• Title/Summary/Keyword: 침입도

Search Result 2,650, Processing Time 0.028 seconds

Research of Specific Domestic De-identification Technique for Protection of Personal Health Medical Information in Review & Analysis of Overseas and Domestic De-Identification Technique (국내외 비식별화 기술에 관한 검토 분석에 따른 개인건강의료정보 보호를 위한 국내 특화 비식별화 기술 제안에 관한 연구)

  • Lee, Pilwoo;In, Hanjin;Kim, Cheoljung;Yeo, Kwangsoo;Song, Kyoungtaek;Yu, Khigeun;Baek, Jongil;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.7
    • /
    • pp.9-16
    • /
    • 2016
  • As life in a rapidly changing Internet age at home and abroad, large amounts of information are being used medical, financial, services, etc. Accordingly, especially hospitals, is an invasion of privacy caused by leakage and intrusion of personal information in the system in medical institutions, including clinics institutions. To protect the privacy & information protection of personal health medical information in medical institutions at home and abroad presented by national policies and de-identification processing technology standards in accordance with the legislation. By comparative analysis in existing domestic and foreign institutional privacy and de-identification technique, derive a advanced one of pseudonymization and anonymization techniques for destination data items that fell short in comparison to the domestic laws and regulations, etc. De-identification processing technology for personal health information is compared to a foreign country pharmaceutical situations. We propose a new de-identification techniques by reducing the risk of re-identification processing to enable the secondary use of domestic medical privacy.

Floristic Study of Vascular Plants in Yeonhwasan Mt. (Taebaek-si, Gangwon-do, Korea) (연화산(강원도 태백시)의 관속식물상)

  • Hyeon Jin Jeong;Ju Eun Jang;Aleksey L. Kim;Se Ryeong Lee;Young-Soo Kim;Ji Eun Kim;Jung Sim Lee;Kang Hyup Lee;Eun Su Kang;Sang-Kuk Han;Hee-Young Gil
    • Korean Journal of Plant Resources
    • /
    • v.36 no.4
    • /
    • pp.314-340
    • /
    • 2023
  • Vascular plants of Yeonhwasan Mt., located in Taebaek-si, Gangwon-do, were investigated. Field surveys were conducted fourteen times between April and September of 2022. A total of 505 taxa were found consisting of 87 families, 282 genera, 441 species, 15 subspecies, 41 varieties, and 8 forma. Among them, the endemic plants of Korea were 22 taxa. The number of threatened and near threatened Red List plants designated by the Korean National Arboretum was four, comprising each one of critically endangered (CN), endangered (EN), vulnerable (VU), and near threatened (NT) species. The number of floristic target plants designated by the Ministry of Environment was 102, including one taxon of level V, 9 taxa of level IV, and 34 taxa of level III. Invasive alien plants were 34 taxa, and three taxa were ecosystem disturbance plants. The urbanization index of investigated site was 12.8%, and the naturalization index was 6.7%. To wisely manage Yeonhwasan, measures for preserving biodiversity and preventing invasive plants are needed.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

A Case Study on the Threat of Small Drone and the Development of Counter-Drone System (소형드론 위협 사례와 대드론체계 발전방향)

  • Kang-Il Seo;Ki-Won Kim;Jong-Hoon Kim;Sang-Keun Cho;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.327-332
    • /
    • 2023
  • On December 26, 2022, North Korea's drone provocation resumed for the first time in eight years. The threat covered not only the Seoul metropolitan area but also the no-fly zone for the presidential office's security, and the South Korean military's response to it is not appropriate, which is a major controversy. In the midst of this, problems caused by the prohibition of small drones' flight and illegal intrusion into restricted areas are increasing in Korea, and the threat is becoming a reality, such as being used for terrorist attacks abroad. In this paper, the concept of "Counter-Drone" and related technologies were considered for these drone threats, and implications were derived through domestic and overseas small drone threats, and the direction of development of the Counter-Drone system was presented. North Korea's drone threat is expected to be more diversified, massified, and advanced, resulting in bolder attacks and provocations. Therefore, the South Korean military should push for early powering of the integrated control system and the conter drone system, joint and military cooperation in response to the threat of small drones, and the ability to carry out joint operations between South Korea and the U.S.

