• Title/Summary/Keyword: Extraction Attack

Search Result 63, Processing Time 0.031 seconds

Bioactivity of Cajuput Seedling n-Hexane Extract as an Attractant for Subterranean Termite Coptotermes curvignathus Holmgren (Isoptera: Rhinotermitidae)

  • Arinana ARINANA;Rama Aditya DHARMA;Rita Kartika SARI;Anindya Intan RAHMAWATI;Riki ANDIKA;Dodi NANDIKA
    • Journal of the Korean Wood Science and Technology
    • /
    • v.52 no.1
    • /
    • pp.31-46
    • /
    • 2024
  • Subterranean termite attacks on cajuput (Melaleuca cajuputi) seedling roots were widespread in several of Java's Perum Perhutani Forest Management Units. This attack was suspected to be related to the chemical components of the cajunput seedling roots. This study was conducted to determine the bioactivity of cajuput seedling root extract as an attractant for the subterranean termite Coptotermes curvignathus Holmgren (Isoptera: Rhinotermitidae). The extraction process was performed according to ASTM D1108-96, and the extract was characterized using gas chromatography-mass spectrometry (GC-MS). Bioactivity testing of the extracts was carried out using attractiveness and no-choice feeding bioassays. The results showed that the average root extraction yield from cajunput seedlings was 4.94%. The attractiveness of the extract solutions at concentrations of 0.50%, 0.75%, and 1.00% were 45.33%, 62.00%, and 74.67%, respectively. The mortality rate of C. curvignathus termites ranged from 9.63% to 24.44%. Cajuput seedling root extract's lethal concentration 50 was 2.45% (non-toxic). GC-MS analysis showed that the extract contained linoleic acid, which has the potential to attract insects.

A Study on the Medical Accident Attack Rate in a Korean rural Area through the Sam Wha Medicare Insurance Union (충남 서산군 삼화의료보험조합을 통해본 일부 농촌지역 주민의 의료사고 발생율 및 진료수혜 실태 조사)

  • Ahn, Moon-Young;Lee, Jung-Ja;Nam, Taik-Sung
    • Journal of agricultural medicine and community health
    • /
    • v.6 no.1
    • /
    • pp.33-41
    • /
    • 1981
  • To investigate the status of medical accident attack rate and medicare utilization during last 27months from 1st Oct., 1977 to 31st Dec. 1979 in the area under Sam Wha Medicare Insurance Union, the study was carried out through analyzing the medicare records of patients who were enrolled. "The medical accident" in this study was used as the meaning of the state that the people who have been treated morbid condition with insurance money. For the study, 2 doctors and one nurse were mobilized and the results are as follows: 1) The total number of the Medicare Insurance Union members among the 37,044 total population of the study area, (Hea-mi, Unsan, Eumam Myun) were 57, 35 composed of 3,000 males (52.3%) and 27, 35 females (47.7%) in 1977, 3,383 composed of 2,006 males (59.3%) 1,377 females (40.7%) in 1978, 2,573 composed of 1,437 males and 1,336 females (44.2%) in 1979. 2) Total number of medical accident attack cases were 6,774 case (partially overlapped the number of the 1977 with that of the 1978) and average annual medical accident attack rate per 1,000 population was 700.9. 3) Five major disease group in the past three years were disease of the respiratory system (177.7), disease of the digestive system (165.8), disease of the skin and subcutaneous(64.9), symptoms, signs and ill-defined conditions (64.6), any injury and poisoning (51.9). Mental disorders (32.6) was the 6th order disease group. 4) The order of the medical accident attack rate of age group per 1,000 population per year was the year group of 0~4(877.8), 45~64(832.6), 25~44(810.3), 5~14(495.1) 15~24(494.7) 65 and over (460.7). 5) Medical accident attack rate of age group per 1,000 population in the 5 major disease groups were the year group of 45~64 (100.0) in the mental disorders 0~4(525.1) in the disease of the respiratory system 45~64 (328.5) in the disease of the digestive system 0~4 (202.8) in the disease of the skin and subcutanous tissue, 25~44 (98.3) in the accidents and poisoning. 6) Monthly medical accidents attack rate were 87.0 in the winter (Dsc., Jan., Feb.) and 86.2 in the summer (Jun., July, Aug.). So the trend of the medical accidents attack rate during the year was bimount figure. 7) Monthly medical accidents attack rate in the major disease group were highest in Jan., Apr., (31.1) in the disease of the respiratory system, in Jan., Feb., Mar. (24.9) in the disease of the digestive system, in Jan., Jun., Aug. (9.8) in the injury and poisoning. 8) Duration of the treatment of the 93.1% of the total cases were within 5 days. 9) 299 cases (4.5%) of the total number of cases, 6,587 cases were referred to secondary and tertiary medicare facilities. 10) The order of the major 10 kinds of diagnosis of the disease, 6,587 cases during 27 months, were URI and chillness (1,063 cases, 16.1%), gastritis(830 cases, 12. 6%) dermatitis(360 cases, 5.5%), bronchitis(291 cases, 4.4%), neurosis (284 cases, 4.3%), contusion (165 cases, 2.5%), tooth extraction (157 cases, 2.4%), tonsillitis (109 cases, 0.7%), laceration (107 cases, 1.6%), neuralgia (105 cases, 1.6%), arthritis (104 cases, 1.6%), otitis media and mastoiditis (103 cases, 1.6%), so total case were 3,678 cases (55.9%).

