• Title/Summary/Keyword: 내서재

Search Result 112, Processing Time 0.025 seconds

Internal Fixation of Proximal Humerus Fracture with Locking Compression Plate (잠김 압박 금속판을 이용한 근위 상완골 골절의 내고정술)

  • Park, Chul-Hyun;Park, Sung-Hyuk;Seo, Jae-Sung
    • Clinics in Shoulder and Elbow
    • /
    • v.12 no.1
    • /
    • pp.44-52
    • /
    • 2009
  • Purpose: We assessed the radiographic and clinical results of one surgeon's experience treating proximal humerus fractures with a locked proximal humeral plate. Materials and Methods: Twenty patients with unstable proximal humerus fractures were treated with a locking compression plate between February 2005 and September 2007. The average age of the patients was 60.6 years, and the average postoperative follow-up period was 22.3 months. The clinical results were evaluated using the Constant and DASH scores. The radiologic results were evaluated by the Paavolainen method, which measures the neck shaft angle and humeral head height. Results: At the last follow-up examination, the mean Constant score was 75.3 and 15 cases (75%) had excellent or good results; the mean DASH score was 16.4. The mean neck shaft angle was $137.1^{\circ}$, and 19 cases (95%) had good results by the Paavolainen method. There was one delayed union, malunion, and screw loosening. Conclusion: The patients treated with a locking compression plate had relatively good clinical and radiologic results, and a low complication rate. Moreover, the patients could exercise earlier due to good reduction and initial stability. Treatment of unstable proximal humerus fractures with a locking compression plate is a reliable method.

Clinical Study on Monteggia Fracture (Monteggia 골절의 임상적 고찰)

  • Seo, Jae-Sung
    • Journal of Yeungnam Medical Science
    • /
    • v.4 no.2
    • /
    • pp.131-138
    • /
    • 1987
  • In 1814, Giovanni Battista Monteggia first described two cases of fracture of proximal third of ulna with a dislocation of radial head, and this combined injury is now known as the Monteggia fracture. Despite its rarity, the importance of early recognition of dislocated radial head and correct treatment bas been emphasized. Eight cases of Monteggia fracture were studied from March, 1984 to June, 1987. The results are as follows 1. Male patients were six and female were two. 2. The frequent cause of injury was fall down in four cases. 3. Bado type I accounted for 50%, type II for 12.5% and type III for 37.5%. 4. The level of ulna fracture was above upper one third of ulna in seven. 5. The common direction of dislocated radial head was anterior. 6. Two children and two adults were managed by closed reduction. Four ulna fractures in adult were treated by open reduction and internal fixation using a semitubular plate. 7. The results (by Bruce et al. criteria) were 3 excellent, 2 good, 1 fair and 2 poor.

  • PDF

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.

Heat transfer characteristics of the heat pipe using simplified heat transfer model (단순 열전달 모델을 이용한 히트파이프의 열전달 성능특성에 관한 연구)

  • Seo, Jae-Hyeong;Bang, Yu-Ma;Seo, Lee-Soo;Lee, Moo-Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.15-20
    • /
    • 2015
  • The objective of this study was to examine numerically the heat transfer and flow characteristics of the heat pipe with a wick using the simplified heat transfer model to enhance the cooling effects of high heat flux devices and minimizing the energy consumption for electric vehicles. The heat pipe with a wick was analyzed using commercial software with COMSOL and water was used as the working fluid. The velocity and temperature characteristics of the heat pipe were simulated numerically along the heat pipe and the local and average Nusselt numbers were calculated. As a result, the driving force occurred because of the temperature difference between the hot side and the cold side. The heat transfer of the heat pipe occurred from the hot side to the cold side and increased toward the center position. In addition, the average Nusselt numbers were 1.88 for the hot side and 0.1 for the cold side, and the maximum Nusselt number was 4.47 for the hot side and 0.7 for the cold side.

Performance Analysis of Label Edge Router System in Multiprotocol Label Switching Network (멀티프로토콜 레이블 스위칭망에서의 레이블 에지 라우터 시스템의 성능 분석)

  • Lee, Jae-Sup;Ryu, Keun-Ho;Suh, Jae-Joon;Im, Jun-Mook
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.602-610
    • /
    • 2001
  • In the MPLS(Multiprotocol Label Switching) forwarding paradigm, once a packet is assigned to a FEC(Forwarding Equivalence Class), no further header analysis is done by subsequent routers; all forwarding is driven by the labels. This has a number of advantages over conventional network layer forwarding. The MPLS LER(Label Edge Router) is located at the boundary of MPLS domain and plays a role in connecting with the existing Internet as an ingress or an egress router. That is, the MPLS LER as an ingress router assigns a label to a packet which enters the MPLS network from the Internet by analyzing its header and forwards to a corresponding next router in MPLS domain. As an egress router, the MPLS LER turns the packets out of the MPLS network by performing the reverse operation. In this paper, we analyze the traffic performance of an MPLS LER system and estimate the IP(Internet Protocol) packet processing capacity of the system using queueing model and simulation. It is found that the maximum IP packet processing capacity of the system is estimated by 420,000 through 460,000 packets/sec.

