• Title/Summary/Keyword: Defenses

Search Result 161, Processing Time 0.034 seconds

Potential of Wood Vinegar in Enhancing Fruit Yield and Antioxidant Capacity in Tomato

  • Benzon, Hiyasmin Rose L.;Lee, Sang Chul
    • Korean Journal of Plant Resources
    • /
    • v.29 no.6
    • /
    • pp.704-711
    • /
    • 2016
  • Tomatoes are considered as one of the main components of daily meals in most households. Thus, it is important to invest in studies enhancing their yield and nutritional value. The study evaluated the effect of wood vinegar (WV) on tomato under greenhouse conditions. Data on fruit number, fruit weight, and plant height were recorded. Total phenolic content (TPC) and antioxidant activity of tomato were determined using the Folin-Ciocalteu reagent and 2, 2-diphenyl-1-picrylhydrazyl (DPPH) radical scavenging assay, respectively. FRR-CF+500x-WV significantly increased the fruit number (86.11%) and fruit weight (81.78%) over the control. Results were comparable to HRR-CF+250x-WV, indicating that conventional fertilizer and WV may have synergistic effect on each other. TPC and scavenging effect on DPPH radical was improved by 250x-WV application. The increase in the phenolic compounds can be attributed to WV as a direct source or as a factor triggering the plants to produce more secondary metabolites with the purpose of increasing natural defenses. The significant effect obtained by applying the full recommended rate of conventional fertilizer on the carotenoid content was due to the availability of the major nutrients needed by the plant. Correlation analysis showed that carotenoids have negative correlation with TPC and DPPH. However, TPC and DPPH showed that these are positively correlated with each other. Tomatoes are excellent source of antioxidants associated with the reduction of some human diseases and improved health. The results provided evidence that WV alone and/or its combination with conventional fertilizers has favorable effects on the quality of tomato.

A Study on Rekeying and Sponged-based Scheme against Side Channel Attacks (부채널 공격 대응을 위한 Rekeying 기법에 관한 연구)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.579-586
    • /
    • 2018
  • Simple Power Analysis(SPA) and Differential Power Analysis(DPA) attacks are Side Channel Attacks(SCA) which were introduced in 1999 by Kocher et al [2]. SPA corresponds to attacks in which an adversary directly recovers key material from the inspection of a single measurement trace (i.e. power consumption or electromagnetic radiation). DPA is a more sophisticated attacks in which the leakage corresponding to different measurement traces (i.e. different plaintexts encrypted under the same key) is combined. Defenses against SPA and DPA are difficult, since they essentially only reduce the signal the adversary is reading, PA and DPA. This paper presents a study on rekeying and sponged-based approach against SCA with current secure schemes. We also propose a fixed ISAP scheme with more secure encryption and authentication based on secure re-keying and sponge functions.

The Possibility of Arbitration of Patent In Japan -focusing on Kilby case(Japanese Patent Act Article 104-3)- (일본에서 특허의 유효성에 대한 중재가능성 -킬비 판결(일본 특허법 제104조의3)을 중심으로-)

  • Yun, Sun-Hee
    • Journal of Arbitration Studies
    • /
    • v.21 no.1
    • /
    • pp.57-72
    • /
    • 2011
  • According to Japanese Patent Act, the Japanese Patent Office, administrative organization, was authorized to decide validation of patent. However, Supreme Court of Japan held that a court is able to decide the invalidation of patent in 11th April, 2000, which caused the reform of Japanese Patent Act in June 2004. Reformed Patent Act established the article 104-3 and makes it for a court to decide the patentability where there are grounds for a patent invalidation. Through this amendment to the Patent Act, the legislative system to decide the patent validation has been reorganized and furthermore alleged infringer is allowed to argue against the patent validation by making use of infringement litigation procedure through defenses against patent invalidation as well as invalidation trial procedure for to file a request for a trial for patent invalidation to the Japanese Patent Office. That is to say, the article 104-3 was established in the Japanese Patent Act in the wake of Kilby, and thus a court, which is judicial authority, not administrative disposition agency is also able to decide the patent validation. Thus this article discuss how a court, the authority of which only patent infringement cases fell under, has been authorized to arbitrate cases about the patent validation and the decision of the patent validation in a court.

  • PDF

BlueTooth Snarfing attacks and security aspects (BlueTooth Snarfing 공격 및 보안측면)

  • Park, Hyun Uk;Kim, Hyun Soo;Kim, Ki Hawn;Lee, Hoon-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.811-814
    • /
    • 2015
  • There are many modern societies use the digital products in everyday life in the Middle, convenience, give him plenty of Bluetooth is one of the users. Bluetooth (IEEE 802.15.1) means equipment in the close range between the low-power wireless communication standard for the connection to use the technology. Currently, Bluetooth earphone, Bluetooth speaker, wearable mounted devices also used a lot because it takes people to exploit the benefits had been lifted and thereby increases your damage. So, reducing the damage the user's further research about the security technique that can stop completely. I am sure that many Bluetooth hacking techniques, a Bluetooth device firmware vulnerability within the stored data to allow the approach to attacking the BlueTooth Snarfing and want to analyze.

