• Title/Summary/Keyword: 위장의

Search Result 1,434, Processing Time 0.03 seconds

Clinical Analysis of Foreign Bodies in Gastrointestinal Tract in Children (소아에서 위장관내 이물질의 임상적 고찰)

  • Choi, Eunsoo;Lee, Hyo Gyun;Choi, Soo Jin Na;Chung, Sang Young
    • Advances in pediatric surgery
    • /
    • v.20 no.1
    • /
    • pp.12-16
    • /
    • 2014
  • Foreign body ingestion is a common problem among paediatric populations. Most of the ingested foreign bodies spontaneously pass through the gastrointestinal tract, but approximately less then 10% of them remain without being discharged, and trigger complications. Therefore, proper evaluation and treatment according to the situation is required. In this study, clinical progress and complications were analyzed according to the clinical features and treatment in children who ingested foreign bodies. Among pediatric patients under 18 who were admitted to Chonnam National University Hospital after ingesting foreign bodies between January 2008 to June 2012, only the patients who had their foreign body in the gastrointestinal tract were included in this study. Based on medical records, age, type of foreign body, time spent till admission, and whether the endoscopy was done or not, complication were researched retrospectively. According to symptoms and plain abdomen X-ray findings, treatment was chosen and conducted among endoscopy, observation and emergency operation. Among 273 patients, 9 (3.3%) of them had surgical removal. Seven (2.6%) of them had an emergency operation on the day of admission, and the rest 2 (0.7%) had operation during observation. Removal through initial endoscopic approach was tried in 157 (57.5%) patients. Eleven (70.8%) of them had their foreign body removed at the initial trial, and 5 (4.9%) of them at the second trial. Among 109, who were on observation status, 9 (8.3%) of them needed endoscopic removal, and 2 (1.8%) of them suffered from surgical removal. It is thought to be better to approach slowly considering the type, size and symptoms in foreign body ingestion of pediatric patients, rather than immediate and invasive removal.

A case of multicystic dysplastic kidney and cystic adenomatoid malformation of the lung identified as incidental findings (우연히 발견된 편측성 다낭성 신 이형성증과 폐의 선천성 낭성 선종양 기형이 합병된 증례)

  • Lee, Sun-Joo;Lee, Ji-Hun;Kim, Hyun-Hee;Kim, So-Young;Hahn, Seung-Hoon;Hwang, Ja-Young;Lee, Wonbae
    • Clinical and Experimental Pediatrics
    • /
    • v.49 no.7
    • /
    • pp.796-799
    • /
    • 2006
  • Multicystic dysplastic kidney and congenital cystic adenomatoid malformation of the lung are independent disorders, but both result from abnormal morphogenesis during embryogenesis. Congenital cystic adenomatoid malformation of the lung is associated with renal anomalies as well as other extrapulmonary anomalies and almost all cases with these anomalies are stillborn. We report a case of a 21-month-old male who was admitted with the impression of acute infectious gastroenteritis; multicystic dysplastic kidney with congenital cystic adenomatoid malformation of the lung was detected incidentally during evaluation.

Radioprotective Effects of Dandelion(Taraxacum officinale) (민들레 추출물의 방사선 방호효과)

  • Choi, Jun-Hyeok;Ji, Tae-Jeong;Min, Byung-In
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.287-293
    • /
    • 2013
  • Dandelion(Taraxacum officinale), an oriental herbal medicine, has been shown to favorably affect choleretic, antioxidative and protection of gastric mucosa. The protective effects of common dandelion leaf and root extract were investigated by irradiation in Sprague-Dawley rats. Male SD rats, 6weeks, were orally injected with dandelion extract(100mg/kg) for 10days. Immediately after final injection, rats were whole body irradiated with 10Gy used irradiation facility(Elekta Linac, Sweden). At 24h-15days after irradiation, complete blood counted test and apoptosis in jejunal crypt cell. Stimulated recovery by the extract was observed in platelet but was not showed in the erythrocyte and leucocyte. The jejunal crypt cells were protected significantly(p<0.05) and the radiation-induced apoptosis was reduced(p<0.05). The survival rate were carried for 15days, the survival ratio was 15% and 85% for the control and experimental group. Observations intestinal inhibition of cell death, intestinal mucosa and tissue decreased systemic inflammation and vacuole. Base on these data, we propose that dandelion may be a useful radioprotector, especially since it is a relatively nontoxic natural product.

