• Title/Summary/Keyword: Inside Attack

Search Result 106, Processing Time 0.026 seconds

Airway foreign body occurs unintentionally during anesthetic management of patient with asthma

  • Cho, Woo Jin;Yun, So Hui;Choi, Yun Suk;Lee, Bang Won;Kim, Mi Ok;Park, Jong Cook
    • Journal of Medicine and Life Science
    • /
    • v.16 no.2
    • /
    • pp.43-45
    • /
    • 2019
  • Intraoperative delivery of salbutamol (${\beta}_2$ agonist) through a breathing circuit may be performed in asthma patient. A 28-year-old woman with a history of asthma was diagnosed with chronic sinusitis and bilateral nasal polyps, and an endoscopic sinus surgery was performed. The patient was recommended salbutamol nebulization every 4 hours during the perioperative period because of the risk of asthma attack. At the end of the operation, when salbutamol was sprayed through the tube before extubation and the connector tip went inside the tube during injection. The patient was immediately referred to the pulmonary medicine department for bronchoscopy, where the foreign body was removed safely without any complications. When general anesthesia is performed on a patient who usually uses an inhaler for asthma, caution is required because the tip that connects the inhaler and the breathing circuit can aspirate into the endotracheal tube and enter the lungs when applying the inhaler before waking up the patient.

A Study on the Risk and Countermeasures of Hacking Cable

  • Hea-Jun Kim;Young-Bok Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.75-81
    • /
    • 2023
  • Since the introduction of smartphones, the introduction of charging cable infrastructure that can be used for public use is underway. Thanks to this, people use public cables comfortably without doubt, but most people are not aware of the dangers of public cables. These public cables can lead to infringement accidents such as personal information exposure due to the development of hacking cables, and in the worst case, hackers can take control of smartphones and laptops. This study analyzed the operating principles and attack principles of hacking cables that seem like these general charging cables, but contain malicious scripts or hardware inside. In addition, physical and logical countermeasures were considered based on the analysis.

Automatic Fire Extinguisher Having Flammable Pipes Inserted in a Cultural Assets Roof (가연성 파이프 시공에 의한 전통가옥지붕에 매설된 자동소화장치)

  • Cho, Taejun;Kim, Jae-Jun
    • The magazine of the Korean Society for Advanced Composite Structures
    • /
    • v.5 no.2
    • /
    • pp.26-31
    • /
    • 2014
  • This invention is purposed to provide an innovative solution for the inside of roof structures, which is cultural assets. The Asian old houses generally have several layered roofs on top of the structures. If a fire has started inside of the roof, it is hard to be extinguished before eliminating all the upper layers of the roof. This invention provides pre constructed embedded pipes, which is flammable and easy to be dissolved by the fire. The material of pipe is composed of rubbers, of which the combustion point is so low that the extinguishing of initial fire is possible without additional fire service. The inside of pipe is filled with halon gas. If the filled gas is consumed after ignited by fire, additional fire extinguishing water is supplied. If the flexible pipes are totally combusted by a big fire, the sprinkler at the end of inflexible pipe will work continuously, which is located between flexible and inflexible pipes. The extinguishing pipe network is suggested as dividing whole roof as multiple sections for a swift fire extinguishing in case of intentional or natural fire attack to our invaluable cultural assets.

  • PDF

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

A study on the narrative use of transitional object-characters in the family feature animation (가족용 장편애니메이션<인사이드 아웃>에 나타난 이행대상(transitional object) 캐릭터의 서사적 활용 연구)

