• Title/Summary/Keyword: Defense Standard

Search Result 381, Processing Time 0.028 seconds

Effect of Chlorella vulgaris on Immune-enhancement and Cytokine Production in vivo and in vitro

  • An, Hyo-Jin;Rim, Hong-Kun;Lee, Jong-Hyun;Seo, Min-Jun;Hong, Jin-Woo;Kim, Na-Hyung;Myung, Noh-Yil;Moon, Phil-Dong;Choi, In-Young;Na, Ho-Jeong;Kim, Su-Jin;Jeong, Hyun-Ja;Park, Hyeung-Suk;Han, Jae-Gab;Um, Jae-Young;Hong, Seung-Heon;Kim, Hyung-Min
    • Food Science and Biotechnology
    • /
    • v.17 no.5
    • /
    • pp.953-958
    • /
    • 2008
  • The object of this study was to investigate the immune-enhancing effects of Chlorella vulgaris (CV) on a deteriorated immune function by a protein-energy malnutrition (PEM) diet. Unicellular algae, CV were used as a biological response modifier. Male C57BL/6J mice were fed for 15 days with standard diet or a PEM diet, which is associated with decreased host immune defense. After 8 days, mice in the PEM diet group were orally administered by 0.05, 0.1, and 0.15 g/kg body weight of CV or distilled water. Nutritional parameters, and interferon (IFN)-$\gamma$ levels were significantly increased in the blood serum of the CV (0.15 g/kg)-treated group (29.6$\pm$2.8 pg/mL) compared to the non-treated PEM group (4.1$\pm$0.4 pg/mL, p<0.05). In addition, cell proliferation and production of cytokines were investigated via a CV (0.01, 0.1, and 1 mg/mL) treatment using a human T cell line MOLT-4 cell. The CV treatment (1 mg/mL) significantly increased the production of both IFN-$\gamma$ and interleukin (IL)-2 (51.3$\pm$3.4 and 285.9$\pm$18.8 pg/mL, respectively) compared to the control (51.3$\pm$3.4 and 442.6$\pm$14.3 pg/mL, respectively), but did not affect the production of IL-4. These results suggest that CV may be useful in improving the immune function.

Robust Image Fusion Using Stationary Wavelet Transform (정상 웨이블렛 변환을 이용한 로버스트 영상 융합)

  • Kim, Hee-Hoon;Kang, Seung-Hyo;Park, Jea-Hyun;Ha, Hyun-Ho;Lim, Jin-Soo;Lim, Dong-Hoon
    • The Korean Journal of Applied Statistics
    • /
    • v.24 no.6
    • /
    • pp.1181-1196
    • /
    • 2011
  • Image fusion is the process of combining information from two or more source images of a scene into a single composite image with application to many fields, such as remote sensing, computer vision, robotics, medical imaging and defense. The most common wavelet-based fusion is discrete wavelet transform fusion in which the high frequency sub-bands and low frequency sub-bands are combined on activity measures of local windows such standard deviation and mean, respectively. However, discrete wavelet transform is not translation-invariant and it often yields block artifacts in a fused image. In this paper, we propose a robust image fusion based on the stationary wavelet transform to overcome the drawback of discrete wavelet transform. We use the activity measure of interquartile range as the robust estimator of variance in high frequency sub-bands and combine the low frequency sub-band based on the interquartile range information present in the high frequency sub-bands. We evaluate our proposed method quantitatively and qualitatively for image fusion, and compare it to some existing fusion methods. Experimental results indicate that the proposed method is more effective and can provide satisfactory fusion results.

Estimation of Human Lower-Extremity Muscle Force Under Uncertainty While Rising from a Chair (의자에서 일어서는 동작 시 불확실성을 고려한 인체 하지부 근력 해석)

  • Jo, Young Nam;Kang, Moon Jeong;Chae, Je Wook;Yoo, Hong Hee
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.10
    • /
    • pp.1147-1155
    • /
    • 2014
  • Biomechanical models are often used to predict muscle and joint forces in the human body. For estimation of muscle forces, the body and muscle properties have to be known. However, these properties are difficult to measure and differ from person to person. Therefore, it is necessary to predict the change in muscle forces depending on the body and muscle properties. The objective of the present study is to develop a numerical procedure for estimating the muscle forces in the human lower extremity under uncertainty of body and muscle properties during rising motion from a seated position. The human lower extremity is idealized as a multibody system in which eight Hill-type muscle force models are employed. Each model has four degrees of freedom and is constrained in the sagittal plane. The eight muscle forces are determined by minimizing the metabolic energy consumption during the rising motion. Uncertainty analysis is performed using a first-order reliability method. The one-standard-deviation range of agonistic muscle forces is calculated to be about 150-300 N.

