• Title/Summary/Keyword: 예방패치

Search Result 21, Processing Time 0.038 seconds

Herbal Patch Analysis in Korean Patent (국내 한방 패치 특허 현황에 대한 분석연구)

  • Park, Sunju;Woo, Seong-Cheon;Park, Ji-Yeun
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.22 no.1
    • /
    • pp.45-59
    • /
    • 2018
  • Objectives : The purpose of this study is to present trends and contents of herbal Korean Medicine patches by analyzing the herbal patches in Korean patents. Methods : Electronic search for herbal patch patents was conducted in KIPRIS (Korea Intellectual Property Rights Information Service). Korean patents that were registered by January 1, 2018 were selected in study. Patents that were not using herbal medicine or not related to patch were excluded in this study. The applicant, application date, International Patent Classification (IPC), contents and adhesive site of patches, target diseases, model of experiment and extraction methods were analyzed. Results : A total of 17 patents were included in this study. In applicant analysis, 61.5% of applicants were corporations. All IPCs in patents were involved in Section A (Human necessities & Agriculture) and 66.7% of IPCs were A61K (Preparations formedical, dental, ortoiletpurposes). In types of patch, 8 patents were hydrogel patches (47.1%), followed by 3 heating patches (17.6%). Skin related symptoms were the most targeted diseases (52.9%), Human was the most used model in experiments. Solvent extraction and hot water extraction were used frequently, and some patents had no limit for extraction were also existed. Conclusions : The study results will be helpful to diversify formulation of herbal medicine, to expand market scale of patent and to develop new application using Korean medicine. In order to establish sufficient data for utilizing patent technologies, more patent studies providing analyzed patent information are needed.

Development of Mobile Healthcare System Using ECG Measurement (심전도 측정을 이용한 모바일 헬스케어 시스템 개발)

  • Kim, Seong-Woo;Shin, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.8
    • /
    • pp.2008-2016
    • /
    • 2014
  • With the increased attention about health care and management of heart diseases, ubiquitous healthcare services and related devices have been actively developed recently. In this paper we developed a mobile healthcare system which consists of smartphone and patch-type ECG measuring device. This system is capable of monitoring, storing, and sending bio signals such as ECG, heart rate, heart rate variability as well as exercise management functions through heart rate zones. With monitoring bio signal continuously by mobile healthcare system and wearable device like us, people can prevent chronic disease and maintain good health. Here we report our implementation results on real platforms.

Secure Coding guide support tools design for SW individual developers (SW 개인 개발자를 위한 Secure_Coding 가이드 지원 도구 설계)

  • Son, Seung-wan;Kim, Kwang-seok;Choi, Jeong-won;Lee, Gang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.595-598
    • /
    • 2014
  • The cyber attacks of recent attacks that target zero-day exploit security vulnerabilities before the security patch is released (Zero Day) attack, the web site is without the Lord. These attacks, those that use the vulnerability of security that is built into the software itself is in most cases, cyber attacks that use the vulnerability of the security of the source code, in particular, has a characteristic response that are difficult to security equipment. Therefore, it is necessary to eliminate the security vulnerability from step to implement the software to prevent these attacks. In this paper, we try to design a Secure Coding Guide support tool to eliminate the threat of security from the stage of implementation.

  • PDF

Community health promotion and improvement of business for No-Smoking (지역사회의 건강증진을 위한 금연사업의 개선방안)

  • Han, Myung-Yee;Kim, No-Ma;Chandrkant, Mehta Jaydip
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.317-322
    • /
    • 2012
  • Public Health "NO-Smoking Clinic" smokers nine times more than 6 months smoking cessation counseling services and CO measurement, nicotine aids(patches, gum and candy) to provide. Behavioral enrichment items and memorabilia, including the provision of smoking cessation, smoking, andsmokingreducesinductionpracticeto improve the health of local residents to promote. Lifestyle habits such as smoking and excessive drinking, such as hyperlipidemia, and obesity is a major factor causing chronic disease, economic loss, and even new philosophy of life as a healthy culture is a factor that destroys. Smoking, heavy drinking, such as healthy life styles and cultural values of life as well as the economic value of medical care and also when you consider that there is a close relationship, such as smoking prevention and smoking cessation and moderation of the business and institutions involved in health education institutional support for the "NO-Smoking Clinic" should be parallel to the landing.

