• Title/Summary/Keyword: top attack

Search Result 62, Processing Time 0.025 seconds

Experience in Jang Jong-jeong's Vomiting Treatment (장종정(張從正) 토법(吐法)의 경험례)

  • Kim, Eui tae;Cha, Ung-Seok;Kim, Nam il
    • The Journal of Korean Medical History
    • /
    • v.19 no.2
    • /
    • pp.87-100
    • /
    • 2006
  • Jang Jong-jeong thought that, because all diseases come from miasma, for treating diseases, it is important to attack or remove miasma infiltrating into the body. Thus, he treated diseases using three methods, namely, vomiting against miasma on the top, sweating against miasma on the surface, and diarrhea against miasma on the bottom. Among them, vomiting is rarely used in contemporary Oriental medicine, but still one of major disease treatment methods. Vomiting is quite meaningful in today's clinics and particularly effective for acute diseases, the miasma of which is in the upper chest. According to the present researcher's experiences, it is effective in cases that the pathological symptoms are observed in the upper chest such as early stroke, dyspepsia, chest congestion and congestion heat. For vomiting, the researcher applied Dokseongsan, Samseongsan, Gwachesan, Gangyeomtang, Bangpungtongseongsan, etc. Dokseongsan was used for vomiting in a cool way, and Samseongsan and Gwachesan were used for vomiting in a warm way. Bangpungtongseongsan was used when inner heat was choked up by the attack of external miasma and when the pathological symptoms of Bangpungtongseongsan were observed.

  • PDF

Ten-Year Performance of Shell-Treated Wooden Deck

  • RA, Jong Bum
    • Journal of the Korean Wood Science and Technology
    • /
    • v.47 no.6
    • /
    • pp.667-673
    • /
    • 2019
  • The performance of a wooden deck made of refractory materials that have difficulties in achieving target penetrations as stipulated in the specification and quality standards for treated wood in Korea, was assessed via a case study in this research. A wooden deck built in Jinju in 2009 was selected for this study because of its fabrication method using pressure and treated refractory materials. The penetration and retention analysis did not satisfy the domestic standard for treated wood. Inspection of the deck in 2019 revealed that the deck had been attacked by decay fungi. Cap rails showed much deeper and wider checking on their surface compared with the top and base rails, resulting in a severe fungal attack. The decking boards exhibited severe fungal decay primarily in the end parts. However, the rails and balusters without checks and posts were virtually free of fungal attack irrespective of the preservative penetration measures. Copper content in the soil 5 cm away from the deck was less than 150 mg/kg, implying that copper movement in the soil was very limited. These results suggest that the inhibition of surface propagation and the protection of end surfaces are essential factors in increasing the longevity of treated wooden decks; further, the results also showed that the deck was within an acceptable range from the point of copper contamination.

An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions (Single Sign-On 솔루션의 재전송 공격 취약점 분석)

  • Maeng, Young-Jae;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.103-114
    • /
    • 2008
  • Single Sign-On is an authentication scheme that enables a user to authenticate once and then to access to the resources of multiple software systems without re-authentication. As web services are being integrated into a single groupware, more web sites are adopting for user convenience. However, these Single Sign-On services are very dependent upon the cookies and thus, simple eavesdropping enables attackers to hiject the user's session. Even worse, the attacker who hijacked one session can move to another site through the Single Sign-On. In this paper, we show the vulnerabilities of the top ranked sites regarding this point of view and also propose a way to protect a user's session.

A Comparative Study on the Distinction of Patients with Stroke in the Case of the First Attack and Recurrence (중풍(中風) 초발(初發) 및 재발환자(再發患者)의 특성(特性)에 관한 비교연구(比較硏究))

