• Title/Summary/Keyword: IP-10

Search Result 2,626, Processing Time 0.027 seconds

The Analgesic Interaction between Ketorolac and Morphine in Radiant Thermal Stimulation Rat (방사열 자극실험쥐에서 Ketorolac과 Morphine의 병용투여 효과)

  • Roh, Jang Ho;Choe, Dong Hun;Lee, Youn Woo;Yoon, Duck Mi
    • The Korean Journal of Pain
    • /
    • v.18 no.1
    • /
    • pp.10-14
    • /
    • 2005
  • Background: Previous studies have suggested synergistic analgesic drug interactions between NSAIDs and opioids in neuropathic and inflammatory pain models. The aim of this study was to investigate the analgesic drug interaction between intraperitoneal (IP) ketorolac and morphine in radiant thermal stimulation rat. Methods: Initially, we assessed the withdrawal latency time of the hindpaw to radiant thermal stimulation every 15 min for 1 hour and every 30 min for next 1 hour after IP normal saline 5 ml (control group). The latency time was changed into percent maximal possible effect (%MPE). Next, IP dose response curves were established for the %MPE of morphine (0.3, 1, 3, 10 mg/kg) and ketorolac (3, 10, 30 mg/kg) to obtain the $ED_{50}$ for each agent. And we confirmed that the IP morphine effect was induced by opioid receptor through IP morphine followed by IP naloxone. At last, we injected three doses of IP ketorolac (3, 10, 30 mg/kg) mixed with one dose of morphine (2 mg/kg) for fixed dose analysis. Results: IP morphine delayed the paw withdrawal latency time dose dependently, but not ketorolac. $ED_{50}$ of IP morphine was 2.1 mg/kg. And the IP morphine effect was reversed to control level by IP naloxone. IP ketorolac + morphine combination showed no further additional effects on paw withdrawal latency time over morphine only group. Conclusions: IP ketorolac did not produce antinociceptive effect during radiant thermal stimulation. There was neither additional nor synergistic analgesic interaction between IP morphine and ketorolac in thermal stimulation rat.

End-to-End Performance of VoIP Traffics over Large Scale MANETs (대규모 MANET에서 VoIP 트래픽의 종단간 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.49-54
    • /
    • 2011
  • In this paper, End-to-End VoIP(Voice over Internet Protocol) performance over large scale MANET(Mobile Ad-hoc Networks) is evaluated. VoIP implementation model, which can be used for large scale MANET, is suggested through this evaluation. VoIP simulator based on NS-2 network simulator is used for performance measurement. Call connection ratio as a connection performance, MOS and network delay as a transmission performance, packet loss rate as other performance is measured with this simulation. Finally, maximum $10{\sim}15km^2$ as a single MANET, 500 nodes and 100 call connections is suggested for VoIP implementation and operation conditions over large scale MANETs.

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

A Study on Open Software based IP Network System Practice Platform and Practicing Scenario (공개 소프트웨어 기반 IP 네트워크 시스템 실습 플랫폼 및 실습 시나리오)

  • Kim, Tae-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.106-114
    • /
    • 2020
  • It is very important for beginners in networking to build, test, and operate an IP network system, which is the key infrastructure of the fourth industrial revolution. An IP network system consists of the IP network itself, covering both the internet and underlying layers, plus the basic network system supporting fundamental network services, with a DNS, the DHCP, email, WWW, and application service systems, such as VoIP. This paper suggests an open software-based practice platform with a minimal network configuration on which beginners can practice on nearly all of the IP network system, and it presents a practice scenario and results. In addition, it adds both IP address allocation and routing table manipulation functions to the network simulator software, which will allow beginners to learn table-based datagram routing schemes in advance. This platform may be useful for networking beginners in order to practice on an IP network system on their own personal computers without additional equipment and costs.

Clinical Analysis of Inverse Planning for Radiosurgery ; Gamma Knife Treatment Plan Study (방사선 수술 역방향 치료계획 유용성 평가)

  • Jin, Seong Jin;Je, Jae Yong;Park, Cheol Woo
    • Journal of the Korean Society of Radiology
    • /
    • v.9 no.6
    • /
    • pp.343-348
    • /
    • 2015
  • The purpose of this study is a comparison of forward planning(FP) and inverse planning(IP) of a radiosurgery procedure. 10 patients of acoustic schwannoma MR image were used for treatment plan. FP-1,2 and IP were established under the same condition. FP and IP were compared by number of shot, conformity index(CI), paddic conformity index(PCI), gradiant index(GI) and treatment time. On average the treatment plan produced by IP tool provided an improved or similar CI, PCI, GI and reduced treatment time as compared to the FP (CI;FP-1:0.85, FP-2:0.86, IP:0.94, PCI;FP-1:0.79, FP-2:0.81, IP:0.78, GI;FP-1:2.94, FP-2:2.94, IP:3.01). The inverse planning system provides a clinically useful plan while reducing the planning time and treatment time.

