• Title/Summary/Keyword: Signature-based

Search Result 1,035, Processing Time 0.024 seconds

EFFECT OF A MOUTHGUARD ON STRESS DISTRIBUTION IN TEETH, MAXILLA AND MANDIBLE FOR MAXILLA AND MANDIBULAR IMPACT USING FINITE ELEMENT ANALYSIS (악안면부 충격시 치아와 악골의 응력 분포에 대한 구강보호장치의 역할에 관한 유한요소분석 - 상악 중절치에 가해진 충격에 대하여)

  • Park, Ji-Hye;Lee, Sung-Bok;Kwon, Kung-Rock;Choi, Dae-Gyun
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.44 no.5
    • /
    • pp.537-548
    • /
    • 2006
  • Statement of problem : The use of mouthguard is important as the leisure life is popular today. Purpose: The purpose of this study is to investigate the effect of a mouthguard on stress distribution in teeth, maxilla and mandible for maxilla impact. Material and methods: The 3-dimensional finite element model was based on a CT scan film of an average korean adult when the subject is using a customized mouthguard which was made with the Signature Mouthguard system of Dreve. The load was applied to the upper central incisor cervical area parellel impact force for 0.1sec(L1). The Von-mises stress analysis with a mouthguard and without a mouthguard was compared. Results: The results of this study were as follows: 1. Without the mouthguard, stress was concentrated on teeth and alveolar bone in all load conditions. 2. With the mouthguard. maximum stress value was decreased and stress was dispersed in all load conditions. 3. Stress extinction with the mouthguard was faster than without the mouthguard in all load conditions. Conclusion: We acknowledged that the mouthguard has a stress buffer effect as the maximum stress value was decreased and stress was dispersed when impact force was applied.

Damage Monitoring for Wind Turbine Blade using Impedance Technique (임피던스 기법을 이용한 풍력 블레이드 손상 모니터링)

  • Huh, Yong-Hak;Kim, Jongil;Hong, Seonggu
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.33 no.5
    • /
    • pp.452-458
    • /
    • 2013
  • Impedance based monitoring technique was investigated to evaluate the damage occurring in wind turbine blade. In this study, PVDF film piezo sensors were patched on the 10 kW wind turbine blade, and impedance was measured over the frequency range of 1~200 MHz under fatigue loading. With applying fatigue loads on the blade, change in maximum deflection of the blade and local strain values could be obtained from the strain gages attached on the blade, and difference of the impedance signatures was also observed. From these data, it could be found that local damage or geometrical change in the blade structure happened. To quantitatively compare the impedance signature patterns, a statistical algorithm, scalar damage metric M was used. It was calculated from the impedance signatures considering fatigue loads and location of the sensors. The metric values were compared to correlate the metrics with damage in the blade.

Technique for Malicious Code Detection using Stacked Convolution AutoEncoder (적층 콘볼루션 오토엔코더를 활용한 악성코드 탐지 기법)

  • Choi, Hyun-Woong;Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.39-44
    • /
    • 2020
  • Malicious codes cause damage to equipments while avoiding detection programs(vaccines). The reason why it is difficult to detect such these new malwares using the existing vaccines is that they use "signature-based" detection techniques. these techniques effectively detect already known malicious codes, however, they have problems about detecting new malicious codes. Therefore, most of vaccines have recognized these drawbacks and additionally make use of "heuristic" techniques. This paper proposes a technology to detecting unknown malicious code using deep learning. In addition, detecting malware skill using Supervisor Learning approach has a clear limitation. This is because, there are countless files that can be run on the devices. Thus, this paper utilizes Stacked Convolution AutoEncoder(SCAE) known as Semi-Supervisor Learning. To be specific, byte information of file was extracted, imaging was carried out, and these images were learned to model. Finally, Accuracy of 98.84% was achieved as a result of inferring unlearned malicious and non-malicious codes to the model.

Automatic malware variant generation framework using Disassembly and Code Modification

  • Lee, Jong-Lark;Won, Il-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.131-138
    • /
    • 2020
  • Malware is generally recognized as a computer program that penetrates another computer system and causes malicious behavior intended by the developer. In cyberspace, it is also used as a cyber weapon to attack adversary. The most important factor that a malware must have as a cyber weapon is that it must achieve its intended purpose before being detected by the other's detection system. It requires a lot of time and expertise to create a single malware to avoid the other's detection system. We propose the framework that automatically generates variant malware when a binary code type malware is input using the DCM technique. In this framework, the sample malware was automatically converted into variant malware, and it was confirmed that this variant malware was not detected in the signature-based malware detection system.

