• Title/Summary/Keyword: destroy

Search Result 437, Processing Time 0.031 seconds

Development of Improving Water Quality in Eutrophic Lake Using Microalgal Cultivation (미세조류 배양을 이용한 부영양호 내 수질 개선 기술 개발)

  • Kim, Ki-Hyun;Kang, Sung-Mo;Cho, Yonghee;Jeon, Sanghyun;Kim, Jun-Ho;Park, Hanwool;Lee, Yunwoo;Jeong, Jeongho;Lim, Sang-Min;Lee, Choul-Gyun
    • Journal of Marine Bioscience and Biotechnology
    • /
    • v.10 no.2
    • /
    • pp.91-96
    • /
    • 2018
  • There are many eutrophic lakes by point and non-point pollution sources such as in dustrial waste water, domestic raw sewage, and mucks. The eutrophic lakes not only cause algal blooms but also destroy the ecosystem in the lakes due to high nutrient concentrations. The purpose of this study was to improve water quality in eutrophic lakes by cultivating microalgae using photobioreactors (PBRs) with selectively permeable mesh (SPM), supplying nutrients in the lake and inhibiting cell leakage by diffusion and water permeability. Chlorella vulgaris, was cultivated using PBRs with SPM installed in Inkyung Lake located in Inha university, Incheon, Korea. When cultivating C. vulgaris, $8.3g/m^2/day$ of average biomass productivity was obtained at 3 days. Furthermore, concentrations of total nitrogen and phosphorus were reduced by 35.7% and 84.2%, respectively, compared to initial condition and water quality in eutrophic lake was improved to oligotrophic environment. These results suggest that microalgal cultivation using PBRs with SPM in the lake could produce microalgal biomass as well as improve water quality by decreasing nutrient concentrations.

A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1502-1522
    • /
    • 2019
  • Leakage of secret keys may be the most devastating problem in public key cryptosystems because it means that all security guarantees are missing. The forward security mechanism allows users to update secret keys frequently without updating public keys. Meanwhile, it ensures that an attacker is unable to derive a user's secret keys for any past time, even if it compromises the user's current secret key. Therefore, it offers an effective cryptographic approach to address the private key leakage problem. As an extension of the forward security mechanism in certificate-based public key cryptography, forward-secure certificate-based signature (FS-CBS) has many appealing merits, such as no key escrow, no secure channel and implicit authentication. Until now, there is only one FS-CBS scheme that does not employ the random oracles. Unfortunately, our cryptanalysis indicates that the scheme is subject to the security vulnerability due to the existential forgery attack from the malicious CA. Our attack demonstrates that a CA can destroy its existential unforgeability by implanting trapdoors in system parameters without knowing the target user's secret key. Therefore, it is fair to say that to design a FS-CBS scheme secure against malicious CAs without lying random oracles is still an unsolved issue. To address this problem, we put forward an enhanced FS-CBS scheme without random oracles. Our FS-CBS scheme not only fixes the security weakness in the original scheme, but also significantly optimizes the scheme efficiency. In the standard model, we formally prove its security under the complexity assumption of the square computational Diffie-Hellman problem. In addition, the comparison with the original FS-CBS scheme shows that our scheme offers stronger security guarantee and enjoys better performance.

Meritocracy and Democracy: in the Context of Confucian Modernity (메리토크라시와 민주주의: 유교적 근대성의 맥락에서)

  • Chang, Eun-Joo
    • Journal of Korean Philosophical Society
    • /
    • no.119
    • /
    • pp.1-33
    • /
    • 2017
  • This article explore the relation between meritocracy and democracy in the context of South-Korea's confucian modernity. It starts with the confirmation that South-Korea's confucian-meritocratic tradition has positive influence on democracy, in similar way as in the western countries where meritocracy was as a basis for democracy evaluated. But meritocracy has not always the positive implication for democracy. This article shows that meritocracy is in its essence 'an ideology of the betrayal' which destroy the basis of democracy through producing and justifying extreme socio-economic inequalities between citizens. But the long confucian-meritocratic tradition of East Asia makes meritocracy ideology attractive for the people, so even the temptation of the 'political meritocracy' is strong, as we see in Singapore and China. This article argues that the political meritocracy cannot be the alternative of democracy, seeks the different way to overcome the crisis of democracy than meritocracy indicate. Finally, it discusses shortly which implications this sort of relation between meritocracy and democracy for the future of South-Korean democracy can have.

