• Title/Summary/Keyword: 방어유형

Search Result 162, Processing Time 0.023 seconds

Patterns of Tannin Accumulation in Leaves of C-4 Euphorbia maculata (C-4 Euphorbia maculata 엽육조직 내 탄닌물질의 축적 양상)

  • Kim, In-Sun
    • Applied Microscopy
    • /
    • v.33 no.3
    • /
    • pp.233-241
    • /
    • 2003
  • Patterns of tannin accumulation in leaves of C-4 Euphorbia maculata have been examined using electron microscopy. Tannins, which are secondary metabolite phenolic compounds, were found to be deposited conspicuously in vacuoles of certain tissues regardless of their stage in development. However, patterns of deposit accumulation were distinguishable by their cell type during leaf differentiation. The deposits appeared most concentrated in the concentric bundle sheath cells enclosing veins, while little or no density was detected mostly in the mesophyll cells close to the epidermis. An ultrastructural study revealed that the deposits were restricted to the vacuoles at an early stage of leaf development; during which the vacuoles were almost completely filled with the tanniferous substances. The deposits themselves took different forms ranging from granules to huge globules while expanding leaf blade. As the leaf matured, the deposits accumulated either centripetally adjacent to the inner tangential tonoplast or by penetration into the cytoplasm amongst various cellular organelles, resulting in an extremely dense cytoplasm. Electron micrographs frequently showed the delineation of each organelle by the presence of dense deposits within the cytoplasm. Some large depository vacuoles filled with tannins had a corrugated appearance on the sectioned surface. The pattern and potential role of the deposits have been discussed.

Analysis of Organic Composition Principles and Operating System of Ancient Battle Formation in the Late Joseon Dynasty (조선후기 군사 전술의 진법(陣法) 구성과 운영체계 분석)

  • Kwon, Byung-Woong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.200-210
    • /
    • 2017
  • This Research is focused on ancient battle formation basing on the layout drawing of Yijinchongbang (manuals of learning military formations) in a strategy book in the late Joseon dynasty. The research topic is the principles of organic composition of battle formation and battlefield operating system by reforming the basic model of ancient battle formation. The research method is comparative analysis by reforming the battlefield operating system of types of disposition such as Obangjindisposition(Bangnjin; battle formation, Jikjin; direct battle formation, Gokjin; bend battle formation, Wonjin; round battle formation, and Yejin; keen battle formation), and Hyunmoojindo; turtle battle formation, Paljindo; all-rounder battle formation, Yookhwajindo; six flowers battle formation, Gugunjindo; nine forms battle formation. From the study results, Standoff Bombing of the battle formation in the late Joseon Dynasty basically started out from magic battle formation, but was then transformed into square, rectangle, pentagon, and circle. Also, the battle array composition used a 5-linear structure and was composed of 5 systems of circulation such as rectangle, square, diagonal, curve, and circle. The research findings elucidate the battlefield of the Joseon dynasty by establishing the real battle formation, and thus have military and academic value in suggesting possible tactics that can be used by modern training of military.

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF

Acute Degeneration of Primordial Follicles in Mouse Ovary after Whole-Body Irradiation (전신조사된 생쥐 난소내 원시난포의 급성 퇴화)

