• Title/Summary/Keyword: Leakage information

Search Result 1,523, Processing Time 0.032 seconds

Predicting Arachnoid Membrane Descent in the Chiasmatic Cistern in the Treatment of Pituitary Macroadenoma

  • Ko, Hak Cheol;Lee, Seung Hwan;Shin, Hee Sup;Koh, Jun Seok
    • Journal of Korean Neurosurgical Society
    • /
    • v.64 no.1
    • /
    • pp.110-119
    • /
    • 2021
  • Objective : Preoperative prediction of the arachnoid membrane descent in pituitary surgery is useful for achieving gross total removal and avoiding cerebrospinal fluid leakage resulting from tearing of the arachnoid membrane in the chiasmatic cistern. In this study, we analyzed the patterns of arachnoid membrane descent during or after pituitary tumor surgery and identified the factors related to this descent. Methods : Analysis was restricted to pituitary macroadenomas not extending into the third ventricle or over the internal carotid artery. To minimize confounding factors, patients who underwent revision surgery, those who had a torn arachnoid during operation or small medial diaphragma sellae (DS) opening, and subtotal resections were excluded. We enrolled 41 consecutive patients in this retrospective analysis. The degree of arachnoid descent was categorized using intraoperative videos. Preoperative magnetic resonance findings, including tumor height, suprasellar extension, and variables including DS area and medial opening size, tumor composition, and displacement of the pituitary stalk and gland were evaluated to determine their correlations with arachnoid membrane descent. Results : Arachnoid membrane descent was significantly correlated with DS area and medial opening size. Based on T2-weighted images (T2WI) magnetic resonance (MR) images, tumor composition was significantly associated with arachnoid membrane descent. Other factors were not significantly correlated with arachnoid membrane descent. Conclusion : T2WI of tumor composition and preoperative MR imaging of DS area and medial opening provided valuable information regarding arachnoid membrane descent. These parameters may serve as fundamental measures to facilitate complete resection of pituitary macroadenomas.

Considerations for Applying SDN to Embedded Device Security (임베디드 디바이스 보안을 위한 SDN 적용 시 고려사항)

  • Koo, GeumSeo;Sim, Gabsig
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.51-61
    • /
    • 2021
  • In the era of the 4th industrial revolution symbolized by the Internet of Things, big data and artificial intelligence, various embedded devices are increasing exponentially. These devices have communication functions despite their low specifications, so the possibility of personal information leakage is increasing, and security threats are also increasing. Embedded devices can have security issues at most levels, from hardware to services over the network. In addition, it is difficult to apply general security techniques because it has characteristics of resource constraints such as low specifications and low power, and the related technology has not been standardized. In this study, we present vulnerabilities and possible problems and considerations in applying SDN to embedded devices in consideration of structural characteristics and real-world discovered cases. This study presents vulnerabilities and possible problems and considerations when applying SDN to embedded devices. From a hardware perspective, we consider the problems of Wi-Fi chips and Bluetooth, the problems of open flow implementation, SDN controllers, and examples of structural properties. SDN separates the data plane and the control plane, and provides a standardized interface between the two, enabling efficient communication control. It can respond to the security limitations of existing network technologies that are difficult to respond to rapid changes.

Practical Concerns in Enforcing Ethereum Smart Contracts as a Rewarding Platform in Decentralized Learning (연합학습의 인센티브 플랫폼으로써 이더리움 스마트 컨트랙트를 시행하는 경우의 실무적 고려사항)

  • Rahmadika, Sandi;Firdaus, Muhammad;Jang, Seolah;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.321-332
    • /
    • 2020
  • Decentralized approaches are extensively researched by academia and industry in order to cover up the flaws of existing systems in terms of data privacy. Blockchain and decentralized learning are prominent representatives of a deconcentrated approach. Blockchain is secure by design since the data record is irrevocable, tamper-resistant, consensus-based decision making, and inexpensive of overall transactions. On the other hand, decentralized learning empowers a number of devices collectively in improving a deep learning model without exposing the dataset publicly. To motivate participants to use their resources in building models, a decent and proportional incentive system is a necessity. A centralized incentive mechanism is likely inconvenient to be adopted in decentralized learning since it relies on the middleman that still suffers from bottleneck issues. Therefore, we design an incentive model for decentralized learning applications by leveraging the Ethereum smart contract. The simulation results satisfy the design goals. We also outline the concerns in implementing the presented scheme for sensitive data regarding privacy and data leakage.

Unplanned Reoperation Rate at a Government-Designated Regional Trauma Center in Gangwon Province

  • Kim, Minju;Kim, Seongyup
    • Journal of Trauma and Injury
    • /
    • v.34 no.1
    • /
    • pp.39-43
    • /
    • 2021
  • Purpose: Determining appropriate ways to assess health care quality within the National Health Insurance System is of interest to both the Korean government and the medical community. However, in the trauma field, the number of indicators used to evaluate surgical quality is limited. Using data collected over 5 years at Wonju Severance Christian Hospital Trauma Center in Korea, this study aimed to determine whether the unplanned reoperation rate in the field of trauma surgery could be used to assess the quality of an institution's surgical care. Methods: In total, 665 general surgical procedures were performed at the Trauma Center in 453 patients with abdominopelvic injuries from January 2015 to December 2019. Data were collected from the Trauma Center's data registry and medical records, and included information regarding patients' demographic characteristics, the type of index operation, and the reason for unplanned reoperations. Results: A total of 453 index operations were evaluated. The proportion of patients with an Injury Severity Score (ISS) >15 was 48-70% over the 5-year period, with an unplanned reoperation rate of 2.1-9.3%. Patients had an average ISS score of 17.5, while the average Abbreviated Injury Scale Score was 2.87. Unplanned reoperations were required in about 7% of patients. The most common complications requiring reoperation were recurrent bleeding (26.9%), wound problems (26.9%), intestinal infarction (15.4%), and anastomosis site leakage (7.7%). The procedures most frequently requiring unplanned reoperations were bowel surgery (segmental resection, primary repair, enterostomy, etc.) (24.5%) and preperitoneal pelvic packing (10.6%). Conclusions: The proportion of reoperations was confirmed to be affected by injury severity.

