• Title/Summary/Keyword: id phase

Search Result 100, Processing Time 0.034 seconds

Cellular Autolysis of Clostridium butyricum ID-113 (Clostridium butyricum ID의 자가분해)

  • Kwag, Jong-Hui;Lee, Se-Yong;Kim, Tae-Han;Lee, Jung-Chi
    • Microbiology and Biotechnology Letters
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 1989
  • The optimum conditions for cellular autolysis in Clostridium butyricum ID-113 have been investigated. Cellular autolysis was optimal at pH 1.0 in 0.05 M potassium phosphate buffer and at 37$^{\circ}C$. The rate of cellular autolysis depended on the age of culture. The most rapid cellular autolysis occurred in the cells of mid-exponentially growing cultures, but cellular autolysis decreased sharply when the cultures entered the stationary phase. A growing culture of Cl. butyricum ID-113 was induced to autolyze and lost its turbidity spontaneously in the hypertonic NaCl, sucrose, or glucose medium. The autolytic enzyme activity was found In the autolysate of cells and the supernatant of the culture.

  • PDF

Performance of Indoor Positioning using Visible Light Communication System (가시광 통신을 이용한 실내 사용자 단말 탐지 시스템)

  • Park, Young-Sik;Hwang, Yu-Min;Song, Yu-Chan;Kim, Jin-Young
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.129-136
    • /
    • 2014
  • Wi-Fi fingerprinting system is a very popular positioning method used in indoor spaces. The system depends on Wi-Fi Received Signal Strength (RSS) from Access Points (APs). However, the Wi-Fi RSS is changeable by multipath fading effect and interference due to walls, obstacles and people. Therefore, the Wi-Fi fingerprinting system produces low position accuracy. Also, Wi-Fi signals pass through walls. For this reason, the existing system cannot distinguish users' floor. To solve these problems, this paper proposes a LED fingerprinting system for accurate indoor positioning. The proposed system uses a received optical power from LEDs and LED-Identification (LED-ID) instead of the Wi-Fi RSS. In training phase, we record LED fingerprints in database at each place. In serving phase, we adopt a K-Nearest Neighbor (K-NN) algorithm for comparing existing data and new received data of users. We show that our technique performs in terms of CDF by computer simulation results. From simulation results, the proposed system shows that a positioning accuracy is improved by 8.6 % on average.

Study on 2BP Distance Bounding Protocol to Prevent Relay Attack in RFID environment (RFID 환경에서 중계공격을 방지를 위한 2BP Distance Bounding 프로토콜 연구)

  • Jung, Youn-Sung;Kim, Hyeong-Ju;Lee, A-Young;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.892-895
    • /
    • 2012
  • RIFD 시스템은 개체 인증, 전자결제 등 다양한 분야에서 사용되고 있다. 무선통신의 특성상 악의적인 공격자로부터 중계공격이 가능하여 공격자가 정당한 사용자로 가장할 수 있다. 이러한 중계공격을 예방하기 위하여 Distance Bounding이라는 개념의 프로토콜이 제안되어 왔다. 하지만, 기존 연구는 태그 ID 전달의 기밀성을 보장하지만 ID 검색의 비효율성 및 불필요한 두 번째 저속 단계가 존재하는 단점이 있다. 따라서 본 논문은 ID의 검색 없고, 시도 값과 응답 값을 2bits로 하여 마지막 저속 단계를 생략하며, 고속 단계에서 공격자의 공격 탐지 및 Terrorist 공격에 대하여 $(1/2)^n$의 공격 성공률을 갖는 2BP(2Bit 2Phase) Distance Bounding 프로토콜을 제안한다.

Building a Log Framework for Personalization Based on a Java Open Source (JAVA 오픈소스 기반의 개인화를 지원하는 Log Framework 구축)

  • Sin, Choongsub;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.8
    • /
    • pp.524-530
    • /
    • 2015
  • A log is for text monitoring and perceiving the issues of a system during the development and operation of a program. Based on the log, system developers and operators can trace the cause of an issue. In the development phase, it is relatively simple for a log to be traced while there are only a small number of personnel uses of a system such as developers and testers. However, it is the difficult to trace a log when many people can use the system in the operation phase. In major cases, because a log cannot be tracked, even tracing is dropped. This study proposed a simplified tracing of a log during the system operation. Thus, the purpose is to create a log on the run time based on an ID/IP, using features provided by the Logback. It saves an ID/IP of the tracking user on a DB, and loads the user's ID/IP onto the memory to trace once WAS starts running. Before the online service operates, an Interceptor is executed to decide whether to load a log file, and then it generates the service requested by a certain user in a separate log file. The load is insignificant since the arithmetic operation occurs in a JVM, although every service must pass through the Interceptor to be executed.

