• Title/Summary/Keyword: CERT

Search Result 65, Processing Time 0.025 seconds

Suggestion of New Rock Classification Method Using the Existing Classification Method (기존의 암반분류법의 조합에 의한 새로운 암반평가법의 제안)

  • SunWoo Choon;Jung Yong-Bok
    • Explosives and Blasting
    • /
    • v.24 no.1
    • /
    • pp.21-28
    • /
    • 2006
  • Rock mass classification systems such as RMR and Q system have been widely served as a simple empirical approach for the design of various rock mass structures in the stage of site survey as well as under the construction. For the RQD determination, the boring is partially carried out and what is more, the survey boring is not normally carried out under construction. Therefore RQD is frequently determined by empirical method or indirect method. Since it is difficult to determine the discontinuity characteristics such as RQD, spacing, persistence, filling and so on, it is essential to develop suitable and simple systems without drilled core and a cert 없 n number of representative parameters. One of the primary objectives of the classification systems for a practicing engineer has been to make it simple to use as a preliminary design tool for the structures in rock mass. In the present study, the modifications for both the RMR and GSI system are suggested by authors to introduce new classification system as well as to improve the scope of some of the existing classification systems for a practicing engineer.

Estrogenic and Antiestrogenic Insecticides in MCF7-BUS Cell Line (피레스로이드계 살충제의 MCF7-BUS세포에 대한 에스트로겐 및 항에스트로겐 효과)

  • 오승민;정규혁
    • YAKHAK HOEJI
    • /
    • v.45 no.6
    • /
    • pp.694-700
    • /
    • 2001
  • Synthetic pyrethroids are analysis of a natural chemical moiety, pyrethrin derived from the pyrethrum plant Chrysanthemum. The natural pyrethrin structure has been modified to be highly lipophilic and photostable, creating an effective pesticide and resulting in an increased presence in the environment. Worldwide, they are commonly used insecticides against ticks, mites, mosquitoes, and as treatment for human head lice and scabies. Therefore, human exposure to their compounds in extensive. Several studies on the effects of pyrethroids on thyroid hormone regulation, estrogen and androgen function have been reported and yet little has been done try assess their potential hormonal activities. Among humans, a pyrethroid compound was suggested to be the causal agent for gynecomastia in a group of Haitian men. The reports suggest that some pyrethroid compounds are capable of disrupting endocrine function. Therefore, we examined estrogenic/antiestrogenic potential of three pyrethroid insecticides, that is permethrin, allethrin and fenvalerate in human breast cancer cell and action mechanism mediated by the estrogen receptor. Fenvalerate showed weak estrogenic activity but aallethrin and permethrin showed no effect. In combination with high levels (10$^{-10}$ M, 10$^{-11}$ M) of 17$\beta$-estradiol and three synthetic pyrethroids inhibited cert proliferations in MCF7-BUS cell by 17$\beta$-estradiol. Whereas, fenvalerate increased cell proliferative activity at lower level of estradiol (10$^{-12}$ M, 10$^{-13}$ M). The relative affinities to the estrogen receptor were observed by allethrin and permethrin treatment, but not by fenvalerate. These results indicated that some of pyrethroid insecticides may modulate estrogen functions in human breast cancer cell. The action mechanisms of estrogen receptor mediated antiestrogenicity by allethrin and permethrin were postulated.

  • PDF

A Study on the Activation of Sharing Cyber-Threat Information among Businesses (기업의 사이버위협정보 공유 활성화에 관한 연구)

  • Seokeon Choe;Jongsub Lee;Geunsun Tak;Joowon Choi
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.4
    • /
    • pp.143-156
    • /
    • 2023
  • The domestic threat information sharing system to deal with various security threats in the rapidly changing cyber environment needs to be improved. In this study, to solve these problems and promote the activation of threat information sharing, we derive a research model based on the value-based containment model (VAM) for vital factors in information sharing. After conducting a Ricardian 5-point survey on a total of 204 individuals, the statistical results of the first 151 individuals were analyzed using SPSS and AMOS, and the statistical results of the second 204 individuals were analyzed using R-Studio. As a result, perceivability was found to have a significant impact as a core factor in the activation of cyber threat information sharing (β=0.405, p<0.01), and the hindrance factor was analyzed as innovation resistance (β=-0.152, p<0.01). Microscopically, the obtained results can be applied to factor analysis for activating information sharing of cyber threats by companies in the future, and macroscopically, they can contribute to the foundational development of a national cyber threat response system.

Evaluation of the Stress Corrosion Cracking Behavior of Inconel G00 Alloy by Acoustic Emission (음향 방출에 의한 인코넬 600 합금의 응력 부식 균열 거동 평가)

  • Sung, Key-Yong;Kim, In-Sup;Yoon, Young-Ku
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.16 no.3
    • /
    • pp.174-183
    • /
    • 1996
  • Acoustic emission(AE) response during stress corrosion cracking(SCC) of Inconel 600 alloy has been monitored to study the AE detectability of crack generation and growth by comparing the crack behavior with AE parameters processed, and to evaluate the applicability as a nondestructive evaluation(AE) by measuring the minimum crack size detectable with AE. Variously heat-treated specimens were tensioned by constant extension rate test(CERT) in various extension rate to give rise to the different SCC behavior of specimens. The AE amplitude level generated from intergranular stress-corrosion cracking(IGSCC) is higher than those from ductile fracture and mechanical deformation, which means the AE amplitude can be a significant parameter for distinguishing the An source. AE can also provide the effective means to identify the transition from the small crack initiation and formation of dominant cracks to the dominant crack growth. Minimum crack size detectable with AE is supposed to be approximately 200 to $400{\mu}m$ in length and below $100{\mu}m$ in depth. The test results show that AE technique has a capability for detecting the early stage of IGSCC growth and the potential for practical application as a NDE.

  • PDF

An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response (보안관제 효율성 제고를 위한 실증적 분석 기반 보안이벤트 자동검증 방법)

  • Kim, Kyu-Il;Park, Hark-Soo;Choi, Ji-Yeon;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.507-522
    • /
    • 2014
  • Domestic CERTs are carrying out monitoring and response against cyber attacks using security devices(e.g., IDS, TMS, etc) based on signatures. Particularly, in case of public and research institutes, about 30 security monitoring and response centers are being operated under National Cyber Security Center(NCSC) of National Intelligence Service(NIS). They are mainly using Threat Management System(TMS) for providing security monitoring and response service. Since TMS raises a large amount of security events and most of them are not related to real cyber attacks, security analyst who carries out the security monitoring and response suffers from analyzing all the TMS events and finding out real cyber attacks from them. Also, since the security monitoring and response tasks depend on security analyst's know-how, there is a fatal problem in that they tend to focus on analyzing specific security events, so that it is unable to analyze and respond unknown cyber attacks. Therefore, we propose automated verification method of security events based on their empirical analysis to improve performance of security monitoring and response.