• Title/Summary/Keyword: attack rate

Search Result 597, Processing Time 0.027 seconds

Attack Rate of Active Pulmonary Tuberculosis among Dusty Workers who Were Diagnosed with Pneumoconiosis in Korea (진폐환자에서 활동성 폐결핵 발병률)

  • Hwang, Joo Hwan
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.29 no.4
    • /
    • pp.582-589
    • /
    • 2019
  • Objectives: Although active pulmonary tuberculosis(active PTB) is manifested as one of the complications of pneumoconiosis, attacks of active PTB among patients with pneumoconiosis is still unexplored. The objective of the present study was to identify the attack rate of active PTB among workers in dusty environments who were diagnosed with pneumoconiosis. Methods: The study was performed using the results of the Pneumoconiosis Examination Council's assessment from the Korea Workers' Compensation and Welfare Service(KCOMWEL) database between January 1, 1984 and December 31, 2017. Pneumoconiosis was defined as Category 1 or more in the radiological findings of pneumoconiosis. Active PTB was defined as a positive result for active PTB in the results of the Pneumoconiosis Examination Council's assessment. Results: A total of 37,946 workers in dusty environments who received a health examination for diagnosing pneumoconiosis between January 1, 1984 and December 31, 2017 were selected as study subjects. The attack rate of active TB among subjects who were diagnosed with pneumoconiosis and those who were diagnosed without pneumoconiosis were 8.5% and 1.4%, respectively. In the multivariate logistic analysis including age, sex, radiological findings, complications, male[odds ratio(OR), 2.0; 95% confidence interval(CI), 1.4-3.1] and pneumoconiosis(OR, 6.5; 95% CI, 5.7-7.4) were associated with an increased risk of developing active PTB. Conclusions: The present study determined that dusty workers who were diagnosed with pneumoconiosis had a high rate of active PTB compared to TB patients and patients who were diagnosed with silicosis. Therefore, in addition to silicosis, it is necessary to include pneumoconiosis among the high-risk groups for TB.

A study on flow velocity reduction and hydrodynamic characteristics of copper alloy netting by solidity ratios and attack angles (구리합금그물감의 공극률 및 영각에 의한 유속 감소와 유체역학적 특성에 관한 연구)

  • KANG, Ahrim;LEE, Jihoon
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.55 no.1
    • /
    • pp.62-73
    • /
    • 2019
  • Recently, copper alloy netting has been proposed as a material for aquaculture facilities that can be set in harsh offshore environments. To design a cage made of copper alloy netting, it is necessary to calculate the flow of water through the netting and force of external sources on the netting. Therefore, this study measured and analyzed the current velocity reduction after passing through the netting and the hydrodynamic forces acting on the netting using copper alloy netting with nine solidity ratios. As a result of the reduction rate of the flow velocity through the netting, the flow reduction rate was increased as the solidity ratio of netting was increased. The flow reduction rate was also increased as the attack angle on the netting was decreased. In analyzing the resistance on the netting, we also discovered that resistance was increased with increase in the flow velocity and solidity ratio. An analysis of the hydrodynamic coefficient acting on the netting is shown that the drag coefficient tends to increase as the attack angle increases. We also analyzed the hydrodynamic coefficient according to the variation of the Reynolds number. When the drag coefficients acting on the netting were analyzed with the different Reynolds numbers, the Reynolds number increased from over 0.3 m/s to a relative constant. Finally, the copper alloy nettings had a smaller velocity reduction rate when comparing the flow velocity reduction rate between copper alloy nettings and nylon nettings.

A Study on the Medical Accident Attack Rate in a Korean rural Area through the Sam Wha Medicare Insurance Union (충남 서산군 삼화의료보험조합을 통해본 일부 농촌지역 주민의 의료사고 발생율 및 진료수혜 실태 조사)