A Study of Job Analysis Method using Information Systems (정보체계를 활용한 직무분석 방안 연구)

  • Hwang, Ho-ryang
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.10
    • /
    • pp.521-531
    • /
    • 2016
  • In this paper, since most business process of D-agency is being performed through some information systems, including Onnara System is a government standard operating management system, computerized accumulated in the system documentation based on, even if there is no independent job analysis system, in a judgment that can be can be tissue diagnosis, it presented a job analysis plan that leverages the existing information system. Most material is passed online in business processing between departments and between colleagues, it is returned. In situations where most information systems for such business processing is built developed, grasp the work procedures and information systems D-agency data accumulated to derive the necessary elements for job analysis quantified, and verified the validity of the element in the regression statistics.In addition, classification system (BRM, Business Reference Model) of the existing functionality that is available only Onnara System, and to establish a job analysis architecture to be able to function diagnostic departments to leverage common also in other information systems, related implement illustrating additional features of the information system, to derive a department duties value calculation formula with it, and present various job analysis plan that can actually be utilized to diagnose and derived elements department appropriate personnel.

Implementation Of DDoS Botnet Detection System On Local Area Network (근거리 통신망에서의 DDoS 봇넷 탐지 시스템 구현)

  • Huh, Jun-Ho;Hong, Myeong-Ho;Lee, JeongMin;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.6
    • /
    • pp.678-688
    • /
    • 2013
  • Different Different from a single attack, in DDoS Attacks, the botnets that are distributed on network initiate attacks against the target server simultaneously. In such cases, it is difficult to take an action while denying the access of packets that are regarded as DDoS since normal user's convenience should also be considered at the target server. Taking these considerations into account, the DDoS botnet detection system that can reduce the strain on the target server by detecting DDoS attacks on each user network basis, and then lets the network administrator to take actions that reduce overall scale of botnets, has been implemented in this study. The DDoS botnet detection system proposed by this study implemented the program which detects attacks based on the database composed of faults and abnormalities collected through analyzation of hourly attack traffics. The presence of attack was then determined using the threshold of current traffic calculated with the standard deviation and the mean number of packets. By converting botnet-based detection method centering around the servers that become the targets of attacks to the network based detection, it was possible to contemplate aggressive defense concept against DDoS attacks. With such measure, the network administrator can cut large scale traffics of which could be referred as the differences between DDoS and DoS attacks, in advance mitigating the scale of botnets. Furthermore, we expect to have an effect that can considerably reduce the strain imposed on the target servers and the network loads of routers in WAN communications if the traffic attacks can be blocked beforehand in the network communications under the router equipment level.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

The DEVS-based Detailed Implementation Method of the Command and Fire Control System for the Underwater Vehicle DEVS-HLA Simulation in the Engagement Level (교전급 수중운동체 DEVS-HLA 시뮬레이션을 위한 전술통제체계의 DEVS 기반 상세 구현 방법)

  • Son, Myeong-Jo;Cha, Ju-Hwan;Kim, Tae-Wan;Lee, Kyu-Yeul;Nah, Young-In
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.4
    • /
    • pp.628-645
    • /
    • 2010
  • To perform the engagement level simulation between the underwater vehicle model and the surface model those are constituted with various systems/ sub-systems, we implemented four different federates as a federation according to the IEEE 1516 HLA (High Level Architecture) protocol that is the international standard in the distributed simulation. Those are CFCS (Command and Fire Control System) federate, motion federate, external entities (torpedos, countermeasure and surfaceship) federate, and visualization federate that interacts with OSG (Open Scene Graph)-based visualization rendering module. In this paper, we present the detailed method about the model constitution for discrete event simulation in the distributed environment. For the sake of this purpose, we introduce the DEVS (Discrete Event System Specification)-HLA-based modeling method of the CFCS federate that reflects not only the interations between models, but also commands from user and tactics manager that is separated from the model. The CFCS federate makes decisions in various missions such as the normal diving, the barrier misision, the target motion analysis, the torpedo launch, and the torpedo evasion. In the perspective of DEVS modeling, the CFCS federate is the coupled model that has the tactical data process model, command model and fire control model as an atomic model. The message passing and time synchronization with other three federates are settled by the $m\ddot{a}k$ RTI (Runtime Infrastructure) that supports IEEE 1516. In this paper, we provides the detailed modeling method of the complicated model that has hierarchical relationship such as the CFCS system in the submarine and that satisfies both of DEVS modeling method for the discrete event simulation and HLA modeling method for the distributed simulation.