RNSXI(real-name shooting X-ray of inspector) Settlement Realization applying PACS Database, In Digital Medical environment (PACS Database를 활용한 촬영실명제 정착화 실현)

  • Kang, Ji-Youn;Lee, Lae-Gon;Kang, Doo-Hee;Lee, Hwa-Sun;Hwang, Sun-Gwang
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.9 no.2
    • /
    • pp.5-9
    • /
    • 2007
  • As developing the medical treatment image portion with the change of these times, PACS, which is able to digitalize image portion data, has a lot of data-based image data. Applying this PACS, we would like to settle down RNSXI(real-name shooting X -ray of inspector) system. We interviewed with P ACS's operators of university hospitals which is using PACS in Seoul about the present conditions whether using of RNSXI or not. And we inquired the RNSXI equipments, applying PACS database, and Interface conditions undertook to do in our hospital. All university hospitals in Seoul are set up the P ACS system. But no hospital use the RNSXI. In our hospital, we can check inspector' name or initials who exposure x-ray with the PACS Viewer by looking over equipments(CR, DR, US, MG, MR, CT) and Interface of the DICOM Header data. However, some equipments like RF and Angio can not check inspector' name or initials. Under the Film/System environment, RNSXI system has been used frequently like that inspector's signature or initial added to a patient data. Though the digital medical treatment was developed, RNSXI system was declined. It is necessary to using RNSXI system in order to improving radiologists' rights, even if it is not under the application of the medical treatment image laws. If RNSXI system use, radiologists should specialize in their major and the Repeat rate should be reduced. In environment of PACS, RNSXI system can be used by linking both the equipments and the Interface with a production enterprise of P ACS. Therefore RNSXI system applying the P ACS datebase should settle down in our medical system for being provided lots of data.

  • PDF

Population Genetic Structure and Evidence of Demographic Expansion of the Ayu (Plecoglossus altivelis) in East Asia

  • Kwan, Ye-Seul;Song, Hye-Kyung;Lee, Hyun-Jung;Lee, Wan-Ok;Won, Yong-Jin
    • Animal Systematics, Evolution and Diversity
    • /
    • v.28 no.4
    • /
    • pp.279-290
    • /
    • 2012
  • Plecoglossus altivelis (ayu) is an amphidromous fish widely distributed in Northeastern Asia from the East China Sea to the northern Japanese coastal waters, encompassing the Korean Peninsula within its range. The shore lines of northeastern region in Asia have severely fluctuated following glaciations in the Quaternary. In the present study, we investigate the population genetic structure and historical demographic change of P. altivelis at a population level in East Asia. Analysis of molecular variance (AMOVA) based on 244 mitochondrial control region DNA sequences clearly showed that as the sampling scope extended to a larger geographic area, genetic differentiation began to become significant, particularly among Northeastern populations. A series of hierarchical AMOVA could detect the genetic relationship of three closely located islands between Korea and Japan that might have been tightly connected by the regional Tsushima current. Neutrality and mismatch distribution analyses revealed a strong signature of a recent population expansion of P. altivelis in East Asia, estimated at 126 to 391 thousand years ago during the late Pleistocene. Therefore it suggests that the present population of P. altivelis traces back to its approximate demographic change long before the last glacial maximum. This contrasts our a priori expectation that the most recent glacial event might have the most crucial effect on the present day demography of marine organisms through bottleneck and subsequent increase of effective population size in this region.

Identifying Differentially Expressed Genes and Small Molecule Drugs for Prostate Cancer by a Bioinformatics Strategy

  • Li, Jian;Xu, Ya-Hong;Lu, Yi;Ma, Xiao-Ping;Chen, Ping;Luo, Shun-Wen;Jia, Zhi-Gang;Liu, Yang;Guo, Yu
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.9
    • /
    • pp.5281-5286
    • /
    • 2013
  • Purpose: Prostate cancer caused by the abnormal disorderly growth of prostatic acinar cells is the most prevalent cancer of men in western countries. We aimed to screen out differentially expressed genes (DEGs) and explore small molecule drugs for prostate cancer. Materials and Methods: The GSE3824 gene expression profile of prostate cancer was downloaded from Gene Expression Omnibus database which including 21 normal samples and 18 prostate cancer cells. The DEGs were identified by Limma package in R language and gene ontology and pathway enrichment analyses were performed. In addition, potential regulatory microRNAs and the target sites of the transcription factors were screened out based on the molecular signature database. In addition, the DEGs were mapped to the connectivity map database to identify potential small molecule drugs. Results: A total of 6,588 genes were filtered as DEGs between normal and prostate cancer samples. Examples such as ITGB6, ITGB3, ITGAV and ITGA2 may induce prostate cancer through actions on the focal adhesion pathway. Furthermore, the transcription factor, SP1, and its target genes ARHGAP26 and USF1 were identified. The most significant microRNA, MIR-506, was screened and found to regulate genes including ITGB1 and ITGB3. Additionally, small molecules MS-275, 8-azaguanine and pyrvinium were discovered to have the potential to repair the disordered metabolic pathways, abd furthermore to remedy prostate cancer. Conclusions: The results of our analysis bear on the mechanism of prostate cancer and allow screening for small molecular drugs for this cancer. The findings have the potential for future use in the clinic for treatment of prostate cancer.

