• Title/Summary/Keyword: SHA

Search Result 382, Processing Time 0.025 seconds

A Study on Korean Man's Head Ornaments in the Joseon Dynasty - Focusing on Pungjam and Kwanja - (조선시대 남자(男子)의 수식(首飾) 연구(II) - 풍잠(風簪)과 관자(貫子)를 중심(中心)으로 -)

  • Chang, Sook-Whan
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.12 no.2
    • /
    • pp.1-20
    • /
    • 2010
  • This thesis is about "manggon" that holds down man's top knot hair and its accessaries "pungjam", "kwanja". manggon was seen first time in the mural of Donwhang kae won chon bo during T'ang period (713-756). The "Tu Aek Ra" manggon shown in this mural would be the origin and beginning of maggon's usage. Also the "Sha" that was placed on top of the hair for decoration purpose is believed to be a former form of "manggon" Before the short hair cut was enforced, wearing the "kwan"(head gear) was considered as an impotant etiguette. Thus the head gear was treasured and the manggon which was the most essential piece to cover down the hair before to put on the head gear was regarded as the most important piece. However, since the manggon was tied very tightly around the forehead, manggon caused some sickness. From my private collections of man's head gears and ornament, 121 items were selected and used for analysis and the followings were found: 1. Pungjam was divided into 8 categories according to its shape and a research was made on its unique structural characteristic on each categories. 2. Kwanja's material and design that were used are all in accordance to the historical recordings.

  • PDF

The cryptographic module design requirements of Flight Termination System for secure cryptogram delivery (안전한 보안명령 전달을 위한 비행종단시스템용 암호화 장치 설계 요구사항)

  • Hwang, Soosul;Kim, Myunghwan;Jung, Haeseung;Oh, Changyul;Ma, Keunsu
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.114-120
    • /
    • 2015
  • In this paper, we show the design requirements of the cryptographic module and its security algorithm designed to prevent the exposure of the command signal applied to Flight Termination System. The cryptographic module consists of two separate devices that are Command Insertion Device and Command Generation Device. The cryptographic module designed to meet the 3 principles(Confidentiality, Integrity and Availability) for the information security. AES-256 block encryption algorithm and SHA-256 Hash function were applied to the encrypted symmetric key encryption method. The proposed cryptographic module is expected to contribute to the security and reliability of the Flight Termination System for Space Launch Vehicle.

An Efficient Lookup Mechanism for Unstructured Peer-to-Peer Considering IP Distribution (ISP별 IP분포를 고려한 비구조적 Peer-to-Peer에서의 Lookup 기법)

  • 김홍일;신판섭
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.873-886
    • /
    • 2003
  • Lookup Is one of important factors for network traffic on peer-to-peer network. Especially, large amount of network resources are required for lookup process in p2p file sharing system that clients use the dynamic If and they import to p2p network in random. In this paper, we employ efficient lookup mechanism which searches lookup with the combined information of ISP key values and the extracted key values from SHA-1 hashing function for shared contents id. The proposed mechanism efficiently searches files on the network because the mechanism processes P2P lookup with consideration the routing information of ISP. We suggest the adapted simulation environment based upon the famous file sharing system of emule P2P and experiment the proposed system.

  • PDF

Solution Structure of a Prion Protein: Implications for Infectivity

  • He Liu;Jones, Shauna-Farr;Nikolai Ulyanov;Manuel Llinas;Susan Marqusee;Fred E. Cohen;Stanley B. Prusiner;Thomas L. James
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.2 no.2
    • /
    • pp.85-105
    • /
    • 1998
  • Prions cause neurodegenerative diseases in animals and humans. The scrapie prion protein (PrPSc) is the major-possibly only-component of the infectious prion and is generated from the cellular isoform (PrPC) by a conformational change. Limited proteolysis of PrPSc produces an polypeptide comprised primarily of residues 90 to 231, which retains infectivity. The three-dimensional structure of rPrP(90-231), a recombinant protein resembling PrPC with the Syrian hamster (SHa) sequence, was solved using multidimensional NMR. Low-resolution structures of rPrP(90-231), synthetic peptides up to 56 residues, a longer (29-231, full-length) protein with SHa sequence, and a short here further structure refinement of rPrP(90-231) and dynamic features of the protein. Consideration of these features in the context of published data suggests regions of conformational heterogeneity, structural elements involved in the PrPC\longrightarrowPrPSc transformation, and possible structural features related to a species barrier to transmission of prion diseases.