  • PDF

A Study on QoS Measurement & Evaluation for MPEG Transmission in Network (통신망에서 MPEG 영상 전송을 위한 QoS 측정 및 평가에 관한 연구)

  • Suh Jae-Chul
    • Journal of Digital Contents Society
    • /
    • v.3 no.1
    • /
    • pp.101-111
    • /
    • 2002
  • Lately development of network around Internet expands range of data traffic to multimedia information, and so for the guarantee of multimedia services end-to-end QoS(Quality of Service) must service because comparing with existing Internet service can not support For satisfying those QoS requirements, network have to guarantee not only network on parameter, such as delay, jitter, throughput but also system resources like CPU utilization, memory usage. Therefore it is urgent to develop QoS based middleware to distribute multimedia data and maximize network utilization in the limited resource environment. And it must be necessary of network to provide end-to-end QoS(Quality of Service) for multimedia applications. Multimedia applications want that QoS which satisfy their own service properties be guaranteed Then, We must analyze those necessary QoS requirements md define QoS parameter which specify as two viewpoint, user's and network's perspective. Therefore network provider supplying network for usual user and university, enterprise must want to find about their own network performance and problem. It is essential for network manager to want to use a tool like this. On the basis of technique about QoS test-bed in the AIM network, We studied on the method of QoS measurement and management about end-to-end connection in the Internet. We measured network status about end-to-end connection and analyze the result of performance.

  • PDF

Anomalous Systemic Arterial Supply to Normal Basal Segments of Left Lower Lobe : A Report of Two Cases (폐격리 없이 좌하엽이 체순환 동맥으로부터 공급되는 기형적인 혈관 2예)

  • Lee, Ki-Man;Ahn, Jong-Joon;Kim, Byung-Chul;Jeong, In-Du;Shin, Je-Kyoun;Jung, Jong-Pil;Hwang, Jae-Cheol;Suh, Jae-Hee
    • Tuberculosis and Respiratory Diseases
    • /
    • v.50 no.6
    • /
    • pp.710-717
    • /
    • 2001
  • Two cases of an anomalous systemic arterial supply to the basal segments of the left lower lobe without pulmonary sequestration are presented. In the first case, a preoperative diagnosis was made by chest CT, and confirmed by angiography, in a 22-year old man who had a recurrent hemoptysis. There was systemic arterial supply that originated from the thoracic descending aorta and no pulmonary arterial supply to the basilar segments of the left lower lobe. However, the pulmonary parenchyma was normal without sequestration. Ligation of the abnormal artery and a left lower lobectomy were performed without complications. In the second case, there were characteristic features of this anomaly on chest CT and the angiogram in a 31-year-old man with symptoms of hemoptysis. The patient refused surgery.

  • PDF

Mobile robot control by MNN using optimal EN (최적 EN를 사용한 MNN에 의한 Mobile Robot제어)

  • Choi, Woo-Kyung;Kim, Seong-Joo;Seo, Jae-Yong;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.186-191
    • /
    • 2003
  • Skills in tracing of the MR divide into following, approaching, avoiding and warning and so on. It is difficult to have all these skills learned as neural network. To make this up for, skills consisted of each module, and Mobile Robot was controlled by the output of module adequate for the situation. A mobile Robot was equipped multi-ultrasonic sensor and a USB Camera, which can be in place of human sense, and the measured environment information data is learned through Modular Neural Network. MNN consisted of optimal combination of activation function in the Expert Network and its structure seemed to improve learning time and errors. The Gating Network(GN) used to control output values of the MNN by switching for angle and speed of the robot. In the paper, EN of Modular Neural network was designed optimal combination. Traveling with a real MR was performed repeatedly to verity the usefulness of the MNN which was proposed in this paper. The robot was properly controlled and driven by the result value and the experimental is rewarded with good fruits.

Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트 TV 보안 요구사항 도출)

  • Oh, In-Kyung;Seo, Jae-Wan;Lee, Min-Kyu;Lee, Tae-Hoon;Han, Yu-Na;Park, Ui-Seong;Ji, Han-Byeol;Lee, Jong-Ho;Cho, Kyu-Hyung;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.213-230
    • /
    • 2020
  • As smart TVs have recently emerged as the center of the IoT ecosystem, their importance is increasing. If a vulnerability occurs within a smart TV, there is a possibility that it will cause financial damage, not just in terms of privacy invasion and personal information leakage due to sniffing and theft. Therefore, in this paper, to enhance the completeness of smart TV vulnerability analysis, STRIDE threat classification are used to systematically identify threats. In addition, through the manufacture of the Attack Tree and the actual vulnerability analysis, the effectiveness of the checklist was verified and security requirements were derived for the safe smart TV use environment.

Detection of Car Hacking Using One Class Classifier (단일 클래스 분류기를 사용한 차량 해킹 탐지)

  • Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.33-38
    • /
    • 2018
  • In this study, we try to detect new attacks for vehicle by learning only one class. We use Car-Hacking dataset, an intrusion detection dataset, which is used to evaluate classification performance. The dataset are created by logging CAN (Controller Area Network) traffic through OBD-II port from a real vehicle. The dataset have four attack types. One class classification is one of unsupervised learning methods that classifies attack class by learning only normal class. When using unsupervised learning, it difficult to achieve high efficiency because it does not use negative instances for learning. However, unsupervised learning has the advantage for classifying unlabeled data, which are new attacks. In this study, we use one class classifier to detect new attacks that are difficult to detect using signature-based rules on network intrusion detection system. The proposed method suggests a combination of parameters that detect all new attacks and show efficient classification performance for normal dataset.