• Title/Summary/Keyword: log chain

Search Result 106, Processing Time 0.033 seconds

Trophic transfer of organochlorine pesticides through food-chain in coastal marine ecosystem

  • Kim, Seung-Kyu
    • Environmental Engineering Research
    • /
    • v.25 no.1
    • /
    • pp.43-51
    • /
    • 2020
  • The present study was designed to characterize the bioaccumulation of organochlorine pesticides (OCPs) in marine organisms (zooplankton, oyster, crab, and goby) on different trophic level. In the present study, sedentary bivalve (oyster) showed strong correlations in OCPs levels with surface sediment in the study area. This indicates the two compartments can be used as alternative for pollution monitoring of OCPs even in narrow scale in space. Bioaccumulation and trophic transfer of OCPs was strongly associated with their hydrophobicity (i.e., KOW). HCHs with log KOW < 5 did not show any enrichment through food-chain. However, log BAF values of OCPs with log KOW > 5 positioned over the 1:1 lines of log BAF and log KOW of the top predator, indicating the greater fugacities in the higher trophic level and thus the occurrence of biomagnification via ingestion. Based on trophic transfer factors (TTF), more hydrophobic OCPs with log KOW > 5 were enriched by several to several ten times in the highest trophic level relative to the lowest trophic level. This finding can be used in the establishment of marine environmental water quality criteria by considering biomagnification factors (TTF in this study) of OCPs.

Build a Digital Evidence Map considered Log-Chain (로그 체인을 고려한 디지털증거지도 작성)

  • Park, Hojin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.523-533
    • /
    • 2014
  • It has been spent too much time to figure out the incident route when we are facing computer security incident. The incident often recurs moreover the damage is expanded because critical clues are lost while we are wasting time with hesitation. This paper suggests to build a Digital Evidence Map (DEM) in order to find out the incident cause speedy and accurately. The DEM is consist of the log chain which is a mesh relationship between machine data. And the DEM should be managed constantly because the log chain is vulnerable to various external facts. It could help handle the incident quickly and cost-effectively by acquainting it before incident. Thus we can prevent recurrence of incident by removing the root cause of it. Since the DEM has adopted artifacts in data as well as log, we could make effective response to APT attack and Anti-Forensic.

Bayesian and maximum likelihood estimations from exponentiated log-logistic distribution based on progressive type-II censoring under balanced loss functions

  • Chung, Younshik;Oh, Yeongju
    • Communications for Statistical Applications and Methods
    • /
    • v.28 no.5
    • /
    • pp.425-445
    • /
    • 2021
  • A generalization of the log-logistic (LL) distribution called exponentiated log-logistic (ELL) distribution on lines of exponentiated Weibull distribution is considered. In this paper, based on progressive type-II censored samples, we have derived the maximum likelihood estimators and Bayes estimators for three parameters, the survival function and hazard function of the ELL distribution. Then, under the balanced squared error loss (BSEL) and the balanced linex loss (BLEL) functions, their corresponding Bayes estimators are obtained using Lindley's approximation (see Jung and Chung, 2018; Lindley, 1980), Tierney-Kadane approximation (see Tierney and Kadane, 1986) and Markov Chain Monte Carlo methods (see Hastings, 1970; Gelfand and Smith, 1990). Here, to check the convergence of MCMC chains, the Gelman and Rubin diagnostic (see Gelman and Rubin, 1992; Brooks and Gelman, 1997) was used. On the basis of their risks, the performances of their Bayes estimators are compared with maximum likelihood estimators in the simulation studies. In this paper, research supports the conclusion that ELL distribution is an efficient distribution to modeling data in the analysis of survival data. On top of that, Bayes estimators under various loss functions are useful for many estimation problems.

Bayesian Analysis in Generalized Log-Gamma Censored Regression Model

  • Younshik chung;Yoomi Kang
    • Communications for Statistical Applications and Methods
    • /
    • v.5 no.3
    • /
    • pp.733-742
    • /
    • 1998
  • For industrial and medical lifetime data, the generalized log-gamma regression model is considered. Then the Bayesian analysis for the generalized log-gamma regression with censored data are explained and following the data augmentation (Tanner and Wang; 1987), the censored data is replaced by simulated data. To overcome the complicated Bayesian computation, Makov Chain Monte Carlo (MCMC) method is employed. Then some modified algorithms are proposed to implement MCMC. Finally, one example is presented.

