• Title/Summary/Keyword: Man-in-the-Middle

Search Result 618, Processing Time 0.026 seconds

Review on Insamyangwi-tang in Hyungsang Medicine (인삼양위탕에 대한 형상의학적 고찰)

  • Kang Kyung Hwa;Lee Yong Tae
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.18 no.6
    • /
    • pp.1569-1574
    • /
    • 2004
  • A general review is made on Insamyangwi-tang(인삼양위탕). Following conclusions are drawn from the clinical cases of Insamyangwi-tang in Hyungsang medicine. Insamyangwi-tang is composed of four different prescriptions of Huisaeng-san, Sakoonja-tang, Eajin-tang and Pyungwi-san. Huisaeng-tang is usually prescribed for the intestinal convulsion. Sakoonja-tang for the deficiency of Ki. Eajintang for retention of phlegm, Insamyangwi-tang is effective in strengthening the spleen, drying the dampness, warming the middle-warmer to stop vomiting, regulating the flow of Ki, and eliminating phlegm. Insamyangwi-tang is applicable to malaria caused by cold, intestinal convulsion, abdominal mass, edema, tympanites, Yin syndrome of exogenous febrile disease, distension, lack of appetite, stomachache, and diarrhea. Persons with the following characteristic in Hyungsang are more susceptible to Insamyangwi-tang ; Jung type, Hyul type, fish type, Taium meridian type, white fat damp constitution, person with big mouth, and woman rather than man.

A Study on the Formational Process of Traditional House in Hwangsan Village at Geochang (거창(居昌) 황산(黃山)마을 전통주거의 형성과정에 관한 연구)

  • Kim, Hwa-Bong;Kim, Se-Hwan
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.13 no.3
    • /
    • pp.1-9
    • /
    • 2011
  • The purpose of this research is to analyze the formational process of traditional house in old village that is the base of development on rural area. The method of this research is to use the family genealogy of the clan society village in the analysis of building times, and constructed with investigation by the residents. The results of this research are described as follows. 1. At the first period of settlement in the middle time of 18C, the small relative family was located at nearby of each other. They were divided three group. The first entered man is B-group. 2. At the period of 19C, the family was enlarged by the descendants. But at that time, the house was constructed by small type. And some tiled roof houses were built by A-group part at under area of the village. And the construction of village boundary was nearly completed. 3. At the early period of 20C, the great houses were constructed by C-group part at the upper area of the village. 4. At the late period of 20C, there were not changed largely. But small change was occurred by the divided of site. Except two house, every houses were changed to tiled roof house. The residents have continued the strong preservation mind of environment for 300 years. The family genealogy was very useful to analyze the formational process of traditional house in the clan society village.

Studies on Proximate Composition, Fatty Acids and Volatile Compounds of Zanthoxylum schinifolium Fruit According to Harvesting Time (산초열매의 채집 시기별 일반성분, 지방산 및 정유성분 조성 변화)

