quality. This study designed an MQTT protocol-based message broker to support QoS in case of large scale connections and pubsub by taking into consideration mobile devices that are user terminals in a healing platform. After designing a model between TOS and MQTT message broker, the study implemented a prototype based on the proposed design and compared it with its counterparts from previous studies based on the performance indicators in a load-test with the MQTT client tool.