• Title/Summary/Keyword: Analysis on Vulnerability

Search Result 975, Processing Time 0.023 seconds

Direct Relationship between Angiographic Characteristics of Carotid Atherosclerotic Plaque and Filling Defect in the Cerebral Protection Filters : Based on the Conventional Angiography

  • Choi, Jae-Hyung;Park, Hyun-Seok;Kim, Dae-Hyun;Cha, Jae-Kwan;Huh, Jae-Taeck;Kang, Myongjin
    • Journal of Korean Neurosurgical Society
    • /
    • v.54 no.2
    • /
    • pp.93-99
    • /
    • 2013
  • Objective : Neurologic complications during carotid artery stenting (CAS) are usually associated with distal embolic event. These embolic incident during CAS are highly associated with the carotid plaque instability. The current study was undertaken to identify the angiographic characteristics of carotid plaque vulnerability, which was represented as filling defect in the cerebral protection filters during CAS. Methods : A total of 107 patients underwent CAS with use of a distal protection filter. Angiographic carotid plaque surface morphology was classified as smooth, irregular, and ulcerated. To determine predictable factors of filling defect in the protection filters, 11 variables were retrospectively analyzed which might influence filling defect in the protection filters during CAS. Results : Filling defects during CAS were presented in the 33 cerebral protection filters. In multivariate analysis, angiographic ulceration [odds ratio (OR), 6.60; 95% confidence interval (CI) : 2.24, 19.4; p=0.001], higher stenosis degree (OR, 1.06; 95% CI : 1.00, 1.12; p=0.039), and coexistent thrombus (OR, 7.58; 95% CI : 1.69, 34.05; p=0.08) were highly associated with filling defect in the cerebral protection devices during CAS. Among several variables, angiographic surface ulceration was the only significant factor associated with flow stagnation during CAS (OR, 4.11; 95% CI : 1.33, 12.72; p=0.014). Conclusion : Plaque surface morphology on carotid angiography can be a highly sensitive marker of plaque instability during CAS. The independent risk factors for filling defect in the filter devices during CAS were plaque ulceration, stenosis degree, and coexistent thrombus.

A Study on the Penetration Characteristics of a Steel Fragment Impacting on the Target Plate of Aluminum 2024 (알루미늄 2024 표적에 대한 HE 탄두 파편의 관통 특성 연구)

  • Kim, Deuksu;Kang, Sunbu;Jung, Daehan;Chung, Youngjin;Park, Yongheon;Park, Seikwon;Hwang, Changsu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.3
    • /
    • pp.257-268
    • /
    • 2018
  • We have studied the damage mechanism of a metallic thin plate by the highly energetic fragments generated from high explosive(HE) warhead. The penetration process has presumed that the velocity of a fragment is in the range of 350 m/s to 3353 m/s, the thickness of Aluminum 2024 target plate is in the range of 1 mm~6.3 mm thick. The mass of fragment with hemisphere nose shape is in the range of 0.32 g to 16 g. The analytical solution for penetration process has been derived by using the report of the project THOR. The results of analysis implied that the closed forms by an exponentially decay function well fit the change of the ballistic limit velocity, loss velocity and loss mass of fragment as the mass of fragment and the thickness of target plate increase.

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).

Socioeconomic Characteristics of Single-Mother versus Single-Father Households of Children 12 or Younger: Focusing on Divorced Parents (12세 이하 아동이 있는 편부.편모 가구의 사회경제적 특성 비교: 이혼 부모를 중심으로)

  • Lee, Yean-Ju;Kim, Seung-Kwon
    • Korea journal of population studies
    • /
    • v.34 no.2
    • /
    • pp.17-43
    • /
    • 2011
  • With a substantial rise in divorce rates since the mid 1990s, single-parent households are increasing rapidly in Korea. Often it is believed that children in single-mother households suffer the most economically and socially with the marital disruption of the parents. This study hypothesizes that in Korea the socioeconomic status of single-father households may be lower than that of single-mother households mainly because low-income divorced women are not able to form their own households with children. The analysis is based on two sub-samples from the 2% sample of the 2005 Census, one, with children 12 years old or younger and, the other, with divorced mothers of children of the same ages. The findings support the hypothesis that previously-married single fathers show the lowest educational and occupational status among 6 groups of parents: fathers and mothers from two-parent families, fathers and mothers from married but spouse-absent families, and previously-married single fathers and mothers. Divorced mothers'likelihood of living apart from their children has a strong negative association with their educational attainment, with the highest likelihood among women of middle school or lower education and the lowest likelihood among women with college education. Although single mothers comprise a larger percentage of single-parent households, single-father households demonstrate a particular vulnerability with their weak socioeconomic status.

