• Title/Summary/Keyword: SPN

Search Result 101, Processing Time 0.036 seconds

Evaluation of Urinary Antigen Test for Rapid Diagnosis of $Streptococcus$ $pneumoniae$ in Community-Acquired Pneumonia Patients

  • Yu, Mi-Young;Kim, In-Sik;Kang, Sang-Sun;Cha, Beong-Hun;Hyun, Sung-Hee
    • Biomedical Science Letters
    • /
    • v.17 no.4
    • /
    • pp.355-361
    • /
    • 2011
  • We evaluated the performance of the NOW $Streptococcus$ $pneumoniae$ urinary antigen test, standard culture and polymerase chain reaction for detecting $S.$ $pneumoniae$. The urinary antigen test of pneumonia patients represented sensitivity at 72% and specificity at 79%. The results of PCR were targeting for autolysin ($lyt$A), pneumolysin ($ply$), and spn9828. The $lyt$A sensitivity and specificity stood at 56% and 87% respectively while $ply$ sensitivity reported 83% and specificity was 47%, sensitivity and specificity of spn9828 stood at 83% and 73% respectively. The results of urinary antigen test and three genes were all statistically meaningful within $P$ <0.05. When the urinary antigen test of $S.$ $pneumoniae$ was positive, the three kinds of genes were also likely to be positive. According to the result of urinary antigen test, the results of PCR presented a meaningful difference ($P$ <0.05). Especially, the urinary antigen test of $S.$ $pneumoniae$ was likely to be positive ($P$ <0.05) when more than two genes were positive in PCR results.

The Effect of Histamine on Polymorphonuclear Leukocyte-induced Pneumocyte Injury in Vitro (다형핵구에 의한 폐포세포 손상에 Histamine이 미치는 영향)

  • Kim, Young-Kyoon;Kwon, Soon-Seog;Kim, Kwan-Hyung;Han, Ki-Don;Moon, Hwa-Sik;Sang, Jeong-Sup;Park, Sung-Hak
    • Tuberculosis and Respiratory Diseases
    • /
    • v.39 no.3
    • /
    • pp.228-235
    • /
    • 1992
  • Background: Although polymorphonuclear leukocytes (PMN) are important in protecting the airways and alveolar surfaces, there is evidence that they can also injure the lung while exercising their defensive role. However it has been unclear whether PMN-induced pneumocyte injury is mediated by their direct cytotoxic effect on target cells or by PMN-derived cytotoxic mediators. On the other hand histamine was known not only to act as an important chemical mediator participated in the pathogenesis of some atotic and allegic disorders, but also to have an inhibitory effect on normal PMN functions. Method: To study the mechanism by which PMN induce pneumocyte injury, we cocultured PMN from four healthy nonsmokers or their PMN-derived supernatants (PMN-SPN) with monolayers of $^{51}Cr$-labeled human A549 pneumocytes and compared PMN-and PMN-SPN-mediated pneumocyte injuries measured by $^{51}Cr$ release assay. We also compared the effects of histamine on each pneumocyte injury. Results: 1) PMN-SPN showed more injurious effect on A549 pneumocytes than that of PMN itself regardless histamine pretreatment of PMN. 2) Pneumocyte injury by PMN with histamine pretreatment was increased or decreased compared with that by PMN without histamine pretreatment, according to histamine concentrations, and PMN stimulating agents and their concentrations. 3) Pneumocyte injury by PMN-SPN with histamine pretreatment tended to be decreased compared with that by PMN-SPN without histamine pretreatment. Conclusion: Our results suggest that PMN-SPN may play more important role in mediating pneumocyte injury than PMN itself and that histamine may partially play a protective role on PMN-induced pneumocyte injury. Alternatively we conclude that the effects of histamine on PMN-induced pneumocyte injury may be affected by microenvironment in vivo.

  • PDF

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks

  • Kang, Ju-Sung;Hong, Seok-Hie;Lee, Sang-Jin;Yi, Ok-Yeon;Park, Choon-Sik;Lim, Jong-In
    • ETRI Journal
    • /
    • v.23 no.4
    • /
    • pp.158-167
    • /
    • 2001
  • We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in terms of practical security, we show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. We also study the optimal diffusion effect for some diffusion layers according to their constraints. Second, we obtain the results that the consecutive two rounds of SPN structure provide provable security against differential and linear cryptanalysis, i.e., we prove that the probability of each differential (resp. linear hull) of the consecutive two rounds of SPN structure with a maximal diffusion layer is bounded by $p^n(resp.q^n)$ and that of each differential (resp. linear hull) of the SDS function with a semi-maximal diffusion layer is bounded by $p^{n-1}(resp. q^{n-1})$, where p and q are maximum differential and linear probabilities of the substitution layer, respectively.

  • PDF

Design of Meteorological Radar Echo Classifier Based on RBFNN Using Radial Velocity (시선속도를 고려한 RBFNN 기반 기상레이더 에코 분류기의 설계)

  • Bae, Jong-Soo;Song, Chan-Seok;Oh, Sung-Kwun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.3
    • /
    • pp.242-247
    • /
    • 2015
  • In this study, we propose the design of Radial Basis Function Neural Network(RBFNN) classifier in order to classify between precipitation and non-precipitation echo. The characteristics of meteorological radar data is analyzed for classifying precipitation and non-precipitation echo. Input variables is selected as DZ, SDZ, VGZ, SPN, DZ_FR, VR by performing pre-processing of UF data based on the characteristics analysis and these are composed of training and test data. Finally, QC data being used in Korea Meteorological Administration is applied to compare with the performance results of proposed classifier.

