• Title/Summary/Keyword: The disable

Search Result 118, Processing Time 0.027 seconds

Design of the Personalized User Authentication Systems (개인 맞춤형 사용자 인증 시스템 설계)

  • Kim, Seong-Ryeol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.143-148
    • /
    • 2018
  • In this paper, we propose a personalized user authentication system (PUAS) that can be used in multiple stages in user authentication by customizing the password keyword to be used in user authentication. The proposal concept is that the user oneself defines the password keyword to be used in user authentication so as to cope with a passive retransmission attack which reuses the password obtained when the server system is accessed in user authentication. The authentication phase is also designed so that it can be expanded in multiple stages in a single step. Also, it is designed to store user-defined password related information in an arbitrary encrypted place in the system, thereby designing to disable the illegal access of the network. Therefore, even if an intruder accesses the system using the proposed system, it is possible to generate personal authentication information by generating a password keyword through unique personal information possessed only by an individual and not know the place where the generated authentication information is stored, It has a strong security characteristic.

Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks

  • Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.341-347
    • /
    • 2022
  • This research is designed to help and offer hold up to complete the requirements of aged and disable in a home. The control approach and the tone approach are used to manage the house appliances. The major organize system implementation in technology of wireless to offer distant contact from a phone Internet Protocol connectivity for access and calculating strategy and appliance remotely. The planned system no need a committed server PC with value of parallel systems and offers a new communication-protocol to observe and control a house environment with more than just the switch functionality. To express the possibility and efficiency of this system, devices like as lights switches, power plugs, and motion-sensors have been included with the planned home control system and supply more security manage on the control with low electrical energy activate method. The rank of switches is corresponding in all this control system whereby all user interfaces indicate the real time existing status. This system planned to manage electrical-appliances and devices in house with reasonably low cost of design, user friendly interface, easily install and provide high security. Research community generally specified that the network "Reconnaissance Attacks" in IPv6 are usually impossible due to they will take huge challenge to carry out address scanning of 264 hosts in an IPv6 subnet."It being deployed of IPv6 shows that it definitely enhances security and undermines the probability". This research of the IPv6 addressing-strategies at present utilizes and planned a new strategy and move toward to "mitigate reconnaissance attacks".

An Effective Technique for Protecting Application Data using Security Enhanced (SE) Android in Rooted Android Phones (루팅된 안드로이드 폰에서 SEAndroid를 이용한 효과적인 앱 데이터 보호 기법)

  • Jeong, Youn-sik;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.352-362
    • /
    • 2017
  • This paper analyzes security threats in Security Enhanced (SE) Android and proposes a new technique to efficiently protect application data including private information on rooted Android phones. On an unrooted device, application data can be accessed by the application itself according to the access control models. However, on a rooted device, a root-privileged shell can disable part or all of the access control model enforcement procedures. Therefore, a root-privileged shell can directly access sensitive data of other applications, and a malicious application can leak the data of other applications outside the device. To address this problem, the proposed technique allows only some specific processes to access to the data of other applications including private information by modifying the existing SEAndroid Linux Security Module (LSM) Hook function. Also, a new domain type of process is added to the target system to enforce stronger security rules. In addition, the proposed technique separates the directory type of a newly installed application and the directory type of previously installed applications. Experimental results show that the proposed technique can effectively protect the data of each application and incur performance overhead up to or less than 2 seconds.

A Policy Alternatives on Developing Health Care Delivery System for Disable Person in the Community (장애인 건강관리를 위한 지역사회 재활보건의료서비스 전달체계 구축 방안)

  • Ryu Hosihn;Lee Juyul
    • Journal of Korean Public Health Nursing
    • /
    • v.17 no.1
    • /
    • pp.5-16
    • /
    • 2003
  • This policy alternatives for establishment of rehabilitation health care delivery system for the disabled in the community were developed based on the data of current health status and situations of health care management for disabled persons in Korea. This research was conducted with secondary data analysis for identifying health status and current situations of managing health of disabled persons, and discussed current issues for establishing rehabilitation health care delivery systems in the community. Observing the health status and current situations of managing health of disabled persons, scope and target population of disabled person extended. so prevalence rates increased. and the severity of disability intensified and specified. The summary of issues of health management for disabled persons included; 1) absence of comprehensive and systematic policy in rehabilitation health care systems. 2) absence of consumer based rehabilitation health care facilities and delivery systems that are considered as the characteristics of disabled persons 3) fixed form of projects based on the provider and lack of variety in the programs. Hereafter. to overcome these problems. policy alternatives should 1) establish a comprehensive rehabilitation health care policy for disabled persons. 2) establish comprehensive and specific community based rehabilitation health care delivery systems that can promote preventing disability. providing medical care for disabled persons, establishing rehabilitation management for disabled persons and health care when returning to society. 3) provide training and secure manpower for rehabilitation, but the training case managers who will take the roles as an expert rehabilitation nurse mediators for multidisciplinary team work are needed immediately. and 4) include efficient connection and provision of independent services for welfare rehabilitation service and health care. Conclusively. a community based rehabilitation health care delivery system should be comprehensive policy vision of the government on rehabilitation health care delivery System rehabilitation service has to be constructed systematically under suitable facilities con consumer characteristics and rehabilitation health care policy. By doing this, consumer comprehensive community rehabilitation health care delivery system could be constructed disabled person.

