• Title/Summary/Keyword: Key Technology Protection

Search Result 324, Processing Time 0.029 seconds

Characterization of ginsenoside compound K loaded ionically cross-linked carboxymethyl chitosan-calcium nanoparticles and its cytotoxic potential against prostate cancer cells

  • Zhang, Jianmei;Zhou, Jinyi;Yuan, Qiaoyun;Zhan, Changyi;Shang, Zhi;Gu, Qian;Zhang, Ji;Fu, Guangbo;Hu, Weicheng
    • Journal of Ginseng Research
    • /
    • v.45 no.2
    • /
    • pp.228-235
    • /
    • 2021
  • Backgroud: Ginsenoside compound K (GK) is a major metabolite of protopanaxadiol-type ginsenosides and has remarkable anticancer activities in vitro and in vivo. This work used an ionic cross-linking method to entrap GK within O-carboxymethyl chitosan (OCMC) nanoparticles (Nps) to form GK-loaded OCMC Nps (GK-OCMC Nps), which enhance the aqueous solubility and stability of GK. Methods: The GK-OCMC Nps were characterized using several physicochemical techniques, including x-ray diffraction, transmission electron microscopy, zeta potential analysis, and particle size analysis via dynamic light scattering. GK was released from GK-OCMC Nps and was conducted using the dialysis bag diffusion method. The effects of GK and GK-OCMC Nps on PC3 cell viability were measured by using the 3-(4,5-dimethyl-2-thiazolyl)-2,5-diphenyl-2-H-tetrazolium bromide assay. Fluorescent technology based on Cy5.5-labeled probes was used to explore the cellular uptake of GK-OCMC Nps. Results: The GK-OCMC NPs had a suitable particle size and zeta potential; they were spherical with good dispersion. In vitro drug release from GK-OCMC NPs was pH dependent. Moreover, the in vitro cytotoxicity study and cellular uptake assays indicated that the GK-OCMC Nps significantly enhanced the cytotoxicity and cellular uptake of GK toward the PC3 cells. GK-OCMC Nps also significantly promoted the activities of both caspase-3 and caspase-9. Conclusion: GK-OCMC Nps are potential nanocarriers for delivering hydrophobic drugs, thereby enhancing water solubility and permeability and improving the antiproliferative effects of GK.

Study of the Application of Gel Electrolyte in the Reference Electrode of $Cu/CuSO_4$

  • Lin, Cunguo;Xu, Likun;Liu, Yang
    • Corrosion Science and Technology
    • /
    • v.7 no.3
    • /
    • pp.179-181
    • /
    • 2008
  • With nano-$SiO_2$ and sulphate acid, a kind of colloid electrolyte is synthesized by sol-gel method. It is placed outside the reference electrode as a layer of gel electrolyte so as to decrease the leaching of $Cu^{2+}$ and increase the life of the reference electrode. The performance of the gel electrode in simulating soil solution is measured as follows: the potential of the electrodes ranging from 60 mV to 80 mV (vs. SCE) with potential variation no more than $\pm10mV$, enough resistance to polarization. The $Cu^{2+}$ effusion rate of the reference electrode without gel electrolyte is 3 times that with colloid electrolyte, which means that gel electrolyte can extend the life of the reference electrode significantly.

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.

Design and Implementation of Secure Distribution System for Broadcasting Contents (방송 콘텐츠를 위한 안전한 유통 시스템 설계 및 구현)

  • Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.19-27
    • /
    • 2007
  • Broadcasting contents protection system for HDTV has many difficult to apply file encryption technology that using the existing DRM systems. Therefore, this system has to be processed as accommodative about broadcasting contents format such as TS and PS and so on. Also, this system must support efficient encryption technology and random access mode. In addition, this system must have suitable key distribution mechanism in broadcasting environment. In this paper, we propose and implement encryption/key distribution scheme applicable to encoder/decoder without changing the existing MPEG system.

Determination of Herbicide Propisochlor in Soil, Water and Rice by Quick, Easy, Cheap, Effective, Rugged and Safe (QuEChERS) Method Using by UPLC-ESI-MS/MS

  • Wu, Xiaohu;Xu, Jun;Liu, Xingang;Dong, Fengshou;Wu, Yanbing;Zhang, Ying;Zheng, Yongquan
    • Bulletin of the Korean Chemical Society
    • /
    • v.34 no.3
    • /
    • pp.917-921
    • /
    • 2013
  • A simple, quick and reliable analytical method for the confirmation and quantification of propisochlor was developed. The propisochlor was extracted from water, soil and rice (stalks, rice and hull) matrices using acetonitrile, and cleaned up with primary secondary amine and determined by UPLC-MS/MS. The LODs of propisochlor ranged from 0.03 ${\mu}g/kg$ to 0.12 ${\mu}g/kg$, while the LOQs ranged from 0.1 ${\mu}g/kg$ to 0.4 ${\mu}g/kg$ in different matrixes. The mean recoveries of propisochlor at three levels (0.005, 0.01 and 0.05 mg/kg) were in the range of 73.7-94.9% with intra-day relative standard deviations (RSD) of 1.1-13.9% and inter-day $RSD_R$ of 3.3-12.7%. This method is suitable for routine analysis of propisochlor under field conditions. The half-lives of propisochlor in rice stalks, water and soil were 1.7, 1.5 and 2.3 days in Hunan, 5.7, 1.0 and 1.9 days in Anhui and 4.8, 1.0 and 3.1 days in Guangxi.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

One-Year Continuous Measurement of Outdoor Radon Progeny Concentration in Beijing Area

