• 제목/요약/키워드: Control Flow Integrity

Search Result 62, Processing Time 0.023 seconds

Effects of Ginsenoside-$Rg_1$ on Post-thawed Miniature Pig Sperm Motility, Mitochondria Activity, and Membrane Integrity

  • Hwang, You Jin;Kim, Dae Young
    • Journal of Embryo Transfer
    • /
    • v.28 no.1
    • /
    • pp.63-71
    • /
    • 2013
  • In this study, we used flow a cytometric assay to evaluate plasma membrane integrity and mitochondrial activity in post-thawed sperm that was supplemented with ginsenoside-$Rg_1$. Varying concentrations of ginsenoside-$Rg_1$ (0, 25, 50 and $100{\mu}M/ml$) were used in the extender during cryopreservation to protect the DNA of thawed sperm, thereby increasing the viability and motility rate as evaluated using a computer-assisted sperm analysis (CASA) method. The results derived from CASA were used to compare the fresh, control, and ginsenoside-$Rg_1$ groups. Sperm motility and the number of progressively motile sperm were significantly (p<0.05) higher in the $50{\mu}M/ml$ ginsenoside-Rg1 group ($61.0{\pm}4.65%$) than in the control ($46.6{\pm}7.02%$), $25{\mu}M/ml$ ($46.2{\pm}4.76%$), and $100{\mu}M/ml$ ginsenoside-$Rg_1$ ($52.0{\pm}1.90%$) groups. However, the velocity distribution of post-thawed sperm did not differ significantly. Membrane integrity and MMP staining as revealed using flow cytometry were significantly (p<0.05) higher ($91.6{\pm}0.82%$) in the $50{\mu}M/ml$ ginsenoside-$Rg_1$ group than in the other groups. Here, we report that ginsenoside-$Rg_1$ affects the motility and viability of boar spermatozoa. Moreover, ginsenoside-$Rg_1$ can be used as a protective additive for the suppression of intracellular mitochondrial oxidative stress caused by cryopreservation.

Melatonin and selenium supplementation in extenders improves the post-thaw quality parameters of rat sperm

  • Shahandeh, Erfan;Ghorbani, Mahboubeh;Mokhlesabadifarahani, Tahereh;Bardestani, Fateme
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.49 no.2
    • /
    • pp.87-92
    • /
    • 2022
  • Objective: The aim of this study was to determine the effects of melatonin and selenium in freezing extenders on frozen-thawed rat sperm. Methods: Semen samples were collected from 20 adult male Wistar albino rats. Following dilution, the samples were divided into six groups: four cryopreserved groups with 1 mM and 0.5 mM melatonin and selenium supplements, and two fresh and cryopreserved control groups. The rapid freezing technique was used to freeze the samples. Flow cytometry was used to assess plasma membrane integrity, mitochondrial membrane potential, and DNA damage, while computer-assisted sperm analysis was used to assess motility. Results: Total motility was higher in the 1 mM melatonin supplementation group than in the cryopreserved control group (mean±standard error of the mean, 69.89±3.05 vs. 59.21±1.31; p≤0.05). The group with 1 mM selenium had the highest plasma membrane integrity (42.35%±1.01%). The cryopreserved group with 0.5 mM selenium had the highest mitochondrial membrane potential, whereas the cryopreserved control group had the lowest (45.92%±4.53% and 39.45%±3.52%, respectively). Conclusion: Cryopreservation of rat semen supplemented with 1 mM melatonin increased sperm motility after freeze-thawing, while supplementation with 0.5 mM selenium increased mitochondrial activity.

A Role-Based Access Control Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 역할기반 접근제어모델)

  • Byun Chang-Woo;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.13-29
    • /
    • 2005
  • An important characteristic of role-based access control model(RBAC) is that by itself it is policy neutral. This means RBAC articulates security policy without embodying particular security policy. Because of this reason, there are several researches to configure RBAC to enforce traditional mandatory access control(MAC) policy and discretionary access control(DAC) policy. Specifically, to simulate MAC using RBAC several researches configure a few RBAC components(user, role, role-hierarchy, user-role assignment and session) for keeping no-read-up rule and no-write-down rule ensuring one-direction information flow from low security level to high security level. We show these researches does not ensure confidentiality. In addition, we show the fact that these researches overlook violation of integrity due to some constraints of keeping confidentiality. In this paper we propose a RBAC model satisfying both confidentiality and integrity. We reexamine a few RBAC components and constructs additional constraints.

