• Title/Summary/Keyword: solution leakage

Search Result 405, Processing Time 0.029 seconds

A STUDY ON THE MARGINAL LEAKAGE OF ENDODONTIC CAVITY FILLING MATERIALS (근관와동 가봉재의 변연누출에 관한 실험적 연구)

  • Nho, Cheol-Jin;Lim, Sung-Sam
    • Restorative Dentistry and Endodontics
    • /
    • v.12 no.2
    • /
    • pp.17-23
    • /
    • 1987
  • The purpose of this study was to evaluate the sealing properties of endodontic cavity filling materials according to the time intervals after filling. Access cavities were prepared in extracted human premolar or molar teeth and filled with caviton, zinc oxide eugenol cement, zinc oxide eugenol cement with a base of gutta percha stopping and gutta percha stopping. After filling at the intervals of immediate, 2 days and 2 weeks the teeth were immersed for 2 weeks in 1% methylene blue solutions. Longitudinal sections were obtained from approximately center of teeth and the depth of dye penetration into the access cavities were observed by 10${\times}$macrolens. The following results were obtained. I. All the materials experimented showed varying depth of dye penetration. 2. Of the material tested, caviton showed the best marginal sealing qualities regardless of the time intervals after filling and the sealing properties of the gutta percha stopping was the worst. 3. Both in zinc oxide eugenol cement and zinc oxide eugenol cement with a base of gutta percha stopping, the fillings allowed to mature for 2 days in normal saline solution showed the best sealing properties and those with no maturing time revealed the worst sealing qualities. 4. The sealing qualities of zinc oxide eugenol cement with a base of gutta percha stopping revealed slightly lower depth of dye penetration than that of zinc oxide eugenol cements.

  • PDF

Dielectric and Structural of PST Thin Films with annealing temperature prepared by Sol-gel method for Phase shifters (Phase shifters 응용을 위한 Sol-gel 법으로 제작된 $(Pb_{0.5},Sr_{0.5})TiO_3$ 박막의 열처리 온도에 따른 구조 및 유전 특성)

  • Hwang, Jln-Ho;Kim, Kyoung-Tae;Kim, Chang-Il
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2004.07b
    • /
    • pp.809-812
    • /
    • 2004
  • (Pb,Sr)TiO3 (PST) thin films were fabricated by using the alkoxide-based sol-gel method. The PST stock solution was made and then spin-coated onto a PUTi/SiO2/Si substrate. The coating and drying procedures were repeated several times, and the PST thin films were sintered at 450-650 C for 1 h. All PST thin films showed dense and homogeneous structures without the presence of any rosette structure. The thicknesses of the PST thin films were approximately 200 nm. The dielectric constant and the dielectric loss of the PST thin films sintered at 550 C were about 404 and 0.0023, respectively. The leakage current density of the PST thin film sintered at 550 C was 3.13 x 10-8 A/cm2 at 1 V.

  • PDF

Nonlinear responses of energy storage pile foundations with fiber reinforced concrete

  • Tulebekova, Saule;Zhang, Dichuan;Lee, Deuckhang;Kim, Jong R.;Barissov, Temirlan;Tsoy, Viktoriya
    • Structural Engineering and Mechanics
    • /
    • v.71 no.4
    • /
    • pp.363-375
    • /
    • 2019
  • A renewable energy storage pile foundation system is being developed through a multi-disciplinary research project. This system intends to use reinforced concrete pile foundations configured with hollowed sections to store renewable energy generated from solar panels attached to building structures in the form of compressed air. However previous research indicates that the compressed air will generate considerable high circumferential tensile stresses in the concrete pile, which requires unrealistic high hoop reinforcement ratio to avoid leakage of the compressed air. One possible solution is to utilize fiber reinforced concrete instead of placing the hoop reinforcement to resist the tensile stress. This paper investigates nonlinear structural responses and post-cracking behavior of the fiber reinforced concrete pile subjected to high air pressure through nonlinear finite element simulations. Concrete damage plasticity models were used in the simulation. Several parameters were considered in the study including concrete grade, fiber content, and thickness of the pile section. The air pressures which the pile can resist at different crack depths along the pile section were identified. Design recommendations were provided for the energy storage pile foundation using the fiber reinforced concrete.

