• Title/Summary/Keyword: Protection time

Search Result 2,901, Processing Time 0.035 seconds

Ginsenoside Rg2 Inhibits Lipopolysaccharide-Induced Adhesion Molecule Expression in Human Umbilical Vein Endothelial Cell

  • Cho, Young-Suk;Kim, Chan Hyung;Ha, Tae-Sun;Lee, Sang Jin;Ahn, Hee Yul
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.17 no.2
    • /
    • pp.133-137
    • /
    • 2013
  • Vascular cell adhesion molecule 1 (VCAM-1), intercellular adhesion molecule 1 (ICAM-1), P- and E-selectin play a pivotal role for initiation of atherosclerosis. Ginsenoside, a class of steroid glycosides, is abundant in Panax ginseng root, which has been used for prevention of illness in Korea. In this study, we investigated the mechanism(s) by which ginsenoside Rg2 may inhibit VCAM-1 and ICAM-1 expressions stimulated with lipopolysaccharide (LPS) in human umbilical vein endothelial cell (HUVEC). LPS increased VCAM-1 and ICAM-1 expression. Ginsenoside Rg2 prevented LPS-mediated increase of VCAM-1 and ICAM-1 expression. On the other hand, JSH, a nuclear factor kappa B (NF-${\kappa}B$) inhibitor, reduced both VCAM-1 and ICAM-1 expression stimulated with LPS. SB202190, inhibitor of p38 mitogen-activated protein kinase (p38 MAPK), and wortmannin, phosphatidylinositol 3-kinase (PI3-kinase) inhibitor, reduced LPS-mediated VCAM-1 but not ICAM-1 expression. PD98059, inhibitor of mitogen-activated protein kinase kinase/extracellular signal-regulated kinase (MEK/ERK) did not affect VCAM-1 and ICAM-1 expression stimulated with LPS. SP600125, inhibitor of c-Jun N-terminal kinase (JNK), reduced LPS-mediated ICAM-1 but not VCAM-1 expression. LPS reduced IkappaB${\alpha}$ ($I{\kappa}B{\alpha}$) expression, in a time-dependent manner within 1 hr. Ginsenoside Rg2 prevented the decrease of $I{\kappa}B{\alpha}$ expression stimulated with LPS. Moreover, ginsenoside Rg2 reduced LPS-mediated THP-1 monocyte adhesion to HUVEC, in a concentration-dependent manner. These data provide a novel mechanism where the ginsenoside Rg2 may provide direct vascular benefits with inhibition of leukocyte adhesion into vascular wall thereby providing protection against vascular inflammatory disease.

Wireless Internet Payment Protocol Using Weil Pairing Method (무선인터넷에서 Weil Pairing 기법을 적용한 지불 프로토콜)

  • Jin Shi-Mei;Lee Hyun-Ju;Rhee Chung-Sei
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.9-17
    • /
    • 2005
  • Recently, there are rapid development of information and communication technology and rapid growing of e-business users. We propose a method for security problem on the internet environment which changes from wire internet to wireless internet or wire/ wireless internet. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which connected wire and wireless communication. Certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil pairing. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol also solves the privacy protection and Non-repudiation problem.

  • PDF

A Study on the general idea of danger in Police Law (경찰법상 위험개념에 관한 연구)

  • Gu, Hyung-Keun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.327-331
    • /
    • 2006
  • The exercise of police power for danger prevention gives top priority to the prevention of injury occurrence. However, the controversy over the concept of danger has hitherto focused on the limit establishment, namely which scope is to be a target of prevention in the danger prevention area of the Police Law. After all, the police's duty for maintaining public peace and order is forced to be performed through individual measures for danger prevention, and the preventive police action, which aims at the prevention of danger against the protection interest in the Police Law, can be performed on the premise of a precise understanding of danger in order to carry out a legitimate preventive police action. In addition, it examines the legal meaning in each constitution element by dividing the minimum common components of danger into loss, sufficient probability and time accessibility, and the interpretation problem of danger as uncertainty concept.

  • PDF

A Method for Reducing the Residual Voltage of Hybrid SPD Circuit Using Choke Coil (초크코일을 이용한 SPD 조합회로의 잔류전압 저감기법)

  • Cho, Sung-Chul;Eom, Ju-Hong;Lee, Tae-Hyung
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.8
    • /
    • pp.96-101
    • /
    • 2007
  • Gas Discharge Tubes (GDTs) are widely used as surge protectors for communication applications due to their small internal capacitance. In these days, however, they are mostly used in combined configurations, because the sparkover voltage required to initiate the discharge process in the GDTs and the time taken for arc formation process can be large enough to damage to sensitive circuits. For GDTs with a considerably high initial residual voltage, we should limit the peak voltage using a TVS or filter. We made a hybrid SPD circuits of common-mode type and differential-mode type with the filter using common-mode choke. Also, we applied lightning impulse voltage and ring wave voltage which frequency bandwidth are different each other and verified the characteristics of hybrid SPD circuits according to waveshapes. We describe how the applied SPDs operate in protection process steps with the actual data obtained from the residual voltage measurement at each step. The experiment results show that the surge voltage reduction with the choke coil is more effective in differential-mode circuit than in common-mode circuit.

