• Title/Summary/Keyword: worm development

Search Result 115, Processing Time 0.025 seconds

Development of resistance to reinfection by Clonorchis sinensis in rats

  • Chung, Byung-Suk;Zhang, Hong-Man;Choi, Min-Ho;Jeon, Deog-Kyu;Li, Shun-Yu;Lee, Me-Jeong;Hong, Sung-Tae
    • Parasites, Hosts and Diseases
    • /
    • v.42 no.1
    • /
    • pp.19-26
    • /
    • 2004
  • We investigated the induction of resistance to Clonorchis sinensis infection by prior infection in rat and hamster models. Animals were challenged with C. sinensis metacercariae, then treated with praziquantel and reinfected. Worm recovery rate in reinfected animals was used to estimate resistance to reinfection. The determined resistance rates to reinfection in rats and hamsters were 97.7% and 10.3%, respectively. In rats, cure from the primary infection of C. sinensis increased resistant to reinfection, and the greatert the worm burden and the longer the duration of primary infection, the higher was the resistance rate. For primary infection doses of 10, 40 and 100 metacercariae per rat, the resistance rates were 87.4%, 93.8% and 98.4%, respectively. The resistance rates in rats after 2 or 8-week primary infection were 78.7% and 95.3%, respectively. All worms recovered from reinfected rats were immature. When cured rats were administered with methylprednisolone, resistance to reinfection became impaired. These findings indicate that rats develop a high degree of resistance to reinfection by C. sinensis after cure. The growths and maturations of reinfected worms were also impaired.

A Probabilistic Model of Damage Propagation based on the Markov Process (마코프 프로세스에 기반한 확률적 피해 파급 모델)

  • Kim Young-Gab;Baek Young-Kyo;In Hoh-Peter;Baik Doo-Kwon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.524-535
    • /
    • 2006
  • With rapid development of Internet technology, business management in an organization or an enterprise depends on Internet-based technology for the most part. Furthermore, as dependency and cohesiveness of network in the communication facilities are increasing, cyber attacks have been increased against vulnerable resource in the information system. Hence, to protect private information and computer resource, research for damage propagation is required in this situation. However the proposed traditional models present just mechanism for risk management, or are able to be applied to the specified threats such as virus or worm. Therefore, we propose the probabilistic model of damage propagation based on the Markov process, which can be applied to diverse threats in the information systems. Using the proposed model in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

Study on the meaning of bio-design by metamorphosis and its possibility of utilizing (변태에 의한 바이오 디자인의 의미와 이의 활용 가능성에 대한 고찰)

  • Cho, Eun-Haun;Park, Jeong-Soon
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.431-439
    • /
    • 2016
  • Designers are implementing the trial for enhancing human happiness and quality of life. As the happiness factor experienced by each individual is diverse based on human economic growth, absolute design has reached the limitations. A tool to represent the speedy development of change in consumption and problem shooting methods is necessary. Currently, no tool exists that develops in response to changing conditions and subsequent changes. As the solution to this necessity, worm's metamorphosis would be meaningful in design whereby tools exist and necessity as well as solution methods are in advanced change. Rice continues growth following the season, and no single method exists to remove the germs and worms. This study clarified the problems to be resolved by staging the lifetime of rice in 5 stages in environmental changes and conditions. This worm in metamorphosis design is developing brilliantly in biotechnology. However, the environment and conditions that bring happiness to humans do evolve, and this study aims to be the academic research for the design which accordingly replaces the tools.

Characteristics of Friction Stir Lap Weldment according to Joining Parameter in 5052 Aluminium Alloy (5052 알루미늄 합금에서 접합변수에 따른 겹치기 마찰교반접합부의 특성)

  • Ko, Young-Bong;Park, Kyeung-Chae
    • Journal of the Korean institute of surface engineering
    • /
    • v.45 no.5
    • /
    • pp.181-187
    • /
    • 2012
  • The Friction Stir Welding (FSW) has mainly been used for making butt joints in Al alloys. The development of Friction Stir Lap Welding (FSLW) would expand the number of applications. In this study, microstructures and mechanical properties of FSLW in A5052 alloy were investigated under varying rotating speed and probe length. Investigating the characteristics as FSLWed conditions were as below ; Failure Maximum load by shear fracture was increased proportional to the width of joint area, which was increased by input heat, stirring intensity in the case of 2.3 mm probe length. Tensile fracture occurred, and maximum load was determined due to side worm hole of joint area and softening of microstructure in the case of 3.0 mm probe length. In the case of 3.7 mm probe length, material hook and bottom worm hole were appeared at the end interface of joint area. The most sound FSLW condition with no defects was 3.0 mm probe length and 1500 rpm-100 mm/min. No defects were showed in 1500 rpm-100 mm/min and 1800 rpm-100 mm/min, but Vickers microhardness distribution in TMAZ/HAZ which was fracture zone was lower in 1800 rpm-100 mm/min than in 1500 rpm-100 mm/min. In this condition highest tensile strength, 215 MPa (allowable rate 78% of joint efficient) was obtained.

