• Title/Summary/Keyword: 악성

Search Result 2,971, Processing Time 0.027 seconds

Diagnostic Approach to a Soft Tissue Mass (연부조직 종양의 진단적 접근)

  • Chun, Young Soo;Song, Seung Hyun
    • Journal of the Korean Orthopaedic Association
    • /
    • v.54 no.4
    • /
    • pp.293-301
    • /
    • 2019
  • Soft tissue masses of the extremities and torso are a common problem encountered by orthopaedic surgeons. Although these soft tissue masses are often benign, orthopaedic surgeons need to recognize the key features differentiating benign and malignant masses. An understanding of the epidemiology and clinical presentation of soft tissue masses is needed to develop a practical approach for evaluation and surgical management. Size and depth are the two most important factors on which triage decisions should be based. In a differential diagnosis of a tumor, it is important to know the characteristics of the soft tissue mass through detailed history taking and physical examinations before the diagnostic procedures. A variety of imaging studies, such as simple radiography, ultrasound, magnetic resonance imaging, positron emission tomography, computed tomography, bone scan, and angiography can be used to diagnose tumors. Know the ledge of advantages and disadvantages of each imaging study is essential for confirming the characteristics of the tumor that can be observed in the image. In particular, ultrasonography is convenient because it can be performed easily in an outpatient clinic and its cost is lower than other image studies. On the other hand, the accuracy of the test is affected by the skill of the examiner. A biopsy should be performed to confirm the tumor and be performed after all imaging studies have been done but before the final treatment of soft tissue tumors. When a biopsy is to be performed, careful attention to detail with respect to multidisciplinary coordination beforehand, cautious execution of the procedure to minimize complications, and expedient follow-up and referral to a musculoskeletal oncologist when appropriate, are essential.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.

Examination Techniques and Imaging Findings of Hepatic Hemangioma (간혈관종의 검사기법과 영상소견)

  • Chang-Hoe Koo;Jong-Wan Keum;Ji-Eun Seok;Dong-Chul Choi;Yun-Ho Choi;Man-Seok Han;Min-Cheol Jeon
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.3
    • /
    • pp.375-384
    • /
    • 2023
  • Most Hepatic hemangiomas are asymptomatic and small in size, making them difficult to find by pathological examination. Therefore, radiological diagnosis is essential for the early finding and diagnosis of Hepatic hemangioma. Three-phase method using contrast medium in computed tomography, T1, T2-weighted imaging in magnetic resonance imaging, dynamic magnetic resonance imaging using contrast medium, echo planar imaging method, diffusion-weighted imaging method, blood pool scan using 99mTc-labeled red blood cells in nuclear medicine, we looked at the color doppler method In ultrasound, and it is important to accurately understand the imaging findings of hepatic hemangioma and perform the examination in order to make an accurate diagnosis. most hepatic hemangioma are benign tumors, care should be taken not to confuse them with malignant tumors such as hepatocellular carcinoma to prevent unnecessary procedures. Therefore, in order to make an accurate diagnosis, it is important to accurately understand the imaging findings of hemangioma and perform the examination.

Risk-based Profit Prediction Model for International Construction Projects (해외건설공사의 리스크 분석에 기초한 수익성 예측모델에 관한 연구)

  • Han, Seung-Heon;Kim, Du-Yon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4D
    • /
    • pp.635-647
    • /
    • 2006
  • Korean construction companies first advanced to the international markets in 1960's and so far have brought more than 4,900 projects which account for 193 billion dollars approximately. With the large increase of national employment and income being followed by the achievement, Korea's construction industry has made an enormous contribution to the improvement of domestic economy for the last 40 years. However, recently the increased risk in international markets as well as the sharpening competition with foreign companies promising in terms of advanced technologies and low labor cost have been driving Korean construction away from the market shares. According to ENR (Engineering News Record, 1994~2003), it is revealed that 15.1% of top 225 global contractors are suffering from loss in international construction markets. This phenomenon is largely due to the highly uncertain characteristics of international projects, which are inherently exposed to various and complicated risky situations. Furthermore, especially for Korean construction companies, it is often the case that the failure in an international construction project cannot be offset by even a sufficient number of successful domestic achievements. Therefore, not only the selective screening among the nominated projects which have strong possibility of collapse but the systematic strategies for controlling potential risk factors are also considered indispensable in international construction portfolio management. The purpose of this study is to first analyze the causal relationships of the profit-influencing variables and the project success, and develop the profitability forecasting model in international construction projects.

Internet based Communication and Relationship (인터넷 기반 커뮤니케이션과 인간관계)

  • Hoon Jang
    • Korean Journal of Culture and Social Issue
    • /
    • v.19 no.2
    • /
    • pp.259-283
    • /
    • 2013
  • It seems that Internet based communication has been settled down in everyday life. Internet based communication studies also have been done and they proposed that internet based communication modal differs from other communications modal. One of the major themes about internet based communication was the effect of internet based communication on relationships. Early studies suggested that internet has negative effect on life and relationships, although it has positive effect on economics and information distribution. Because there is relative anonymity, People and Researchers thought that people easily could be exposed to negative situations like pornography, instant relationship, negative reply and soon. However,Recently there have been on going un-solving arguments about effect of internet based communication.From the negative perspective, Internet based communication is negative to relationship, because internet based communication could displace face to fact communication and old off-line relationships. However, from the positive perspective, researchers focused on the motivation and purpose of internet users. In this paradigm, people could expand their life and relationships using internet because internet could remove the various restrictions for relationship. Moreover they also suggested that people could enlarge their relationships because they could easily disclose theirselves in anonymity. However, No conclusion has been drawn yet and there needs some organization of two standpoints. Accordingly, This study is integrating the two perspectives and proposing future direction of internet based communication and relationship.

