• 제목/요약/키워드: Storage mechanism

검색결과 507건 처리시간 0.026초

Nitrate enhances the secondary growth of storage roots in Panax ginseng

  • Kyoung Rok Geem ;Jaewook Kim ;Wonsil Bae ;Moo-Geun Jee ;Jin Yu ;Inbae Jang;Dong-Yun Lee ;Chang Pyo Hong ;Donghwan Shim;Hojin Ryu
    • Journal of Ginseng Research
    • /
    • 제47권3호
    • /
    • pp.469-478
    • /
    • 2023
  • Background: Nitrogen (N) is an essential macronutrient for plant growth and development. To support agricultural production and enhance crop yield, two major N sources, nitrate and ammonium, are applied as fertilizers to the soil. Although many studies have been conducted on N uptake and signal transduction, the molecular genetic mechanisms of N-mediated physiological roles, such as the secondary growth of storage roots, remain largely unknown. Methods: One-year-old P. ginseng seedlings treated with KNO3 were analyzed for the secondary growth of storage roots. The histological paraffin sections were subjected to bright and polarized light microscopic analysis. Genome-wide RNA-seq and network analysis were carried out to dissect the molecular mechanism of nitrate-mediated promotion of ginseng storage root thickening. Results: Here, we report the positive effects of nitrate on storage root secondary growth in Panax ginseng. Exogenous nitrate supply to ginseng seedlings significantly increased the root secondary growth. Histological analysis indicated that the enhancement of root secondary growth could be attributed to the increase in cambium stem cell activity and the subsequent differentiation of cambium-derived storage parenchymal cells. RNA-seq and gene set enrichment analysis (GSEA) revealed that the formation of a transcriptional network comprising auxin, brassinosteroid (BR)-, ethylene-, and jasmonic acid (JA)-related genes mainly contributed to the secondary growth of ginseng storage roots. In addition, increased proliferation of cambium stem cells by a N-rich source inhibited the accumulation of starch granules in storage parenchymal cells. Conclusion: Thus, through the integration of bioinformatic and histological tissue analyses, we demonstrate that nitrate assimilation and signaling pathways are integrated into key biological processes that promote the secondary growth of P. ginseng storage roots.

탐침형 정보저장장치용 이차원 구동기의 내진 구조 (Design of X-Y Actuator with High Vibration Resistance lot Probe-based Data Storages)

  • 이경일;김성현;조진우;최영진;신진국
    • 정보저장시스템학회:학술대회논문집
    • /
    • 정보저장시스템학회 2005년도 추계학술대회 논문집
    • /
    • pp.195-196
    • /
    • 2005
  • We report the new design of a miniature electromagnetic actuator for probe-based data storage with anti-vibration mechanism. The actuator consists of a media substrate, silicon frame, 2 pairs of magnets, a spacer, and a printed circuit board (PCB). The total area of the device is $11.2{\times}11.2 mm^2$ while the data recording area is $7.4{\times}7.4 mm^2$. A net momentum fee structure was included for high vibration resistance. The simulation shows that the lateral vibration can be reduced to below 100 nm for 1 G acceleration if the counter mass is adjusted with $1\%$ difference. The peak power for ${\pm}50 {\mu}m$ displacement is below 50 mW for a actuator with a resonance at 200 Hz.

  • PDF

광기록을 위한 Te-based Antireflection구조의 열적, 광학적 특성 (The Thermal and Optical Properties of Te-based Antireflection structure for Optical Recording)

  • 이성준;이현용;정홍배;이영종
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1993년도 하계학술대회 논문집 B
    • /
    • pp.1256-1258
    • /
    • 1993
  • Optical data storage offer high density storage and archival storage capability. In this study, we selected the ablation mechanism-one of an irreversible recording system-using the antireflection trilayer(ART) structure. Optical recording medium is a $(Te_{86}Se_{14})_{50}Bi_{50}$ thin films. Actually, ART structure is fabricated and compared to monolayer structure. ART structure leads to the reduction of recording power as well as an increase in the effciency compared to the monolayer structure.

  • PDF

IoT 네트워크에서 스토리지와 트랜잭션 보호를 위한 이중 블록체인 구조 (A Double-blockchain Architecture for Secure Storage and Transaction on the Internet of Things Networks)

  • 박종순;박찬길
    • 디지털산업정보학회논문지
    • /
    • 제17권4호
    • /
    • pp.43-52
    • /
    • 2021
  • IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography(ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing(CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel

  • Wang, Jianhua;Zhao, Zhiyuan;Sun, Lei;Zhu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2718-2731
    • /
    • 2019
  • Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers. However, the process of searching outsourced data may facilitate the leakage of sensitive data. Thus, an efficient data search approach with high security is critical. To solve this problem, an efficient conjunctive keyword search scheme based on ciphertext-policy attribute-based encryption is proposed for cloud storage environment. This paper proposes an efficient mechanism for removing the secure channel and resisting off-line keyword-guessing attacks. The storage overhead and the computational complexity are regardless of the number of keywords. This scheme is proved adaptively secure based on the decisional bilinear Diffie-Hellman assumption in the standard model. Finally, the results of theoretical analysis and experimental simulation show that the proposed scheme has advantages in security, storage overhead and efficiency, and it is more suitable for practical applications.

