• Title/Summary/Keyword: Steal

Search Result 138, Processing Time 0.022 seconds

Analysis of Handball Strategies of World Top Class Team to Prepare Tokyo2021 Olympic games (2021년도 도쿄올림픽 대비 세계 상위권 여자핸드볼 전력분석)

  • Kang, Yong-Gu;Kim, Hyun-Tea;Kwak, Han-Pyong
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.359-365
    • /
    • 2020
  • The purpose of this study was to collect and analyze information on the major scoring paths, success rate by shooting type, assist, steal, block, and goalkeeper defense rate by shooting type in the 2019 World Women's Handball Championship. Based on the research results, the following conclusions were drawn. First, as a result of the analysis of the scoring route, 1st the Netherlands and 2nd Spain had 6m shots and 7m shots the most. Second, in the success rate analysis results by shooting type, the top 6 teams showed 7m shot, breakthrough shot, and fast shot. Third, according to the result of assist frequency analysis, the fourth place in the competition Norway scored the most assists among the six teams. Fourth, as a result of the steel frequency analysis, Norway scored the most with 5.2 on average among the six teams. Fifth, as a result of analyzing the goalkeeper defense rate by shooting type, it was found that all 6 team's goalkeepers had the highest defense against 9m shooting. Therefore, for an in-depth analysis of the game strategy, it is considered that it is necessary to understand the characteristics of individual player's performance and collect information will be followed by a follow up research in the future.

The Effect of Left Subclavian Artery Coverage During Endovascular Repair of the Thoracic Aortic Aneurysm on Cerebral Hemodynamics: Two Cases of Flow Measurement by using 2D Phase Contrast Magnetic Resonance Imaging (흉부대동맥류의 혈관내치료 도중 좌측 쇄골하동맥 폐색이 뇌혈류역동에 미치는 효과: 2차원 위상차 대조 자기공명영상을 이용한 혈류 측정 2례 보고)

  • Baek, Seung-Hoon;Youn, Sung-Won;Kim, Ho-Kyun;Kwon, Oh-Choon;Lee, Sub;Lee, Jong-Min
    • Investigative Magnetic Resonance Imaging
    • /
    • v.16 no.2
    • /
    • pp.159-168
    • /
    • 2012
  • The proximity of thoracic aortic aneurysm to the left subclavian artery (LSA) has made the coverage of LSA during thoracic endovascular aortic repair (TEVAR) be essential. Despite controversy concerning the safety of LSA coverage and the indications for LSA revascularizations, the cerebral hemodynamic change after LSA coverage has not been demonstrated. We prospectively examined two patients who would undergo TEVAR with LSA coverage by using 2D cine phase contrast MR imaging. After LSA coverage, the left subclavian steal was properly compensated by the increased flow volumes of both carotid arteries and right vertebral artery, which is the major collateral supply. The total brain supply after TEVAR did not lessen, which showed good correlation with uneventful clinical outcome. Therefore, 2D phase contrast MR imaging can be recommended as a useful technique to evaluate the hemodynamic change of the LSA coverage during TEVAR and to triage the candidate for LSA revascularization.

Image encryption using phase-based virtual image and interferometer

  • Seo, Dong-Hoan;Shin, Chang-Mok;Kim, Jong-Yun;Bae, Jang-Keun;Kim, Jeong-Woo;Kim, Soo-Joong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.631-634
    • /
    • 2002
  • In this paper, we propose an improved optical security system using three phase-encoded images and the principle of interference. This optical system based on a Mach-Zehnder interferometer consists of one phase-encoded virtual image to be encrypted and two phase-encoded images, encrypting image and decrypting image, where every pixel in the three images has a phase value of '0' and '$\pi$'. The proposed encryption is performed by the multiplication of an encrypting image and a phase-encoded virtual image which dose not contain any information from the decrypted image. Therefore, even if the unauthorized users steal and analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original image from counterfeiting and unauthorized access.. The decryption of the original image is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping image of the encrypted image with a decrypting image. Both computer simulations and optical experiments confirmed the effectiveness of the proposed optical technique for optical security applications.

  • PDF

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

A study on the Moaning of Appropriation Inherited in the Modern Costumes (현대 복식에 내재된 Appropriation의 의미 연구)

  • 이효진
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.4
    • /
    • pp.141-163
    • /
    • 2001
  • This study was to analyse the meanings of the appropriation inherited in the modern costumes from the latter of the 20th century to the present. According to the dictionary, the meanings of a word. "appropriation" is to steal something, used in order to avoid saying this directly. The sorts of the appropriation represented in the works of Art was as follow : First. the reconstruction by the imitation of the works of a great master or partly induction of the works of a great master Second, the introduction by the history, modern art, the image of popular culture Third, the imitation by the works of photograph, etc The appropriation in the modern costumes could be distinguished as two facts : First, the appropriation of the image of popular culture, 1) the way by the induction of popular factors of the extremely routine, commonplace character 2) the way by the citation of critical sentence of society, complaint message of the situation of times. Second, the reinterpretation of the past works : 1) the way by the reinterpretation of a great artist′s works, or popular works. In accordance with its change of a standard of value of the beauty, the products of modern culture, called the artificial second image, that is, popular factor, ready made factor, a signboard, a trademark etc, was appropriated in modern costumes and was reinterpreted by the works of fashion designer′s empathy. We can say that the modern costumes is not only the products of creative, original action of fashion designers but also the mirror of times, having relationship with society.

