http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Yung-Liang Wan,Pei-Kwei Tsay,Yun-Chung Cheung,Ping-Cherng Chiang,Chun-Hua Wang,Ying-Huang Tsai,Han-Ping Kuo,Kuo-Chien Tsao,Tzou-Yien Lin 대한영상의학회 2007 Korean Journal of Radiology Vol.8 No.6
Objective: The purpose of this study was to quantify lesions on chest radiographs in patients with severe acute respiratory syndrome (SARS) and analyze the severity of the lesions with clinical parameters. Materials and Methods: Two experienced radiologists reviewed chest radiographs of 28 patients with SARS. Each lung was divided into upper, middle, and lower zones. A SARS-related lesion in each zone was scored using a four-point scale: zero to three. The mean and maximal radiographic scores were analyzed statistically to determine if the scorings were related to the laboratory data and clinical course. Results: Forward stepwise multiple linear regression showed that the mean radiographic score correlated most significantly with the number of hospitalized days (p < 0.001). The second most significant factor was the absolute lymphocyte count (p < 0.001) and the third most significant factor was the number of days of intubation (p = 0.025). The maximal radiographic score correlated best with the percentage of lymphocytes in a leukocyte count (p < 0.001), while the second most significant factor was the number of hospitalized days (p < 0.001) and the third most significant factor was the absolute lymphocyte count (p = 0.013). The mean radiographic scores of the patients who died, with comorbidities and without a comorbidity were 11.1, 6.3 and 2.9, respectively (p = 0.032). The corresponding value for maximal radiographic scores were 17.7, 9.7 and 6.0, respectively (p = 0.033). Conclusion: The severity of abnormalities quantified on chest radiographs in patients with SARS correlates with the clinical parameters.
Black Hole along with Other Attacks in MANETs: A Survey
Tseng, Fan-Hsun,Chiang, Hua-Pei,Chao, Han-Chieh Korea Information Processing Society 2018 Journal of information processing systems Vol.14 No.1
Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.
Black Hole along with Other Attacks in MANETs: A Survey
( Fan-hsun Tseng ),( Hua-pei Chiang ),( Han-chieh Chao ) 한국정보처리학회 2018 Journal of information processing systems Vol.14 No.1
Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.