• Title/Summary/Keyword: BREACH

Search Result 428, Processing Time 0.022 seconds

Atlantoaxial Fixation using Rod and Screw for Bilateral High-riding Vertebral Artery

  • Lee, Dong-Yeob;Chung, Chun-Kee;Jahng, Tae-Ahn
    • Journal of Korean Neurosurgical Society
    • /
    • v.37 no.5
    • /
    • pp.380-382
    • /
    • 2005
  • We report a case of atlantoaxial subluxation with bilateral high-riding vertebral artery with narrow isthmus. Because of the potential risk of bilateral vertebral artery injury, we performed atlantoaxial fixation using rod and screw instead of transarticular screw fixation. Although postoperative computed tomography reconstruction demonstrated slight breach of bilateral vertebral artery groove, postoperative angiography showed no evidence of vertebral artery injury. Though technically demanding, atlantoaxial fixation using rod and screw can be a one of the treatment options for atlantoaxial instability with bilateral high riding vertebral artery.

Prediction of Outflow Hydrograph caused by Landslide Dam Failure by Overtopping

  • Do, XuanKhanh;Kim, Minseok;Nguyen, H.P.T;Jung, Kwansue
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.196-196
    • /
    • 2016
  • Landslide dam failure presents as a severe natural disaster due to its adverse impact to people and property. If the landslide dams failed, the discharge of a huge volume of both water and sediment could result in a catastrophic flood in the downstream area. In most of previous studies, breaching process used to be considered as a constructed dam, rather than as a landslide dam. Their erosion rate was assumed to relate to discharge by a sediment transport equation. However, during surface erosion of landslide dam, the sediment transportation regime is greatly dependent on the slope surface and the sediment concentration in the flow. This study aims to accurately simulate the outflow hydrograph caused by landslide dam by overtopping through a 2D surface flow erosion/deposition model. The lateral erosion velocity in this model was presented as a function of the shear stress on the side wall. The simulated results were then compared and it was coherent with the results obtained from the experiments.

  • PDF

Problems of Distance Learning in Specialists Training in Modern Terms of The Informative Society During COVID-19

  • Kuchai, Oleksandr;Yakovenko, Serhii;Zorochkina, Tetiana;Оkolnycha, Tetiana;Demchenko, Iryna;Kuchaі, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.143-148
    • /
    • 2021
  • The article considers the training of specialists in education in the conditions of distance learning. It is lights up the advantages of distance learning and determined the characteristic features of distance learning of students training in the implementation of these technologies in the educational process. The article focuses on the main aspects of computerization of studies as a technological breach in methodology, organization and practical realization of educational process and informative culture of a teacher. Information technologies are intensive involved in life of humanity, educational process of schools and higher educational establishments. Intercommunication is examined between the processes of informatization of the society and education.

The Study for Establishment of Security Threat Measures for Secure NFC Service (안전한 NFC 서비스 활용 활성화를 위한 보안 위협 대책 마련을 위한 고찰)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.219-228
    • /
    • 2018
  • The utilization of NFC has been continuously increasing due to the spread of smart phones and the development of short-range wireless communication networks. However, it has been suggested that stability and security of convenient NFC short-range wireless communications can be unstable and problematic. The unstable causes for NFC are the lack of security technologies for NFC, the controversy about personal information infringement, and the lack of social awareness on security breach against data settlement. NFC service can be conveniently used by simply touching other NFC devices and NFC tags through the NFC device. This thesis analyzes that NFC authentication technology, which is convenient for user are one of the unstable causes of security of NFC. This thesis suggest that ministry should research countermeasures and promote how users can use NFC safely. It also suggests that users should have awareness when they use payment and authentication service through NFC to prevent from security threat.

Does subepineural injection damage the nerve integrity? A technical report from four amputated limbs

  • Diwan, Sandeep;Nair, Abhijit;Sancheti, Parag;Van Zundert, Andre
    • The Korean Journal of Pain
    • /
    • v.34 no.1
    • /
    • pp.132-136
    • /
    • 2021
  • Local anesthetic (LA) injection outside the sheath in epineural or paraneural connective tissue is considered safe practice among regional anesthesiologists. There is limited evidence as to whether neurological complications occur if LA is injected inside the sheath (subepineural - intraneural). We performed ultrasound guided injections at the level of undivided sciatic nerve in four amputated lower limbs. In two specimens, LA was injected in epineural connective tissue (paraneural tissue) and in another two specimens by penetrating the outer nerve sheath (hyperechoic epineurium). Ultrasonography demonstrated an increase in the size of nerve and macroscopic findings revealed fascicular tracings with sub-epineural injections. Limbs were sent for histological analysis in formalin containers. Pathologist performed the analysis which demonstrated an intact perineurium and a breach in the epineurium. We conclude that sub-epineural injections are unsafe and injection should be done in paraneural tissue to ensure safety and avoid unwanted neurological sequelae after the block.

