• Title/Summary/Keyword: Bypass Technique

Search Result 230, Processing Time 0.026 seconds

Cor Triatriatum with Coronary Artery Disease in an Old Man -A case report- (고령환자에서 관상동맥 질환을 동반한 삼심방심의 수술치험 -1예 보고-)

  • 천종록;이응배;조용근;장봉현;이종태;김규태
    • Journal of Chest Surgery
    • /
    • v.32 no.1
    • /
    • pp.58-61
    • /
    • 1999
  • Cor triatriatum is a rare anomaly in old age. This is a case report of a 66 year-old man who had been preoperatively diagnosed as coronary artery disease and cor triatriatum. The operative findings revealed that the left atrium had an intra-atrial septum with one small opening 10mm in diameter, the upper compartment received both pulmonary veins, and there were no other anomalies like anormalous pulmonary venous connection or atrial septal defect. The patient successfully underwent open heart surgery ; the anomalous septum was resected, the mitral valve was reconstructed using French technique with Carpentier-Edwards ring, and coronary artery bypass grafting was performed.

  • PDF

A Study of Application Layer Traceback Through Intelligent SQL Query Analysis (지능형 SQL Query 분석을 통한 Application Layer 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.265-268
    • /
    • 2010
  • Current Traceback is difficult due to the development of bypass technique Proxy and IP-driven to trace the real IP Source IP is the IP traceback after the actual verification is difficult. In this paper, an intelligent about SQL Query field, column, table elements such as analysis of the value and the matching key values and Data used here to analyze source user hit point values for the user to trace the Application Layer IP for the analysis of forensic evidence guided by In this study, including forensic DB security will contribute to the development of electronic trading.

  • PDF

Surgical Management of Aorto-Esophageal Fistula as a Late Complication after Graft Replacement for Acute Aortic Dissection

  • Lee, Jae-Hong;Na, Bubse;Hwang, Yoohwa;Kim, Yong Han;Park, In Kyu;Kim, Kyung-Hwan
    • Journal of Chest Surgery
    • /
    • v.49 no.1
    • /
    • pp.54-58
    • /
    • 2016
  • A 49-year-old male presented with chills and a fever. Five years previously, he underwent ascending aorta and aortic arch replacement using the elephant trunk technique for DeBakey type 1 aortic dissection. The preoperative evaluation found an esophago-paraprosthetic fistula between the prosthetic graft and the esophagus. Multiple-stage surgery was performed with appropriate antibiotic and antifungal management. First, we performed esophageal exclusion and drainage of the perigraft abscess. Second, we removed the previous graft, debrided the abscess, and performed an in situ re-replacement of the ascending aorta, aortic arch, and proximal descending thoracic aorta, with separate replacement of the innominate artery, left common carotid artery, and extra-anatomical bypass of the left subclavian artery. Finally, staged esophageal reconstruction was performed via transthoracic anastomosis. The patient's postoperative course was unremarkable and the patient has done well without dietary problems or recurrent infections over one and a half years of follow-up.

Fragility assessment for electric cabinet in nuclear power plant using response surface methodology

  • Tran, Thanh-Tuan;Cao, Anh-Tuan;Nguyen, Thi-Hong-Xuyen;Kim, Dookie
    • Nuclear Engineering and Technology
    • /
    • v.51 no.3
    • /
    • pp.894-903
    • /
    • 2019
  • An approach for collapse risk assessment is proposed to evaluate the vulnerability of electric cabinet in nuclear power plants. The lognormal approaches, namely maximum likelihood estimation and linear regression, are introduced to establish the fragility curves. These two fragility analyses are applied for the numerical models of cabinets considering various boundary conditions, which are expressed by representing restrained and anchored models at the base. The models have been built and verified using the system identification (SI) technique. The fundamental frequency of the electric cabinet is sensitive because of many attached devices. To bypass this complex problem, the average spectral acceleration $S_{\bar{a}}$ in the range of period that cover the first mode period is chosen as an intensity measure on the fragility function. The nonlinear time history analyses for cabinet are conducted using a suite of 40 ground motions. The obtained curves with different approaches are compared, and the variability of risk assessment is evaluated for restrained and anchored models. The fragility curves obtained for anchored model are found to be closer each other, compared to the fragility curves for restrained model. It is also found that the support boundary conditions played a significant role in acceleration response of cabinet.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

