• 제목/요약/키워드: Internal Attack

검색결과 241건 처리시간 0.026초

중풍(中風) 환자(患者) 중(中) 언어장애(言語障碍)에 대한 임상적(臨床的) 고찰(考察) (A Clinical Study of Dyslogia Patients after Stroke)

  • 신우진;서수현;홍현우;이성도;김재연;감철우;박동일
    • 대한한방내과학회지
    • /
    • 제25권3호
    • /
    • pp.529-538
    • /
    • 2004
  • This clinical study on 93 cases of Dyslogia after stroke confirmed through brain CT, MRI scan and clinical observation. They were hospitalized in the oriental medical hospital of Dong-Eui University from january to September 2003. The following results were found: I. The ratio between males and females was 1.6:1. Of Dyslogia p who had suffered stroke, most were in their sixties. 2. Categorized by attack site, right hemiplegia patients comprised 15 cases(l6.1%), and left hemiplegia patients, 71 cases(54.8%), so the ratio between Rt. and Lt. was 1:4.7. 3. Categorized by preceeding disease, hypertension was seen 51 cases(54.8%), and diabetes mellitus was seen 21 cases(22.6%). 4. Categorized by repeat attack, it was the first attack for 71 cases(76.3%), and the second attack for 13 cases(l4.0%), and for 9 cases(9.7%) it was the third or nth attack. 5. According to the classification of Zhang Zhongjing, apoplexy involving Bu-organs comprised 42 cases(45.2%), apoplexy involving meridians 39 cases(41.9%), apoplexy involving Jang-organs 11 cases(11.8%), and for apoplexy involving collaaterals there was one case(1.1%). 6. According to the classification of Cheng Zhongling, 43 cases(46.7%) were classed heart meridian, 25 cases(27.2%) were classed Spleen meridian, and 24 cases(26. 1%) were classed Kidney meridian. 7. According to the classification of Sun Simiao, 49 cases(52.7%) were classed Pyungo, two cases(2.2%) were classed Pungeui, ,seven cases(7.5%) were classed Pungbi( I ), and two cases(2.2%) were classed Pungbi( II ).

  • PDF

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

INSENS 기반의 무선 센서 네트워크에서 싱크홀 공격을 방어하기 위한 강화된 경로 설정 기법 (Secure route determination method to prevent sinkhole attacks in INSENS based wireless sensor networks)

  • 송규현;조대호
    • 한국지능시스템학회논문지
    • /
    • 제26권4호
    • /
    • pp.267-272
    • /
    • 2016
  • 무선 센서 네트워크는 제약적인 하드웨어 자원과 무선 통신의 특징으로 인해 외부 침입에 취약하다. 따라서 공격자는 네트워크에 침입하여 싱크홀 공격을 시도할 수 있다. 이러한 싱크홀 공격을 방지하기 위해서 INSENS가 제안되었다. INSENS는 세 개의 대칭키를 사용하여 싱크홀 공격을 방지한다. 하지만 INSENS는 노드의 훼손을 고려하지 않기 때문에 훼손된 노드를 통해 싱크홀 공격이 다시 발생한다. 본 논문에서는 훼손된 노드를 통해 발생하는 싱크홀 공격을 이웃 노드들의 상태 정보를 사용하여 방지하는 기법을 제안한다. 제안 기법은 i) 공격을 안전하게 방지하여 네트워크의 신뢰성을 향상하고, ii) 에너지 소비 절감을 목표로 한다. 실험 결과 제안기법은 보고서의 신뢰성을 평균 71.50% 향상하고 에너지 소비를 평균 19.90% 절감한다.

A Case of Statin-Induced Interstitial Pneumonitis due to Rosuvastatin

  • Kim, Se Yong;Kim, Se Jin;Yoon, Doran;Hong, Seung Wook;Park, Sehhoon;Ock, Chan-Young
    • Tuberculosis and Respiratory Diseases
    • /
    • 제78권3호
    • /
    • pp.281-285
    • /
    • 2015
  • Statins lower the hyperlipidemia and reduce the incidence of cardiovascular events and related mortality. A 60-year-old man who was diagnosed with a transient ischemic attack was started on acetyl-L-carnitine, cilostazol, and rosuvastatin. After rosuvastatin treatment for 4 weeks, the patient presented with sudden onset fever, cough, and dyspnea. His symptoms were aggravated despite empirical antibiotic treatment. All infectious pathogens were excluded based on results of culture and polymerase chain reaction of the bronchoscopic wash specimens. Chest radiography showed diffuse ground-glass opacities in both lungs, along with several subpleural ground-glass opacity nodules; and a foamy alveolar macrophage appearance was confirmed on bronchoalveolar lavage. We suspected rosuvastatin-induced lung injury, discontinued rosuvastatin and initiated prednisolone 1 mg/kg tapered over 2weeks. After initiating steroid therapy, his symptoms and radiologic findings significantly improved. We suggest that clinicians should be aware of the potential for rosuvastatin-induced lung injury.

