• Title/Summary/Keyword: software vulnerability

Search Result 245, Processing Time 0.022 seconds

An Analysis of Factors Affecting Medical Operating Income at Regional Public Hospital (지방의료원 의료이익에 대한 영향요인 분석)

  • Jin Won Noh;Jeong Hoe Kim;Hui Won Jeon;Jeong Ha Kim;Hyo Jung Bang;Hae Jong Lee
    • Health Policy and Management
    • /
    • v.33 no.1
    • /
    • pp.55-64
    • /
    • 2023
  • Background: Despite the various activities of the regional public hospitals, discussions are being made as to whether or not to continue due to the issue of financial deficit. Therefore, the main factors affecting the fiscal deficit were analyzed with 10-year data. Methods: This study is a panel analysis that analyzed the characteristics of 34 regional public hospitals and influencing factors on medical benefits for 10 years from 2010 to 2019. First, we analyze the determinants of medically vulnerable areas set by the government, analyze the trend of medical profit per 100 beds and medical profit rate from 2010 to 2019, and identify the factors that affect them. Results: Differences in medical profit per 100 beds and medical profit-to-medical profit rate were caused by market share representing regional characteristics, and both indicators improved as the number of outpatients increased. The important influencing variables are the number of doctors and nurses, and both indicators improve when there are specialists, but medical benefits decrease as the number of doctors increases when judged by the number of people per 100 beds. In addition, the number of nurses per 100 beds does not contribute to medical profit and has a negative effect on the medical profit ratio. Conclusion: As only regional characteristics were taken into account for medically vulnerable areas, operational characteristics need to be considered. The greatest impact on the finances of local medical centers is the proper staffing of doctors and nurses, and their efficient arrangement is the most important factor in financial stability.

Seismic Retrofit Assessment of Different Bracing Systems

  • Sudipta Chakraborty;Md. Rajibul Islam;Dookie Kim;Jeong Young Lee
    • Architectural research
    • /
    • v.25 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • Structural ageing influences the structural performance in a negative way by reducing the seismic resilience of the structure which makes it a major concern around the world. Retrofitting is considered to be a pragmatic and feasible solution to address this issue. Numerous retrofitting techniques are devised by researchers over the years. The viability of using steel bracings as retrofitting component is evaluated on a G+30 storied building model designed according to ACI318-14 and ASCE 7-16. Four different types of steel bracing arrangements (V, Inverted V/ Chevron, Cross/ X, Diagonal) are assessed in the model developed in commercial nu-merical analysis software while considering both material and geometric nonlinearities. Reducing displacement and cost in the structures indicates that the design is safe and economical. Therefore, the purpose of this article is to find the best bracing system that causes minimum displacement, which indicates maximum lateral stiffness. To evaluate the seismic vulnerability of each system, incremental dynamic analysis was conducted to develop fragility curves, followed by the formation of collapse margin ratio (CMR) as stipulated in FEMA P695 and finally, a cost estimation was made for each system. The outcomes revealed that the effects of ge-ometric nonlinearity tend to evoke hazardous consequences if not considered in the structural design. Probabilistic seismic and economic probes indicated the superior performance of V braced frame system and its competency to be a germane technique for retrofitting.

Cortical thickness of the rostral anterior cingulate gyrus is associated with frailty in patients with end-stage renal disease undergoing hemodialysis in Korea: a cross-sectional study

  • Sang Hyun Jung;Jong Soo Oh;So-Young Lee;Hye Yun Jeong
    • Journal of Yeungnam Medical Science
    • /
    • v.40 no.4
    • /
    • pp.381-387
    • /
    • 2023
  • Background: Frailty is defined as a condition of being weak and delicate, and it represents a state of high vulnerability to adverse health outcomes. Recent studies have suggested that the cingulate gyrus is associated with frailty in the elderly population. However, few imaging studies have explored the relationship between frailty and the cingulate gyrus in patients with end-stage renal disease (ESRD) undergoing hemodialysis. Methods: Eighteen right-handed patients with ESRD undergoing hemodialysis were enrolled in the study. We used the FreeSurfer software package to estimate the cortical thickness of the regions of interest, including the rostral anterior, caudal anterior, isthmus, and posterior cingulate gyri. The Beck Depression Inventory, Beck Anxiety Inventory, and laboratory tests were also conducted. Results: The cortical thickness of the right rostral anterior cingulate gyrus (ACG) was significantly correlated with the Fried frailty index, age, and creatinine level. Multiple regression analysis indicated that the cortical thickness of the right rostral ACG was associated with frailty after controlling for age and creatinine level. Conclusion: Our results indicate that the cortical thickness of the rostral ACG may be associated with frailty in patients with ESRD on hemodialysis and that the rostral ACG may play a role in the frailty mechanism of this population.

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.

Estimating the rating curve of irrigation canals in the Cheongju Sindae area

  • Mikyoung Choi;Inhyeok Song;Heesung Lim;Hansol Kang;Hyunuk An
    • Korean Journal of Agricultural Science
    • /
    • v.51 no.1
    • /
    • pp.79-86
    • /
    • 2024
  • As the frequency and intensity of heavy rains increase, the vulnerability of agriculture to disasters also increases. Consequently, there is a need to improve flood and inundation predictions. To enhance the accuracy of inundation predictions, it is essential to monitor water level and discharge data within agricultural areas. This study was conducted to monitor water levels and rainfall in the Cheongju Sindae area from 2022 to 2023, and the data was utilized as input and validation data for agricultural inundation modeling. Four irrigation drainage canals were installed to a square-shaped concrete structure where the water level gauge is. It was then confirmed that the water level rises with rainfall. The flow velocities were monitored during periods of heavy rainfall. The rating curve, which estimates water level and flow velocity based on observations, was estimated using the software K-HQ. The resulting curve was presented with the Coefficient of Determination (R2). K-HQ was also used to calculate the equation for the rating curve, taking outliers into account at each data point. Outliers were extracted and the rating curve was recalculated. As the coefficient of determination of three out of four stations exceeded 0.95, the estimated rating curve may be considered reliable for discharge estimation. This study provides critical data for enhancing agricultural inundation modeling accuracy and drainage improvement projects.

