• 제목/요약/키워드: strength of security

검색결과 284건 처리시간 0.032초

The effect of divalent and trivalent cations on aggregation and surface hydrophobicity of selected microorganism

  • Alias, M. Anwar;Muda, Khalida;Affam, Augustine Chioma;Aris, Azmi;Hashim, Normala
    • Environmental Engineering Research
    • /
    • 제22권1호
    • /
    • pp.61-74
    • /
    • 2017
  • This study investigated the effect of various cations ($Ca^{2+}$, $Mg^{2+}$, $Al^{3+}$, $Mn^{2+}$, $Zn^{2+}$) on the autoaggregation (AAg) and surface hydrophobicity (SHb) of three different bacteria (Brevibacillus panacihumi strain (ZB1), Lysinibacillus fusiformis strain (ZB2) and Enterococcus faecalis strain (ZL)) using a 2-level factorial design. The AAg ratio was measured from the changes in the absorbance of the media. Results show that ZB2 had maximum AAg for the three bacteria investigated. A microscopic clustering of cells was observed when $Ca^{2+}$ was added to ZB2. The AAg was in the range of 62%, 58% and 34% for ZB2, ZB1 and ZL, respectively and correlated to the SHb. The aggregation and SHb of the microbial cells increased with increasing ionic strength due to the repulsive steric or overlap forces between the polymer covered surfaces. $Ca^{2+}$ demonstrated a more significant effect on aggregation and SHb of microbial cells due to an attractive binding force.

Integrated Flood Risk Management through Modelling of Nature Based Solutions

  • Bastola, Shiksha;Kareem, Kola Yusuff;Park, Kiddo;Jung, Younghun
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2022년도 학술발표회
    • /
    • pp.160-160
    • /
    • 2022
  • Floods are the most common natural disasters and are annually causing severe destructions worldwide. Human activities, along with expected increased extreme precipitation patterns as a result of climate change enhance the future potential of floods. There are proven evidence that infrastructure based responses to flood disaster is no longer achieving optimum mitigation and have created a false sense of security. Nature-based solutions(NBS) is a widely accepted sustainable and efficient approach for disaster risk reduction and involves the protection, restoration, or management of natural and semi-natural ecosystems to tackle the climate and natural crisis. Adoption of NBS in decision-making, especially in developing nations is limited due to a lack of sufficient scenario-based studies, research, and technical knowledge. This study explores the knowledge gap and challenges on NBS adoption with case study of developing nation, specially for flood management, by the study of multiple scenario analysis in the context of climate, land-use change, and policies. Identification and quantification of the strength of natural ecosystems for flood resilience and water management can help to prioritize NBS in policymaking leading to sustainable measures for integrated flood management.

  • PDF

비선형 유한요소해석을 이용한 철근콘크리트 구조물의 내화성능평가 (Fire Endurance Estimate of Reinforced Concrete Structure Using Nonlinear Finite Element Method)

  • 변순주;임정순;황지욱
    • 한국방재학회 논문집
    • /
    • 제6권1호
    • /
    • pp.17-27
    • /
    • 2006
  • 화재동안 구조물의 복잡한 거동을 이해하기란 쉽지 않다 때문에 화재이후의 철근콘크리트 구조물의 잔류 강도를 평가하는 것은 매우 힘든 일이다. 그러나 교통시설의 화재로 인한 피해는 매우 크므로 화재에 대한 안전성 확보는 결코 간과해서는 안 될 중요한 요소이다. 따라서 이런 큰 피해를 줄이기 위한 철근콘크리트 구조물에 대한 정확한 내화성 평가 방법이 절실히 요구된다. 본 연구에서는 철근콘크리트 구조물의 내화성 평가를 위한 비선형 유한요소해석방법의 유효성을 증명하였고, 비선형 유한요소해석방법에 의한 지하차도 내화성 평가 결과를 ACI 216R-89의 결과와 비교하였다.

압력측정용 A/D변환기의 OPAMP 개발 (Development of OPAMP in an A/D Converter for Pressure Measurement)

  • 채용웅
    • 한국전자통신학회논문지
    • /
    • 제5권4호
    • /
    • pp.435-442
    • /
    • 2010
  • 자동차의 와이퍼 브레이드 성능은 자동차 안전성 확보에 크게 기여한다. 유리면에 접착된 먼지나 이물질 등을 제거하는 기능을 확보하기 위해 와이퍼 브레이드는 닦임성, 내구력, 내열 저온 내오존성 내화학성이 높아야 할 뿐만 아니라 소음이 적어야 한다. 이와 같이 와이퍼의 기능 개선을 위해서는 와이퍼의 성능을 평가하고 분석할 수 있는 시스템 장비가 필수적이다. 본 논문에서는 자동차의 와이퍼 누름압을 측정하는 시스템의 개발을 위해 누름압 센서에서 출력되는 신호를 받아 퍼스널 컴퓨터에 전달하는 아날로그 디지털 변환기를 설계하고자 한다. 설계한 ADC는 빠른 동작 속도를 얻으면서 전체 시스템의 면적 및 전력소모를 최적화하는 구조인 파이프라인 ADC이다.

Optical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • 제19권6호
    • /
    • pp.592-603
    • /
    • 2015
  • In this paper, an optical implementation of a novel asymmetrical cryptosystem combined with D-H secret key sharing and triple DES is proposed. The proposed optical cryptosystem is realized by performing free-space interconnected optical logic operations such as AND, OR and XOR which are implemented in Mach-Zehnder type interferometer architecture. The advantage of the proposed optical architecture provides dual outputs simultaneously, and the encryption optical setup can be used as decryption optical setup only by changing the inputs of SLMs. The proposed cryptosystem can provide higher security strength than the conventional electronic algorithm, because the proposed method uses 2-D array data, which can increase the key length surprisingly and uses 3DES algorithm, which protects against “meet in the middle” attacks. Another advantage of the proposed asymmetrical cryptosystem is that it is free to change the user’s two private random numbers in generating the public keys at any time. Numerical simulation and performance analysis verify that the proposed asymmetric cryptosystem is effective and robust against attacks for the asymmetrical cipher system.

