• Title/Summary/Keyword: bypassing

Search Result 155, Processing Time 0.034 seconds

A study on scalable battery architectures for hot-swap facilitation (핫 스왑 촉진을 위한 확장 가능한 배터리 아키텍처에 관한 연구)

  • Abbas, Mazhar;Cho, Inho;Kim, Jonghoon
    • Proceedings of the KIPE Conference
    • /
    • 2019.11a
    • /
    • pp.212-213
    • /
    • 2019
  • High power and energy applications of battery require a large number of batteries to be connected in series, parallel or mixed configurations. The reliability or these batteries is improved by making them tolerant to faults i.e. by bypassing the fault cells and adding new cells to compensate the voltage and current requirement. The addition or removal or cells may cause the current stress on other healthy cells. The estimation and control or this current stress is one or the technique proposed by other researchers. This study intends to identify a suitable scalable configuration which can either avoid or reduce the efforts on the estimation and control of stress current. In addition, this paper will explore the issues associated with hot-swap.

  • PDF

Development of Non-protoplast transformation System in Aspergillus oryzae

  • Lee Jae Won;Hahm Young Tae
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2000.10a
    • /
    • pp.85-91
    • /
    • 2000
  • Aspergillus oryzae is a filamentous fungus classified in the group Aspergillaceae Ascomycetes. It is an important microorganism for industrial production of enzymes and fermented food productions. It secrets large quantities of proteins or enzymes into the culture medium which makes this organism appealing for the production of heterologous proteins. Recently Electric field-mediated transformation method, electroporation, has been applied to fungal transformation. In this study, fungal transformation was carried out by bypassing the protoplast isolation step, decreasing the culturing time and non-protoplast transformation for the increment of transformation efficiency. Transformants were obtained with electroporation in optimal condition 2,500 voltage, 1,540 ohm and 0.50 capacitance. More than 1,000 transform ants were obtained with 6-10 hrs cultured mycelia without enzyme treatment, called non-protoplast transformation.

  • PDF

Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service

  • Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.353-357
    • /
    • 2011
  • U.S. Obama government is submit a motion to consider cyber attacks on State as a war. 7.7DDoS attack in Korea in 2009 and 3.4 DDoS attacks 2011, the country can be considered about cyber attacks. China hackers access a third country, bypassing South Korea IP by hacking the e-commerce sites with fake account, that incident was damaging finance. In this paper, for WiBro service, DDoS attacks, hackers, security incidents and vulnerabilities to the analysis. From hacker's attack, WiBro service's prognostic relevance by analyzing symptoms and attacks, in real time, Divide Red, Orange, Yellow, Green belonging to the risk rating. For hackers to create a blacklist, to defend against attacks in real-time air-conditioning system is the study of security. WiBro networks for incident tracking and detection after the packets through the national incident response should contribute to the development of technology.

Rapid Tooling : Challenge to Net Shape by Powder Casting (급속금형제작 (1): 분말주조에 의한 정형(正形)에의 도전)

  • 임용관;김범수;정해도;배원병
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.15 no.7
    • /
    • pp.85-90
    • /
    • 1998
  • The business of manufacturing is increasingly becoming time-compressing, precise and long-life oriented, owing to various needs from the consumers and harsh global competition. With the emergence of the layer laminate manufacturing method, it is possible to produce prototypes directly from 3D CAD and additive process, the production time and cost have shortened dramatically. However there are some problems like surface-step, dimensional deviation and warp. A newly developed powder casting is suitable for rapid-manufacturing metallic tools. Powder casting can serve as a promising rapid tooling method because of high density characteristics and low dimensional shrinkage below 0.1% during sintering and infiltration. By this process, we have realized significant time savings bypassing the wait for prototype tooling and cost savings eliminating the expense of conventional prototype tooling process.

  • PDF

An Instruction Scheduling to Compensate Simple Bypassing Topologies (간단한 바이패싱 토폴로지를 보완한 명령어 스케줄링 방법)

  • Kim, Min-Jin;Kim, Su-Ju;Kim, Suk-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.271-274
    • /
    • 2001
  • 바이패싱 회로는 명령어의 파이프라인의 실행 단계가 종료되자마자 연산 결과를 다음 번 파이프라인 단계의 실행 단계의 실행 유니트에서 사용할 수 있어 명령어 실행 시간이 단축된다. 그러나 바이패싱 회로의 복잡도는 연산처리기가 늘어남에 따라 크게 증가하는 단점이 있으므로 명령어 중복 할당 기법을 적용하면 여러 개의 연산처리기에서 동일한 연산을 수행하여 VLIW 구조에서 가상의 바이패싱 회로가 존재하는 것과 같은 효과를 얻을 수 있다.