  • PDF

Reproducibility Evaluation of Shear Wave Elastography According to the Depth of the Simulated Lesion in Breast Ultrasonography (유방초음파 검사에서 모조 병소의 깊이에 따른 전단파 탄성초음파의 재현성 평가)

  • Jin-Hee Kim;In-Soo Kim;Cheol-Min Jeon;Jae-Bok Han
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.6
    • /
    • pp.919-927
    • /
    • 2023
  • Elastography utilizes the fact that the tissue of a malignant tumor is harder than that of a benign tumor and increases the specificity of diagnosis according to the elastic modulus of the tumor, helping to reduce unnecessary biopsies. However, the reliability of elastography can be influenced by the equipment used and the examiner's skills. In this study, the researchers analyzed the reproducibility of elastography by evaluating phantom images when measuring the elasticity values repeatedly. Phantoms were created using silicone and gelatin with different levels of stiffness, and they were inserted at varying depths from the surface. The elasticity values were measured using shear wave elastography. The study aimed to determine whether the reproducibility of elasticity values remains consistent depending on the stiffness and depth of the lesions. The experimental results showed that there was no statistically significant correlation between the elasticity values obtained through shear wave elastography and the depth or stiffness of the lesions. However, in the lesions with the lowest stiffness, the elasticity values were statistically significant (p<0.001) and showed a high correlation with the depth of the lesions. Although there were variations in the measured elasticity values based on the differences in lesion stiffness and depth, these differences did not significantly impact the diagnosis. Therefore, shear wave elastography remains a reliable diagnostic method, and it is suggested that it can be helpful in the diagnosis of breast lesions.

Recent Findings on the Role of Epigenetic Regulators in the Small-cell Lung Cancer Microenvironment (소세포폐암의 미세환경에서 후성학적 조절인자의 역할에 대한 최신 연구 동향)

  • Min Ho Jeong;Kee-Beom Kim
    • Journal of Life Science
    • /
    • v.34 no.7
    • /
    • pp.520-530
    • /
    • 2024
  • Tumor suppressor genes (TSGs) play a crucial role in maintaining cellular homeostasis. When the function of these genes is lost, it can lead to cellular plasticity that drives the development of various cancers, including small-cell lung cancer (SCLC), which is known for its aggressive nature. SCLC is primarily driven by numerous loss-of-function mutations in TSGs, often involving genes that encode epigenetic regulators. These mutations pose a significant therapeutic challenge as they are not directly targetable. However, understanding the molecular changes resulting from these mutations might provide insights for developing tumor intervention strategies. We propose that despite the heterogeneous genomic landscape of SCLC, the effects of mutations in patient tumors converge on a few critical pathways that drive malignancy. Specifically, alterations in epigenetic regulators lead to transcriptional dysregulation, pushing mutant cells toward a highly plastic state that makes them immune evasive and highly metastatic. This review will highlight studies showing how an imbalance of epigenetic regulators with opposing functions leads to the loss of immune recognition markers, effectively hiding tumor cells from the immune system. Additionally, we will discuss the role of epigenetic regulators in maintaining neuroendocrine features and how aberrant transcriptional control promotes epithelial-to-mesenchymal transition during tumor development. Although these pathways seem distinct, we emphasize that they often share common molecular drivers and mediators. Understanding the connection among frequently altered epigenetic regulators will provide valuable insights into the molecular mechanisms underlying SCLC development, potentially revealing preventive and therapeutic vulnerabilities for SCLC and other cancers with similar mutations.

Exploring the Nature of Cybercrime and Countermeasures: Focusing on Copyright Infringement, Gambling, and Pornography Crimes (사이버 범죄의 특성과 대응방안 연구: 저작권 침해, 도박, 음란물 범죄를 중심으로)

  • Ilwoong Kang;Jaehui Kim;So-Hyun Lee;Hee-Woong Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.69-94
    • /
    • 2024
  • With the development of cyberspace and its increasing interaction with our daily lives, cybercrime has been steadily increasing in recent years and has become more prominent as a serious social problem. Notably, the "four major malicious cybercrimes" - cyber fraud, cyber financial crime, cyber sexual violence, and cyber gambling - have drawn significant attention. In order to minimize the damage of cybercrime, it's crucial to delve into the specifics of each crime and develop targeted prevention and intervention strategies. Yet, most existing research relies on indirect data sources like statistics, victim testimonials, and public opinion. This study seeks to uncover the characteristics and factors of cybercrime by directly interviewing suspects involved in 'copyright infringement', 'gambling' related to illicit online content, and 'pornography crime'. Through coding analysis and text mining, the study aims to offer a more in-depth understanding of cybercrime dynamics. Furthermore, by suggesting preventative and remedial measures, the research aims to equip policymakers with vital information to reduce the repercussions of this escalating digital threat.