• Title/Summary/Keyword: distributed damage

Search Result 389, Processing Time 0.026 seconds

Injury Aspects of the Stone Leek Leafminer, Liriomyza chinensis Kato (Diptera: Agromyzidae) on Welsh Onion (파를 가해하는 파굴파리의 충태별 피해 양상 및 행동)

  • 최인후;김정화;김길하;김철우
    • Korean journal of applied entomology
    • /
    • v.42 no.4
    • /
    • pp.335-343
    • /
    • 2003
  • An experiment was conducted to investigate types of injury inflicted by the stone leek leafminer, Liriomyza chinensis Kato (Diptera: Agromyzidae) on welsh onion. A feeding scar made by an adult female was a hole round in shape, with diameter of 0.08 mm and 0.48 mm in lesion, resulting in a white spot, many of which often form vertical dotted lines on a leaf. Egg spots were oval with 0.1 ${\times}$0.14 mm in size, one or several of which often form a V-shape in group. Feeding by adults began immediately after emergence and was very active from 4th to 5th day. Oviposition was done from 2nd to 6th day after emergence. In both feeding and oviposition, they were more active in the day time. Larvae after emergence crawled up the leaf at first, and then moved up and down to feed on mesophyll. When in high density, they feed on leaf from leaf tip to bottom, and let the leaf die. Area of damage per one larva was calculated as 72.1 $\textrm{mm}^2$. The aged larvae escaped from the leaf in early morning, usually between 5 and 7 am. Most pupation sites were distributed near plants,5cm in soil depth and within 10 cm away from the plant. Pupae of L. chinensis overwintered 10cm below soil surface and emerged from early May to late June the next year Adults then moved to welsh onions near over wintering sites, nursery, transplanted, and levee.

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

A Feature Point Extraction and Identification Technique for Immersive Contents Using Deep Learning (딥 러닝을 이용한 실감형 콘텐츠 특징점 추출 및 식별 방법)

  • Park, Byeongchan;Jang, Seyoung;Yoo, Injae;Lee, Jaechung;Kim, Seok-Yoon;Kim, Youngmo
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.529-535
    • /
    • 2020
  • As the main technology of the 4th industrial revolution, immersive 360-degree video contents are drawing attention. The market size of immersive 360-degree video contents worldwide is projected to increase from $6.7 billion in 2018 to approximately $70 billion in 2020. However, most of the immersive 360-degree video contents are distributed through illegal distribution networks such as Webhard and Torrent, and the damage caused by illegal reproduction is increasing. Existing 2D video industry uses copyright filtering technology to prevent such illegal distribution. The technical difficulties dealing with immersive 360-degree videos arise in that they require ultra-high quality pictures and have the characteristics containing images captured by two or more cameras merged in one image, which results in the creation of distortion regions. There are also technical limitations such as an increase in the amount of feature point data due to the ultra-high definition and the processing speed requirement. These consideration makes it difficult to use the same 2D filtering technology for 360-degree videos. To solve this problem, this paper suggests a feature point extraction and identification technique that select object identification areas excluding regions with severe distortion, recognize objects using deep learning technology in the identification areas, extract feature points using the identified object information. Compared with the previously proposed method of extracting feature points using stitching area for immersive contents, the proposed technique shows excellent performance gain.

Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction (안드로이드 모바일 정상 및 악성 앱 시스템 콜 이벤트 패턴 분석을 통한 유사도 추출 기법)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.125-139
    • /
    • 2013
  • Distribution of malicious applications developed by attackers is increasing along with general normal applications due to the openness of the Android-based open market. Mechanism that allows more accurate ways to distinguish normal apps and malicious apps for common mobile devices should be developed in order to reduce the damage caused by the rampant malicious applications. This paper analysed the normal event pattern from the most highly used game apps in the Android open market to analyse the event pattern from normal apps and malicious apps of mobile devices that are based on the Android platform, and analysed the malicious event pattern from the malicious apps and the disguising malicious apps in the form of a game app among 1260 malware samples distributed by Android MalGenome Project. As described, experiment that extracts normal app and malicious app events was performed using Strace, the Linux-based system call extraction tool, targeting normal apps and malicious apps on Android-based mobile devices. Relevance analysis for each event set was performed on collected events that occurred when normal apps and malicious apps were running. This paper successfully extracted event similarity through this process of analyzing the event occurrence characteristics, pattern and distribution on each set of normal apps and malicious apps, and lastly suggested a mechanism that determines whether any given app is malicious.

