• Title/Summary/Keyword: Key Exposure

Search Result 445, Processing Time 0.024 seconds

Use of autonomous maximal smile to evaluate dental and gingival exposure

  • Wang, Shuai;Lin, Hengzhe;Yang, Yan;Zhao, Xin;Mei, Li;Zheng, Wei;Li, Yu;Zhao, Zhihe
    • 대한치과교정학회지
    • /
    • 제48권3호
    • /
    • pp.182-188
    • /
    • 2018
  • Objective: This study was performed to validate the autonomous maximal smile (AMS) as a new reference for evaluating dental and gingival exposure. Methods: Digital video clips of 100 volunteers showing posed smiles and AMS at different verbal directives were recorded for evaluation a total of three times at 1-week intervals. Lip-teeth relationship width (LTRW) and buccal corridor width (BCW) were measured. LTRW represented the vertical distance between the inferior border of the upper vermilion and the edge of the maxillary central incisors. Intraclass correlation coefficients (ICCs) for reproducibility, and the m-value (minimum number of repeated measurements required for an ICC level over 0.75), were calculated. Results: LTRW and BCW of the AMS were 1.41 and 2.04 mm, respectively, greater than those of the posed smile (p < 0.05), indicating significantly larger dental and gingival exposure in the AMS. The reproducibility of the AMS (0.74 to 0.77) was excellent, and higher than that of the posed smile (0.62 to 0.65), which had fair-to-good reproducibility. Moreover, the m-value of the AMS (0.88 to 1.05) was lower than that of the posed smile (1.59 to 1.85). Conclusions: Compared to the posed smile, the AMS shows significantly larger LTRW and BCW, with significantly higher reproducibility. The AMS might serve as an adjunctive reference, in addition to the posed smile, in orthodontic and other dentomaxillofacial treatments.

Key-Stroke 기반 Two-Factor 인증 기술 (Two-factor Authentication technology based on Key-Stroke)

  • 안준연;고광필;이태진
    • 융합보안논문지
    • /
    • 제20권3호
    • /
    • pp.29-37
    • /
    • 2020
  • ID/Password 기반 인증기술은 간편하면서 일정한 보안수준을 제공하기에 대부분의 시스템에서 사용되고 있으나, 이미 무수히 많은 개인정보 노출사고가 있었으며, 무엇보다 한번 노출된 패스워드를 회수하기 어렵다. 이에, 다양한 two-factor 인증기법들이 도입되었으나, 이들은 많은 비용이 필요하며, 무엇보다 사용자의 불편함을 초래하게 된다. 본 논문에서는 기존과 같이 단 한번의 ID/Password 인증과정에서 사용자마다 고유한 Key-Stroke를 동시에 인증하여 비용대비 효과적이면서, 사용자의 불편함을 초래하지 않고, ID/Password 노출 시에도 Key Stroke Dynamics 패턴이 달라 실패하여 높은 보안성을 보장할 수 있는 기술을 제안한다. 본 논문의 제안 모델은 시스템으로 구축하여 효과성을 확인하였다.

Changes in microbial population and chemical composition of corn stover during field exposure and effects on silage fermentation and in vitro digestibility

  • Sun, Lin;Wang, Zhijun;Gentu, Ge;Jia, Yushan;Hou, Meiling;Cai, Yimin
    • Asian-Australasian Journal of Animal Sciences
    • /
    • 제32권6호
    • /
    • pp.815-825
    • /
    • 2019
  • Objective: To effectively use corn stover resources as animal feed, the changes in microbial population and chemical composition of corn stover during field exposure, and their silage fermentation and in vitro digestibility were studied. Methods: Corn cultivars (Jintian, Jinnuo, and Xianyu) stovers from 4 random sections of the field were harvested at the preliminary dough stage of maturity on September 2, 2015. The corn stover exposed in the field for 0, 7, 15, 30, 60, 90, and 180 d, and their silages at 60 d of ensiling were used for the analysis of microbial population, chemical composition, fermentation quality, and in vitro digestibility. Data were analyzed with a completely randomized $3{\times}6$ [corn stover cultivar $(C){\times}exposure$ d (D)] factorial treatment design. Analysis of variance was performed using SAS ver. 9.0 software (SAS Institute Inc., Cary, NC, USA). Results: Aerobic bacteria were dominant population in fresh corn stover. After ensiling, the lactic acid bacteria (LAB) became the dominant bacteria, while other microbes decreased or dropped below the detection level. The crude protein (CP) and water-soluble carbohydrate (WSC) for fresh stover were 6.74% to 9.51% and 11.75% to 13.21% on a dry matter basis, respectively. After exposure, the CP and WSC contents decreased greatly. Fresh stover had a relatively low dry matter while high WSC content and LAB counts, producing silage of good quality, but the dry stover did not. Silage fermentation inhibited nutrient loss and improved the fermentation quality and in vitro digestibility. Conclusion: The results confirm that fresh corn stover has good ensiling characteristics and that it can produce silage of good quality.

