• Title/Summary/Keyword: 공격 분석

Search Result 3,023, Processing Time 0.062 seconds

Clinical Outcome of Parosteal Osteosarcoma (방골성 골육종의 임상결과)

  • Song, Won Seok;Jeon, Dae-Geun;Cho, Wan Hyeong;Kong, Chang Bae;Cho, Sang Hyun;Lee, Kwang Ryul;Lee, Soo-Yong
    • The Journal of the Korean bone and joint tumor society
    • /
    • v.19 no.1
    • /
    • pp.20-27
    • /
    • 2013
  • Purpose: The purpose of this study was to evaluate the oncologic outcomes of parosteal osteosarcoma (POS) and to ascertain the fates of patients after local recurrence (LR). Materials and Methods: The authors retrospectively reviewed 22 POS patients with an average follow-up of 114 months (range: 36-235 months). Seven of the 22 patients were referred after LR. There were 17 Stage IB and 5 Stage IIB (G2, 2; dedifferentiation, 3). Tumors were located in the femur (11) and in other locations (11). Initial surgical margins were wide in 10, marginal in 5, and intralesional in 7. Correlations between clinico-pathologic variables and LR and clinical courses after LR were evaluated. Results: The 10-year overall survival rate was 85.7%. Three (14%) patients developed distant metastasis and all of them succumbed to the disease. Nine (41%) patients developed LR. Tumor location, resection type, and surgical margin were found to be correlated with LR. At final follow-up, 7 of the 9 patients that experienced local failure achieved no evidence of disease. Conclusion: A substantial risk of misdiagnosis exists, especially for POS in other than a femoral location. Recurrent tumor re-excision is possible in most cases; however, patients with an aggressive recurrence pattern deserve special attention.

The Relation Between Length of Institutionalization and Sensory Modulation for Preschooler (취학 전 시설보호 아동의 수용기간과 감각조절기능과의 관계)

  • Park, Mi-Sun;Song, Ji-Hun;Hyoun, Hyo-Jin;Kim, Kyoung-Mi
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.7 no.1
    • /
    • pp.59-69
    • /
    • 2009
  • Objective : The purpose of the study is to examine the length of institutionalization and sensory modulation for preschooler without disabilities, and to investigate the relationship between the length of institutionalization and behavioral problem. Method : Mothers of preschoolers without disabilities between ages of 3 and 7 who attend D kindergarten was participated. Nursery school teacher of institutionalized children without disabilities between ages of 3 and 7 who attend child-welfare facilities was participated. We used Short Sensory Profile(SSP) and Children Behavior Check list. The results were analyzed with SPSS 11.0. Results : There was no significant difference between longer length of institutionalization and shorter length of institutionalization in sensory modulation and behavioral problem. Regarding the sensory modulation and behavior problem according to child-welfare facilities, means showed the statistically significant difference. Regarding sensory modulation of test items, movement sensitivity and low energy/weak showed the statistically significant difference in home-reared children than institutionalized children. Conclusions : The results of the study showed high correlation environmental effect in institutionalized children. Further research is needed to improve environmental for institutionalized children.

  • PDF

A Proactive Secret Image Sharing Scheme over GF(28) (유한 체상에서의 사전 비밀이미지 공유 기법)

  • Hyun, Suhng-Ill;Shin, Sang-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.577-590
    • /
    • 2013
  • Shamir's (k,n)-threshold secret sharing scheme is not secure against cheating by attacker because the signature of participants is omitted. To prevent cheating, many schemes have been proposed, and a proactive secret sharing is one of those. The proactive secret sharing is a method to update shares in the secret sharing scheme at irregular intervals. In this paper, a proactive image secret sharing scheme over $GF(2^8)$ is proposed for the first time. For the past 30 years, Galois field operation is widely used in order to perform the efficient and secure bit operation in cryptography, and the proposed scheme with update phase of shadow image over $GF(2^8)$) at irregular intervals provides the lossless and non-compromising of secret image. To evaluate security and efficiency of images (i.e. cover and shadow images) distortion between the proposed scheme and the previous schemes, embedding capacity and PSNR are compared in experiments. The experimental results show that the performances of the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.

