• Title/Summary/Keyword: damage bypass

Search Result 54, Processing Time 0.026 seconds

The Design and Implementation of Mobile Application Solution for Forest Fire based on Drone Photography and Amazon Web Service (AWS)

  • Choi, Si-eun;Bang, Jong-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.31-37
    • /
    • 2020
  • Last year's Goseong-Sokcho forest fires have highlighted the limitations of extinguishing work for night-time forest fire and the importance of quick identification for information on the spread of forest fire. However, it is not easy to find services that take into account the characteristics of forest fires, as most existing disaster-related mobile applications and research assume various disaster situations rather than just forest fire situations. Therefore, a system that can provide information quickly is needed, taking into account the characteristics of forest fires and the limitations of extinguishing work. In this paper, we propose evacuation route guidance services that bypass areas where fire has already spread, supplement existing methods of extinguishing work, and provide general information on forest fire situations in real time, by putting drones into forest fire situations. It has been implemented to automate image analysis using the Rekognition service of Amazon Web Service (AWS), and the results of fire detection and the T Map API guide the evacuation path. It is expected that the results of this paper will allow efficient and rapid rescue and extinguishing work to be carried out, and further reduce the damage of human life caused by forest fires.

Study on defense countermeasures against Webshell attacks of the Industrial Information System (산업정보시스템의 웹쉘공격에 대한 방어 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.16 no.4
    • /
    • pp.47-52
    • /
    • 2018
  • WebShell is a web script file created by a hacker to remotely commands to a web server. The hacker can bypass the security system using the web shell, access the system, control the system such as file modification, copying and deletion, install malicious code in the web source code, attack the user's PC, And so on. There are many types of WebShell attack, but we study about attacks on PHP and JSP based web server which are used as representative ones. And we propose the method of web page management, method of development, and several other methods. By using these countermeasures, it is possible to effectively prevent damage caused by WebShell attacks.

Verification on Debris Reduction Ability of the Sweeper by Real Scale Experiment (실규모 실험검증을 통한 스위퍼의 유송잡물 저감능력 검토)

  • Kim, Sung-Joong;Jung, Do-Joon;Kang, Joon-Gu;Yeo, Hong-Koo;Kim, Jong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.34-44
    • /
    • 2016
  • This study is an experimental study about a facility for preventing the accumulation of floating debris at a bridge by flooding at a small river. Generally, structures installed at a small river are damaged frequently by floating debris during typhoons or localized rainfall events. On the other hand, there is no method available for preventing such damage. The facilities used in other countries to prevent such damage by the accumulation of floating debris include debris fins, deflectors, and sweeper. Among these facilities, the present study was conducted with a sweeper to investigate the damage-reducing capability through a real-scale accumulation experiment. A sweeper was installed in front of a bridge to bypass floating debris by self-rotation so that the floating debris may not be accumulate at the bridge. A small bridge model was prepared in a real-scale for the real-scale experiment. The accumulation reducing capability was compared through an accumulation experiment before and after the sweeper installation depending on the length of the debris and flow conditions. The result showed that the accumulation rate increased with increasing length of the debris or decreasing flow rate. The installation of a sweeper decreased the debris accumulation rate by a minimum of 55% to a maximum of 88% compared to the case without an installed sweeper. The result of the present study showed that the installation of a sweeper at a small river having a high potential of generating floating debris may help secure the stability of a bridge in the case of floating debris accumulation.

Effect of Low Dose Administration of Aprotinin in Pump Priming Solution on Cardiac Surgery (심장수술시 심폐기 충전액에 첨가된 저용량 aprotinin의 효과)