Effectiveness of Three Commercial Wood Preservatives against Termite in Korea (주요 국내 사용 방부제 3종에 대한 흰개미 저항 효력)

  • Lee, Hansol;Hwang, Won-Joung;Lee, Hyun-Mi;Son, Dong-Won
    • Journal of the Korean Wood Science and Technology
    • /
    • v.43 no.6
    • /
    • pp.804-809
    • /
    • 2015
  • Since Korea is home to Reticulitermes speratus, a kind of subterranean termites that prefer dark and humid conditions, there have been increasing damages to wooden structures by termites. One noticeable attribute of Korean subterranean termites is that they prefer than Pinus densiflora, the major construction material for Korean traditional houses. And because wide varieties of termites are distributed all over the world, it is not so easy to choose appropriate control methods depending on specific areas. This necessitates careful applications of the following control methods depending on the kinds of termites: fumigation treatment, soil termiticide, preservatives and insect treatment, termite colony elimination system, chemical treatment, and other physical and biological treatment methods. The purpose of this study is to investigate the control effects of environmentally-friendly Alkaline copper quaternary (ACQ), Copper Azole (CuAZ) and Micronized copper quarter (MCQ) on the termites contributing to the damage of wooden structures. It was found in this study that wood with preservative treatment produced a significantly higher termicidal efficacy than untreated wood.

Preliminary Survey for Setting Evaluation Standards of Wood Pellet Safety (목재펠릿의 안전성평가 기준 마련을 위한 예비 조사)

  • Yang, In;Kang, Sung-Mo;Kim, Young Hun;Han, Gyu-Seong
    • Journal of the Korean Wood Science and Technology
    • /
    • v.46 no.5
    • /
    • pp.541-552
    • /
    • 2018
  • As the use of wood pellets increases, there is an increasing interest in the safety of the wood pellets themselves to avoid physical and chemical damage to people and the environment. This study investigated the contents of nitrogen, sulfur, chlorine, arsenic, cadmium, chromium, copper, lead, mercury, nickel, zinc, and cesium in wood pellets distributed in Korea as a preliminary survey for establishing safety evaluation standards for wood pellets. Nitrogen, sulfur, chlorine, and heavy metal contents of wood pellets produced in Korea met the specification for the 1st grade of wood pellets determined by the National Institute of Forest Science and the specification for the commercial and residential wood pellets of A1 grade determined by the ISO and the evaluation standards for wood pellet safety determined by the Korean Forest Service. However, among imported wood pellets, some wood pellets contained nitrogen, sulfur, chlorine, and heavy metal exceeding the safety evaluation standards. Cesium radioactivity was not detected in domestic wood pellets. Cesium radioactivity was detected from wood pellets imported from Japan, but it was below the limits specified in the wood pellet safety evaluation standards. In conclusion, by establishing safety standards for wood pellets, we believe that safe wood pellets will be used.

A Study on the Effect of Information Security Compliance and Crisis Management on Information Security Trust (정보보안 컴플라이언스와 위기대응이 정보보안 신뢰에 미치는 영향에 관한 연구)

  • Yoon, Il-han;Kwon, Sun-dong
    • Information Systems Review
    • /
    • v.17 no.1
    • /
    • pp.141-169
    • /
    • 2015
  • Electronic financial accidents are constantly happening and these accidents are taking place by a combination of several causes such as technique, human, and structure. Among electronic financial accidents, personal information disclosure is most frequently happening and becomes big problems, because secondary damage like voice phishing causes great loss to society. This research model is that financial information security compliance affects the crisis response of financial institutions and financial authorities and these crisis responses affect financial information security trust. Research target is people who experienced the disclosure of their own financial information. For empirical verification, survey questionnaires were distributed and total 103 questionnaires were collected and analyzed. As results of data analysis, all hypotheses were accepted. First, financial information security compliance influenced the crisis response of financial institutions and authorities. Second, the crisis response of financial institutions and authorities affect financial information security trust. Third, at the moderating effect analysis, the importance of personal financial information moderated the effect of the crisis response of financial institutions on financial information security trust. And the disclosure level of personal financial information moderated the effect of the crisis response of financial authorities on financial information security trust.

Effects of Chitosanoligosaccharide on the Hepatotoxicity in Cadmium-treated Mice (키토산올리고당이 카드뮴을 투여한 생쥐의 간독성에 미치는 효과)