A Method to Resolve TCP Packet Out-of-order and Retransmission Problem at the Traffic Collection Point (트래픽 수집지점에서 발생하는 TCP패킷중복 및 역전문제 해결 방법)

  • Lee, Su-Kang;An, Hyun-Min;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.350-359
    • /
    • 2014
  • With the rapid growth of Internet, the importance of application traffic analysis is increasing for efficient network management. The statistical information in traffic flows can be efficiently utilized for application traffic identification. However, the packet out-of-order and retransmission occurred at the traffic collection point reduces the performance of the statistics-based traffic analysis. In this paper, we propose a novel method to detect and resolve the packet out-of-order and retransmission problem in order to improve completeness and accuracy of the traffic identification. To prove the feasibility of the proposed method, we applied our method to a real traffic analysis system using statistical flow information, and compared the performance of the system with the selected 9 popular applications. The experiment showed maximum 4% of completeness growth in traffic bytes, which shows that the proposed method contributes to the analysis of heavy flow.

Study for Guideline of CD copy Issue to Secure Personal Information (개인정보 보호를 위한 의료영상 복사발급 지침에 대한 고찰)

  • Lee, Jong-Woong;Kang, Ji-Yeon;Kim, Eun-Jeong
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.2
    • /
    • pp.11-16
    • /
    • 2008
  • Images of medical treatment on PACS environment are digitized and they make saving and transmission of patient's information easy with CD format causing increase of patients transfer rate between hospital and data transmission as well. Figuring out the configuration of confining status of copied images of medical treatment with CD format and present the appropriate way of identification for personal information. 20 general hospital over 500 beds which are utilizing PACS currently. Questionnaire investigation focusing on PACS operation center and it's management people. In accordance with the law of securing personal information of public organizations, it says "Anyone who wants to see his or her information via representative he or she needs to make a letter of attorney and turn in this to the president of it's possessing facility" in the article 16. Based on the investigation of general hospital for CD copy issue status near metropolitan area, 8 out of 20, were issuing CD copy through personal identification process(the person oneself and representative) and 10 general hospital were doing by getting signature of receiptor only without identification of the person oneself and 2 general hospital confirmation process is not at all. By the law of securing personal information of public organization, article 16, confirmation process is supposed to mandate lawfully with a letter of attorney when there is any request of reading and/or copies of one's information. But in reality, there were no consistent rules on reading, the process and coverage of copy issue, rejection coverage of copy issue of CD copy in each general hospital PACS operation center. Therefore there is a big need for consolidated format which is applicable by law when the representative requests to issue of CD copy that is storing medical treatment images. By issue through this consolidated format, securing medical information of individual and systemic operation and management will be valid and effective.

  • PDF

Market Microstructure Noise and Optimal Sampling Frequencies for the Realized Variances of Stock Prices of Four Leading Korean Companies (한국주요상장사 주가 실현변동성 추정시 시장미시구조 잡음과 최적 추출 빈도수)

  • Oh, Rosy;Shin, Dong-Wan
    • The Korean Journal of Applied Statistics
    • /
    • v.25 no.1
    • /
    • pp.15-27
    • /
    • 2012
  • We have studied the realized variance(RV) of intra-day returns and market microstructure noise based on high-frequency stock transaction data for the four largest companies in terms of market capitalization in the KOSPI. First, non-negligible biases are observed for the RV and for the bias-corrected realized variance($RV_{AC_1}$) which is constructed by adjusting RV for the first order autocorrelation in intra-day returns. Bias is more obvious for the RV and the $RV_{AC_1}$ when intra-day returns are sampled more frequently than every 2 minutes. Transaction Time Sampling(TTS) is shown to be better than Calendar Time Sampling(CTS) in terms of biases of the RV and the $RV_{AC_1}$ for the 4 companies. The analysis reveals that market microstructure noise is temporally dependent. Second, by using the Noise-to-Signal Ratio(NSR), we estimate sampling frequencies that are optimal in terms of the Mean Square Errors(MSE) of the RV and the $RV_{AC_1}$. The optimal sampling frequencies are around 200 for RV and is around 5000 for the $RV_{AC_1}$ for all the four stock prices. For the 6 hour transaction period of the Korean stock trading, these correspond to about 2 minutes and 6 seconds.