Security-Enhanced Key Establishment Scheme for Key Infection (Key Infection의 보안성 향상을 위한 개선된 키 설정 방법)

  • Hwang Young-Sik;Han Seung-Wan;Nam Taek-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.24-31
    • /
    • 2006
  • Traditional security mechanisms do not work well in the sensor network area due to the sensor's resource constraints. Therefore security issues are challenging problems on realization of the sensor network. Among them, the key establishment is one of the most important and challenging security primitives which establish initial associations between two nodes for secure communications. Recently, R. Anderson et al. proposed one of the promising key establishment schemes for commodity sensor network called Key Infection. However, key infection has an intrinsic vulnerability that there are some areas where adversaries can eavesdrop on the transferred key information at initial key establishment time. Therefore, in this paper, we propose a security-enhanced key establishment scheme for key infection by suggesting a mechanism which effectively reduces the vulnerable areas. The proposed security mechanism uses other neighbor nodes' additional key information to establish pair-wise key at the initial key establishment time. By using the additional key information, we can establish security-enhanced key establishment, since the vulnerable area is decreased than the key infection's. We also evaluate our scheme by comparing it with key infection using logical and mathematical analysis.

Elicitation of drought alternatives based on Water Policy Council and the role of Shared Vision Model (협의체 기반 가뭄 대응 대안 도출과 비전공유모형의 역할)

  • Kim, Gi Joo;Seo, Seung Beom;Kim, Young-Oh
    • Journal of Korea Water Resources Association
    • /
    • v.52 no.6
    • /
    • pp.429-440
    • /
    • 2019
  • The numbers of multi-year droughts due to climate change are increasing worldwide. Boryeong Dam, located in Chungcheongnam-do, South Korea, was also affected by a 4-year drought from 2014 to 2017. Since traditional unilateral decision making processes to alleviate drought damage have, until now, resulted in conflicts between many of the involved groups, the need for active participation from both stakeholders and policymakers is greater than before. This study introduced Shared Vision Planning, a collaborative decision making process that involves participation from various groups of stakeholders, by organizing Water Policy Council for Climate Change Adaptation in Chungcheongnam-do. A Shared Vision Planning Model was then developed with a system dynamics software by working together with relevant stakeholders to actively reflect their requests through three council meetings. Multiple simulations that included various future climate change scenarios were conducted, and future drought vulnerability analysis results of Boryeong Dam and districts, in terms of frequency, length, and magnitude, were arrived at. It was concluded that Boryeong Dam was more vulnerable to future droughts than the eight districts. While the total water deficit in the eight districts was not so significant, their water deficit in terms of spatial discordance was proved to be more problematic. In the future, possible alternatives to the model will be implemented so that stakeholders can use it to agree on a policy for possible conflict resolutions.

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

Investigating Drivers of Housing Vacancy in Old Town Incheon using Multi-level Analysis (다층모형을 활용한 인천광역시 원도심 빈집 발생의 영향요인 분석)

  • Lee, Da-Ye
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.237-254
    • /
    • 2020
  • Housing vacancies have become a major issue in urban areas, there have been many efforts to address this issue at the national and local levels. The purpose of this paper is to investigate the factors contributing to housing vacancies in old town Incheon in South Korea. In particular, the research focuses on examining the effects of multiple levels of factors on housing vacancies in a comprehensive way; the three levels of factors were identified with a literature review including housing (Level 1), Neighborhood (Level 2), and Region (Level 3). A multi-level logistic regression model was used to examine the relationship between 13 factors in three spatial levels and housing vacancies. As a result, the factors in all three levels were able to explain housing vacancies including site area and shape, proximity to major roads (Level 1), ratio of houses in designated urban renewal area and slope (Level 2), and ratio of the elderly living alone, land price, changes in land price and ratio of new houses (Level 3). These results show that the combination of the physical inferiority of the housing site and the neighborhood environment and the economic and social vulnerability of the region is likely to increases the number of vacant houses. This study also suggested that a multi-dimensional policy strategy is needed to solve the problem of housing vacancies, and urban policies, such as supplying new housing or urban renewal area designation, should be carefully implemented in a way not to create housing vacancies.

