• Title/Summary/Keyword: Envelope Protection

Search Result 26, Processing Time 0.028 seconds

Comparison of Annual Heating and Cooling Loads of Internally and Externally Insulated Apartment Buildings According to the Location of Thermal Mass (내, 외단열 공동주택의 축열체 위치 차이에 따른 동단위 연간 냉난방부하 비교평가)

  • Koo, Bo-Kyoung;Lee, Beung-In;Choi, Doo-Sung;Song, Seung-Yeong
    • Journal of the Korean Solar Energy Society
    • /
    • v.30 no.1
    • /
    • pp.42-49
    • /
    • 2010
  • The IIS(Internal Insulation System) is applied in most Korean apartment buildings which are the most common type of residential buildings. Consequently, there are many cases in which the layer of insulation is disconnected by the structural components at the wall-slab and wall-wall joints in the envelope. These joints become thermal bridges where the risk of heat loss increases. It is expected that the EIFS(External Insulation and Finish System) is the solution to this problem. In this study, annual heating and cooling loads of apartment buildings with IIS and EIFS were compared using Design Builder program in order to evaluate the thermal storage effect of EIFS where the concrete thermal mass is located inside of the insulation material. As results, the apartment building with EIFS could reduce annual heating and cooling loads by 2.4% and 4.1%, respectively.

Aircraft Digital Fly-By-Wire System Technology Development Trend (항공기 디지털 전자식 비행제어 시스템 기술 개발 동향)

  • Seong-Byeong Chae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.509-520
    • /
    • 2023
  • In this paper, the structure and the characteristics of the Fly-By-Wire system applied to the civil aircraft was described. The development trend of the redundant method of the flight control system, data communication system, control surface actuation system and the control laws implemented by the Fly-By-Wire system of the civil aircraft are discussed. The Fly-By-Wire system was first applied to the fighter and its inherent advantages lead to the advent of the Fly-By-Wire civil aircraft. Recently even the small jet aircraft shows the trend of adopting the Fly-By-Wire system. In the future, most of the aircraft are expected to be the Fly-By-Wire type.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Ginsenosides repair UVB-induced skin barrier damage in BALB/c hairless mice and HaCaT keratinocytes

  • Li, Zhenzhuo;Jiang, Rui;Wang, Manying;Zhai, Lu;Liu, Jianzeng;Xu, Xiaohao;Sun, Liwei;Zhao, Daqing
    • Journal of Ginseng Research
    • /
    • v.46 no.1
    • /
    • pp.115-125
    • /
    • 2022
  • Background: Ginsenosides (GS) have potential value as cosmetic additives for prevention of skin photoaging. However, their protective mechanisms against skin barrier damage and their active monomeric constituents are unknown. Methods: GS monomer types and their relative proportions were identified. A UVB-irradiated BALB/c hairless mouse model was used to assess protective effects of GS components on skin epidermal thickness and transepidermal water loss (TEWL). Skin barrier function, reflected by filaggrin (FLG), involucrin (IVL), claudin-1 (Cldn-1), and aquaporin 3 (AQP3) levels and MAPK phosphorylation patterns, were analyzed in UVB-irradiated hairless mice or HaCaT cells. Results: Total GS monomeric content detected by UPLC was 85.45% and was largely attributed to 17 main monomers that included Re (16.73%), Rd (13.36%), and Rg1 (13.38%). In hairless mice, GS ameliorated UVB-induced epidermal barrier dysfunction manifesting as increased epidermal thickness, increased TEWL, and decreased stratum corneum water content without weight change. Furthermore, GS treatment of UVB-irradiated mice restored protein expression levels and epidermal tissue distributions of FLG, IVL, Cldn-1, and AQP3, with consistent mRNA and protein expression results obtained in UVB-irradiated HaCaT cells (except for unchanging Cldn-1 expression). Mechanistically, GS inhibited JNK, p38, and ERK phosphorylation in UVB-irradiated HaCaT cells, with a mixture of Rg2, Rg3, Rk3, F2, Rd, and Rb3 providing the same protective MAPK pathway inhibition-associated upregulation of IVL and AQP3 expression as provided by intact GS treatment. Conclusion: GS protection against UVB-irradiated skin barrier damage depends on activities of six ginsenoside monomeric constituents that inhibit the MAPK signaling pathway.

