• Title/Summary/Keyword: Emergency protocol

Search Result 225, Processing Time 0.022 seconds

Laparoscopic Primary Repair with Omentopexy for Duodenal Ulcer Perforation: A Single Institution Experience of 21 Cases

  • Ma, Chung Hyeun;Kim, Min Gyu
    • Journal of Gastric Cancer
    • /
    • v.12 no.4
    • /
    • pp.237-242
    • /
    • 2012
  • Purpose: Despite the great advances in laparoscopic techniques, most active general surgeons do not apply laparoscopic surgery in the treatment of duodenal ulcer perforation when facing a real-life emergency. Therefore, our study was designed to evaluate the feasibility of laparoscopic surgery in duodenal ulcer perforation, and provide a step-by-step protocol with tips and recommendations for less experienced surgeons. Materials and Methods: Between March, 2011 and May, 2012, 21 patients presenting with duodenal ulcer perforation underwent laparoscopic primary repair with omentopexy. There were no contraindications to perform laparoscopic surgery, and the choice of primary repair was decided according to the size of the perforation. The procedure for laparoscopic primary repair with omentopexy consisted of peritoneal lavage, primary suture, and omentopexy using a knot pusher. Results: During the operation, no conversion to open surgery or intra-operative events occurred. The median operation time was 45.0 minutes (20~80 minutes). Median day of commencement of a soft diet was day 6 (4~17 days). After surgery, the median hospital stay was 8.0 days (5~27 days). Postoperative complications occurred in one patient, which included a minor leakage. This complication was resolved by conservative management. Conclusions: Although our study was carried out on a small number of patients at a single institution, we conclude that laparoscopic primary repair can be an effective surgical method in the treatment of duodenal ulcer perforation. We believe that the detailed explanation of our procedure will help beginners to perform laparoscopic primary repair more easily.

The Wireless Monitoring System of Respiration Signal (호흡신호 무선 통신 시스템 개발)

  • Son, Byoung-Hee;Jang, Jong-Chan;Yang, Hyo-Sik;Cha, Eun-Jong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.3
    • /
    • pp.157-162
    • /
    • 2011
  • This study is about implementing wireless transferring system in pre-hospital cardiopulmonary resuscitation(CPR). Also, this study includes monitoring based feedback between patient and hospital to increase the survival rate of emergency patient by developing the performance of cardiopulmonary resuscitation in pre-hospital. It minimizes the loss of flow rate or gastric inflation through the space between the airway and the esophagus, which enables the inspiration-expiration rate to be measured more precisely. Due to these reasons this study applied ET insertion based respiratory sensor to measure flow rate. The main indices of artificial ventilation are justified from minute respiration(V), end-tidal $CO_2(E_TCO_2)$, and tracheal pressure($P_{tr}$). The simulation is performed to verify the bandwidth and delay time of transport network for in-hospital monitoring even as transporting images and voice information simultaneously. The total bandwidth is 815 kbps, and WLAN (IEEE 802.11x) is used as communication protocol. The network load is under 1.5% and the transmit delay time is measured under 0.3 seconds.

Implementation of Intelligent Home Service Robot Using Wireless Internet Platform (무선인터넷 플랫폼을 이용한 지능형 홈서비스 로봇의 구현)

  • Kim, jin-hwan;Kim, dong-gyu;Son, ki-young;Shin, dong-suk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.201-205
    • /
    • 2007
  • This thesis aims to realize an intelligent home service robot that alerts the user to dangerous situations such as fires and gas leaks by utilizing wireless internet platforms in a cellular phone. The intelligent home service robot is composed of the following parts: The robot part consists of a gas sensor, a fire detector, a smoke sensor, ultrasonic sensors, motors, a camera and a Blue-tooth module and perceives various danger circumstances; The middleware part connects the robot part with the mobile part through the middleware applications, monitors the robot and notifies an emergency situation using SMS modules; The mobile part communicates with the middleware using TCP/IP protocol and controls the robot through various commands; The proposed scheme is to control the sensors of the robot part through and Atmega128 processor, and the mobile part was developed based on the WIPI platform. The robot and middleware parts will be installed in the household, and will be controled by mobile part from the outside.

  • PDF

A Study of the Trends in Korean Nursing Research on Critical Care in the Last 10 Years (2008-2017) Using Integrated Review and Key Word Analysis (통합적 고찰과 키워드 분석을 이용한 최근 10년(2008-2017) 동안의 국내 중환자간호 연구 동향 분석)

  • Kang, Jiyeon;Kim, Soo Gyeong;Cho, Young Shin;Ko, Hyunyoung;Back, Ji Hyun;Lee, Su Jin
    • Journal of Korean Critical Care Nursing
    • /
    • v.11 no.2
    • /
    • pp.75-85
    • /
    • 2018
  • Purpose : The purpose of this study was to examine the possible direction of critical care nursing research in the future by analyzing the trends of recent Korean studies. Method : Using a database search, we selected 263 articles on critical care nursing that were published in Korean journals between 2008 and 2017. Then, we conducted an integrative review of the contents of the selected articles and analyzed the English abstracts using the relevant packages and functions of the R program. Results : The number of studies concerning critical care nursing has increased over the 10-year period, and the specific topic of each study has diversified according to the time at which it was conducted. In terms of quality, the majority of the research was published in high-level academic journals. The key words regularly studied over the past decade were: knowledge, delirium, education, restraint, stress, and infection. Studies related to vancomycin-resistant enterococci infection, compliance, and standards have decreased, while studies related to death, communication, and safety have increased. Conclusion : Randomized controlled trials and protocol research for evidence-based critical care need to be conducted, as does research on family involvement. The key word analysis of unstructured text used in this study is a relatively new method; it is suggested that this method be applied to various critical care nursing research and develop it methodologically.