  • PDF

Histological Observation of Osteochondrosis Dissecans Occurred in Mandibular Condyle (하악과두에 생긴 박리성 뼈연골증의 조직학적 관찰)

  • Choung, Pill Hoon;Kim, Soung Min;Lee, Suk Keun
    • The Korean Journal of Oral and Maxillofacial Pathology
    • /
    • v.42 no.5
    • /
    • pp.145-152
    • /
    • 2018
  • A 57 years old female complained of severe pain on the right temporomandibular joint (TMJ) area. Her right condyle had been partly resected under surgical operation 13 years ago due to condyle hypertrophy, thereafter she felt dull pain on TMJ area and recently the lesion became severely swelled and painful leading to cancer phobia. The present radiological views showed slightly enlarged and sclerosed condyle with increased radiopacity, but its articular sliding function was almost disable during mouth opening. The patient's TMJ lesion was carefully managed with conservative physiotherapy and pain treatment. The microsection of condyle head obtained from the previous operation was re-evaluated histologically, and it was finally diagnosed as osteochondrosis dissecans (OCD), exhibiting hyperplastic proliferation of cartilage in condyle head and marked vascular dilatation in epiphyseal zone. This abnormal cartilage tissue was distinguishable from normal cartilage tissue found in the peripheral cartilaginous cap of the same microsection. The involved cartilage cap showed thick hypertrophic chondrocyte zone with horizontal and vertical clefts accompanying diffuse hyaline degeneration. The superficial fibrous zone of cartilage cap was thickened and frequently peeled off, while lower hypertrophic zone of cartilage cap was highly cellular and proliferative. Consequently, the endochondral ossification became aberrant and resulted pre-mature apoptosis of many hypertrophic chondrocytes, followed by diffuse and mild inflammatory reaction in the underlying marrow tissue. Therefore, it was suggested that this hypertrophic condyle lesion, OCD, be differentiated depending on radiological and histological features from ordinary condyle hyperplasia, osteochondroma, and osteoarthritis, and that the pathological confirmation of OCD may provide a reliable modality for dental and medical treatment of chronic and painful TMJ lesion.

Screening for in vitro Cytotoxic Activity of Seaweed, Sargassum sp. Against Hep-2 and MCF-7 Cancer Cell Lines

  • Mary, J. Stella;Vinotha, P.;Pradeep, Andrew M.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.12
    • /
    • pp.6073-6076
    • /
    • 2012
  • Discovery of anticancer drugs that kill or disable tumor cells in the presence of normal cells without undue toxicity is a potential challenge for therapeutic care. Several papers in the literature have emphasized the potential implications of marine products such as seaweeds which exhibit antitumor activity. Study attempts to screen the antitumor effect of Sargassum sp, against chosen cell lines such as MCF-7 (Breast cancer) and Hep-2 (Liver Cancer). Ethanol extract of Sargassum sp. was concentrated using a Soxhlet apparatus and dissolved in DMSO. In vitro cytotoxic activity of Sargassum sp at various concentrations ($100{\mu}g/ml-300{\mu}g/ml$) screened for antitumor effect against the chosen cell lines using MTT assay (3-(4, 5-dimethylthiazol-2-yl)-2, 5-diphenyltetrazolium bromide, a yellow tetrazole). The study documented that the percentage of cell viability has been reduced with increased concentration, as evidenced by cell death. Sargassum sp extract shows potential cytotoxic activity ($P{\leq}0.05$) with $IC_{50}$ of $200{\mu}g/ml$ and $250{\mu}g/ml$ against Hep-2 and MCF-7 cell lines respectively. The ethanol fraction of Sargassum sp induced cell shrinkage, cell membrane blebbing and formation of apoptotic bodies with evidence of bioactive components as profound influencing factors for anti-tumor effects. Further research need to be explored for the successful application of Sargassum sp as a potent therapeutic tool against cancer.

