• Title/Summary/Keyword: key exposure

Search Result 447, Processing Time 0.024 seconds

Effects of Y and Ti addition on microstructure stability and tensile properties of reduced activation ferritic/martensitic steel

  • Qiu, Guoxing;Zhan, Dongping;Li, Changsheng;Qi, Min;Jiang, Zhouhua;Zhang, Huishu
    • Nuclear Engineering and Technology
    • /
    • v.51 no.5
    • /
    • pp.1365-1372
    • /
    • 2019
  • The effects of Y and Ti on the microstructure stability and tensile properties of the reduced activation ferritic/martensitic steel have been investigated. The addition of Y and Ti affected the prior austenite grain size due to the pinning of the inclusions. Ti addition of 0.008 wt% to the steel was intended to promote the precipitation of nano-sized carbides with a high resistance to coarsening. 8Ti14Y exhibited a higher yield strength and a lower DBTT than the other alloys due to the fine grain size and additional precipitation hardening by (Ti, Ta)-rich MX. After thermal exposure at $550^{\circ}C$ for 1500 h, yield strength was dropped significantly in exposed 0Ti13Y. On the contrary, a lower reduction of YS was observed in 8Ti14Y. The $M_{23}C_6$ in 0Ti13Y and 8Ti14Y and MX in 25Ti14Y and 39Ti15Y coarsened seriously during ageing, which could be responsible for the reduction of the tensile properties of alloys.

Numerical study of ITZ contribution on diffusion of chloride and induced rebar corrosion: A discussion of three-dimensional multiscale approach

  • Tu, Xi;Pang, Cunjun;Zhou, Xuhong;Chen, Airong
    • Computers and Concrete
    • /
    • v.23 no.1
    • /
    • pp.69-80
    • /
    • 2019
  • Modeling approach for mesoscopic model of concrete depicting mass transportation and physicochemical reaction is important since there is growing demand for accuracy and computational efficiency of numerical simulation. Mesoscopic numerical simulation considering binder, aggregate and Interfacial Transition Zone (ITZ) generally produces huge number of DOFs, which is inapplicable for full structure. In this paper, a three-dimensional multiscale approach describing three-phase structure of concrete was discussed numerically. An effective approach generating random aggregate in polygon based on checking centroid distance was introduced. Moreover, ITZ elements were built by parallel expanding the surface of aggregates on inner side. By combining mesoscopic model including full-graded aggregate and macroscopic model, cases related to diffusivity and thickness of ITZ, volume fraction and grade of aggregate were studied regarding the consideration of multiscale compensation. Results clearly showed that larger analysis model in multiscale model expanded the diffusion space of chloride ion and decreased chloride content in front of rebar. Finally, this paper addressed some worth-noting conclusions about the chloride distribution and rebar corrosion regarding the configuration of, rebar diameter, concrete cover and exposure period.

Similarity measurement based on Min-Hash for Preserving Privacy

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.240-245
    • /
    • 2022
  • Because of the importance of the information, encryption algorithms are heavily used. Raw data is encrypted and secure, but problems arise when the key for decryption is exposed. In particular, large-scale Internet sites such as Facebook and Amazon suffer serious damage when user data is exposed. Recently, research into a new fourth-generation encryption technology that can protect user-related data without the use of a key required for encryption is attracting attention. Also, data clustering technology using encryption is attracting attention. In this paper, we try to reduce key exposure by using homomorphic encryption. In addition, we want to maintain privacy through similarity measurement. Additionally, holistic similarity measurements are time-consuming and expensive as the data size and scope increases. Therefore, Min-Hash has been studied to efficiently estimate the similarity between two signatures Methods of measuring similarity that have been studied in the past are time-consuming and expensive as the size and area of data increases. However, Min-Hash allowed us to efficiently infer the similarity between the two sets. Min-Hash is widely used for anti-plagiarism, graph and image analysis, and genetic analysis. Therefore, this paper reports privacy using homomorphic encryption and presents a model for efficient similarity measurement using Min-Hash.

Study on the Effect of Self-Disclosure Factor on Exposure Behavior of Social Network Service (자기노출 요인이 소셜 네트워크 서비스의 노출행동에 미치는 영향에 관한 연구)