  • Ahn, Moon-Young;Lee, Jung-Ja;Nam, Taik-Sung
    • Journal of agricultural medicine and community health
    • /
    • v.6 no.1
    • /
    • pp.33-41
    • /
    • 1981
  • To investigate the status of medical accident attack rate and medicare utilization during last 27months from 1st Oct., 1977 to 31st Dec. 1979 in the area under Sam Wha Medicare Insurance Union, the study was carried out through analyzing the medicare records of patients who were enrolled. "The medical accident" in this study was used as the meaning of the state that the people who have been treated morbid condition with insurance money. For the study, 2 doctors and one nurse were mobilized and the results are as follows: 1) The total number of the Medicare Insurance Union members among the 37,044 total population of the study area, (Hea-mi, Unsan, Eumam Myun) were 57, 35 composed of 3,000 males (52.3%) and 27, 35 females (47.7%) in 1977, 3,383 composed of 2,006 males (59.3%) 1,377 females (40.7%) in 1978, 2,573 composed of 1,437 males and 1,336 females (44.2%) in 1979. 2) Total number of medical accident attack cases were 6,774 case (partially overlapped the number of the 1977 with that of the 1978) and average annual medical accident attack rate per 1,000 population was 700.9. 3) Five major disease group in the past three years were disease of the respiratory system (177.7), disease of the digestive system (165.8), disease of the skin and subcutaneous(64.9), symptoms, signs and ill-defined conditions (64.6), any injury and poisoning (51.9). Mental disorders (32.6) was the 6th order disease group. 4) The order of the medical accident attack rate of age group per 1,000 population per year was the year group of 0~4(877.8), 45~64(832.6), 25~44(810.3), 5~14(495.1) 15~24(494.7) 65 and over (460.7). 5) Medical accident attack rate of age group per 1,000 population in the 5 major disease groups were the year group of 45~64 (100.0) in the mental disorders 0~4(525.1) in the disease of the respiratory system 45~64 (328.5) in the disease of the digestive system 0~4 (202.8) in the disease of the skin and subcutanous tissue, 25~44 (98.3) in the accidents and poisoning. 6) Monthly medical accidents attack rate were 87.0 in the winter (Dsc., Jan., Feb.) and 86.2 in the summer (Jun., July, Aug.). So the trend of the medical accidents attack rate during the year was bimount figure. 7) Monthly medical accidents attack rate in the major disease group were highest in Jan., Apr., (31.1) in the disease of the respiratory system, in Jan., Feb., Mar. (24.9) in the disease of the digestive system, in Jan., Jun., Aug. (9.8) in the injury and poisoning. 8) Duration of the treatment of the 93.1% of the total cases were within 5 days. 9) 299 cases (4.5%) of the total number of cases, 6,587 cases were referred to secondary and tertiary medicare facilities. 10) The order of the major 10 kinds of diagnosis of the disease, 6,587 cases during 27 months, were URI and chillness (1,063 cases, 16.1%), gastritis(830 cases, 12. 6%) dermatitis(360 cases, 5.5%), bronchitis(291 cases, 4.4%), neurosis (284 cases, 4.3%), contusion (165 cases, 2.5%), tooth extraction (157 cases, 2.4%), tonsillitis (109 cases, 0.7%), laceration (107 cases, 1.6%), neuralgia (105 cases, 1.6%), arthritis (104 cases, 1.6%), otitis media and mastoiditis (103 cases, 1.6%), so total case were 3,678 cases (55.9%).

  • PDF

Intrusion Detection: Supervised Machine Learning

  • Fares, Ahmed H.;Sharawy, Mohamed I.;Zayed, Hala H.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.305-313
    • /
    • 2011
  • Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. The sophistication of network attacks, as well as their severity, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. The aim of this research is to classify network attacks using neural networks (NN), which leads to a higher detection rate and a lower false alarm rate in a shorter time. This paper focuses on two classification types: a single class (normal, or attack), and a multi class (normal, DoS, PRB, R2L, U2R), where the category of attack is also detected by the NN. Extensive analysis is conducted in order to assess the translation of symbolic data, partitioning of the training data and the complexity of the architecture. This paper investigates two engines; the first engine is the back-propagation neural network intrusion detection system (BPNNIDS) and the second engine is the radial basis function neural network intrusion detection system (BPNNIDS). The two engines proposed in this paper are tested against traditional and other machine learning algorithms using a common dataset: the DARPA 98 KDD99 benchmark dataset from International Knowledge Discovery and Data Mining Tools. BPNNIDS shows a superior response compared to the other techniques reported in literature especially in terms of response time, detection rate and false positive rate.

Efficient Poisoning Attack Defense Techniques Based on Data Augmentation (데이터 증강 기반의 효율적인 포이즈닝 공격 방어 기법)

  • So-Eun Jeon;Ji-Won Ock;Min-Jeong Kim;Sa-Ra Hong;Sae-Rom Park;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • Recently, the image processing industry has been activated as deep learning-based technology is introduced in the image recognition and detection field. With the development of deep learning technology, learning model vulnerabilities for adversarial attacks continue to be reported. However, studies on countermeasures against poisoning attacks that inject malicious data during learning are insufficient. The conventional countermeasure against poisoning attacks has a limitation in that it is necessary to perform a separate detection and removal operation by examining the training data each time. Therefore, in this paper, we propose a technique for reducing the attack success rate by applying modifications to the training data and inference data without a separate detection and removal process for the poison data. The One-shot kill poison attack, a clean label poison attack proposed in previous studies, was used as an attack model. The attack performance was confirmed by dividing it into a general attacker and an intelligent attacker according to the attacker's attack strategy. According to the experimental results, when the proposed defense mechanism is applied, the attack success rate can be reduced by up to 65% compared to the conventional method.

Kinetics and Mechanism of the Aminolysis of Diphenyl Phosphinic Chloride with Anilines

  • Ul Hoque, Md.Ehtesham;Lee, Hai-Whang
    • Bulletin of the Korean Chemical Society
    • /
    • v.28 no.6
    • /
    • pp.936-940
    • /
    • 2007
  • The aminolyses of diphenyl phosphinic chloride (1) with substituted anilines in acetonitrile at 55.0 oC are investigated kinetically. Large Hammett ρ X (ρnuc = ?4.78) and Bronsted β X (βnuc = 1.69) values suggest extensive bond formation in the transition state. The primary normal kinetic isotope effects (kH/kD = 1.42-1.82) involving deuterated aniline (XC6H4ND2) nucleophiles indicate that hydrogen bonding results in partial deprotonation of the aniline nucleophile in the rate-limiting step. The faster rate of diphenyl phosphinic chloride (1) than diphenyl chlorophosphate (2) is rationalized by the large proportion of a frontside attack in the reaction of 1. These results are consistent with a concerted mechanism involving a partial frontside nucleophilic attack through a hydrogen-bonded, four-center type transition state.

