• Title/Summary/Keyword: C2 공격

Search Result 172, Processing Time 0.038 seconds

Studies on the Quaternization of Tertiary Amines (Ⅱ). Kinetics and Mechanism for the Reaction of Substituted Phenacyl Bromides with Substituted Pyridines (3차 아민의 4차화반응에 관한 연구 (제2보). 치환 브롬화페나실류와 치환 피리딘류와의 반응에 관한 반응속도론적 연구)

  • Yoh Soo Dong;Kwang Taik Shim;Lee Kyung A
    • Journal of the Korean Chemical Society
    • /
    • v.25 no.2
    • /
    • pp.110-118
    • /
    • 1981
  • Kinetics and mechanism for the reaction of substituted phenacyl bromides with substituted pyridines have been determined at 25, 35 and $45^{\circ}C$ in methanol and dimethylformamide by the conductivity method. The rate constants for the reaction of various pyridines with phenacyl bromide shown that electron-donating substituents in the pyridine increase the rate, while electron-attracting one decrease in both solvents. The effect of substituents in substrate, the rate being increased by electron-attracting substituents. This is as expected for nucleophilic attack of amines on the carbon atom. Isokinetic and $Br{\psi}nsted$ linear relationship were shown in the reaction of phenacyl bromide with pyridines in both solvent in which isokinetic temperature were obtained 614, $202^{\circ}K$ and ${\beta}$ values were 0.29, 0.36 in methanol and dimethylformamide respectively. In the case of the reaction of substituted phenacyl bromide with pyridines, isokinetic temperature decreases with increasing electron-attracting ability of the substituents in the phenacyl bromide, while the ${\beta}$ values were reverse. From the above results, it can be inferred that N…C bond formation decreases progressively from p-chloro- to p-methoxyphenacyl bromide and the bond formation predominates in DMF than methanol. The ${\rho}$ values of Hammett equation of the reaction of phenacyl bromide with substituted pyridines are negative in both solvent, but its value was larger negative in DMF than methanol and the ${\rho}$ value of that of substitutted substrates with pyridine was 0.3, the low value is ascribed to direct $S_N2$ attack of the nitrogen atom in pyridine ring at the methylene carbon.

  • PDF

Role of Phospholipase $A_2$ on lipid peroxidation (과산화지질 형성에 있어서 Phospholipase $A_2$의 역할)

  • 황화신;정규찬;장현옥
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 1994.04a
    • /
    • pp.341-341
    • /
    • 1994
  • 생체막의 주요 구성성분인 인지질의 2번 위치에 결합한 불포화지방산은 각종 전이금속이나 각종 활성산소들의 공격을 쉽게 받아 지질과산화반응이 일어나서 생체에 유독한 화합물을 생성하게 된다. 생체는 이러한 기구의 해독을 위하여 크게 2가지 방어기전을 갖고 있다. 즉 Vitamin- C, $\alpha$-tocopherol, flavonoid, SOD, catalase 등과 같이 생성된 활성산소를 제거시키는 기구와. 활성산소에 의해 생성된 과산화물을 제거시키는 기구로 glutathione peroxidase (GPX)가 알려졌으며 GPX에 의해 독성이 낮은 수산화물까지 환원시키는 기구가 보고되었다. 그러나 인지질의 과산화물 그대로는 GPX의 기질이 쥘수 없으므로, 산화된 지방산을 절단하는 효소에 대한 기구의 해석이 요구되고 있다. 최근 여러질병에 관련되어 있는 인지질 2번위치의 지방산을 분해하는 phospholipase $A_2$ (PLA$_2$)가 과산화지질의 분해에 관여한다는 주장이 제기되었다. 따라서 본 연구에서는 rat liver microsome에 $CCl_4$투여로 일어나는 과산화반응에 있어서 PLA$_2$의 역할을 규명하기 위하여 본 실험을 행하였다.

