• Title/Summary/Keyword: function-safe

Search Result 728, Processing Time 0.032 seconds

Improved An RFID Mutual Authentication Protocol Based on Hash Function (개선된 해시기반의 RFID 상호인증 프로토콜)

  • Shin, Ju-Seok;Oh, Se-Jin;Jeong, Cheol-Ho;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3C
    • /
    • pp.241-250
    • /
    • 2012
  • In 2010, Jeon-Kim proposed HMAP(Hash-based Mutual Authentication Protocol for RFID Environment) to resolve a variety of problem related to security using Mutual authentication scheme, the hash function and secret key is used to update in RFID system. Jeon-Kim proved RMAP was safe for a variety of attacks including eavesdropping attacks through safety analysis. However, unlike the claims of the proposed protocol is vulnerable to next session of the secret key exposure due to eavesdropping. In this paper, we analyze the problem of RMAP and proves it through security analysis. And we also propose improved an RFID Mutual Authentication Protocol based on Hash Function to solve problems of HMAP.

Comparison of Incidence of Abnormal Liver Function Test between Inpatients Who Take Traditional Korean versus Conventional Medicine (한.양방 입원 환자의 비정상 간기능 검사 발생률 비교)

  • Han, Chang-Woo
    • The Journal of Internal Korean Medicine
    • /
    • v.31 no.1
    • /
    • pp.79-83
    • /
    • 2010
  • Herbal hepatotoxicity is a one of the most often encountered controversial issues in medical society. Some believe herbs are totally safe while others regard treatment with herbs as a very common cause of hepatotoxicity. But there are no comparative clinical hepatotoxicity studies between herbal and conventional medicines. We investigated incidence of patients with abnormal liver function who were treated with herbal or conventional medicine at Dongguk University International Hospital. Each group consisted of 300 patients, who were admitted for longer than 30 days during the year 2008. We compared albumin, total bilirubin, AST (aspartate aminotransferase), and ALT (alanine aminotransferase) levels, and excludes patients who had abnormal liver function test or liver-related disease when admitted. As a result, incidence of total bilirubin, AST, and ALT elevation in the CT (conventional treatment) group was more frequent than in the TKM (traditional Korean medicine) group (p<0.05) during admission. Albumin level also decreased more frequently in the CT group than in the TKM group (p<0.05). According to these results, herbal medicine is not more hepatotoxic than conventional medicine, and not a main cause of liver injury in inpatients.

A Fragile Watermarking Scheme Using a Arithmetic Coding (산술부호화를 이용한 연성 워터마킹 기법)

  • Piao, Cheng-Ri;Paek, Seung-Eun;Han, Seung-Soo
    • The Journal of Information Technology
    • /
    • v.9 no.4
    • /
    • pp.49-55
    • /
    • 2006
  • In this paper, a new fragile watermarking algorithm for digital image is presented, which makes resolving the security and forgery problem of the digital image to be possible. The most suitable watermarking method that verifies the authentication and integrity of the digital image is the Wong's method, which invokes the hash function (MD5). The algorithm is safe because this method uses the hash function of the cryptology. The operations such as modulus, complement, shift, bitwise exclusive-or, bitwise inclusive-or are necessary for calculating the value of hash function. But, in this paper, an Arithmetic encoding method that only includes the multiplication operation is adopted. This technique prints out accumulative probability interval, which is obtained by multiplying the input symbol probability interval. In this paper, the initial probability interval is determined according to the value of the key, and the input sequence of the symbols is adjusted according to the key value so that the accumulative probability interval will depend on the key value. The integrity of the algorithm has been verified by experiment. The PSNR is above the 51.13db and the verifying time is $1/3{\sim}1/4$ of the verifying time of using the hash function (MD5), so, it can be used in the real-time system.

  • PDF

Lifetime Prediction of a P.S.C Rail Road Bridge (P.S.C 철도교량의 잔존수명 예측)

  • Yang Seung-Le
    • Journal of the Korean Society for Railway
    • /
    • v.8 no.5
    • /
    • pp.439-443
    • /
    • 2005
  • The biggest challenge bridge agencies face is the maintenance of bridges, keeping them safe and serviceable, with limited funds. To maintain the bridges effectively, there is and urgent need to predict their remaining life from a system reliability viewpoint. In this paper, a model using lifetime functions to evaluate the overall system probability of survival of a rail road bridge is proposed. In this model, the rail load bridge is modeled as a system. Using the model, the lifetime of the rail road bridge is predicted.

A Stuty of Protection Circuit for Discharge Lamp Ballast (방전등 안정기의 보호회로 기술 현황)

  • Han, Soo-Bin;Park, Suck-In;Song, Eu-Gine;Jeoung, Hak-Guen;Jung, Bong-Man
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.05a
    • /
    • pp.133-135
    • /
    • 2008
  • In a design of ballast for discharge lamp, various kind of protection circuit are essential for safe operation. In this paper, overvoltage and current detection, no-load detection, lamp-fault detection, end of lamp detection for protection are introduced. Individual circuit operation and their function are described with the base that all circuit form is similar with overvoltage protection circuit.

  • PDF

HOW TO DEVELOPE NEW PRO BIOTIC WITH ANTI Helicohacter pylori FUNCTION

  • Lee Yeonhee
    • Proceedings of the Korean Society of Food Science and Nutrition Conference
    • /
    • 2001.12a
    • /
    • pp.161-169
    • /
    • 2001
  • Lactic acid producing bacteria were isolated from baby feces and characterized to be used as a probiotic with anti Helicobacter pylori functions. The selected bacteria had inhibition activity on the adherance and growth of H. pylori. These bacteria had additional beneficial characteristics for the probiotic such as antibacterial activity, antitumor activity, immunostimulation activity, resistance to antibiotic and bile salt, ability to bind to the intestinal cells, and safe for the human use.