애니메이션캐릭터를 이용한 국내 패션산업의 현황 분석 (Analysis of the Present Situations of Internal Fashion Industry Using Animation Character)

  • 백경실;유태순
    • 한국의류산업학회지
    • /
    • 제1권4호
    • /
    • pp.326-334
    • /
    • 1999
  • The purpose of this study was known the animation history, function of the animation character, the development process of the animation industry, and the industry process of the animation character in the center of the animation character of America and Japan occupying the internal character market largely. Also, it was examined how the animation character was used in the fashion industry and was recognized the importance of the character industry, and it was seen the design development of the fashion character in the future and the proceeding method of the fashion marketing strategy. The following this study was examined by using the various newspaper and magazine, the internal and external reference. In the result of this study, the animation character created in the TV and the screen is extended the related industry and is developed the various cultural products, and it is recognized as the product of the highly added value. The internal animation characters are mostly the characters of America and Japan, but now the internal animation productions is recognized the importance of the animation industry and is producted the animation to attack the internal and external market. The potential of the animation character was really excessive. The excellent animation product was important but the animation character and the activity of the accompaniment industry related to it was important. Also the animation character mostly had influence on the fashion industry.

  • PDF

무산소성 뇌증환자의 이소성 골화증에 대한 빈소산 치험례 (Case Study of Heterotopic Ossification of Hypoxic Brain Damage Patient with Binso-san)

  • 김현식;김소연;권소연;제준태;윤채성;성강경
    • 대한한의학방제학회지
    • /
    • 제17권2호
    • /
    • pp.225-231
    • /
    • 2009
  • Heterotopic ossification is often complicated in patients with brain injury. It occurs in the connective tissue of skeletal muscle close to a joint, especially most highly in the hip joint. This study have reported a case of heterotopic ossification in hypoxic brain damage patient due to cardiac attack. Binso-san is known by medication on arthritis. It has an effect on pain control or reduce of swelling in the joints. This study suggest that Binso-san has an improving effect on hip joint affected by Heterotopic ossification.

  • PDF

멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구 (A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution)

  • 신승수;김용영
    • 디지털융복합연구
    • /
    • 제10권6호
    • /
    • pp.231-239
    • /
    • 2012
  • 본 논문에서는 기존 WCDRM(Watermark & Cryptography DRM) 모델과 스마트카드를 이용한 모델에서 제안한 방법의 문제점을 해결하기 위해 사용자의 최소한 정보를 이용한 인증과 멀티미디어 콘텐츠에 대한 암호화, DRM(Digital Right Management), 접근제어 등의 기술을 이용하여 사용자의 정보를 보호하고, 저작권자와 배포권자, 사용자의 권리를 보호하는 콘텐츠 유통 모델을 제안하였다. 제안한 시스템은 기존 방식의 단점을 해결하였을 뿐만 아니라 네 가지 유형의 위험, 즉 타 휴대기기에서 다운로드한 콘텐츠의 사용 여부와 복호화 키에 대한 공격, 콘텐츠 유출 공격, 불법 복제 등 내부자 공격 등을 모두 방어할 수 있다는 점에서 가장 안전한 방법으로 평가되었다.

안드로이드 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구 (A Study on Multi-Media Contents Security Using Android Phone)

  • 신승수
    • 한국융합학회논문지
    • /
    • 제3권1호
    • /
    • pp.19-25
    • /
    • 2012
  • 본 논문에서는 기존 WCDRM(Watermark & Criptography DRM) 모델과 스마트카드를 이용한 모델에서 제안한 방법의 문제점을 해결하기 위해 사용자의 최소한 정보를 이용한 인증과 멀티미디어 콘텐츠에 대한 암호화, DRM(Digital Right Management), 접근제어 등의 기술을 이용하여 사용자의 정보를 보호하고, 저작권자와 배포권자, 사용자의 권리를 보호하는 콘텐츠 유통 모델을 제안하였다. 제안한 시스템은 기존 방식의 단점을 해결하였을 뿐만 아니라 네 가지 유형의 위험, 즉 타 휴대기기에서 다운로드한 콘텐츠의 사용 여부와 복호화 키에 대한 공격, 콘텐츠 유출 공격, 불법 복제 등 내부자 공격 등을 모두 방어할 수 있다는 점에서 가장 안전한 방법으로 평가되었다.

스마트 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구 (A Study on Multi-Media Contents Security using Smart Phone)

  • 김동률;한군희
    • 디지털융복합연구
    • /
    • 제11권11호
    • /
    • pp.675-682
    • /
    • 2013
  • 본 논문에서는 스마트카드를 이용한 모델에서 제안한 방법의 문제점을 해결하기 위해 사용자의 최소한 정보를 이용한 인증과 멀티미디어 콘텐츠에 대한 암호화, DRM(Digital Right Management), 접근제어 등의 기술을 이용하여 사용자의 정보를 보호하고, 저작권자와 배포권자, 사용자의 권리를 보호하는 콘텐츠 유통 모델을 제안하였다. 제안한 시스템은 기존 방식의 단점을 해결하였을 뿐만 아니라 네 가지 유형의 위험, 즉 타 휴대기기에서 다운로드한 콘텐츠의 사용 여부와 복호화 키에 대한 공격, 콘텐츠 유출 공격, 불법 복제 등 내부자 공격 등을 모두 방어할 수 있다는 점에서 가장 안전한 방법으로 평가되었다.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • 제9권1호
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.