  • Yoon, Jung-Sik;Roh, Young-Bok
    • Applied Microscopy
    • /
    • v.33 no.1
    • /
    • pp.59-78
    • /
    • 2003
  • This research was conducted to determine the effects of chitosanoligosaccharide on liver poisoning induced by cadmium (Cd). Three groups of mice were used in this research. The first group was only injected with cadmium (5.0 mg/kg; i.p.) (group Cd) and the second one with cadmium and chitosanoligosaccharide (0.5% solution) at the same time (group Cd+Chi). The third one which had already been injeted with chitosanoligosaccharide (0.5% Solution) aweek before (group Ch7+Cd) was used. In order to investigate the inhibitory action of chitosanoligosaccharide on liver damage, enzyme activity in serum, glutathione peroxidase (GSHPx) activity and glutathione reductase (GR) activity were relatively measured. In addition, histological observations were made to determine the morphologic injury of liver tissues. As the result of enzyme activity in serum, the activity of aspartate aminotransferase (AST), alanine aminotransferase (ALT) and lactate dehydrogenase (LDH) in chitosanoligosaccharide-injected groups Cd+Chi and Chi7+Cd was lower than in group Cd. GSH-Px activity was sharply increased in groups Cd+Chi and Chi7+Cd compared to group Cd. GR activity was conspicuously decreased in groups Cd+Chi and Chi7+Cd compared to group Cd. As the result of light microscopic observation, liver cell necrosis caused by cadmium poisoning was obseved in liver cells. The finding of group Cd+Chi and Chi7+Cd was similar total on of normal groups. As the result of electron microscopic observation, mitochondria in group Cd showed a severe swelling phenomenon, RER fragment and ribosome dropout. However, in groups Cd+Chi and Chi7+Cd, mitochondria wiht high electron density were distributed and RER forming a typical lamellae with ribosome was observed. From these results, cadmium toxicity on rat liver tissues could be lessened by chitosanoligosaccharide.

Biophysical Evaluation of Radiosensitization by AuNPs Nanoparticles Irradiated Photon beam (photon빔 조사 후 AuNPs 입자의 방사선 감수성 향상에 관한 생물물리학적 평가)

  • Choi, Eunae;Son, Jaeman
    • Journal of the Korean Society of Radiology
    • /
    • v.10 no.7
    • /
    • pp.483-487
    • /
    • 2016
  • The purpose of this study is to investigate whether gold nanoparticles had radiosensitization when combined with gamma and x ray beam. Cytotoxicity was mearsured with comparing survival fraction after incubated time 6,12,18 and 24 hours. Clonogenic assay was employed to assess survival fraction of cells with and without gold nanoparticles treatment following gamma ray irradiation. The most of gold nanoparticles were distributed in the cytoplasm. And the toxicity of gold nanoparticles used this study were found to be non-cytotoxic. And we also observed enhancement by about 40% in RBE value for gamma ray irradiation of cells treated with gold nanoparticles. Dose reduction of about half for gamma ray irradiation is demonstrated for gold nanoparticles treated cells as compared to untreated cells. In cells with exposed to gamma ray, DNA damage was increased when compared to only radiation exposed cells. The study revealed a significant reduction in radiation dose for killing the cells with internalized gold nanoparticles as compared to the cells without gold nanoparticles. The gold nanoparticles treatment resulted in enhancement of radiation effect as evident from increase in relative biological effectiveness values for photon irradiated cells.

Frequency Analysis Using Bootstrap Method and SIR Algorithm for Prevention of Natural Disasters (풍수해 대응을 위한 Bootstrap방법과 SIR알고리즘 빈도해석 적용)

  • Kim, Yonsoo;Kim, Taegyun;Kim, Hung Soo;Noh, Huisung;Jang, Daewon
    • Journal of Wetlands Research
    • /
    • v.20 no.2
    • /
    • pp.105-115
    • /
    • 2018
  • The frequency analysis of hydrometeorological data is one of the most important factors in response to natural disaster damage, and design standards for a disaster prevention facilities. In case of frequency analysis of hydrometeorological data, it assumes that observation data have statistical stationarity, and a parametric method considering the parameter of probability distribution is applied. For a parametric method, it is necessary to sufficiently collect reliable data; however, snowfall observations are needed to compensate for insufficient data in Korea, because of reducing the number of days for snowfall observations and mean maximum daily snowfall depth due to climate change. In this study, we conducted the frequency analysis for snowfall using the Bootstrap method and SIR algorithm which are the resampling methods that can overcome the problems of insufficient data. For the 58 meteorological stations distributed evenly in Korea, the probability of snowfall depth was estimated by non-parametric frequency analysis using the maximum daily snowfall depth data. The results of frequency based snowfall depth show that most stations representing the rate of change were found to be consistent in both parametric and non-parametric frequency analysis. According to the results, observed data and Bootstrap method showed a difference of -19.2% to 3.9%, and the Bootstrap method and SIR(Sampling Importance Resampling) algorithm showed a difference of -7.7 to 137.8%. This study shows that the resampling methods can do the frequency analysis of the snowfall depth that has insufficient observed samples, which can be applied to interpretation of other natural disasters such as summer typhoons with seasonal characteristics.