A novel ID-based multi-domain handover protocol for mesh points in WMNs

  • Zhang, Xue;Li, Guangsong;Han, Wenbao;Ji, Huifang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2512-2529
    • /
    • 2015
  • Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues. A mesh point may lose all of its available links during its movement. Thus, the mesh point needs to handover to a new mesh point in order to obtain access to the network again. For multi-domain WMNs, we proposed a new ID-based signcryption scheme and accordingly present a novel ID-based handover protocol for mesh points. The mutual authentication and key establishment of two mesh points which belong to different trust domains can be achieved by using a single one-round message exchange during the authentication phase. The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points. Meanwhile, the data transmitted between the two mesh points can be carried by the authentication messages. Moreover, there are no restrictions on the PKG system parameters in our proposed multi-domain ID-based signcryption scheme so our handover scheme can be easily applied to real WMNs circumstances. Security of the signcryption scheme is proved in the random oracle model. It shows that our protocol satisfies the basic security requirements and is resistant to existing attacks based on the security of the signcryption. The analysis of the performance demonstrates that the protocol is efficient and suitable for the multi-domain WMNs environment.

Effects of Replacing Spray Dried Plasma Protein With Spray Dried Porcine Intestine Hydrolysate on Ileal Digestibility of Amino Acids and Growth Performance in Early-Weaned Pigs

  • Kim, J.H.;Chae, B.J.;Kim, Y.G.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.13 no.12
    • /
    • pp.1738-1742
    • /
    • 2000
  • A study was conducted to determine the ileal digestibility (ID) of amino acids and feeding values of spray dried plasma protein (SDPP) and spray dried porcine intestine hydrolysate (SDPI) in early-weaned pigs. Twelve pigs aged 18 days old (Landrace${\times}$Yorkshire${\times}$Duroc; $5.83{\pm}0.51kg$ BW) were cannulated in the terminal ileum for determination of ID of amino acids. Ninety pigs ($6.28{\pm}0.1kg$, 18 days old) were also employed for a feeding trial during phase I period. Treatments were: 1) 6% SDPP, 2) 6% SDPI, and 3) 3% SDPP+3% SDPI. The apparent and true ID values of the essential amino acids except leucine, methionine and valine were lower (p<0.01) in SDPI than in SDPP. The average apparent ID of essential amino acids in SDPP and SDPI were 75.63 and 71.30%, and the average true ID of essential amino acids 84.83 and 80.51%, respectively. The ADG and feed conversion ratio in piglets fed the 6% SDPP diet were better (p<0.01) than in those fed the 6% SDPI diet. When 3% of SDPP was replaced by SDPI, however, the growth rate and efficiency of pigs were comparable to those in pigs fed 6% SDPP. In conclusion, SDPP can be partially replaced by SDPI without any detrimental effect on growth performance in early-weaned pigs.

터빈 유량계를 사용한 이상유동의 측정

  • Sim, Jae-U
    • Journal of Ocean Engineering and Technology
    • /
    • v.12 no.2 s.28
    • /
    • pp.147-152
    • /
    • 1998
  • In this study turbine flowmeters were used to predict volumetric flow rate of each phase in two-phase, gas-liquid, flowing in a vertical tube. To determine volumetric flow rates of two-phase, air-water, flowing vertically upward through the polycarbonate tube(57mm ID-inside diameter), two turbine flow meters were used. For void fraction measurements, two gamma densitometers were used at each location of the turbine flow meter, one at the upstream and the other at the downstream. It was determined that the turbine flowmeter's outputs were a function of actual volumetric flow rate of each of the two phases. A two-phase flow model was developed.

  • PDF

Effect of Phenolic Mediators and Humic Acid on the Removal of 1-Indanone Using Manganese Oxide (망간산화물(Birnessite)을 이용한 1- Indanone 제거 시 페놀계 반응매개체와 휴믹산(HA) 영향 평가)