  • Lee, Chang-Joo;Park, Ho-Hyun;Yoon, Yong-Dal;Kim, Yeon-Ku;Kim, Jin-Kyu
    • Journal of Radiation Protection and Research
    • /
    • v.24 no.2
    • /
    • pp.87-92
    • /
    • 1999
  • The present study was carried out to evaluate the morphological changes in the degenerating primordial follicles induced by $\gamma$-radiation. The prepubertal female mice of three weeks old ICR strain were whole-body irradiated with a dose of $LD_{80(30)}$ (8.3 Gy). The ovaries were collected at 0 h, 3 h, 6 h, and 12 h post-irradiation. The largest cross sections were prepared with histological semi-thin sections and then observed microscopically. The ratio of normal to atretic follicles was reduced significantly after 6th post-irradiation. At 6 h post-irradiation, the number of degenerated primordial follicles increased. Germinal vesicles disappeared, and lipid droplets increased. No more ooplasmic membranes were seen. Granulosa cells became round in shape, and apoptotic cells started to appear. The ratio of normal to atretic follicles in the control group was 62.50%. The ratio decreased with time after irradiation. The ratio decreased down to 51.61 %, 48.97 %, 11.11 %, and 7.14 % at 0 h, 3 h, 6 h, and 12 h, respectively. Taken together, ionizing radiation acutely induced the degeneration of primordial follicles. The patterns of degeneration are 1) apoptosis of one or more granulosa cells with relatively intact oocyte, 2) apoptosis of oocyte with intact follicle cells, or 3) apoptotic degenerations of both cells. The Present study can provide morphological clues for the identification of degenerating primordial follicles.

  • PDF

Comparison of Measured and Predicted $^3H$ Concentrations in Environmental Media around the Wolsung Site for the Validation of INDAC Code (주면피폭선량 평가코드(INDAC)의 검증을 위한 월성원전 주면 삼중수소 농도 실측치와 예측치의 비교 평가)

  • Jang, Si-Young;Kim, Chang-Kyu;Rho, Byung-Hwan
    • Journal of Radiation Protection and Research
    • /
    • v.25 no.2
    • /
    • pp.75-80
    • /
    • 2000
  • The predicted results of INDAC code were compared with measured $^3H$ concentrations in air and pine-needle around the Wolsung site. The optimal sets of input data to INDAC were in addition selected by comparing the measured values with the predicted values of INDAC based on various conditions such as the release modes of effluents into the environment, the classification of wind classes, and the consideration of terrain. The predicted $^3H$ concentrations in air and pine-needle were shown to have good agreement with measured values, although there are some limitations such as uncertainties in measured values, complex topology around the site, and the land-sea breeze effects. The assumption on the $^3H$ behavior in vegetables or plants that the ratio of $^3H$ concentration in plant water to $^3H$ concentration in atmospheric water is 1/2 was shown to be conservative in terms of the audit calculation performed by the regulator. It was also found that data sets based on mixed mode and no terrain data were not appropriate for the audit calculation ensuring the compliance with regulations. Thus, if the mixed mode is considered as the release mode of effluents into the environment, meteorological data measured at 58 m height and terrain data should be used to evaluate the atmospheric dispersion factor.

  • PDF

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Study on Crime Prevention Design in Urban Apartment Complex by Application of a CPTED -focused on the Medium sized City- (중소도시 아파트단지 방범계획의 CPTED 요소 적용에 관한 연구)

  • Bahn, Sang-Chul;Shin, Hee-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.2
    • /
    • pp.1176-1187
    • /
    • 2014
  • In Contemporary residential area, especially apartment commplex, crime affect the quality of life and sustainability of cities. So our interest is an all-time high in the role that planning processes and the design of the physical environment can play in reducing the opportunity for crime. The purpose of this study try to find the possibility of application of CPTED in Urban Apartment Complex. Recently, as increase of residencial density, diverse and new types of crime are increasing in urban apartment complex. It is the current of times which demand our serious consideration. This research focused on crime reduction through the physical environmental control methods. And the concepts and contents of CPTED are studied and the case studies of developed countries are surveyed. For groping in the practical application, researched into the case study of apartment blocks in medium sized city, Cheongju. Also Local crime prevention initiatives require partnership working, both between professionals and with local communities. The result of this study has implicated, increasing importance on daily safety issue in urban life and examining the possibility of applying crime prevention and reduction program and systems.