  • PDF

Donor Selection, Management, and Procurement for Lung Transplantation

  • Yu, Woo Sik;Son, JeongA
    • Journal of Chest Surgery
    • /
    • v.55 no.4
    • /
    • pp.277-282
    • /
    • 2022
  • Lung transplantation is a life-saving procedure in patients with end-stage lung disease. However, it inherently depends on the availability of donor organs. The selection of suitable lungs for transplantation, management of donors to minimize further injury and improve organ function, and safe procurement remain critical for successful transplantation. In this review, we provide an update on the current understanding of donor selection, management, and lung procurement.

CHANGES OF SENSORY AND SOMATOSENSORY EVOKED POTENTIALS FOLLOWING A NEEDLE INJURY ON THE INFERIOR ALVEOLAR NERVE IN RATS (백서 하치조 신경 손상에 따른 감각 유발전위와 체성감각 유발전위의 변화에 관한 연구)

  • Woo, Seung-Chel;Kim, Soo-Nam;Lee, Dong-Keun;Cheun, Sang-Woo
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.18 no.4
    • /
    • pp.652-672
    • /
    • 1996
  • Dysfunction of the inferior alveolar nerve may result from trauma, diseases or iatrogenic injury. The development and refinement of an objective method to evaluate this clinical problem is highly desirable and needed, especially concerning for an increasing medico-legal issue. Evoked potential techniques have attracted considerable attention as a means of assessing the function and integrity of nerve pathways. The purpose of this study was to characterize the Sensory Evoked Potentials(SEPs) and Somatosensory Evoked Potentials(SSEPs) elicited by electrical stimulation of mental nerve. SEPs and SSEPs were measured and analyzed statistically before and after needle injury on the inferior alveolar nerve of Sprague-Dawalye rats. Measuring SEPs was more sensitive in evaluation of the recovery of sensory function from inferior alveolar nerve injury then measuring SSEPs but we measured SSEPs in the hope of providing a safe, simple and objective test to check oral and facial sensibility, which is acceptable to the patient. We stimulated mental nerve after needle injury on the inferior alveolar nerve and SEPS on the level of mandibular foramen and SSEPs on the level of cerebral cortex were recorded. Threshold, amplitude, and latency of both of SEPs and SSEPs were analyzed. The results were as follows ; 1. Threshold of SEPs and SSEPs were $184{\pm}14{\mu}A$ and $164{\pm}14{\mu}A$ respectively. 2 SEPs were composed of 2 waves, i.e., N1 N2 in which N1 was conducted by II fibers and N2 was conducted by III fibers. 3. SSEPS were composed of 5 waves, of which N1 and N2 shower statistically significant changes(p<0.01, unpaired t-test). 4. SEPs and SSEPs were observed to be abolished immediately after local anesthesia and recovered 30 minutes later. 5. SEPs were abolished immediately after injury. N1 of SSEPs was abolished immediately and amplitued of N2 was decreased($20.7{\pm}12.2%$) immediately after 23G needle injury, but N3, N4 and N5 did not change significantly. Recovery of waveform delayed 30 minutes in SEPs and 45 minutes in SSEPs. 6. The degree of decrease in amplitude of SEPs and SSEPs, after 30G needle injury was smaller than those with 23G. SEPs recorded on the level of mandibular foramen were though to be reliable and useful in the assessment of the function of the inferior alveolar nerve after injury. Amplitude of SSEPs reflected the function and integrity of nerve and measuring them provided a safe, simple and abjective test to check oral and facial sensibility. These results suggest that measuring SEPs and SSEPs are meaningful methods for objective assessment in the diagnosis of nerve injury. N1 and N2 of SSEPs can be useful parameters for the evaluation of the nerve function following a needle injury.

  • PDF

A Study on Living Space with the Internet Information Appliances (인터넷 정보가전을 활용한 주거공간 연구)

  • 전흥수;김주연
    • Korean Institute of Interior Design Journal
    • /
    • no.28
    • /
    • pp.44-50
    • /
    • 2001
  • This study propose the new concept of residence by analyzing the change of residence through the characteristic of popularity and degree of development of technology on home network information appliance for intelligent home. Accordingly, Cyber village represented as home automation and extend to information of society. it encourage need of information and multimedia of home. It expect home information infrastructure for accepting informations, which make smart home to linked home-working home-learning home-treatment. home-shopping and home-banking. The system of intelligent home is the intelligence of human-biology in the side of environmental friendly and multi-function. it distinguish the system of security, controlling system of inside environment, supporting system of house-working, automatic controlling, house working. Future house require to meet demand of young generation, such as small residental space, the multi-functional space, the flexible space, making mood for dual income couple and of single as intelligent home. Accordingly, basic purpose which are pleasantness, the safe and the convenience the mobile multi-function as well as networking with controlling of temperature, security, health-test, home-entertainment, home-office and consider environment together.

  • PDF

An encryption algorithm of images using a mass transfer function (물질전달함수를 이용한 영상 암호화 알고리즘)

  • 김승종;최병욱
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.11
    • /
    • pp.31-43
    • /
    • 1996
  • In this paper, we propsoe an encryption algorithm of image information using a mass transfer function (MTF). The algorithm is based on a diffusion phenomenon of black ink when black ink dropped in the stationary water. We mathematically analyze the phenomenon, in consideration of characteristics of image information, and apply the results of analysis to the security of image transfer phenomenon. The cryptosystem proposed in this paper enables the security services of information in narrow-band channel communication network to be provided. And in transmission of important information, it can secure against intentional disturbance and violation. Also, it can guarantee the safe flow of information.

  • PDF