  • Do Soon Kwon;Seong Jun Kim;Jung Eun Kim;Hye In Jeong;Ki Seok Lee
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • Internet companies that utilize social network have increased in number. The introduction of diverse social media services facilitated innovative changes in e-business. Social network service (SNS), which is a domain of social media, is a web-based service designed to strengthen human relations in the Internet and build new social relations. The remarkable growth of social network services and the profit generation and perception of this service are the new growth engines of this digital age. Given this development, many global IT companies views SNS as the most powerful form of social media. Thus, they invest efforts to develop business models using SNS.2) This study verifies the impact of privacy exposure in SNS as a result of privacy invasion. This study examines the purpose of using the SNS and user's awareness of the significance of personal information, which are key factors that affect self-disclosure of personal information. This study utilizes theory of reasoned action (TRA) to provide a theoretical platform that describes the specific behavior and emotional response of individuals. This study presents a research model that considers negative attitude (negatude). In this model, self-disclosure in SNS is considered a TRA. TRA is a subjective norm, a behavioral intention, and a key variable of exposure behavior. A survey was conducted on college students at Y university in Seoul to empirically verify the research model. The students have experiences in using SNS. A total of 198 samples were collected. Path analysis was applied to analyze the relations of factors. The results of path analysis show the statistically insignificant impact of privacy invasion on negatude, subjective norm, behavioral intention, and exposure behavior. The impact of unrecognized privacy invasion was also considered insignificant. The impacts of intention to use SNS on negatude, subjective norm, behavioral intention, and exposure behavior was significant. A significant impact was also found for the significance of personal information on subjective norm, behavioral intention, and exposure behavior, whereas the impact on negatude was insignificant. The impact of subjective norm on behavioral intention was significant. Lastly, the impact of behavioral intention on exposure behavior was insignificant. These findings are significant because the study examined the process of self-disclosure by integrating psychological and social factors based on theoretical discussion.

Technical Review on Methodology of Generating Exposure Scenario in eSDS of EU REACH (유럽 신화학물질관리제도의 eSDS에 첨부되는 노출시나리오 작성법 개발 동향)

  • Choe, Eun-Kyung;Kim, Jong-Woon;Kim, Sang-Hun;Byun, Sung-Won
    • Clean Technology
    • /
    • v.17 no.4
    • /
    • pp.285-299
    • /
    • 2011
  • As one of the REACH obligations, the extended safety data sheet (eSDS) should be communicated within the supply chain under the REACH Regulation. Based on technical guidance documents published on the ECHAs website and survey of EU's recent REACH-related informations, this paper includes a study on details of how to develop exposure scenarios (ES) such as structure of ES, process of ES develpoment, standard workflows and key input data to develop ES with an introduction of eSDS concept. This paper also contains an overview on operational conditions (OCs) and risk management measures (RMMs) that are what to consider when building an ES. The structure of Chesar (Chemical Safety Assessment and Report tool) developed by European Chemicals Agency (ECHA) is studied with a review of the available exposure estimation tools for workers, environment and consumers. Case example of generic exposure scenario (GES) for organic solvent is presented. To guide Korean EU-exporting companies, their participating roles in three steps of preparing ES are addressed.

Brief Review on Exposure Characteristics, Monitoring Instruments and Threshold Limit Values for Extremely Low Frequency-Magnetic Field (ELF-MF) (직업성 극저주파 자기장 노출평가와 노출 기준에 대한 쟁점 고찰)

  • Dong-Uk, Park;Seunghee, Lee;Kyung Ehi, Zoh
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.4
    • /
    • pp.381-392
    • /
    • 2022
  • Objectives: Objective of this study is to review briefly exposure characteristics, monitoring instruments and threshold limit values for extremely low frequency-magnetic field (ELF-MF) methods. This study was undertaken through brief literature review. We performed a literature search in PubMed to identify ELF-MF studies conducted in workplaces. Initial search keywords such as 'extremely low frequency-magnetic field (ELF-MF)' and 'electromagnetic fields (EMF)' combined or singly. We limited our review to occupational rather than general nonworkplace environmental exposures. Methods: The contents we reviewed: key industry and occupations generating ELF-MF, several direct-reading instruments monitoring ELF-MF and threshold limit values (TLV) preventing health effects may be caused by the exposure to ELF-MF. Results: The industries related to the generation and supply of electricity, electrolytic installations, welding, and induction heating and more were regarded as high ELF-MF exposure industries. All jobs handling or employed performed in power cable lines, electrical wiring, and electrical equipment are found to be exposed to ELF-MF. Threshold or ceiling limit, 1,000 µT, is established to prevent acute effects of exposure to low-frequency EMFs on the nervous system: the direct stimulation of nerve and muscle tissues and the induction of retinal phosphenes. The International Agency for Research on Cancer (IARC) has classified ELF-MF as possibly carcinogenic to humans chiefly based on epidemiological studies on childhood leukemia. However, a causal relationship between magnetic fields and several types of cancer including childhood leukemia has not been established nor has any other long-term effects. Risk management using precautionary measures, has been initiated by the US and EU to prevent chronic health effects related to ELF-MF exposure in workplaces. Conclusion: This study recommends the implementation of various measures such as theestablishment of occupational exposure limit values for ELF-MF and precautionary principle to prevent potential chronic occupational health effects may be caused by ELF-MF in Korea.