  • Bae, Sung-Mun;Jin, Young-Min;Jeong, Eun-Ho;Kim, Man-Bae;Shin, Hyun-Yul;Ro, Chi-Woong;Lee, Seung-Cheol
    • Korean Journal of Medicinal Crop Science
    • /
    • v.19 no.1
    • /
    • pp.1-8
    • /
    • 2011
  • Biological characteristics of 5 Zanthoxylum schinifolium (Zs) fruits such as Z1 (early August), Z2 (middle August), Z3 (middle September), Z4 (early October) and Z5 (middle October) according to harvesting time were evaluated. As fruits ripened, average weight of Zs increased from 4.8mg (Z1) to 50.7mg (Z5), while moisture contents decreased from 74.6% (Z1) to 55.2% (Z5). Crude fat contents of the fruits during ripening increased from 1% (Z1) to 10.6% (Z5). The major fatty acids in Zs were palmitic (C16:0), palmitoleic (C16:1), oleic (C18:1), and linoleic (C18:2) acids. Linoleic acid (C18:2) was a main fatty acid in Z1 and Z2, whereas oleic acid (C18:1) was found as a main one in the other Zs. The ratio of unsaturated fatty acid to total fatty acids increased from 60% (Z1) to 80% (Z3~Z5) during ripening. Among ripening stages, Z4 had the highest contents of total fatty acids ($3,355{\mu}g/g$) and total unsaturated fatty acids ($2,753{\mu}g/g$). Forty six volatile compounds in Zs were also identified. The major volatile compounds were ${\alpha}-pinene$, ${\beta}-myrcene$, ${\beta}-ocimene$, 2-nonanone, estragole, 2-undecanone, and ${\beta}-caryophyllene$. Major volatile components of Z1 were ${\beta}-ocimene$ (20.8 peak area %) and ${\alpha}-pinene$ (9.7 peak area %). In Z2, estragole (30.1 peak area %) was a main volatile compound, but the contents of ${\alpha}-pinene$ (0.4 peak area %), ${\beta}-myrcene$ (0.3 peak area %), and ${\beta}-ocimene$ (0.6 peak area %) were lower than those in Z1. Especially, estragole used as perfumes and as a food additive for flavor was drastically increased to 91.2 (Z3) and 92% (Z4) as fruits ripened.

Specimen Thickness and Crack Depth Effects on J Testing and Crack Tip Constraint for Non-standard Specimen (시편두께 및 균열깊이 영향을 고려한 비표준시편의 J 시험법 및 구속효과의 정량화)

  • Kim, Jin-Su;Cho, Soo-Man;Kim, Yun-Jae;Kim, Young-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.9
    • /
    • pp.1531-1538
    • /
    • 2003
  • This paper compiles solutions of plastic $\eta$ factors and crack tip stress triaxialites for standard and nonstandard fracture toughness testing specimens, via detailed three-dimensional (3-D) finite element (FE) analyses. Fracture toughness testing specimens include a middle cracked tension (M(T)) specimen, SE(B), single-edge cracked bar in tension (SE(T)) and C(T) specimen. The ligament-to-thickness ratio of the specimen is systematically varied. It is found that the use of the CMOD overall provides more robust experimental J estimation than that of the LLD, for all cases considered in the present work. Moreover, the J estimation based on the load-CMOD record is shown to be insensitive to the specimen thickness, and thus can be used for testing specimen with any thickness. The effects of in-plane and out-of-plane constraint on the crack tip stress triaxiality are also quantified, so that when experimental J value is estimated according to the procedure recommended in this paper, the corresponding crack tip stress triaxiality can be estimated. Moreover, it is found that the out-of-plane constraint effect is related to the in-plane constraint effect.

Analysis of factors affecting vegetation cover for stabilization of granite weathered soil forest road cut slopes

  • Seong-Man Kim;Sung-Min Choi;Ye Jun Choe;Yun-Jin Shim;Joon-Woo Lee
    • Korean Journal of Agricultural Science
    • /
    • v.49 no.4
    • /
    • pp.809-819
    • /
    • 2022
  • This study was conducted to improve the stability of cut slopes of forest roads in granitic weathered soil areas. The study area is a national forest road (road length 28.48 km) in Pyeongchang-gun, Gangwon-do. After data collection, a statistical analysis was performed using IBM SPSS (Ver. 26.0). First, the correlation analysis showed that structure, slope position, soil erosion, slope, and aspect (N, S) were correlated with vegetation coverage (p < 0.05). Elapsed years, slope distance, and aspect (E, W) were found to have no correlation with vegetation coverage. (p > 0.05) Second, one-way ANOVA and Kruskal-Wallis test results showed that vegetation coverage was worse when the slope was located at the top or the middle of the slope than at the bottom of the slope. In addition, the site with sheathing and gabions showed good vegetation coverage when compared with the site without structures. In the case of soil erosion, areas with severe damage and moderate damage showed worse vegetation coverage. Therefore, it is necessary to strengthen the slope angle of the cut soil of the granitic weathered soil area from 1 : 0.5 - 1.2 to 1 : 0.8 - 1.5. In addition, structures such as sheathing and gabions should be installed on granitic weathered land.