  • Park, Hyoung-Dong
    • Cartoon and Animation Studies
    • /
    • s.49
    • /
    • pp.325-357
    • /
    • 2017
  • It can be assumed that the reasons why the animation characters, 'Olaf (in Frozen Kingdom)' and 'Minions (in Super Bad)', etc., which were very successful in the merchandising market while having won the popularity better than the main characters are very popular even though such characters appeared only by playing a funny role while assisting the adventures of the main characters are not only because of their cute appearances but also because such characters have their own core features in their inner world as the transitional object-characters. Simply expressing, a 'Transitional Object' as a concept suggested by a child psychologist, 'Donald Winnicott', means a lovey doll or an imaginary friend which temporarily replaces an infant's mother during the procedure when the infant is mentally separated from its mother. However, in case that the theory of transitional objects was applied directly to many narrative content characters for doing a study, there must have been done some studies in advance for establishing some new criteria and indexes related to the transitional object-characters of such narrative contents. Accordingly, while thinking that the 'emotional relationship' between a growth-subject and a growth mediator must be dealt with as the most important content in order to define a transitional object-character in a narration clearly, this researcher established some emotional index for judging the propensities of a transitional object-character on the basis of such way of thinking. The index is composed of 4 kinds of emotional roles (quasi-family member, growth mediator, lovey doll, an imaginary friend), 6 kinds of emotional supports (hugging, protecting, accepting, giving the initiative, improving the relationship and mutual supervising) and 4 kinds of emotional impressions (impression by contacting, impression to protect and impression accepting an attack). In case that some main characters of a family feature animation, 'Inside Out', are analyzed while the index mentioned above is applied, it was found that 'Bing Bong' and 'Sadness' have a high propensity as a transitional object-character. Especially, it could be inversely inferred in which ways some good transitional object-characters can help the narrations on growth of a family feature animation by taking a look at the character, 'Sadness' that has the highest propensity as a transitional object-character. The transitional object-character, 'Sadness' assists the narration on growth internally and externally by helping the internal maturity of a growth-subject in a way of projecting the tasks for the internal maturity of a growth-subject while helping the growth-subject to be successfully externally in a way of providing the growth-subject with some kinds of facilitating emotion. As the results from this Study, since such kinds of emotional experiences provided by such transitional object-characters are displaced to not only the relevant growth-subjects but also the audience who are emphasized with such growth-subjects as they are, such transitional object-characters play a role of hidden benefactors who induce some immersion into the narrations and provide child and adult audience with various layers of emotional satisfaction.

A Micro-Mechanics Based Corrosion Model for the Prediction of Service Life in Reinforced Concrete Structures

  • Song, Ha-Won;Kim, Ho-Jin;Kim, Tae-Hwan;Byun, Keun-Joo;Lee, Seung-Hoon
    • Corrosion Science and Technology
    • /
    • v.4 no.3
    • /
    • pp.100-107
    • /
    • 2005
  • Reinforcing steel bars in reinforced concrete structures are protected from corrosion by passive film on the steel surface inside concrete with high alkalinity. However, when the passive film breaks down due to chloride ion ingressed into the RC structures, a corrosion initiates at the surface of steel bars. Then, internal pressure by volume expansion of corrosion products in reinforcing bars induces cracking and spalling of cover concrete, which reduces not only durability performance but also structural performance in RC structures. In this paper, a service life prediction of RC structures is carried out by using a micro-mechanics based corrosion model. The corrosion model is composed of a chloride penetration model to evaluate the initiation of corrosion and an electric corrosion cell model and an oxygen diffusion model to evaluate the rate and the accumulated amounts of corrosion. Then, a corrosion cracking model is combined to the models to evaluate critical amount of corrosion product for initiation cracking in cover concrete. By implementing the models into a finite element analysis program, a time and space dependent corrosion analysis and a service life prediction of RC structures due to chloride attack are simulated and the results of the analysis are compared with test results. The effect of crack width on the corrosion and the service life of the RC structures are analyzed and discussed.

Decomposition of Aqueous Anatoxin-a Using Underwater Dielectric Barrier Discharge Plasma Created in a Porous Ceramic Tube (다공성 세라믹관내에서 생성되는 수중 유전체 장벽 방전 플라즈마를 이용한 아나톡신-a의 분해)