8.2-GHz band radar RFICs for an 8 × 8 phased-array FMCW receiver developed with 65-nm CMOS technology

  • Han, Seon-Ho;Koo, Bon-Tae
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.943-950
    • /
    • 2020
  • We propose 8.2-GHz band radar RFICs for an 8 × 8 phased-array frequency-modulated continuous-wave receiver developed using 65-nm CMOS technology. This receiver panel is constructed using a multichip solution comprising fabricated 2 × 2 low-noise amplifier phase-shifter (LNA-PS) chips and a 4ch RX front-end chip. The LNA-PS chip has a novel phase-shifter circuit for low-voltage operation, novel active single-to-differential/differential-to-single circuits, and a current-mode combiner to utilize a small area. The LNA-PS chip shows a power gain range of 5 dB to 20 dB per channel with gain control and a single-channel NF of 6.4 dB at maximum gain. The measured result of the chip shows 6-bit phase states with a 0.35° RMS phase error. The input P1 dB of the chip is approximately -27.5 dBm at high gain and is enough to cover the highest input power from the TX-to-RX leakage in the radar system. The gain range of the 4ch RX front-end chip is 9 dB to 30 dB per channel. The LNA-PS chip consumes 82 mA, and the 4ch RX front-end chip consumes 97 mA from a 1.2 V supply voltage. The chip sizes of the 2 × 2 LNA-PS and the 4ch RX front end are 2.39 mm × 1.3 mm and 2.42 mm × 1.62 mm, respectively.

Two Factor Face Authentication Scheme with Cancelable Feature (두 가지 보안 요소를 사용하는 취소 가능한 얼굴 인증 기술)

  • Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.13-21
    • /
    • 2006
  • Though authentication using biometric techniques has conveniences for people, security problems like the leakage of personal bio-information would be serious. Even if cancelable biometric is a good solution for the problems, only a few biometric authentication scheme with cancelable feature has been published. In this paper, we suggest a face authentication scheme with two security factors: password and face image. Using matching algorithm in the permuted domain, our scheme is designed to be cancelable in the sense that templates that is composed of permutation and weight vector can be changed freely.

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization

  • Chen, Lu;Tang, Hongbo;Zhao, Yu;You, Wei;Wang, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2490-2506
    • /
    • 2022
  • In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.

Development of Cosmetic Packaging for Cream Formulation with Easy Separation and Discharge (분리배출이 용이한 크림제형용 화장품 패키징 개발)

  • Sang Kyu Ryu;Ho Sang Kang;Jae Young Oh
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.29 no.2
    • /
    • pp.73-78
    • /
    • 2023
  • The cosmetics industry faces a significant challenge in addressing the decreased recycling rate of cosmetic containers due to the composite materials used to meet consumers' aesthetic satisfaction. To address thees issues, eco-friendly packaging solutions such as refill packaging and single-material use have been developed. However, the market for eco-friendly cosmetics packaging requires a product that meets consumers' demands for aesthetics, sensitivity, and eco-friendliness while also performing as well as existing products. This study presents a solution to the challenge of the decreased recycling rate of cosmetic containers by developing a new cosmetic packaging product for cream formulations. The product features an easily separable and dischargeable internal refill container, while maintaining the design aesthetics of the external container. Through various tests, the product was shown to be of equivalent quality and performance to existing cream cosmetic packaging, with no leakage or defects observed. Furthermore, the use of a single-material polypropylene refill container is expected to contribute to the improvement of the plastic recycling rate.

