• Title/Summary/Keyword: 안전채널

Search Result 324, Processing Time 0.024 seconds

Effect of Calcium Channel Blocker on Acetaminophen-induced Hepatotoxicity in Rats and Histopathologic Examination (Acetaminophen에 의해 유도된 흰주의 간손상에 미치는 Calcium channel Blocker의 효과 및 조직학적 소견)

  • 이은경;정기화;정춘식
    • Journal of Food Hygiene and Safety
    • /
    • v.13 no.3
    • /
    • pp.258-267
    • /
    • 1998
  • The acetaminophen (AP AP), an antipyretic and analgesic agent, induces the hepatotoxicity by increasing influx of calcium and destabilizing the cellular membrane which can be caused by N-acetyl-p-benzoquinoneimine generated by cytochrome P-450 (CYF-450) when it is overdosed. Diltiazem (DIL), a calcium channel blocking agent, has been known to suppress the CYF-450 activities. To study the effect of DIL in APAP treated rats, the serum biotransformational enzyme analyses and the liver histopathologic examination were conducted on the rats which had been administered DIL at 3, 6, 9 and 12 hours after the 3,000 mg/kg of APAP administration. Following a single dose of DIL administered 12 hours after AP AP administration, serum alanine aminotransferase (ALT) and aspartate aminotransferase (AST) activities, malondialdehyde and calcium contents of liver and microsome were significantly reduced. Glutathione S-transferase (GST) activity was significantly increased. Histopathologic studies showed that DIL had prevented the development of centrilobular necrosis induced by AP AP in liver tissue. Our results suggested that diltiazem could inhibit the formation of free radical and the influx of calcium and could increase GST activity. Therefore, diltiazem can be administered at the time of 12 hours after overdosed AP AP to diminish the liver damage.

  • PDF

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

Design of Hybrid V2X Communication Module for Cooperative Automated Driving (자율협력주행을 위한 하이브리드 V2X 통신모듈 설계)

  • Lim, Ki-taeg;Jin, Seong-keun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.3
    • /
    • pp.213-219
    • /
    • 2018
  • In this paper, we propose a design method and process for hardware and software of hybrid V2X communication module that supports both C-ITS communication protocol designed for vehicle environment and Legacy LTE communication technology. C-ITS is suitable for safety service applications due to its low latency characteristics, and Legacy LTE is a technology suitable for non-safety applications such as traffic information and infotainment due to high latency and high capacity. The hybrid V2X communication module supports multiple communication technologies of WAVE and LTE, in which WAVE supports multiple channels, so that it is designed to transmit road information such as LDM and positioning correction information to an autonomous vehicle in real time. The main design results presented in this paper will be applied to the implementation of future hybrid V2X communication terminals for vehicles.

A V2V Transmission Scheme for Safety Message Dissemination in Platooning (군집주행 차량의 안전 메시지 전달을 위한 V2V 전송 기법)

  • Ahn, Woojin;Hong, Hanseul;Kim, Ronny Yongho
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.6
    • /
    • pp.548-553
    • /
    • 2019
  • Along with advanced vehicle to vehicle (V2V) communication technologies, platooning is regarded as one of the most promising form of autonomous driving solutions in order to increase road capacity. In this paper, we propose a novel V2V transmission scheme for safety message dissemination in platooning. The proposed scheme enhances the efficiency of channel access and multi-vehicle orthogonal frequency division multiple access (OFDMA) transmission by taking advantage of triggered uplink access technique and null data packet feedback report protocol introduced in the sixth generation WLAN standard, IEEE 802.11ax. The simulation results prove that the proposed scheme outperforms the conventional IEEE 802.11 transmission scheme throughout all measured vehicle density range.

Implementation of Power Line Modem Using a Direct Sequence Spread Spectrum Technique (직접대역확산 기법을 적용한 전력선 모뎀의 구현)

  • 송문규;김대우;사공석진;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.2
    • /
    • pp.218-230
    • /
    • 1993
  • A power line modem(PLM) which transfers data safely through power lines in houses or small offices is considered. When a power line is used for communications, transmitted signals could be affected by the channel characteristics such as frequency-selective fading, interference, and time-varying attenuation. In order to overcome these impairments, a direct sequence(DS) technique which is well known as an effective instrument against a variety of interferences and hostile channel properties is employed. Using a DS technique, however, requires more circuits such as PN code generator circuits, code modification circuits, and complicated synchronization circuits, and it also results in substantial acquisition delay. In this paper, some of these circuits are implemented via software programmed in the system controller, and the complicated synchronization circuits are replaced by simple circuits utilizing a 60 Hz power signal for synchronization. The synchronization ciruits used in this paper virtually eliminate the substantial acquisition delay, and is also designed to free influence of 60 Hz zero crossing jitters which reside in a power signal. As a result, a PLM using a DS technique is realized in the form of wall-socket plug, and the PLM hardware would be very much simplified.