Development and Implementation of Extension Models for Activity-Based Costing (ABC 확장모형의 개발 및 적용)

  • Choi, Sungwoon
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.1
    • /
    • pp.239-250
    • /
    • 2014
  • The purpose of this research is to implement and develop the Economic Cost Driver Size(ECDS) extended model to determine the optimal cash driver size with measurement complexity cost and allocation fail cost. ECDS model can be used to seek both measurement accuracy and time efficiency of the Activity-Base Costing (ABC). The study also develops Activity Priority Number (APN) to evaluate the importance of nonvalue-added activities improvement and to determine the representative cost driver of value-added activities when applying ECDS model. APN consists of Severity Priority Number (SPN), Undetectablitiy Priority Number (UPN) and Occurrence Priority Number (OPN). APN can be obtained from lower-stream activity, current activity, upper-stream activity in terms of hierarchical dependency of SIPOC (Supplier, Input, Process, Output, and Customer). In order to seek both efficiency of invested capital and reduction of overhead cost, the paper proposes the integrated ABC and Economic Value Added (EVA) model using redesigned ABC-based statement of comprehensive income and EVA-based statement of financial position. For a better understanding of the proposed ABC-EVA integrated model, numerical examples are demonstrated in this paper. Cost drivers of ABC and capital drivers of EVA in the proposed model can be used to reduce activity overhead cost from ABC-based statement of comprehensive income and to lessen activity capital charge from EVA-based statement of financial position.

A Hardware Implementation of Ultra-Lightweight Block Cipher PRESENT-80/128 (초경량 블록암호 PRESENT-80/128의 하드웨어 구현)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.430-432
    • /
    • 2015
  • This paper describes a hardware implementation of ultra-lightweight block cipher algorithm PRESENT-80/128 that supports for two master key lengths of 80-bit and 128-bit. The PRESENT algorithm that is based on SPN (substitution and permutation network) consists of 31 round transformations. A round processing block of 64-bit data-path is used to process 31 rounds iteratively, and circuits for encryption and decryption are designed to share hardware resources. The PRESENT-80/128 crypto-processor designed in Verilog-HDL was verified using Virtex5 XC5VSX-95T FPGA and test system. The estimated throughput is about 550 Mbps with 275 MHz clock frequency.

  • PDF

A Hardware Implementation of Whirlpool Hash Function using 64-bit datapath (64-비트 데이터패스를 이용한 Whirlpool 해시 함수의 하드웨어 구현)

  • Kwon, Young-Jin;Kim, Dong-Seong;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.485-487
    • /
    • 2017
  • The whirlpool hash function adopted as an ISO / IEC standard 10118-3 by the international standardization organization is an algorithm that provides message integrity based on an SPN (Substitution Permutation Network) structure similar to AES block cipher. In this paper, we describe the hardware implementation of the Whirlpool hash function. The round block is designed with a 64-bit data path and encryption is performed over 10 rounds. To minimize area, key expansion and encryption algorithms use the same hardware. The Whirlpool hash function was modeled using Verilog HDL, and simulation was performed with ModelSim to verify normal operation.

  • PDF

Primary Pulmonary Chordoid Meningioma

  • Bae, So Young;Kim, Hye-seon;Jang, Hyo-Jun;Chung, Won-Sang;Kim, Hyuck;Kim, Young Hak;Lee, Jun Ho;Bang, Seong Sik
    • Journal of Chest Surgery
    • /
    • v.51 no.6
    • /
    • pp.410-414
    • /
    • 2018
  • Primary pulmonary meningioma is a rare disease, and chordoid meningioma is an uncommon variant of meningioma in the central nervous system (CNS) with a high recurrence rate. We report a case of primary pulmonary chordoid meningioma that presented as a solitary pulmonary nodule (SPN). The SPN was resected by thoracoscopic wedge resection and was revealed to have characteristics of chordoid meningioma. After confirming the absence of a meningioma in the CNS by brain imaging, the nodule was diagnosed as a primary pulmonary chordoid meningioma. The patient remained disease-free after 26 months postoperatively. To our knowledge, this is the third case of primary pulmonary chordoid meningioma to be reported.

Differential Power Analysis Attack of a Block Cipher ARIA (블럭 암호 ARIA에 대한 차분전력분석공격)

  • Seo JungKab;Kim ChangKyun;Ha JaeCheol;Moon SangJae;Park IlHwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.99-107
    • /
    • 2005
  • ARIA is a 128-bit block cipher having 128-bit, 192-bit, or 256-bit key length. The cipher is a substitution and permutation encryption network (SPN) and uses an involutional binary matrix. This structure was efficiently developed into light weight environments or hardware implementations. This paper shows that a careless implementation of an ARIA on smartcards is vulnerable to a differential power analysis attack This attack is realistic because we can measure power consumption signals at two kinds of S-boxes and two types of substitution layers. By using the two round key, we extracted the master key (MK).

On the Security of Rijndael-like Structures against Differential and Linear Cryptanalysis (Rijndael 유사 구조의 차분 공격과 선형 공격에 대한 안전성에 관한 연구)

  • 박상우;성수학;지성택;윤이중;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.3-14
    • /
    • 2002
  • Rijndael-like structure is the special case of SPN structure. The linear transformation of Rijndael-like structure consisits of linear transformations of two types, the one is byte permutation $\pi$ and the other is linear tranformation $\theta$= ($\theta_1, \theta_2, \theta_3, \theta_4$), where each of $\theta_i$ separately operates on each of the four rows of a state. The block cipher, Rijndael is an example of Rijndael-like structures. In this paper. we present a new method for upper bounding the maximum differential probability and the maximum linear hull probability for Rijndael-like structures.