• Title/Summary/Keyword: key protection

Search Result 933, Processing Time 0.028 seconds

Study of the Application of Gel Electrolyte in the Reference Electrode of $Cu/CuSO_4$

  • Lin, Cunguo;Xu, Likun;Liu, Yang
    • Corrosion Science and Technology
    • /
    • v.7 no.3
    • /
    • pp.179-181
    • /
    • 2008
  • With nano-$SiO_2$ and sulphate acid, a kind of colloid electrolyte is synthesized by sol-gel method. It is placed outside the reference electrode as a layer of gel electrolyte so as to decrease the leaching of $Cu^{2+}$ and increase the life of the reference electrode. The performance of the gel electrode in simulating soil solution is measured as follows: the potential of the electrodes ranging from 60 mV to 80 mV (vs. SCE) with potential variation no more than $\pm10mV$, enough resistance to polarization. The $Cu^{2+}$ effusion rate of the reference electrode without gel electrolyte is 3 times that with colloid electrolyte, which means that gel electrolyte can extend the life of the reference electrode significantly.

Comparison of immunoadjuvant activities of four bursal peptides combined with H9N2 avian influenza virus vaccine

  • Zhang, Cong;Zhou, Jiangfei;Liu, Zhixin;Liu, Yongqing;Cai, Kairui;Shen, Tengfei;Liao, Chengshui;Wang, Chen
    • Journal of Veterinary Science
    • /
    • v.19 no.6
    • /
    • pp.817-826
    • /
    • 2018
  • The bursa of Fabricius (BF) is a central humoral immune organ unique to birds. Four bursal peptides (BP-I, BP-II, BP-III, and BP-IV) have been isolated and identified from the BF. In this study, the immunoadjuvant activities of BPs I to IV were examined in mice immunized with H9N2 avian influenza virus (AIV) vaccine. The results suggested that BP-I effectively enhanced cell-mediated immune responses, increased the secretion of Th1 (interferon gamma)- and Th2 (interleukin-4)-type cytokines, and induced an improved cytotoxic T-lymphocyte (CTL) response to the H9N2 virus. BP-II mainly elevated specific antibody production, especially neutralizing antibodies, and increased Th1- and Th2-type cytokine secretion. BP-III had no significant effect on antibody production or cell-mediated immune responses compared to those in the control group. A strong immune response at both the humoral and cellular levels was induced by BP-IV. Furthermore, a virus challenge experiment followed by H&E staining revealed that BP-I and BP-II promoted removal of the virus and conferred protection in mouse lungs. BP-IV significantly reduced viral titers and histopathological changes and contributed to protection against H9N2 AIV challenge in mouse lungs. This study further elucidated the immunoadjuvant activities of BPs I to IV, providing a novel insight into immunoadjuvants for use in vaccine design.

An Unequal Protection FEC Scheme for Video over Optical Access Networks

  • Cao, Yingying;Chen, Xue;Wang, Liqian;Li, Xicong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1463-1479
    • /
    • 2013
  • In this paper, we propose an unequal protection physical coding sub-layer (PCS) forward error correction (FEC) scheme for efficient and high-quality transmission of video data over optical access networks. Through identifying and resolving the unequal importance of different video frames and passing this importance information from MAC-layer to PCS, FEC scheme of PCS can be adaptive to application-layer data. Meanwhile, we jointly consider the different channel situations of optical network unit (ONU) and improve the efficiency of FEC redundancy by channel adaptation. We develop a theoretical algorithm and a hardware method to achieve efficient FEC assignment for the proposed unequal protection scheme. The theoretical FEC assignment algorithm is to obtain the optimal FEC redundancy allocation vector that results in the optimum performance index, namely frame error rate, based on the identified differential importance and channel situations. The hardware method aims at providing a realistic technical path with negligible hardware cost increment compared with the traditional FEC scheme. From the simulation results, the proposed Channel and Application-layer data Adaptation Unequal Protection (CAAUP) FEC scheme along with the FEC ratio assignment algorithm and the hardware method illustrates the ability of efficient and high-quality transmission of video data against the random errors in the channel of optical access networks.

Design Golas for the Space Shuttle's Thermal Protection System (Space shuttle의 Thermal Protection System의 설계 목표)

  • 김선규
    • Journal of Astronomy and Space Sciences
    • /
    • v.1 no.1
    • /
    • pp.35-39
    • /
    • 1984
  • The design of the reusable thermal protection system for the space shuttle orbiter using silica tile played one of key roles in the successful flight of the Columbia and subsequent space shuttles. The basic design goals for this thermal protection system were identified. Manufacturing procedures for the silica tile and the structure of the tile system were also described.