  • PDF

Protonation and Stability Constants for $Co^{2+},\;Ni^{2+},\;Cu^{2+},\;and\;Zn^{2+}$ of the Open-Chain Polyamine 1-Amino-13-(2-pyridyl)-3,6,9,12-tetraaza-tridecane. Crystal Structure of Its Nickel(Ⅱ) Complex

  • 김선덕;김준광;정우식
    • Bulletin of the Korean Chemical Society
    • /
    • v.18 no.6
    • /
    • pp.653-656
    • /
    • 1997
  • The new unsymmetric $N_6$ ligand 1-amino-13-(2-pyridyl)-3,6,9,12-tetraazatridecane (aptatd) containing one pyridyl group has been synthesized and characterized by EA, IR, and NMR. Its proton association constants $(log K_H^n)$ and stability constants $(log K_{ML})$ for Co(Ⅱ), Ni(Ⅱ), Cu(Ⅱ), and Zn(Ⅱ) ions were determined at 298.1 K and ionic strength 0.100 mol $dm^{-3}$ (KNO₃) in aqueous solution by potentiometry: log $K_H^1$=8.80, log $K_H^2$=8.49, log $K_H^3$=6.84, log $K_H^4$=4.17, log $K_H^5$=3.47; log $K_{ML}(Co^{2+})$=18.00, log $K_{ML}(Ni^{2+})$=21.31, log $K_{ML}(Cu^{2+})$=23.62, log $K_{ML}(Zn^{2+})$=15.60. The X-ray structure of its nickel(Ⅱ) complex [Ni(aptatd)]$(ClO_4)_2$ are reported: orthorhombic space group Pbca, a=15.715(1) Å, b=14.280(2) Å, c=19.443(2) Å, V=4363.4 (9) ų with Z=8. The geometry around nickel is a distorted octahedron with the pyridine nitrogen atom being cis to the nitrogen atom of the terminal primary amine.

Design and Analysis of the Log Authentication Mechanism based on the Merkle Tree (Merkle Tree 기반의 로그인증 메커니즘 설계 및 분석)

  • Lee, Jung yeob;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.3-13
    • /
    • 2017
  • As security log plays important roles in various fields, the integrity of log data become more and more important. Especially, the stored log data is an immediate target of the intruder to erase his trace in the system penetrated. Several theoretical schemes to guarantee the forward secure integrity have been proposed, even though they cannot provide the integrity of the log data after the system is penetrated. Authentication tags of these methods are based on the linear-hash chain. In this case, it is difficult to run partial validation and to accelerate generating and validating authentication tags. In this paper, we propose a log authentication mechanism, based on Mekle Tree, which is easy to do partial validation and able to apply multi threading.

Implementation of RSA modular exponentiator using Division Chain (나눗셈 체인을 이용한 RSA 모듈로 멱승기의 구현)

  • 김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.21-34
    • /
    • 2002
  • In this paper we propos a new hardware architecture of modular exponentiation using a division chain method which has been proposed in (2). Modular exponentiation using the division chain is performed by receding an exponent E as a mixed form of multiplication and addition with divisors d=2 or $d=2^I +1$ and respective remainders r. This calculates the modular exponentiation in about $1.4log_2$E multiplications on average which is much less iterations than $2log_2$E of conventional Binary Method. We designed a linear systolic array multiplier with pipelining and used a horizontal projection on its data dependence graph. So, for k-bit key, two k-bit data frames can be inputted simultaneously and two modular multipliers, each consisting of k/2+3 PE(Processing Element)s, can operate in parallel to accomplish 100% throughput. We propose a new encoding scheme to represent divisors and remainders of the division chain to keep regularity of the data path. When it is synthesized to ASIC using Samsung 0.5 um CMOS standard cell library, the critical path delay is 4.24ns, and resulting performance is estimated to be abort 140 Kbps for a 1024-bit data frame at 200Mhz clock In decryption process, the speed can be enhanced to 560kbps by using CRT(Chinese Remainder Theorem). Futhermore, to satisfy real time requirements we can choose small public exponent E, such as 3,17 or $2^{16} +1$, in encryption and verification process. in which case the performance can reach 7.3Mbps.