  • PDF

A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments

  • Choi, Seul-Ki;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1611-1625
    • /
    • 2019
  • The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.

Communication with Psychosomatic Patient: With a Clinical Vignette "When Words Are Unspeakable: A Bridge Beyond the Silence" (증례 '금지된 언어와 침묵을 넘어서'를 통해 본 정신신체화 환자와의 소통)

  • Jahng, Eun Jin
    • Psychoanalysis
    • /
    • v.29 no.4
    • /
    • pp.72-82
    • /
    • 2018
  • What should a therapist do if the patient has lost the ability to speak in sessions? How should the therapist understand and approach this 'deadly silence'? Psychosomatic patients have poor ability to mentalize their experience, so they create a 'shunt' from emotional experience to body bypassing symbolic sphere. This makes psychosomatic patients vulnerable to expressing their emotions in words. With the case vignette 'When words are unspeakable: a bridge beyond the silence' written by Wirth in a book "From soma to symbol" we observe how psychosomatic pathology arises, from inappropriate mirroring and poor containment; and how this escalates into a vicious cycle of sin and punishment in the patient's conscience. This conscience scenario imprisons a talented and creative mind in a dark, silent place, wherein symbols and words are forbidden. This seemingly impossible task of providing silent patients with a 'talking cure' finds breakthrough with containment, and transformative thinking using therapists' reveries.

Recovery Related to Vocalization and Swallowing After Tracheostomy (기관절개술 후 음성 및 연하 재활)

  • Lee, Chang-Yoon;Son, Hee Young
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.33 no.1
    • /
    • pp.7-12
    • /
    • 2022
  • Tracheostomy refers to a surgical incision created in the neck to allow direct air entry into the trachea bypassing the upper respiratory tract including the oral and nasal cavities. Normal vocalization and swallowing are limited immediately postoperatively; however, gradual recovery of vocalization and swallowing function can be initiated, following improvement in the causative condition that necessitated the tracheostomy. Duration of the tracheostomy depends upon the patient's condition, and the degree of vocalization and swallowing function recovery after tracheostomy tube removal varies widely across patients. In this review, we investigated the changes associated with vocalization and swallowing function in patients who underwent tracheostomy and have discussed the various approaches and voice rehabilitation treatments to aid with normal recovery.

Diagnosis and Management of Post-Partum Hemorrhage Caused by Acquired Hemophilia A: A Case Report

  • Rashid, Nawshirwan G.;Amin, Shaema Salih;Abdulqader, Aveen M. Raouf
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.54 no.2
    • /
    • pp.163-166
    • /
    • 2022
  • Acquired hemophilia A (AHA) is an uncommon autoimmune bleeding disorder in which autoantibodies that affect the functions of factor VIII (FVIII) are present in the blood. The initial diagnosis of AHA is difficult as the presentations of AHA differ from those of congenital hemophilia A. Moreover, the treatment of AHA is more complex due to the presence of autoantibodies against FVIII. Here, we present a case report of postpartum AHA, to increase the perception and knowledge regarding the recognition and management of such cases. We present a young female with the chief complaint of vaginal bleeding and upper arm ecchymosis. Laboratory results exhibited isolated prolonged activated partial thromboplastin time (APTT) and FVIII inhibitors. The patient was treated with corticosteroids, FVIII concentrates, and a bypassing agent. In conclusion, unexplained postpartum bleeding, unmanageable with basic hemostatic measures, should lead to clinical suspicion of an acquired bleeding disease.

Hierarchical Threads Generation-based Bypassing Attack on DLL Injection Monitoring System (계층화된 쓰레드 생성을 이용한 DLL 삽입 탐지기술 우회 공격 기법)

  • DaeYoub Kim
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.239-245
    • /
    • 2023
  • Whitelist-based ransomware solution is known as being vulnerable to false impersonation attack using DLL injection attack. To solve this problem, it is proposed to monitor DLL injection attack and to integrate the monitoring result to ransomware solutions. In this paper, we show that attackers can easily bypass the monitoring mechanism and then illegally access files of a target system. It means that whitelist-based ransomware solutions are still vulnerable.