http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Peer-to-Peer Content Distribution Technologies with Trusted Platform
Chinyere Kennedy,DongSub Cho 대한전기학회 2011 정보 및 제어 심포지엄 논문집 Vol.2011 No.10
The basic concept of "peer-to-peer" network architectural design is for the sharing of the computer resource such as content, storage, CPU cycle by self organization that does not need a centralized server. Peer-to-peer network can be adapted to failure and also allow transmission of nodes which manages and coordinates the network. Peer-to-peer network application of content distribution on the Internet has attracted a lot of research attention, for its ability to coordinate peraonal computer in an organized manner by searching, contributing and obtaining digital content. The trusted platform module(TPM) is a micro-controller that stores keys passwords and digital certificates which is in the motherboard of a PC, though can also be used in other computing device. This paper proposed framework architecture for a trusted platform on peer-to-peer content distribution technologies. This is the recent issues of peer-to-peer systems and its infrastructure based on its distribution of object location/routing mechanisms and its security.
The ASEAN Single Shipping Market: Towards a Regional Cabotage Regime
Chinyere Ezeoke (사) 이준국제법연구원 2017 Journal of East Asia and International Law Vol.10 No.1
ASEAN's goal of establishing a single shipping market is consistent with its desire to create a highly integrated, connected and competitive region in which cross-border, intra-ASEAN establishment and provision of shipping services is permitted. However, the measures currently being mapped out for achieving the single shipping market have not included liberalizing cabotage. This article argues that abolishing cabotage by removing the prohibition on the ASEAN ship-owners to engage in each other's domestic shipping is a necessary requirement to fully achieve a single shipping market. It discusses the cabotage regimes in the four ASEAN States, namely Malaysia, Indonesia, the Philippines and Thailand. It highlights the vessel registration, licensing and manning requirements of each State. Further, the article discusses the regulatory provisions that exclude foreign ship-owners from domestic shipping and the scope of the exemptions from cabotage. Finally, it makes recommendations on how the disparate regulatory provisions can be harmonized through the adoption of an ASEAN agreement on cabotage.
Architecture of Secure System with High Availability in TPM
Chinyere Grace Kennedy(그레이스 케네디),Cho Dong-Sub(조동섭) 대한전기학회 2013 대한전기학회 학술대회 논문집 Vol.2013 No.7
Trusted platform is gaining a lot of acceptance in the security communication industry and cloud computing. Trusted Platform Module (TPM) is recently used to secure communication network which enables strong user authentication and machine attestation-essential in preventing unwanted access to sensitive information. TPM is a hardware technology which is widely available in today’s market, we believe that one of the key factors that makes TPM a very trusted securing device is its ability to protect customer’s information, prevent of external interference and secure of confidential information from the attackers. Currently TPM is only one device in a given system which can cause a lot of damage if not properly handled. We designed a dual TPM device to resolve this situation with high availability that is controlled. We described the design of dual TPM, the architecture and the scenario in which it found useful in our device server computing environment.
Trusted Platform Module as Secure Key in communication Network
Chinyere Grace Kennedy,DongSub Cho,Min-Hwan Kim 한국멀티미디어학회 2011 한국멀티미디어학회 국제학술대회 Vol.2011 No.-
Trusted Platform Module (TPM) is recently used to secure communication network which enables strong user authentication and machine attestation-essential in preventing unwanted access to sensitive information. However, due to lack of communication, security of sensitive data could not transmit securely over the networks using only TPM at user side. This paper proposed a framework architecture for a trusted platform on both client and server side which increase the security against attackers or intruders. Trusted and secured platform can enable seamless authentication in most of the applications. Scenarios for different security or user needs are shown appropriate key policies. Solutions are focused on ease of use, security and the needs of different usage areas.
Design of a Secure Remote Control System with High Availability in TPM
Chinyere Kennedy,DongSub. Cho 한국멀티미디어학회 2010 한국멀티미디어학회 학술발표논문집 Vol.2010 No.2
In this paper we present a discovery and communication system design for high availability of security and privacy. Although TPM computing hardware technology is widely available in today’ market, we believe that one of the key factors in making TPM a very trusted securing device is its capability in authentication of device keys. Currently TPM is only one device in a given system which can cause a lot of damages if not properly handled. We designed a dual TPM device to resolve this situation with high availability that is remotely controlled. We described the design of dual TPM and the architecture and the scenario in which it found useful in our device server computing environment.
Personalization of Caller ID to PC Application
Chinyere Grace Kennedy,Min Kyung Lee,Su Bin Park,Yu Ri Park,Cho Dong Sub 한국멀티미디어학회 2009 한국멀티미디어학회 국제학술대회 Vol.2009 No.-
This paper presents the personalization of caller Identification information on a personal computer system. The user interface comprises of an interface of receiving an incoming call from a customer which corresponds with the caller's personal information already stored in the database such as name, photo, and address. The caller identification will display the date and the time of call. Previously, when caller ID cannot be displayed on the system it is more difficulty to identify the caller, time and date especially in the absence of the receiver and most of the work are personalizing mobile phone. The personalized caller ID enables receiver to calculate his bill, know the time and the date the customer called, the duration and the number of time the customer called. This proposed scheme is very simple and effective to use. The proposed scheme was evaluated by running a simulation which successfully read and displayed the out-of-band signal containing the caller's number on the PC.
Piper guineense- an underutilized aromatic spice with medicinal value
Philippa Chinyere Ojimelukwe 경희대학교 융합한의과학연구소 2023 Oriental Pharmacy and Experimental Medicine Vol.23 No.2
This paper reviews available research information on the medicinal value and health benefits of Piper guineense in relation to its composition and biologically active compounds. Piper guineense is an herbaceous vine found in the tropics and sub-tropical regions. It is used as a spice and as a medicinal plant in many traditional settings. Solvent extracts of P. guineense leaves and fruits contain different biologically active compounds. Some of the major biologically active compounds in P. guineense are dillapiole, linalool and myristicine. These compounds possess anti-cancer, anti-diabetic and antioxidant properties. It also contains piperine which is responsible for the hotness associated with the Piper species and other antimicrobial phytochemicals. Some of the peculiar potential attributes of P. guineense include promoting fertility and its anti-inflammatory effects. It is a good antimicrobial agent against food spoilage and pathogenic organisms. Many of the biologically active compounds found in the leaves (or their derivatives) are also found in the fruits. Scientific information about the health benefits of the, stem and roots is lacking. The potentials of this underutilized vine to boost human health is enormous and it deserves improved research attention in the areas of improved production, genetic identification of chemotypes and more research investigations into its composition and medicinal value.