Development of a Probabilistic Joint Opening Model using the LTPP Data (LTPP Data를 이용한 확률론적 줄눈폭 예측 모델 개발)

  • Lee, Seung Woo;Chon, Sung Jae;Jeong, Jin Hoon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4D
    • /
    • pp.593-600
    • /
    • 2006
  • Joint opening of jointed concrete pavement is caused by change in temperature and humidity of adjoined slab. The magnitude of joint opening influences on the load-transfer-efficiency and the behavior of sealant. If temperature or humidity decreases, joint opening increases. Generally maximum joint opening of a given joint is predicted by using AASHTO equation. While different magnitudes of joint opening at the individual joints have been observed in a given pavement section, AASHTO equation is limited to predict average joint opening in a given pavement section. Therefore the AASHTO equation may underestimate maximum joint for the half of joint in a given pavement section. Joints showing larger opening than the designed may experience early joint sealant failure, early faulting. Also unexpected spalling may be followed due to invasion of fine aggregate into the joints after sealant pop-off. In this study, the variation of the joint opening in a given pavement section was investigated based on the LTPP SMP data. Factors affecting on the variation are explored. Finally a probabilistic joint opening model is developed. This model can account for the reliability of the magnitude of joint opening so that the designer can select the ratio of underestimated joint opening.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

Root canal therapy of anterior teeth with dens invaginatus (치내치를 동반한 상악 전치의 근관치료)

  • Ji-Soo Kim;Kkot-Byeol Bae;Yun-Chan Hwang;Won-Mann Oh;Bin-Na Lee
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.40 no.1
    • /
    • pp.31-38
    • /
    • 2024
  • Dens in dente is a developmental anomaly resulting from infolding of the enamel organ into dental papilla prior to calcification of dental tissue. The pulpal tissue of the tooth can be vulnerable for bacterial invasion through direct exposure to the oral cavity or through defective enamel and dentin of the infolding part, thereby increasing the possibility of pulpal necrosis and subsequent apical periodontitis. Treatment planning of teeth with dens invaginatus may be difficult due to the complex root canal morphology. Therefore, thorough knowledge of anatomical variations of dens invaginatus is of great importance for proper treatment planning. The focus of this case report is on Oehler's type II and III dens invaginatus. The infolding of type III dens invaginatus extends beyond the crown and CEJ. Bacterial invasion through the infolding can easily cause inflammation of the pulpal and periradicular tissue. This case report presents endodontic treatment of type II and III dens invaginatus with the aid of CBCT.

Inhibitory Effect of Chloroform Extract of Marine Algae Hizikia Fusifomis on Angiogenesis (Hizikia fusiformis 클로로포름 추출물의 in vitro 및 in vivo 혈관신생 억제 연구)

  • Myeong-Eun Jegal;Yu-Seon Han;Shi-Young Park;Ji-Hyeok Lee;Eui-Yeun Yi;Yung-Jin Kim
    • Journal of Life Science
    • /
    • v.34 no.6
    • /
    • pp.399-407
    • /
    • 2024
  • Angiogenesis is the process by which new blood vessels form from existing blood vessels. This phenomenon occurs during growth, healing, and menstrual cycle changes. Angiogenesis is a complex and multifaceted process that is important for the continued growth of primary tumors, metastasis promotion, the support of metastatic tumors, and cancer progression. Impaired angiogenesis can lead to cancer, autoimmune diseases, rheumatoid arthritis, cardiovascular disease, and delayed wound healing. Currently, there are only a handful of effective antiangiogenic drugs. Recent studies have shown that natural marine products exhibit antiangiogenic effects. In a previous study, we reported that the hexane extract of H. fusiformis (HFH) could inhibit the development of new blood vessels both in vitro and in vivo. The aim of this study was to describe the inhibitory effect of chloroform extracts of H. fusiformis on angiogenesis. To investigate how chloroform extract prevents blood vessel growth, we examined its effects on HUVEC, including cell migration, invasion, and tube formation. In a mouse Matrigel plug assay, H. fusiformis chloroform extract (HFC) also inhibited angiogenesis in vivo. Certain proteins associated with blood vessel growth were reduced after HFC treatment. These proteins include vascular endothelial growth factor (VEGF), mitogen-activated protein kinase (MAPK)/extracellular signal transduction kinase, and serine/threonine kinase 1 (AKT). These studies have shown that the chloroform extract of H. fusiformis can inhibit blood vessel growth both in vitro and in vivo.

