• Title/Summary/Keyword: Ajou protocol

Search Result 144, Processing Time 0.032 seconds

Comparison of concurrent chemoradiotherapy versus sequential radiochemotherapy in patients with completely resected non-small cell lung cancer

  • Kim, Hwan-Ik;Noh, O Kyu;Oh, Young-Taek;Chun, Mison;Kim, Sang-Won;Cho, Oyeon;Heo, Jaesung
    • Radiation Oncology Journal
    • /
    • v.34 no.3
    • /
    • pp.202-208
    • /
    • 2016
  • Purpose: Our institution has implemented two different adjuvant protocols in treating patients with non-small cell lung cancer (NSCLC): chemotherapy followed by concurrent chemoradiotherapy (CT-CCRT) and sequential postoperative radiotherapy (PORT) followed by postoperative chemotherapy (POCT). We aimed to compare the clinical outcomes between the two adjuvant protocols. Materials and Methods: From March 1997 to October 2012, 68 patients were treated with CT-CCRT (n = 25) and sequential PORT followed by POCT (RT-CT; n = 43). The CT-CCRT protocol consisted of 2 cycles of cisplatin-based POCT followed by PORT concurrently with 2 cycles of POCT. The RT-CT protocol consisted of PORT followed by 4 cycles of cisplatin-based POCT. PORT was administered using conventional fractionation with a dose of 50.4-60 Gy. We compared the outcomes between the two adjuvant protocols and analyzed the clinical factors affecting survivals. Results: Median follow-up time was 43.9 months (range, 3.2 to 74.0 months), and the 5-year overall survival (OS), locoregional recurrence-free survival (LRFS), and distant metastasis-free survival (DMFS) were 53.9%, 68.2%, and 51.0%, respectively. There were no significant differences in OS (p = 0.074), LRFS (p = 0.094), and DMFS (p = 0.490) between the two protocols. In multivariable analyses, adjuvant protocol remained as a significant prognostic factor for LRFS, favouring CT-CCRT (hazard ratio [HR] = 3.506, p = 0.046) over RT-CT, not for OS (HR = 0.647, p = 0.229). Conclusion: CT-CCRT protocol increased LRFS more than RT-CT protocol in patients with completely resected NSCLC, but not in OS. Further studies are warranted to evaluate the benefit of CCRT strategy compared with sequential strategy.

A Novel Authentication Protocol based on the Password scheme for Wireless Mesh Network (무선 메쉬 네트워크의 패스워드 기반 인증 프로토콜)

  • Lee, Kyu-Hwan;Lee, Ju-A;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.5
    • /
    • pp.54-62
    • /
    • 2007
  • We propose a novel authentication protocol for wireless mesh network. The proposed authentication protocol is based on the password scheme for convenience of users. The proposed protocol is evaluated through three analyses. The correctness of the proposed protocol is proved using the GNY analysis. By the security analysis, we show that the proposed protocol is resistant to various attacks. For the performance analysis, we implemented the protocol in Linux operating system based laptop and measured the transmission time. The analytic results show that the proposed protocol provides the secure wireless mesh network without considerable performance degradation.

A Dynamic Zigbee Protocol for Reducing Power Consumption

  • Kwon, Do-Keun;Chung, Ki Hyun;Choi, Kyunghee
    • Journal of Information Processing Systems
    • /
    • v.9 no.1
    • /
    • pp.41-52
    • /
    • 2013
  • One of the obstacles preventing the Zigbee protocol from being widely used is the excessive power consumption of Zigbee devices in low bandwidth and low power requirement applications. This paper proposes a protocol that resolves the power efficiency problem. The proposed protocol reduces the power consumption of Zigbee devices in beacon-enabled networks without increasing the time taken by Zigbee peripherals to communicate with their coordinator. The proposed protocol utilizes a beacon control mechanism called a "sleep pattern," which is updated based on the previous event statistics. It determines exactly when Zigbee peripherals wake up or sleep. A simulation of the proposed protocol using realistic parameters and an experiment using commercial products yielded similar results, demonstrating that the protocol may be a solution to reduce the power consumption of Zigbee devices.

Implementation of Lower-Power HDMI 1.3A CEC using MCU (MCU를 이용한 저전력 HDMI 1.3A CEC 모듈 구현)

  • Jeong, Kwang-Seob;Moon, Ho-Sun;Kim, Yong-Deak
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.735-736
    • /
    • 2008
  • Recently Multi media industry require HDMI-CEC which is the system to integrate various product one action. So you need to implement CEC when you use HDMI1.3a. In this paper, presented how to make CEC protocol in MCU and how to reduce power consumption. This system implement CEC protocol and uart communication as using WELTREND MCU.