  • Kwon, Jun-Cheol
    • The Journal of Korean Medicine
    • /
    • v.28 no.1 s.69
    • /
    • pp.25-34
    • /
    • 2007
  • Objectives : The present study was carried out to provide basic information necessary for the prevention and efficient treatment of stroke through a comparison between thr patients of the first attack and those of recurrence. Methods : The observation f3r the current study was made on 210 cases of stroke that were confirmed through brain CT-scan. The patients were hospitalized at one of two oriental medical hospitals in Seoul during 2006. Result : The main results were as follows. First, the male-to-female ratio of stroke patients were 1:1.26, with more primary stroke far females and more recurrent stroke for males. Second, in the age distribution, seventies was the top, and sixties, fifties, and forties were next in the order of frequency. A large city was the most frequent residential site and unemployment was the most frequent occupation to have stroke. The incidence of stroke became higher as patients had a taste for spicy and salty food. Third, the most common preceding disease was hypertension. In the relationship of diastolic blood pressure with recurrence, there was significance in the test of independence. Fourth, the most important precipitating conditions at the onset of stroke were rest and steeping. The most common precedent symptoms were verbal disturbance, numbness, and dizziness. In the stroke patients with hemiparesis, male and female patients usually showed It. hemiparesis. Fifth, as a result of brain CT-scan, cerebral hemorrhage was inclined to reduce but cerebral infarction was inclined to increase due to senility and change of lifestyle. Finally, total cholesterol findings disclosed that 22.4% were hypercholesteremia, 18.6 % were hyperlipemia in triglyceride findings, and 19.0% were glycosemia in glucose findings. Conclusions : The above results suggested avoidance of meat and salty fDod and positive control of hypertension and diabetes mellitus in order to prevent stroke.

  • PDF

The Kinematic Characteristics of Javelin in Korean Male Javelin Throwers Following Rank (한국 남자 창던지기 선수들의 순위별 창의 운동학적 특성)

  • Kim, Tae-Sam;Ryu, Ji-Seon;Park, Jae-Myoung
    • Korean Journal of Applied Biomechanics
    • /
    • v.23 no.2
    • /
    • pp.99-108
    • /
    • 2013
  • The purpose of this study was to analyze the kinematic characteristics of javelin to compare the characteristics between world elite athletes and local male athletes. The subjects selected 9 athletes out of total 13 athletes recorded more than 65 m in the preliminary and main competition participated in the 93rd National Sports Festival held in 2012. Three-Dimensional motion analysis using a system of 4 video cameras(Sony HXR-MC2000) at a sampling frequency of 60 fields/s was performed for this study. The Kwon3D 3.1 was used to obtain the three dimensional coordinates about the top, grip, end of javelin. And the kinematic factors of javelin calculated using Matlab2009a program. The resultant speed of javelin that affects directly to the record of performance showed 26.08 m/s indicated lower speed of about 2-3 m/s than world elite athletes. The release point appeared to have been made at the high of $1.79{\pm}0.07$ m of 99.8% of the height of the athletes. In terms of release angle, it was indicated average $33.0{\pm}3.81^{\circ}$ lower release angle compared to the world elite athletes. The attitude angle(up & down tilt angle, X axis) related to javelin indicated average $38.5{\pm}4.96^{\circ}$, its related attack angle average $5.5{\pm}5.11^{\circ}$, and yaw angle(sideslip, side attack angle) average $15.7{\pm}8.48^{\circ}$.

Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks

  • Dai, Hua;Yang, Geng;Huang, Haiping;Xiao, Fu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2111-2131
    • /
    • 2015
  • Tiered wireless sensor network is a network model of flexibility and robustness, which consists of the traditional resource-limited sensor nodes and the resource-abundant storage nodes. In such architecture, collected data from the sensor nodes are periodically submitted to the nearby storage nodes for archive purpose. When a query is requested, storage nodes also process the query and return qualified data as the result to the base station. The role of the storage nodes leads to an attack prone situation and leaves them more vulnerable in a hostile environment. If any of them is compromised, fake data may be injected into and/or qualified data may be discarded. And the base station would receive incorrect answers incurring malfunction to applications. In this paper, an efficient verifiable top-k query processing scheme called EVTQ is proposed, which is capable of verifying the authentication and completeness of the results. Collected data items with the embedded information of ordering and adjacent relationship through a hashed message authentication coding function, which serves as a validation code, are submitted from the sensor nodes to the storage nodes. Any injected or incomplete data in the returned result from a corresponded storage node is detected by the validation code at the base station. For saving communication cost, two optimized solutions that fuse and compress validation codes are presented. Experiments on communication cost show the proposed method is more efficiency than previous works.