The Difference of Characters between Housing Poverty Types - Subcriterion Criteria of Substandard Housing, Unaffordable Housing and Double Housing Poverty (유형별 주거빈곤가구의 차이 - 최저주거기준 하위기준미달, 주거비 과부담, 중복주거빈곤가구)

  • Lim, Se hee;Park, Kyung ha
    • 한국사회정책
    • /
    • v.24 no.4
    • /
    • pp.31-62
    • /
    • 2017
  • This study intends to identify the difference of socio-economic characters and housing welfare needs between housing poverty types and to know the independent effects of variables on the housing poverty types. It was revealed that the double housing poverty household, housing below facility standard, unaffordable housing with low income, housing below structure performance environment standard, housing below area standard and housing below room standard should be supported one by one. And the variables related with the housing poverty types are different Suggestions were made for housing welfare policy for the double housing poverty, the control for rental housing market, the policy considering income level for unaffordable housing, the housing policy for the disable household.

A Study on Real-time Data Preprocessing Technique for Small Millimeter Wave Radar (소형 밀리미터파 레이더를 위한 실시간 데이터 전처리 방법 연구)

  • Choi, Jinkyu;Shin, Youngcheol;Hong, Soonil;Park, Changhyun;Kim, Younjin;Kim, Hongrak;Kwon, Junbeom
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.79-85
    • /
    • 2019
  • Recently, small radar require the development of small millimeter wave radar with high distance resolution to disable the target's system with a single strike. Small millimeter wave radar with high distance resolution need to process large amounts of data in real time to acquire and track target. In this paper, we summarized the real-time data preprocessing method to process the large amount of data required for small millimeter wave radar. In addition, the digital IF(Intermediate Frequency) receiver, Window processing, and, DFT(Discrete Fourier Transform) functions presented by real-time data preprocessing are implemented using FPGA(Field Programmable Gate Array). Finally the implemented real-time data preprocessing module was applied to the signal processor for small millimeter wave radar and verified by performance test related to the real-time preprocessing function.

VPN technology analysis: How to protect against network attacks in a Linux environment (리눅스 서버 환경에서 네트워크 침해 대비를 위한 VPN 기술 분석)

  • Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Lee, Kwang-Yong;Jang, Rae-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.326-328
    • /
    • 2016
  • While hackers in early days intended to disable and devastate the system, these days people hack and attack the network in order to steal customer's private information from the big corporate, which changes the nature of the crime to cyber attack for money, eventually causing a lot of damages. One of the most efficient ways to protect this kind of network attack is VPN, referring to Virtual Private Network. VPN is a private networking technology that makes the public network available for only those who are concerned. This paper will suggest the VPN technology that can be applied to Linux server and related protocols and figure the applicable VPN out.

  • PDF

Effect of Lithium Bis(Oxalato)Borate Additive on Thermal Stability of Si Nanoparticle-based Anode (리튬 이차 전지용 실리콘 나노입자 음극의 고온 열안정성에 대한 Lithium bis(oxalato)borate첨가제의 효과)

  • Kim, Min-Jeong;Choi, Nam-Soon;Kim, Sung-Soo
    • Journal of the Korean Electrochemical Society
    • /
    • v.17 no.2
    • /
    • pp.79-85
    • /
    • 2014
  • Silicon (Si) has been investigated as promising negative-electrode (anode) materials because its theoretical specific capacity of 4200 mAh/g for $Li_{4.4}Si$ is far higher than that of carbonaceous anodes in current commercial products. However, in practice, the application of Si to Li-ion batteries is still quite challenging because Si suffers from severe volume expansion and contraction and lead to a continuous solid electrolyte interphase (SEI)-filming process by cracking of Si. This process consumes the limited $Li^+$ source, builds up thick and unstable SEI layer on the Si active materials, and will eventually disable the cell. Since unstable SEI reduces electrochemical performance and thermal stability of the Si anode, the surface chemistry of the anode should be modified by using a functional additive. It is found that lithium bis(oxalato)borate (LiBOB) as an additive effectively protected the Si anode surface, improved capacity retention when stored at $60^{\circ}C$, and alleviated exothermic thermal reactions of fully lithiated Si anode.