  • PDF

COMPREHENSIVE TREATMENT OF UNILATERAL COMPLETE CLEFT LIP AND PALATE (편측성 완전 구순구개열 환자의 포괄적 치료)

  • Lee, Jeong-Keun;Hwang, Byung-Nam;Choi, Eun-Zoo;Kim, Yong-Been
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.22 no.4
    • /
    • pp.430-435
    • /
    • 2000
  • Cleft lip and palate is one of the congenital anomalies which need comprehensive and multidisciplinary treatment plan because 1) oral cavity is an important organ with masticatory function as a start of digestive tract, 2) anatomic symmetry and balance is esthetically important in midfacial area, and 3) it is also important to prevent psycho-social problems by adequate restoration of normal facial appearance. There are many different protocols in the treatment of cleft lip and palate, but our department has adopted and modified the $Z{\"{u}}rich$ protocol, as published in the Journal of Korean Cleft Lip and Palate Association in 1998. The first challenge is feeding. Type of feeding aid ranges from simple obturators to active orthopedic appliances. In our department we use passive-type plate made up of soft and hard acrylic resin which permits normal maxillary growth. We use Millard's method to restore normal appearance and function of unilateral complete cleft lip. In consideration of both maxillary growth and phonetic problems, we first close soft palate at 18 months of age and delay the hard palate palatoplasty until 4 to 5 years of age. When soft palate is closed, posterior third of the hard palate is intentionally not denuded to allow normal maxillary growth. In hard palate palatoplasty the mucoperiosteum of affected site is not mobilized to permit residual growth of the maxilla. We have treated a patient with unilateral complete cleft lip and palate by Ajou protocol, which is a kind of modified $Z{\"{u}}rich$ protocol. It is as follows: Infantile orthopedics with passive-type plate such as Hotz plate, cheiloplasty with Millard's rotation-advancement flap, and two stage palatoplasty. It is followed by orthodontic treatment and secondary osteoplasty to augment cleft alveolus, orthognathic surgery, and finally rehabilitation with conventional prosthodontic treatment or implant installation. The result was good up to now, but we are later to investigate the final result with longitudinal follow-up study according to master plan by Ajou protocol.

  • PDF

DNP3 Protocol Security and Attack Detection Method (DNP3 프로토콜 보안 현황 및 공격 탐지 방안)

  • Kwon, Sung-Moon;Yoo, Hyung-Uk;Lee, Sang-Ha;Shon, Tae-Shik
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.353-358
    • /
    • 2014
  • In the past, security on control system was guaranteed by isolation of control system networks from external networks. However as devices of the control systems became more various and interaction between the devices became necessary, effective management system for such network emerged and this triggered connection between control system networks and external system networks. This made management of control system easier but also made control system exposed to various cyber attack threats, Therefore researches on appending security measures on each protocols are in progress. This paper focused on DNP(distributed network protocol)3 protocol which is used for communication between control center and substations. It describes characteristics of DNP3 protocol and research on adding security elements to the protocol. It also analyzed known vulnerabilities of DNP3 protocol and proposed data mining methodology for detecting such vulnerabilities.

Performance Evaluation of PEP Based on Cross-Layer in Satellite Communication System (위성 통신에서 Cross-layer 기반 PEP 성능 평가)

  • Kim, Jong-Mu;Nathnael, Gebregziabher W.;Lee, Kyu-Hyan;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.58-65
    • /
    • 2016
  • Satellite communication is a wide area network (WAN) which provides communication service worldwide. However, the performance of TCP can be seriously degraded in the satellite networks due to limited bandwidth, long round-trip time (RTT) and high bit error rate (BER) over satellite links. In order to improve the performance of TCP, this paper proposes cross-layer Performance Enhancing Proxy (PEP) in digital video broadcasting-return channel via satellite (DVB-RCS) networks. The proposed protocol sets TCP Congestion Window (CWND) size by using satellite resource allocation information exchanged between TCP and the link-layer. we implement PEP testbed based on Linux to evaluate the performance of the proposed protocol. The simulation results show that the proposed protocol performs better than standard TCP both in single and multiple sessions in variant BER, because the proposed protocol sets TCP CWND size by using satellite resource allocation.