• Title/Summary/Keyword: group key exchange

Search Result 75, Processing Time 0.027 seconds

Isolation and Characterization of a Novel Bacterium Burkholderia gladioli Bsp-1 Producing Alkaline Lipase

  • Zhu, Jing;Liu, Yanjing;Yanqin, Yanqin;Pan, Lixia;Li, Yi;Liang, Ge;Wang, Qingyan
    • Journal of Microbiology and Biotechnology
    • /
    • v.29 no.7
    • /
    • pp.1043-1052
    • /
    • 2019
  • Active lipase-producing bacterium Burkholderia gladioli Bps-1 was rapidly isolated using a modified trypan blue and tetracycline, ampicillin plate. The electro-phoretically pure enzyme was obtained by purification using ethanol precipitation, ion-exchange chromatography, and gel filtration chromatography. The molecular weight was 34.6 kDa and the specific activity was determined to be 443.9 U/mg. The purified lipase showed the highest activity after hydrolysis with $p-NPC_{16}$ at a pH of 8.5 and $50^{\circ}C$, and the $K_m$, $k_{cat}$, and $k_{cat}/K_m$ values were 1.05 mM, $292.95s^{-1}$ and $279s^{-1}mM^{-1}$, respectively. The lipase was highly stable at $7.5{\leq}pH{\leq}10.0$. $K^+$ and $Na^+$ exerted activation effects on the lipase which had favorable tolerance to short-chain alcohols with its residual enzyme activity being 110% after being maintained in 30% ethanol for 1 h. The results demonstrated that the lipase produced by the strain B. gladioli Bps-1 has high enzyme activity and is an alkaline lipase. The lipase has promising chemical properties for a range of applications in the food-processing and detergent industries, and has particularly high potential for use in the manufacture of biodiesel.

A study on Kerberos Authentication mechanism (Kerberos 인증메커니즘에 관한 연구)

  • Kim Cheol-hyun;Lee Yon-Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.53-64
    • /
    • 2005
  • In this paper, proposes Kerberos certification mechanism that improve certification service of PKINIT base that announce in IETF CAT Working Croup. Also proposed Authentication Mechanism for reusability of Ticket that after Ticket's Lifetime is ended, message exchange that Local Client receives Remote Server's service. Since my suggestion to regional services are not described in Kerberos, authentication between regions can be performed via PKINIT(Public Key Cryptography for Initial Authentication) presented by IETF(Internet Engineering Task Force) CAT working group. The new protocol is better than the authentication mechanism proposed by IETF CAT Working group in terms of communication complexity and mechanism according to simplified Ticket issue processing.

Spectrum Hole Utilization in Cognitive Two-way Relaying Networks

  • Gao, Yuan;Zhu, Changping;Tang, Yibin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.890-910
    • /
    • 2014
  • This paper investigates the spectrum hole utilization of cooperative schemes for the two-way relaying model in order to improve the utilization efficiency of limited spectrum holes in cognitive radio networks with imperfect spectrum sensing. We propose two specific bidirectional secondary data transmission (BSDT) schemes with two-step and three-step two-way relaying models, i.e., two-BSDT and three-BSDT schemes, where the spectrum sensing and the secondary data transmission are jointly designed. In the proposed cooperative schemes, the best two-way relay channel between two secondary users is selected from a group of secondary users serving as cognitive relays and assists the bi-directional communication between the two secondary users without a direct link. The closed-form asymptotic expressions for outage probabilities of the two schemes are derived with a primary user protection constraint over Rayleigh fading channels. Based on the derived outage probabilities, the spectrum hole utilization is calculated to evaluate the percentage of spectrum holes used by the two secondary users for their successful information exchange without channel outage. Numerical results show that the spectrum hole utilization depends on the spectrum sensing overhead and the channel gain from a primary user to secondary users. Additionally, we compare the spectrum hole utilization of the two schemes as the varying of secondary signal to noise ratio, the number of cognitive relays, and symmetric and asymmetric channels.