  • PDF

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

An Innovative Fast Relay Coordination Method to Bypass the Time Consumption of Optimization Algorithms in Relay Protection Coordination

  • Kheshti, Mostafa;Kang, Xiaoning;Jiao, Zaibin
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.612-620
    • /
    • 2017
  • Relay coordination in power system is a complex problem and so far, meta-heuristic algorithms and other methods as an alternative approach may not properly deal with large scale relay coordination due to their huge time consuming computation. In some cases the relay coordination could be unachievable. As the urgency for a proper approach is essential, in this paper an innovative and simple relay coordination method is introduced that is able to be applied on optimization algorithms for relay protection coordination. The objective function equation of operating time of relays are divided into two separate functions with less constraints. As the analytical results show here, this equivalent method has a remarkable speed with high accuracy to coordinate directional relays. Two distribution systems including directional overcurrent relays are studied in DigSILENT software and the collected data are examined in MATLAB. The relay settings of this method are compared with particle swarm optimization and genetic algorithm. The analytical results show the correctness of this mathematical and practical approach. This fast coordination method has a proper velocity of convergence with low iteration that can be used in large scale systems in practice and also to provide a feasible solution for protection coordination in smart grids as online or offline protection coordination.

Combination of Set Top Box and Asymmetric Cryptosystem for Secure Storage of Digital Broadcasting Contents (디지털 방송 콘텐츠의 안전한 저장을 위한 Set Top Box와 비대칭 암호 시스템의 결합)

  • 이혜주;최형기;홍진우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.782-786
    • /
    • 2003
  • It requires protection technologies to permit consumer to store a digital broadcasting content and at the same time to protect the intellectual property from illegal action. There is content encryption as one of protection technologies. In this paper, we proposed a protection scheme for digital broadcasting content that broadcasting server. Multiplexes the encryption key into MPEG-2 TS(transport stream) to be able to encrypt received TS at set top box. The proposed method is to modify PMT(program map table) for the information related encryption key and to multiplex key as TS packets. After then the encryption key is extracted from TS stream which is encrypted in set top box.

  • PDF

Sorption behavior of Eu(III) on Tamusu clay under strong ionic strength: Batch experiments and BSE/EDS analysis

  • Zhang, Han;He, Hanyi;Liu, Jun;Li, Honghui;Zhao, Shuaiwei;Jia, Meilan;Yang, Jijun;Liu, Ning;Yang, Yuanyou;Liao, Jiali
    • Nuclear Engineering and Technology
    • /
    • v.53 no.1
    • /
    • pp.164-171
    • /
    • 2021
  • The europium sorption on Tamusu clay was investigated by batch sorption experiments and spectroscopic study under the condition of strong ionic strength. The results demonstrated that europium sorption on Tamusu clay increased rapidly with pH value, but decreased with the ionic strength of solution increased. The europium sorption also increased in the presence of humic acid, especially at low pH value. The sorption could be fitted by Freundlich isotherm model and the europium sorption on clay was spontaneous and endothermic reaction. Besides, the result indicates that ion exchange was the main process at low pH value, while inner-sphere surface complexation dominated the sorption process at high pH value. The Backscatter electron scanning/Energy Dispersive Spectrometer(BSE/EDS) and the effect of Na for europium sorption results further suggested that europium sorption on Tamusu clay mainly competed with Na at low pH value. Overall, the results in this research were of significance to understand the sorption behavior of europium on the geological media under high ionic strength.

A study on the thermal reponsivenes of automatic sprinklers (스프링클러 소화설비의 열감지에 관한 연구)

  • Son, Bong-Se
    • Fire Protection Technology
    • /
    • s.10
    • /
    • pp.9-12
    • /
    • 1991
  • As the present idustry is devolping rapidly, automatic sprinklers continue to play a key role in modern fire protection. But the technical basis and methods of measurement of the thermal response of sprinklers are not studying in our country. Therefore, the purpose of this paper is to analyze the thermal response characteristics and condition parameters of automatic sprinkler head.

  • PDF

An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks

  • Song, Jae-Hoon;Jung, Tae-Jin;Jung, Ji-Hun;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.286-292
    • /
    • 2012
  • Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto SoCs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. Our approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core. Conformance to the IEEE 1149.1 standards is completely preserved while yielding better performance of area, power, and fault coverage with highly robust protection of the secret user key.