WACFI: Code Instrumentation Technique for Protection of Indirect Call in WebAssembly (WACFI: 웹 어셈블리에서의 간접호출 명령어 보호를 위한 코드 계측 기술)

  • Chang, Yoonsoo;Kim, Youngju;Kwon, Donghyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.753-762
    • /
    • 2021
  • WebAssembly(WASM) is a low-level instruction format that can be run in a web environment. Since WASM has a excellent performance, various web applications use webassembly. However, according to our security analysis WASM has a security pitfall related to control flow integrity (CFI) for indirect calls. To address the problem in this paper we propose a new code instrumentation scheme to protect indirect calls, named WACFI. Specifically WACFI enhances a CFI technique for indirect call in WASM based on source code anlysis and binary instrumentation. To test the feasibility of WACFI, we applied WACFI to a sound-encoding application. According to our experimental results WACFI only adds 2.75% overhead on the execution time while protecting indirect calls safely.

Smart-Coord: Enhancing Healthcare IoT-based Security by Blockchain Coordinate Systems

  • Talal Saad Albalawi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.32-42
    • /
    • 2024
  • The Internet of Things (IoT) is set to transform patient care by enhancing data collection, analysis, and management through medical sensors and wearable devices. However, the convergence of IoT device vulnerabilities and the sensitivity of healthcare data raises significant data integrity and privacy concerns. In response, this research introduces the Smart-Coord system, a practical and affordable solution for securing healthcare IoT. Smart-Coord leverages blockchain technology and coordinate-based access management to fortify healthcare IoT. It employs IPFS for immutable data storage and intelligent Solidity Ethereum contracts for data integrity and confidentiality, creating a hierarchical, AES-CBC-secured data transmission protocol from IoT devices to blockchain repositories. Our technique uses a unique coordinate system to embed confidentiality and integrity regulations into a single access control model, dictating data access and transfer based on subject-object pairings in a coordinate plane. This dual enforcement technique governs and secures the flow of healthcare IoT information. With its implementation on the Matic network, the Smart-Coord system's computational efficiency and cost-effectiveness are unparalleled. Smart-Coord boasts significantly lower transaction costs and data operation processing times than other blockchain networks, making it a practical and affordable solution. Smart-Coord holds the promise of enhancing IoT-based healthcare system security by managing sensitive health data in a scalable, efficient, and secure manner. The Smart-Coord framework heralds a new era in healthcare IoT adoption, expertly managing data integrity, confidentiality, and accessibility to ensure a secure, reliable digital environment for patient data management.

A Study on Flow Characteristics with the Installed Location Change of Mechanical Deflector (기계적 편향판 설치위치의 변화에 따른 유동특성에 대한 연구)

  • Kim, Kyoung-Ryun;Park, Jong-Ho
    • The KSFM Journal of Fluid Machinery
    • /
    • v.18 no.5
    • /
    • pp.49-53
    • /
    • 2015
  • Thrust vector control is the method which generates the side force and roll moment by controlling exhausted gas directly in a rocket nozzle. TVC is classified by mechanical and fluid dynamic methods. Mechanical methods can change the flow direction by several objects installed in a rocket nozzle exhaust such as tapered ramp tabs and jet vane. Fluid dynamic methods control the flight direction with the injection of secondary gaseous flows into the rocket nozzle. The tapered ramp tabs of mechanical methods are used in this paper. They installed at the rear in the rocket nozzle could be freely moved along axial and radial direction on the mounting ring to provide the mass flow rate which is injected from the rocket nozzle. TVC of the tapered ramp tabs has the potential to produce both large axial thrust and high lateral force. We have conducted the experimental research and flow analysis of ramp tabs to show the performance and the structural integrity of the TVC. The experiments are carried out with the supersonic cold flow system and the schlieren graph. This paper provides to analyze the location of normal shock wave and distribution of surface pressure on the region enclosed by the tapered ramp tabs.