  • Choi, Chan-Kyu;Eom, Won-Suk;Shin, Hyun-Sang
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.34 no.7
    • /
    • pp.445-453
    • /
    • 2012
  • An investigation for removal of 1-indanone (1-ID), which were commonly produced from the biological and/or chemical treatment and natural weathering of the PAHs-contaminated soils, via oxidative transformation mediated by birnessite in the presence of various phenolic mediators is described. This study also examines the potential effect of the natural occurring substance humic acid (HA) on the oxidative transformation. The experiment was carried out in aqueous phase as a batch test (10 mg/L 1-ID, 0.3 mM phenolic mediators, $1.0g/L\;{\delta}-MnO_2$, at pH 5). All of the 11 tested phenoilic mediators belong to the group of natural occurring phenols and are widely used as model constituents of humic substances. From the results of HPLC analysis, it is demonstrated that 1-ID was not reactive to birnessite itself, but it can be effectively removed in birnessite-mediated cross coupling reactions in the presence of the phenolic mediators. The percent removals of 1-ID after 2 day incubation were ranged from 9.2 to 71.2% depending on the phenolic mediators applied. The initial rate constant ($K_{int}$, $hr^{-1}$) values for the 1-ID removals obtained from the pseudo-first-order kinetic plots also widely ranged from 0.18 to 15.0. Results of the correlative analysis between the removal efficiencies and structural characteristics of phenolic mediators indicate that the transformation of the 1-ID was considerably enhanced by the addition of electron-donating substituents (e.g., -OH, $-OCH_3$) at the benzne ring, and much less enhanced by the addition of electron-withdrawing substituents (e.g., -COOH, -CHO). The presence of HA showed that removal efficiencies of 1-ID in the birnessite-phenolic mediator systems decreased with increasing HA concentrations. However at low concentration of HA (< 2 mg/L), it caused some enhancement in the removals of 1-ID as compared to the control.

Poly-Si(SPC) NVM for mult-function display (디스플레이 다기능성 구현을 위한 Poly-Si(SPC) NVM)

  • Heo, Jong-Kyu;Cho, Jae-Hyun;Han, Kyu-Min;Yi, Jun-Sin
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2008.06a
    • /
    • pp.199-199
    • /
    • 2008
  • 이 실험은 NVM의 Oxide, Nitride, Oxide nitride층별 blocking, trapping and tunneling 속성에 대해서 밝히고자 한다. gate 전극은 값싸고 전도도가 좋은 알루미늄을 사용한다. 유리기판위에 Silicon nitride층을 20nm로 코팅하고 Silicon dioxide층을 10nm로 코팅한다. 그리고 amorphous Silicon material이 증착된다. Poly Silicon은 Solid Phase Crystallization 방법을 사용하였다. 마지막 공정으로 p-doping은 ion shower에 의한 방법으로 drain과 source 전극을 생성하였다. gate가 biasing 될 때, p-channel은 source와 drain 사이에서 형성된다. Oxide Nitride Oxide nitride (ONO) 층은 각각 12.5nm/20nm/2.3nm의 두께로 만들었다. 전하는 Program process 중에 poly Silicon층에서 Silicon Oxide nitride tunneling층을 통하여 움직이게 된다. 그리고 전하들은 Silicon Nitride층에 머무르게 된다. 그 전하들은 erasing process 중에 trapping 층에서 poly Silicon 층으로 되돌아 간다. Silicon Oxide blocking층은 trapping층으로 전하가 나가는 것을 피하기 위하여 더해진다. 이 논문에서 Programming process와 erasing process의 Id-Vg 특성곡선을 설명한다. Programming process에 positive voltage를 또는 erasing process에 negative voltage를 적용할 때, Id-Vg 특성 곡선은 왼쪽 또는 오른쪽으로 이동한다. 이 실험이 보여준 결과값에 의해서 10년 이상의 저장능력이 있는 메모리를 만들 수 있다. 그러므로, NVM의 중요한 두 가지 성질은 유지성과 내구성이다.

  • PDF

UT Inspection Technique of Cast Stainless Steel Piping Welds Using Low Frequency TRL UT Probe (저주파수 TRL 탐촉자를 이용한 Cast Stainless Steel 배관 용접부 초음파탐상기법)

  • Shin, Keon-Cheol;Chang, Hee-Jun;Jeong, Young-Cheol;Noh, Ik-Jun;Lee, Dong-Jin
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.6 no.1
    • /
    • pp.29-36
    • /
    • 2010
  • Ultrasonic inspection of heavy walled cast austenitic stainless steel(CASS)welds is very difficult due to complex and coarse grained structure of CASS material. The large size of anisotropic grain strongly affects the propagation of ultrasound by severe attenuation, change in velocity, and scattering of ultrasonic energy. therefore, the signal patterns originated from flaws can be difficult to distinguish from scattered signals. To improve detection and sizing capability of ID connected defect for heavy walled CASS piping welds, the low frequency segmented TRL Pulse Echo and Phased Array probe has been developed. The experimental studies have been performed using CASS pipe mock-up block containing artificial reflectors(ID connected EDM notch). The automatic pulse echo and phase array technique is applied the detection and the length sizing of the ID connected artificial reflectors and the results for detection and sizing has been compared respectively. The goal of this study is to assess a newly developed ultrasonic probe to improve the detection ability and the sizing of the crack in coarse-grained CASS components.

  • PDF