http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Wei-Shen Lai,Chu-Hsing Lin,Jung-Chun Liu,Yen-Lin Huang,Mei-Chun Chou 보안공학연구지원센터 2008 International Journal of Multimedia and Ubiquitous Vol.3 No.4
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of a centralized access point. Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of Destination Sequenced Distance Vector routing protocol (DSDV). SEAD provides a robust protocol against attackers trying to create incorrect routing state in the other node. However, it does not provide a way to prevent an attacker from tampering the next hop or the destination field in route update. In this paper, we propose an I-SEAD protocol to solve the problem. A series of simulation experiments are conducted to evaluate the performance.
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Wei-Shen Lai,Chu-Hsing Lin,Jung-Chun Liu,Hsun-Chi Huang,Tsung-Che Yang 보안공학연구지원센터 2008 International Journal of Software Engineering and Vol.2 No.4
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or resources of a targeted system. Although it is not possible to exempt entirely from denial of service or distributed denial of service attacks, we can limit the malicious user by controlling the traffic flow. In the paper, we propose to monitor the traffic pattern in order to alleviate distributed denial of service attacks. A bandwidth allocation policy will be adopted to assign normal users to a high priority queue and suspected attackers to a low priority queue. Simulations conducted in network simulator of our proposed priority queue-based scheme shows its effectiveness in blocking attacking traffic while maintaining constant flows for legitimate traffic.
Lai, Chi-Chun,Wang, Nan-Kai,Wu, Wei-Chi,Yeung, Ling,Hwang, Yih-Shiou,Chen, Kuan-Jen,Chen, Tun-Lu,Chuang, Lan-Hsin Informa Healthcare 2011 Cutaneous and ocular toxicology Vol.30 No.4
<P><I>Purpose</I>: To compare the long-term anatomical and visual outcomes of patients with idiopathic epiretinal membrane (ERM) removed by vitrectomy and membrane peeling with or without the use of intravitreal injection of triamcinolone acetonide (IVTA).</P><P><I>Methods</I>: A retrospective chart review was performed. Subjects who underwent vitrectomy and who were followed over 12 months were included. The study included two groups of patients. In group 1 (71 eyes), the patients underwent vitrectomy and membrane peeling without the use of IVTA. In group 2 (27 eyes), 2 mg of IVTA was given at the end of the surgery. The main outcome measures were best-corrected visual acuity (BCVA), central foveal thickness (CFT) determined by optical coherence tomography (OCT), the number of cataract surgeries, and the use of anti-glaucomatous drugs during the follow-up period.</P><P><I>Results</I>: This study included 98 eyes with ERM from 98 patients. There was no significant difference between the two groups with respect to age, gender, pre- and postoperative lens status, BCVA, CFT, or length of the follow-up period. The mean age for all of the patients was 62.45 ± 10.01 (mean ± SD) years, and the mean follow-up length was 20.58 ± 9.64 (mean ± SD) months. In all cases, the mean best-corrected logarithm of minimum angle of resolution (logMAR) acuity improved from a preoperative value of 0.91 ± 0.32 [Snellen equivalent (SE), 0.16 ± 0.14] to a postoperative value of 0.46 ± 0.36 (SE, 0.46 ± 0.29) (<I>P</I> < 0.0001). The CFT was reduced from a preoperative value of 473.46 ± 96.91 μm to a postoperative value of 302.44 ± 69.80 μm (<I>P</I> < 0.0001). Six patients (22.2%) in group 2 required anti-glaucomatous drugs to control intraocular pressure (IOP) during the follow-up period, and three patients (4.2%) in group 1 required drugs to control IOP (<I>P</I> == 0.012).</P><P><I>Conclusions</I>: The postoperative visual outcomes for patients with idiopathic ERM were favorable, but CFT did not return to a normal level, even in eyes in which 2 mg IVTA was used. The IVTA use after ERM removal produced no significant benefits during long-term follow-up, but IVTA did increase the risk of increased IOP.</P>
Wei-Chun Chen,Hsueh-Chou Lai,Wen-Pang Su,Mahalakshmi Palani,Kuan-Pin Su 대한신경정신의학회 2015 PSYCHIATRY INVESTIGATION Vol.12 No.1
Interferon (IFN)-α therapy for chronic hepatitis C virus (HCV) infection is frequently associated with major depressive episodes. Bupropion, a commonly used antidepressant agent, has recently found to have strong anti-inflammatory effects in animal models. Despite of the theoretical relevancy, the antidepressant effect of bupropion in IFN-alpha-induced depression has never been studied. Ten HCV patients with IFN-α-induced depression were recruited to receive 8-week bupropion treatment and were assessed every 2 weeks for depressive symptoms by the Hamilton rating scale for depression (HAMD) and somatic symptoms by the Neurotoxicity Rating Scale (NRS). Four of the 10 patients met the criteria for remission (total HAMD scores≤7), and 5 patients met the criteria for response (at least 50% reduction in total HAMD scores). In addition, 5 patients had 50% decreases in NRS for neuropsychiatric symptoms. This preliminary open-label study suggests that bupropion is effective in treating IFN-alpha-induced depressive and somatic symptoms.
A Robust Watermark Scheme for Copyright Protection
Jung-Chun Liu,Chu-Hsing Lin,Wei-Shen Lai,Yan-Wei Lee 보안공학연구지원센터 2008 International Journal of Software Engineering and Vol.2 No.4
In this paper, we propose a robust watermark technology to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intellectual property even after serious attacks on the watermarked image. In the proposed watermarking, we embed watermarks by Singular Value Decomposition and Distributed Discrete Wavelet Transformation techniques. Regarding our method, Singular Value Decomposition provides the robustness to protect the image from most attacks except cropping, while Distributed Discrete Wavelet Transformation disperses watermarks all over the image to resist cropping attacks. The robustness of our proposed watermark scheme has been verified experimentally against main kinds of watermark attacks such as geometric and signal processing attacks.
Anomaly Detection Using LibSVM Training Tools
Jung-Chun Liu,Chu-Hsing Lin,Jui-Ling Yu,Wei-Shen Lai,Chia-Han Ho 보안공학연구지원센터 2008 International Journal of Security and Its Applicat Vol.2 No.4
Intrusion detection is the means to identify the intrusive behaviors and provide useful information to intruded systems to respond fast and to avoid or reduce damages. In recent years, learning machine technology is often used as a detection method in anomaly detection. In this research, we use support vector machine as a learning method for anomaly detection, and use LibSVM as the support vector machine tool. By using this tool, we get rid of numerous and complex operations and do not have to use external tools for finding parameters as needed by using other algorithms such as the genetic algorithm. Experimental results show that high average detection rates and low average false positive rates in anomaly detection are achieved by our proposed approach.
Coronary Stent Infection Presented as Recurrent Stent Thrombosis
Chih-Hung Lai,Wei-Chun Chang,Yung-Kai Lin,Wen-Lieng Lee 연세대학교의과대학 2017 Yonsei medical journal Vol.58 No.2
Percutaneous transluminal coronary angioplasty with metal stent placement has become a well-developed treatment modality for coronary stenotic lesions. Although infection involving implanted stents is rare, it can, however, occur with high morbidity and mortality. We describe herein a case of an inserted coronary stent that was infected and complicated with recurrent stent thrombosis, pseudoaneurysm formation and severe sepsis. Despite repeated intervention and bypass surgery, the patient died from severe sepsis.