• 제목/요약/키워드: M2M technologies

검색결과 651건 처리시간 0.033초

양이온성 지질이 포함된 PEG 리포솜의 세포내 이입 및 항암효력 평가 (Intracellular delivery and anti-tumor activity of polyethyleneglycol liposomes containing cationic lipid)

  • 정순화;김성규;정석현;성하수;조선행;신병철
    • Journal of Pharmaceutical Investigation
    • /
    • 제38권3호
    • /
    • pp.163-169
    • /
    • 2008
  • Liposomes are spherical vesicles composed of lipid bilayer membranes. However, the conventional liposomes have been found to be plagued by rapid opsonization and taken up by the reticuloendothelial system (RES), resulting in shortened circulation time and limited intracellular uptake to target cell. In this study, polyethyleneglycol-cationic liposomes (PCL) containing cationic lipid and DSPE-mPEG were prepared by thin film cast-hydration method. The PEG liposomes had approximately $97.0{\pm}1.3\;nm$ of mean particle diameter and $-21.7{\pm}1.2\;mV$ of zeta potential value. PCL had $96.4{\pm}1.8\;nm$ of mean particle diameter and $-8.7{\pm}1.1\;mV$ of zeta potential value with a decrease of about 10 mV compared to the PEG liposomes. Loading of model drug, doxorubicin (DOX), in liposomes were carried out by using remote loading method and the loading efficiency of DOX in liposomes was about $95.0{\pm}1.9%$. Intracellular uptake and cytotoxicity of PCL were higher than that of PEG liposomes to murine B16F10 melanoma cells. In addition, anti-tumor activity of PCL was similar to that of PEG liposomes on growth of A549 human lung carcinoma in BALB/c mice. Consequently, PCL modified with cationic lipid may be applicable as anticancer drug carriers that can increase intracellular uptake and therapeutic efficacy.

업무용 탄소제로건물의 적용기술 및 효과 (Applied Technologies and Effects for the Carbon Zero Office Building)

  • 이재범;홍성철;백남춘;최진영;홍유덕;이석조;이동원
    • 한국기후변화학회지
    • /
    • 제2권4호
    • /
    • pp.283-295
    • /
    • 2011
  • 기후변화에 대응하기 위한 온실가스 감축활동이 국 내외적으로 활발히 이루어지고 있다. 우리나라의 온실가스 감축에 있어서 건물부문의 온실가스 감축은 매우 중요한 부분이다. 2007년 기준 온실가스 총 배출량 610 백만톤 $CO_2e$ 중 건물이 차지하는 비중은 약 23%이며, 감축잠재량은 산업 부문에 이어 두 번째로 큰 수준이다. 본 연구는 향후 건물부문의 온실가스 감축 대책으로 추진될 "탄소제로건물" 건립에 필요한 기반자료를 제공하고자, 국내 최초로 지어진 업무용 "탄소제로 건물"인 국립환경과학원 기후변화연구동에 적용된 주요 기술, 에너지 부하 및 절감 에너지양, 경제성 평가를 수행하였다. 본 건물에 적용된 기술은 총 66가지로, 건물에너지 부하절감기술(30), 건물에너지 효율기술(18), 신 재생에너지 기술(13), 친환경 요소기술(5)이 적용되었다. 연간 총 에너지 부하($123.8kWh/m^2$)는 단열 강화와 고효율 설비 적용 등의 패시브 기술을 통해 40%($49kWh/m^2$) 절감하였으며, 잔여 에너지 부하인 60%($74.8kWh/m^2$)는 태양광, 태양열, 지열을 이용한 액티브 기술로 절감하였다. 건축비용은 일반건물 대비 약 1.4배 더 소요되었으나 액티브 기술을 제외하고 패시브 기술만 적용하게 되면 일반건물의 건축비용과 큰 차이를 보이지 않는 것으로 분석되었다. 건물에서 감축될 수 있는 온실가스양은 연간 $100ton{\cdot}CO_2e$ 수준이며, 에너지 자립으로 인한 연간 에너지 절감 비용은 약 102백만원, 온실가스와 대기오염물질 감축에 따른 부수적 수익은 연간 약 2.2 백만원 수준인 것으로 분석되었다. 또한, Life Cycle Cost (LCC) 분석 결과, 일반건물 대비 초과건축 비용에 대한 손익분기점은 20.6년으로 나타났다.

