• Title/Summary/Keyword: Current Signature

Search Result 147, Processing Time 0.024 seconds

Switching and sensing molecular spins by chemical reactions on metal surfaces

  • Kahng, Se-Jong
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2015.08a
    • /
    • pp.63.2-63.2
    • /
    • 2015
  • Controlling and sensing spin states of magnetic molecules such as metallo-porphyrins at the single molecule level is essential for spintronic molecular device applications. Axial coordinations of diatomic molecules to metallo-porphyrins also play key roles in dynamic processes of biological functions such as blood pressure control and immune response. However, probing such reactions at the single molecule level to understand their physical mechanisms has been rarely performed. Here we present on our single molecule association and dissociation experiments between diatomic and metallo-porphyrin molecules on Au(111) describing its adsorption structures, spin states, and dissociation mechanisms. We observed bright ring shapes in NO adsorbed metallo-porphyrin compelxes and explained them by considering tilted binding and precession motion of NO. Before NO exposure, Co-porphryin showed a clear zero-bias peak in scanning tunneling spectroscopy, a signature of Kondo effect in STS, whereas after NO exposures it formed a molecular complex, NO-Co-porphyrin, that did not show any zero-bias feature implying that the Kondo effect was switched off by binding of NO. Under tunneling junctions of scanning tunneling microscope, both positive and negative energy pulses. From the observed power law relations between dissociation rate and tunneling current, we argue that the dissociations were inelastically induced with molecular orbital resonances. Our study shows that single molecule association and dissociation can be used to probe spin states and reaction mechanisms in a variety of axial coordination between small molecules and metallo-porphyrins.

  • PDF

Secure OS Technical Development Trend (안전한 운영체제 기술개발 동향)

  • 김재명;이규호;김종섭;김귀남
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.9-20
    • /
    • 2001
  • In the 3rd Wave of information revolution, technical research & development for more rapid and safe information exchange take a sudden turn currently According to a step up in importance and efficiency value of information, it's necessary to research technical development in various field altogether. Especially information security is the very core of essential technology. However most System attacks are based on the weakness of OS, it is difficult to achieve the security goal in the only application level. For the solution of this problem, so many technology researches to serve secure, trust information security in OS itself are activated. Consequently we introduce the tendency of current secure OS development projects of security kernel all over world in this report and inquire into security mechanism of the File Griffin which prevents file system forgery, modification perfectly by performing digital signature certificate on kernel level.

  • PDF

Legal Status of Medical Personnel on Medical Records (환자의 의무기록 관련 의료인의 법적 지위)

  • Lee, Baek-Hyu
    • The Korean Society of Law and Medicine
    • /
    • v.11 no.2
    • /
    • pp.309-335
    • /
    • 2010
  • This study is a paper reviewed legal status of medical personnel and issues of law on recently discovered medical records. As the increase of medical personnel who have gone through the administrative disposal in regards to the medical records, it is needed to examine the legal issue or dispute on the medical records under the current law. Medical records are the statement on patient's medical conditions made by the medical personnel. This records are used as important source for patient's further treatment. This becomes the communication route between the patients and the other medical personnel, and it provides the patients a right to find out their medical information. According to the Medical Service Act (Article 21), a medical personnel shall prepare respectively a record book of medical examination and treatment. And medical personnel shall make a signature. Furthermore, the medical personnel or the opener of the medical institutions must preserve the record book (including an electronic medical record). Meanwhile, the issues of a ban on false entry, additional record, revision or manipulation on the medical record have been recently on the rise. This paper briefly examined the major issues in regards to the medical records. It especially clarified the legal duty on medical records and its major-contentious-issues. At the same time, it pointed out the problems of the unreasonable over interpretation of the law. Furthermore, this suggested the guidelines for the further discussion and review.

  • PDF

Gamma-ray Emission from Globular Clusters

  • Tam, Pak-Hin T.;Hui, Chung Y.;Kong, Albert K. H.
    • Journal of Astronomy and Space Sciences
    • /
    • v.33 no.1
    • /
    • pp.1-11
    • /
    • 2016
  • Over the last few years, the data obtained using the Large Area Telescope (LAT) aboard the Fermi Gamma-ray Space Telescope has provided new insights on high-energy processes in globular clusters, particularly those involving compact objects such as MilliSecond Pulsars (MSPs). Gamma-ray emission in the 100 MeV to 10 GeV range has been detected from more than a dozen globular clusters in our galaxy, including 47 Tucanae and Terzan 5. Based on a sample of known gammaray globular clusters, the empirical relations between gamma-ray luminosity and properties of globular clusters such as their stellar encounter rate, metallicity, and possible optical and infrared photon energy densities, have been derived. The measured gamma-ray spectra are generally described by a power law with a cut-off at a few gigaelectronvolts. Together with the detection of pulsed γ-rays from two MSPs in two different globular clusters, such spectral signature lends support to the hypothesis that γ-rays from globular clusters represent collective curvature emission from magnetospheres of MSPs in the clusters. Alternative models, involving Inverse-Compton (IC) emission of relativistic electrons that are accelerated close to MSPs or pulsar wind nebula shocks, have also been suggested. Observations at >100 GeV by using Fermi/LAT and atmospheric Cherenkov telescopes such as H.E.S.S.-II, MAGIC-II, VERITAS, and CTA will help to settle some questions unanswered by current data.