  • Moon, Seong-Min;Choi, Seok-Cheol
    • Journal of Life Science
    • /
    • v.17 no.4 s.84
    • /
    • pp.515-521
    • /
    • 2007
  • Aprotinin, a serine protease inhibitor, has been used to ameliorate the inevitable consequences, including blood component injury after cardiac surgery with cardiopulmonary bypass (CPB). However, there are many arguments on its dosage or usage. We assessed whether administration of low dose of aprotinin in only priming solution has any beneficial effect or reduces its side effects on cardiac surgery. Thirty patients scheduled for elective cardiac surgery were randomly assigned to aprotinin group (n=15) which received aprotinin in priming solution (two million kallikrein inhibitory unit, KIU) and added one million KIU at 1 hour after the beginning of CPB or control group (n=15) which did not receive it. Hematological and biochemical variables, cytokines and cardiac marker levels, and postoperative outcomes were compared between two groups at before, during or after operation. Platelet count in aprotinin group was higher than that of control group at postoperative 24 hr. Activated partial thromboplastin time in aprotinin group was longer than that of control group at intensive care unit (ICU). Troponin-I level and postoperative blood loss volumes in aprotinin group were lower than those of control group at ICU. There were no significant differences between the two groups on the others. These results showed that low dosage of only priming solution during cardiac surgery with CPB reduced platelet destruction and postoperative bleeding, and attenuates myocardial damage. However, further studies need to be carried out with more population or pediatric patients for evaluating various aprotinin usage.

Emergency Coronary Artery Bypass Operation for Card iogen ic Shock (심인성 쇼크에 대한 응급 관상동맥 우회술)

  • 김응중;이원용
    • Journal of Chest Surgery
    • /
    • v.30 no.10
    • /
    • pp.966-972
    • /
    • 1997
  • Between June 1994 to August 1996, 13 patients underwent emergency coronary artery bypass operations. There were 3 males and 10 females and ages ranged from 56 to 80 years with the mean of 65.5 years. The indications for emergency operations were cardiogenic shock in 12 cases and intractable polymorphic VT(ve'ntricular tachycardia) in 1 case. The causes of cardiogenic shock were acute evolving infarction in 6 cases, PTCA failure in 4 cases, acute myocardial infarction in 1 case, and post-AMI VSR(ventricular septal rupture) in 1 case. Pive out of 13 patients could go to operating room within 2 hours. However, the operations were delayed from 3 to 10 hours in 8 patients due to non-medical causes. In 12 patients, 37 distal anastomoses were constructed with only 3 LITA's(left internal thoracic arteries) and 34 saphenous veins. In a patient with post-AMI VSR, VSR repair was added. In a patient with intractable VT and critical sten sis limited to left main coronary artery, left main coronary angioplasty was performed. Pive patients died after operation with the operative mortality of 38.5%. Three patients died in the operating room due to LV pump failure, one patient died due to intractable ventricular tachycardia on postoperative second day, and one patient died on postoperative 7th day due to multi-organ failure with complications of mediastinal bleeding, low cardiac output syndrome, ARF, and lower extremity ischemia due to IABP. In 8 survived patients, 3 major complications (mediastinitis, PMI, UGI bleeding) developed but eventually recovered. We think that the aggressive approach to critically ill patients will salvage some of such patients and the most important factor for patient salvage is early surgical intervention before irreversible damage occurs.

  • PDF

A Study on the Factors Affecting on the Life of Bonded Concrete Overlay Pavement using the LTPP Data of U.S.A (미국 LTPP Data를 활용한 접착식 콘크리트 덧씌우기 포장 수명에 영향을 미치는 인자에 관한 연구)

  • Lee, Seung Woo;Son, Hyeon Jang
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.4D
    • /
    • pp.555-564
    • /
    • 2011
  • More than sixty percentages of the highway constructed by concrete pavements in South Korea and over half of the concrete pavements were twenty years or older. The most of South Korea road is hard to provide a bypass in conditions of network of roads. Asphalt concrete overlay has been used for the overlay of aged concrete pavement. However, the cost of maintenance and rehabilitation in an asphalt overlay is expensive by early damage. Therefore, bonded concrete overlay was recently attempted in South Korea as an alterative method of rehabilitation for aged concrete pavement. Hence, it needed to investigate the factors to find performance of the bonded concrete overlay life. However, there is no performance data of the concrete overlay in South Korea. This study was to make a database of an affecting of the pavement life and draws statistical analysis of the performance data on the LTPP (Long Term Pavement Performance) database of U.S.A.