Anonymized Network Monitoring for Intrusion Detection Systems

  • Srinivas, DB;Mohan, Sagar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.191-198
    • /
    • 2022
  • With the ever-increasing frequency of public sector and smalls-cale industries going live on the internet in developing countries, their security of which, while crucial, is often overlooked in most cases. This is especially true in Government services, whilst essential, are poorly monitored if at all. This is due to lack of funds and personnel. Most available software which can help these organizations monitor their services are either expensive or very outdated. Thus, there is a need for any developing country to develop a networking monitoring system. However, developing a network monitoring system is still a challenge and expensive and out sourcing network monitoring system to third party is a security threat. Therefore, in this article we propose a method to anonymize network logs and outsource networking monitoring system to third-party without breach in integrity of their network logs.

RESEARCH OF THE BEST TIMING FOR GOVERNMENT'S TERMINATION OF FREEWAY REPAIR WORK CONTRACT

  • Jin-Fang Shr;Da-Jung Chang
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.699-704
    • /
    • 2005
  • Normally, monetary penalties for breach of agreement will be stipulated in the contract. The contractor parties, who fail to fulfill the agreement, are required to pay the other parties a certain amount or proportion of money as a fine. However, it is worth our study - whether or not the scope of monetary penalty implementation and bases for determination of a fine will cover the losses of social and administrative costs incurred by the interruption of the contract. This research is about the best timing for government to cancel the freeway repair work contracts. Under the goal of the maximum social welfare, the limitation of government spending for the social and administrative costs invoked by interruption of contracts will have to be considered to attain the best timing of contracts' suspension or deferment. According to the factors of social and administrative costs, the best time point is calculated to reduce the loss of the aforesaid costs, which can also be used as theoretical basis for the future road-widening construction at home.

  • PDF

A Scenario Development on the Personal Information Breach in Telemedicine Service (원격의료 서비스의 개인정보 침해 시나리오 개발)

  • Choi, Hyun-Wook;Kim, Taek-Young;Kim, Tae-Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.301-304
    • /
    • 2021
  • 4차 산업혁명 시대가 도래함에 따라 사물인터넷(IoT)이 다양한 산업의 영역에서 활용되고 있다. 특히 IoT 기술 및 서비스를 활용하는 분야 중 하나인 스마트 의료 분야는 최근 소프트웨어 및 네트워크의 연결성이 강화되면서 사이버보안 사고가 급증하고 있다. 따라서 스마트 의료 기기·서비스 개발단계부터 보안을 고려하여 안전하게 개발하는 것이 필요하며, 서비스 제공시에도 보안을 고려하여 안전하게 관리 및 서비스를 제공하는 것이 필요하다. 이에 본 연구에서는 IoT 서비스 활용 분야 중 스마트 의료 분야에서 원격의료 서비스의 개인정보 침해 요인을 도출하고 이를 토대로 어택트리 기반의 시나리오 분석을 수행하고자 한다.

Analysis on Cyber Security and Its Challenges to Society

  • Shashank Mishra;Raghav Sandhane
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.141-152
    • /
    • 2024
  • Cyber security plays an important role in the field of IT industry and other industry too. Whenever we talk about cyber security, the word cybercrime pops out. Cybercrime is the biggest issues we are facing right now. Every 39 seconds an attacker is hacking something. Since 2008 to 2019 there are more than 8800 data breach cases is being found or filed. Even as we are aware of cybercrime and its stats, only 5% organization are fully secured and other 95% are not fully secured. According to survey 56% organization have weak controls. Basically they are not secured. Apart from taking measures cyber security are facing huge challenges or disturbs to many. This paper mainly focuses on dare to cyber security and also center of attraction is cyber security expertise, morals with changing in technology with time. [1]

Online Users' Cynical Attitudes towards Privacy Protection: Examining Privacy Cynicism

  • Hanbyul Choi;Yoonhyuk Jung
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.547-567
    • /
    • 2020
  • As the complexity of managing online personal information is increasing and data breach incidents frequently occur, online users feel a loss of control over their privacy. Such a situation leads to their cynical attitudes towards privacy protection, called privacy cynicism. This study aims to examine the role of privacy cynicism in online users' privacy behaviors. Data were gathered from a survey that 281 people participated in and were analyzed with covariance-based structural equation modeling. The findings of this study reveal that privacy cynicism has not only a direct influence on disclosure intention but also moderates an effect of privacy concerns on the intention. The analytical results also indicate that there is a nonlinear effect of privacy cynicism on the outcome variable. This study developed the concept of privacy cynicism—a phenomenon that significantly affects online privacy behavior but has been rarely examined. The study is an initial research into the nature and implications of privacy cynicism and furthermore clarified its role by the nonlinear relationship between privacy cynicism and the willingness to disclose personal information.