Occurrence of Insect Pest from Organic Seed Producing Field of Minor Grain Germplasms (잡곡유전자원을 이용한 유기종자생산 포장의 해충발생 소장)

  • Kim, Jeong-Soon;Ko, Ho-Cheol;Yoon, Sung-Tag;Cho, Yang-Hee;Kim, Jung-Gun;Shim, Chang-Ki
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.55 no.1
    • /
    • pp.58-64
    • /
    • 2010
  • This study was carried out to screen the occurrence of insect pest on the organic seed producing field of minor grain germplasms, Pearl millet (Setaria italic L.), Sorghum (Sorghum bicolor L.), and Common millet (Panicum miliaceum L.) in Gangwon-do from 2008 to 2009. The artificial pheromone traps successfully attracted an Oriental corn borer, Ostrinia furnacalis (Guenee) on Pearl millet, but the Army worm, Pseudaletia separata, was not attracted in all of the minor grain fields. The ratio of damaged plants of Oriental corn borer and Army worm were appeared in order with Pearl millet, Common millet, and Sorghum. The morphological diversities of plant bug were shown as four kinds of species, Eastern green stinkbug (Nezara antennata), Brown-marmorated stinkbug (Halyomorpha halys), Sloe bug (Dolycoris baccarum), and Bean bug (Riptortus clavatus), on the organic seed producing field of minor grain. The average occurrence density of Eastern green stinkbug was the highest level in the three kind of minor grains, Pearl millet, Common millet, and Sorghum in 2008 and 2009. The dominant species are the Eastern green stinkbug and the Bean bug in Pearl millet and Common millet. The Sloe bug and the Bean bug possessed the highest population density in Sorghum.

Intrusion Prevention Using Harmful Traffic Analysis (유해 트래픽 분석을 이용한 침입 방지)

  • Chang, Moon-Soo;Koo, Hyang-Ohk;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.173-179
    • /
    • 2005
  • The continuous development of computing technique and network technology bring the explosive growth of the Internet, it accomplished the role which is import changes the base facility in the social whole and public infra, industrial infrastructure, culture on society-wide to Internet based environment. Recently the rapid development of information and technology environment is quick repeated the growth and a development which is really unexampled in the history but it has a be latent vulnerability, Therefore the damage from this vulnerability like worm, hacking increases continually. In this paper, in order to resolve this problem, implement the analysis system for harmful traffic for defending new types of attack and analyzing the traffic takes a real-time action against intrusion and harmful information packet.

  • PDF

Intrusion Detection Using Bayesian Techniques on the IPv6 Environment (IPv6 환경에서의 베이지안 기법을 이용한 침해탐지)

  • Koo, Min-Jeong;Min, Byoung-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.385-387
    • /
    • 2006
  • The rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. The IPv6 environment combined the home network and All-IP Network with has arrived, the damages cased by the attacks from the worm attacks and the various virus has been increased. the In this paper, intrusion detection method using Attack Detection Algorithm Using Bayesian Techniques on the IPv6 Environment.

  • PDF

Development of the CAMSsystem for CNC Hob Relieving Lathe (CNC 호브 릴리빙 선반의 CAM 시스템 개발)

  • 양희구;김석일;박천홍;류근수
    • Korean Journal of Computational Design and Engineering
    • /
    • v.1 no.2
    • /
    • pp.150-157
    • /
    • 1996
  • The hob is considered as an effective gear cutting tool for achieving the various gears such as spur gear, helical gear, worm gear and so on. To enhance the productivity and precision of hobs and the competitive ability of domestic CNC hob relieving lathes, a CAM system for CNC hob relieving lathe needs to be realized. In this study, the CAM system is developed based on the personal computer and C language. Besides the automatic generation of CNC data, the developed CAM system has the various capabilities related to the generation of tool path, the cutting simulation for verifying the generated CNC data and forecasting the cutting time, the DNC operation for communicating the CNC data with CNC controller by RS232C port, and the estimation of undercut length for verifying the hob cutting conditions.

  • PDF

Design of Harmful Traffic Analysis System (유해트래픽 분석 시스템 설계)

  • Chang Moon-Soo;Koo Hyang-Ohk;Oh Chang-Suk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.87-90
    • /
    • 2005
  • The rapid development of computing and network environment has brought about the potential vulnerability. Therefore the damage from this vulnerability like Worm, hacking increases continually. In order to resolve this problem, implement the analysis system for mischievous traffic for defending new types of attack and analyzing the traffic takes a real-time action against intrusion and harmful information packet.

  • PDF

DDoS Attack Detection using SNMPGET (SNMPGET을 이용한 DDoS 공격 탐지)

  • 박한상;유대성;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.278-282
    • /
    • 2004
  • Recently traffic flooding attack has happened faster and faster owing to expansion of the worm attack and development of the method of traffic flooding attack. The method in the past time is problematic in detecting the recent traffic flooding attacks, which are running quickly. Therefore, this paper aims to establish the algorithm which reduces the time of detection to traffic flooding attack in collecting and analyzing traffics.

  • PDF