Job Competency Development Policy in the Era of the 4th Industrial Revolution (4차 산업혁명시대의 직업능력개발정책 - 이행노동시장 모형을 중심으로 -)

  • Yoo, Kil-sang
    • Journal of Practical Engineering Education
    • /
    • v.9 no.2
    • /
    • pp.167-174
    • /
    • 2017
  • The purpose of this paper is to review the effects of the $4^{th}$ Industrial Revolution on job competency development by the Transitional Labor Market(TLM) model, and suggest job competency development policiy in the rea of the $4^{th}$ Industrial Revolution. The $4^{th}$ Industrial Revolution will create new jobs, destroy many current jobs, and will fundamentally change employment pattern, contents of jobs and ways of works. In these circumstances, we will confront more risks in each stage of labor market transition. To minimize the risks of TLM, we should reform education and develop life time career and job competency. We have to train high level talented persons to lead the $4^{th}$ Industrial Revolution. We have to retrain employed people to adjust new technology and to enhance employability and adaptability. We have to train vulnerable groups so that they may adjust new circumstance. Government should develop life time job competency development open platform.

The Improvement of Disaster Safety Network using ICT Devices (ICT 기기를 활용한 재난안전통신망 강화 방안)

  • Hong, Sung-Hwa
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.194-199
    • /
    • 2019
  • Natural disasters destroy decades of human effort and investments, thereby placing new demands on society for reconstruction and rehabilitation. In most case, the natural phenomena triggering the disasters are beyond human control. In order to solve the problems that the information resources can not be shared among disaster management sectors and their work is hard to be coordinated in city, an idea of application of ubiquitous sense network and ICT technology to model the architecture of the disaster prevention system based on the analysis of characteristics of disasters. The proposed algorithm simulated that it is possible to locate the terminal by linking the direction angle and the estimated position that can be confirmed at the time of stopping, even if the movement direction of the terminal does not move in a certain direction with only a smaller number of mobile base stations. We also confirmed that the proposed algorithms analyzed through simulation are more efficient than existing algorithms.

Operating characteristics of a superconducting DC circuit breaker connected to a reactor using PSCAD/EMTDC simulation

  • Kim, Geon-woong;Jeong, Ji-sol;Park, Sang-yong;Choi, Hyo-sang
    • Progress in Superconductivity and Cryogenics
    • /
    • v.23 no.3
    • /
    • pp.51-54
    • /
    • 2021
  • The DC system has less power loss compared to the AC system because there is no influence of frequency and dielectric loss. However, the zero-crossing point of the current is not detected in the event of a short circuit fault, and it is difficult to interruption due to the large fault current that occurs during the opening, so the reliability of the DC breaker is required. As a solution to this, an LC resonance DC circuit breaker combined a superconducting element has been proposed. This is a method of limiting the fault current, which rises rapidly in case of a short circuit fault, with the quench resistance of the superconducting element, and interruption the fault current passing through the zero-crossing point through LC resonance. The superconducting current limiting element combined to the DC circuit breaker plays an important role in reducing the electrical burden of the circuit breaker. However, at the beginning of a short circuit fault, superconducting devices also have a large electrical burden due to large fault currents, which can destroy the element. In this paper, the reactor is connected to the source side of the circuit using PSCAD/EMTDC. After that, the change of the fault current according to the reactor capacity and the electrical burden of the superconducting element were confirmed through simulation. As a result, it was confirmed that the interruption time was delayed as the capacity of the reactor connected to the source side increased, but peak of the fault current decreased, the zero-crossing point generation time was shortened, and the electrical burden of the superconducting element decreased.

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.

