• Title/Summary/Keyword: Abuse potential

Search Result 100, Processing Time 0.029 seconds

Resolving Security Issues of Cognitive Radio Networks

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.797-799
    • /
    • 2012
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, as the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because law breakers could abuse the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

Theoretical Study for the Characteristics of Melatonin (멜라토닌의 특성에 대한 이론적 연구)

  • Kim, Dong-Yeub;Jung, Maeng-Joon;Lee, Chul-Jae
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.15 no.2
    • /
    • pp.59-63
    • /
    • 2012
  • Melatonin has been studied as a potential treatment of cancer, immune disorders, cardiovascular diseases, depression, seasonal affective disorder (SAD), circadian rhythm sleep disorders, sexual dysfunction and some forms of insomnia. Prolonged release melatonin has shown good results in treating insomnia in older adults. It may ameliorate circadian misalignment and SAD. Basic research indicates that melatonin may play a significant role in modulating the effects of drugs of abuse such as cocaine. A 2004 review found that melatonin significantly increased total sleep time in people suffering from sleep restriction. Therefore, in this study, in order to explain characteristics of melatonin, total energy, net charge, vibrational mode of melatonin are calculated by PM3 methods of HyperCam 6.0.

Vulnerability Analysis and Research on Digital Contents Storage System (디지털콘텐츠 저장장치시스템의 취약성 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun;Choi, Jae-Wan;Kim, Won-Gil;Lee, Joong-Seok
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.35-41
    • /
    • 2007
  • In accordance with increasing of digital contents and rising of property value, the importance of storing equipment system which can store and control essential contents has been maximized, and securer storing equipment system overcoming various vulnerabilities is now required. Therefore, in this paper, we analyzed misuse, abuse, modification, leak, and various vulnerabilities of storing equipment system that might be damaged, and we researched into an intrusion detection & recovery system which can solve potential vulnerabilities.

  • PDF

Analysis of Physical Component Considered for The Development of Smart Card Protection Profile (스마트 카드 보호프로파일 개발을 위하여 고려하여야 하는 물리적 위협 요소 분석)

  • Kim, Tai-Hoon;Kim, Min-Chul;Sung, Yune-Gie;Cho, Kyu-Min;No, Byung-Gyu
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2747-2749
    • /
    • 2003
  • Security is concerned with the protection of assets from threats, where threats are categorised as the potential for abuse of protected assets. All categories of threats should be considered, but in the domain of security greater attention is given to those threats that are related to malicious or other human activities ISO/IEC 15408 requires the TOE(Target of Evaluation) Security Environment section of a Protection Profile(PP) or Security Target(ST) to contain a list of threats about the TOE security environment or the intended usage of the TOE. This paper presents a specific physical threats should be considered in the smart card PP which developers of smart card PP must consider.

  • PDF

Effects of Coptis japonica on Morphine-Induced Conditioned Place Preference in Mice

  • Lee, Seok-Yong;Song, Dong-Keun;Jang, Choon-Gon
    • Archives of Pharmacal Research
    • /
    • v.26 no.7
    • /
    • pp.540-544
    • /
    • 2003
  • Morphine, an analgesic with significant abuse potential, is considered addictive because of drug craving and psychological dependence. It is reported that repeated treatment of morphine can produce conditioned place preference (CPP) showing a reinforcing effect in mice. CPP is a useful method for the screening of morphine-induced psychological dependence. In the present study, we investigated the effect of the methanolic extract of Coptis japonica (MCJ) on morphine-induced CPP in mice. Furthermore, we examined c-fos expression in the parietal cortex, piriform cortex, striatum, nucleus accumbens, and hippocampus of the morphine-induced CPP mouse brain. Treatment of MCJ 100 mg/kg inhibited morphine-induced CPP. Expression of c-fos was increased in the cortex, striatum, nucleus accumbens, and hippocampus of the morphine-induced CPP mouse brain. These increases of expression were inhibited by treatment with MCJ 100 mg/kg, compared to the morphine control group. Taken together, these results suggest that MCJ inhibits morphine-induced CPP through the regulation of c-fos expression in the mouse brain.

