• Title/Summary/Keyword: Legitimate Technology

Search Result 66, Processing Time 0.024 seconds

The Medial Sural Artery Perforator Flap: A Historical Trek from Ignominious to "Workhorse"

  • Hallock, Geoffrey G.
    • Archives of Plastic Surgery
    • /
    • v.49 no.2
    • /
    • pp.240-252
    • /
    • 2022
  • Rather than just another "review," this is intended to be an "overview" of the entire subject of the medial sural artery perforator (MSAP) flap as has been presented in the reconstructive literature from its inception in 2001 until the present, with any exceptions not purposefully overlooked. Unfortunately, the pertinent anatomy of the MSAP flap is always anomalous like most other perforator flaps, and perhaps even more variable. No schematic exists to facilitate the identification of a dominant musculocutaneous perforator about which to design the flap, so some adjunctive technology may be highly valuable for this task. However, if a relatively thin free flap is desirable for a small or moderate sized defect that requires a long pedicle with larger caliber vessels, the MSAP flap deserves consideration. Indeed, for many, this has replaced the radial forearm flap such as for partial tongue reconstruction. Most consider the donor site deformity, even if only a conspicuous scar on the calf, to be a contraindication. Yet certainly if used as a local flap for the knee, popliteal fossa, or proximal leg, or as a free flap for the ipsilateral lower extremity where a significant recipient site deformity already exists, can anyone really object that this is not a legitimate indication? As with any perforator flap, advantages and disadvantages exist, which must be carefully perused before a decision to use the MSAP flap is made. Perhaps not a "workhorse" flap for general use throughout the body, the MSAP flap in general may often be a valuable alternative.

A Study on the Regulation of Consumer Deception Interface: Focusing on Dark Patterns (온라인상의 소비자 기만 인터페이스 규제방안 연구: 다크패턴을 중심으로)

  • Ji Hun, Lim;Beop Yeon, Kim;Hun Yeong, Kwon
    • Journal of Information Technology Services
    • /
    • v.21 no.6
    • /
    • pp.73-89
    • /
    • 2022
  • After COVID-19, the percentage of digital consumption has soared. Meanwhile, as the online platform market grows in size and digital commerce is activated, controversy over the "dark pattern" that induces consumers to do unintended things online continues. Dark patterns are deceptive design patterns that cause consumer rights and financial damage and can result in damaging fair market competition. As a result, the need to regulate dark patterns is raised not only by overseas regulators but also in Korea, and there are growing calls for strengthening consumer protection against dark patterns, with amendments to related laws being proposed by the National Assembly. On the other hand, there is no agreed definition of dark pattern from a normative point of view, and there is a concern that even legitimate advertising marketing activities of companies may be regulated, so a review of dark pattern regulatory measures is required. In this study, dark patterns were reviewed from a normative point of view and appropriate regulatory measures were analyzed. In particular, the problem of the dark pattern can be applied in a way that the market regulates and controls itself in consideration of the characteristics of the online platform. This study reviewed the possibility of self-regulation for dart patterns and proposed the role of each subject.

A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices (모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.795-801
    • /
    • 2013
  • As the life which existed only offline has changed into a life part of which is led online, it is an important problem to identify whether an online user is legitimate one or not. Biometric authentication technology was developed to identify the user more correctly either online or in offline daily life. Biometric authentication is a technology where a person is identified by his or her unique characteristics, and is highlighted as a next-generation authentication technology replacing password. There are various kinds of traits unique to each individual, and biometric authentication technologies drawing on such traits use various devices and algorithms. Firstly, this paper classified such various biometric authentication technologies, and analyzed the effects of them when they are applied on smartphone, smartwatch and M2M of the different devices platforms. Secondly, it suggested the effectiveness-based AIB(Authentication for Integrated Biometrics) authentication technique, a comprehensive authentication technique, which can be used in different devices platforms. We have successfully included the establishment scheme of the effectiveness authentication using biometrics.

Enhanced Wireless Network Security in Military Environments (군사 환경에서의 향상된 무선 네트워크 보안)

  • Kim, Jin Woo;Shin, Soo Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1341-1348
    • /
    • 2016
  • In this paper, we propose method to enhance security performance using HT-STBC with artificial noise under Wier-Tap channel model that exist with legitimate receiver and illegal eavesdropper. Conventional STBC with artificial noise scheme has a weakness that a limited increase in the BER of the difference between the receiver and an eavesdropper, when used over QPSK modulation. To solve this problem, we suggest HT-STBC combining hadamard transform and STBC with artificial noise for reduce BER of receiver than the conventional scheme and demonstrated through simulation that also increased BER difference between the receiver and an eavesdropper. By the simulation results, when used proposed scheme, showed approximately 3dB improvement in performance compared to the conventional scheme.