Feasibility of Optical Character Recognition (OCR) for Non-native Turtle Detection (UAV 기반 외래거북 탐지를 위한 광학문자 인식(OCR)의 가능성 평가)

  • Lim, Tai-Yang;Kim, Ji-Yoon;Kim, Whee-Moon;Kang, Wan-Mo;Song, Won-Kyong
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.25 no.5
    • /
    • pp.29-41
    • /
    • 2022
  • Alien species cause problems in various ecosystems, reduce biodiversity, and destroy ecosystems. Due to these problems, the problem of a management plan is increasing, and it is difficult to accurately identify each individual and calculate the number of individuals, especially when researching alien turtle species such as GPS and PIT based on capture. this study intends to conduct an individual recognition study using a UAV. Recently, UAVs can take various sensor-based photos and easily obtain high-definition image data at low altitudes. Therefore, based on previous studies, this study investigated five variables to be considered in UAV flights and produced a test paper using them. OCR was used to monitor the displayed turtles using the manufactured test paper, and this confirmed the recognition rate. As a result, the use of yellow numbers showed the highest recognition rate. In addition, the minimum threat distance was confirmed to be 3 to 6m, and turtles with a shell size of 6 to 8cm were also identified during the flight. Therefore, we tried to propose an object recognition methodology for turtle display text using OCR, and it is expected to be used as a new turtle monitoring technique.

Degenerative changes in testis, epididymis, and sperm quality in ICR mice treated with methoxychlor and bisphenol A

  • Juyeon Hong;Donghun Kang;Daeyoung Kim
    • Journal of Animal Reproduction and Biotechnology
    • /
    • v.37 no.4
    • /
    • pp.276-284
    • /
    • 2022
  • Endocrine-disrupting chemicals found in many commercial products may interfere with the normal functioning of the endocrine system and are unsafe because of their cumulative effect on the human body. However, little is known about the effects of combinations of endocrine-disrupting chemicals in humans. Methoxychlor and bisphenol A are toxic to male reproductive organs. Therefore, we studied the effects of methoxychlor and bisphenol A on male reproductive function. Male mice were divided into four treatment groups: control, 400 mg methoxychlor, 1 mg bisphenol A, and 400 mg methoxychlor + 1 mg bisphenol A/kg/day. Methoxychlor and bisphenol A were dissolved in sesame oil and acetone and administered orally for 4 weeks. After administration, the weight and histological changes in the testicles and epididymis, sperm count and health were observed biochemical tests and whole blood counts were performed. The results showed that the mice in the bisphenol A and methoxychlor + bisphenol A groups gained more weight than those in the control and methoxychlor group. The weights of the testes and epididymis were higher in the experimental groups than in the control. Sperm motility and progression were significantly reduced in the bisphenol A and methoxychlor + bisphenol A groups. Histological observation showed a reduced number of sperm, smaller seminiferous tubules, and destroyed lumen in the methoxychlor + bisphenol A group compared to the other groups. In conclusion, our study showed that methoxychlor and bisphenol A destroy male reproductive tissues and decrease sperm quality.

A Network Packet Analysis Method to Discover Malicious Activities

  • Kwon, Taewoong;Myung, Joonwoo;Lee, Jun;Kim, Kyu-il;Song, Jungsuk
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.143-153
    • /
    • 2022
  • With the development of networks and the increase in the number of network devices, the number of cyber attacks targeting them is also increasing. Since these cyber-attacks aim to steal important information and destroy systems, it is necessary to minimize social and economic damage through early detection and rapid response. Many studies using machine learning (ML) and artificial intelligence (AI) have been conducted, among which payload learning is one of the most intuitive and effective methods to detect malicious behavior. In this study, we propose a preprocessing method to maximize the performance of the model when learning the payload in term units. The proposed method constructs a high-quality learning data set by eliminating unnecessary noise (stopwords) and preserving important features in consideration of the machine language and natural language characteristics of the packet payload. Our method consists of three steps: Preserving significant special characters, Generating a stopword list, and Class label refinement. By processing packets of various and complex structures based on these three processes, it is possible to make high-quality training data that can be helpful to build high-performance ML/AI models for security monitoring. We prove the effectiveness of the proposed method by comparing the performance of the AI model to which the proposed method is applied and not. Forthermore, by evaluating the performance of the AI model applied proposed method in the real-world Security Operating Center (SOC) environment with live network traffic, we demonstrate the applicability of the our method to the real environment.