A Novel Smart Contract based Optimized Cloud Selection Framework for Efficient Multi-Party Computation

  • Haotian Chen;Abir EL Azzaoui;Sekione Reward Jeremiah;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.240-257
    • /
    • 2023
  • The industrial Internet of Things (IIoT) is characterized by intelligent connection, real-time data processing, collaborative monitoring, and automatic information processing. The heterogeneous IIoT devices require a high data rate, high reliability, high coverage, and low delay, thus posing a significant challenge to information security. High-performance edge and cloud servers are a good backup solution for IIoT devices with limited capabilities. However, privacy leakage and network attack cases may occur in heterogeneous IIoT environments. Cloud-based multi-party computing is a reliable privacy-protecting technology that encourages multiparty participation in joint computing without privacy disclosure. However, the default cloud selection method does not meet the heterogeneous IIoT requirements. The server can be dishonest, significantly increasing the probability of multi-party computation failure or inefficiency. This paper proposes a blockchain and smart contract-based optimized cloud node selection framework. Different participants choose the best server that meets their performance demands, considering the communication delay. Smart contracts provide a progressive request mechanism to increase participation. The simulation results show that our framework improves overall multi-party computing efficiency by up to 44.73%.

Privacy Data Leakage Problem and its Solution in the Used Product Trading Markets (중고거래플랫폼에서 나타나는 개인정보 유출 현황 및 제안)

  • Jang, Min-Kyung;Kim, Ji-Won;Park, Hye-won;Lim, Su-Jin;Kim, Myuhng-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.225-228
    • /
    • 2022
  • 중고 거래 플랫폼 사용이 증가함에 따라 각 중고 거래 플랫폼에 많은 사진과 글이 업로드되고 있다. 플랫폼에 올린 사진과 글을 통해 일차적으로 해당 이용자의 나이대, 사는 동네, 가족 관계, 신체 사이즈, 특정 제품 취향을 알 수 있다. 중고 거래 플랫폼에서 전화번호를 얻게 될 경우, 이차적으로 카카오톡을 통해 이용자의 얼굴 사진, 연동된 계정을 알 수 있다. 이때 얻은 얼굴 정보와 이름, 계정을 통해 인스타그램, 카카오스토리, 페이스북 등 SNS 를 통한 해당 이용자의 추가적인 개인정보들을 얻을 수 있다. 이처럼 이용자가 작성한 글을 통해 사적인 정보가 드러남으로써 심각한 개인정보 유출로 이어질 수 있다. 중고 거래 플랫폼 이용자의 직접적인 입력으로 인한 개인정보 노출을 예방하기 위해서는 이용자에게 게시물에 포함된 개인정보와 개인정보 유출의 위험성을 인지시켜 유출 위험성이 높은 개인정보는 게시하지 않도록 해야 한다. 본 논문에서는 중고 거래 판매 게시물 기반 개인정보 유출 워크플로우를 작성하여 중고 거래 플랫폼에서 나타나는 개인정보 유출의 현황을 분석하고 이를 방지하기 위한 방법을 제안했다.

Design of Logistics Information Traceability System Based on Blockchain (블록체인 기반 물류정보 추적시스템 설계)

  • Zhang, Linchao;Hang, Lei;Kim, Dohyeun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.244-247
    • /
    • 2022
  • In recent years, the logistics industry has greatly driven the world's economic development. Due to the frequent occurrence of logistics information leakage and forgery, it is necessary to find a solution that can accurately trace the logistics information and ensure the security and authenticity of the logistics information. The birth of blockchain technology has enabled the logistics industry to realize the development from quantitative change to qualitative change. The distributed storage idea, decentralization characteristics, immutable nature, complex encryption algorithm, and other technical characteristics of the blockchain technology make it have a wide range of application prospects in the logistics industry. The purpose of this paper is to apply blockchain technology to the whole chain of logistics information traceability, to indirectly store the corresponding data generated by the logistics circulation link on the blockchain, and to combine the researched consensus algorithm and searchable encryption algorithm to form A set of logistics information traceability system to achieve efficient and accurate traceability of logistics information.