• Title/Summary/Keyword: combined protection

Search Result 376, Processing Time 0.025 seconds

Synergistic Effects of Gliocladium virens and Pseudomonas putida in the Cucumber Rhizosphere on the Suppression of Cucumber Fusaium Wilt (오이 덩굴쪼김병 억제에 관한 근권정착능력이 있는 Gliocladium virens와 Pseudomonas putida의 협력효과)

  • 배영석;심창기;박창석;김희규
    • Korean Journal Plant Pathology
    • /
    • v.11 no.4
    • /
    • pp.287-291
    • /
    • 1995
  • Biocontrol agents, Gliocladium virens G872B and Pseudomonas putida Pf3, were compatible each other in colonizing cucumber rhizosphere, which contributed to a long-term inhibition of cucumber Fusarium wilt. G872B colonized successfully on the cucumber root system, irrespective of the introduction of Pf3. Pf3 also colonized well in the cucumber rhizosphere regardless of the presence of G872B. The individual strains effectively suppressed cucumber wilt up to 56 days after transplanting. The combined treatment of G872fB and Pf3 provided a long-term protection of about 80 days with the efficacy greater than that obtained by any individual strains under greenhouse conditions. These results suggest that the colonization of the biological control agents in the rhizosphere could be correlated directly to Fusarium wilt-suppressive potentials.

  • PDF

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

SYNERGISTIC INTERACTION OF ENVIRONMENTAL TEMPERATURE AND MICROWAVES: PREDICTION AND OPTIMIZATION

  • Petin, Vladislav G.;Kim, Jin-Kyu;Kolganova, Olga I.;Zhavoronkov, Leonid P.
    • Journal of Radiation Protection and Research
    • /
    • v.36 no.1
    • /
    • pp.1-7
    • /
    • 2011
  • A simple mathematical model of simultaneous combined action of environmental agents has been proposed to describe the synergistic interaction of microwave and high ambient temperature treatment on animal heating. The model suggests that the synergism is caused by the additional effective damage arising from an interaction of sublesions induced by each agent. These sublesions are considered to be ineffective if each agent is taken individually. The additional damage results in a higher body temperature increment when compared with that expected for an independent action of each agent. The model was adjusted to describe the synergistic interaction, to determine its greatest value and the condition under which it can be achieved. The prediction of the model was shown to be consistent with experimental data on rabbit heating. The model appears to be appropriate and the conclusions are valid.

The Cause of CCPU's failure and Improved Configuration Method in Combined Transmission Lines (실 계통의 혼합송전선로에서 CCPU파괴 원인과 그 대책)

  • Ha, C.W.;Kim, J.N.;Lee, S.K.;Heo, H.D.
    • Proceedings of the KIEE Conference
    • /
    • 2001.11b
    • /
    • pp.210-212
    • /
    • 2001
  • The protection of underground cables against transient overvoltages resulting from lightning and other causes is important in cable-tine which is connected with overhead line and underground cable. This paper investigates the failure of CCPU(Cable covering Protection Unit) and presents improved configuration method of CCPU in underground cable system EMTP(Electromagnetic Transient Program) is used in order to study the overvoltages and modeling of components of the system such as overhead lines, underground cables, CCPUs and towers in presented.

  • PDF

Protection of Insulation Joint Box and Analysis of Overvoltage in Underground Power Cable Systems (지중송전케이블계통에서 절연통 보호대책 및 과전압 해석)

  • Hong, Dong-Suk;Jin, Hye-Young;Jung, Che-Kyun;Lee, Jong-Beom;Cho, Han-Ku
    • Proceedings of the KIEE Conference
    • /
    • 2001.11b
    • /
    • pp.380-382
    • /
    • 2001
  • This paper describes the protection of insulation joint box in combined transmission line which is connected with the 154kV underground power cables. An actual power cable system was selected to establish modeling and to analyze. Modeling was established in EMTP and ATPDraw. Simulation was carried out according to the buried method of cable and connection method of CCPU. Results presented in this paper will be applied to another power cable systems.