Is the Precautionary Principle Unscientific?: 'Rationality' of the Precautionary Principle and its Conflicts with Risk Analysis Framework (사전주의의 원칙은 비과학적인가?: 위험 분석과의 논쟁을 통해 본 사전주의 원칙의 '합리성')

  • Ha, Dae-Cheong
    • Journal of Science and Technology Studies
    • /
    • v.10 no.2
    • /
    • pp.143-174
    • /
    • 2010
  • How can a regulatory policy to address potential hazards be made legitimate in the face of scientific uncertainty? The precautionary principle has been gradually regarded as the most persuasive answer to this intricate question in Europe since the 1970s and generally recognized as a guiding principle in international environmental law. This principle, however, has often been subject to diverse concerns and criticisms due to its vague definition. This article tries to elaborate the precautionary principle while reviewing both the validity and unreasonableness of these criticisms over this principle. Then, this article explores the policy relevance of this principle by applying this elaborated definition to the concrete case of risk governance such as the risk assesment of food safety. In the end, this paper emphasizes the fact that the precautionary principle can be applied in the field of risk governance, refuting the argument that the precautionary principle is only a moral attitude or a political position.

  • PDF

Privacy Protection Technologies on IoT Environments: Case Study of Networked Cameras (사물인터넷(IoT) 환경에서 프라이버시 보호 기술: 네트워크 카메라 사례 연구)

  • Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.329-338
    • /
    • 2016
  • Internet of Things (IoTs) technology makes every things in physical world being digitalized and communicated with each other. The technology is emerging as a new paradigm and is expected to provide a convenient and effective life. However, for the successful realization of the IoT technologies, IoT security issues are an important prerequisite, and particularly the privacy protection is expected to become more important in view of object communication directively related with human. In this paper we describe for the security and privacy threats in IoT environment and introduce the shodan (a legitimate search engine that finds backdoor routers, switches, webcams, IoT devices connected to the Internet etc.) that can expose the security and privacy problems. Lastly, we compare the privacy threats through real-world case study of network cameras currently in use and finally derive the countermeasures for the threats.

선도기술개발사업의 경제.사회적 평가방법연구

  • 김상준;임윤철;최기련
    • Proceedings of the Technology Innovation Conference
    • /
    • 1999.12a
    • /
    • pp.216-239
    • /
    • 1999
  • Korean government has planned a large scale multidepartment-participated national R&D program to advance and improve her science and technology and the quality of life In the level of advanced(especially G-7) countries in the forthcoming 21st century. It is called as "Highly Advanced National projects" or "G7 projects", which was initiated in 1991 with 18 sub-programs to date. It has planned to be continued until 2001 with its total fund of 4, 591 billion Won, comprised of 2, 033 billion Won from the public sector and 2, 558 billion Won from the private sector. Evaluation activities, the country has carried out to date, for national R&D programs including HAN projects are focused mainly on the assessment of scientific and technological results to decide that a specific program should be continued, terminated, or modified. Thus, it is necessary for national R&D programs to be evaluated socioeconomically for the purpose of assessing the nationwide economic and social impact from the program. Socioeconomic evaluation would be told how and where the program contributed to the society, and what the socioeconomic impacts are resulted from the program. It would be useful for the means of (ⅰ) fulfillment of public accountability to legitimate the program and to reveal the expenditure of pubic fund, and (ⅱ) managemental and strategical learning to give information necessary to improve the making. program and policy decision making, The objectives of the study are to develop the methodology of modeling the socioeconomic evaluation, and build up the practical socioeconomic evaluation model of the HAN projects including scientific and technological effects. Since the HAN projects consists of 18 subprograms, it is difficult In evaluate all the subprograms simultaneously. Despite, each program is being performed under the category of HAN projects, so the common socioeconomic issues are existing, The followings are main results of the study. First, the hierarchical structure of the socioeconomic evaluation are constructed; Evaluation Perspective, Evaluation Bounds, and Evaluation Aspect. Second, based on the goals of the HAN projects, the evaluation perspectives are established as (ⅰ) the strengthening of industrial competitiveness, (ⅱ) the enhancement of national scientific and technological capability, (ⅲ) the improvement of quality of life. Third, the evaluation bounds for each evaluation objective are defined to specify the affected area. Finally, the evaluation aspects for each evaluation bounds are formulated containing essential elements describing the evaluation bounds.