Ketorolac Ester Enhancer-prodrugs: Preparation and Evaluation of Their Physicochemical Properties

  • Yun, Sung-Il;Kim, Jung-Sun;Yong, Chul-Soon
    • Journal of Pharmaceutical Investigation
    • /
    • v.38 no.6
    • /
    • pp.405-412
    • /
    • 2008
  • Six ester analogues of Ketorolac were synthesized as potential enhancer prodrugs for transdermal delivery. Solubility of these esters was determined in 10% propylene glycol (PG)/isotonic phosphate buffer (IPB) at room temperature while lipophilicity was obtained as partition coefficients (log P) and capacity factors (k') using HPLC. Stability of the prodrugs in skin extract and in plasma was investigated at $37^{\circ}C$. The lipophilicity of the potential prodrugs increased in proportion to their alkyl chain length. Good linear relationship between partition coefficients (log P) and capacity factors (log k') was observed ($R^2=0.9961$). All of the analogues were fairly stable but slowly degraded in IPB over a 12 hour period. However, their stability in skin extract and in plasma varied with most compounds gradually decomposing over a 12 hour period. Although unsaturation of the alkyl ester chain did not alter the over all lipophilicity of the compound, the half-life was significantly affected. In plasma, degradation of the esters was slower than in the skin extract, which is a desirable trait for enhancer-prodrugs. However, the overall hydrolysis in the skin extract needs to be facilitated for the development of an effective enhancer prodrug. The analogue with the shortest half life in the skin extract was the unsaturated C-12 analogue of 0.96 hr.

Improved Detection of ${\gamma}-Irradiated$ Vibrio vulnificus after Heat and Cold Shock Treatment by Using Ethidium Monoazide Real-time PCR

  • Lee, Jung-Lim;Levin, Robert E.
    • Food Science and Biotechnology
    • /
    • v.18 no.3
    • /
    • pp.788-792
    • /
    • 2009
  • Gamma $({\gamma})-irradiation$ can be used to control pathogens such as Vibrio vulnificus in seafood. The effects of irradiation on microbial cell populations (%) have been studied in order to develop detection methods for irradiated foods. The method used in this study was ethidium bromide monoazide (EMA) real-time polymerase chain reaction (PCR), using V. vulnificus specific primer, EMA, and $SYBR^{(R)}$ Green to discriminate between ${\gamma}-irradiated$ and non-irradiated cells. Confocal microscope examination showed that ${\gamma}-irradiation$ damaged portions of the cell membrane, allowing EMA to penetrate cells of irradidated V. vulnificus. ${\gamma}-Irradiation$ at 1.08 KGy resulted in log reduction ($-1.15{\pm}0.13$ log reduction) in genomic targets derived from EMA real-time PCR. The combination cold/heat shock resulted in the highest ($-1.74{\pm}0.1$ log reduction) discrimination of dead irradiated V. vulnificus by EMA real-time PCR.

Hazard Analysis of Staphylococcus aureus in Ready-to-Eat Sandwiches (즉석섭취 샌드위치류의 황색포도상구균에 대한 위해분석)

  • Park, Hae-Jung;Bae, Hyun-Joo
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.36 no.7
    • /
    • pp.938-943
    • /
    • 2007
  • This study investigated the hazard analysis of ready-to-eat sandwiches sold in various establishments. Sandwich samples were collected from convenience stores, discount stores, sandwich chain stores, bakery shops, fast-food chain stores, and food service operations located in Daegu and Gyeongbuk. Out of 174 samples, 18 (10.3%) contained coagulase positive staphylococci with counts ranging from 0.30 to 4.08 log CFU/g. There was significant seasonal difference in Staphylococcus aureus isolation; the average count in summer (3.24 log CFU/g) was 3 times higher than that of winter (1.10 log CFU/g) (P<0.001). According to the microbiological guidelines of PHLS for ready-to-eat foods, 95.4% of the samples were acceptable. As a result of enterotoxin producing experimental data ($35^{\circ}C$, pH 5.8, NaCl 0.5%), enterotoxin was not produced in a sandwich until Staphylococcus aureus increased to a level greater than 4.95 log CFU/g. This microbiological hazard analysis data could be applied to future studies on quantitative risk assessment of ready-to-eat foods.