A Study on the Flow Analysis on the Software-Defined Networks through Simulation Environment Establishment (시뮬레이션 환경 구축을 통한 소프트웨어-정의 네트워크에서 흐름 분석에 관한 연구)

  • Lee, Dong-Yoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.88-93
    • /
    • 2020
  • Recently, SDN technology is applied to real communication business, users are getting bigger, and as the amount of data flowing in the network increases, interest in network data flow management is increasing. During this process, it must be ensured that the confidentiality, integrity, availability, and traceability of the data on the network being transmitted. In addition, it is necessary to develop an environment for observing the flow of data in real time on a network required in various fields and visually confirming the control. In this paper, first, Mininet is applied to construct a network topology and various environment attributes. Second, we added OpenDayLight in Mininet environment to develop a simulation environment to visually check and control network traffic flow in network topology.

Design of a Simulation Model for Integrated Access Control (통합 접근 제어를 위한 시뮬레이션 모델 설계)

  • Lee Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.49-54
    • /
    • 2004
  • Rule-based access control can not completely be replaced by identity-based access control. Neither can role-based access control be a merger of identity-based access control and rule-based access control, but can be used complementarily for each other. In this paper, is proposed a simulation model designed for a new integrated access control method that has been created by means of integrating the existing access control methods. The integrated access control method is equipped with security, integrity and flow control and can easily accomodate the requirements for access control from role-based corporate bodies. The simulation model proposed in this paper can be applied for real working system designs.

  • PDF

Evaluation of Antifreeze Proteins on Miniature Pig Sperm Viability, DNA Damage, and Acrosome Status during Cryopreservation

  • Kim, Daeyoung
    • Journal of Embryo Transfer
    • /
    • v.31 no.4
    • /
    • pp.355-365
    • /
    • 2016
  • The cryopreservation of sperm has become the subject of research for successful artificial insemination technologies. Antifreeze proteins (AFPs), one of the factors necessary for effective cryopreservation, are derived from certain Antarctic organisms. These proteins decrease the freezing point of water within these organisms to below the temperature of the surrounding seawater to protect the organism from cold shock. Accordingly, a recent study found that AFPs can increase the motility and viability of spermatozoa during cryopreservation. To evaluate this relationship, we performed cryopreservation of boar sperm with AFPs produced in the Arctic yeast Leucosporidium sp. AFP expression system at four concentrations (0, 0.01, 0.1, and $1{\mu}g/ml$) and evaluated motility using computer assisted sperm analysis. DNA damage to boar spermatozoa was measured by the comet assay, and sperm membrane integrity and acrosome integrity were evaluated by flow cytometry. The results showed that motility was positively affected by the addition of AFP at each concentration except $1{\mu}g/ml$ (p<0.001). Although cryopreservation with AFP decreased the viability of the boar sperm using, the tail DNA analyses showed that there was no significant difference between the control and the addition of 0.1 or $0.01{\mu}g/ml$ AFP. In addition, the percentage of live sperm with intact acrosomes showed the least significant difference between the control and $0.1{\mu}g/ml$ AFP (p<0.05), but increased with $1{\mu}g/ml$ AFP (p<0.001). Our results indicate that the addition of AFP during boar sperm cryopreservation can improve viability and acrosome integrity after thawing.

A Systems Engineering Approach to Implementing Hardware Cybersecurity Controls for Non-Safety Data Network

  • Ibrahim, Ahmad Salah;Jung, Jaecheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.12 no.2
    • /
    • pp.101-114
    • /
    • 2016
  • A model-based systems engineering (MBSE) approach to implementing hardware-based network cybersecurity controls for APR1400 non-safety data network is presented in this work. The proposed design was developed by implementing packet filtering and deep packet inspection functions to control the unauthorized traffic and malicious contents. Denial-of-Service (DoS) attack was considered as a potential cybersecurity issue that may threaten the data availability and integrity of DCS gateway servers. Logical design architecture was developed to simulate the behavior of functions flow. HDL-based physical architecture was modelled and simulated using Xilinx ISE software to verify the design functionality. For effective modelling process, enhanced function flow block diagrams (EFFBDs) and schematic design based on FPGA technology were together developed and simulated to verify the performance and functional requirements of network security controls. Both logical and physical design architectures verified that hardware-based cybersecurity controls are capable to maintain the data availability and integrity. Further works focus on implementing the schematic design to an FPGA platform to accomplish the design verification and validation processes.