Browser fuzzing and analysis using known vulnerability (소프트웨어 취약점의 종류와 탐색 방법)

  • Kim, Nam-gue;Kim, Hyun Ho;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.753-756
    • /
    • 2015
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

A study on the cyber security assessment modeling of critical infrastructure (핵심기반시설 사이버 보안 평가 모델링 기법 연구)

  • Euom, Ieck-Chae
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.105-113
    • /
    • 2019
  • The purpose of this study is to analyze cyber security risk modeling of critical infrastructure, draw out limitations and improvement measures. This paper analyzed cyber security risk modeling of national critical infrastructure like as electricity sector, nuclear power plant, SCADA. This paper analyzed the 26 precedent research cases of risk modeling in electricity sector, nuclear power plant, SCADA. The latest Critical Infrastructure is digitalized and has a windows operating system. Critical Infrastructure should be operated at all times, it is not possible to patch a vulnerability even though find vulnerability. This paper suggest the advanced cyber security modeling characteristic during the life cycle of the critical infrastructure and can be prevented.

Landslide Susceptibility Mapping Using Deep Neural Network and Convolutional Neural Network (Deep Neural Network와 Convolutional Neural Network 모델을 이용한 산사태 취약성 매핑)

  • Gong, Sung-Hyun;Baek, Won-Kyung;Jung, Hyung-Sup
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_2
    • /
    • pp.1723-1735
    • /
    • 2022
  • Landslides are one of the most prevalent natural disasters, threating both humans and property. Also landslides can cause damage at the national level, so effective prediction and prevention are essential. Research to produce a landslide susceptibility map with high accuracy is steadily being conducted, and various models have been applied to landslide susceptibility analysis. Pixel-based machine learning models such as frequency ratio models, logistic regression models, ensembles models, and Artificial Neural Networks have been mainly applied. Recent studies have shown that the kernel-based convolutional neural network (CNN) technique is effective and that the spatial characteristics of input data have a significant effect on the accuracy of landslide susceptibility mapping. For this reason, the purpose of this study is to analyze landslide vulnerability using a pixel-based deep neural network model and a patch-based convolutional neural network model. The research area was set up in Gangwon-do, including Inje, Gangneung, and Pyeongchang, where landslides occurred frequently and damaged. Landslide-related factors include slope, curvature, stream power index (SPI), topographic wetness index (TWI), topographic position index (TPI), timber diameter, timber age, lithology, land use, soil depth, soil parent material, lineament density, fault density, normalized difference vegetation index (NDVI) and normalized difference water index (NDWI) were used. Landslide-related factors were built into a spatial database through data preprocessing, and landslide susceptibility map was predicted using deep neural network (DNN) and CNN models. The model and landslide susceptibility map were verified through average precision (AP) and root mean square errors (RMSE), and as a result of the verification, the patch-based CNN model showed 3.4% improved performance compared to the pixel-based DNN model. The results of this study can be used to predict landslides and are expected to serve as a scientific basis for establishing land use policies and landslide management policies.

Research Trends of SCADA Digital Forensics and Future Research Proposal (SCADA 디지털포렌식 동향과 향후 연구 제안)

  • Shin, Jiho;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1351-1364
    • /
    • 2019
  • When SCADA is exposed to cyber threats and attacks, serious disasters can occur throughout society. This is because various security threats have not been considered when building SCADA. The bigger problem is that it is difficult to patch vulnerabilities quickly because of its availability. Digital forensics procedures and techniques need to be used to analyze and investigate vulnerabilities in SCADA systems in order to respond quickly against cyber threats and to prevent incidents. This paper addresses SCADA forensics taxonomy and research trends for effective digital forensics investigation on SCADA system. As a result, we have not been able to find any research that goes far beyond traditional digital forensics on procedures and methodologies. But it is meaningful to develop an approach methodology using the characteristics of the SCADA system, or an exclusive tool for SCADA. Analysis techniques mainly focused on PLC and SCADA network protocol. It is because the cyber threats and attacks targeting SCADA are mostly related to PLC or network protocol. Such research seems to continue in the future. Unfortunately, there is lack of discussion about the 'Evidence Capability' such as the preservation or integrity of the evidence extracting from SCADA system in the past researches.

