• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.028 seconds

Smear layer removal by passive ultrasonic irrigation and 2 new mechanical methods for activation of the chelating solution

  • Ricardo Machado ;Isadora da Silva;Daniel Comparin;Bianca Araujo Marques de Mattos ;Luiz Romulo Alberton ;Ulisses Xavier da Silva Neto
    • Restorative Dentistry and Endodontics
    • /
    • v.46 no.1
    • /
    • pp.11.1-11.11
    • /
    • 2021
  • Objectives: The aim of this study was to compare smear layer removal by conventional application (CA), passive ultrasonic irrigation (PUI), EasyClean (EC), and XP-Endo Finisher (XPF), using 17% ethylenediaminetetraacetic acid (EDTA) after chemomechanical preparation, as evaluated with scanning electron microscopy (SEM). Materials and Methods: Forty-five single-rooted human mandibular premolars were selected for this study. After chemomechanical preparation, the teeth were randomly divided into 5 groups according to the protocol for smear layer removal, as follows: G1 (control): CA of distilled water; G2 (CA): CA of 17% EDTA; G3 (PUI): 17% EDTA activated by PUI; G4 (EC): 17% EDTA activated by EC; and G5 (XPF): 17% EDTA activated by XPF. SEM images (×1,000) were obtained from each root third and scored by 3 examiners. Data were evaluated using the Kruskal-Wallis and Dunn tests (p < 0.05). Results: In the apical third, there were no statistically significant differences among the groups (p > 0.05). In the cervical and middle thirds, the experimental groups performed better than the control group (p < 0.05); however, G2 presented better results than G3, G4, and G5 (p < 0.05), which showed no differences among one another (p > 0.05). Conclusions: No irrigation method was able to completely remove the smear layer, especially in the apical third. Using CA for the chelating solution performed better than any form of activation.

Utilization of the bar gene to develop an efficient method for detection of the pollen-mediated gene flow in Chinese cabbage (Brassica rapa spp. pekinensis)

  • Lim, Chaewan;Kim, Sunggil;Choi, Yeonok;Park, Young-doo;Kim, Sung Uk;Sung, Soon-Kee
    • Plant Biotechnology Reports
    • /
    • v.1 no.1
    • /
    • pp.19-25
    • /
    • 2007
  • To develop an efficient screening method for detection of the transgene in Chinese cabbage (Brassica rapa spp. pekinensis) utilizing Basta spray, optimal conditions for Basta application were examined in this study. Two transgenic Chinese cabbage lines were obtained through Agrobacterium-mediated transformation and used as transgenic positive controls in the Basta screening experiment. Differential concentrations of glufosinate-ammonium were sprayed into three different growth stages of 12 commercial Chinese cabbage cultivars. The results showed that no plants could survive higher than 0.05% glufosinate-ammonium, and plants at the 2-3 leaf stage were most vulnerable to glufosinate-ammonium. On the other hand, no damage was observed in the transgenic control plants. Reliability of the Basta spray method was proven by showing perfect co-segregation of the tolerance to glufosinate-ammonium and the presence of the bar gene in T1 segregating populations of the transgenic lines, as revealed by both PCR and Southern blot analyses. Using the developed Basta screening method, we tried to investigate the transgene flow through pollen dispersal, but failed to detect any transgene-containing non-transgenic Chinese cabbages whose parents had been planted adjacent to transgenic Chinese cabbages in field conditions. However, the transgene was successfully detected using Basta spray from the non-transgenic plants bearing the transgene introduced by hand-pollination. Since the Basta spray method developed in this study is easy to apply and economical, it will be a valuable tool for understanding the mechanism of gene flow through pollen transfer and for establishing a biosafety test protocol for genetically modified (GM) Chinese cabbage cultivars.

Phase Jitter Analysis of Overlapped Signals for All-to-All TWSTFT Operation

  • Juhyun Lee;Ju-Ik Oh;Joon Hyo Rhee;Gyeong Won Choi;Young Kyu Lee;Jong Koo Lee;Sung-hoon Yang
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.3
    • /
    • pp.245-255
    • /
    • 2023
  • Time comparison techniques are necessary for generating and keeping Coordinated Universal Time (UTC) and distributing standard time clocks. Global Navigation Satellite System (GNSS) Common View, GNSS All-in-View, Two-Way Satellite Time and Frequency Transfer (TWSTFT), Very Long Baseline Interferometry (VLBI), optical fiber, and Network Time Protocol (NTP) based methods have been used for time comparison. In these methods, GNSS based time comparison techniques are widely used for time synchronization in critical national infrastructures and in common areas of application such as finance, military, and wireless communication. However, GNSS-based time comparison techniques are vulnerable to jamming or interference environments and it is difficult to respond to GNSS signal disconnection according to the international situation. In response, in this paper, Code-Division Multiple Access (CDMA) based All-to-All TWSTFT operation method is proposed. A software-based simulation platform also was designed for performance analysis in multi-TWSTFT signal environments. Furthermore, code and carrier measurement jitters were calculated in multi-signal environments using the designed simulation platform. By using the technique proposed in this paper, it is anticipated that the TWSTFT-based time comparison method will be used in various fields and satisfy high-performance requirements such as those of a GNSS master station and power plant network reference station.