The Immunological Position of Fibroblastic Reticular Cells Derived From Lymph Node Stroma (림프절 스트로마 유래 Fibroblastic Reticular Cell의 면역학적 위치)

  • Jong-Hwan Lee
    • Journal of Life Science
    • /
    • v.34 no.5
    • /
    • pp.356-364
    • /
    • 2024
  • Lymph nodes (LNs) are crucial sites where immune responses are initiated to combat invading pathogens in the body. LNs are organized into distinctive compartments by stromal cells. Stromal cell subsets constitute special niches supporting the trafficking, activation, differentiation, and crosstalk of immune cells in LNs. Fibroblastic reticular cells (FRC) are a type of stromal cell that form the three-dimensional structure networks of the T cell-rich zones in LNs, providing guidance paths for immigrating T lymphocytes. FRCs imprint immune responses by supporting LN architecture, recruiting immune cells, coordinating immune cell crosstalk, and presenting antigens. During inflammation, FRCs exert both spatial and molecular regulation on immune cells through their topological and secretory responses, thereby steering immune responses. Here, we propose a model in which FRCs regulate immune responses through a three-part scheme: setting up, supporting, or suppressing immune responses. FRCs engage in bidirectional interactions that enhance T cell biological efficiency. In addition, FRCs have profound effects on the innate immune response through phagocytosis. Thus, FRCs in LNs act as gatekeepers of immune responses. Overall, this study aims to highlight the emerging roles of FRCs in controlling both innate and adaptive immunity. This collaborative feedback loop mediated by FRCs may help maintain tissue function during inflammatory responses.

Determination Method of Suitable Mud Density While Drilling through Confined Aquifer and Its Application (피압대수층을 통과하는 대심도 시추 중 적정이수밀도 결정 방법 및 적용 사례)

  • Woon Sang Yoon;Yoosung Kim;Hyeongjin Jeon;Yoonho Song;Changhyun Lee
    • The Journal of Engineering Geology
    • /
    • v.34 no.2
    • /
    • pp.217-228
    • /
    • 2024
  • During deep drilling, confined aquifers can present various challenges such as the inability to remove cuttings, rapid groundwater influx, and mud loss. Particularly in flowing well conditions, it is essential to apply the suitable mud density since the aquifer can generates an overpressurized condition. This paper proposes a method for determining the suitable mud density while drilling (SMD) through confined aquifers using mud window analysis and applies it to a case study. The minimum mud density at each depth, which represents the lower limit of the mud window, is determined by the equivalent mud density pore pressure gradient (or by adding a trip margin) at that depth. The pore pressure gradient of a confined aquifer can be calculated using the piezometric level or well head pressure of the aquifer. As the borehole reaches the confined aquifer, there is a significant increase in pore pressure gradient, which gradually decreases with increasing depth. The SMD to prevent a kick can be determined as the maximum value among the minimum mud densities in the open hole section. After entering the confined aquifer, SMD is maintained as the minimum mud density at the top of the aquifer during the drilling of the open hole section. Additionally, appropriate casing installation can reduce the SMD, minimizing the risk of mud loss or invasion into the highly permeable aquifer.