  • PDF

Nerve Agents and Their Detection

  • Kim, Young Jun;Huh, Jae Doo
    • Journal of Sensor Science and Technology
    • /
    • v.23 no.4
    • /
    • pp.217-223
    • /
    • 2014
  • Nerve agents are major chemical warfare agents with the "G series" and "V series" being the most widely known because of their lethal effect. Although not conspicuously used in major wars, the potential detrimental impact on modern society had been revealed from the sarin terror attack on Tokyo subway, which affected thousands of people. In this mini-review, major nerve agents of the "G series" and "V series" have been described along with various types of their detection methods. The physical properties and hydrolysis mechanisms of the major nerve agents are discussed since these are important factors to be considered in choosing detection methods, and specifying the procedures for sample preparations in order to enhance detection precision. Various types of extraction methods, including liquid-phase, solid-phase, gas-phase and solid-phase microextraction (SPME), are described. Recent development in the use of gas sensors for detecting nerve agents is also summarized.

Analysis of the Optimal Frequency Band for a Ballistic Missile Defense Radar System

  • Nguyen, Dang-An;Cho, Byoungho;Seo, Chulhun;Park, Jeongho;Lee, Dong-Hui
    • Journal of electromagnetic engineering and science
    • /
    • v.18 no.4
    • /
    • pp.231-241
    • /
    • 2018
  • In this paper, we consider the anti-attack procedure of a ballistic missile defense system (BMDS) at different operating frequencies at its phased-array radar station. The interception performance is measured in terms of lateral divert (LD), which denotes the minimum acceleration amount available in an interceptor to compensate for prediction error for a successful intercept. Dependence of the frequency on estimation accuracy that leads directly to prediction error is taken into account, in terms of angular measurement noises. The estimation extraction is performed by means of an extended Kalman filter (EKF), considering two typical re-entry trajectories of a non-maneuvering ballistic missile (BM). The simulation results show better performance at higher frequency for both tracking and intercepting aspects.

Extraction of attack scenarios using private local wireless networks and a study of their Prevention and countermeasures (비공개 근거리 무선망을 이용한 공격 시나리오 추출과 예방 및 대응 방안 연구)

  • Kim, Doyeon;Kim, Yonghyun;Kim, Donghwa;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.214-216
    • /
    • 2017
  • 컴퓨터 기술이 발전하면서 현대사회에서의 정보의 중요도와 의존도가 나날이 증가하고 있다. 정보가 중요해진 만큼 해킹 기술도 다양하고 예측하기 어렵게 만들어지면서 정보사회가 위협받고 있다. 이와 관련된 기술을 이스라엘의 벤구리온대학 내의 사이버보안 연구센터에서 연구했다. 2014년에 개발한 Airhopper는 디스플레이 어댑터에서 출력 시 나오는 주파수를 이용해 데이터를 변조해서 휴대폰으로 수신 할 수 있도록 정보를 추출하는 공격이고, 2016년에 개발한 USBee는 USB 2.0 커넥터를 이용한 장비를 통해서 USB 데이터 와이어를 조작해 특정 주파수를 만들어 무선망을 구축하고 데이터를 추출해 내는 공격이다. 본 논문에서는 이 Airhopper와 USBee 기술을 이용한 사이버 공격 시나리오를 추출하고 이에 대한 예방 및 대응 방안을 제시한다.