M2M/IoT의 동향과 보안위협

  • 김영훈;양준근;김학범
    • 정보보호학회지
    • /
    • 제24권6호
    • /
    • pp.48-59
    • /
    • 2014
  • M2M(Machine-to-Machine)/IoT(Internet of Things)는 기계 간의 통신 및 사람이 동작하는 디바이스와 기계간의 통신으로 정의하고 있으며 이 기술은 미래 ICT(Information Communication Technologies)의 핵심이 되는 기술이다. 오늘날 정보통신기술의 비약적인 발달로 언제, 어디서나 쉽게 접할 수 있는 사물지능통신(M2M) 또는 사물인터넷(IoT) 시대의 도래를 촉진하고 있지만, 다양한 단말 및 이기종 애플리케이션 등을 활용하기 때문에 발생할 수 있는 보안위협 또한 많을 것으로 예상된다. 본 고에서는 M2M/IoT의 최신동향과 동 환경에서 발생할 수 있는 보안위협들을 정의하고, 실제 사례를 통해 현재 발생하고 있는 보안위협들을 파악한 후 사례별 보안대책을 분석한다.

Implications of Impacts of Climate Change on Forest Product Flows and Forest Dependent Communities in the Western Ghats, India

  • Murthy, Indu K.;Bhat, Savithri;Sathyanarayan, Vani;Patgar, Sridhar;M., Beerappa;Bhat, P.R.;Bhat, D.M.;Gopalakrishnan, Ranjith;Jayaraman, Mathangi;Munsi, Madhushree;N.H., Ravindranath;M.A., Khalid;M., Prashant;Iyer, Sudha;Saxena, Raghuvansh
    • Journal of Forest and Environmental Science
    • /
    • 제30권2호
    • /
    • pp.189-200
    • /
    • 2014
  • The tropical wet evergreen, tropical semi evergreen and moist deciduous forest types are projected to be impacted by climate change. In the Western Ghats region, a biodiversity hotspot, evergreen forests including semi evergreen account for 30% of the forest area and according to climate change impact model projections, nearly a third of these forest types are likely to undergo vegetation type change. Similarly, tropical moist deciduous forests which account for about 28% of the forest area are likely to experience change in about 20% of the area. Thus climate change could adversely impact forest biodiversity and product flow to the forest dependent households and communities in Uttara Kannada district of the Western Ghats. This study analyses the distribution of non-timber forest product yielding tree species through a network of twelve 1-ha permanent plots established in the district. Further, the extent of dependence of communities on forests is ascertained through questionnaire surveys. On an average 21% and 28% of the tree species in evergreen and deciduous forest types, respectively are, non-timber forest product yielding tree species, indicating potential high levels of supply of products to communities. Community dependence on non-timber forest products is significant, and it contributes to Rs. 1199 and Rs. 3561/household in the evergreen and deciduous zones, respectively. Given that the bulk of the forest grids in Uttara Kannada district are projected to undergo change, bulk of the species which provide multiple forest products are projected to experience die back and even mortality. Incorporation of climate change projections and impacts in forest planning and management is necessary to enable forest ecosystems to enhance resilience.

SG 환경에서 CoAP 기반 M2M 게이트웨이 (M2M Gateway based on CoAP in SG Environment)

  • 신인재;박지원;이상훈;송병권
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2015년도 제46회 하계학술대회
    • /
    • pp.47-48
    • /
    • 2015
  • As the power system develops rapidly into a smarter and more flexible state, so must the communication technologies that support it. Machine to machine (M2M) communication in Smart Grid environment has been discussed in European Telecommunications Standards Institute (ETSI). The power system is not easily replaceable, due to system replacement cost. The M2M gateway is required in other to improve interoperability in M2M environment. The Distributed Network Protocol 3.0 (DNP3.0) is the most important standard in the SCADA systems for the power. It has been used for device data collection/control in Substation Systems, Distribution Automation System. If the DNP3.0 data model is combined with a set of contemporary web protocols, it can result in a major shift. We selected Constrained Application Protocol (CoAP) based on RESTful as M2M protocol. It is a specialized web transfer protocol for use with constrained nodes and constrained networks. We have used the OPNET Modeler 17.1 in order to verity the SOAP versus CoAP. In this paper, we propose the CoAP-based M2M Gateway to Distribution Automation system using DNP3.0 in Smart Grid Environment.