A Decentralized and Non-reversible Traceability System for Storing Commodity Data

  • He, Xiaojian;Chen, Ximeng;Li, Kangzi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.619-634
    • /
    • 2019
  • In the field of traceability systems, researchers focus on applications in the agricultural food traceability and scanning commodities. The purposes of this paper, however, is to propose an efficient and reliable traceability system that can be applied to all kinds of commodities. Currently, most traceability systems store data in a central server, which is unreliable when the system is under attack or if the administrator tampers with the data for personal interests. Therefore, it is necessary to design a system that can eliminate these threats. In this paper, we propose a decentralized and non-reversible traceability system for storing commodity data. This system depends on blockchain technology, which organizes data in the form of chains without a central server. This chain-style storage mechanism can prevent malicious modifications. In addition, some strategies are adopted to reduce the storage pressure and response time when the system has stored all kinds of commodity data.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Organizational-Economic Mechanism of the Development of the Agro-Industrial Complex in Modern Conditions

  • Ivanko, Anatolii;Vasylenko, Nataliia;Bushovska, Lesia;Makedon, Halyna;Dvornyk, Inna
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.107-114
    • /
    • 2022
  • The main purpose of this study is to substantiate the theoretical and methodological foundations of the organizational and economic mechanism of development of the agro-industrial complex in modern conditions. Organizational and economic mechanism is presented as a complex organizational structure of the system type, which is aimed at performing specific functions, the characteristic feature of which is the constant support of process changes without which the organizational and economic mechanism can not exist. There are four components of the agro-industrial complex, represented by agriculture and the national economy, which ensure its operation, including industry, processing of agricultural products, its storage and transportation, sale and repair and maintenance of agricultural machinery and more. It is proved that the organizational and economic mechanism of development of agro-industrial complex in modern conditions it is expedient to consider: from the point of view of system and process approaches; as a set of economic levers and organizational measures to influence the agro-industrial complex; constituent components of organizational influence on the development of the complex; a set of components, elements that are integrated into the system of economic relations of the subjects of the agro-industrial complex; a set of purposeful stimulators of agro-industrial complex development. The functions of the organizational component of the mechanism of agro-industrial complex include: redistributive, planning, interaction, control, integration and regulatory functions, the functions of the economic component include consumer, investment and innovation, social, incentive, monitoring functions of the mechanism. The symbiosis of the functions of organizational and economic components ensure the effectiveness of the organizational and economic mechanism of the organizational and economic mechanism through its functionalities as a whole.

데이터 지역성 메커니즘을 이용한 지역 스토리지 용량 관리 방법 (A Method to Manage Local Storage Capacity Using Data Locality Mechanism)

  • 김바울;구민오;민덕기
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 추계학술대회
    • /
    • pp.324-327
    • /
    • 2013
  • 최근 클라우드 컴퓨팅 기술의 발달로 인해 클라우드 기반의 컴퓨팅 자원의 활용은 다양한 분야에서 실생활에 적용되고 있다. 특히, 스마트 기기의 기술과 네트워크 인프라의 발달은 지역 스마트 디바이스와 클라우드 저장소간의 파일 공유에 대한 필요성을 더욱 촉진 시켰다. 하지만, 스마트 기기의 저장 공간 제약 사항으로 인해 클라우드 저장소에 파일을 저장하는 것은 지역 저장소의 저장 공간기아 문제를 촉발 시킨다. 이것은 클라우드 저장소 서비스에서 대용량의 파일 저장 공간을 제공하더라도 사용자는 저장소 부족 문제에 직면 할 수 있음을 의미한다. 본 연구에서는 스마트 기기와 클라우드 저장소간의 파일 관리 방법을 제시한다. 본 연구에서 제시하는 지역 스토리지 용량 관리 방법은 사용자의 최근 사용한 날짜를 기반으로 파일 사용 패턴을 계산하고 이를 기반으로 지역에 저장된 파일들 중 마이그레이션 되어야 할 대상들을 선정하는 방법을 사용하고 있다. 더욱이 본 연구에서 제시하는 방법을 통하여 대규모 빅 데이터 저장소와 저장 공간의 제약을 가지고 있는 지역의 소형 클라이언트 장치간의 파일 동기화에도 활용될 수 있다.

  • PDF

클라우드 스토리지에서의 중요데이터 보호 (Securing Sensitive Data in Cloud Storage)

  • 이셜리;이훈재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.