  • PDF

Effect of a-Tocopherol on Vasoregulatory Gene Expression during Polymicrobial Sepsis

  • Kim, Joo-Young;Park, Sang-Won;Lee, Sun-Mee
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 2003.11a
    • /
    • pp.77-77
    • /
    • 2003
  • Sepsis remains common surgical problems with high morbidity and mortality despite improvement in the management for septic patient. Although hepatocellular dysfunction occurs during sepsis, the mechanism responsible for this remains unclear. In sepsis, a state of severe oxidative stress is encountered, with host endogenous antioxidant defenses overcome. Therefore, the aim of this study was to determine the effect of a-tocopherol (AT) vasoregulatory gene expression during polymicrobial sepsis. Rats were subjected to polymicrobial sepsis by cecal ligation and puncture (CLP). AT (15 mg/kg) was intraperitonealy injected for 3 days prior to CLP. Blood samples were taken 24 h after CLP for measurement of the extent of hepatocellular damage. Liver samples were taken for RT-PCR analysis of mRNA for genes of interest: endothelin-l (ET-l), its receptors $ET_{A}$ and $ET_{B}$, nitric oxide synthases (iNOS and eNOS), cyclooxygenase-2 (COX -2), heme oxygenase-l (HO-l), and tumor necrosis factor-$\alpha$ (TNF-$\alpha$). The activities of serum alanine aminotransferase and lipid peroxidation level were significantly increased; an increase which was prevented by AT pretreatment. CLP significantly increased the mRNA levels of ET-1 and $ET_{B}$; an increase that was prevented by AT pretreatment. However, the level of $ET_{A}$ mRNA significantly decreased after CLP; a decrease that was not prevented by AT pretreatment. There were significant increases in the mRNA expression of iNOS, HO-l and COX -2 in CLP groups. This increase was prevented by AT pretreatment. The expression of eNOS and TNF-$\alpha$ mRNA significantly increased in CLP, which was not prevented by AT pretreatment. Our findings suggest that there was an imbalanced vasoregulatory gene expression in sepsis, and AT ameliorates this change through its free radical scavenging activity.

  • PDF

The EST Analysis and Transgene Expression System in Rice

  • Kim, Jukon;Nahm, Baek-Hie
    • Journal of Plant Biotechnology
    • /
    • v.1 no.1
    • /
    • pp.46-55
    • /
    • 1999
  • The expressed sequence tags(ESTs) from immature seed of rice, Oryza sativa cv Milyang 23, were partially sequenced and analyzed by homology. As of 1998, the partial sequences of about 6,600 cDNA clones were analyzed from normal and normalized immature seed cDNA libraries. About 2,200 ESTs were putatively identified by BLASTX deduced amino acid sequence homology analysis. About 20% of them were putatively identified as storage proteins. Also the clones were highly homologous to genes involved particularly in starch biosynthesis, glycolysis, signal transduction and defenses. Compared to 35% of redundancy in the ESTs of normal cDNA library, that from the substracted library was 15%. The Korea Rice Genome Network is maintained to provide the updated information of sequences, their homologies and sequence alignments of ESTs. For the stable expression of transgene in rice, diverse vectors were developed for overexpression, targeting and gene dosage effect with transit peptides (Tp) and matrix attachment region (MAR) sequence from chicken lysozyme locus. The rice calli were transformed via Agrobacterium tumefaciens LBA4404(pSB1) with the triparental mating technique and selected by herbicide resistance. The green fluorescent protein(GFP) gene in expression vector under the control of rbcS promoter-Tp was overexpressed upto 10 % of the total soluble protein. In addition, the Tp-sGFP fusion protein was properly processed during translocation into chloroplast. The expression of sGFP in the presence of MAR sequences was analyzed with Northern and immunoblot analysis. All the lines in which sGFP transgene with MAR sequence, showed position independent and copy number-dependent expression, while the lines without MAR showed the varied level of expression with the integration site. Thus the MAR sequence significantly reduced the variation in transgene expression between independent transformants.

