• Title/Summary/Keyword: Service block

Search Result 440, Processing Time 0.029 seconds

Acupuncture for Facet Joint Syndrome: A Review of Clinical Study (후관절 증후군의 침 치료에 대한 문헌 연구 보고)

  • Ji-Hyang Gu
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.33 no.1
    • /
    • pp.13-29
    • /
    • 2023
  • Objectives To evaluate the evidence supporting the effectiveness of acupuncture for facet joint syndrome. Methods We conducted search across 9 electronic databases (PubMed, EMBASE, Cochrane CENTRAL (CENTRAL), KoreaMed, Kmbase, Koreanstudies Information Service System (KISS), ScienceOn, China National Knowledge Infrastructure (CNKI), and Wanfang) to find clinical trials that used acupuncture as treatment for facet joint syndrome. The methodological quality of randomized controlled clinical trials (RCTs) were assessed using the Cochrane Risk of Bias (RoB) tool, while non-randomized controlled clinical trials (nRCTs) were assessed using the Cochrane Risk of Bias Assessment tool for Non-randomized Study (RoBANS) tool. Results Nine RCTs and one nRCT met our inclusion criteria. Fire needle was more effective than medial branch block in terms of visual analogue scale (VAS) after 1 month (p=0.02). Also, Fire needle was more effective than Ibuprofen in terms of VAS and oswestry disability index (ODI) (p<0.05). However, in the rest of the study results, the intervention group did not show a statistically significant difference than the control group. Conclusions Although our review found encouraging but limited evidence of acupuncture for facet joint syndrome, most of the studies included in the analysis were evaluated as methodologically high risk of bias. From now on further well-designed RCTs should be encouraged.

BandBlock: Bandwidth allocation in blockchain-empowered UAV-based heterogeneous networks

  • Kuna Venkateswarararao;Pratik Kumar;Akash Solanki;Pravati Swain
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.945-954
    • /
    • 2022
  • The 5G mobile network is promising to handle the dynamic traffic demands of user equipment (UE). Unmanned aerial vehicles (UAVs) equipped with wireless transceivers can act as flying base stations in heterogeneous networks to ensure the quality of service of UE. However, it is challenging to efficiently allocate limited bandwidth to UE due to dynamic traffic demands and low network coverage. In this study, a blockchain-enabled bandwidth allocation framework is proposed for secure bandwidth trading. Furthermore, the proposed framework is based on the Cournot oligopoly game theoretical model to provide the optimal solution; that is, bandwidth is allocated to different UE based on the available bandwidth at UAV-assisted-based stations (UBSs) with optimal profit. The Cournot oligopoly game is performed between UBSs and cellular base stations (CBSs). Utility functions for both UBSs and CBSs are introduced on the basis of the available bandwidth, total demand of CSBs, and cost of providing cellular services. The proposed framework prevents security attacks and maximizes the utility functions of UBSs and CBSs.

Component, Formulation and Regulatory of Sunscreen Materials: A Brief Review

  • Firi Oktavia Hariani;Mohammad Adam Jerusalem;Iqmal Tahir;Maisari Utami;Won-Chun Oh;Karna Wijaya
    • Korean Journal of Materials Research
    • /
    • v.33 no.3
    • /
    • pp.87-94
    • /
    • 2023
  • Exposure to ultraviolet (UV) light is often associated with skin damage, sometimes very serious, and in recent times has received particular attention as a health risk. As a result, the proper use of sunscreen has long been recommended to protect against skin damage. The continued increase in the use of sunscreen may be linked to increased information about the risk of melanoma and non-melanoma skin cancer caused by prolonged exposure to ultraviolet rays. Natural and harmless materials that block and prevent UV light have emerged as essential household items in the field of skin beauty. New materials need to be considered and evaluated in relation to ultraviolet rays and their harmful effects. This study aims to explain the effect of UV exposure on human skin, the classification of sunscreens, the application of zeolite, nano clay, and LDH in sunscreen formulations, as well as the regulation of this service in various countries around the world.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

Response to Security Threats through Importance Analysis of NFT Service Provider Security Level Check Items (NFT 서비스 제공자 보안 수준 점검 항목 중요도 분석을 통한 보안 위협 대응)

  • Dong Sung Im
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.126-135
    • /
    • 2023
  • Demand for NFT is expanding along with Blockchain. And cyber security threats are also increasing. Therefore, this study derives security level inspection items by analyzing status related to NFT security such as NFT features, security threats, and compliance for the purpose of strengthening NFT security. Based on this, the relative importance was confirmed by applying it to the AHP model. As a result of the empirical analysis, the priority order of importance was found in the order of Security management system establishment and operation, encryption, and risk management, etc. The significance of this study is to reduce NFT security incidents and improve the NFT security management level of related companies by deriving NFT-related security level check items and demonstrating the research model. And If you perform considering relative importance of the NFT check items, the security level can be identified early.