  • JO, Jin-Oh;Jwa, Eunjin;Mok, Young-Sun
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.30 no.2
    • /
    • pp.167-177
    • /
    • 2016
  • This work investigated the decomposition of aqueous anatoxin-a originated from cyanobacteria using an underwater dielectric barrier discharge plasma system based on a porous ceramic tube and an alternating current (AC) high voltage. Plasmatic gas generated inside the porous ceramic tube was uniformly dispersed in the form of numerous bubbles into the aqueous solution through the micro-pores of the ceramic tube, which allowed an effective contact between the plasmatic gas and the aqueous anatoxin-a solution. Effect of applied voltage, treatment time and the coexistence of nutrients such as $NO_3{^-}$, $H_2PO_4{^-}$ and glucose on the decomposition of anatoxin-a was examined. Chemical analyses of the plasma-treated anatoxin-a solution using liquid chromatography-mass spectrometry (LC-MS) and ion chromatography (IC) were performed to elucidate the mineralization mechanisms. Increasing the voltage improved the anatoxin-a decomposition efficiency due to the increased discharge power, but the energy required to remove a given amount of anatoxin-a was similar, regardless of the voltage. At an applied voltage of 17.2 kV (oxygen flow rate: $1.0L\;min^{-1}$), anatoxin-a at an initial concentration of $1mg\;L^{-1}$ (volume: 0.5 L) was successfully treated within 3 min. The chemical analyses using LC-MS and IC suggested that the intermediates with molecular weights of 123~161 produced by the attack of plasma-induced reactive species on anatoxin-a molecule were further oxidized to stable compounds such as acetic acid, formic acid and oxalic acid.

A Research of Anomaly Detection Method in MS Office Document (MS 오피스 문서 파일 내 비정상 요소 탐지 기법 연구)

  • Cho, Sung Hye;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.87-94
    • /
    • 2017
  • Microsoft Office is an office suite of applications developed by Microsoft. Recently users with malicious intent customize Office files as a container of the Malware because MS Office is most commonly used word processing program. To attack target system, many of malicious office files using a variety of skills and techniques like macro function, hiding shell code inside unused area, etc. And, people usually use two techniques to detect these kinds of malware. These are Signature-based detection and Sandbox. However, there is some limits to what it can afford because of the increasing complexity of malwares. Therefore, this paper propose methods to detect malicious MS office files in Computer forensics' way. We checked Macros and potential problem area with structural analysis of the MS Office file for this purpose.

Design and Implementation of Virus Test Simulation using VMware (VMware를 이용한 바이러스 테스트 시뮬레이션 설계 및 구현)

  • 이중식;이종일;김홍윤;전완근
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.199-207
    • /
    • 2002
  • Comes in into recent times and there is on with a level where the attack against the computer virus and the hacking which stand is serious. The recently computer virus specific event knows is the substantial damage it will be able to occur from our life inside is a possibility of feeling. The virus which appears specially in 1999 year after seemed the change which is various, also the virus of the form which progresses appeared plentifully The part virus does it uses the password anger technique which relocates the cord of the oneself. Hereupon consequently the vaccine programs in older decode anger to do the password anger of the virus again are using emulation engine. The password anger technique which the like this virus is complicated and decode anger technique follow in type of O.S. and the type is various. It uses a multi emulation engine branch operation setup consequently from one system and to respect it will be able to use a multiple operation setup together it will use the VMware which is an application software which it does as a favor there is a possibility where it will plan 'Virus Test Simulation' and it will embody.

  • PDF

Usage Techniques of a Truncated Message Authentication Code for In-Vehicle Controller Area Network (자동차 내부 네트워크를 위한 경량 메시지 인증 코드 사용기법)

  • Woo, Samuel;Lee, Sang-Bum
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.127-135
    • /
    • 2017
  • Recently, the most brand new vehicles contain a lot of ECU for comfortable and safety driving environments. For efficient communication network among ECUs, almost car manufactures use CAN protocol which enables to decrease the number of communication lines dramatically and ensures higher data transmission reliability. However, CAN dose not ensure authentication of CAN data frame. So it is vulnerable to replay-attack on CAN data frame. This paper proposes the practical message authentication technique for In-vehicle CAN. To transmit data and MAC together, it is very useful to use the short length of MAC after considering limited space of CAN data frame. However to ensure safety of MAC, additional technique is required. We suggested a message authentication technique that can be usefully applied to build a safety network inside the vehicle because it considers limited data payload of CAN.