Mobility-Aware Ad Hoc Routing Protocols for Networking Mobile Robot Teams

  • Das, Saumitra M.;Hu, Y. Charlie;Lee, C.S. George;Lu, Yung-Hsiang
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.296-311
    • /
    • 2007
  • Mobile multi-robot teams are useful in many critical applications such as search and rescue. Explicit communication among robots in such mobile multi-robot teams is useful for the coordination of such teams as well as exchanging data. Since many applications for mobile robots involve scenarios in which communication infrastructure may be damaged or unavailable, mobile robot teams frequently need to communicate with each other via ad hoc networking. In such scenarios, low-overhead and energy-efficient routing protocols for delivering messages among robots are a key requirement. Two important primitives for communication are essential for enabling a wide variety of mobile robot applications. First, unicast communication (between two robots) needs to be provided to enable coordination and data exchange. Second, in many applications, group communication is required for flexible control, organization, and management of the mobile robots. Multicast provides a bandwidth-efficient communication method between a source and a group of robots. In this paper, we first propose and evaluate two unicast routing protocols tailored for use in ad hoc networks formed by mobile multi-robot teams: Mobile robot distance vector (MRDV) and mobile robot source routing (MRSR). Both protocols exploit the unique mobility characteristics of mobile robot networks to perform efficient routing. Our simulation study show that both MRDV and MRSR incur lower overhead while operating in mobile robot networks when compared to traditional mobile ad hoc network routing protocols such as DSR and AODV. We then propose and evaluate an efficient multicast protocol mobile robot mesh multicast (MRMM) for deployment in mobile robot networks. MRMM exploits the fact that mobile robots know what velocity they are instructed to move at and for what distance in building a long lifetime sparse mesh for group communication that is more efficient. Our results show that MRMM provides an efficient group communication mechanism that can potentially be used in many mobile robot application scenarios.

An Analysis of the Vulnerability of SSL/TLS for Secure Web Services (안전한 웹 서비스를 위한 SSL/TLS 프로토콜 취약성 분석)

  • 조한진;이재광
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1269-1284
    • /
    • 2001
  • The Secure Sockets Layer is a protocol for encryption TCP/IP traffic that provides confidentiality, authentication and data integrity. Also the SSL is intended to provide the widely applicable connection-oriented mechanism which is applicable for various application-layer, for Internet client/server communication security. SSL, designed by Netscape is supported by all clients' browsers and server supporting security services. Now the version of SSL is 3.0. The first official TLS vl.0 specification was released by IETF Transport Layer Security working group in January 1999. As the version of SSL has had upgraded, a lot of vulnerabilities were revealed. SSL and TLS generate the private key with parameters exchange method in handshake protocol, a lot of attacks may be caused on this exchange mechanism, also the same thing may be come about in record protocol. In this paper, we analyze SSL protocol, compare the difference between TLS and SSL protocol, and suggest what developers should pay attention to implementation.

  • PDF

Intermedia Synchronization Protocol for Continuous Media Using MPEG-4 in Mobile Distributed Systems

  • Dominguez, Eduardo Lopez;Hernandez, Saul Eduardo Pomares;Gil, Pilar Gomez;Calleja, Jorge De La;Benitez, Antonio;Marin-Hernandez, Antonio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1689-1706
    • /
    • 2012
  • The preservation of temporal dependencies among a group of processes that exchange continuous media at runtime is a key issue for emerging mobile distributed systems (MDS), such as monitoring of biosignals and interactive multiuser games. Although several works are oriented to satisfy temporal dependencies, most of them are not suitable for MDSs. In general, an MDS is characterized by the absence of global references (e.g. shared memory and wall clock), host mobility, limited processing and storage capabilities in mobile hosts, and limited bandwidth on wireless communication channels. This paper proposes an asymmetric synchronization protocol to be used at runtime in an MDS without using a common reference. One main aspect of our synchronization protocol is that it translates temporal constraints to causal dependencies of the continuous media data as seen by the mobile hosts. We simulate the protocol by considering a cellular network environment and by using MPEG-4 encoders. The simulation results show that our protocol is effective in reducing the synchronization error. In addition, the protocol is efficient in terms of processing and storage costs at the mobile devices, as well as in the overhead attached per message across the wired and wireless channels.

Molecular Characterization of a Bombyx mori Protein Disulfide Isomerase(bPDI) (누에 배양세포로부터 분리한 Protein Disulfide Isomerase 유전자의 발현 특성)

  • 구태원;윤은영;황재삼;강석우;권오유
    • Journal of Life Science
    • /
    • v.11 no.5
    • /
    • pp.415-422
    • /
    • 2001
  • Many secreted proteins have disulfide bonds that are important for their structure and function. Protein disulfide isomerase (PDI, EC 5.3.1.4.), an enzyme that catalyzes the formation and rearrangement of thiol/disulfide exchange reactions, is a resident of the endoplasmic reticulum (ER). The subcellular localization and its function as catalyst of disulfide bond formation in the biosynthesis of secretory and cell membrane proteins suggest that PDI plays a key role in the secretory pathway. We have isolated a cDNA encoding protein disulfide isomerase from Bombyx mori(bPDI). It has been characterized under ER stress conditions (dominantly induced by calcium ionophore A23187, tunicamycin and DTT), which is known to cause an accumulation of unfolded proteins in the ER. Furthermore, It has also been examined for tissue distribution(pronounced at the fat body), hormonal regulation (juvenile hormone, insulin and juvenile +transferrin; however, it is not effected by transferrin alone), and the effect of exogenous bacteria (peak at 16 h after infection) on the bPDI mRNA expression. The results suggest that bPDI is a member of the ER stress protein group, and it may play an important role in exogenous bacterial infection in fat body, and that homones regulate its expression.