Predicting of Ignition Time and Critical Distance for Ignition of Douglas fir by Radiant Heat of Incandescent Lamp (백열전구 복사열에 의한 미송판의 발화 임계거리 및 발화시간 예측)

  • Lee, Heung-Su;Kim, Doo-Hyun
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.2
    • /
    • pp.18-25
    • /
    • 2016
  • The incandescent lamp is an electric light fixture with a tungsten filament heated to a high temperature, by passing an electric current through it, until it glows with visible light. The hot filament is protected from oxidation with a glass bulb that is filled with inert gas. The incandescent lamp has fire risk when combustible materials are close to its glass bulb. Because its lamp has the property which converts 90~95 percents of the electric power to heat energy. 2015 national fire statistics show that fires caused by lighting fixtures were 652 cases, and incandescent lamps(44 cases) and halogen lamps(53 cases) accounted for 15 percents in those of high heating light fixtures. Since incandescent lamp fires account for about 45 percents in the high heating light fixture, we could not overlook the fire risks by the incandescent lamp. Although many studies related with those have been conducted, incandescent lamp fires are continuously occurred. This study was carried out to study the fire risk of ignition of wood due to radiant heat of incandescent lamp. Radiant heat flux of the incandescent lamp was predicted by applying point source model, and critical distance for ignition of wood was calculated by applying integral model. The results from this study could applied to fire prevention activities related to light bulb, and it could be used in fire cause investigations related to radiant heat of incandescent lamp.

An Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1204-1209
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking, stock dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

A Method of Distributed Parallel Processing based on Multi-Server for Improving Encryption Performance (암호화 성능 향상을 위한 다중장비 기반 분산 병렬 처리 방법)

  • Kim, Hyun-Wook;Park, Sung-Eun;Euh, Sung-Yul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.529-536
    • /
    • 2015
  • As personal information protection act was recently enforced, a mechanism which saves encrypted personal information has been used to Information Security systems. To use the mechanism, a millions of personal information which are already saved on the system first have to be encrypted. At the moment, it may cause a resource scarcity on server, and also take a lot of time. Thus, this paper suggests a way to encrypt millions of personal information by using multi-server with low specifications and measures its performance on test environment. And, I was compared with the performance of high- specification server. As a compared result, the mechanism with three devices by parallel and distributed processing improved its performance by 128%, and the mechanism with five devices by the same processing improved its performance by 158%.

Proteomic Analysis of Outer Membrane Proteins in Salmonella enterica Enteritidis

  • Cho, Youngjae;Park, Soyeon;Barate, Abhijit Kashinath;Truong, Quang Lam;Han, Jang Hyuck;Jung, Cheong-Hwan;Yoon, Jang Won;Cho, Seongbeom;Hahn, Tae-Wook
    • Journal of Microbiology and Biotechnology
    • /
    • v.25 no.2
    • /
    • pp.288-295
    • /
    • 2015
  • Salmonella enterica serovar Enteritidis is the predominant agent causing salmonellosis in chickens and other domestic animals. In an attempt to identify antigenic S. Enteritidis outer membrane proteins (OMPs) that may be useful for subunit vaccine development, we established a proteomic map and database of antigenic S. Enteritidis OMPs. In total, 351 and 301 spots respectively from S. Enteritidis strain 270 and strain 350 were detected by two-dimensional gel electrophoresis. Fifty-one antigen-reactive spots were detected by antisera on two-dimensional immunoblots and identified as 12 specific proteins by matrix-assisted laser desorption ionization time-of-flight mass spectrometry. OmpA and DNA starvation/stationary phase protection protein (Dps) were the most abundant proteins among the identified OMPs, comprising 22 and 12 protein species, respectively. Interestingly, we found that the Dps of S. Enteritidis is also antigenic. OmpW was also verified to have high antigenicity. These results show that OmpA, Dps, and possibly OmpW are antigenic proteins. This study provides new insights into our understanding of the immunogenic characteristics of S. Enteritidis OMPs.

A New Analysis Method for Packed Malicious Codes (코드은닉을 이용한 역공학 방지 악성코드 분석방법 연구)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.3
    • /
    • pp.488-494
    • /
    • 2012
  • This paper classifies the self-defense techniques used by the malicious software based on their approaches, introduces the packing technique as one of the code protection methods and proposes a way to quickly analyze the packed malicious codes. Packing technique hides a malicious code and restore it at runtime. To analyze a packed code, it is initially required to find the entry point after restoration. To find the entry point, it has been used reversing the packing routine in which a jump instruction branches to the entry point. However, the reversing takes too much time because the packing routine is usually obfuscated. Instead of reversing the routine, this paper proposes an idea to search some features of the startup code in the standard library used to generate the malicious code. Through an implementation and a consequent empirical study, it is proved that the proposed approach is able to analyze malicious codes faster.

The Relationship between R&D Policies' Importance Perception and Business Performance (연구개발 정책의 중요도 평가와 기업의 경영성과와의 관계)

  • Kim, Soo-Hyun;Lee, Sang-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.498-506
    • /
    • 2018
  • Considering that firms' view on R&D activities may differ depending on the economic situation, in this paper, R&D policies that significantly affect the business performance are identified. The analysis is conducted by dividing the analysis time-frame into before and after the economic recession. In addition, we analyze by considering the type of industry, the proportion of R&D investment, and the type of government support policy that the companies participate in. According to the results of the empirical analysis, the provision of global market and technology information is recognized to give a significant impact on business performance for both before and after the economic recession. It is shown that recognizing the importance of 'supporting self-technology development', 'enhancing technical cooperation with foreign countries', and 'enhancing the contract and intellectual property protection system' that had significant effects before the recession did not significantly affect the business performance after the recession. The analysis results could give meaningful implications to the government for deciding which R&D activities should be supported.