An Integrative Approach to Precision Cancer Medicine Using Patient-Derived Xenografts

  • Cho, Sung-Yup;Kang, Wonyoung;Han, Jee Yun;Min, Seoyeon;Kang, Jinjoo;Lee, Ahra;Kwon, Jee Young;Lee, Charles;Park, Hansoo
    • Molecules and Cells
    • /
    • v.39 no.2
    • /
    • pp.77-86
    • /
    • 2016
  • Cancer is a heterogeneous disease caused by diverse genomic alterations in oncogenes and tumor suppressor genes. Despite recent advances in high-throughput sequencing technologies and development of targeted therapies, novel cancer drug development is limited due to the high attrition rate from clinical studies. Patient-derived xenografts (PDX), which are established by the transfer of patient tumors into immunodeficient mice, serve as a platform for co-clinical trials by enabling the integration of clinical data, genomic profiles, and drug responsiveness data to determine precisely targeted therapies. PDX models retain many of the key characteristics of patients' tumors including histology, genomic signature, cellular heterogeneity, and drug responsiveness. These models can also be applied to the development of biomarkers for drug responsiveness and personalized drug selection. This review summarizes our current knowledge of this field, including methodologic aspects, applications in drug development, challenges and limitations, and utilization for precision cancer medicine.

Detection Of Unknown Malicious Scripts using Code Insertion Technique (코드 삽입 기법을 이용한 알려지지 않은 악성 스크립트 탐지)

  • 이성욱;방효찬;홍만표
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.663-673
    • /
    • 2002
  • Server-side anti-viruses are useful to protect their domains, because they can detect malicious codes at the gateway of their domains. In prevailing local network, all clients cannot be perfectly controlled by domain administrators, so server-side inspection, for example in e-mail server, is used as an efficient technique of detecting mobile malicious codes. However, current server-side anti-virus systems perform only signature-based detection for known malicious codes, simple filtering, and file name modification. One of the main reasons that they don't have detection features, for unknown malicious codes, is that activity monitoring technique is unavailable for server machines. In this paper, we propose a detection technique that is executed at the server, but it can monitor activities at the clients without any anti-virus features. we describe its implementation.

Network Session Analysis For BotNet Detection (봇넷 탐지를 위한 네트워크 세션 분석)

  • Park, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2689-2694
    • /
    • 2012
  • In recent years, cyber crimes were intended to get financial benefits through malicious attempts such as DDoS attacks, stealing financial information and spam. Botnets, a network composed of large pool of infected hosts, lead such malicious attacks. The botnets have adopted several evasion techniques and variations. Therefore, it is difficult to detect and eliminate them. Current botnet solutions use a signature based detection mechanism. Furthermore, the solutions cannot cover broad areas enough to detect world-wide botnets. In this paper, we propose IRC (Internet Relay Chat) that is used to control the botnet communication in a session channel of IRC servers connected through the analysis of the relationship of the channel and the connection with the server bot-infected hosts and how to detect.

Virus Detection Method based on Behavior Resource Tree

  • Zou, Mengsong;Han, Lansheng;Liu, Ming;Liu, Qiwen
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.173-186
    • /
    • 2011
  • Due to the disadvantages of signature-based computer virus detection techniques, behavior-based detection methods have developed rapidly in recent years. However, current popular behavior-based detection methods only take API call sequences as program behavior features and the difference between API calls in the detection is not taken into consideration. This paper divides virus behaviors into separate function modules by introducing DLLs into detection. APIs in different modules have different importance. DLLs and APIs are both considered program calling resources. Based on the calling relationships between DLLs and APIs, program calling resources can be pictured as a tree named program behavior resource tree. Important block structures are selected from the tree as program behavior features. Finally, a virus detection model based on behavior the resource tree is proposed and verified by experiment which provides a helpful reference to virus detection.

Design of Efficient Monitoring and Diagnosis System for Motor Condition Monitoring (모터의 상태 감시를 위한 효율적인 모터 감시 및 진단 시스템의 설계 및 구현)

  • Choi, J.H.;Park, H.S.;Lee, D.Z.;Eo, S.Y.;Kang, T.K.;Jeong, H.P.;Choi, J.P.
    • Proceedings of the KIEE Conference
    • /
    • 2006.10a
    • /
    • pp.167-168
    • /
    • 2006
  • 본 논문은 현장에 운전 중인 모터를 효율적으로 고압 모터 감시 및 진단 기법을 검토하고 현장에 보다 적합한 고압모터 감시 및 진단 시스템을 설계 및 개발에 관하여 기술하였다. 고압 모터의 감시 및 진단 방법은 MCSA(Motor Current Signature Analysis) 기법을 기반으로 하여 순시전력, 공극토크, 진동분석 등 다양한 기법이 있으며 이 기법을 적용한 시스템이 출시되고 있다. 그러나 사용자의 요구 및 편이가 반영되지 않아 그대로 적용하기에는 어려움이 있다. 따라서 본 논문에서는 국내의 실정 및 사용자의 편이 맞도록 진단 시스템을 개발 필요성이 요구되어 다양한 검출 요소를 종합적으로 이용한 보다 현장에 적합하고 유용한 모터 감시 시스템을 설계하였다.

  • PDF

A User-based MicroPayment System Using Secret Key (비밀키를 이용한 사용자 중심의 소액지불시스템)

  • Baek Seung-Ho;Jeong Yun-Soo;Won Jong-Kwon;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.189-199
    • /
    • 2005
  • Now it is increasing the necessity for micropayment system according to activation for trade on internet. Because of the reason, it is requesting safety for personal information as well as for payment cost. But current micropayment systems cannot support anonymity or have heavy overheads in payment process. This paper suggests a micropayment system to keep anonymity of users and also to keep payment cost safe. The proposed system is to use blind signature anonymous ID which is combined nonce with an encryption of personal information. It also keeps payment cost of users by reconfirmation payment cost and product from certification and increases the computational efficiency by using secret key and session key instead of public key.

  • PDF