HeartMate 3 Implantation via Only Left Thoracotomy: A Case Report

  • Mi Young Jang;Jun Ho Lee;Su Ryeun Chung;Kiick Sung;Wook Sung Kim;Yang Hyun Cho
    • Journal of Chest Surgery
    • /
    • v.56 no.3
    • /
    • pp.224-227
    • /
    • 2023
  • Median sternotomy is a standard surgical technique used for left ventricular assist device (LVAD) implantation. However, if sternotomy has a prohibitive surgical risk, LVAD implantation can be performed through only left thoracotomy. We managed a patient with end-stage heart failure who had recently undergone coronary artery bypass grafting (CABG) elsewhere. The patient also had a deep sternal wound infection and bacteremia. Because of refractory cardiogenic shock, we performed extracorporeal membrane oxygenation (ECMO). After multiple mediastinal washouts and omental flap placement, ECMO was converted to extracorporeal LVAD (from the left ventricular apex to the descending aorta) through a left thoracotomy. The extracorporeal LVAD was maintained for 18 days and replaced by the HeartMate 3 LVAD. The patient was discharged in good condition 115 days after CABG.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

Hacking and Countermeasure on Smart TV (스마트 TV 해킹 위협 및 대응방안 분석)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.313-317
    • /
    • 2014
  • Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.

Surgical Outcomes of a Modified Infarct Exclusion Technique for Post-Infarction Ventricular Septal Defects

  • Kim, In Sook;Lee, Jung Hee;Lee, Dae-Sang;Cho, Yang Hyun;Kim, Wook Sung;Jeong, Dong Seop;Lee, Young Tak
    • Journal of Chest Surgery
    • /
    • v.48 no.6
    • /
    • pp.381-386
    • /
    • 2015
  • Background: Postinfarction ventricular septal defects (pVSDs) are a serious complication of acute myocardial infarctions. The aim of this study was to analyze the clinical outcomes of the surgical treatment of pVSDs. Methods: The medical records of 23 patients who underwent operations (infarct exclusion in 21 patients and patch closure in two patients) to treat acute pVSDs from 2001 to 2011 were analyzed. Intra-aortic balloon counterpulsation was performed in 19 patients (82.6%), one of whom required extracorporeal membrane support due to cardiogenic shock. The mean follow-up duration was $26.2{\pm}18.6months$. Results: The in-hospital mortality rate was 4.3% (1/23). Residual shunts were found in seven patients and three patients required reoperation. One patient needed reoperation due to the transformation of an intracardiac hematoma into an abscess. No patients required reoperation due to recurrence of a ventricular septal defect during the follow-up period. The cumulative survival rate was 95.5% at one year, 82.0% at five years, and 65.6% at seven years. Conclusion: The use of a multiple-patch technique with sealants appears to be a reliable method of reducing early mortality and the risk of significant residual shunting in patients with pVSDs.

Malware Analysis Mechanism using the Word Cloud based on API Statistics (API 통계 기반의 워드 클라우드를 이용한 악성코드 분석 기법)

  • Yu, Sung-Tae;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.10
    • /
    • pp.7211-7218
    • /
    • 2015
  • Tens of thousands of malicious codes are generated on average in a day. New types of malicious codes are surging each year. Diverse methods are used to detect such codes including those based on signature, API flow, strings, etc. But most of them are limited in detecting new malicious codes due to bypass techniques. Therefore, a lot of researches have been performed for more efficient detection of malicious codes. Of them, visualization technique is one of the most actively researched areas these days. Since the method enables more intuitive recognition of malicious codes, it is useful in detecting and examining a large number of malicious codes efficiently. In this paper, we analyze the relationships between malicious codes and Native API functions. Also, by applying the word cloud with text mining technique, major Native APIs of malicious codes are visualized to assess their maliciousness. The proposed malicious code analysis method would be helpful in intuitively probing behaviors of malware.