• Title/Summary/Keyword: White-list

Search Result 63, Processing Time 0.025 seconds

Effect of Moxibustion at the Meridian Points in Experimentally Induced Anemic Rat (경혈(經穴)의 애구생체반응(艾灸生體反應)이 실혈성빈혈(失血性貧血)에 미치는 영향(影響))

  • Lee, Eun-Hong;Park, In-Kyu;Lim, Jong-kook;Kim, Jin-Taek
    • The Journal of Dong Guk Oriental Medicine
    • /
    • v.1
    • /
    • pp.131-139
    • /
    • 1992
  • In order to observe the effects of moxibustion on anemic condition as a acute loss of blood, white rats were induced loss of blood by cadiac puncture. And then morphologically variation of The Bone Marrow was observed the following points of each rat were used ; Shinsu($B_{23}$ or $VII_{23}$), Hyeon jong($GB_{39}$ or $XI_{39}$), and complex of Shinsu($B_{23}$ or $VII_{23}$) and Hyeon Jong($GB_{39}$ or $XI_{39}$) Comparing these above methods with the control group the results were as follow : 1. Moxibustion in Shinsu have an influence on activation of Normoblast and do for hematosis function of bone marrow 2. Formation ablity of R B C(Red Blood Cell) turn up order a list of Moxibustion in Shinsu($B_{23}$ or $VII_{23}$), Moxibustion in conplex of Shinsu($B_{23}$ or $VII_{23}$) and Hyeon Jong($GB_{39}$ or $XI_{39}$), moxibustion in Hyeon Jong($GB_{39}$ or $XI_{39}$) 3. Moxibustion in complex of Shinsu($B_{23}$ or $VII_{23}$) and Hyeon Jong($GB_{39}$ or $XI_{39}$) moderately increase Megakaryocyte

  • PDF

A Unknown Phishing Site Detection Method in the Interior Network Environment (내부 네트워크에서 알려지지 않은 피싱사이트 탐지방안)

  • Park, Jeonguk;Cho, Gihwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.313-320
    • /
    • 2015
  • While various phishing attacks are getting to be increased in constant, their response methods still stay on the stage of responding after identifying an attack. To detect a phishing site ahead of an attack, a method has been suggested with utilizing the Referer header field of HTTP. However, it has a limitation to implement a traffic gathering system for each of prospective target hosts. This paper presents a unknown phishing site detection method in the Interior network environment. Whenever a user try to connect a phishing site, its traffic is pre-processed with considering of the characteristics of HTTP protocol and phishing site. The phishing site detection phase detects a suspicious site under phishing with analysing HTTP content. To validate the proposed method, some evaluations were conducted with 100 phishing URLs along with 100 normal URLs. The experimental results show that our method achieves higher phishing site detection rate than that of existing detection methods, as 66% detection rate for the phishing URLs, and 0% false negative rate for the normal URLs.

A Basic Study on the Checklists for Crime Risk Assessment in Physical Environment of the Pedestrian Passage at Residential Area (주거지역 소규모 보행로의 물리적 환경을 대상으로 한 범죄 위험도 평가 체크리스트에 관한 기초 연구)

  • Lee, You-Mi;Park, Hyeon-Ho;Kang, Boo-Seong;Sung, Gi-Ho;Lim, Dong-Hyun
    • KIEAE Journal
    • /
    • v.16 no.3
    • /
    • pp.47-55
    • /
    • 2016
  • Purpose: This study was aimed at providing the basic checklist as a means to assess the crime risk in physical environment of the pedestrian passage at residential area. Method: For this purpose, the preliminary checklists were selected according to the review of the precedent studies of checklists in exterior pedestrian passage. The usefulness and the importance of the preliminary checklists were analyzed through the seven expert group meetings, the 87 questionnaires survey of the crime experts & the architectural/urban experts, preliminary assessment and field survey. Results: The assessment categories of checklists were sorted into six types, i.e. spatial structure & function, lighting, landscaping, security facilities, other facilities and cleaning & maintenance. The 49 checklists were proposed according to the assessment categories. The final checklists were divided key checklists and general checklists based on the results of experts' weighting of each list item. There were significant differences between crime experts' weighting and architectural/urban experts' weighting in several checklists, i.e. dividing between pavements and streets, the brightness of light, white light.

Fuzzy-based Segmentation Algorithm for Brain Images (퍼지기반의 두뇌영상 영역분할 알고리듬)

  • Lee, Hyo-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.12
    • /
    • pp.102-107
    • /
    • 2009
  • As technology gets developed, medical equipments are also modernized and leading-edge systems, such as PACS become popular. Many scientists noticed importance of medical image processing technology. Technique of region segmentation is the first step of digital medical image processing. Segmentation technique helps doctors to find out abnormal symptoms early, such as tumors, edema, and necrotic tissue, and helps to diagnoses correctly. Segmentation of white matter, gray matter and CSF of a brain image is very crucial part. However, the segmentation is not easy due to ambiguous boundaries and inhomogeneous physical characteristics. The rate of incorrect segmentation is high because of these difficulties. Fuzzy-based segmentation algorithms are robust to even ambiguous boundaries. In this paper a modified Fuzzy-based segmentation algorithm is proposed to handle the noise of MR scanners. A proposed algorithm requires minimal computations of mean and variance of neighbor pixels to adjust a new neighbor list. With the addition of minimal compuation, the modified FCM(mFCM) lowers the rate of incorrect clustering below 30% approximately compared the traditional FCM.

