• Title/Summary/Keyword: synchronization mechanism

Search Result 166, Processing Time 0.038 seconds

Elliptic Curve Signcryption Based Security Protocol for RFID

  • Singh, Anuj Kumar;Patro, B.D.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.344-365
    • /
    • 2020
  • Providing security has been always on priority in all areas of computing and communication, and for the systems that are low on computing power, implementing appropriate and efficient security mechanism has been a continuous challenge for the researchers. Radio Frequency Identification (RFID) system is such an environment, which requires the design and implementation of efficient security mechanism. Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed. But, due to high strength and requirement of less key size in elliptic curve cryptography, the focus of researchers has been on designing efficient security protocol for RFID based on elliptic curves. In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability, forward security, anonymity, and scalability. Moreover, the proposed protocol successfully provides resistance from replay attack, impersonation attack, location tracking attack, de-synchronization attack, denial of service attack, man-in-the-middle attack, cloning attack, and key-compromise attack. Results have revealed that the proposed protocol is efficient than the other related protocols as it takes less computational time and storage cost, especially for the tag, making it ideal to be used for RFID systems.

The Energy Performance Analysis Between Synchronous and Asynchronous Duty Cycle based MAC Protocols in Wireless Sensor Networks (무선 센서네트워크 환경에서 Duty Cycle 기반 동기식 및 비동기식 MAC 프로토콜의 에너지 성능과 지연시간에 대한 상호 분석)

  • Lee, Jae-Ho;Eom, Doo-Seop
    • Journal of Information Technology Services
    • /
    • v.10 no.3
    • /
    • pp.237-250
    • /
    • 2011
  • Recently, Wireless Sensor Networks (WSN) require energy performance and guaranteed delivery delay time, contrarily with previous MAC protocols that aim to high throughput mostly. In order to satisfy the new significant requirements, many MAC protocols of WSN employ and try to enhance the duty cycle mechanism which is energy efficient technique in MAC layer. This duty cycle mechanism is oriented by toggling the transceiver conditions composed of wakeup and sleep states. The synchronous MAC protocols perform the period synchronization process. Hence, these are energy efficient in periodic monitoring environment, but are inefficient in where an event is incurred rarely and infrequently. Otherwise, the performance of asynchronous MAC protocols are contrarily with synchronous protocols. In this paper, we design two models consisting Always-busy and Always-idle ti simplify the general network congestion conditions. Through these models, moreover, we analyze two types MAC protocols in terms of energy efficiency and delay performance by analytical results. Additionally, we also evaluate two MAC protocols with two gongestion models that we designed. By the analytical and simulated results, we provide the general and efficient decision method in which protocols are more appropriate in a certain WSN environment.

Amino-terminal arginylation as a degradation signal for selective autophagy

  • Cha-Molstad, Hyunjoo;Kwon, Yong Tae;Kim, Bo Yeon
    • BMB Reports
    • /
    • v.48 no.9
    • /
    • pp.487-488
    • /
    • 2015
  • The ubiquitin-proteasome system and the autophagy lysosome system are the two major protein degradation machineries in eukaryotic cells. These two systems coordinate the removal of unwanted intracellular materials, but the mechanism by which they achieve this synchronization is largely unknown. The ubiquitination of substrates serves as a universal degradation signal for both systems. Our study revealed that the amino-terminal Arg, a canonical N-degron in the ubiquitin-proteasome system, also acts as a degradation signal in autophagy. We showed that many ER residents, such as BiP, contain evolutionally conserved arginylation permissive pro-N-degrons, and that certain inducers like dsDNA or proteasome inhibitors cause their translocation into the cytoplasm where they bind misfolded proteins and undergo amino-terminal arginylation by arginyl transferase 1 (ATE1). The amino-terminal Arg of BiP binds p62, which triggers p62 oligomerization and enhances p62-LC3 interaction, thereby stimulating autophagic delivery and degradation of misfolded proteins, promoting cell survival. This study reveals a novel ubiquitin-independent mechanism for the selective autophagy pathway, and provides an insight into how these two major protein degradation pathways communicate in cells to dispose the unwanted proteins. [BMB Reports 2015; 48(9): 487-488]