Influence on Information Security Behavior of Members of Organizations: Based on Integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM) (조직구성원들의 정보보안행동에 미치는 영향: 보호동기이론(PMT)과 계획된 행동이론(TPB) 통합을 중심으로)

  • Jeong, hye in;Kim, seong jun
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.145-163
    • /
    • 2018
  • Recently, security behavior of members of organizations has been recognized as a critical part of information security at the corporate level. Leakage of customers' information brings more attention to information security behavior of organizations and the importance of a task force. Research on information breach and information security is actively conducted of personal behavior toward security threats or members of organizations who use security technology. This study aims to identify factors of influence on information security behavior of members of organizations and to empirically find out how these factors affect information security behavior through behavior toward attitude, subjective norm and perceived behavior control. On the basis of the research, this study will present effective and efficient ways to foster information security activities of members of organizations. To this end, the study presented a research model that applied significant variables based on integration of Theory of Planned Behavior (TPB) and Theory of Protection Motivation (TPM). To empirically verify this research model, the study conducted a survey of members of organizations who had security-related work experience at companies. So, it is critical for members of organizations to encourage positive word of mouth (WOM) about information security behavior. Results show that based on the integration of TPM and TPB, perceived vulnerability, perceived severity, perceived efficiency and perceived barriers of information security behavior of members of organizations had significant influences on mediating variables such as behavior toward attitude, subjective norm, perceived behavior control and intention. They also had significant influences on organization information security behavior which is a dependent variable. This study indicates companies should introduce various security solutions so that members of the organizations can prevent and respond to potential internal and external security risks. In addition, they will have to take actions to inspect vulnerability of information system and to meet security requirements such as security patches.

Study on Short Term Smoking Cessation Treatment in Dental Hospitals in Korea (국내 치과대학병원에서 시행한 단기 금연진료에 대한 조사)

  • Song, Je-Il;Lee, Gi-Ho;Kim, Mee-Eun;Kim, Ki-Suk
    • Journal of Oral Medicine and Pain
    • /
    • v.35 no.4
    • /
    • pp.245-258
    • /
    • 2010
  • Smoking has been identified not as a major risk factor for circulatory and respiratory diseases but also as causes of various oral diseases. A number of clinical studies and regional health surveys have found an association between smoking and poor oral health status and between smoking and prognosis of dental treatments. However, there is few studies about status of smoking cessation treatment and policies in dentistry in Korea. The purpose of this study was to investigate the smoking patterns of outpatients and outcomes of short-term smoking cessation treatment in dental hospitals in Korea and, subsequently, to seek further smoking cessation services in dentistry. This study was sponsored by Korean Dental Association (KDA) and department of culture and welfare. 825 dental patients were voluntarily participated in a 4-week smoking cessation program with nicotine patch and 297 participants of them completed on smoking-related questionnaires. All participants were recruited from outpatients of 11 dental university hospitals (primarily in the department of oral medicine, oral surgery and periodontology) in Korea during 3-month period from October 2009 to January 2010. The Questionnaires included demographics, duration of smoking, heavy smoking index (HSI), number of thinking of quit smoking, duration of stop smoking and reasons to smoking, awareness of smoking effects on oral health, and their success rate after 4 weeks of nicotine patch program was investigated. The statistical analysis was carried by SPSS version 18.0 program and Chi-square test. According to the results of this study, male in their 30s to 50s were the most prevalent of all the participants and duration of smoking increased with age. Attempt rate to quit smoking (Quit smoking) was the highest in 30s and 40s with duration of quit smoking ranging 1 to 3 months. Emotional stresswas the most frequently reported reason for smoking, followed by habit and pleasure in order. All age group showed high HIS over 71% and awareness of smoking effects on oral diseases such as oral soft tissue diseases, periodontal diseases and dental caries was found relatively high (50~60%) Periodontal implant was the main reason for participation in the smoking cessation services in dental clinics and the success rate of, 4-week nicotine patch program of all the participants was 29.4%, extremely low compared to that of medical clinics. Systemic education for dentists to be able to provide interventions to quit smoking including counseling with the 5As'and development of available measures for smokers is needed as considered that the low success rate of the smoking cessation services in dentistry could be explained mainly by lack of dentists' strategies, experience and attention. Awareness and attention of dentists should be emphasized and their participation be encouraged by long-term, multidisciplinary policies such as establishment of insurance fee, which would made a considerable progress in preventing smoking-related oral diseases and promoting public oral health.