  • PDF

A Study on DNS sinkhole operation using DNS Response Policy Zone (DNS Response Policy Zone 을 이용한 DNS 싱크홀 운영 방안 연구)

  • Chio, Jae-Young;Oh, Sang-Seok;Min, Sung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1528-1531
    • /
    • 2011
  • 최근 악성봇은 해커에 의해 원격 조정되어 명령에 의해 스팸메일 발송, DDoS 공격 등의 악성행위를 수행하는 웜/바이러스이다[2]. 악성봇은 이전의 웜/바이러스와 달리 금전적인 이득을 목적으로 하는 것이 많아 작게는 일상생활의 불편함으로부터 크게는 사회적, 국가적으로 악영향을 주고 있다. 국내에서는 이러한 위험을 방어하기 위한 효과적인 대응 방법으로 DNS 싱크홀을 운영 하고 있다. 본 논문에서는 DNS 싱크홀 운영 중 수집한 봇 명령/제어 (Command and Control, C&C) 도메인을 Internet Service Provider (ISP) DNS 싱크홀 시스템에 적용하는 과정에서 나타나는 문제점을 효과적으로 해결 하기 위한 DNS Response Policy Zone(RPZ)을 이용한 DNS 싱크홀 운영 방안을 제시 하였다.

Biosynthesis of (R)-phenyl-1,2-ethanediol by using Single Recombinant Epoxide Hydrolase from Caulobacter Crescentus (재조합 epoxide hydrolase를 단일 생촉매로 사용한 광학수렴 가수분해반응을 통한 광학활성 (R)-phenyl-1,2-ethanediol 생합성)

  • Lee, Ok Kyung;Lee, Eun Yeol
    • Applied Chemistry for Engineering
    • /
    • v.18 no.3
    • /
    • pp.279-283
    • /
    • 2007
  • Epoxide hydrolase (EH) gene of Caulobacter crescentus was cloned by PCR and expressed in Escherichia coli. The C. crescentus EH (CcEH) primarily attacked at the benzylic carbon of (S)-styrene oxide, while the CcEH preferentially attacked at the terminal carbon of (R)-styrene oxide, thus leading to the formation of (R)-phenyl-1,2-ethanediol as the main product. (R)-phenyl-1,2-ethanediol was obtained with 85% enantiomeric excess and yield of 69% from racemic styrene oxide via enantioconvergent hydrolysis by using recombinant CcEH as the single biocatalyst.

Hardware Design of Elliptic Curve processor Resistant against Simple Power Analysis Attack (단순 전력분석 공격에 대처하는 타원곡선 암호프로세서의 하드웨어 설계)

  • Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.143-152
    • /
    • 2012
  • In this paper hardware implementation of GF($2^{191}$) elliptic curve cryptographic coprocessor which supports 7 operations such as scalar multiplication(kP), Menezes-Vanstone(MV) elliptic curve cipher/decipher algorithms, point addition(P+Q), point doubling(2P), finite-field multiplication/division is described. To meet structure resistant against simple power analysis, the ECC processor adopts the Montgomery scalar multiplication scheme which main loop operation consists of the key-independent operations. It has operational characteristics that arithmetic units, such GF_ALU, GF_MUL, and GF_DIV, which have 1, (m/8), and (m-1) fixed operation cycles in GF($2^m$), respectively, can be executed in parallel. The processor has about 68,000 gates and its simulated worst case delay time is about 7.8 ns under 0.35um CMOS technology. Because it has about 320 kbps cipher and 640 kbps rate and supports 7 finite-field operations, it can be efficiently applied to the various cryptographic and communication applications.

