• Title/Summary/Keyword: 침입 차단

Search Result 278, Processing Time 0.028 seconds

THE INVESTIGATION OF MICROVASCULATURE CHANGES IN OSSEOUS REGENERATION BY GUIDED TISSUE REGENERATION PROCEDURE (골재생유도술에 의한 골재생시 미세혈관 구축 양상)

  • Choi, Du-Hee;Ryoo, Hyun-Mo;Shin, Hong-In
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.21 no.3
    • /
    • pp.257-265
    • /
    • 1999
  • To investigate the sequential changes in microvascular architecture and osseous regeneration during the bony healing after an application of the guided tissue regeneration method, we made artificial defects measuring $0.7cm{\times}0.3cm$ in size on femoral bones of rats measuring about 200gm and applied non-absorbable TEFE membrane at experimental sites but not at control sites. Then we observed the sequential changes and correlations between new vacuolation and bony regeneration using microvascular corrosion cast method and routine light microscopic observation at 1, 2 and 3 weeks after operation, respectively. The results showed that there were close relationships between regeneration of microvasculature and bone. In early phase, the invasion of granulation tissue at control sites delayed bony regeneration, however, in later phase, there was no remarkable differences in bony regeneration between control and experimental sites. The placement of barrier also affected in revascularization of regenerating bony defects. This is, the experimental sites showed parallel arranged nutritional vessels along long axis with well developed retiform plexus whereas the control revealed vertical invasion of microvasculature from outside of marrow space through bony defects which was also rearrange with time into parallel pattern with a vertical plexus but lesser organized than that of experimental sites. These findings suggest that the reconstruction of regenerating vasculature within the marrow cavity only may be sufficient and/or more be efficient in regeneration of bony defects.

  • PDF

A Research for Shorebirds on the Southernmost of Nakdong Estuary (낙동강 하구 최남단 사주의 도요.물떼새류에 관한 연구)

  • Hong, Soon-Bok
    • The Korean Journal of Ecology
    • /
    • v.28 no.4
    • /
    • pp.199-206
    • /
    • 2005
  • Estuary islets should be managed systematically because they are important places for birds to rest and breed. This paper investigates the environmental properties of islets where the sand banks are located from east to west on the southernmost of Nakdong estuary during a year (September 2003 $\sim$ August 2004). The research showed that 59 species and 19,148 individuals were found in the area A (Jangja Shinja-Do) and 61 species and 28,394 individuals in the area B (Saja-Do; Beakhapdeung Doyodeung). Totally, 74 species and 47,539 individuals were observed in both of this estuary. Shorebirds are the most observed species in both areas. In area, most of individuals were especially observed in the spring when Shorebirds migrate northward for breeding. In B area, various species were also observed in the fall when they migrate southward for wintering. Therefore, many groups of birds are observed around Shinja-Do in the spring. They passed the winter in Doyodueng, associated with feeding in the main stream of Nakdong river mainly. Although the southernmost sand bar is the breeding place to access to outside without interception, invasion by human beings and predators (mice, weasels and etc.) gives a fatal blow for birds to breed or rest. The reed which is a tall herbaceous plant is flourished according to the process of ecological succession. Therefore, the sand bar becomes a land. It results in reduction of habitats and breeding grounds for birds. In conclusion, these areas where birds can use the islets as habits and breeding places must be preserved by restraining luxuriance of reeds and systematic management of human beings and predators is necessary.

Downtime Analysis for Pohang New Harbor through Long-term Investigation of Waves and Winds (장기간 파.바람 조사를 통한 포항신항의 하역중단 원인 분석)

  • Jeong, Weon-Mu;Ryu, Kyong-Ho;Baek, Won-Dae;Choi, Hyuk-Jin
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.23 no.3
    • /
    • pp.226-235
    • /
    • 2011
  • Field measurements of the winds and waves were carried out for one year at multiple locations inside and outside of the Pohang New Harbor in order to clarify the reason of downtimes frequently occurring at most of the harbor quays and to establish an efficient countermeasure. In addition, the downtime records of the quays and precipitation data provided by Korea Meteorological Agency were acquired for mutual comparison and comprehensive analysis of the cause of downtimes. Except the influence of precipitation, it was found that the downtimes occurred when the height of waves entering into the harbor incurred by either one of swell, wind seas, or mixture of both, exceeded a threshold. The seiche whose period ranges from 5 to 80 minutes, which was suspected as a possible cause of the downtimes, is shown to have no direct relation with the downtimes. Meanwhile, the height of far-infra-gravity waves whose period ranges between 0.5 and 3 minutes, propagating to the harbor mouth forced by short period waves, showed almost proportional relationship with the height of short period waves. Based on the result of this study, it is concluded that the downtime problems of Pohang New Harbor can be greatly improved by effectively preventing the entrance of short period waves such as swell or wind seas.

A Study on the Quality Model and Metrics for Evaluating the Quality of Information Security Products (정보보호제품 품질평가를 위한 품질 모델 및 메트릭에 관한 연구)

  • Yun, Yeo-Wung;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.131-142
    • /
    • 2009
  • While users of information security products require high-quality products that are secure and have high performance, there are neither examples for evaluating the quality of information security products nor studies on the quality model and metrics for the quality evaluation. In this paper, information security products are categorized into three different types and the security and performance of various information security products are analyzed. Through this process and after consideration of information security products' security and performance, a new quality model that possesses 7 characteristics and 24 sub-characteristics has been defined. In addition, metrics consisting of 62 common and 45 extended metrics that can be used to evaluate the quality of information security products are introduced, and a proposition for a method of generating the quality evaluation metrics for specific information security products is included. The method of generating metrics proposed in this paper can be extended in order to be applied to a variety of information security products, and by generating and verifying the quality evaluation metrics for firewall, intrusion detection systems and fingerprint systems it is shown that it applicable on a variety of information security products.

