• Title/Summary/Keyword: 우회정보

Search Result 441, Processing Time 0.028 seconds

Vessel skeletonization in X-ray angiogram for coronary artery roadmap generation (관상동맥의 로드맵 형성을 위한 X-ray angiogram 에서의 혈관골격추출)

  • Yun, Hyun-Joo;Song, Soo-Min;Kim, Myoung-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1661-1664
    • /
    • 2005
  • 본 논문에서는 computer-aided analysis 의 일환으로 X-ray 심혈관 조영도를 이용하여 관상동맥의 구조를 보여주는 방법에 대해 제시하고자 한다. 관상동맥 폐색증 환자들에게 시술되는 스텐트 삽입 시술이나 관상동맥 우회로 시술을 할 때에는 X-ray 의 조영 영상이 매우 중요한 시술의 기준이 되고 있으며, 조영 영상에서 혈관을 빠르고 정확하게 인식하는 것은 시술의 필수 조건이다. 이러한 시술중의 혈관구조 인식을 돕기 위하여 본 논문에서는 심혈관 조영 영상으로부터 관상동맥의 골격을 추출하기 위한 방법을 제안한다. 본 논문에서는 혈관 구조 추출을 위하여 3 단계 알고리즘을 제시한다. 첫번째 단계에서는 조영도에서 잡음을 제거하기 위하여 동질영역을 블러링할 수 있는 speckle reducing anisotropic diffusion 을 이용한 이미지 필터링을 수행한다. 이 필터링은 영상내 잡음을 제거하고 혈관의 경계선을 강화하여 정확한 영상인식을 가능하게 한다. 두번째 단계에서는 영상 내에서 보여지는 주요 혈관을 분할하는 것이다. 이 영상분할에는 canny edge detection 과 개선된 영역확장법(adaptive region growing)을 동시에 이용하는 복합적 분할기법이 수행된다. 세번째 단계에서는 형태학적 기법(Morphology)을 이용하여 분할결과의 부족한 부분을 보완하고 골격화를 수행하여 정확한 혈관 구조를 추출해낸다. 실험을 위해서는 정상인의 관상동맥 영상 뿐 아니라 혈관이 가늘어지는 폐색이 관찰되는 환자의 영상에 대해서도 실험하였다. 또한 논문에서 제시한 알고리즘에 대한 검증을 위하여 실험 결과들은 의료진의 감수를 거쳤다.

  • PDF

Intelligent Malicious Web-page Detection System based on Real Analysis Environment (리얼 분석환경 기반 지능형 악성 웹페이지 탐지 시스템)

  • Song, Jongseok;Lee, Kyeongsuk;Kim, Wooseung;Oh, Ikkyoon;Kim, Yongmin
    • Journal of KIISE
    • /
    • v.45 no.1
    • /
    • pp.1-8
    • /
    • 2018
  • Recently, distribution of malicious codes using the Internet has been one of the most serious cyber threats. Technology of malicious code distribution with detection bypass techniques has been also developing and the research has focused on how to detect and analyze them. However, obfuscated malicious JavaScript is almost impossible to detect, because the existing malicious code distributed web page detection system is based on signature and another limitation is that it requires constant updates of the detection patterns. We propose to overcome these limitations by means of an intelligent malicious code distributed web page detection system using a real browser that can analyze and detect intelligent malicious code distributed web sites effectively.

Faster Detouring for Data Plane Failures in Software Defined Networks (SDN에서 데이터 평면 장애를 해결하는 빠른 우회 기법)

  • Thorat, Pankaj;Yeom, Sanggil;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.124-126
    • /
    • 2016
  • Successful deployment of the Software Defined Network (SDN) depends on its ability to cope up with network failures. There are various types of failures that may occur in an SDN. The most common are switch and link failures. It is necessary to recover the network from failures for a continuous service availability. But for the real-time services fast recovery from the failure is required to minimize the service disruption time. In the proposed work, we focused on minimizing the recovery time after the failure is detected. Once the failure is detected, the controller involvement is needed to dynamically reroute the failure disrupted flows from the failed component to an alternate path. The aim of the proposed scheme is to provide a traffic management scheme which can react to the dynamic network events by rapidly modifying the forwarding behavior of the switches for faster in-band network adaptability. The proposed scheme (1) Considers the shared data and control path delay (2) Optimally utilize the network resources (3) Eliminates the need of constant monitoring overhead at the controller which results into faster detouring and ultimately rapid recovery.

Introduction to Responsibility Game System of Web Board Games (웹보드게임의 책임게임시스템 도입)

  • Han, Sang-geun;Song, Seung-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.388-389
    • /
    • 2015
  • After being enforced web board game enforcement ordinance, the majority manufacturer of sales that had been operating a web board game was greatly reduced. This restriction is true and that it had a significant impact in preventing exchange and gambling resistance, abnormal use has occurred to still bypass. Therefore, in this study, you can either leave a note of the 'Web Board' sunset enforcement ordinance, and how the debate any changes are necessary and alternative dimension approach, especially we try to study an unusual user patterns that utilize the game system of responsibility as an alternative.