Estimating Exchange Rate Exposure over Various Return Horizons: Focusing on Major Countries in East Asia

  • Lee, Jeong Wook;Ahn, Sunghee;Kang, Sammo
    • East Asian Economic Review
    • /
    • 제20권4호
    • /
    • pp.469-491
    • /
    • 2016
  • In this paper, we estimate the exchange rate exposure, indicating the effect of exchange rate movements on firm values, for a sample of 1,400 firms in seven East Asian countries. The exposure estimates based on various exchange rate variables, return horizons and a control variable are compared. A key result from our analysis is that the long term effect of exchange rate movements on firm values is greater than the short term effect. And we find very similar results from using other exchange rate variables such as the U.S. dollar exchange rate, etc. Second, we add exchange rate volatility as a control variable and find that the extent of exposure is not much changed. Third, we examine the changes in exposure to exchange rate volatility with an increase in return horizon. Consequently the ratio of firms with significant exposures increases with the return horizons. Interestingly, the increase of exposure with the return horizons is faster for exposure to volatility than for exposure to exchange rate itself. Taken as a whole, our findings suggest that the socalled "exposure puzzle" may be a matter of the methodology used to measure exposure.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

The effect of melatonin on cardio fibrosis in juvenile rats with pressure overload and deregulation of HDACs

  • Wu, Yao;Si, Feifei;Luo, Li;Jing, Fengchuan;Jiang, Kunfeng;Zhou, Jiwei;Yi, Qijian
    • The Korean Journal of Physiology and Pharmacology
    • /
    • 제22권6호
    • /
    • pp.607-616
    • /
    • 2018
  • The effect of melatonin on juveniles with cardio fibrosis is poorly understood. We investigated whether HDACs participate in the anti-fibrotic processes regulated by melatonin during hypertrophic remodeling. Abdominal aortic constriction (AAC) was employed in juvenile rats resulting in pressure overload-induced ventricular hypertrophy and melatonin was subsequently decreased via continuous light exposure for 5 weeks after surgery. AAC rats displayed an increased cross-sectional area of myocardial fibers and significantly elevated collagen deposition compared to sham-operated rats, as measured by HE and Masson Trichrome staining. Continuous light exposure following surgery exacerbated the increase in the cross-sectional area of myocardial fibers. The expression of HDAC1, HDAC2, HDAC3, HDAC4 and HDAC6 genes were all significantly enhanced in AAC rats with light exposure relative to the other rats. Moreover, the protein level of $TNF-{\alpha}$ was also upregulated in the AAC light exposure groups when compared with the sham. However, Smad4 protein expression was unchanged in the juveniles' hearts. In contrast, beginning 5 weeks after the operation, the AAC rats were treated with melatonin (10 mg/kg, intraperitoneal injection every evening) or vehicle 4 weeks, and sham rats were given vehicle. The changes in the histological measures of cardio fibrosis and the gene expressions of HDAC1, HDAC2, HDAC3, HDAC4 and HDAC6 were attenuated by melatonin administration. The results reveal that melatonin plays a role in the development of cardio fibrosis and the expression of HDAC1, HDAC2, HDAC3, HDAC4 and HDAC6 in cardiomyocytes.

휘발성 유기화합물에 대한 실내공기노출에 영향을 미치는 인자 (Parameters Affecting Indoor Air Exposure to Volatile Organic Compounds)

  • 조완근
    • 한국환경과학회지
    • /
    • 제1권1호
    • /
    • pp.47-51
    • /
    • 1992
  • 수중에 존재하는 휘발성 유기화합물은 샤워를 하는동안 공기로 방출되고 공기농도는 샤워 변수에 따라 달라지는데, 이는 휘발성 유기화합물의 호기농도의 변화를 야기 시킨다. 본 연구에서는 샤워를 하는 동안 공기중의 클로로포픔 노출에 영향을 미치는 주요한 샤워변수(물온다 및 노출시간)를 클로로포픔 호기농도를 측정하여 검토 하였다. 크롤로포름 호기농도는 물의 온도와 노출 시간이 증가함에 따라 증가 하였다. 가장 큰 클로로포름 호기농도 차이를 나타내는 두개의 흡기 노출 조건은 미지근한 물을 이용한 5분 동안의 노출과 더운 물을 이용한 15분 동안의 노출이었다. 클로로포름 호기농도는 후자의 노출후에 전자의 경우보다 거의 3배 정도 높았다. 주요 샤워변수와 수중농도로 조정된 호기농도 사이의 수학모델은 0.0001의 확률에서의 데이타와 훌륭한 일치되는 결과를 나타내었다.

