• Title/Summary/Keyword: Internal Network Information

Search Result 502, Processing Time 0.028 seconds

The oral microbiome of implant-abutment screw holes compared with the peri-implant sulcus and natural supragingival plaque in healthy individuals

  • MinKee Son;Yuri Song;Yeuni Yu;Si Yeong Kim;Jung-Bo Huh;Eun-Bin Bae;Won-Tak Cho;Hee Sam Na;Jin Chung
    • Journal of Periodontal and Implant Science
    • /
    • v.53 no.3
    • /
    • pp.233-244
    • /
    • 2023
  • Purpose: An implant-supported prosthesis consists of an implant fixture, an abutment, an internal screw that connects the abutment to the implant fixture, and the upper prosthesis. Numerous studies have investigated the microorganisms present on the implant surface, surrounding tissues, and the subgingival microflora associated with peri-implantitis. However, there is limited information regarding the microbiome within the internal screw space. In this study, microbial samples were collected from the supragingival surfaces of natural teeth, the peri-implant sulcus, and the implant-abutment screw hole, in order to characterize the microbiome of the internal screw space in healthy subjects. Methods: Samples were obtained from the supragingival region of natural teeth, the peri-implant sulcus, and the implant screw hole in 20 healthy subjects. DNA was extracted, and the V3-V4 region of the 16S ribosomal RNA was sequenced for microbiome analysis. Alpha diversity, beta diversity, linear discriminant analysis effect size (LEfSe), and network analysis were employed to compare the characteristics of the microbiomes. Results: We observed significant differences in beta diversity among the samples. Upon analyzing the significant taxa using LEfSe, the microbial composition of the implant-abutment screw hole's microbiome was found to be similar to that of the other sampling sites' microbiomes. Moreover, the microbiome network analysis revealed a unique network complexity in samples obtained from the implant screw hole compared to those from the other sampling sites. Conclusions: The bacterial composition of the biofilm collected from the implant-abutment screw hole exhibited significant differences compared to the supra-structure of the implant. Therefore, long-term monitoring and management of not only the peri-implant tissue but also the implant screw are necessary.

A Dynamic Analysis of Distribution Network for SCP (DC와 DC의 상호작용을 고려한 분배망 분석 기법)

  • Na, Yun-Ji;Ko, Il-Seok;Cho, Dong-Wook
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1207-1212
    • /
    • 2003
  • As development of the e-commerce, the distributing network for a logistics currency is more complicated. A management of the distributing network (DN) is important factor in distribution planning. The DN can be expressed to distribution center (DC) and the interaction of DC. An internal factor of DC and an external factor to occur by an interaction of DC have many influences on the DN. Therefore, for an efficient DN management plan, analysis of the DN that considered DC and an interaction of DC is required. Until now a study on a viewpoint of supply chain management as resources assignment was performed, but the study on analysis of the distribution network was not performed. This paper propose the distribution network analysis technique that considered DC and an interaction of DC. A proposed technique consists of two steps largely. First of all a DN is expressed with the graph that included an interaction of DC and DC. It uses a reachibility tree, and the following, a DN expressed with a graph is analyzed. Also we presented an example model, and show an usefulness of proposal technique with the analysis of this model.

The Construction of URI-Based Human Resource Information from Science and Technology Papers (과학기술 문헌으로부터의 URI 기반 인력정보 구축)

  • Jung Han-Min;Lee Seung-Woo;Sung Won-Kyung;Kang In-Su
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.152-163
    • /
    • 2006
  • The development of Semantic Web basically requires knowledge induced from the formalization and semantization of information, and thus ontology should be introduced as a knowledgization tool. URI(Universal Resource Identifier) is an indispensible scheme to uniquely indicate individuals on ontology. However, it is difficult to find the use cases of URI in real data including science and technology papers. This paper describes the method to construct internal and external human resource information based on URI from the papers. We use co-authors, e-mails, publication date, and affiliation for discriminating authors with the same strings. HRST(Human Resources devoted to Science and Technology) is referred to acquire URIs for human resource. We expect the internal and external human resource information would be adopted to outcome analysis applications such as researcher network analysis and outcome statistics.