  • PDF

A Study on the Photo-image Appropriation in Fashion Illustration (패션 일러스트레이션에서의 사진 이미지 차용에 관한 연구)

  • Kim, Soon-Ja
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.7
    • /
    • pp.1061-1073
    • /
    • 2009
  • Present expression methods have close relations with popular culture in the active acceptance of various kinds of genre. Fashion illustration is no longer limited to sketching garments or technically explaining construction, it is accepted as an art that is expressed by the desire and consciousness of the artist. This study examines the expressional characteristics and effects of photo-image appropriation as an expression method in fashion illustration. The word 'appropriation' (to steal something) is used as euphemism and not meant to be derogatory. The methods of appropriation in art indicate that paintings are not inventions but are self-satisfactory creations that show that the idea of originality is false and that paintings should be uninhibited from the greed of the authority of the genius of artists. In postmodern paintings, the photo-image of appropriation are expressed through the methods of re-photography, photo collage, and photo painting. Photo-image appropriation methods in fashion illustration are re-photography, photo collage, image mixing of photography, drawing, and graphic expression of photography. Fashion illustrators are able to develop expression techniques for expanding a field of expression and enhance the ability of communication through the photo-image appropriation methods.

Long-Term Results of Arteriovenous Fistula for Hemodialysis in Chronic Renal Failure (혈액투석을 위한 동정맥루의 장기관찰 성적)

  • 김인광
    • Journal of Chest Surgery
    • /
    • v.27 no.9
    • /
    • pp.764-769
    • /
    • 1994
  • From november, 1985 to May, 1993, 222 arteriovenous fistulae were made in 201 patients with chronic renal failure. Among them, a total of 183 arteriovenous fistulae in 173 patients were reviewed to evaluate the factors influencing patency rate of the vascular access. The results were revealed as follows: There were 102 men and 71 women,aged 10 to 76 years [mean = 45.7 years]. Sixteen patients of them had previous shunts. The procedures included establishment of 214 radiocephalic or brachioocephalic fistulae, 203 side to end, 9 side to side, 2 end to end, 2 autologous saphenous vein grafts, 6 Gore-Tex grafts. There were 28 early shunt failures[12%] due to use of 23 inadequate veins and 5 thrombosis.There were 32 late complications[14%]; 19 thrombosis, 4 aneurysm, 4 venous hypertension, 3 steal syndrome, 2 infections. There were 32 diabetic patients [17 %]. No significant differences in graft patency were noted between diabetic and nondiabetic individuals. There were no significant difference in graft patency between male and female. Overall shunt patency in 183 cases with chronic renal failure was 96% at I month, 95% at 3 months, 93% at I year, 91% at 2 years, 84% at 3 years, 56% at 5years.This Study showed that early postoperative thrombosis and diabetic vasculopathy were most causes of the vascular access failure and suggested that prevention of thrombi and well control of diabetes mellitus were most important to enhance patency rates of the vascular access.

  • PDF

Left Carotid-to-Subclavian Artery Bypass Grafting for Recurrent Angina Caused by Coronary-Subclavian Steal Syndrome

  • Kim, Min-Seok;Paeng, Jin Chul;Kim, Ki-Bong;Hwang, Ho Young
    • Journal of Chest Surgery
    • /
    • v.46 no.1
    • /
    • pp.84-87
    • /
    • 2013
  • A 60-year-old man visited the outpatient clinic due to one month of recurrent exertional chest pain. Eleven years earlier he had undergone off-pump coronary artery bypass grafting using bilateral internal thoracic artery (ITA) Y-composite grafts based on the left ITA. Preoperative coronary angiography showed patent distal graft anastomoses and visualized the left ITA retrogradely. The arch aortography revealed near-total occlusion of the left subclavian artery at the level of the ostium. The patient underwent left carotid-to-subclavian artery bypass grafting using a 6 mm vascular conduit. Postoperative computed tomographic angiography revealed a patent bypass conduit between the left common carotid artery and left subclavian artery. The patient was discharged on postoperative day 4 with no symptoms or signs of myocardial ischemia.

Protective Mechanism for Sensitive Data using Lightweight Process Tracking (경량화 프로세스 추적을 통한 중요 데이터 유출 방지)

  • Kang, Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.33-39
    • /
    • 2009
  • As the usage of computers and mobile handsets is popularized, the processing and storing of private and business data are increased. Hence we note that these sensitive data should never be transferred out of these personal devices without user's permission. In this paper, we propose a simple method to prevent transferring the sensitive data out of personal computing devices through their networking interfaces. The proposed method determines which processes invoke open system call related to the sensitive data, and then traces them within a specific duration. The proposed scheme has advantage over the existing ones using authentication or encryption because it could be still working well independent upon the new attack technologies or the latest vulnerabilities of hardware and software. In order to verify the proposed algorithm, we test it by implementing the necessary codes at the user and kernel spaces of Linux.

Coronary-Bronchial Artery Fistula Manifested by Hemoptysis and Myocardial Ischemia in a Patient with Bronchiectasis

  • Lee, Woo-Surng;Lee, Song-Am;Chee, Hyun-Keun;Hwang, Jae-Joon;Park, Jae-Bum;Lee, Jung-Hwa
    • Journal of Chest Surgery
    • /
    • v.45 no.1
    • /
    • pp.49-52
    • /
    • 2012
  • A coronary-bronchial artery fistula is a very rare congenital anomaly of the coronary artery whose etiology and pathogenesis have not yet been clarified. Most patients with coronary-bronchial fistulas are asymptomatic; however, some patients present with congestive heart failure, infective endocarditis, myocardial ischemia induced by a coronary steal phenomenon, or rupture of an aneurysmal fistula. Furthermore, patients with a coronary-bronchial artery fistula rarely manifest life-threatening hemoptysis due to the associated bronchiectasis. We report herein the case of a patient with a coronary-bronchial artery fistula who had bronchiectasis and a history of massive hemoptysis and myocardial ischemia.