• Title/Summary/Keyword: Defenses

Search Result 161, Processing Time 0.024 seconds

A study on maritime casualty investigations combining the SHEL and Hybrid model methods

  • Lee, Young-Chan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.8
    • /
    • pp.721-725
    • /
    • 2016
  • This paper reviews the analysis of a given scenario according to the Hybrid Model, and why accident causation models are necessary in casualty investigations. The given scenario has been analyzed according to the Hybrid Model using its main five components, fallible decisions, line management, psychological precursors to unsafe acts, unsafe acts, and inadequate defenses. In addition, the differences between the SHEL and the Hybrid Model, and the importance of a safety barrier during an accident investigation, are shown in this paper. One unit of SHEL can be linked with another unit of SHEL. However, it cannot be used for the analysis of an accident. Therefore, we must use an accident causation model, which can be a Hybrid Model. This can explain the "How" and "Why" of accident, so it is a suitable model for analyzing them. During an accident investigation, the reason we focus on a safety barrier is to create another safety barrier or to change an existing safety barrier if that barrier fails. Hence, the paper shows how a sea accident can be investigated, and we propose a preventive way of avoiding the accident through combining the methods of different models for the future.

Oomycetes RXLR Effectors Function as Both Activator and Suppressor of Plant Immunity

  • Oh, Sang-Keun;Kamoun, Sophien;Choi, Doil
    • The Plant Pathology Journal
    • /
    • v.26 no.3
    • /
    • pp.209-215
    • /
    • 2010
  • Plant pathogenic oomycetes, such as Phytophthora spp., are the causal agent of the most devastating plant diseases. During infection, these pathogens accomplish parasitic colonization of plants by modulating host defenses through an array of disease effector proteins. These effectors are classified in two classes based on their target sites in the host plant. Apoplastic effectors are secreted into the plant extracellular space, and cytoplasmic effectors are translocated inside the plant cell, through the haustoria that enter inside living host cell. Recent characterization of some oomycete Avr genes showed that they encode effector protein with general modular structure including N-terminal conserved RXLR-DEER motif. More detailed evidences suggest that these AVR effectors are secreted by the pathogenic oomycetes and then translocated into the host plant cell during infection. Recent findings indicated that one of the P. infestans effector, Avrblb2, specifically induces hypersensitive response (HR) in the presence of Solanum bulbocastanum late blight resistance genes Rpi-blb2. On the other hand, another secreted RXLR protein PexRD8 originated from P. infestans suppressed the HCD triggered by the elicitin INF1. In this review, we described recent progress in characterized RXLR effectors in Phytophthora spp. and their dual functions as modulators of host plant immunity.

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

Antiviral and Tumoricidal Activities of Alginate-Stimulated Macrophages are Mediated by Different Mechanisms

  • Son, Eun-Wha;Rhee, Dong-Kwon;Pyo, Suhk-Neung
    • Archives of Pharmacal Research
    • /
    • v.26 no.11
    • /
    • pp.960-966
    • /
    • 2003
  • Macrophages play an important role in host defenses by killing tumors and virus infections and producing secretory products. High mannuronic acid (HMA) containing alginate was examined to determine the mechanisms by which HMA-activated macrophages resist infection with HSV-1 and inhibit the growth of tumor cells. The ability of macro phages to resist infection with HSV-1 or to inhibit the growth of tumor cells was assessed following treatment with HMA alginate in the presence of either antibodies to various cytokines or inhibitors/scavengers of toxic macrophage products. Only antibodies to IFN-$\alpha$/$\beta$ were able to abrogate the protective effects of HMA alginate in macrophages infected with HSV-1, suggesting that the antiviral activity induced by this immunomodulator was mediated by the production of IFN-$\beta$. In contrast, anti-TNF-$\alpha$, anti-IFN and inhibitors of nitric oxide and reactive oxygen species were all able to partially abrogate HMA-induced cytostatic activity, suggesting that multiple mechanisms are involved in macrophage cytostasis. These results indicate that the HMA-induced intrinsic antiviral and extrinsic cytotoxic activites are mediated by different mechanisms.

Designing and Realization of the System for the Improvement of Processing Capability of Intrusion Detection by Using O/S Information (O/S 정보를 이용한 침입탐지 처리성능 향상에 관한 시스템 설계 및 구현)

  • Son, Man-Kyung;Lee, Dong-Hwi;J Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.91-99
    • /
    • 2006
  • As the speed of network has fastened and the Internet has became common, an ill-intentioned aggression, such as worm and E-mail virus rapidly increased. So that there too many defenses created the recent Intrusion detection system as well as the Intrusion Prevention Systems to defense the malicious aggression to the network. Also as the form of malicious aggression has changed, at the same time the method of defense has changed. There is "snort" the most representive method of defense and its Rules file increases due to the change of aggression form. This causes decline of capability for detection. This paper suggest, design, and realize the structure for the improvement of processing capability by separating the files of Snort Rule according to o/s. This system show more improvement of the processing capability than the existing composion.

