• Title/Summary/Keyword: 우회수로

Search Result 752, Processing Time 0.027 seconds

Awake OPCAB: Initial Experience (의식 있는 상태에서 경막외 마취를 이용한 심박동하 관상동맥우회술: 초기 경험)

  • Son Kuk-Hui;Cho Kwang-Ree;Kim Ki-Bong
    • Journal of Chest Surgery
    • /
    • v.39 no.8 s.265
    • /
    • pp.598-603
    • /
    • 2006
  • Background: High thoracic epidural anesthesia allows awake coronary artery bypass grafting, avoiding the drawbacks of mechanical ventilation and general anesthesia. Materian and Method: From April, 2005 to September, 2005, 12 patients were underwent awake coronary artery bypass grafting using high thoracic epidural anesthesia. There were 1 female and 11 male patients, with a mean age of $66{\pm}6$ years. Off pump coronary artery. bypass grafting was performed through a median sternotomy using arterial grafts. Result: There were no mortality. Pneumothorax was developed during surgery in 8 patients. Five patients required secondary intubation because of pneumothorax (n=3), bowel herniation (n=1), and hemothorax after chest tube insertion (n=1). Postoperative coronary angiography was performed before discharge in all patients and all the grafts were patent. Conclusion: Our intial experience demonstrated the feasibility of awake off-pump coronary artery bypass grafting. Further study is required to define the indications, advantages and limitations of this strategy.

Effects of the Temporal Increase Rate of Reynolds Number on Turbulent Channel Flows (레이놀즈 수의 시간 증가율에 따른 난류 채널유동의 변화)

  • Jung, Seo Yoon;Kim, Kyoungyoun
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.40 no.7
    • /
    • pp.435-440
    • /
    • 2016
  • Effects of the increase rate of Reynold number on near-wall turbulent structures are investigated by performing direct numerical simulations of transient turbulent channel flows. The simulations were started with the fully-developed turbulent channel flow at $Re_{\tau}=180$, then temporal accelerations were applied. During the acceleration, the Reynolds number, based on the channel width and the bulk mean velocity, increased almost linearly from 5600 to 13600. To elucidate the effects of flow acceleration rates on near-wall turbulence, a wide range of durations for acceleration were selected. Various turbulent statistics and instantaneous flow fields revealed that the rapid increase of flow rate invoked bypass-transition like phenomena in the transient flow. By contrast, the flow evolved progressively and the bypass transition did not clearly occur during mild flow acceleration. The present study suggests that the transition to the new turbulent regime in transient channel flow is mainly affected by the flow acceleration rate, not by the ratio of the final and initial Reynolds numbers.

A Study on countermeasures against Mobile Application's SSL Pinning bypass (모바일 애플리케이션의 SSL Pinning 우회에 대한 대응방안 연구)

  • Shin, Sang-Gil;Kim, Mun-Hyeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.270-272
    • /
    • 2017
  • 스마트폰 애플리케이션의 종류가 다양해지고 사용 빈도수가 높아지는 만큼 정보보안에 대한 중요성도 나날이 증가하고 있다. 최근 기업, 금융기관들은 스마트폰 애플리케이션 서비스에서 사용자와 서버 간 통신 시 MITM공격에 대비하기 위해 SSL Pinning 기술을 사용하고 있는데 본 연구에서는 이를 우회할 수 있는 방법을 소개하고 시연하며, 이에 대한 대응방안을 소개한다.

Bypass Generation Mechanism using Mobility Prediction for Improving Delay of AODV in MANET (AODV의 전송 지연 향상을 위한 이동성 예측을 이용한 우회 경로 생성 기법)

  • Youn, Byungseong;Kim, Kwangsoo;Kim, Hakwon;Roh, Byeong-Hee
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.694-699
    • /
    • 2014
  • In mobile ad-hoc networks (MANET), the network topology and neighboring nodes change frequently, since MANET is composed of nodes that have mobility without a fixed network infrastructure. The AODV routing protocol is advantageous for MANET, but AODV has a delay in the transmission of data packets because AODV can not transmit data during route recovery. This paper proposes solving the above problem of AODV by using a bypass generation mechanism for data transmission during route recovery. For further improvement, additional mechanisms that coordinate the reception threshold of a hello packet are proposed in order to improve the accuracy of the information obtained from the neighboring nodes when the bypass is generated due to a link failure and the immediacy of the route recovery. Simulation results show that the proposed technique improves the performance in terms of the delay in transmission compared to traditional AODV.

Surgical Resection of Renal Cell Carcinoma Extended to the Inferior Vena Cava Using Pump Driven Veno-venous Bypass (정맥-정맥간 우회술을 이용하여 하대정맥까지 확장된 콩팥세포암종의 수술적 치료 1예)

  • Park Han Gyu;Choi Chang Woo;Lee Jae Wook;Her Keun;Shin Hwa Kyun;Won Yong Soon
    • Journal of Chest Surgery
    • /
    • v.39 no.1 s.258
    • /
    • pp.72-75
    • /
    • 2006
  • In a 40 year-old man who has complained of epigastric pain and dyspnea for 10 days including melena for 1 month, abdominal ultrasonography and computerized tomography revealed a large, solid mass in the right kidney and thrombus of inferior vena cava (IVC) that extended to the cavoatrial junction. Renal cell carcinoma was performed by percutaneous needle biopsy. IVC thromboembolectomy was performed using centrifugal pump driven venovenous bypass without cardiac arrest and cardiopulmonary bypass (CPB).

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

A Study on Object Detection and Warning Model for the Prevention of Right Turn Car Accidents (우회전 차량 사고 예방을 위한 객체 탐지 및 경고 모델 연구)

  • Sang-Joon Cho;Seong-uk Shin;Myeong-Jae Noh
    • Journal of Digital Policy
    • /
    • v.2 no.4
    • /
    • pp.33-39
    • /
    • 2023
  • With a continuous occurrence of right-turn traffic accidents at intersections, there is an increasing demand for measures to address these incidents. In response, a technology has been developed to detect the presence of pedestrians through object detection in CCTV footage at right-turn areas and display warning messages on the screen to alert drivers. The YOLO (You Only Look Once) model, a type of object detection model, was employed to assess the performance of object detection. An algorithm was also devised to address misidentification issues and generate warning messages when pedestrians are detected. The accuracy of recognizing pedestrians or objects and outputting warning messages was measured at approximately 82%, suggesting a potential contribution to preventing right-turn accidents

A Study on Developing Discriminant Model for VMS installation Considering Human Factors (고속도로 유출지점 경로안내용 도로전광표지의 설치위치 산정방안에 관한 연구)

  • Kim, Tae-Ho;Lee, Yong-Taeck;Do, Hwa-Yong;Won, Jai-Moo
    • International Journal of Highway Engineering
    • /
    • v.10 no.2
    • /
    • pp.101-113
    • /
    • 2008
  • VMS are installed in many Korean highways in oder to give drivers informations such as travel time to destination, congestion and Incident situation. However, some guidelines for install VMS are restricted in only geometric factors although human factors considering driver behavior are very important to affect the VMS installation. Therefore, this paper are focusing on developing and verifying the discriminant model for VMS installation considering human factors. As a result, following outputs are obtained ; (1) developing the discriminant model using human factors of driving simulation experiments in oder to predict driver reading VMS messages safely detour highway. (2) proving that driving experiences in highway, personal driving history, vehicle speed orderly affects VMS installation (3) verifying predictability of developed model by comparing the real values with predicted values. (4) suggesting that VMS should be installed off 3.2Km from the I.C. of rural highway.

  • PDF