  • PDF

Yi et al.'s Group Key Exchange Protocol : A Security Vulnerability and its Remediation (Yi등이 제안한 그룹 키 교환 프로토콜의 보안 취약성 및 개선 방법)

  • Lee, Young-Sook;Kim, Jee-Yeon;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.'s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.'s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.'s protocol and show how to solve it.

The Effects of Consumer Characteristics Using Online Shopping on Omni-Channel Strategy (온라인 쇼핑을 이용하는 소비자 특성이 옴니채널 전략에 미치는 영향)

  • Oh, Hyung-Sool;Cho, Su-Yeon;Yoo, Jung-Sang;Kwon, Ik-Whan G.
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.2
    • /
    • pp.173-180
    • /
    • 2017
  • Omni-channel strategy is an innovative paradigm for integrated information distribution of inventory, sales, operations, marketing, delivery, pickups and returns in supply chain management. Recently the distribution strategy faces new challenges with the advent of mobile distribution channels. Social media with countless apps imposes additional stress on supply chain operations. Due to these changes, distribution network in supply chain is changing naturally and rapidly from multi-channel to omnni-channel platform. Recently numerous domestic distributors establish and adapt this new supply chain optimization tool as a part of seamless flow of movements of goods from one channel to other channels. The objective of this paper is to present a preliminary findings on how omnni-channel affects the supply chain management. A survey is used to ascertain in the degree of omnni-channel implementation and statistical evidence is provided to test sets of hypothesis. The results of the questionnaire showed that consumers' purchasing styles differed by gender, age, purchase purpose, and product type. In particular, women consider purchasing experience in omni-channel to be important. As food and household goods can be conveniently shipped, consumers prefer online purchasing it. Conversely, consumers tend to favor omni-channel strategy in connection with offline experience in IT products.

A Group Key Management for Real-Time Multicasting Information Security (실시간 멀티캐스팅 정보보안을 위한 그룹키 관리)

  • Hong, Jong-Joon;Hwang, Kyo-Chul
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.809-814
    • /
    • 2003
  • The multicast transmitting the real-time data to groups may easily have many attacks from abnormal attacks because it has many links as compared to the unicast. The existing group key management architectures for preventing these problems are designed for protocols suitable for a large scale. Thus these architectures applied to a small scale routing protocols may have many overheads with key distribution and a constant core tree. Therefore this paper proposes a groups key management protocol for a secure multicast in PIM-SM multicast group communication. The proposed method divide multicast groups with RO(Rendezvous-Point), and subgroup key managers are established in each RP and can be transmitted groups keys between senders and receivers, so the security cannel is set up for secure data transfer, And this does not have needs of the data translation for group keys and the new key distribution for path change. As a result of this, the data transmission time can be reduced.

Development of Continuous Ground Deformation Monitoring System using Sentinel Satellite in the Korea (Sentinel 위성기반 한반도 연속 지반변화 관측체계 개발)

  • Yu, Jung Hum;Yun, Hye-Won
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.5_2
    • /
    • pp.773-779
    • /
    • 2019
  • We developed the automatic ground deformation monitoring system using Sentinel-1 satellites which is operating by European Space Agency (ESA) for the Korea Peninsula's ground disaster monitoring. Ground deformation occurring over a long-term period are difficult to monitoring because it occurred in a wide area and required a large amount of satellite data for analysis. With the development of satellites, the methods to regularly observe large areas has been developed. These accumulated satellite data are used for time series ground displacement analysis. The National Disaster Management Research Institute (NDMI) established an automation system for all processes ranging from acquiring satellite observation data to analyzing ground displacement and expressing them. Based on the system developed in this research, ground displacement data on the Korean Peninsula can be updated periodically. In the future, more diverse ground displacement information could be provided if automated small regional analysis systems, multi-channel analysis method, and 3D analysis system techniques are developed with the existing system.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.