  • PDF

The Competitiveness of Soc Trang Ecotourism Associated with Khmer Culture

  • LONG, Nguyen Thanh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.1107-1117
    • /
    • 2020
  • Tourism is considered one of the key economic sectors in Vietnam as it helps to promote the economic development, increase foreign exchange earnings, create jobs, and improve the living standards of local people. So, this study aims to identify factors affecting the competitiveness of Soc Trang ecotourism associated with Khmer culture based on a combination of qualitative and quantitative research methods. Qualitative research was conducted through focus group discussions with experts, and quantitative research was conducted through direct interviews with visitors at ecotourism sites in Soc Trang province. The study involves questionnaire surveys and multivariate data analysis methods (Cronbach's Alpha test, EFA, CFA, SEM). Research results from 350 respondents demonstrate that all factors have a positive impact on the competitiveness of ecotourism associated with Khmer culture in Soc Trang province. It shows that the competitiveness of ecotourism associated with Khmer culture is influenced by five factors, including: (1) religious ritual customs of the Khmer people; (2) ecotourism infrastructure; (3) traditional festival activities of Khmer people; (4) culinary culture of Khmer people; and (5) folk ritual customs of the Khmer people. From these findings, the study offers some managerial implications to improve the competitiveness of Soc Trang ecotourism associated with Khmer culture.

The Causality of Empowerment on Job Crafting: Focus on the Moderating Variable of LMX (임파워먼트와 잡 크래프팅의 인과구조: 조절변수를 중심으로)

  • Jung, Young-deuk;Yu, Byung-Nam
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.4
    • /
    • pp.135-146
    • /
    • 2021
  • It is getting more intensified with the competition among participating companies for global market share in major industrial fields. The situation is accelerating especially within the top 5 market share, and these include electric vehicles, semiconductors, chemicals, and shipbuilding industries. The key to the advantage over the competition within a strategic group is which company leads the innovation in the field. On-the-ground innovation refers to job-based innovation. This paper aims to analyze job unit innovation in the structure of empowerment, LMX, and job crafting. Existing studies on job crafting have suggested a causal structure based on job design in the traditional sense, and there are not many scholars who study the causal structure using a job situational model. Therefore, this paper takes an approach from the perspective of the job situation. As a result of the study, LMX showed a moderating effect on the relationship between autonomy provision and job crafting. While, in the relationship between meaing-giving and cognitive crafting, there is no significant moderating effect shown on the relationship between autonomy provision and cognitive crafting. Therefore, the results of the analysis in this study suggest that the meaning of jobs and participation in decision-making should be managed in an integrated way in structural and design areas, not just qualitative factors such as empowerment and leadership.

Organizational Factors Influencing Inclination to Use a B2B Website by a Buyer-Supplier Dyad: The Indian Context

  • Merlin Nandy
    • Asia pacific journal of information systems
    • /
    • v.29 no.3
    • /
    • pp.328-358
    • /
    • 2019
  • Business-to-Business electronic commerce websites are a common form of inter-organizational systems that span organizational boundaries and enables organizations to exchange information in a seamless fashion. To reap the desired benefits it is important that the website be used in the intended manner. The level and extent of use of a business-to-business website depends partly on the inclination to use the website by the users in the primary organization and in the user organizations independently and the combined inclination of the organizations together. This combined inclination is referred to as the System Inclination, with dominance playing a key role. Each organization has certain characteristics of its own and may differ significantly in their inclination to use. It is important to analyze the factors that determine this inclination to use, so that organizations can adopt appropriate management mechanisms to control it. This paper proposes a framework to explain the organizational factors and their influence on the inclination to use a website, based on study of four Indian buyer-supplier dyads. Inclination to use is found to be influenced by factors like top management support, website characteristics, adequate support mechanisms, user group orientation towards electronic commerce and basic IT drive among the employees, at both the primary and user organizations.