  • PDF

M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구 (A Study of Authentication Method for Id-Based Encryption Using In M2M Environment)

  • 진병욱;박재표;이근왕;전문석
    • 한국산학기술학회논문지
    • /
    • 제14권4호
    • /
    • pp.1926-1934
    • /
    • 2013
  • M2M(Machine-to-Machine Communication)은 한 기기가 비슷한 다른 기기와 유선 혹은 무선으로 통신하는 기술로서 환경의 특성 상 저전력, 소규모, 저렴한 가격, WAN, WLAN 등 네트워크를 통하여 사물간의 통신으로 정의하고 있다. 또한 사람의 개입이 없이도 운영이 가능할 수 있는 특징이 요구된다. 그러나 사물통신 기기들의 요구사항으로 인하여 무선 통신 등에 취약점은 가지게 되고, 각 기기를 관리 혹은 제어하는 것에 대한 어려움으로 인한 취약점이 있다. 본 논문은 M2M 환경에서 Device 및 Gateway와 Network Domain간의 안전한 인증 프로토콜 기법을 제안하였다. 제안 프로토콜은 ID-Based Encryption 기반으로 인증 하며, Network Domain안에 Access Server 및 Core Server 간의 세션키를 생성한다. 그리고 생성한 세션키를 활용하여 상호간에 데이터를 송 수신하고, 키 갱신 프로토콜을 추가하여 자동으로 식별값을 갱신한다.

Security Issues on Machine to Machine Communications

  • Lai, Chengzhe;Li, Hui;Zhang, Yueyu;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권2호
    • /
    • pp.498-514
    • /
    • 2012
  • Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions according to 3GPP. In addition, we present several new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle authentication issue among multiple entities and aggregate signature used to resolve security of small data transmission in M2M communications.

Edwards w-coordinate를 이용한 SIDH 구현 (Implementation of SIDH using Edwards' w-coordinate)

  • 김수리;윤기순;박영호;홍석희
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2019년도 추계학술발표대회
    • /
    • pp.427-431
    • /
    • 2019
  • 본 논문에서는 Edwards 곡선의 w-coordinate를 이용한 isogeny로 SIDH를 구현하는 방법에 대해 처음으로 제안한다. 이를 위해, 먼저 division polynomial을 이용하여 기존 제안된 w-coordinate 3-isogeny를 4M+6S에서 2M+3S로 연산량을 감소시켜 50%의 속도 향상을 달성하였다. 또한, w-coordinate isogney공식을 사용하기 위해 새로 유한체를 제안하였으며 안전성을 분석하였다. 본 논문의 결과 Edwards 곡선을 이용한 SIDH는 Montgomery 곡선과 비해 2.29% 이상의 속도 향상을 예상할 수 있다.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Impact of Booster Section Length on the Performance of Linear Cavity Brillouin-Erbium Fiber Laser

  • Al-Mashhadani, Thamer Fahad;Jamaludin, Md. Zaini;Al-Mansoori, Mohammed Hayder;Abdullah, Fairuz;Abbas, Abdulla Khudair
    • Journal of the Optical Society of Korea
    • /
    • 제18권2호
    • /
    • pp.162-166
    • /
    • 2014
  • The impact of booster section length made from passive erbium-doped fiber (EDF) on the L-band multiwavelength Brillouin-Erbium fiber laser (MBEFL) is studied experimentally in this paper. The influence on the performance of MBEFL in term of number of generated Stokes lines, tuning range and lasing threshold were investigated. A comparison was made between MBEFL without a booster section and with booster sections of different lengths. Through comparative study and at fixed BP power and 100mW of 1480 pump power, longer passive EDF length of 5m exhibits the highest average number of Stokes lines of 23 with tuning range of 14nm. In contrast, shorter passive EDF length of 1m shows the highest tuning range of 17nm and an average number of 21 Stokes lines.