  • PDF

Parallel Key-Insulated Signature Scheme without Random Oracles

  • Wan, Zhongmei;Li, Jiguo;Hong, Xuan
    • Journal of Communications and Networks
    • /
    • 제15권3호
    • /
    • pp.252-257
    • /
    • 2013
  • To alleviate the damage caused by key exposures, Dodis et al. introduced the notion of key-insulated security where secret keys are periodically updated by using a physically insulated helper key. To decrease the risk of helper key exposures, Hanaoka et al. advocated parallel key-insulated mechanism where distinct helpers are independently used in key updates. In this paper, we propose the first parallel key-insulated signature scheme which is provably secure without resorting to the random oracle methodology. Our scheme not only allows frequent key updating, but also does not increase the risk of helper key exposures.

Privacy-Preserving Key-Updatable Public Key Encryption with Keyword Search Supporting Ciphertext Sharing Function

  • Wang, Fen;Lu, Yang;Wang, Zhongqi;Tian, Jinmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권1호
    • /
    • pp.266-286
    • /
    • 2022
  • Public key encryption with keyword search (PEKS) allows a user to make search on ciphertexts without disclosing the information of encrypted messages and keywords. In practice, cryptographic operations often occur on insecure devices or mobile devices. But, these devices face the risk of being lost or stolen. Therefore, the secret keys stored on these devices are likely to be exposed. To handle the key exposure problem in PEKS, the notion of key-updatable PEKS (KU-PEKS) was proposed recently. In KU-PEKS, the users' keys can be updated as the system runs. Nevertheless, the existing KU-PEKS framework has some weaknesses. Firstly, it can't update the keyword ciphertexts on the storage server without leaking keyword information. Secondly, it needs to send the search tokens to the storage server by secure channels. Thirdly, it does not consider the search token security. In this work, a new PEKS framework named key-updatable and ciphertext-sharable PEKS (KU-CS-PEKS) is devised. This novel framework effectively overcomes the weaknesses in KU-PEKS and has the ciphertext sharing function which is not supported by KU-PEKS. The security notions for KU-CS-PEKS are formally defined and then a concrete KU-CS-PEKS scheme is proposed. The security proofs demonstrate that the KU-CS-PEKS scheme guarantees both the keyword ciphertext privacy and the search token privacy. The experimental results and comparisons bear out that the proposed scheme is practicable.

A Pilot Establishment of the Job-Exposure Matrix of Lead Using the Standard Process Code of Nationwide Exposure Databases in Korea

  • Ju-Hyun Park;Sangjun Choi;Dong-Hee Koh;Dae Sung Lim;Hwan-Cheol Kim;Sang-Gil Lee;Jihye Lee;Ji Seon Lim;Yeji Sung;Kyoung Yoon Ko;Donguk Park
    • Safety and Health at Work
    • /
    • 제13권4호
    • /
    • pp.493-499
    • /
    • 2022
  • Background: The purpose of this study is to construct a job-exposure matrix for lead that accounts for industry and work processes within industries using a nationwide exposure database. Methods: We used the work environment measurement data (WEMD) of lead monitored nationwide from 2015 to 2016. Industrial hygienists standardized the work process codes in the database to 37 standard process and extracted key index words for each process. A total of 37 standardized process codes were allocated to each measurement based on an automated key word search based on the degree of agreement between the measurement information and the standard process index. Summary statistics, including the arithmetic mean, geometric mean, and 95th percentile level (X95), was calculated according to industry, process, and industry process. Using statistical parameters of contrast and precision, we compared the similarity of exposure groups by industry, process, and industry process. Results: The exposure intensity of lead was estimated for 583 exposure groups combined with 128 industry and 35 process. The X95 value of the "casting" process of the "manufacture of basic precious and non-ferrous metals" industry was 53.29 ㎍/m3, exceeding the occupational exposure limit of 50 ㎍/m3. Regardless of the limitation of the minimum number of samples in the exposure group, higher contrast was observed when the exposure groups were by industry process than by industry or process. Conclusion: We evaluated the exposure intensities of lead by combination of industry and process. The results will be helpful in determining more accurate information regarding exposure in lead-related epidemiological studies.