A Study on Dynamic Key Generating Mechanisms Using Images to Avoid Key Extraction Attack (키 추출 공격을 회피하는 이미지를 이용한 동적 키 생성 매커니즘)

  • Cheong, Myeong-Woo;Oh, Yoon-Seok;Seo, Seung-Hyun;Kang, You-Sung;Choi, Doo-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.265-267
    • /
    • 2016
  • 현대 사회는 IoT의 대중화와 함께 늘어나는 보안 위협에 노출되어 있다. 특히 CCTV의 설치 구역 확대는 그 보안 취약성과 맞물려 사생활 침해 등 문제를 야기할 가능성이 높다. 기존의 보안 솔루션은 키를 기기에 저장해야 하는 점 때문에 키 추출 공격 등으로 쉽게 보호능력을 상실할 수 있다. 본 논문은 키를 저장하는 것이 아닌 이미지를 씨드(Seed)로 사용하여 동적으로 키를 생성하는 개념과 매커니즘을 제안한다.

Barcode Pattern Image Watermark Using Triplet (트리플릿을 이용한 바코드 패턴 이미지 워터마크)

  • Park, Byung-Su;Chu, Hyung-Suk;An, Chong-Koo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.12
    • /
    • pp.2330-2335
    • /
    • 2008
  • In this paper, we proposed a robust watermark scheme for image based on the discrete wavelet transform. In the first, we use the triplet method for embedding and extraction of watermark. Triplet method uses relationship among the discrete wavelet coefficients at the same position in the three detail subband of image. In the second, we use barcode Pattern Image for watermark scheme. By using barcode Pattern Images, a user is able to make many kinds of own watermark. In the third, the proposed method for image watermark provides the invisiblility which the other user can not discriminate watermark from watermarked image. The advantage of the proposed method is visibility when we extracted watermark from the image. The corresponding experimental results show that the proposed method has performance of a robustness from the noise attack.

A Study on a Logo Extraction Algorithm for Copyright Protection of Digital Contents (디지털 컨텐츠의 저작권 보호를 위한 로고 검출 알고리즘에 관한 연구)

  • 최준기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.124-129
    • /
    • 2003
  • Recently, on the internet, we need the protection methods of digital contents. To Protect web contents, we inserted a visible watermark but it could be removed easily and covered some place of original contents. In this paper, we proposed a logo detection algorithm that it insert an invisible logo watermark and extract after attacks. Previous works, it didn't show clearly. Experimental results show that it can be extracted all logo images after an attack. And it is proved that proposed scheme is an appropriate algorithm.

  • PDF

A Study of AI model extraction attack and defense techniques (AI 모델 탈취 공격 및 방어 기법들에 관한 연구)

  • Jun, So-Hee;Lee, Young-Han;Kim, Hyun-Jun;Paek, Yun-Heung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.382-384
    • /
    • 2021
  • AI (Artificial Intelligence)기술이 상용화되면서 최근 기업들은 AI 모델의 기능을 서비스화하여 제공하고 있다. 하지만 최근 이러한 서비스를 이용하여 기업이 자본을 투자해 학습시킨 AI 모델을 탈취하는 공격이 등장하여 위협이 되고 있다. 본 논문은 최근 연구되고 있는 이러한 모델 탈취 공격들에 대해 공격자의 정보를 기준으로 분류하여 서술한다. 또한 본 논문에서는 모델 탈취 공격에 대응하기 위해 다양한 관점에서 시도되는 방어 기법들에 대해 서술한다.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.197-200
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LG) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

  • PDF