  • PDF

Two-Phase Security Protection for the Internet of Things Object

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1431-1437
    • /
    • 2018
  • Securing objects in the Internet of Things (IoT) is essential. Authentication model is one candidate to secure an object, but it is only limited to handle a specific type of attack such as Sybil attack. The authentication model cannot handle other types of attack such as trust-based attacks. This paper proposed two-phase security protection for objects in IoT. The proposed method combined authentication and statistical models. The results showed that the proposed method could handle other attacks in addition to Sybil attacks, such as bad-mouthing attack, good-mouthing attack, and ballot stuffing attack.

Characteristics of Interruption Ability in DC Circuit Breaker using Superconducting Coil (초전도 코일을 이용한 DC 회로 차단기의 차단 능력 특성)

  • Jeong, In-Sung;Choi, Hye-Won;Youn, Jeong-Il;Choi, Hyo-Sang
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.68 no.1
    • /
    • pp.215-219
    • /
    • 2019
  • Development of DC interruption technology is being studied actively for enhanced DC grid reliability and stability. In this study, coil type superconductor DC circuit breaker was proposed as DC interruption. It is integration technology that combined current-limiting technique using superconductor and cut-off technique using mechanical DC circuit breaker. Superconductor was applied to the coil type. In simulation, Mayr arc model was applied to realize the arc characteristic in the mechanical DC circuit breaker. PSCAD/EMTDC had used to model and perform the simulation. To find out the protection range of coil type superconductor DCCB, the working operation have analyzed based on the rated voltage of DCCB. The results confirmed that, according to apply the limiting device, the protection range was increased in twice. Therefore, the probability of failure of interruption has lowered significantly.

The Combined Effect of Enzyme Activity and Sensory Test of Blanching and Brining in Hot Solution and Trehalose Treatment on the Cucumber Kimchi for the Storage Period (데침과 열수의 침적과 Trehalose 처리가 오이 김치의 저장중 효소 활성의 변화와 관능 검사에 미치는 병용효과)

  • 이혜정;오봉희;남정혜
    • The Korean Journal of Food And Nutrition
    • /
    • v.14 no.5
    • /
    • pp.385-390
    • /
    • 2001
  • The enzyme activity and organoleptic properties of Korean pickled cucumber were studies for their changes during fermentation. The Korean pickled cucumber were prepared by blanching and high temperature soaking in salt solution and trehalose treament. The results showed that the effect of combined heat and trehalose treatment significantly reduced the fermentation rate and softening rate of texture while a rather rapid fermentation was for those preserved with salt. The effect of terhalose treatment enhanced fermentation and it was significantly reduced softening rate of texture by 2% treatment. The sensory evaluation of Korean pickled cucumber was found that combined heat treatment with blanching and hot solution had a positive effect for reduction of softening of cucumber tissue, however, odor and taste were not significantly affected. This study suggested that combined heat and trehalose treament might have potential for affording protection against softness of cucumber tissue during the fermentation time.

  • PDF

Design and Effect Analysis of Confederation Interface for ROK-US Combined Exercises (한미 연합연습 모의지원을 위한 다중 페더레이션 인터페이스 설계 및 효과분석)

  • Won, Kyoungchan;Jeong, Sukjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.498-506
    • /
    • 2018
  • Recently, the US commanded a wargame simulation system of a combined ROK-US exercise with single federation. However, after the OPCON transfer, many limitations to the single federation have been cited such as security policies and information protection. We suggest a hierarchical federation as a way to overcome these problems. Regarding HLA rules, the participants use the same FOM and RTI in single federation. There are limitations to implement CI in applying heterogeneous FOMs and RTIs in current single federation. Therefore, we propose implementing CI with heterogeneous FOMs and RTIs in a hierarchical federation. This system overcomes the weaknesses of the system structure, which is a disadvantage of the single federation. In the federation test, we can apply heterogeneous FOMs and RTIs and achieve similar performance to the current combined exercise simulation. In conclusion, ROK should lead the simulation system of combined exercises using the CI after the OPCON transfer.

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee;Yun, Seung-Hwan;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.634-644
    • /
    • 2009
  • A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.