Penetrating and Nonpenetrating Cardiac Injuries Combined with Cardiac Tamponade. - Report of seven cases and Clinical analysis - (심낭압진이 동반된 관통성 및 비관통성 심장외상 - 7례 보고 및 임상분-)

  • 이만복
    • Journal of Chest Surgery
    • /
    • v.22 no.4
    • /
    • pp.698-704
    • /
    • 1989
  • We experienced the seven cases of penetrating and non-penetrating cardiac injuries combined with cardiac tamponade from June 1986 to June 1989 at Seoul and Chun-An Hospital of SOONCHUNHYANG medical college. The results were as follows. l. In sex distribution, 7 cases were male. In age distribution, The fourth decades occupied about 58 % of all cases. 2. In mode of injury, 4 cases were stab wounds, 1 case penetration by metallic fragment, 2 cases blunt chest trauma. 3. We routinely checked the CVP with subclavian vein catheterization in case of suspicious cardiac tamponade. Significant increments were showed in 4 cases. 4. Becks triad [low blood pressure, raised central venous pressure, distant heart sound] were recorded in 43 % of the cases with proven tamponades. 5. The sites of injury included RV in 4 cases, LV in 1 case, RA in 1 case and branch of RCA in 1 case. The RV injuries were the most common. 6. Coronary artery damage occurred in 2 cases. LADA was severed in 1 case combined with RV rupture and branch of RCA was torn 1 case. 7. Pericardiocentesis was performed 1 case at another hospital before referring to our hospital. We have never used the procedure because we think that it is potentially dangerous with no clear benefit. 8. Subxyphoid pericardial window was performed in 2 cases of severe cardiac tamponade. We have employed this method to stabilize the patients who had systolic hypotension. 9. Surgical approaches were performed with median sternotomy in 3 cases, thoracotomy in 4 cases. 10. We undertook the simple closure in 6 penetrating cardiac wounds. The removal of impacted metallic fragment was performed under the cardiopulmonary bypass. Simple ligation was performed in 2 cases of coronary artery severance 11. One patient with no sign of life was urgently intubated and undertaken an emergency room thoracotomy on the stretch car without antiseptic preparation. The cardiorrhaphy in 6 cases were performed in the operating theater 12. One patient undertaken emergency room thoracotomy did not survive due to refractory hypovolemic shock. But the remaining 6 patients recovered.

  • PDF

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.

A Study On Malicious Mail Training Model (악성메일 훈련 모델에 관한 연구)

  • Kang, Young-Mook;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.197-212
    • /
    • 2020
  • With the advent of virtual currency and electronic wallets creating a way to make financial gains based on anonymity, malicious code dissemination using malicious mail has continued to increase. In order to minimize the damage, the human factors, security awareness and the ability to respond, which are technical factors, should be improved evenly, which can be improved through malicious mail training. This study presented a model considering the performance of malicious mail training, such as practice. It was classified as a training for enhancing awareness of security for employees and detection and response to improve their ability to respond to malicious mail. A training system suitable for the purpose, the core functions of malware training, implementation and camouflage skills, and bypass techniques were described. Based on the above model, the training data conducted over three years were collected and the effectiveness of the training was studied through analysis of the results according to the number of training sessions, training themes and camouflage techniques.

Veno-Venous Extracorporeal Membrane Oxygenation of Acute Respiratory Failure due to Near-drowning -2 case reports- (물놀이 사고로 유발된 급성호흡부전 환자에서 정정맥 체외순환막형산화요법의 적용 - 2예 보고 -)

  • Kim, Hyoung-Soo;Han, Sang-Jin;Lee, Chang-Youl;Lee, Sun-Hee;Jung, Jae-Han;Kim, Sung-Jun
    • Journal of Chest Surgery
    • /
    • v.43 no.2
    • /
    • pp.164-167
    • /
    • 2010
  • Extracorporeal membrane oxygenation (ECMO) during acute respiratory failure due to any cause aids in the recovery of respiratory function. The use of ECMO for acute respiratory failure due to near drowning was reported to be a successful therapeutic option in those patients who do not respond to optimal conventional therapies. We performed veno-venous ECMO for 2 acute respiratory failures due to near-drownings. All cannulations were performed percutaneously via both femoral veins. The 2 patients were successfully weaned off ECMO, but one patient experienced diffuse hypoxic brain damage and a subarachnoid hemorrhage.