Stress distribution in implant abutment components made of titanium alloy, zirconia, and polyetheretherketone: a comparative study using finite element analysis (티타늄 합금, 지르코니아, 폴리에테르에테르케톤 지대주 재질에 따른 임플란트 구성요소의 응력분포: 유한 요소 분석을 통한 비교 연구)

  • Sung-Min Kim
    • Journal of Technologic Dentistry
    • /
    • v.46 no.2
    • /
    • pp.21-27
    • /
    • 2024
  • Purpose: This study aimed to analyze the stress distribution and deformation in implant abutments made from titanium (Ti-6Al-4V), zirconia, and polyetheretherketone (PEEK), including their screws and fixtures, under various loading conditions using finite element analysis (FEA). Methods: Three-dimensional models of the mandible with implant abutments were created using Siemens NX software (NX10.0.0.24, Siemens). FEA was conducted using Abaqus to simulate occlusal loads and assess stress distribution and deformation. Material properties such as Young's modulus and Poisson's ratio were assigned to each component based on literature and experimental data. Results: The FEA results revealed distinct stress distribution patterns among the materials. Titanium alloy abutments exhibited the highest stress resistance and the most uniform stress distribution, making them highly suitable for long-term stability. Zirconia abutments showed strong mechanical properties with higher stress concentration, indicating potential vulnerability to fracture despite their aesthetic advantages. PEEK abutments demonstrated the least stress resistance and higher deformation compared to other abutment materials, but offered superior shock absorption, though they posed a higher risk of mechanical failure under high load conditions. Conclusion: The study emphasizes the importance of selecting appropriate materials for dental implants. Titanium offers durability and uniform stress distribution, making it highly suitable for long-term stability. Zirconia provides aesthetic benefits but has a higher risk of fracture compared to titanium. PEEK excels in shock absorption but has a higher risk of mechanical failure compared to both titanium and zirconia. These insights can guide improved implant designs and material choices for various clinical needs.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining (베이지안 확률 및 폐쇄 순차패턴 마이닝 방식을 이용한 설명가능한 로그 이상탐지 시스템)

  • Yun, Jiyoung;Shin, Gun-Yoon;Kim, Dong-Wook;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.77-87
    • /
    • 2021
  • With the development of the Internet and personal computers, various and complex attacks begin to emerge. As the attacks become more complex, signature-based detection become difficult. It leads to the research on behavior-based log anomaly detection. Recent work utilizes deep learning to learn the order and it shows good performance. Despite its good performance, it does not provide any explanation for prediction. The lack of explanation can occur difficulty of finding contamination of data or the vulnerability of the model itself. As a result, the users lose their reliability of the model. To address this problem, this work proposes an explainable log anomaly detection system. In this study, log parsing is the first to proceed. Afterward, sequential rules are extracted by Bayesian posterior probability. As a result, the "If condition then results, post-probability" type rule set is extracted. If the sample is matched to the ruleset, it is normal, otherwise, it is an anomaly. We utilize HDFS datasets for the experiment, resulting in F1score 92.7% in test dataset.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Chemical Disaster of Methyl Isocyanate Leakage (화학물질 누출에 의한 대량재해 - Methyl Isocyanate 누출을 중심으로 -)

  • Yang, Hyuk-Jun;Choi, Jung-Myung;Yoo, Dong-Jun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.3 no.1
    • /
    • pp.7-19
    • /
    • 1999
  • Background : We are in the edge of some human made disasters such as hazardous materials and air pollution, for example, the world news reported that the city of Bhopal, India had serious victims related with a leaking out of the chemical materials, Methyl Isocyanate and many people in India were killed by. These situations many people who live in this world are world are worrying about are not others, but just ours and people consider about that kind of the disasters are the possible situation to happen to all the people. Therefore, we performed this basic study to recognize the risk of Methyl Isocyanate leak accident and to prepare local disaster plan with EMS system. Method : Trace 8.0, a simulation software made by the U.S. company Safer System was used as a tool to estimate the diffusion distance, area and its victims at the concentrations of 0.02ppm, 0.2ppm 5ppm respectively for an assumed B-city of 2 hundred thousands population count in which was presumed 500kg Methyl Isocyanate gas to leak out. Results : 1. During 1 hour, maximum diffusion distances of 0.02ppm 0.2ppm and 5ppm were 5.41km, 1.61km and 0.29km respectively on the plume impact. 2. Maximum population counts influenced by Methyl Isocyanate gas at the concentrations of 0.02ppm 0.2ppm and 5ppm were 40838, 4346 and 222 on the plume impact, while those were 138238, 17261 and 1588 on the vulnerability impact, respectively. 3. Therefore, 17261 persons must put on respiratory device and 138283 persons must be evacuated to safety place within 1 hour. Conclusions : Only small amount leak of Methyl Isocyanate may cause tremendous chemical disaster in urban area, so its disaster plan must be prepared with an accident simulation program and Material Safety Data Sheets(MSDS). Especially, nearby emergency center of an industrial complex must have a strong position about preparation of chemical disaster plan and perform a disaster dill of hazardous material accident annually.

  • PDF