  • PDF

A Study on Amplification DRDoS Attacks and Defenses (DRDoS 증폭 공격 기법과 방어 기술 연구)

  • Choi, Hyunsang;Park, Hyundo;Lee, Heejo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.429-437
    • /
    • 2015
  • DDoS attacks have been used for paralyzing popular Internet services. Especially, amplification attacks have grown dramatically in recent years. Defending against amplification attacks is challenging since the attacks usually generate extremely hugh amount of traffic and attack traffic is coming from legitimate servers, which is hard to differentiate from normal traffic. Moreover, some of protocols used by amplification attacks are widely adopted in IoT devices so that the number of servers susceptible to amplification attacks will continue to increase. This paper studies on the analysis of amplification attack mechanisms in detail and proposes defense methodologies for scenarios where attackers, abused servers or victims are in a monitoring network.

Semi-fragile Watermarking Scheme for H.264/AVC Video Content Authentication Based on Manifold Feature

  • Ling, Chen;Ur-Rehman, Obaid;Zhang, Wenjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4568-4587
    • /
    • 2014
  • Authentication of videos and images based on the content is becoming an important problem in information security. Unfortunately, previous studies lack the consideration of Kerckhoffs's principle in order to achieve this (i.e., a cryptosystem should be secure even if everything about the system, except the key, is public knowledge). In this paper, a solution to the problem of finding a relationship between a frame's index and its content is proposed based on the creative utilization of a robust manifold feature. The proposed solution is based on a novel semi-fragile watermarking scheme for H.264/AVC video content authentication. At first, the input I-frame is partitioned for feature extraction and watermark embedding. This is followed by the temporal feature extraction using the Isometric Mapping algorithm. The frame index is included in the feature to produce the temporal watermark. In order to improve security, the spatial watermark will be encrypted together with the temporal watermark. Finally, the resultant watermark is embedded into the Discrete Cosine Transform coefficients in the diagonal positions. At the receiver side, after watermark extraction and decryption, temporal tampering is detected through a mismatch between the frame index extracted from the temporal watermark and the observed frame index. Next, the feature is regenerate through temporal feature regeneration, and compared with the extracted feature. It is judged through the comparison whether the extracted temporal watermark is similar to that of the original watermarked video. Additionally, for spatial authentication, the tampered areas are located via the comparison between extracted and regenerated spatial features. Experimental results show that the proposed method is sensitive to intentional malicious attacks and modifications, whereas it is robust to legitimate manipulations, such as certain level of lossy compression, channel noise, Gaussian filtering and brightness adjustment. Through a comparison between the extracted frame index and the current frame index, the temporal tempering is identified. With the proposed scheme, a solution to the Kerckhoffs's principle problem is specified.

Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model

  • Kanti Singh Sangher;Archana Singh;Hari Mohan Pandey
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.99-109
    • /
    • 2023
  • The darknet is frequently referred to as the hub of illicit online activity. In order to keep track of real-time applications and activities taking place on Darknet, traffic on that network must be analysed. It is without a doubt important to recognise network traffic tied to an unused Internet address in order to spot and investigate malicious online activity. Any observed network traffic is the result of mis-configuration from faked source addresses and another methods that monitor the unused space address because there are no genuine devices or hosts in an unused address block. Digital systems can now detect and identify darknet activity on their own thanks to recent advances in artificial intelligence. In this paper, offer a generalised method for deep learning-based detection and classification of darknet traffic. Furthermore, analyse a cutting-edge complicated dataset that contains a lot of information about darknet traffic. Next, examine various feature selection strategies to choose a best attribute for detecting and classifying darknet traffic. For the purpose of identifying threats using network properties acquired from darknet traffic, devised a hybrid deep learning (DL) approach that combines Recurrent Neural Network (RNN) and Bidirectional LSTM (BiLSTM). This probing technique can tell malicious traffic from legitimate traffic. The results show that the suggested strategy works better than the existing ways by producing the highest level of accuracy for categorising darknet traffic using the Black widow optimization algorithm as a feature selection approach and RNN-BiLSTM as a recognition model.