IP브랜드 네이밍과 카피라이팅을 잘해야 성공

  • Kim, Cheol-Gyu
    • Digital Contents
    • /
    • no.10 s.65
    • /
    • pp.74-77
    • /
    • 1998
  • 브랜드 네이밍의 중요성이 점점 부각되는 지금, 체계적인 브랜드 네이밍을 통해 적은 비용으로 큰 광고효과를 보길 원하는 IP업체들이 많이 생겨나고 있다. 21세기 마케팅 경쟁환경은 시장이 아니라 소비자의 머리속을 꿰뚫어 봐야한다. IP브랜드네임을 통해 PC통신 소비자의 머리속에 떠오르는 연상은 바로 그 IP상품의 브랜드 이미지로 직결되며, 그 이미지에 따라 IP상품의 성공여부가 결정되기 때문이다. 이번호에는 IP네이밍 브랜드와 카피라이팅 방법에 대해 알아 보려고 한다.

  • PDF

Development Methods and Design of a Wireless VoIP System based on the Binary-CDMA Technology (Binary CDMA 기반의 무선 VoIP 시스템의 개발방법 및 설계)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2121-2128
    • /
    • 2011
  • Binary CDMA is a new standard technology for wireless communication developed by Korea that makes high speed communications and good quality of services. In this paper we researched on the development methods and design of a wireless VoIP system based on the Binary-CDMA technology that makes it freely installed in any place without phone cables and laying works.

IP Assignment Analysis Based on DHCP at High-speed Network (초고속통신망에서 DHCP 기반의 IP 할당 분석)

  • Kim, Hyoung-Jin;Cho, Hyun-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2300-2305
    • /
    • 2009
  • Recently, Telecommunication companies have introduced a new network architecture that assigns network resources consistent and protects their systems more secure. Now, they provide multimedia services through various types of access networks. In this study, I'd like to introduce IP address assignment method based on the Dynamic Host Configuration Protocol (DHCP) and find out how success or failure of Ip address assignment will be taken place according to the booting order of xDSL modem, AP and PC.

A Study on the VoIP Security Countermeasure of SIP-based (SIP(Session Initiation Protocol) 기반의 VoIP 보안 대책 연구)

  • Tae, Jang-Won;Kwak, Jin-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.421-428
    • /
    • 2013
  • Voice over IP refers to technology that enables routing of voice conversations over the Internet or a TCP/IP network. VoIP communication costs cheaper than traditional analog phone. Phone calls can be made to anywhere / anyone: Both to VoIP numbers as well as people with normal phone numbers. VoIP protocol equipment available today follows the SIP standard. Older VoIP equipment though would follow H 323, MGCP, Megaco/H.248. A SIP server is the main component of an IP PBX, dealing with the setup of all SIP calls in the TCP/IP network. A SIP server is also referred to a Asterisk IP-PBX. A VoIP telephone, also known as a SIP phone or a softphone, allows the user to make phone calls to any softphone, mobile or PC by using App store. A VoIP telephone can be a simple software-based softphone. However, the SIP Server and the program is vulnerable to VoIP attacks. In this paper, eavesdropping attacks tested by using the Asterisk SIP server. Eavesdropping attacks and TLS security methods apply to VoIP system. TLS can be applied to determine whether the eavesdropping available for VoIP Environments.

NF-${\kappa}B$ Inhibitor Suppresses Hypoxia-induced Apoptosis of Mouse Pancreatic ${\beta}$-cell Line MIN6

  • Koh, Hyun Sook;Kim, Jae Young
    • Biomedical Science Letters
    • /
    • v.20 no.1
    • /
    • pp.14-24
    • /
    • 2014
  • Hypoxia is one of the main reasons for islet apoptosis after transplantation as well as during isolation. In this study, we attempted to determine the potential usefulness of NF-${\kappa}B$ inhibitor for suppression of hypoxia-induced ${\beta}$-cell apoptosis as well as the relationship between IP-10 induction and ${\beta}$-cell apoptosis in hypoxia. To accomplish this, we cultured the mouse pancreatic ${\beta}$-cell line MIN6 in hypoxia (1% $O_2$). Among several examined chemokines, only IP-10 mRNA expression was induced under hypoxia, and this induced IP-10 expression was due to NF-${\kappa}B$ activity. Since a previous study suggested that IP-10 mediates ${\beta}$-cell apoptosis, we measured hypoxia-induced IP-10 protein and examined the effect of anti-IP-10 neutralizing Ab on hypoxia-induced ${\beta}$-cell apoptosis. However, IP-10 protein was not detected, and anti-IP-10 neutralizing Ab did not rescue hypoxia-induced MIN6 apoptosis, indicating that there is no relationship between hypoxia-induced IP-10 mRNA expression and hypoxia-induced ${\beta}$-cell apoptosis. Since it was still not clear if NF-${\kappa}B$ functions as an apoptotic or anti-apoptotic mediator in hypoxia-induced ${\beta}$-cell apoptosis, we examined possible involvement of NF-${\kappa}B$ in hypoxia-induced ${\beta}$-cell apoptosis. Treatment with 1 ${\mu}M$ NF-${\kappa}B$ inhibitor suppressed hypoxiainduced apoptosis by more than 50%, while 10 ${\mu}M$ AP-1 or 4 ${\mu}M$ NF-AT inhibitor did not, indicating involvement of NF-${\kappa}B$ in hypoxia-induced ${\beta}$-cell apoptosis. Overall, these results suggest that IP-10 is not involved in hypoxia-induced ${\beta}$-cell apoptosis, and that NF-${\kappa}B$ inhibitor can be useful for ameliorating hypoxia-induced ${\beta}$-cell apoptosis.