  • PDF

Production and Secretion of Human Interleukin-18 in Transgenic Tobacco Cell Suspension Culture

  • Sharma, Niti;Kim, Tae-Geum;Yang, Moon-Sik
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.11 no.2
    • /
    • pp.154-159
    • /
    • 2006
  • Interleukin-18 (IL-18), otherwise known as interferon-gamma-inducing factor (IGIF), is one of several well characterized and important cytokines that contribute to host defenses. The complementary DNA (cDNA) of mature human interleukin-18 gene (hIL-18) was fused with the signal peptide of the rice amylase 1A gene (Ramy1A) and introduced into the plant expression vector under the control of a duplicated CaMV 35S promoter. The recombinant plasmid was transformed into tobacco (Nicotiana tabacum L. cv Havana) using the Agrobacterium-mediated transformation method. The integration of the hlL-18 gene into the genome of transgenic tobacco plants was confirmed by polymerase chain reaction (PCR) amplification and its expression was observed in the suspension cells that were derived from the transgenic plant callus by using Northern blot analysis. The hlL-18 protein was detected in the extracts of the transgenic callus and in the medium of the transgenic tobacco suspension culture by using immunoblot analysis. Based upon enzyme-linked immunosorbant assay (ELISA) results, the expression level of the hlL-18 protein approximated $166{\mu}g/L$ in the suspension culture medium. Bioassay results from the induction of $interferon-{\gamma}$ from a KG-1 cell line indicated that the hlL-18 secreted into the suspension culture medium was bioactive.

Thermal Effects on Bioaccumulation and Antioxidant Enzyme Response in the Liver and Gills of Tilapia Oreochromis niloticus Exposed to Arsenic

  • Min, EunYoung;Jeong, Ji Won;Kang, Ju-Chan
    • Fisheries and Aquatic Sciences
    • /
    • v.18 no.2
    • /
    • pp.195-202
    • /
    • 2015
  • The effects of waterborne arsenic (As) exposure on bioaccumulation and antioxidant defenses were examined in the liver and gills of tilapia, Oreochromis niloticus, under thermal stress. Tilapia were exposed to different As concentrations (0, 200, and $400{\mu}g\;L^{-1}$) at three water temperatures (20, 25, and $30^{\circ}C$) for 20 days. After As exposure, higher levels of As accumulation were observed in the gills compared with the liver in elevated water temperatures. In terms of the antioxidant response, glutathione (GSH) levels and the activities of glutathione reductase (GR), glutathione peroxidase (GPx), and glutathione S-transferase (GST) significantly decreased in the liver and gills of tilapia exposed to As for 20 days, regardless of the As concentration (200 and $400{\mu}g\;L^{-1}$) or water temperature. These enzyme activities exhibited greater fluctuations in the liver and gills of tilapia after As exposure in water warmer than $20^{\circ}C$. The present findings suggest that the simultaneous stress of temperature change and As exposure can accelerate As accumulation and alter the antioxidant enzymes activities of tilapia.

A Study on the Planning of Civil Defense Shelter and Design 2 - Focused on Planning and Design of Defense Shelter the U.S. - (민방위 대피시설 계획 및 설계 방안에 관한 연구 2 - 미국의 대피시설 계획 및 설계를 중심으로 -)

  • Park, Namkwun;Kwon, Taeil;Kim, Twehwan
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.442-451
    • /
    • 2014
  • Over 20,000 defense shelters are currently designated and operated in Korea. However, only few sheltershave the capacity to defend against CBR attack or terror from North Korea. Furthermore, as public defense shelters are only equipped with air-raid shelters, it is urgent to establish standard for CBR attack.This study focuses on shelter-in-place(SIP), a kind of CBR shelter in the U.S., and aims to draw up construction plan and planning of Korean defenses helter.

Modulation of Hepatic Lipid Peroxidation and Antioxidant Defenses by Wild Plants Extracts (야생초 추출물에 의한 간장내 활성산소 생성과 항산화 효소계 조절에 관한 연구)

  • Lee, Sang-Young;Kim, Sung-Wan;Kim, Jong-Dai
    • Korean Journal of Pharmacognosy
    • /
    • v.28 no.1
    • /
    • pp.48-53
    • /
    • 1997
  • This study was performed to elucidate the possible antioxidative effects of several wild plant extracts. Wild plants were extracted with methanol or water using general method. In first experiments, antioxidative effects were measured by lipid peroxidation using rat brain homogenate. Coptis japonica extract showed the highest antioxidative activity among the 15 wild plant extracts. In second experiments, rats were fed on the semipurified diets with or without Coptis japonica extracts at the level of 0.5% for 4 weeks. MDA production of liver homogenate were significantly lower in the rats fed Coptis japonica extracts (P<0.05). Cytosolic catalase. GPX, and SOD activities were not changed, whereas the activities of GST and glutathione level were significantly higher in rats fed Coptis japonica extracts (P<0.05). These results suggest that Coptis japonica extract has an antioxidative effect through increasing GST activity and glutathione level and decreasing MDA production.

  • PDF

Characterizing Collaboration in Social Network-enabled Routing

  • Mohaisen, Manar;Mohaisen, Aziz
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1643-1660
    • /
    • 2016
  • Connectivity and trust in social networks have been exploited to propose applications on top of these networks, including routing, Sybil defenses, and anonymous communication systems. In these networks, and for such applications, connectivity ensures good performance of applications while trust is assumed to always hold, so as collaboration and good behavior are always guaranteed. In this paper, we study the impact of differential behavior of users on performance in typical social network-enabled routing applications. We classify users into either collaborative or rational (probabilistically collaborative) and study the impact of this classification and the associated behavior of users on the performance of such applications, including random walk-based routing, shortest path based routing, breadth-first-search based routing, and Dijkstra routing. By experimenting with real-world social network traces, we make several interesting observations. First, we show that some of the existing social graphs have high routing costs, demonstrating poor structure that prevents their use in such applications. Second, we study the factors that make probabilistically collaborative nodes important for the performance of the routing protocol within the entire network and demonstrate that the importance of these nodes stems from their topological features rather than their percentage of all the nodes within the network.