Case Report on Long Term Survival of Glioblastoma Patient Treated with Integrative Medicine (한양방결합치료로 장기간 생존하고 있는 교모세포종 증례 보고)

  • Yang, Juno;Yun, Youngju;Hong, Jinwoo;Han, Changwoo;Kwon, Jungnam;Lee, In;Park, Seongha;Kim, Soyeon;Choi, Junyong;Lee, Hyeyoon
    • The Journal of Korean Medicine
    • /
    • v.39 no.1
    • /
    • pp.75-85
    • /
    • 2018
  • Objectives: This is a long-term survival case report about glioblastoma treated with western medicine and traditional Korean medicine. 28 year-old man diagnosed glioblastoma in 2003 went through 2 year's chemotherapy first. After emergency brain surgery he took acupuncture and Korean herbal medication including Dohongsamul-tang and Boan-Manyeongdan in addition to conventional radiotherapy and chemotherapy for 3 years. Since May 2008, he was exclusively treated with traditional Korean medicine except taking antiplatelets only for 9 years. Though he has sequelae of tumor necrosis such as facial palsy and hemiparesis, he has survived without recurrence more than 14 years. We suggest that integrative approach including traditional Korean medicine can be a meaningful treatment option for malignant brain tumor. Further studies with more cases should be performed to establish proper treatment protocol of integrative medicine for brain tumor.

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

Implementation of a WIPI-based Intelligent Home Service Robot (WIPI 기반의 지능형 홈서비스 로봇의 구현)

  • Kim, Jin-Hwan;Shin, Dong-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.19-28
    • /
    • 2008
  • In this paper, we implemented an intelligent home service robot system which alerts users to danger by wireless internet platforms for interoperability(WIPI) of a cellular phone. This paper discusses the three parts of the system: robot, middleware and mobile system. First, the robot consists of a gas sensor, a fire detector, ultrasonic sensors, motors, a camera and a Bluetooth module. The robot perceives various danger circumstances. Second, the middleware connects the robot and the mobile system. It monitors the robot and sends emergency notification SMS message to the user's cellular phone if in danger. Third, the mobile system sends commands which control the robot using TCP/IP protocol. The proposed scheme is to control the sensors of the robot part through Atmega 128 processor, and the robot and middleware parts will be installed in the household, and will be controled by mobile part from the outside.

A Three-Tier BGP Backup Routing (3단 BGP 백업 라우팅)

  • Suh, Chang-Jin
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.745-752
    • /
    • 2005
  • BGP is a unique routing protocol in broadband internet. It chooses routing paths considering internet hierarchy and local policies. As BGP routers selectively bypass routing information to a subset of neighboring BGP routers, connectivity by way of a series of links between source and destination nodes does not mean reachability of routing information of the two. In emergency when BGP routers or links over wide range are not available, BGP routers have to use links that are not normally used to keep reachability. This paper listed out the requirements for BGP backup routing and proposed a routing solution that hides most demerits in currently published ones. The proposed backup operates in three tiers according to network damage. Under this rule, BGP routers use tier-0 routing paths at normal. If networks are impaired, they choose tier-1 paths. If networks are seriously damaged, tier-2 paths are allowed to use. Also this paper proves that the proposed backup guarantees stability and safeness. As results, the proposed backup is very adaptive to light network damages as well as serious ones and provides strong routing reachability at all times.

Study on Wireless Body Area Network System Design Based on Transmission Rate (전송률을 고려한 WBAN 시스템 설계에 관한 연구)

  • Park, Joo-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.121-129
    • /
    • 2012
  • In this paper, we proposed WBAN system model to management an application that requires low rate data transfer in IEEE 802.15.4. We have to use different wireless sensor network technology to transfer different date rate and emergency message in medical application service. A suitable system model for WBAN and a WBAN MAC protocol in order to solve these existing system problems are proposed. Firstly, the priority queuing was applied to contention access period, and the system model which could guarantee transmission of a MAC command frame was proposed. Secondly, the MAC frame was newly defined to use the system model which was proposed above. Thirdly, WBAN CSMA/CA back-off algorithm based on data transmission rate was proposed to enhance data throughput and transmission probability of the data frame which does not have priority in the proposed WBAN system. The proposed algorithm is designed to be variable CSMA/CA algorithm parameter, depending on data rate. For the evaluation of WBAN CSMA/CA algorithm, we used Castalia. As a result of the simulation, it is found that the proposed system model can not only relieve loads of data processing, but also probability of collision was decreased.