Effect of Temperature on Electrochemical Degradation of Membrane in PEMFC (PEMFC 고분자 막의 전기화학적 열화에 미치는 온도의 영향)

  • Lee, Ho;Kim, Taehee;Son, Ik Jae;Lee, Jong Hyun;Lim, Tae Won;Park, Kwonpil
    • Korean Chemical Engineering Research
    • /
    • v.47 no.4
    • /
    • pp.441-445
    • /
    • 2009
  • Effect of temperature on membrane degradation in PEMFCs was studied. After cell operation at different temperatures($60{\sim}90^{\circ}C$) under accelerating degradation conditions(OCV, anode dry, cathode RH 65%) for 144 h, cell performance decreased from 12 to 35%. The results of FER in effluent water showed that this decrease in cell performance was caused by membrane degradation by the attack of $H_2O_2$ or oxygen radicals(${\cdot}OH$, $HO_2{\cdot}$) and that resulted in increase in gas crossover for radical formation. Radical formation on the electrode was confirmed by ESR. Activation energy of 66.2 kJ/mol was obtained by Arrhenius plot used to analyze the effect of temperature on membrane degradation. Increase of cell temperature enhanced gas crossover rate, radical formation rate and membrane degradation rate.

Improvement Method for Message Processing Speed of ADC2A System (방공지휘통제경보체계 메시지처리속도 향상 방안)

  • Lee, Jeong-min;Lim, Won-gi;Park, Seung-jin;Choi, June-sung
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.349-356
    • /
    • 2015
  • Air Defense Command Control and Alert(ADC2A) system is a system that ensures simultaneity and integrity of air defense operations by combining sensors, weapons and Command and Control(C2) systems over a tactical network to protect forces, facilities and strategic points from enemy's air attack. Improving message processing speed is a very important factor for ADC2A, because it uses high frequency bit-processing of the Army standard KVMF message to communicate with internal and external systems. In this paper we proposed improved method of KVMF message processing for ADC2A system.

Methodology of Immediate Close Air Support(CAS) Sortie Distribution (긴급 근접항공지원작전 전력 분배 방법)

  • Jang, Yongjin;Lee, Taegong;Kim, Youngdong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1050-1067
    • /
    • 2014
  • CAS(Close Air Support) is aircraft attack against hostile targets that are in close proximity to friendly forces. Immediate CAS is the mission that attack unplanned targets, and especially the distribution of suitable aircraft assets makes huge effect on the result of immediate CAS mission. But It is hard to find a previous studies on immediate CAS sortie distribution with aircraft suitability. This study suggests a methodology with aircraft suitability for immediate CAS sortie distribution. The methodology consists of 3 steps. Firstly, we analyze target information for situational awareness. Secondly, we calculate each aircraft's suitability value per each target based on the result of previous analysis. Lastly, we suggest immediate CAS sortie distribution based on the aircraft adoptability value to a decision maker. This methodology will provide not only quantitative analysis, but also decision making of immediate CAS sortie distribution more timely and effectively.

Unforgeable RFID Tag Variable ID Scheme with Efficient Identification (효율적인 식별 기능을 가진 위조 불가 RFID Tag 가변 ID 방식)

  • Choi, Jae-Gwi;Park, Ji-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.447-454
    • /
    • 2004
  • This paper proposes unforgeable RFID variable n scheme with efficient identification. The existing schemes on privacy protection are in efficient because a server should execute identification process with all Tag ID's Information in order to identify a certain Tag. Moreover these schemes have the serious problem that an attacker can forge special tags if he can know tag's secret information stored in the server's database. Our scheme Is required only 2 times exponent computation to identify a tag. The proposed scheme is also secure against leakage of tags information stored in a database, because an attacker cannot forge special tag even if he knows secret information of the server(database).

Study on the way of Institutionalized Budget for Information Security (정보보호 강화를 위한 예산편성 제도화 방안 연구)

  • Kim, So-Jeong;Choi, Seok-Jin;Lee, Cheol-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.115-122
    • /
    • 2007
  • US is strengthening the information security by managing federal agency's information and information system systematically. For this purpose. US government put the Federal Information Security Management Act into the E Government Act of 2002. According to the FISMA, it is required to have information securitv management plan for all federal agencies. In addition that, OMB Circular A II requires all federal agencies to identity the ratio of information security investment. That is the basis of strengthening the information security of federal agency, This paper will compare the budget status and information security mechanism of Korea and US.