The relation between sensory processing ability and interpersonal problem of some university students (일부 대학생의 감각처리능력과 대인관계문제와의 관계)

  • Lee, Ji-Hyun;Nam, Taek-Gill
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.6
    • /
    • pp.2780-2787
    • /
    • 2013
  • This research was conducted to find out the relation between sensory processing ability and Interpersonal Problem of university students. The subjects were 177 university students whose curricula were similar. The researchers made the subjects fill out the Adolescent/Adult sensory profile and Korean inventory of interpersonal problem(KIIP). The analysis of the relevancy between the Adolescent/Adult profile and the Interpersonal problem showed that 'Low Registration' is related to all aspects of KIIP. 'Sensation Seeking' showed relation with Domineering/Controlling(r=0.150, p<0.05), self sacrificing(r=0.175, p<0.05), Intrusive (r=0.218, p<0.01), Interpersonal sensitivity(r=0.196, p<0.01), and Need for social approval(r=0.149, p<0.05). 'Sensation Sensitivity' showed relation with all aspects of KIIP. 'Sensation avoiding' showed relatively high relation with Domineering/ Controlling(r=0.403, p<0.01), Vindictive(r=0.420, p<0.01), Interpersonal ambivalence (r=0.452, p<0.01), and aggression(r=0.417, p<0.01). Through this research, it turned out that 'Sensory Processing ability' and the Interpersonal Problem are generally related, especially 'Low Registration' and 'Sensation Sensitivity' are highly related to the Interpersonal Problem.

User Integrated Authentication System using EID in Blockchain Environment (블록체인 환경에서 EID를 이용한 사용자 통합 인증 시스템)

  • Kim, Jai-Yong;Jung, Yong-Hoon;Jun, Moon-Seog;Lee, Sang-Beon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.24-31
    • /
    • 2020
  • Centralized systems in computing environments have various problems, such as privacy infringement due to hacking, and the possibility of privacy violations in case of system failure. Blockchain, one of the core technologies for the next generation of converged information, is expected to be an alternative to the existing centralized system, which has had various problems. This paper proposes a blockchain-based user authentication system that can identify users using EID in an online environment. Existing identification (ID)/password (PW) authentication methods require users to store personal information in multiple sites, and receive and use their respective IDs. However, the proposed system can be used without users signing up at various sites after the issuing of an EID. The proposed system issues an EID with a minimum of information, such as an e-mail address and a telephone number. By comparing the stability and efficiency of a centralized system, the proposed integrated authentication system proved to be excellent. In order to compare stability against existing systems, we chose attack methods and encroachments on the computing environment. To verify efficiency, the total throughput between the user's app, the issuance and certification-authority's servers, and the service provider's servers was compared and analyzed based on processing time per transaction.

A Study on the estimation of shelf-life and assessment plan of illuminating cartridges for mortar (박격포용 조명탄의 저장수명 예측 및 평가방안 연구)

  • Lee, Jongchan;Lee, Junhyuk;Jung, Hyunsuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.291-300
    • /
    • 2020
  • The cartridges used for illuminating a desired point or area are virtually limited in tests and evaluations because of limitations, such as noise during launch, the possibility of fires caused by illuminant charge, and the annual testable quantity. Therefore, to solve these problems, a ground fixed test, which replaces the firing test, or an evaluation method to perform limited tests, can be applied more efficiently. In this paper, the results of an 81mm illuminating cartridge, KM series performed in 2019 were analyzed comprehensively to identify the trends in reliability and quality characteristics and to estimate the shelf life. The shelf life was estimated to be at least 10 years based on the time when the lower confidence level reached 80% at a confidence level of 90%. Considering only major defects, the shelf life can be estimated to be approximately 23 years. On the other hand, the shelf life was estimated to be approximately 11 to 15 years and 25 to 28 years according to the effective illuminating time. Finally, an assessment plan of illuminating cartridges for the mortars was also presented as an improvement plan for an assessment method in the future.

A Method of Detecting the Aggressive Driving of Elderly Driver (노인 운전자의 공격적인 운전 상태 검출 기법)

  • Koh, Dong-Woo;Kang, Hang-Bong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.11
    • /
    • pp.537-542
    • /
    • 2017
  • Aggressive driving is a major cause of car accidents. Previous studies have mainly analyzed young driver's aggressive driving tendency, yet they were only done through pure clustering or classification technique of machine learning. However, since elderly people have different driving habits due to their fragile physical conditions, it is necessary to develop a new method such as enhancing the characteristics of driving data to properly analyze aggressive driving of elderly drivers. In this study, acceleration data collected from a smartphone of a driving vehicle is analyzed by a newly proposed ECA(Enhanced Clustering method for Acceleration data) technique, coupled with a conventional clustering technique (K-means Clustering, Expectation-maximization algorithm). ECA selects high-intensity data among the data of the cluster group detected through K-means and EM in all of the subjects' data and models the characteristic data through the scaled value. Using this method, the aggressive driving data of all youth and elderly experiment participants were collected, unlike the pure clustering method. We further found that the K-means clustering has higher detection efficiency than EM method. Also, the results of K-means clustering demonstrate that a young driver has a driving strength 1.29 times higher than that of an elderly driver. In conclusion, the proposed method of our research is able to detect aggressive driving maneuvers from data of the elderly having low operating intensity. The proposed method is able to construct a customized safe driving system for the elderly driver. In the future, it will be possible to detect abnormal driving conditions and to use the collected data for early warning to drivers.