A Study on Vulnerability Factors of The Smart Home Service ('스마트홈 서비스'의 보안취약요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, the era in which various services using smart devices are used is sometimes referred to as the so-called "smart era". Among these, Smart Home Service' have not only brought about significant changes in the residential environment and culture, but are evolving very rapidly. and The 'Smart Home Service' provides more convenient services to users through communication between various electronic products in general homes, and has a bright future in the future. In particular,'Smart Home Service' provides various services combined based on IoT(Internet of Things) technology and wired/wireless communication in connection between various devices. However, such a "smart home service" inherits the security vulnerabilities of the underlying technologies such as the Internet of Things and wired and wireless communication technologies, and accidents that lead to the leakage of personal information and invasion of privacy continue to occur. So, it is necessary to prepare a countermeasure and prevention against the weak factors of the underlying technologies. Therefore, this paper is expected to be used as basic data for future application technology development and countermeasure technology by examining various security vulnerability factors of 'Smart Home Service'.

A Research on the Promotion of AMI Supply by the Development of 1:N Mounted Remote Meter Reading Device (1:N HUB 기능을 가진 원격검침 단말기 개발에 따른 AMI 보급 추진 방안 연구)

  • Lee, Hyoung-Min;Kim, Min-Gi;Choi, Eun-Il;Yoon, Chan-Sik
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.6
    • /
    • pp.1-6
    • /
    • 2021
  • In this study, we developed AMI terminals of 1 (reader): N (small transmitter). Currently, the government is focusing on the Gas AMI demonstration project to advance the outdated metering system of the urban gas industry, led by the government-sponsored ministries. The supply of gas AMI meters has the advantage of resolving uncertainties in privacy violations and measurement information and preparing for consumer safety through gas leakage detection. In the case of existing AMI meters, readers and transmitters were 1:1 methods, while this technology can be extended to multiple generations with a 1:N method, and a technology that can extend battery life by implementing a low-power design is applied. We hope that this research will contribute to the gas AMI supply project in the future.

Experimental Study on the Unsteady Flow Characteristics for the Counter-Rotating Axial Flow Fan

  • Cho, L.S.;Lee, S.W.;Cho, J.S.;Kang, J.S.
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.03a
    • /
    • pp.790-798
    • /
    • 2008
  • Counter-rotating axial flow fan(CRF) consists of two counter-rotating rotors without stator blades. CRF shows the complex flow characteristics of the three-dimensional, viscous, and unsteady flow fields. For the understanding of the entire core flow in CRF, it is necessary to investigate the three-dimensional unsteady flow field between the rotors. This information is also essential to improve the aerodynamic characteristics and to reduce the aerodynamic noise level and vibration characteristics of the CRF. In this paper, experimental study on the three-dimensional unsteady flow of the CRF is performed at the design point(operating point). Flow fields in the CRF are measured at the cross-sectional planes of the upstream and downstream of each rotor using the $45^{\circ}$ inclined hot-wire. The phase-locked averaged hot-wire technique utilizes the inclined hot-wire, which rotates successively with 120 degree increments about its own axis. Three-dimensional unsteady flow characteristics such as tip vortex, secondary flow and tip leakage flow in the CRF are shown in the form of the axial, radial and tangential velocity vector plot and velocity contour. The phase-locked averaged velocity profiles of the CRF are analyzed by means of the stationary unsteady measurement technique. At the mean radius of the front rotor inlet and the outlet, the phase-locked averaged velocity profiles show more the periodical flow characteristics than those of the hub region. At the tip region of the CRF, the axial velocity is decreased due to the boundary layer effect of the fan casing and the tip vortex flow. The radial and the tangential velocity profiles show the most unstable and unsteady flow characteristics compared with other position of rotors. But, the phase-locked averaged velocity profiles of the downstream of the rear rotor show the aperiodic flow pattern due to the mixture of the front rotor wake period and the rear rotor rotational period.

  • PDF

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

Use of non-Tariff Barriers for protection of domestic industries and its implications: focusing on the Chinese Cosmetic Certification System (자국 산업보호를 위한 비관세장벽 활용과 시사점: 중국 화장품 인증제도를 중심으로)

  • Yoon, Sung-Wook;Lee, Handara
    • Korea Trade Review
    • /
    • v.43 no.6
    • /
    • pp.113-138
    • /
    • 2018
  • The purpose of this research is to analyze how the Chinese cosmetics certification system works as a Non-Tariff Barriers(NTBs) for Korean exporting companies to access the Chinese market. China is the largest market for Korea's cosmetic exports, but China's policy of protecting domestic industry has become a barrier to Korea's cosmetics exports to China. Therefore, this research, through the analysis of regulations of the Chinese certification system for imported cosmetics. revealed that there are such problems as ① information leakage ② duplication of inspection ③time delay. In order to verify those problems, surveys and face-to-face interviews with Korean cosmetic exporting companies to China have been conducted. In conclusion, Chinese cosmetics certification system not only protects its own industry, but also serves as a NTBs to disturb the access of imported cosmetics to the Chinese market in order to foster Chinese cosmetic industry.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.