  • PDF

Efficient Transmission of Scalable Video Streams Using Dual-Channel Structure (듀얼 채널 구조를 이용한 Scalable 비디오(SVC)의 전송 성능 향상)

  • Yoo, Homin;Lee, Jaemyoun;Park, Juyoung;Han, Sanghwa;Kang, Kyungtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.9
    • /
    • pp.381-392
    • /
    • 2013
  • During the last decade, the multitude of advances attained in terminal computers, along with the introduction of mobile hand-held devices, and the deployment of high speed networks have led to a recent surge of interest in Quality of Service (QoS) for video applications. The main difficulty is that mobile devices experience disparate channel conditions, which results in different rates and patterns of packet loss. One way of making more efficient use of network resources in video services over wireless channels with heterogeneous characteristics to heterogeneous types of mobile device is to use a scalable video coding (SVC). An SVC divides a video stream into a base layer and a single or multiple enhancement layers. We have to ensure that the base layer of the video stream is successfully received and decoded by the subscribers, because it provides the basis for the subsequent decoding of the enhancement layer(s). At the same time, a system should be designed so that the enhancement layer(s) can be successfully decoded by as many users as possible, so that the average QoS is as high as possible. To accommodate these characteristics, we propose an efficient transmission scheme which incorporates SVC-aware dual-channel repetition to improve the perceived quality of services. We repeat the base-layer data over two channels, with different characteristics, to exploit transmission diversity. On the other hand, those channels are utilized to increase the data rate of enhancement layer data. This arrangement reduces service disruption under poor channel conditions by protecting the data that is more important to video decoding. Simulations show that our scheme safeguards the important packets and improves perceived video quality at a mobile device.

Cloud Messaging Service for Preventing Smishing Attack (스미싱 공격 방지를 위한 클라우드 메시징 서비스)

  • Park, Hyo-Min;Kim, Wan-Seok;Kang, So-Jeong;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.285-293
    • /
    • 2017
  • They are rapidly evolving malicious attacks on smart devices, and to timely protect the smart devices from these attacks has become a very important issue. In particular, smishing attack has emerged as one of the most important threats on the smartphone. In this paper, we propose the cloud service that can fundamentally protect the user from the risk of smishing attack. The proposed scheme provides cloud messaging service that can filter text messages including URLs in the user's smart device, view and manage them through a virtual machine provided by a cloud server. The existing techniques for preventing smshing attacks protect only malicious code of a known pattern and there is the possibility of error such as FP(False Positive) or FN(False Negative). However, since the proposed method automatically filters all text messages including URLs, storing, viewing, and managing them in their own storage space on the cloud server, it can completely block the installation of malwares(malicious codes) on the user's smart device through smishing attacks.

Effect of Slow-Release Fertilizer on Yield and Quality of Third-Harvest Tea Leaves (세물차의 수량 및 품질에 미치는 완효성비료 시비효과)

  • Park, Jang-Hyun;Choi, Hyeong-Kuk;Kim, Jong-Keun;Kim, Kil-Yong
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.38 no.5
    • /
    • pp.269-273
    • /
    • 2005
  • A field experiment was conducted to evaluate the effect of slow-release fertilizer on the yield and quality of the third-harvest tea leaves. The yield of the third harvested tea leaves was decreased to 5.8-14.4% in slow-release fertilizer block, except to the N $50kg\;10a^{-1}$ ($316kg\;10a^{-1}$), compared to traditional urea treatment ($313kg\;10a^{-1}$). Nitrogen uptake and nitrogen uptake efficiency of slow-release fertilizer was reduced as nitrogen application level increased. The contents of chemical components related to the tea quality such as total-nitrogen, total amino acid, chlorophyll and theanine were somewhat lower in the slow-release fertilizer treatments, except to the treatment of N $50kg\;10a^{-1}$, than those in the traditional urea application, but those of tannin, caffeine and vitamin C were not different among the treatments. In scoring test, apparence and quality of green tea of the slow-release fertility treatments were not different, except to the N $40kg\;10a^{-1}$ treatment, compared to those in the treatment of urea. In conclusion, slow-release fertilizer and conventional urea treatments showed not different in both yield and quality of green tea.

Respond System for Low-Level DDoS Attack (저대역 DDoS 공격 대응 시스템)

  • Lee, Hyung-Su;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.732-742
    • /
    • 2016
  • This study suggests methods of defense against low-level high-bandwidth DDoS attacks by adding a solution with a time limit factor (TLF) to an existing high-bandwidth DDoS defense system. Low-level DDoS attacks cause faults to the service requests of normal users by acting as a normal service connection and continuously positioning the connected session. Considering this, the proposed method makes it possible for users to show a down-related session by considering it as a low-level DDoS attack if the abnormal flow is detected after checking the amount of traffic. However, the service might be blocked when misjudging a low-level DDoS attack in the case of a communication fault resulting from a network fault, even with a normal connection status. Thus, we made it possible to reaccess the related information through a certain period of blocking instead of a drop through blacklist. In a test of the system, it was unable to block the session because it recognized sessions that are simply connected with a low-level DDoS attack as a normal communication.

Prediction of Speed by Rain Intensity using Road Weather Information System and Vehicle Detection System data (도로기상정보시스템(RWIS)과 차량검지기(VDS) 자료를 이용한 강우수준별 통행속도예측)

  • Jeong, Eunbi;Oh, Cheol;Hong, Sungmin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.4
    • /
    • pp.44-55
    • /
    • 2013
  • Intelligent transportation systems allow us to have valuable opportunities for collecting reliable wide-area coverage traffic and weather data. Significant efforts have been made in many countries to apply these data. This study identifies the critical points for classifying rain intensity by analyzing the relationship between rainfall and the amount of speed reduction. Then, traffic prediction performance by rain intensity level is evaluated using relative errors. The results show that critical points are 0.4mm/5min and 0.8mm/5min for classifying rain intensity (slight, moderate, and heavy rain). The best prediction performance is observable when previous five-block speed data is used as inputs under normal weather conditions. On the other hand, previous two or three-block speed data is used as inputs under rainy weather conditions. The outcomes of this study support the development of more reliable traffic information for providing advanced traffic information service.