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption

  • Verma, Om Prakash;Nizam, Munazza;Ahmad, Musheer
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.271-286
    • /
    • 2013
  • Recently, a pixel-chaotic-shuffling (PCS) method has been proposed by Huang et al. for encrypting color images using multiple chaotic systems like the Henon, the Lorenz, the Chua, and the Rossler systems. All of which have great encryption performance. The authors claimed that their pixel-chaotic-shuffle (PCS) encryption method has high confidential security. However, the security analysis of the PCS method against the chosen-plaintext attack (CPA) and known-plaintext attack (KPA) performed by Solak et al. successfully breaks the PCS encryption scheme without knowing the secret key. In this paper we present an improved shuffling pattern for the plaintext image bits to make the cryptosystem proposed by Huang et al. resistant to chosen-plaintext attack and known-plaintext attack. The modifications in the existing PCS encryption method are proposed to improve its security performance against the potential attacks described above. The Number of Pixel Change Rate (NPCR), Unified Average Changed Intensity (UACI), information entropy, and correlation coefficient analysis are performed to evaluate the statistical performance of the modified PCS method. The simulation analysis reveals that the modified PCS method has better statistical features and is more resistant to attacks than Huang et al.'s PCS method.

Real-Time Detection on FLUSH+RELOAD Attack Using Performance Counter Monitor (Performance Counter Monitor를 이용한 FLUSH+RELOAD 공격 실시간 탐지 기법)

  • Cho, Jonghyeon;Kim, Taehyun;Shin, Youngjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.151-158
    • /
    • 2019
  • FLUSH+RELOAD attack exposes the most serious security threat among cache side channel attacks due to its high resolution and low noise. This attack is exploited by a variety of malicious programs that attempt to leak sensitive information. In order to prevent such information leakage, it is necessary to detect FLUSH+RELOAD attack in real time. In this paper, we propose a novel run-time detection technique for FLUSH+RELOAD attack by utilizing PCM (Performance Counter Monitor) of processors. For this, we conducted four kinds of experiments to observe the variation of each counter value of PCM during the execution of the attack. As a result, we found that it is possible to detect the attack by exploiting three kinds of important factors. Then, we constructed a detection algorithm based on the experimental results. Our algorithm utilizes machine learning techniques including a logistic regression and ANN(Artificial Neural Network) to learn from different execution environments. Evaluation shows that the algorithm successfully detects all kinds of attacks with relatively low false rate.

Query-Efficient Black-Box Adversarial Attack Methods on Face Recognition Model (얼굴 인식 모델에 대한 질의 효율적인 블랙박스 적대적 공격 방법)

  • Seo, Seong-gwan;Son, Baehoon;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1081-1090
    • /
    • 2022
  • The face recognition model is used for identity recognition of smartphones, providing convenience to many users. As a result, the security review of the DNN model is becoming important, with adversarial attacks present as a well-known vulnerability of the DNN model. Adversarial attacks have evolved to decision-based attack techniques that use only the recognition results of deep learning models to perform attacks. However, existing decision-based attack technique[14] have a problem that requires a large number of queries when generating adversarial examples. In particular, it takes a large number of queries to approximate the gradient. Therefore, in this paper, we propose a method of generating adversarial examples using orthogonal space sampling and dimensionality reduction sampling to avoid wasting queries that are consumed to approximate the gradient of existing decision-based attack technique[14]. Experiments show that our method can reduce the perturbation size of adversarial examples by about 2.4 compared to existing attack technique[14] and increase the attack success rate by 14% compared to existing attack technique[14]. Experimental results demonstrate that the adversarial example generation method proposed in this paper has superior attack performance.

Numerical Analysis of Flow- and Heat Transfer of a Spinning Blunt Body at Mach 5 (마하수 5에서 회전하는 blunt body의 유동 및 열전달에 관한 수치해석)

  • Lee Myung Sup;Lee Chang Ho;Park Seung O
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2000.05a
    • /
    • pp.172-177
    • /
    • 2000
  • In this numerical work, three dimensional supersonic laminar flow and heat transfer of a blunt body(sphere-cone) at Mach 5 is simulated. The effects of angle of attack and the spin rate on the now and heat transfer are analysed. To solve the three dimensional compressible Wavier-Stokes equation, a finite volume method with the modified LDFSS scheme is employed for spatial discretization, and a point SGS implicit method is used for time integration. It is found that the heat transfer rate increases at the windward side and decreases at the leeward side with the angle of attack. The heat transfer rate at all surfaces slightly increases with the spin rate.

  • PDF