Characterization of Mamestra brassicae Nucleopolyhedrovirus (MabrNPV)-K1 Isolated in Korea

  • Lee, Jae-Kyung;Shin, Tae-Young;Bae, Sung-Min;Choi, Jae-Bang;Oh, Jeong-Mi;Koo, Hyun-Na;Kim, Ju-Il;Kwon, Min;Woo, Soo-Dong
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.17 no.1
    • /
    • pp.125-129
    • /
    • 2008
  • The purpose of this study was to investigate the characteristics of Mamestra brassicae nucleopolyhedrovirus (MabrNPV)-K1 isolated in Korea. Polyhedra of MabrNPV-K1 showed irregular appearance in shape with the average diameter $1.8{\mu}m$. MabrNPV-K1 contained a number of nucleocapsids within a viral envelope embedded in polyhedron. The polyhedrin of MabrNPV-K1 was composed of single polypeptide with a M.W. of approximate 31 kDa which is identical to the commercialized MabrNPV, Mamestrin, as a biological control agent. The nucleotide and amino acid sequences within the coding region of MabrNPV-K1 polyhedrin shared 99.0% similarity with the polyhedrin gene from previous reported MabrNPVs. The median lethal concentrations ($LC_{50}$) of MabrNPV-K1 and Mamestrin to M. brassicae larvae were $3.9{\times}10^3$ PIBs/larva and $6.0{\times}10^4$ PIBs/larva, respectively. Mortality of the MabrNPV-K1 against to the third instars larvae was 15 times higher than that of the Mamestrin. The median lethal times ($LT_{50})$ of MabrNPV-K1 by the concentration of polyhedra were lower ($4.4{\sim}6.1$ days) than those of Mamestrin ($4.1{\sim}8.6$ days). These results suggest that a local strain MabrNPV-K1 has high pathogenicity to M. brassicae and may be useful for the development of biological control agent to control this.

The Epitope Recognized by Monoclonal Antibody 2B6 in the B/C Domains of Classical Swine Fever Virus Glycoprotein E2 Affects Viral Binding to Hyperimmune Sera and Replication

  • Tong, Chao;Chen, Ning;Liao, Xun;Xie, Wenqi;Li, Dejiang;Li, Xiaoliang;Fang, Weihuan
    • Journal of Microbiology and Biotechnology
    • /
    • v.25 no.4
    • /
    • pp.537-546
    • /
    • 2015
  • Classical swine fever (CSF) is a highly contagious disease of pigs caused by CSF virus (CSFV). E2 is the major viral envelope protein of immune dominance that induces neutralizing antibodies and confers protection against CSFV infection. The B/C domains of E2 are variable among CSFV isolates, which could affect immunogenicity and binding to antibodies. We attempted to characterize the epitope recognized by a monoclonal antibody 2B6 (mAb-2B6) raised against the E2 B/C domains of the vaccine C-strain and to examine if mutations in the epitope region would affect antibody binding and viral neutralization. The epitope specific for mAb-2B6 recognition is linear, spanning five residues 774DGXNP778 in the B/C domains. The residue N777 is indispensable for the specificity. The epitope exists only in group 1 strains, but not in those of group 2. The recombinant viruses containing individual mutations on the epitope region lost the reactivity to mAb-2B6. The mutant virus RecC-N777S had low replication potential, about 10-fold decrease in the yield of progeny virus particles, whereas the mutant virus RecC-P778A reverted to proline upon continuous passaging. The mutations on the mAb-2B6 epitope region did not affect neutralization by anti-C-strain polyclonal sera from pigs. Deletion from aa774 covering the mAb-2B6 epitope, but not that from aa781, also affected binding with the polyclonal antibodies from vaccinated pigs, although the major binding region for the vaccinated antibodies is aa690-773.