Involvement of pCREB Expression in Inhibitory Effects of Coptis japonica on Morphine-induced Psychological Dependence

  • Kwon, Seung-Hwan;Ha, Ri-Ra;Lee, Seok-Yong;Jang, Choon-Gon
    • Biomolecules & Therapeutics
    • /
    • v.16 no.2
    • /
    • pp.113-117
    • /
    • 2008
  • Morphine is a potent analgesic with significant abuse potential, because of drug craving and psychological dependence. It is reported that repeated treatment of morphine can produce conditioned place preference (CPP) showing a reinforcing effect in mice. Previously, we have reported the inhibitory effect of the methanolic extract of Coptis japonica (MCJ) on morphine-induced CPP in mice. The present study was employed whether p-CREB expression is involved in the inhibitory effect of MCJ on the morphine-induced CPP in the mouse hippocampus. Repeated administration of MCJ 100 mg/kg inhibited morphine-induced CPP. Expression of p-CREB was increased in the dentate gyrus of the hippocampus that had undergone morphineinduced CPP. This increase of expression was significantly inhibited by administration of MCJ 100 mg/kg, compared to the morphine control group. Taken together, these results suggest that MCJ inhibits morphine-induced CPP through the regulation of p-CREB expression in the mouse dentate gyrus of the hippocampus.

Role of Dental Institutions in Tobacco Cessation in India: Current Status and Future Prospects

  • Mohanty, Vikrant Ranjan;Rajesh, Guru Raghavendran;Aruna, D.S.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.4
    • /
    • pp.2673-2680
    • /
    • 2013
  • Tobacco abuse is a major preventable cause of premature death and disease, including various cancers. The Global Adult Tobacco Survey India (GATS) 2009-10 revealed that more than one-third of adults use tobacco in one form or the other. Nearly two in five smokers and smokeless tobacco users made attempts to quit the habit in the past 12 months. Tobacco dependence is a chronic condition characterized by susceptibility of relapse over years. It can be well handled by sustained professional support from health care providers mainly through behavioral counseling and pharmacotherapy. Dental professionals can play a pivotal role in diagnosing and effectively managing tobacco dependence. Dental Institutions have rapidly grown in last two decades across the country and so has the curriculum been adapted to improve student competencies to accommodate changing disease patterns and technological advances, but not in regard to tobacco cessation. Untapped dental manpower like undergraduates, dental hygienists and other paramedical staff need effective training to be more penetrative. The present review paper explores the potential role of dental training institutions and recommends various approaches to counter public health jeopardy of tobacco related diseases.

A Study on the Design of the Gateway for a Strong and Safe Mobile Agent System (강하고 안전한 이동 에이전트 시스템을 위한 게이트웨이 설계에 관한 연구)

  • Kim Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.183-188
    • /
    • 2004
  • In the course of Internet proliferation. many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most Promising among the new paradigms is use of mobile agents. It also however, suffers from a major drawback, namely the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper proposed the design of strong and safe mobile agent gateway that split and merge the agent code with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

  • PDF

The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment (모바일 환경에서 개인정보 유출 방지를 위한 개선 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.53-62
    • /
    • 2015
  • Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.

Alterations in Striatal Circuits Underlying Addiction-Like Behaviors

  • Kim, Hyun Jin;Lee, Joo Han;Yun, Kyunghwa;Kim, Joung-Hun
    • Molecules and Cells
    • /
    • v.40 no.6
    • /
    • pp.379-385
    • /
    • 2017
  • Drug addiction is a severe psychiatric disorder characterized by the compulsive pursuit of drugs of abuse despite potential adverse consequences. Although several decades of studies have revealed that psychostimulant use can result in extensive alterations of neural circuits and physiology, no effective therapeutic strategies or medicines for drug addiction currently exist. Changes in neuronal connectivity and regulation occurring after repeated drug exposure contribute to addiction-like behaviors in animal models. Among the involved brain areas, including those of the reward system, the striatum is the major area of convergence for glutamate, GABA, and dopamine transmission, and this brain region potentially determines stereotyped behaviors. Although the physiological consequences of striatal neurons after drug exposure have been relatively well documented, it remains to be clarified how changes in striatal connectivity underlie and modulate the expression of addiction-like behaviors. Understanding how striatal circuits contribute to addiction-like behaviors may lead to the development of strategies that successfully attenuate drug-induced behavioral changes. In this review, we summarize the results of recent studies that have examined striatal circuitry and pathway-specific alterations leading to addiction-like behaviors to provide an updated framework for future investigations.