A Rogue AP Detection Method Based on DHCP Snooping (DHCP 스누핑 기반의 비인가 AP 탐지 기법)

  • Park, Seungchul
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.11-18
    • /
    • 2016
  • Accessing unauthorized rogue APs in WiFi environments is a very dangerous behavior which may lead WiFi users to be exposed to the various cyber attacks such as sniffing, phishing, and pharming attacks. Therefore, prompt and precise detection of rogue APs and properly alarming to the corresponding users has become one of most essential requirements for the WiFi security. This paper proposes a new rogue AP detection method which is mainly using the installation information of authorized APs and the DHCP snooping information of the corresponding switches. The proposed method detects rogue APs promptly and precisely, and notify in realtime to the corresponding users. Since the proposed method is simple and does not require any special devices, it is very cost-effective comparing to the wireless intrusion prevention systems which are normally based on a number of detection sensors and servers. And it is highly precise and prompt in rogue AP detection and flexible in deployment comparing to the existing rogue AP detection methods based on the timing information, location information, and white list information.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

The external and internal morphological standards of original plants and herbal states in two kinds of Rhei Rhizoma (2종(種) 대황(大黃)의 외부(外部) 및 내외부형태(內外部形態))

  • Kim, Ja-Young;Choi, Go-Ya;Kim, Hong-Jun;Ju, Young-Sung
    • Korean Journal of Oriental Medicine
    • /
    • v.12 no.1
    • /
    • pp.39-48
    • /
    • 2006
  • The Following is a list of specific external and internal morphology of Rheum palmatum L. and R. undulatum L. in Rhei Rhizoma. 1. For the original plants of Rhei Rhizoma in the literatures. 18 plants are reported. 2. The external characteristics of original plant : R. palmatum has a large palmate leaf, its petiole of radical leaf has a simple bristle and its flower is purple and pink color. Whereas R. undulatum has a medium ovate leaf, its petiole of radical leaf is purphish, its stem leaf surrounds a half of stem and its flower is yellowish white color. 3. The character of herbal states : a. diameter and size-- R. palmaum is bigger and heavier than R. undulatum. b. in section--R. palmatum is dark brown color, R. undulatum is bright brown color Fibrovascular bundle is arranged in circle shape in R. patmatum. R. undulatum shows a distingushed wheel shape. 4. The internal characteristics : R. palmatum has a large intercellular space of cork layer, its cambium is clear and a xylem medullary ray is comparatively tight, Whereas R. undulatum has a tight intercettular space of cork layer., its cambium is a few clear and xylem medullary ray is verty tight. As these results, additional study is required to distinguish herbs and their effect among many kinds of same genus-degree of relatedness.

  • PDF

The Design and Implement of Microarry Data Classification Model for Tumor Classification (종양 분류를 위한 마이크로어레이 데이터 분류 모델 설계와 구현)

  • Park, Su-Young;Jung, Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1924-1929
    • /
    • 2007
  • Nowadays, a lot of related data obtained from these research could be given a new present meaning to accomplish the original purpose of the whole research as a human project. The method of tumor classification based on microarray could contribute to being accurate tumor classification by finding differently expressing gene pattern statistically according to a tumor type. Therefore, the process to select a closely related informative gene with a particular tumor classification to classify tumor using present microarray technology with effect is essential. In this thesis, we used cDNA microarrays of 3840 genes obtained from neuronal differentiation experiment of cortical stem cells on white mouse with cancer, constructed accurate tumor classification model by extracting informative gene list through normalization separately and then did performance estimation by analyzing and comparing each of the experiment results. Result classifying Multi-Perceptron classifier for selected genes using Pearson correlation coefficient represented the accuracy of 95.6%.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

Software integrity verification method in POS system (POS시스템 내 소프트웨어 무결성 검증 방안)

  • Cho, Sung-A;Kim, Sung Hoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.987-997
    • /
    • 2012
  • A Point-of-Sales (POS) terminal manages the selling process by a salesperson accessible interface in real time. Using a POS system makes a business and customer management much more efficient. For these reasons, many store install POS terminal and used it. But it has many problem that stealing personal information by hacking and insider corruption. Because POS system stored payment information like that sales information, card valid period, and password. In this paper, I proposed software integrity verification technique in POS system based on White list. This method can prevent accidents that personal information leak by hacking and POS system forge and falsification. This proposed method provides software integrity, so it can prevent inside and outside threats in advance.