Assessment of Fence Height to Prevent Roadkill of Water Deer(Hydropotes inermis) (고라니(Hydropotes inermis)의 로드킬(Roadkill) 방지 울타리 적정 높이 평가)

  • Park, Heebok;Woo, Donggul;Song, Eui-Geun;Lim, Anya;Lee, Bae-Keun;Jang, Ji-Deok;Park, Tae-Jin;Choi, Tae-Young
    • Journal of Environmental Impact Assessment
    • /
    • v.27 no.2
    • /
    • pp.232-239
    • /
    • 2018
  • Our study aims to provide a guideline of deer-proof fence heights to prevent roadkill of water deer (Hydropotes inermis), the most frequently killed by a vehicle collision, in South Korea. With 27 water deer in deer ecology center of the National Institute of Ecology, we measured the ability of water deer to jump gradually higher fences from 0.5cm by 10cm until the deterrence rate reached 100%. Ourresultrevealed that the deterrence rate became 96.7% at the fence height of 1.5m and the rate reached 100% at the 1.8m. We believe that our result provides the fundamental information to prepare a standard of deer-proof fence height. This evidence-based standard will contribute to improving the guideline for wildlife crossing construction and management, established by Ministry of Environment Korea.

Anomaly detection and attack type classification mechanism using Extra Tree and ANN (Extra Tree와 ANN을 활용한 이상 탐지 및 공격 유형 분류 메커니즘)

  • Kim, Min-Gyu;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.79-85
    • /
    • 2022
  • Anomaly detection is a method to detect and block abnormal data flows in general users' data sets. The previously known method is a method of detecting and defending an attack based on a signature using the signature of an already known attack. This has the advantage of a low false positive rate, but the problem is that it is very vulnerable to a zero-day vulnerability attack or a modified attack. However, in the case of anomaly detection, there is a disadvantage that the false positive rate is high, but it has the advantage of being able to identify, detect, and block zero-day vulnerability attacks or modified attacks, so related studies are being actively conducted. In this study, we want to deal with these anomaly detection mechanisms, and we propose a new mechanism that performs both anomaly detection and classification while supplementing the high false positive rate mentioned above. In this study, the experiment was conducted with five configurations considering the characteristics of various algorithms. As a result, the model showing the best accuracy was proposed as the result of this study. After detecting an attack by applying the Extra Tree and Three-layer ANN at the same time, the attack type is classified using the Extra Tree for the classified attack data. In this study, verification was performed on the NSL-KDD data set, and the accuracy was 99.8%, 99.1%, 98.9%, 98.7%, and 97.9% for Normal, Dos, Probe, U2R, and R2L, respectively. This configuration showed superior performance compared to other models.

Edge Security System for Factory Automation Devices (생산자동화설비의 종단보안 시스템 구조)

  • Hwang, Ho-Young;Kim, Seung-Cheon;Ro, Kwang-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.251-258
    • /
    • 2012
  • The conventional network security solutions for manufacturing or factory automation devices are concentrated on protecting the internal networks from the attacks of external networks. Recently, however, so called Day-zero attacks are increased; the threat from internal devices such as notebooks, USB devices are as critical as attacks from external networks. Thus a new security solution is needed to protect manufacturing devices from both external and internal threat. To this purpose, we propose an edge-security system to provide cost effective, integrated, and simple end-point security solution specialized for automated manufacturing devices, which may avoid the shortcomings of NAC.

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

The Study of Salinity Distribution at Nakdong River Estuary (낙동강 하구 염분 농도 분포에 관한 연구)

  • Han, Chong-Soo;Park, Sang-Kil;Jung, Sang-Woo;Roh, Tae-Young
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.23 no.1
    • /
    • pp.101-108
    • /
    • 2011
  • The purpose of salinity intrusion due to numerical simulation is analaysis for saline intrusion to the upstream channel in Nakdong River Estuary Barrage(NREB) to get enough fresh water. Conditions that occur salinity intrusion affect by tidal distribution at seas, so salinity concentration changes according to tidal phenomenon. Making this connection cleary can help preventing salinity intrusion. In this study, estimating salinity intrusion to the upstream channel in NREB using EOMSED model, we reexamine NREB's existence. Comparison is also made with observing data. In result, when inflow discharges at $75m^3/s$ is more similar with respect to observing data than $130m^3/s$ at ECOMSED model. Thus, estimations are more precise at little discharges than lots of discharges.

Reply-Type based Agent Generation of Legacy Service on One-way data transfer system (일방향 자료전달 시스템의 레거시 서비스 지원을 위한 응답구조 기반 에이전트 자동 생성)

  • Kim, Kyoung-Ho;Chang, Yeop;Kim, Hee-Min;Yun, Jeong-Han;Kim, Woo-Nyon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.299-305
    • /
    • 2013
  • Physical One-way Transfer, one of network Separating Network Technologies, shut off intrusion possibilities by removing data transfer line from external network to internal network. Physical One-way Transfer technology can not support legacy services based duplex transmission. Legacy services operating need agent for extra service with the support. But, Agent development have problems with adding cost and open internal protocols. In this papers, We analyzed legacy services between Control network and OA network in working SCADA systems, and based on the results obtained from the analysis, categorized the legacy services into three forms. We propose an agent generation method of the three service categories for Physical One-Way Transfer System. In addition, we design an automatic generation tool using the proposed method.