Related-key Impossible Boomerang Cryptanalysis on LBlock-s

  • Xie, Min;Zeng, Qiya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5717-5730
    • /
    • 2019
  • LBlock-s is the core block cipher of authentication encryption algorithm LAC, which uses the same structure of LBlock and an improved key schedule algorithm with better diffusion property. Using the differential properties of the key schedule algorithm and the cryptanalytic technique which combines impossible boomerang attacks with related-key attacks, a 15-round related-key impossible boomerang distinguisher is constructed for the first time. Based on the distinguisher, an attack on 22-round LBlock-s is proposed by adding 4 rounds on the top and 3 rounds at the bottom. The time complexity is about only 268.76 22-round encryptions and the data complexity is about 258 chosen plaintexts. Compared with published cryptanalysis results on LBlock-s, there has been a sharp decrease in time complexity and an ideal data complexity.

Simulation and Analysis of Top-Attack Smart Submunition Descent Motions and Target Searching Footprint (상부공격 지능자탄의 낙하운동 및 탐색경로 시뮬레이션)

  • Kim, Ki-Pyo;Chang, Kwe-Hyun;Choi, Sang-Kyung;Hong, Jong-Tai
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.6
    • /
    • pp.5-13
    • /
    • 2008
  • A smart submunition drops through the expected trajectory to have a appropriate target searching footprint for the armored ground vehicles. Parachutes can be used as a tool to decelerate and spin the submunition. Usually submunition's descent velocity, spin rate, submunition inclination angle against vertical and dynamic stability affect to its target searching footprint. Therefore it is important to design optimal parachute and load configuration for the overall system performance. In this paper we described the dynamic motion of submunition by the mathematical model of parachute and load. Through the computer simulation we can analyze the submunition footprint affected by parachute and load design.

A Study on the Adaptive Roll Control Scheme for the Top Attack Smart Projectile (상부공격 지능탄의 회전각 적응제어 기법 연구)

  • 홍종태;정수경;최상경
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.3 no.2
    • /
    • pp.61-70
    • /
    • 2000
  • An Adaptive Positive Position Feedback method is presented for controlling the roll of the supersonic smart projectile. The proposed strategy combines the attractive attributes of Positive Position Feedback(PPF) of Goh and Caughey, and Lyapunov stability theorem. The parameters of Adaptive-PFF controller are adjusted in an adaptive mauler in order to follow the performance of an optimal reference model. In this way, optimal damping and zero steady-state errors can be achieved even in the presence of uncertain or changing plant parameters. The performance obtained with the Adaptive-PPF algorithm is compared with conventional PPF control algorithm. The results obtained emphasize the potential of Adaptive-PPF algorithm as an efficient means for controlling plants such as supersonic flight systems with uncertainties in real time.

  • PDF

Pruning for Robustness by Suppressing High Magnitude and Increasing Sparsity of Weights

  • Cho, Incheon;Ali, Muhammad Salman;Bae, Sung-Ho
    • Journal of Broadcast Engineering
    • /
    • v.26 no.7
    • /
    • pp.862-867
    • /
    • 2021
  • Although Deep Neural Networks (DNNs) have shown remarkable performance in various artificial intelligence fields, it is well known that DNNs are vulnerable to adversarial attacks. Since adversarial attacks are implemented by adding perturbations onto benign examples, increasing the sparsity of DNNs minimizes the propagation of errors to high-level layers. In this paper, unlike the traditional pruning scheme removing low magnitude weights, we eliminate high magnitude weights that are usually considered high absolute values, named 'reverse pruning' to ensure robustness. By conducting both theoretical and experimental analyses, we observe that reverse pruning ensures the robustness of DNNs. Experimental results show that our reverse pruning outperforms previous work with 29.01% in Top-1 accuracy on perturbed CIFAR-10. However, reverse pruning does not guarantee benign samples. To relax this problem, we further conducted experiments by adding a regularization term for the high magnitude weights. With adding the regularization term, we also applied conventional pruning to ensure the robustness of DNNs.