자폐장애 아동을 위한 애착증진치료 프로그램의 효과 (Effects of the Attachment Promotion Therapy Program for the Children with Autistic Spectrum Disorder)

  • 임숙빈;주세진;홍강의
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • 제17권2호
    • /
    • pp.91-97
    • /
    • 2006
  • The effects of the Attachment Promotion Therapy (APT) program for the autistic children were reviewed by 8 papers. The program was consisted with play activity centered mother-child interaction, educational activity for parents, lecture, video-feedback, and support. APT program was effective to improve the attachment behaviors and attachment security. And the mother's behaviors to her child became more child-centered, positively responsive, expressive supportively. Ninety six point seven percent of the mothers were satisfied with the APT program. They described that it was helpful to understand their children's developmental limitation and strength, to learn how to play with their children, to make supportive social network among the mothers, to minimize familial conflicts, and to make them much more comfortable with their children. They thought the APT Program was to be a steppingstone of the further educational program. APT program is an effective early intervention to promote social development and decrease autistic problems.

  • PDF

A Study on the Determinants of Third Party Logistics Service Suppliers in Dongdaemun Market

  • Zhang, Yu-Liang;Yoo, Chang-Gwon;Kim, Gi-Pyoung
    • 유통과학연구
    • /
    • 제15권2호
    • /
    • pp.27-36
    • /
    • 2017
  • Purpose - This study was intended to find the selection attribution factors and service satisfaction determinants of third party logistics suppliers in Dongdaemun wholesale market. Research design, data, and methodology - A questionnaire survey was performed, and the retailers and wholesalers in Dongdaemun wholesale market were asked to fill in it. Company employees using third party logistics service were selected by a random sampling method. Results - It is easy for both retailers and wholesalers to use third party logistics service. The logistics companies in Dongdaemun wholesale market have paid more heed to the security of freight and the operability. That is, the freight safety and operating service are the most important factors in selecting third party logistics suppliers, and they both have a close relationship with user satisfaction. There is no relation between service level and recognition in selection factors of third party logistics suppliers. All the responsiveness, operability and informativeness of third-party logistics providers has a significant relationship with user satisfaction. Conclusions - Third party logistics service is entirely different from the existing delivery or transport service. The most market vendors' wish for third party logistics suppliers is the stability of freight and robust operating service. They also demand the responsiveness for special or emergency situation with having information strength.

수중음향기법을 이용한 용담호의 어류 분포특성 연구 (Hydroacoustic Survey of Fish Distribution and Aggregation Characteristics in the Yongdam Reservoir, Korea)

  • 이형빈;이경훈;김성훈;김인옥;강돈혁
    • 한국수산과학회지
    • /
    • 제47권6호
    • /
    • pp.1055-1062
    • /
    • 2014
  • Hydroacoustic surveys were conducted for spatio-temporal distribution and size estimation of fish in the Yongdam reservoir, Korea, from April to July 2014. Acoustic data were collected along acoustic transects using a 120 kHz scientific echosounder. The received acoustic data were the in situ acoustic target strength (dB) and nautical area scattering coefficient ($m^2/mile^2$). Data on fish behavioral patterns and size were collected using a DIDSON acoustic camera at stationary stations. Fish were mainly distributed in the center channel and close to the outer Yongdam reservoir. Acoustic density of fish in the summer season were higher than in the spring season. The seasonal vertical distribution pattern of fish aggregations may be strongly related to the vertical temperature structure. The size distribution of fish obtained from an acoustic camera correlated well with the acoustic size of fish from an echosounder.

경량암호 Sparkle에 대한 Grover 공격 비용 분석 및 양자 후 보안 강도 평가 (Analysis of Grover Attack Cost and Post-Quantum Security Strength Evaluation for Lightweight Cipher Sparkle)

  • 양유진;장경배;송경주;김현지;임세진;서화정
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2022년도 춘계학술발표대회
    • /
    • pp.183-186
    • /
    • 2022
  • 고성능 양자 컴퓨터가 개발될 것으로 기대됨에 따라 잠재적인 양자 컴퓨터의 공격으로부터 안전한 양자 후 보안 시스템을 구축하기 위한 연구들이 진행되고 있다. 대표적인 양자 알고리즘인 Grover 알고리즘이 대칭키 암호에 적용될 경우 보안 강도가 제곱근으로 감소되는 보안 훼손이 발생한다. NIST는 대칭키 암호에 대한 양자 후 보안 요구사항으로, 암호 알고리즘 공격에 요구되는 Grover 알고리즘 비용을 기준을 기준으로 양자 후 보안 강도를 추정하고 있다. 대칭키 암호를 공격하기 위한 Grover 알고리즘의 비용은 대상 암호화 알고리즘의 양자 회로 복잡도에 따라 결정된다. 본 논문에서는 NIST 경량암호 공모전 최종 후보에 오른 Sparkle 알고리즘의 양자 회로를 효율적으로 구현하고 Grover 알고리즘을 적용하기 위한 양자 비용에 대해 분석한다. 마지막으로, NIST 양자 후 보안 요구사항과 분석한 비용을 기반으로 경량암호 Sparkle에 대한 양자 후 보안 강도를 평가한다. 양자 회로 구현 및 비용 분석에는 양자 프로그래밍 툴인 ProjectQ가 사용되었다.

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.