  • PDF

Measures to Prevent the Leakage of Military Internal Information through the Analysis of Military Secret Leakage Cases: Focusing on Insider Behaviors (군사기밀 유출 사례 분석을 통한 군 내부정보 유출 방지 방안 : 내부자 행위 중심으로)

  • Eom, Jung-Ho;Kim, Nam-Uk
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.85-92
    • /
    • 2020
  • None of the recent cases of military secret leakages have leaked internal information using networks. This is because the Internet and the Intranet are physically separated, and has a difficult process when transmitting and receiving data through the Internet. Therefore, most of the leaked paths are to copy and hand over secrets, shoot and send them with a smartphone, or disclose after remembering them. So, the technology of blocking and detecting military secret leakages through the network is not effective. The purpose of this research is to propose a method to prevent information leakage by focusing on the insider behaviors, the subject of leakage, rather than the military secret. The first is a preventive measure to prevent the leakage behavior of military secrets, the second is to block suspicious access to the military secret data, and the last is to detect the leakage behavior by insiders.

Extracting Neural Networks via Meltdown (멜트다운 취약점을 이용한 인공신경망 추출공격)

  • Jeong, Hoyong;Ryu, Dohyun;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1031-1041
    • /
    • 2020
  • Cloud computing technology plays an important role in the deep learning industry as deep learning services are deployed frequently on top of cloud infrastructures. In such cloud environment, virtualization technology provides logically independent and isolated computing space for each tenant. However, recent studies demonstrate that by leveraging vulnerabilities of virtualization techniques and shared processor architectures in the cloud system, various side-channels can be established between cloud tenants. In this paper, we propose a novel attack scenario that can steal internal information of deep learning models by exploiting the Meltdown vulnerability in a multi-tenant system environment. On the basis of our experiment, the proposed attack method could extract internal information of a TensorFlow deep-learning service with 92.875% accuracy and 1.325kB/s extraction speed.

AN INTERNAL STRUCTURE OF INFORMATION SYSTEMS FAILURE; What really constitutes IS failure\ulcorner

  • Kim, Jong-Uk
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.4
    • /
    • pp.1-15
    • /
    • 2000
  • Information systems (IS) failures still continue and are prevalent everywhere. When considering an enormous amount of budget currently invested on IS technology in many organizations, these continuing failures can be critical culprits to failures of the organizations themselves. However, the meaning and definition of IS failures are not unified among IS researchers as well as IS practitioners although there have been a lot of conceptual research regarding the concept of IS failures. Previous empirical studies are not enough yet and thus we anticipate further empirical studies to be performed which will validate previous conceptual research. In this regards, by analyzing IS practitioners perception toward IS failures in a more detailed manner, this research extends conceptual and empirical research in the past which previously identified the structure of information systems (IS) failures. Further, this current study identified the interrelationships among the categories. The data was analyzed using a multidimensional scaling program and fourteen categories of problems were identified as to constitute the IS failure structure. It was found that about a half of categories identified were related to technical failures such as network and system infrastructure, costs, data/information, and program errors. The other remaining categories were related with organizational or social problems such as business success, human resources, relationships, communication, and user skills.