Growth Inhibitory and Pro-Apoptotic Effects of Hirsuteine in Chronic Myeloid Leukemia Cells through Targeting Sphingosine Kinase 1

  • Gao, Shan;Guo, Tingting;Luo, Shuyu;Zhang, Yan;Ren, Zehao;Lang, Xiaona;Hu, Gaoyong;Zuo, Duo;Jia, Wenqing;Kong, Dexin;Yu, Haiyang;Qiu, Yuling
    • Biomolecules & Therapeutics
    • /
    • v.30 no.6
    • /
    • pp.553-561
    • /
    • 2022
  • Chronic myeloid leukemia (CML) is a slowly progressing hematopoietic cell disorder. Sphingosine kinase 1 (SPHK1) plays established roles in tumor initiation, progression, and chemotherapy resistance in a wide range of cancers, including leukemia. However, small-molecule inhibitors targeting SPHK1 in CML still need to be developed. This study revealed the role of SPHK1 in CML and investigated the potential anti-leukemic activity of hirsuteine (HST), an indole alkaloid obtained from the oriental plant Uncaria rhynchophylla, in CML cells. These results suggest that SPHK1 is highly expressed in CML cells and that overexpression of SPHK1 represents poor clinical outcomes in CML patients. HST exposure led to G2/M phase arrest, cellular apoptosis, and downregulation of Cyclin B1 and CDC2 and cleavage of Caspase 3 and PARP in CML cells. HST shifted sphingolipid rheostat from sphingosine 1-phosphate (S1P) towards the ceramide coupled with a marked inhibition of SPHK1. Mechanistically, HST significantly blocked SPHK1/S1P/S1PR1 and BCR-ABL/PI3K/Akt pathways. In addition, HST can be docked with residues of SPHK1 and shifts the SPHK1 melting curve, indicating the potential protein-ligand interactions between SPHK1 and HST in both CML cells. SPHK1 overexpression impaired apoptosis and proliferation of CML cells induced by HST alone. These results suggest that HST, which may serve as a novel and specific SPHK1 inhibitor, exerts anti-leukemic activity by inhibiting the SPHK1/S1P/S1PR1 and BCR-ABL/PI3K/Akt pathways in CML cells, thus conferring HST as a promising anti-leukemic drug for CML therapy in the future.

Enhanced Equidistant Chosen Message Power Analysis of RSA-CRT Algorithm (RSA-CRT의 향상된 등간격 선택 평문 전력 분석)

  • Park, Jong-Yeon;Han, Dong-Guk;Yi, Ok-Yeon;Choi, Doo-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.2
    • /
    • pp.117-126
    • /
    • 2011
  • RSA-CRT algorithm is widely used to improve the performance of RSA algorithm. However, it is also vulnerable to side channel attacks like as general RSA. One of the power attacks on RSA-CRT, proposed by Boer et al., is a power analysis which utilizes reduction steps of RSA-CRT algorithm with equidistant chosen messages, called as ECMPA(Equidistant Chosen Messages Power Analysis) or MRED(Modular Reduction on Equidistant Data) analysis. This method is to find reduction output value r=xmodp which has the same equidistant patterns as equidistant messages. One can easily compute secret prime p from exposure of r. However, the result of analysis from a reduction step in [5] is remarkably different in our experiment from what Boer expected in [5]. Especially, we found that there are Ghost key patterns depending on the selection of attack bits and selected reduction algorithms. Thus, in this paper we propose several Ghost key patterns unknown to us until now, then we suggest enhanced and detailed analyzing methods.

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

Effect of Dietary Cadmium Levels on Nutrient Digestibility and Retention of Iron, Copper and Zinc in Tissues of Growing Pigs

  • Han, X.Y.;Xu, Z.R.;Wang, Y.Z.;Tao , X.;Li, W.F.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.17 no.7
    • /
    • pp.1007-1013
    • /
    • 2004
  • This experiment was conducted to investigate the effect of cadmium levels on weight gain, nutrient digestibility and the retention of iron, copper and zinc in tissues of growing pigs. A total of one hundred and ninety-two crossbred pigs (barrows, Duroc$\times$Landrace$\times$Yorkshine, 27.67$\pm$1.33 kg of average initial body weight) were randomly allotted to four treatments. Each treatment had three replicates with 16 pigs per pen. The corn-soybean basal diets were supplemented with 0, 0.5, 5.0, 10.0 mg/kg cadmium respectively, and the feeding experiment lasted for eight-three days. Cadmium chloride was used as cadmium source. The results showed that pigs fed the diet containing 10.0 mg/kg cadmium had lower ADG and FCR than any other treatments (p<0.05). Apparent digestibility of protein in 10.0 mg/kg cadmium-treated group was lower than that of other groups (p<0.05). There was lower iron retention in some tissues of 5.0 mg/kg and 10.0 mg/kg cadmium treatments (p<0.05). However, pigs fed the diet 10.0 mg/kg cadmium had higher copper content in most tissues than that of any other groups (p<0.05). There was a significantly increase of zinc retention in kidney of 10.0 mg/kg cadmium additional group (p<0.05) and zinc concentrations in lymphaden, pancreas and heart of 10.0 mg/kg cadmium treatment were lower than those of the control (p<0.05). This study indicated that relatively high cadmium level (10.0 mg/kg) could decrease pig growth performance and change the retention of iron, copper and zinc in most tissues during extended cadmium exposure period.