Bacterial Toxin-antitoxin Systems and Their Biotechnological Applications (박테리아의 toxin-antitoxin system과 생명공학기술 응용)

  • Kim, Yoonji;Hwang, Jihwan
    • Journal of Life Science
    • /
    • v.26 no.2
    • /
    • pp.265-274
    • /
    • 2016
  • Toxin-antitoxin (TA) systems are ubiquitous genetic modules that are evolutionally conserved in bacteria and archaea. TA systems composed of an intracellular toxin and its antidote (antitoxin) are currently classified into five types. Commonly, activation of toxins under stress conditions inhibits diverse cellular processes and consequently induces cell death or reversible growth inhibition. These effects of toxins play various physiological roles in such as regulation of gene expression, growth control (stress response), programmed cell arrest, persister cells, programmed cell death, phage protection, stabilization of mobile genetic elements or postsegregational killing of plasmid-free cells. Accordingly, bacterial TA systems are commonly considered as stress-responsive genetic modules. However, molecule screening for activation of toxin in TA system is available as development of antimicrobial agents. In addition, cytotoxic effect induced by toxin is used as effective cloning method with antitoxic effect of antitoxin; consequently cells containing cloning vector inserted a target gene can survive and false-positive transformants are removed. Also, TA system is applicable to efficient single protein production in biotechnology industry because toxins that are site-specific ribonuclease inhibit protein synthesis except for target protein. Furthermore, some TA systems that induce apoptosis in eukaryotic cells such as cancer cells or virus-infected cells would have a wide range of applications in eukaryotes, and it will lead to new ways of treating human disease. In this review, we summarize the current knowledge on bacterial TA systems and their applications.

Counter Measures by using Execution Plan Analysis against SQL Injection Attacks (실행계획 분석을 이용한 SQL Injection 공격 대응방안)

  • Ha, Man-Seok;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.76-86
    • /
    • 2016
  • SQL Injection attacks are the most widely used and also they are considered one of the oldest traditional hacking techniques. SQL Injection attacks are getting quite complicated and they perform a high portion among web hacking. The big data environments in the future will be widely used resulting in many devices and sensors will be connected to the internet and the amount of data that flows among devices will be highly increased. The scale of damage caused by SQL Injection attacks would be even greater in the future. Besides, creating security solutions against SQL Injection attacks are high costs and time-consuming. In order to prevent SQL Injection attacks, we have to operate quickly and accurately according to this data analysis techniques. We utilized data analytics and machine learning techniques to defend against SQL Injection attacks and analyzed the execution plan of the SQL command input if there are abnormal patterns through checking the web log files. Herein, we propose a way to distinguish between normal and abnormal SQL commands. We have analyzed the value entered by the user in real time using the automated SQL Injection attacks tools. We have proved that it is possible to ensure an effective defense through analyzing the execution plan of the SQL command.

Recent Research Trends in Thioredoxin Reductase-targeted Anticancer Therapy (Thioredoxin reductase를 표적으로 하는 항암 최신 연구 동향)

  • Hwangbo, Hyun;Lee, Hyesook;Cheong, JaeHun;Choi, Yung Hyun
    • Journal of Life Science
    • /
    • v.32 no.1
    • /
    • pp.63-69
    • /
    • 2022
  • The thioredoxin reductase (TrxR) system is essential for cell survival and function by playing a pivotal role in maintaining homeostasis of cellular redox and regulating signal transduction pathways. The TrxR system comprises thioredoxin (Trx), TrxR, and nicotinamide adenine dinucleotide phosphate. Trx reduced by the catalytic reaction of the TrxR enzyme reduces downstream proteins, resulting in protection against oxidative stress and regulation of cell differentiation, growth, and death. Cancer cells survive by improving their intracellular antioxidant capacity to eliminate excessively generated reactive oxygen species (ROS) due to infinite cell proliferation and a high metabolic rate. Therefore, cancer cells have high dependence and sensitivity to antioxidant systems, suggesting that focusing on TrxR, a representative antioxidant system, is a potential strategy for cancer therapy. Several studies have revealed that TrxR is expressed at high levels in various types of cancers, and research on anticancer activity targeting the TrxR system is increasing. In this review, we discuss the feasibility and value of the TrxR system as a strategy for anticancer activity research by examining the relationship between the function of the intracellular TrxR system and the development and progression of cancer, considering the anticancer activity and mechanism of TrxR inhibitors.