A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity (사용자 익명성을 보장하는 안전하고 개선된 원격 사용자 인증스킴)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.81-93
    • /
    • 2013
  • Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an common communication channel. Currently, smart card based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the mutual authentication. 2009 years, Wang et al.'s proposed a dynamic ID-based remote user authentication schemes using smart cards. They presented that their scheme preserves anonymity of user, has the feature of storing password chosen by the server, and protected from several attacks. However, in this paper, I point out that Wang et al.'s scheme has practical vulnerability. I found that their scheme does not provide anonymity of a user during authentication. In addition, the user does not have the right to choose a password. And his scheme is vulnerable to limited replay attacks. In particular, the parameter y to be delivered to the user is ambiguous. To overcome these security faults, I propose an enhanced authentication scheme, which covers all the identified weakness of Wang et al.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

Cultural Characteristics and Fruitbody Formation of Phellinus gilvus (Phellinus gilvus의 배양적 특성과 자실체 형성)

  • Rew, Young-Hyun;Jo, Woo-Sik;Jeong, Ki-Chae;Yoon, Jae-Tak;Choi, Boo-Sool
    • The Korean Journal of Mycology
    • /
    • v.28 no.1
    • /
    • pp.6-10
    • /
    • 2000
  • For artificial cultivation of Phellinus gilvus (Schw.) Pat we have conducted a study on cultural characteristics and condition of fruitbody formation. The optimum temperature was about $30^{\circ}C$ at pH $6.0{\sim}7.0$ for mycelial growth. Optimum sawdust media were oak sawdust+willow sawdust(5:5, V/V), oak sawdust+willow sawdust+rice bran (4.5:4.5:1, V/V) and oak sawdust+pine sawdust+rice bran(4.5:4.5:1, V/V) and, the spawn incubation period was about $25{\sim}26$ days. Mycelial growth in the inner portion of oak log was 200 mm after 60 days and duration for the first fruitbody primordia were formed about 90 days after inoculation.

  • PDF

A Design of MAC based SDAP(Secure Data Aggregation Protocol) for security and communication efficiency on VANET (VANET에서 보안과 통신효율을 고려한 MAC기반 SDAP(Secure Data Aggregation Protocol) 설계)

  • Lee, Byung-kwan;Ahn, Heui-hak;Jeong, Eun-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.650-652
    • /
    • 2013
  • As VANET(Vehicular Ad-hoc NETwork) improves road safety, efficiency, and comfort, and provides a value-added service such as commerce information or internet access. it is the most important technology in ITS(Intelligent Transportation System). But, In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. VANETs cannot get started without either of them. Therefore, to solve these problems simultaneously, this paper proposes MAC(Message Authentication Code) based SDAP(Secure Data Aggregation Protocol) which removes redundant data or abnormal data between vehicles and verifies the integrity of message. The MAC based SDAP not only improves the efficiency of data delivery but also enhances the security by detecting malicious attacks such as propagation jamming attack, forgery attack, and disguised attack.

  • PDF

Cryptanalysis and Enhancement of the An's Remote User Authentication Scheme using the Smart Cards (스마트카드를 이용한 An의 원격 사용자 인증 스킴의 안전성 분석 및 개선)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4612-4617
    • /
    • 2011
  • Hsiang-Shin proposed a user authentication scheme which was created by improving Yoon's scheme. Afterwards, An showed the failure to meet security requirements which are considered in user authentication using password-based smart card in Hsiang-Shih-suggested scheme. In other words, it was found that an attacker can steal a user's card, and detect a user's password by temporarily accessing it and extracting the information stored in it. However, An-proposed scheme also showed its vulnerability to password-guessing attack and forgery/impersonation attack, etc. and thus, this paper proposed the improved user authentication scheme. The proposed authentication scheme can thwart the password-guessing attack completely and this paper proposed scheme also includes an efficient mutual authentication method that can make it possible for users and authentication server to certify the other party.

A Design of Permission Management System Based on Group Key in Hadoop Distributed File System (하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계)

  • Kim, Hyungjoo;Kang, Jungho;You, Hanna;Jun, Moonseog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2015
  • Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.