Study of Cutting Characteristics in High Speed Synchronized Tapping (고속 동기 탭핑에서의 절삭 특성에 관한 연구)

  • 정용수;이돈진;김선호;안중환
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.304-307
    • /
    • 2002
  • High speed machining was accomplished. through the technological advances which covers the whole field of mechanical industry. But tapping have many troubles because of its complicate cutting mechanism, for example. tool damage, chip elimination and synchronization between spindle rotation and feed motion. But High speed tapping is so important that it marches in step with the flow of the times and make improvement in the productivity. In this paper we analyze mechanism of high speed synchronized tapping with the signal of tapping torque and spindle speed obtained through the newly developed high speed tapping machine(NTT-30B). We made an experiment with this machine on condition of various speed from 1000rpm to 10000rpm. As one complete thread is performed through the whole chamfer cutting, cutting torque increases highly in chamfer cutting, but smoothly in full thread cutting functioning of the threads guide. And the size of cutting torque according to spindle speed(rpm) was not enough of a difference to be conspicuous.

  • PDF

Development of Consistency Algorithm for VOD Streaming Server Data (VOD 스트리밍 서버 데이터를 위한 일치성 보장 알고리즘 개발)

  • Jang Seung-Ju
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.8-16
    • /
    • 2006
  • This paper proposes and implements consistency algorithm that is serviced streaming data efficiently in VOD system. The media data is loaded into each node by Round Robin method. The barrier mechanism is changed into the minimum data factor(SH, GOP) of media data in this paper. In addition in order to fast media data service, the additional features are implemented in the consistency algorithm. Additional feature of the consistency algorithm is added. First, time synchronization algorithm is added the suggested consistency algorithm. Second, the prepaging mechanism supports efficient buffering service. I experimented the suggested consistency algorithm two DSM systems. The performance is good due to the last barrier algorithm.

Echinacoside, an active constituent of Herba Cistanche, suppresses epileptiform activity in hippocampal CA3 pyramidal neurons

  • Lu, Cheng-Wei;Huang, Shu-Kuei;Lin, Tzu-Yu;Wang, Su-Jane
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.22 no.3
    • /
    • pp.249-255
    • /
    • 2018
  • Echinacoside, an active compound in the herb Herba Cistanche, has been reported to inhibit glutamate release. In this study, we investigated the effects of echinacoside on spontaneous excitatory synaptic transmission changes induced by 4-aminopyridine (4-AP), by using the in vitro rat hippocampal slice technique and whole-cell patch clamp recordings from CA3 pyramidal neurons. Perfusion with echinacoside significantly suppressed the 4-AP-induced epileptiform activity in a concentration-dependent manner. Echinacoside reduced 4-AP-induced increase in frequency of spontaneous excitatory postsynaptic currents (sEPSCs) but it did not affect the amplitude of sEPSCs or glutamate-activated currents, implicating a presynaptic mechanism of action. Echinacoside also potently blocked sustained repetitive firing, which is a basic mechanism of antiepileptic drugs. These results suggest that echinacoside exerts an antiepileptic effect on hippocampal CA3 pyramidal neurons by simultaneously decreasing glutamate release and blocking abnormal firing synchronization. Accordingly, our study provides experimental evidence that echinacoside may represent an effective pharmacological agent for treating epilepsy.