Design and Implementation of e2eECC for Automotive On-Chip Bus Data Integrity (차량용 온칩 버스의 데이터 무결성을 위한 종단간 에러 정정 코드(e2eECC)의 설계 및 구현)

  • Eunbae Gil;Chan Park;Juho Kim;Joonho Chung;Joosock Lee;Seongsoo Lee
    • Journal of IKEEE
    • /
    • v.28 no.1
    • /
    • pp.116-122
    • /
    • 2024
  • AMBA AHB-Lite bus is widely used in on-chip bus protocol for low-power and cost-effective SoC. However, it lacks built-in error detection and correction for end-to-end data integrity. This can lead to data corruption and system instability, particularly in harsh environments like automotive applications. To mitigate this problem, this paper proposes the application of SEC-DED (Single Error Correction-Double Error Detection) to AMBA AHB-Lite bus. It aims not only to detect errors in real-time but also to correct them, thereby enhancing end-to-end data integrity. Simulation results demonstrate real-time error detection and correction when errors occur, which bolsters end-to-end data integrity of automotive on-chip bus.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

Group Key Assignment Scheme based on Secret Sharing Scheme for Dynamic Swarm Unmanned Systems (동적 군집 무인체계를 위한 비밀분산법 기반의 그룹키 할당 기법)

  • Jongkwan Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.93-100
    • /
    • 2023
  • This paper presents a novel approach for assigning group keys within a dynamic swarm unmanned system environment. In this environment, multiple groups of unmanned systems have the flexibility to merge into a single group or a single unmanned system group can be subdivided into multiple groups. The proposed protocol encompasses two key steps: group key generation and sharing. The responsibility of generating the group key rests solely with the leader node of the group. The group's leader node employs a secret sharing scheme to fragment the group key into multiple fragments, which are subsequently transmitted. Nodes that receive these fragments reconstruct a fresh group key by combining their self-generated secret fragment with the fragment obtained from the leader node. Subsequently, they validate the integrity of the derived group key by employing the hash function. The efficacy of the proposed technique is ascertained through an exhaustive assessment of its security and communication efficiency. This analysis affirms its potential for robust application in forthcoming swarm unmanned system operations scenarios characterized by frequent network group modifications.

Application of the Essential Uses Concept to Substances of Concern - PFAS, 6PPD and Benzene - (우려 화학물질에 대한 필수 용도 개념 적용 - PFAS, 6PPD, Benzene 중심으로 -)

  • Miran Jung;Hyunpyo Jeon;Sangheon Kim
    • Journal of Environmental Health Sciences
    • /
    • v.50 no.1
    • /
    • pp.54-65
    • /
    • 2024
  • Background: There is growing international recognition of the need for improvements to national chemical management systems for hazardous chemicals. The European Union has recently introduced the concept of 'essential uses' as a new approach to the management hazardous chemicals by limiting their uses. Objectives: This paper examines the concept of essential uses in chemical management and how to apply it through a case study of essential use. This approach is distinct from the current chemical management system, but seeks to improve its potential benefits by effectively restricting or gradually decreasing the use of hazardous substances. Methods: The concept of essential uses was introduced by reviewing the Montreal Protocol on Substances that Deplete the Ozone Layer, Cousins's three essentiality categories applied to PFAS, restriction options assessed in the PFAS restriction proposal under REACH, and the California Safer Consumer Products regulations prioritizing 6PPD in motor vehicle tires. Based on these essential uses concepts for PFAS and 6PPD, uses of benzene were classified in accordance with the essential uses approach for products using benzene in South Korea. Results: The essential use concept is able to manage the restriction and authorization of substances of concern through essential uses and non-essential uses and the feasible substitution of uses and substances. Conclusions: If the concept and methodology of essential uses are clearly established, they can be expected to shift the national chemical management paradigm from regulating substances to limiting uses under the existing substance management system.

Study for Automatic Exposure Control Technique (AEC) in SPECT/CT for Reducing Exposure Dose and Influencing Image Quality (SPECT/CT에서 자동노출제어(AEC)를 이용함으로써 얻어지는 영상의 질 평가와 피폭선량 감소에 관한 고찰)