  • Zhang, Lei;Wang, Yunxiang;Guo, Qiuju
    • Journal of Radiation Protection and Research
    • /
    • v.45 no.3
    • /
    • pp.95-100
    • /
    • 2020
  • Background: Compared with reported data of radon concentration, data of radon progeny concentration is limited in general, especially in outdoor environment. Materials and Methods: To know both the level and the variation of radon progeny concentration in outdoor environment in Beijing area, one-year continuous measurement with a cycle of 60 minutes was carried out by a step-advanced filter (SAF) monitor for radon progeny measurement. The observation site was located in a park in Eastern Beijing area, and the observation period was from October 17, 2018 to September 29, 2019. Results and Discussion: The equivalent equilibrium concentration (EEC) of radon progeny varies from 0.7 to 19.1 Bq·m-3, with an annual average of 4.9 ± 2.7 Bq·m-3. A clear diurnal variation of EEC, higher in the early morning and lower in the late afternoon, is observed due to the high sensitivity of the SAF monitor. Conclusion: Vertical convection of atmospheric boundary layer is thought to be the main reason of this phenomenon. For annual variation, the lowest monthly average EEC appeared in April, while the highest appeared in November, which might attribute to the atmospheric stability in different seasons.

A Novel Shared Segment Protection Algorithm for Multicast Sessions in Mesh WDM Networks

  • Lu, Cai;Luo, Hongbin;Wang, Sheng;Li, Lemin
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.329-336
    • /
    • 2006
  • This paper investigates the problem of protecting multicast sessions in mesh wavelength-division multiplexing (WDM) networks against single link failures, for example, a fiber cut in optical networks. First, we study the two characteristics of multicast sessions in mesh WDM networks with sparse light splitter configuration. Traditionally, a multicast tree does not contain any circles, and the first characteristic is that a multicast tree has better performance if it contains some circles. Note that a multicast tree has several branches. If a path is added between the leave nodes on different branches, the segment between them on the multicast tree is protected. Based the two characteristics, the survivable multicast sessions routing problem is formulated into an Integer Linear Programming (ILP). Then, a heuristic algorithm, named the adaptive shared segment protection (ASSP) algorithm, is proposed for multicast sessions. The ASSP algorithm need not previously identify the segments for a multicast tree. The segments are determined during the algorithm process. Comparisons are made between the ASSP and two other reported schemes, link disjoint trees (LDT) and shared disjoint paths (SDP), in terms of blocking probability and resource cost on CERNET and USNET topologies. Simulations show that the ASSP algorithm has better performance than other existing schemes.

  • PDF

An Innovative Fast Relay Coordination Method to Bypass the Time Consumption of Optimization Algorithms in Relay Protection Coordination

  • Kheshti, Mostafa;Kang, Xiaoning;Jiao, Zaibin
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.612-620
    • /
    • 2017
  • Relay coordination in power system is a complex problem and so far, meta-heuristic algorithms and other methods as an alternative approach may not properly deal with large scale relay coordination due to their huge time consuming computation. In some cases the relay coordination could be unachievable. As the urgency for a proper approach is essential, in this paper an innovative and simple relay coordination method is introduced that is able to be applied on optimization algorithms for relay protection coordination. The objective function equation of operating time of relays are divided into two separate functions with less constraints. As the analytical results show here, this equivalent method has a remarkable speed with high accuracy to coordinate directional relays. Two distribution systems including directional overcurrent relays are studied in DigSILENT software and the collected data are examined in MATLAB. The relay settings of this method are compared with particle swarm optimization and genetic algorithm. The analytical results show the correctness of this mathematical and practical approach. This fast coordination method has a proper velocity of convergence with low iteration that can be used in large scale systems in practice and also to provide a feasible solution for protection coordination in smart grids as online or offline protection coordination.

Water-blocking Asphyxia of N95 Medical Respirator During Hot Environment Work Tasks With Whole-body Enclosed Anti-bioaerosol Suit

  • Jintuo Zhu;Qijun Jiang;Yuxuan Ye;Xinjian He;Jiang Shao;Xinyu Li;Xijie Zhao; Huan Xu;Qi Hu
    • Safety and Health at Work
    • /
    • v.14 no.4
    • /
    • pp.457-466
    • /
    • 2023
  • Background: During hot environment work tasks with whole-body enclosed anti-bioaerosol suit, the combined effect of heavy sweating and exhaled hot humid air may cause the N95 medical respirator to saturate with water/sweat (i.e., water-blocking). Methods: 32 young male subjects with different body mass indexes (BMI) in whole-body protection (N95 medical respirator + one-piece protective suit + head covering + protective face screen + gloves + shoe covers) were asked to simulate waste collecting from each isolated room in a seven-story building at 27-28℃, and the weight, inhalation resistance (Rf), and aerosol penetration of the respirator before worn and after water-blocking were analyzed. Results: All subjects reported water-blocking asphyxia of the N95 respirators within 36-67 min of the task. When water-blocking occurred, the Rf and 10-200 nm total aerosol penetration (Pt) of the respirators reached up to 1270-1810 Pa and 17.3-23.3%, respectively, which were 10 and 8 times of that before wearing. The most penetration particle size of the respirators increased from 49-65 nm before worn to 115-154 nm under water-blocking condition, and the corresponding maximum size-dependent aerosol penetration increased from 2.5-3.5% to 20-27%. With the increase of BMI, the water-blocking occurrence time firstly increased then reduced, while the Rf, Pt, and absorbed water all increased significantly. Conclusions: This study reveals respirator water-blocking and its serious negative impacts on respiratory protection. When performing moderate-to-high-load tasks with whole-body protection in a hot environment, it is recommended that respirator be replaced with a new one at least every hour to avoid water-blocking asphyxia.