• Title/Summary/Keyword: Leakage characteristics

Search Result 1,643, Processing Time 0.022 seconds

The Clinical Applicability of Transoral Transpharyngeal Approach to the Craniovertebral Junction Lesions (두개 경추 이행부의 병소에 대한 경구적 접근법의 유용성)

  • Cho, Tae Goo;Park, Kwan;Cho, Yang-Sun;Baek, Chung-Hwan;Nam, Do Hyun;Kim, Jong Soo;Hong, Seung-Chyul;Shin, Hyung Jin;Eoh, Whan;Kim, Jong Hyun
    • Journal of Korean Neurosurgical Society
    • /
    • v.29 no.3
    • /
    • pp.379-388
    • /
    • 2000
  • Objective : Although transoral transpharyngeal approach is a very useful method for the lesions of craniovertebral junction, it is not frequently used because of anatomical unfamilarity, risk of cerebrospinal fluid(CSF) leakage, and resultant postoperative meningitis. To evaluate the usefulness of transoral transpharyngeal approach for various lesions of craniovertebral junction, clinical characteristics and the results of this approach are investigated. Methods : Transoral transpharyngeal approaches were performed in eight cases between 1996 and 1999. Among them, there were three basilar invaginations due to congenital anomalies, two odontoid type I fractures, two atlantoaxial dislocations, and one pseudotumor. Surgical methods included five cases of anterior decompression and posterior fusion, two anterior approaches for decompression and one transoral approach for biopsy. Results : This procedure allowed immediate clinical improvement in all cases. In seven patients with preoperative motor deficit showed a progressive neurological improvement. The follow-up plain x-rays demonstrated successful bony fusion in all patients. Only one patient suffered from postoperative wound dehiscence, but she completely recovered after wound revision. There was no complication of postoperative CSF leakages. Conclusions : Transoral transpharyngeal approach for the ventral lesions of craniovertebral junction, can be used as a relatively simple and effective method.

  • PDF

Biosynthesis of Silver Nanoparticles Using Microorganism (미생물을 이용한 은 나노입자 생합성)

  • Yoo, Ji-Yeon;Jang, Eun-Young;Hong, Chang-Oh;Kim, Keun-Ki;Park, Hyean-Cheal;Lee, Sang-Mong;Kim, Young-Gyun;Son, Hong-Joo
    • Journal of Life Science
    • /
    • v.28 no.11
    • /
    • pp.1354-1360
    • /
    • 2018
  • The aim of this study was to develop a simple, environmentally friendly synthesis of silver nanoparticles (SNPs) without the use of chemical reducing agents by exploiting the extracellular synthesis of SNPs in a culture supernatant of Bacillus thuringiensis CH3. Addition of 5 mM $AgNO_3$ to the culture supernatant at a ratio of 1:1 caused a change in the maximum absorbance at 418 nm corresponding to the surface plasmon resonance of the SNPs. Synthesis of SNPs occurred within 8 hr and reached a maximum at 40-48 hr. The structural characteristics of the synthesized SNPs were investigated by various instrumental analysis. FESEM observations showed the formation of well-dispersed spherical SNPs, and the presence of silver was confirmed by EDS analysis. The X-ray diffraction spectrum indicated that the SNPs had a face-centered cubic crystal lattice. The average SNP size, calculated using DLS, was about 51.3 nm and ranged from 19 to 110 nm. The synthesized SNPs exhibited a broad spectrum of antimicrobial activity against a variety of pathogenic Gram-positive and Gram-negative bacteria and yeasts. The highest antimicrobial activity was observed against C. albicans, a human pathogenic yeast. The FESEM observations determined that the antimicrobial activity of the SNPs was due to destruction of the cell surface, cytoplasmic leakage, and finally cell lysis. This study suggests that B. thuringiensis CH3 is a potential candidate for efficient synthesis of SNPs, and that these SNPs have potential uses in a variety of pharmaceutical applications.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.