Security Analysis of KS X 4600-1 / ISO IEC 12139-1 (원격 검첨용 PLC 기술(KS X 4600-1 / ISO IEC 12139-1) 보안성 분석)

  • Hong, Jeong-Dae;Cheon, Jung-Hee;Ju, Seong-Ho;Choi, Moon-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.65-75
    • /
    • 2011
  • Power Line Communication (PLC) is a system for carrying data on a conductor used for electric power transmission. Recently, PLC has received much attention due to connection efficiency and possibility of extension. It can be used for not only alternative communication, in which communication line is not sufficient, but also for communication between home appliances. Korea Electronic Power Cooperation (KEPCO) is constructing the system, which automatically collects values of power consumption of every household. Due to the randomness and complicated physical characteristics of PLC protocol (KS X4600-1), it has been believed that the current PLC is secure in the sense that it is hard that an attacker guesses or modifies the value of power consumption. However, we show that the randomness of the protocol is closely related to state of the communication line and thus anyone can easily guess the randomness by checking the state of the communication line. In order to analyze the security of PLC, we study the protocol in detail and show some vulnerability. In addition, we suggest that PLC needs more secure protocol on higher layers. We expect that the study of PLC help in designing more secure protocol as well.

Phthalate Exposure Levels and Related Factors in the Urban Low-Income Group: Focus on a Residential Disadvantaged Community (도시 저소득층의 프탈레이트 노출수준과 관련 요인: 거주 취약집단을 중심으로)

  • Dahee, Han;Jiyun, Kang;Seohui, Han;Su Hyeon, Kim;Hohyun, Jin;Chahun, Kim;Hosub, Im;Ki-Tae, Kim;Yong Min, Cho
    • Journal of Environmental Health Sciences
    • /
    • v.48 no.6
    • /
    • pp.315-323
    • /
    • 2022
  • Background: Socioeconomical disadvantaged communities are more vulnerable to environmental chemical exposure and associated health effects. However, there is limited information on chemical exposure among vulnerable populations in Korea. Objectives: This study investigated chemical exposure among underprivileged populations. We measured urinary metabolites of phthalates in urban disadvantaged communities and investigated their correlations with residential environment factors and relative socioeconomic vulnerability. Methods: Urine samples were collected from 64 residents in a disadvantaged community in Seoul. A total of eight phthalate metabolites were analyzed by liquid chromatography-mass spectroscopy. Analytical method used by the Korean National Environmental Health Survey (KoNEHS) was employed. Covariate variance analysis and general linear regression adjusted with age, sex and smoking were performed. Results: Several phthalate metabolites, namely monomethyl phthalate (MMP), monoethyl phthalate (MEP), mono-(2-ethyl-5-hydroxyhexyl) phthalate (MEHHP), and mono-n-butyl phthalate (MnBP) had higher levels than those reported in the adults of 4th KoNEHS. Notably, the MnBP level was higher in the lower socioeconomic group (geometric mean [GM]=47.3 ㎍/g creatinine) compared to non-recipients (GM=31.9 ㎍/g creatinine) and the national reference level (GM=22.0, 28.2 and 32.2 ㎍/g creatinine for adults, 60's and 70's, respectively.). When age, sex and smoking were adjusted, MEP and MnBP were significantly increased the lower socioeconomic group than non-recipients (p=0.014, p=0.023). The lower socioeconomic group's age of flooring were higher than non-recipients, not statistically significant. Conclusions: These results suggest that a relatively low income and aged flooring could be considered as risk factors for increased levels of phthalate metabolites in socioeconomic vulnerable populations.