  • PDF

Modelling a Stand-Alone Inverter and Comparing the Power Quality of the National Grid with Off-Grid System

  • Algaddafi, Ali;Brown, Neil;Rupert, Gammon;Al-Shahrani, Jubran
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.1
    • /
    • pp.35-42
    • /
    • 2016
  • Developments in power electronics have enabled the widespread application of Pulse Width Modulation (PWM) inverters, notably for connecting renewable systems to the grid. This study demonstrates that a high-quality power can be achieved using a stand-alone inverter, whereby the comparison between the power quality of the stand-alone inverter with battery storage (off-grid) and the power quality of the utility network is presented. Multi-loop control techniques for a single phase stand-alone inverter are used. A capacitor current control is used to give active damping and enhance the transient and steady state inverter performance. A capacitor current control is cheaper than the inductor current control, where a small current sensing resistor is used. The output voltage control is used to improve the system performance and also control the output voltage. The inner control loop uses a proportional gain current controller and the outer loop is implemented using internal model control proportional-integral-derivative to ensure stability. The optimal controls are achieved by using the Sisotool tool in MATLAB/Simulink. The outcome of the control scheme of the numerical model of the stand-alone inverter has a smooth and good dynamic performance, but also a strong robustness to load variations. The numerical model of the stand-alone inverter and its power quality are presented, and the power quality is shown to meet the IEEE 519-2014. Furthermore, the power quality of the off-grid system is measured experimentally and compared with the grid power, showing power quality of off-grid system to be better than that of the utility network.

A Study on the Distributed Transcoding System using Secret Sharing Techniques (비밀분산기법을 이용한 분산 트랜스코딩 시스템 연구)

  • Song, You-Jin;Gu, Seokmo;Kim, Yei-Chang
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.233-239
    • /
    • 2014
  • Ultra high-resolution content, the file size is very large, therefore existing encoding techniques, it is not possible to transmit via the network. Efficient use of the network encoder HEVC corporation can be transferred. Compression requires a lot of time because it requires a distributed transcoding system. Distributed transcoding system is a distributed data store, and then encoded using a large number of nodes. The disadvantage of distributed transcoding system for distributed information is exposed or vulnerable to attack by internal managers. In this paper, when the super high definition content transcoding, distributed transcoding system does not guarantee the confidentiality of the problem to solve. We are using SNA, HEVC encoded content data encrypted using the secret distributing scheme was. Consequently, secure shared transcoding is possible, the internal administrator could prevent the attack.

AMI Network Failure Analysis based on Graph Database (그래프 데이터베이스 기반 AMI 네트워크 장애 분석)

  • Jeong, Woo-Cheol;Jun, Moon-Seog;Choi, Do-Hyeon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.41-48
    • /
    • 2020
  • Recently, the spreading business of AMI (Advanced Metering Infrastructure) remote metering systems in various regions of the country has been activated, and it provides various metering functions such as two-way communication and security plan functions for power demand management. Current AMI system is difficult to analyze based on the existing RDB(Relational Database) due to the increase in the size of new internal IoT devices and networks. This study proposes a new GDB(Graph Database) based failure analysis method that utilizes existing RDB data. It analyzes the correlation of new failure patterns through accumulated data such as internal thresholds and status values. As a result of GDB-based simulation, it was confirmed that RDB can predict to a new obstacle pattern that was difficult to analyze.

JARSIO:Java Remote Service Invocation for OSGI Frameworkto Enhance Inter-Operations of Services on OSGi (OSGi 서비스의 효과적인 외부연동을 위한 자바원격서비스호출 프레임워크)

  • Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • The KIPS Transactions:PartD
    • /
    • v.16D no.6
    • /
    • pp.935-944
    • /
    • 2009
  • Recently, many researches focus on Ubiquitous Network which comprised various networks for effective service provision. In particular, OSGi proposed by OSGi Alliance is preferred for core infrastructure to establish Ubiquitous Network as it supports integration and inter-operation among various service environments, and dynamic configuration of services. However, OSGi is limited to be used only within local service framework, since OSGi specification does not have any considerations for inter-operations between internal and external services. Thus, in this paper we propose JARSIO(JAva Remote Service Invocation for OSGi) framework which enables the inter-operations of dynamic internal OSGi services and other external services. The proposed framework is based on the TCP/IP protocol, and provides effective mechanisms for the inter-operations of the services.