• Title/Summary/Keyword: 의심

Search Result 1,782, Processing Time 0.033 seconds

Diagnostic Value of the Intradermal Test for the Infection with Clonorchis sinensis (간흡충증 진단을 위한 피내반응검사의 의의)

  • Kim, Jong-Ho;Yun, Bong-Yung;Lee, Heun-Ju;Lee, Hyun-Woo
    • Journal of Yeungnam Medical Science
    • /
    • v.5 no.2
    • /
    • pp.47-52
    • /
    • 1988
  • The intradermal(ID) test has been widely used in Korea and several reports about the results of the ID test are known. We examined the egg of Clonorchis sinensis(C. s.) by ID test in 443, stool's egg-counting technique in 79 and direct smear(cellophane thick smear technique) in 1304 subjects. The results are as follows.: 1. The positive rate of C. s. was 3.8% out of 1304 persons. 2. The sensitivity of ID test was 82.1% out of 39 persons and, the specificity was 64.6% out of 404 persons. 3. The false positive of ID test 35.4% out of 404 persons and, the false negative was 17.9% out of 39 persons. Intradermal test is a rapid, sensitive and useful supplementary diagnostic tool for the detection of Clonorchiasis infection and must be used as screening test with direct smear of stool but cross reaction with other helminth infections and moderate false reaction are the main disadvantages in its practical application.

  • PDF

A Realtime Malware Detection Technique Using Multiple Filter (다중 필터를 이용한 실시간 악성코드 탐지 기법)

  • Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.77-85
    • /
    • 2014
  • Recently, several environment damage caused by malicious or suspicious code is increasing. We study comprehensive response system actively for malware detection. Suspicious code is installed on your PC without your consent, users are unaware of the damage. Also, there are need to technology for realtime processing of Big Data. We must develope advanced technology for malware detection. We must analyze the static, dynamic of executable file for fundamentally malware detection in recently and verified by a reputation for verification. It is need to judgment of similarity for realtime response with big data. In this paper, we proposed realtime detection and verification technology using multiple filter. Our malware study suggests a new direction of realtime malware detection.

A Slow Portscan Attack Detection and Countermove Mechanism based on Fuzzy Logic (퍼지 로직을 이용한 느린 포트스캔 공격 탐지 및 대응 기법)

  • Kim, Jae-Kwang;Yoon, Kwang-Ho;Lee, Seung-Hoon;Jung, Je-Hee;Lee, Jee-Hyong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.679-684
    • /
    • 2008
  • The slow port scan attack detection is the one of the important topics in the network security. We suggest an abnormal traffic control framework to detect slow port scan attacks using fuzzy rules. The abnormal traffic control framework acts as an intrusion prevention system to suspicious network traffic. It manages traffic with a stepwise policy: first decreasing network bandwidth and then discarding traffic. In this paper, we show that our abnormal traffic control framework effectively detects slow port scan attacks traffic using fuzzy rules and a stepwise policy.