  • PDF

Effects of Rad51 on Survival of A549 Cells

  • Yu, Sha-Sha;Tu, Yi;Xu, Lin-Lin;Tao, Xue-Qin;Xu, Shan;Wang, Shan-Shan;Xiong, Yi-Feng;Mei, Jin-Hong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.1
    • /
    • pp.175-179
    • /
    • 2015
  • Rad51, a key factor in the homologous recombination pathway for the DNA double-strand break repair, plays a vital role in genesis of non-small-cell lung cancer (NSCLC). In recent years, more and more studies indicate that high expression of Rad51 is of great relevance to resistance of NSCLC to chemotherapeutic agents and ionizing radiation. However, the underlying molecular mechanisms are poorly understood. In this study, we investigated the role of single Rad51 on cell viability in vitro. Our results show that depletion of endogenous Rad51 is sufficient to inhibit the growth of the A549 lung cancer cell line, by accumulating cells in G1 phase and inducing cell death. We conclude that independent Rad51 expression is critical to the survival of A549 cells and can be an independent prognostic factor in NSCLC patients.

Radiation-induced Cochlea Hair Cell Death: Mechanisms and Protection

  • Tan, Pei-Xin;Du, Sha-Sha;Ren, Chen;Yao, Qi-Wei;Yuan, Ya-Wei
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.10
    • /
    • pp.5631-5635
    • /
    • 2013
  • Cochlea hair cell death is regarded to be responsible for the radiation-induced sensorineural hearing loss (SNHL), which is one of the principal complications of radiotherapy (RT) for head and neck cancers. In this mini-review, we focus on the current progresses trying to unravel mechanisms of radiation-induced hair cell death and find out possible protection. P53, reactive oxygen species (ROS) and c-Jun N-terminal kinase (JNK) pathways have been proposed as pivotal in the processes leading to radiation hair cell death. Potential protectants, such as amifostine, N-acetylcysteine (NAC) and epicatechin (EC), are claimed to be effective at reducing radiation-inducedhair cell death. The RT dosage, selection and application of concurrent chemotherapy should be pre-examined in order to minimize the damage to cochlea hair cells.

Investigation to Introduction of Apples on Chinese (능금무리(Apples)의 중국도내(中國渡來)에 관(關)한 고찰(考察))

  • Lee, Sung-Woo;Kim, Kwang-Soo;Lee, Kang-Ja
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.5 no.1
    • /
    • pp.53-59
    • /
    • 1976
  • Around 2nd century B. C. two varieties of apple, i. e. 'Nay' and 'Imgum' were already grown in China. It can be suspected that 'Nay' came from the West because of its popular word 'Pyn Por' and 'Imgum' was originated from North East Asia because of its word 'Lii Kiem'. After this time 'Imgum' was called as its popular name 'Sha Guoo' in about 15 th century. In 17th century a new variety of 'Nay' was named as 'Pyng Guoo' and this name was replaced with 'Nay' when the variety was widely supplied. In 19th century a better variety of 'Nay' was developed in the West and it was introduced into China in 20th century which was called 'Western Pyng Guoo'. As a result there were two kinds of 'Pyng Guoo', i. e. 'Chinese Pyng Guoo' and 'Western Pyng Guoo'. However, the 'Western Pyng Guoo' was more supplied and it was said 'Pyng Guoo' which was written as 'Pyng Guoo(?果)' or 'Pyng Guoo (平果)'. At present time apples were classified into 'Sha Guoo' and 'Pyng Guoo'. The old 'Nay' is now called 'Bin Tzyy' which is hardly found. From this study it is suspected that the history of Chinese apples were affected much on our introduction history and its naming.

  • PDF

A Study on Woman's Make-up and Adorment of Dang and Song Dynasty (당대와 송대의 여자면식에 관한 연구)

  • 이순자
    • Korean Journal of Rural Living Science
    • /
    • v.8 no.2
    • /
    • pp.93-110
    • /
    • 1997
  • The customs of women s riding horse was prevalent in thriving period. The face toilet was mainly used by Gau Chang pattern. Wha Jun (chinen; Hwa-Qun(화전), make-up on forehead), was influenced nearly by Gua Chang and distantly by India. Penciling eyebrows with blue was transmitted from persia. Chinese cosmetics was most influenced during Tang Dynasty for it's colorful make-up and facial decorations such as Aek-Whang(액황), Wha-Jung(화전), Jang-Yob(장엽), Swa-Hong(사홍) and those made many Dynasty, since those kinds of styles were the result of mixture between traditional chinese and western styles, it became so unique and diverse. The Declining period of the Tang Dynasty has begun from the turning point, resulting from Rebellion of An Ru Sha'. Rebellion of An Ru Sha' made the chinese people have a sense of precaution, and an antipathy against babarian. Furthermore, the power of Tang Dynasty onto the countries bordering on western china unfortunately was declining due to the defeat at 99 the Talas war in 751. As the fashion of ‘Ho’ disappeared the costume pattern was restored to the traditional Chinese style of large sleeve and broad width. However, the Tibetan mode was appeared in women's hair style and face toilet since Yuan Ha (801-812). In Song Dynasty, women's make-up and adorment were originated from Dang Dynasty, but those were more simple than in Dang Dynasty.

  • PDF

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.