Application for Fire Protection Regulation based on Risk-Informed and Performance-Based Analysis (위험도 및 성능기반 분석방법에 의한 원전 화재방호규정 적용 방안)

  • Jee, Moon-Hak;Lee, Byung-Kon
    • Fire Science and Engineering
    • /
    • v.20 no.3 s.63
    • /
    • pp.65-70
    • /
    • 2006
  • From the beginning of the construction stage, the fire protection regulation for the nuclear power plants conforms to the design requirements for the acquisition of the license permit. This regulation is based on the plant status of the normal operation, but it is not enough to be used as an application standard for fire protection at the transient mode of the plant and the outage time for refueling as well as for the plant decommissioning. While the advanced fire protection requirement that has been developed in America recently suggests the performance-based requirement and management rule applicable to the overall life time of the plant, it simply represents the conceptual application. It means that it can not be treated as appropriate standards because it does not deal with the qualitative and quantitative approach in specific ways. By the way, with the use of the performance-based fire risk analysis, the dynamic behavior of the heat and smoke at the fire compartment of the nuclear power plants can be analyzed and the thermal effect to the safety-related equipment and cables can be evaluated as well. At this paper, it suggests the ways to change the applicable fire protection regulations and the required evaluation items for the fire risk resulted from the plant configuration change with an intent to introduce the state-of-the-art quantitative fire risk analysis technology at the domestic nuclear power plants.

An Experimental Study on the Development of Electromagnetic Shielding Concrete Wall for Shielding High-altitude Electromagnetic Pulse (HEMP) (고고도 전자기파(HEMP)차폐를 위한 전자파 차폐 콘크리트 벽체 개발에 관한 실험적 연구)

  • Choi, Hyun-Jun;Kim, Hyung-Chul;Lim, Sang-Woo;Lee, Han-Seung
    • Journal of the Korea Concrete Institute
    • /
    • v.29 no.2
    • /
    • pp.169-177
    • /
    • 2017
  • Rather than causing damage from heat, blast, and radiation of a regular nuclear weapon, recently, it is predicted that North Korea has been inventing high altitude electromagnetic pulse (HEMP) missile in order to incapacitate electronic equipment. HEMP shielding facility is used for military purpose today. Despite the electromagnetic shielding effects from high quality compression plates, problems may include such as the possibility of electromagnetic influx resulting in the welding of the compression plates, and difficulties and high cost of construction. Therefore, in this study, a high electrical conducting material was added to the concrete experimental subject to ensure the shielding effect through electromagnetic waves to for the concrete structure, instead of building a shielding facility separately for the structure. Also, among the experimental subjects, 100 ${\mu}m$ of Iron-Aluminum alloy metal spraying coat was applied to two types with the highest shielding effect, and to two types with the lowest shielding effect. The result of the experiment indicates that experimental subjects added with a high electrical conductivity material did not meet the minimum shielding criteria of MIL-STD-118-125-1 standard, but all the experimental material applied to the metal spraying coating satisfied the minimum shielding criteria. In conclusion, it is considered that 100 µm of Iron-Aluminum alloy metal spraying coat contains high efficiency in the HEMP shielding.

Experimental Assessment of Bolted Single Lap Joint Strength for Laminates in Advanced Composite Materials (첨단복합재료 적층판의 볼트단일접합 강도 시험적 평가)

  • Lee, Myoung Keon;Lee, Jeong Won;Yoon, Dong Hyun;Kim, Jae Hoon
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.10
    • /
    • pp.983-989
    • /
    • 2017
  • This paper presents the bearing strength for laminates in advanced composite materials in bolted joints. Bolted single lap joint tests were experimentally investigated with respect to stabilized and unstabilized lap joints. Stabilized bolted single lap joints refer to joints with out-of-plane rotational constraints. Unstabilized bolted single lap joints refer to joints with absence of out-of-plane deflection constraints. The bearing strength values of laminates in the bolted joint showed that the percentages of ply angle for 0, 45, -45, and 90 degrees were not affected. The bearing strength value in the unstabilized bolted joint was smaller than the bearing strength value in the stabilized bolted joint because of the influence of the out-of-plane behavior. The composite material studied in this paper is a carbon/epoxy unidirectional (UD) tape prepreg cured at $177^{\circ}C(350^{\circ}F)$. In the laminate reference system, the standard angles of 0, 45, -45, and 90 degrees were used for ply orientation within the laminate. A total of 112 bolted single lap joint tests were conducted on specimens from eight distinct laminates. The ASTM-D-5961M standards were adhered to for the stabilized and unstabilized bolted single lap joint tests.