  • PDF

Correlations of Physical Fitness Factors, Antioxidant Enzymes, Lipid Peroxidation, Lipid Profiles, Lactate Levels and Cardiovascular Variables in an Exercising Group and Controls

  • Yu, Jae-Ho;Lee, Suk-Min
    • The Journal of Korean Physical Therapy
    • /
    • v.22 no.3
    • /
    • pp.61-69
    • /
    • 2010
  • Purpose: This study was designed to investigate correlations between physical fitness, antioxidant enzymes (SOD, CAT, GPX), lipid peroxidation levels (MDA), lipid profiles, lactate levels and cardiovascular variables in an exercising group and a control group. Methods: Twelve healthy young males (Exercise group: 6, Controls: 6). All subjects took physical fitness tests and blood samples were collected while subjects were resting. Results: In the exercise group, there were several significant correlations: between back strength and SOD enzyme levels (r=0.82, p=0.04), back strength and MDA (r=0.94, p=0.00), agility and GPX (r=0.81, p=0.04), and balance and GPX (r=0.81, p=0.04). In the control group, there were significant correlations between: dominant grip strength and MDA (r=-0.84, p=0.03), and agility and GPX (r= -0.82, p=0.04). In the exercise group, there were no significant correlations between physical fitness factors, TC, TG, HDL-C and lactate levels. In the control group, there were significant correlations between: back strength and TG (r=0.88, p=0.01), and agility and HDL-C (r= -0.84, p=0.03). In the exercise group, there were significant correlations between: non-dominant grip strength and SBP (r=0.94, p=0.00), dominant grip strength and SBP (r=0.85, p=0.03), and power and SBP (r=0.82, p=0.04). In controls, there were significant correlations between: dominant grip strength and DBP (r=-0.85, p=0.03), muscular endurance and ST level (r=-0.93, p=0.00), and muscular endurance and HR (r=-0.88, p=0.01). Conclusion: That cardiovascular patients and controls who participated in regular exercise maintained their antioxidant capacity suggests that long-term physical activity can counteract the negative dysfunction that characterizes sedentary lifestyle, probably by maintaining plasma antioxidant defenses and thereby preventing oxidative stress.

A Study on Amplification DRDoS Attacks and Defenses (DRDoS 증폭 공격 기법과 방어 기술 연구)

  • Choi, Hyunsang;Park, Hyundo;Lee, Heejo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.429-437
    • /
    • 2015
  • DDoS attacks have been used for paralyzing popular Internet services. Especially, amplification attacks have grown dramatically in recent years. Defending against amplification attacks is challenging since the attacks usually generate extremely hugh amount of traffic and attack traffic is coming from legitimate servers, which is hard to differentiate from normal traffic. Moreover, some of protocols used by amplification attacks are widely adopted in IoT devices so that the number of servers susceptible to amplification attacks will continue to increase. This paper studies on the analysis of amplification attack mechanisms in detail and proposes defense methodologies for scenarios where attackers, abused servers or victims are in a monitoring network.

2D Numerical Simulations for Shallow-water Flows over a Side Weir (측면 위어를 넘나드는 천수 흐름에 대한 2차원 수치모의)

  • Hwang, Seung-Yong
    • Journal of Korea Water Resources Association
    • /
    • v.48 no.11
    • /
    • pp.957-967
    • /
    • 2015
  • It was reviewed for the 2D numerical simulations to evaluate the effects of flood control by detention basin, even if stage-discharge relationships for the side weir were not known. A 2D depth-integrated numerical model was constructed by the application of the finite volume method to the shallow water equations as a numerical method and the introduction of an approximate Riemann solver for the accurate calculation of fluxes. Results by the model were compared with those by the laboratory test for the cases of free overflow and submerged flow over a side weir between the channel and storage. The difference between simulated and measured discharge coefficients for the case of free overflow is very small. In addition, the results by simulations were in good agreement with those by experiments for the submerged flow over a side weir and its mechanism was reproduced well. Through this study the discharge coefficients of side weirs can be accurately determined by the 2D numerical model and a considerable degree of accuracy can be achieved to evaluate the effect of flood defenses by detention basins. Thus, it will be expected to apply this model practically to the plan of detention basins, the evaluation of design alternatives, or the management of the existing ones.

DDoS Attack Tolerant Network using Hierarchical Overlay (계층적 오버레이를 이용한 DDoS 공격 감내 네트워크)

  • Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.45-54
    • /
    • 2007
  • As one of the most threatening attacks, DDoS attack makes distributed multiple agents consume some critical resources at the target within the short time, thus the extent and scope of damage is serious. Against the problems, the existing defenses focus on detection, traceback (identification), and filtering. Especially, in the hierarchical networks, the traffic congestion of a specific node could incur the normal traffic congestion of overall lower nodes, and also block the control traffic for notifying the attack detection and identifying the attack agents. In this paper, we introduce a DDoS attack tolerant network structure using a hierarchical overlay for hierarchical networks, which can convey the control traffic for defense such as the notification for attack detection and identification, and detour the normal traffic before getting rid of attack agents. Lastly, we analyze the overhead of overlay construction, the possibility of speedy detection notification, and the extent of normal traffic transmission in the attack case through simulation.