  • Yoon, Seok-Hwan;Lee, Sung-Hwan;Cho, Seong-Wook;Kim, Jin-Eui
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.18 no.2
    • /
    • pp.33-38
    • /
    • 2014
  • Purpose Auto exposure control (AEC) in SPECT/CT automatically controls the exposure dose (mA) according to patient's shape and size. The aim of this study was to evaluate the effect of AEC in SPECT/CT on exposure dose reduction and image quality. Materials and Methods The model of SPECT/CT used in this study was Discovery 670 (GE, USA), Smart mA for AEC; and $^{99m}Tc$ as a radioisotope. To compare SPECT and CT images by CT exposure dose variation, we used a standard technique set at 80, 100, 120, 140 kVp, 10, 30, 50, 100, 150, 200, 250 mA, and AEC at 80, 100, 120, 140 kVp, 10-250 mA. To evaluate resolution and contrast of SPECT images, triple line phantom and flangeless Esser PET phantom were used. For CT images, noise and uniformity were checked by anthropomrphic chest phantom. For dose evaluation to find DLP value, anthropomorphic chest phantom was used and the CT protocol of torso was applied by standard technique (120 kVp, 100 mA) and AEC (120 kVp, 10-250 mA). Results When standard and AEC were applied, the resolutions at SPECT images with attenuation correction (AC) were the same as FWHM by center 3.65 mm, left 3.48 mm, right 3.61 mm. Contrasts of standard and AEC showed no significant difference: standard 53.5, 29.8, 22.5, 15.8, 6.0, AEC 53.5, 29.6, 22.4, 15.7, 6.1 In CT images, noise values at standard and AEC were 15.4 and 18.5 respectively. The application of AEC increases noise but the value of coefficient variation were 33.8, 24.9 respectively, obtaining uniform noise image. The values of DLP at standard and AEC were 426.78 and 352.09 each, which shows that the application of AEC decreases exposure dose more than standard by approximately 18%. Conclusion The results of our study show that there was no difference of AC in SPECT images based on the CT exposure dose variation at SPECT/CT images. It was found that the increased CT exposure dose leads to the improvement of CT image quality but also increases the exposure dose. Thus, the use of AEC in SPECT/CT contributes to obtaining equal AC SPECT images, and uniform noise in CT images while reducing exposure dose.

  • PDF

Research for Application of Interactive Data Broadcasting Service in DMB (DMB에서의 양방향 데어터방송 서비스도입에 관한 연구)

  • Kim, Jong-Geun;Choe, Seong-Jin;Lee, Seon-Hui
    • Broadcasting and Media Magazine
    • /
    • v.11 no.4
    • /
    • pp.104-117
    • /
    • 2006
  • In this Paper, we analyze the application of Interactive Data Broadcasting in DMB(Digital Multimedia Broadcasting) in the accordance with convergence of service and technology. With the acceleration of digital convergence in the Ubiquitous period substantial development of digital media technology and convergence of broadcasting and telecommunication industry are being witnessed. Consequently these results gave rise to newly combined-products such as DMB(Digital Multimedia Broadcasting), WCDMA(Wide-band code division multiple access), Wibro(Wireless Broadband Internet), IP-TV (Internet protocol TV) and HSDPA(High speed downlink packet access). The preparatory stage for the implementation of Interactive Data Broadcasting Service will be reached by the end of December, 2006. DMB is the first result of a successful convergence service between Broadcasting and Telecommunication in new media era. Multimedia technology and services are the core elements of DMB. The Data Broadcasting will not only offer various services of interactive information such News, Weather, Broadcasting Program etc, but also be linked with characteristic function of mobile phone such as calling and SMS(Short Message Service) via Return Channel.

The Understanding and Application of Noise Reduction Software in Static Images (정적 영상에서 Noise Reduction Software의 이해와 적용)

  • Lee, Hyung-Jin;Song, Ho-Jun;Seung, Jong-Min;Choi, Jin-Wook;Kim, Jin-Eui;Kim, Hyun-Joo
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.1
    • /
    • pp.54-60
    • /
    • 2010
  • Purpose: Nuclear medicine manufacturers provide various softwares which shorten imaging time using their own image processing techniques such as UlatraSPECT, ASTONISH, Flash3D, Evolution, and nSPEED. Seoul National University Hospital has introduced softwares from Siemens and Philips, but it was still hard to understand algorithm difference between those two softwares. Thus, the purpose of this study was to figure out the difference of two softwares in planar images and research the possibility of application to images produced with high energy isotopes. Materials and Methods: First, a phantom study was performed to understand the difference of softwares in static studies. Various amounts of count were acquired and the images were analyzed quantitatively after application of PIXON, Siemens and ASTONISH, Philips, respectively. Then, we applied them to some applicable static studies and searched for merits and demerits. And also, they have been applied to images produced with high energy isotopes. Finally, A blind test was conducted by nuclear medicine doctors except phantom images. Results: There was nearly no difference between pre and post processing image with PIXON for FWHM test using capillary source whereas ASTONISH was improved. But, both of standard deviation(SD) and variance were decreased for PIXON while ASTONISH was highly increased. And in background variability comparison test using IEC phantom, PIXON has been decreased over all while ASTONISH has shown to be somewhat increased. Contrast ratio in each spheres has also been increased for both methods. For image scale, window width has been increased for 4~5 times after processing with PIXON while ASTONISH showed nearly no difference. After phantom test analysis, ASTONISH seemed to be applicable for some studies which needs quantitative analysis or high contrast, and PIXON seemed to be applicable for insufficient counts studies or long time studies. Conclusion: Quantitative values used for usual analysis were generally improved after application of the two softwares, however it seems that it's hard to maintain the consistency for all of nuclear medicine studies because result images can not be the same due to the difference of algorithm characteristic rather than the difference of gamma cameras. And also, it's hard to expect high image quality with the time shortening method such as whole body scan. But it will be possible to apply to static studies considering the algorithm characteristic or we can expect a change of image quality through application to high energy isotope images.

  • PDF