Efficacy of levetiracetam in refractory childhood epilepsy (난치성 소아 간질에서 levetiracetam의 효과)

  • Lee, Keon-Su;Kang, Joon-Won
    • Clinical and Experimental Pediatrics
    • /
    • v.53 no.4
    • /
    • pp.571-578
    • /
    • 2010
  • Purpose : To evaluate the efficacy and safety of levetiracetam adjunctive therapy for reducing the rate of seizure frequency in children with intractable pediatric epilepsy. Methods : We reviewed the medical records of 86 patients with intractable pediatric epilepsy who visited our hospital between March 1989 and February 2009. Levetiracetam was included in the previous anticonvulsant regimen for at least 6 months and the reduction in the rate of seizure frequency was determined in follow-up examinations. We analyzed demographic data, seizure types, antiepileptic drug history, levetiracetam dose, adverse effects of levetiracetam therapy, treatment outcome, electroencephalogram findings, etc. Results : More than 50% reduction in the seizure frequency was observed in 62 of the 86 (72.1%) patients; 44 patients (51.1%) became seizure free, while the seizure frequency increased in 5.8% patients. The associations between seizure reduction rate and age, associated diseases, seizure types, and seizure frequency before treatment were not significant. However, the duration of disease, dose of levetiracetam, duration and frequency of anticonvulsant administration before levetiracetam therapy were significantly correlated. Electroencephalogram findings and the cause of epilepsy showed partial correlation. Forty (46%) patients showed adverse symptoms; the symptoms in the order of their frequency were somnolence, hyperactivity, irritability, aggressiveness, tiredness, etc. Conclusion : The findings of our study provide the evidence that levetiracetam adjunctive therapy is efficacious and well tolerated in various refractory childhood epilepsy cases.

Counter-Terrorism Policy of Mongolia: Raising Awareness on Terrorism (몽골의 대테러 정책: 테러인식 제고)

  • Urangoo, Khash-Erdene;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.155-173
    • /
    • 2019
  • This study touches upon the challenges of globalization, in which terrorism is one of the most brutal forms of criminal violence targeting innocent people. No country is immune from terrorist attacks, and no person is immune from becoming a victim. Interest in this topic is increasing as terrorism, in all its forms and manifestations, in its scale and intensity, and in its inhumanity and cruelty, is now becoming one of the most acute and pressing problems of global importance. Legal regulations passed in Mongolia in 2004 have established a structure to prevent and detect terrorist threats. However, the country's anti-terrorism policy should be improved with respect to its global counter-terrorism strategy. Because Mongolia is a comparatively safe country in the region, the people do not consider terrorism to be a real threat. This study aims to suggest methods to quickly raise awareness and create a security culture to improve Mongolia's long-term terrorism prevention policy. In particular, the authors review Mongolia's anti-terrorism policy, focusing on legal regulations, and suggest education methods to raise terrorism awareness for the public as a primary preventive measure. The study also presents a comparative analysis and a summary conclusion by examining international legal acts, conventions on new manifestations of terrorism, the foundations of laws and regulations of Mongolia, and related research on terrorism.

Stereo Image Blind Watermarking Scheme based-on Discrete Wavelet Transform and adaptive Disparity Estimation (웨이블릿 변환과 적응적 변이 추정을 이용한 스테레오 영상 블라인드 워터마킹)

  • Ko Jung-Hwan;Kim Sung-Il;Kim Eun-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2C
    • /
    • pp.130-138
    • /
    • 2006
  • In this paper, a new stereo image watermarking scheme based-on adaptive disparity estimation algorithm is proposed. That is, a watermark image is embedded into the right image of a stereo image pair by using the DWT and disparity information is extracted from this watermarked right image and the left image. And then, both of this extracted disparity information and the left image are transmitted to the recipient through the communication channel. At the receiver, the watermarked right image is reconstructed from the received left image and disparity information through an adaptive matching algorithm. a watermark image is finally extracted from this reconstructed right image. From some experiments using CCETT's 'Manege' and 'Friends' images as a stereo image and English alphabet '3DRC' as a watermark image, it is found that the PSNRs of the watermarked image from the reconstructed right images through the adaptive matching algorithm & DWT is improved 2.03 dB, 3.03 dB and robusted against various attacks. These experimental results also suggest a possibility of practical implementation of an adaptive matching also-rithm-based stereo imagewatermarking scheme proposed in this paper.