The Intelligent Blockchain for the Protection of Smart Automobile Hacking

  • Kim, Seong-Kyu;Jang, Eun-Sill
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

A Case Report of Large Schwannoma Arising in Sciatic Nerve (좌골신경에서 발생한 거대 신경초종의 치험례)

  • Park, Ji Hun;Yang, Ho Jik;Kim, Jong Hwan;Jeong, Tae Kwang;Lee, Hye Kyung
    • Archives of Plastic Surgery
    • /
    • v.36 no.6
    • /
    • pp.799-802
    • /
    • 2009
  • Purpose: Schwannoma is one of common neoplasm in the central and peripheral nervous systems. However, schwannoma of sciatic nerve is rare, especially large schwannoma arising in sciatic nerve is extremely rare. This is a report of our experience with large schwannoma arising in sciatic nerve with minimal neurologic symptoms. Methods: A 65 - year - old man presented with palpable mass in middle portion of posterior thigh. No definitive neurologic deficits were detected on physical examinations. CT and sonography showed well - defined mass with large dimension. The mass was excised and confirmed histologically as a schwannoma. In postoperative period, NCS and EMG were followed. Results: The patient complained of difficulty in dorsiflexion of ipsilateral ankle joint postoperatively. NCS and EMG obtained immediately and showed sciatic neuropathy. After 2 months postoperatively, NCS and EMG were followed and abnormal findings of previous NCS and EMG were not found. Dorsiflexion of ankle joint was improved to normal range of motion. Conclusion: We report a rare case of large schwannoma arising in sciatic nerve with no definitive neurologic symptoms.

Fine Needle Aspiration Cytology of Salivary Duct Carcinoma with Calcification in Submandibular Gland - A Case Report - (악하선의 석회화를 동반한 타액선 관암종의 세침흡인 세포학적 소견 - 1예 보고 -)

  • Yun, Ki-Jung;Han, Weon-Cheol;Jo, Hyang-Jeong;Lee, Kwang-Man
    • The Korean Journal of Cytopathology
    • /
    • v.12 no.1
    • /
    • pp.49-52
    • /
    • 2001
  • Salivary duct carcinoma is an uncommon aggressive malignant epithelial neoplasm with similarity to intraductal carcinoma of the breast. This neoplasm occurs most often in the parotid gland of middle-aged and older males. About 7% of reported tumors occured in the submandibular gland. The report of salivary duct carcinoma with calcification is rare. We report a case of salivary duct carcinoma with calcification in the submandibular gland. The patient was a 73-year-old male with a mass of the right submandibular gland for 1 year. On the fine needle aspiration cytology, the aspirate showed scant cellularity, small clusters of tumor cells, and scattered small calcifications. Nuclei of the tumor cells showed mild pleomorphism and round to oval in shape, and cytoplasm was abundant and finely granular. Nucleoli were indistinct and necrosis was not noted. There were no cribriform or papillary arrangements of tumor cells. Cytologlc findings of salivary duct carcinoma are variable depending on histologic findings, and calcifications could be an additional cytologic findings.

  • PDF

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

A Study on the Private Key Backup and Restoration using Biometric Information in Blockchain Environment

  • Seungjin, Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.59-65
    • /
    • 2023
  • As research on blockchain applications in various fields is actively increasing, management of private keys that prove users of blockchain has become important. If you lose your private key, you lose all your data. In order to solve this problem, previously, blockchain wallets, private key recovery using partial information, and private key recovery through distributed storage have been proposed. In this paper, we propose a safe private key backup and recovery method using Shamir's Secrete Sharing (SSS) scheme and biometric information, and evaluate its safety. In this paper, we propose a safe private key backup and recovery method using Shamir's Secrete Sharing (SSS) scheme and biometric information, and evaluate its safety against robustness during message exchange, replay attack, man-in-the-middle attack and forgery and tampering attack.