  • PDF

Efficient Seamless Handover Protocol in Network Mobility (NEMO) Environment (네트워크 이동성 환경에서 효율적인 Seamless 핸드오버 프로토콜)

  • Kim, Jong-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.173-178
    • /
    • 2011
  • In this paper, we propose an efficient seamless handover protocol in NEMO environment. Yokoda et al 4. proposed fast handover method with collaboration of access routers in local network and Teraoka et al. 1 showed fast handover method with collaboration of layers in mobile network. These methods can delay the time of overall binding update and increase packets loss when link of router is unstable because they transport packets through only one path or link of router. And they don't also mention redirection method of packets in their protocol in case of unstable link state of routers. The proposed protocol can execute fast binding update and reduce packets loss with collaboration of routers in mobile network.

User Oriented Autonomous Shopping Cart by Noncontacting User Interface (비접촉성 사용자 인터페이스를 통한 사용자지향 자율주행 쇼핑카트 시스템)

  • Moon, Mi-Kyeong;Kim, Gwang-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.83-89
    • /
    • 2015
  • we suggest a shopping cart system following the wheelchairs autonomously for the disabled to do shop easily. This system have been developed in order for a cart to follow the disabled using wheelchairs automatically without pulling a cart directly. This system use kinnect and an radio control car (RC-car). The kinnect detect whether movement of disabled is right turn, left turn or straight and according to this result the RC-car can be controlled autonomously. By this system, the disabled using wheelchairs can do shopping more easily than before.

A Study regarding IP Traceback designs and security audit data generation. (IP 역추적 설계 및 보안감사 자료생성에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.53-64
    • /
    • 2007
  • Avoid at damage systems in order to avoid own IP address exposure, and an invader does not attack directly a system in recent hacking accidents at these papers, and use Stepping stone and carry out a roundabout attack. Use network audit Policy and use a CIS, AIAA technique and algorithm, the Sleep Watermark Tracking technique that used Thumbprints Algorithm, Timing based Algorithm, TCP Sequence number at network bases, and Presented a traceback system at TCP bases at log bases, and be at these papers Use the existing algorithm that is not one module in a system one harm for responding to invasion technology develop day by day in order to supplement the disadvantage where is physical logical complexity of configuration of present Internet network is large, and to have a fast technology development speed, and presentation will do an effective traceback system.

  • PDF

Emerging Image Cue CAPTCHA Resisting Automated and Human-Solver-Based Attacks (자동화 공격과 릴레이 공격에 저항하는 Emerging Image Cue CAPTCHA 연구)

  • Yang, Wonseok;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.531-539
    • /
    • 2017
  • CAPTCHA is a verification scheme whether or not a human user has made a service request. Most CAPTCHAs that are based on text, image, or simple game suffer from vulnerability that can be compromised by automated attacks and stream relay attacks. To resist such attacks, CAPTCHA that utilizes human recognition as been suggested but it show poor usability for deploying in the Internet. We propose an Emerging Image Cue CAPTCHA that offers improved usability and resists stream relay attacks, as well. We also examine the usability of the proposed CAPTCHA and investigate the attack resistance by conducting user study and experiments on simulated network environment.

A Study of Application Layer Traceback Through Intelligent SQL Query Analysis (지능형 SQL Query 분석을 통한 Application Layer 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.265-268
    • /
    • 2010
  • Current Traceback is difficult due to the development of bypass technique Proxy and IP-driven to trace the real IP Source IP is the IP traceback after the actual verification is difficult. In this paper, an intelligent about SQL Query field, column, table elements such as analysis of the value and the matching key values and Data used here to analyze source user hit point values for the user to trace the Application Layer IP for the analysis of forensic evidence guided by In this study, including forensic DB security will contribute to the development of electronic trading.

  • PDF

Design and Implementation of Anti-reversing Code Evasion Framework for Intelligent Malware Analysis (지능형 악성코드 분석을 위한 안티리버싱 코드 우회 프레임워크 설계 및 구현)

  • Lee, SunJun;Kim, KyuHo;Shin, YongGu;Yi, Jeong Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.218-221
    • /
    • 2018
  • 최근 악성코드의 수가 급격하게 증가하고 있으며 단순히 악성 행위를 하는 것 뿐 아니라 안티디버깅과 같은 다양한 분석 방지 기능을 탑재하여 악성코드의 분석을 어렵게 한다. 역공학 방지 기법이 적용된 지능형 악성코드를 기존 분석 도구를 사용하여 분석하면 악성행위를 하지 않거나 임의로 자기 자신을 종료시키는 방식으로 분석이 용이하지 않다. 이러한 지능형 악성코드들은 분석하기 어려울 뿐만아니라 기존 백신의 탐지 기능에 전혀 제약을 받지 않는다. 본 논문은 이와 같은 최신 지능형 악성코드에 보다 빠르게 대처하기 위해 역공학 방지 기법이 적용된 악성코드들이 메모리상에서 종료되지 않고 정상 동작하여 악성행위를 자동으로 파악할 수 있는 동적 코드 계측 프레임워크를 제안한다. 또한, 제안한 프레임워크를 개념 검증하기 위해 프로토타입을 설계 및 구현하고, 실험을 통해 그 유효성을 확인한다.