Learn More
Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. Therefore, this paper propose a secure authentication scheme based on EPC Class Gen-2 The Proposed scheme is a(More)
Butyrate pathway was constructed in recombinant Escherichia coli using the genes from Clostridium acetobutylicum and Treponema denticola. However, the pathway constructed from exogenous enzymes did not efficiently convert carbon flux to butyrate. Three steps of the productivity enhancement were attempted in this study. First, pathway engineering to delete(More)
As the utilization range of smart devices for infrastructure has widen its application owing to flourishing of smart devices, studies on the technologies to graft IT onto underground utilities are actively carried out. In particular, as underground utilities have a characteristic of invisibility, studies on a management system converged with augmented(More)
  • Yeong Ok Song, Mijeong Kim, +7 authors Jeong-Sook Noh
  • 2017
The protective effects of a chondroitin sulfate-rich extract (CSE) from skate cartilage against lipopolysaccharide (LPS)-induced hepatic damage were investigated, and its mechanism of action was compared with that of chondroitin sulfate (CS) from shark cartilage. ICR mice were orally administrated 200 mg/kg body weight (BW) of CS or 400 mg/kg BW of CSE for(More)
This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID to be(More)
Recently diverse studies have emerged on the ubiquitous environment including the ones on RFID tag. In terms of security, in particular, RFID tag is not able to provide complex forms of security services due to its hardware limits, putting in turn limits on its wider use. Therefore, this thesis is to suggest an improved RFID tag authentication scheme using(More)
  • 1