Development of Consistency Algorithm for VOD streaming Data (VOD 스트리밍 데이터를 위한 Consistency 알고리즘 개발)

  • Jang Seung-Ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.729-732
    • /
    • 2006
  • This paper proposes and implements consistency algorithm that is serviced streaming data efficiently in VOD system. The media data is loaded into each node by Round Robin method. The barrier mechanism is changed into the minimum data factor(SH. GOP) of media data in this paper. In addition in order to fast media data service, the additional features are implemented in the consistency algorithm. Additional feature of the consistency algorithm is added. First, time synchronization algorithm is added the suggested consistency algorithm. Second, the prepaging mechanism supports efficient buffering service. I experimented the suggested consistency algorithm on two DSM systems.

  • PDF

Sector Based Multiple Camera Collaboration for Active Tracking Applications

  • Hong, Sangjin;Kim, Kyungrog;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1299-1319
    • /
    • 2017
  • This paper presents a scalable multiple camera collaboration strategy for active tracking applications in large areas. The proposed approach is based on distributed mechanism but emulates the master-slave mechanism. The master and slave cameras are not designated but adaptively determined depending on the object dynamic and density distribution. Moreover, the number of cameras emulating the master is not fixed. The collaboration among the cameras utilizes global and local sectors in which the visual correspondences among different cameras are determined. The proposed method combines the local information to construct the global information for emulating the master-slave operations. Based on the global information, the load balancing of active tracking operations is performed to maximize active tracking coverage of the highly dynamic objects. The dynamics of all objects visible in the local camera views are estimated for effective coverage scheduling of the cameras. The active tracking synchronization timing information is chosen to maximize the overall monitoring time for general surveillance operations while minimizing the active tracking miss. The real-time simulation result demonstrates the effectiveness of the proposed method.

The Effects of Managers on Organizational Performance in NBA and KBL Teams: The Moderating Role of Player Capabilities (프로스포츠 산업 조직 구성원의 역량에 따른 관리자의 역할: 미국프로농구(NBA)와 한국프로농구(KBL)의 감독과 선수단 전력 수준에 관한 실증연구 분석)

  • TAE SUNG, LEE;PHILSOO, KIM;SANG HYUN, LEE;SANG BUM, LEE
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.6
    • /
    • pp.195-208
    • /
    • 2022
  • The role of venture CEO and their intrinsic capabilities on organizational performance can be determined by the level of resource synchronization initiated by the focal managers. Despite the important role of venture CEOs, a systematic lack of in-depth theoretical and empirical studies on ruminating the relationship between the effects of a CEO's capabilities and organizational performance depending on the level of resource synchronization exist for the rationale of investigation. To supplement the limitations of previous studies, this research empirically analyzes the role of managers specifically synchronizing organizational resources that affect organizational performance in the professional sports industry. Based on the entrepreneurship theory and resource-based view (RBV), this research conceptualizes the roles of venture CEO and basketball head coach in the professional sports industry as very similar in terms of organizational structure and performance mechanism embedding entrepreneurial characteristics necessary for managing organizational resources. In this research, we hypothesized (1) organizational resource synchronization will mediate the positive relationship between the ability of professional basketball head coach and organizational performance and (2) the indirect effect of the professional basketball head coach's capabilities on organizational performance mediated by resource synchronization will be moderated by the capabilities of players. To test these hypotheses, we utilized the PROCESS macro model 58 with the empirical data of 9 seasons (2013~2014-2021~2022) of 30 National Basketball Association (NBA) and 10 Korean Basketball League (KBL) teams. The statistical results showed that (1) resource synchronization mediates the positive relationship between professional basketball head coach capabilities and organizational performance and (2) the capabilities of players moderated the indirect effects of the abilities of head coaches on team performance via resource synchronization. This paper contributes to both academic and practical domains of entrepreneurship by empirically testing the research model through objective professional sports data.

One Pass Identification processing Password-based

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.4
    • /
    • pp.166-169
    • /
    • 2006
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we present a new identification scheme: OPI(One Pass Identification). The security of OPI is based on the square root problem, and OPI is secure: against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of OPI is one, and OPI processes the password and does not need the key. We think that OPI is excellent for the consuming time to verify the prover.