• Title/Summary/Keyword: School library system

Search Result 396, Processing Time 0.025 seconds

The Effect of Moxibustion Treatment for Cardiac Arrhythmia : A Systematic Review (부정맥의 뜸 치료 효과에 대한 체계적 문헌고찰)

  • Lee, Bora;Hwang, Juyeong;Kwon, Jungnam
    • The Journal of Korean Medicine
    • /
    • v.40 no.3
    • /
    • pp.99-111
    • /
    • 2019
  • Objectives: The purpose of this study was to assess the effects of moxibustion treatment for Cardiac arrhythmia through a systematic review. Methods: Electronic database including Cochrane library, Pubmed, China National Knowledge Infrastructure, Embase, DBpia, and Korean studies Information Service System were searched by combining the keywords such as "arrhythmias", "cardiac arrhythmias", "心律失常", "moxibustion" and "艾灸". Through the searching, 5 randomized controlled trials(RCTs) were included except animal testing and cellular experiment etc. The quality of each RCTs was assessed using the Cochrane risk of bias tool. Results: We included 5RCTs involving 468 participants. Two RCTs compared moxibustion versus conventional treatment, another RCT compared moxibustion plus acupuncture versus conventional treatment, another RCT compared moxibustion plus herbal medicine verus conventional treatment, the other RCT compared moxibustion plus herbal medicine and ointment versus conventional treatment. These studies were evaluated by the efficacy rate of treatments. Studies measured outcomes in efficacy, heart rate, electrocardiogram and symptoms. Each of 5 trials statistically showed a significant differences in efficacy rate. One study reported about side effects and another study reported about complications. The overall risk of bias was unclear in 5 studies. Conclusions: The evidence suggests that moxibustion treatment may help to reduce cardiac arrhythmia, however, it is limited, low-certainty and we cannot rule out benefits or risks with this treatment. High-quality studies that report adverse effects are needed.

A Study of the Architectural Characteristic Depending upon the Module in the BIPV System (BIPV 시스템에서의 모듈 종류에 따른 건축적 특성 연구 - 채광형 시스템을 중심으로 -)

  • Lee, Eung-Jik;Lee, Chung-Sik
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2008.04a
    • /
    • pp.196-202
    • /
    • 2008
  • Effective climate protection is a most important tasks of our time. The BIPV is one of the most interesting and promisingly possibilities of an active use of solar energy at the building. In this study it was analyzed by the case study the function of the requirement of the BIPV-module as building material and this architectural characteristic according to the kind of the module. Therefore the goal of this study is to get securing the application information of BIPV as windowpane. BIPV modules are manufactured in the form of G/G. In the case of the crystal type the Transparent and the light Transmission is to be adjusted by the spacer attitude of the cell. Although this type could not be optimal for light effect of indoors because of the inequality of shade, the moving shade play makes a dramatic Roomimage by the run of sun. The application of this type would be for canopy, window or roof in the corridor or resounds. With amorphous the type it is to be manufactured simply largely laminar, and thus that will shorten building process. There is a relatively good economy to use and to the window system easily. After the production technology is easy the transparency of the modules to adjust, and the module shows to a high degree constant characteristics of light permeability and transparency. Without mottle of module shade is good the use for the window or roof glazing of office, library, classroom, etc. to adapt. The BIPV modules took generally speaking a function as building material to the daylight use, shading, isolation and also to the sight. That means that BIPV modules have as multifunctional system to sustainable architecture good successes and they are at the same time as Design element for architecture effectively.

  • PDF

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

The implementation of interface between industrial PC and PLC for multi-camera vision systems (멀티카메라 비전시스템을 위한 산업용 PC와 PLC간 제어 방법 개발)

  • Kim, Hyun Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.453-458
    • /
    • 2016
  • One of the most common applications of machine vision is quality inspections in automated production. In this study, a welding inspection system that is controlled by a PC and a PLC equipped with a multi-camera setup was developed. The system was designed to measure the primary dimensions, such as the length and width of the welding areas. The TCP/IP protocols and multi-threading techniques were used for parallel control of the optical components and physical distribution. A coaxial light was used to maintain uniform lighting conditions and enhance the image quality of the weld areas. The core image processing system was established through a combination of various algorithms from the OpenCV library. The proposed vision inspection system was fully validated for an actual weld production line and was shown to satisfy the functional and performance requirements.

Scientifically Gifted Students' Perception of the Learning Support System based on Korea Science Academy Survey (과학영재학교의 학습 지원 체제 유용성에 대한 학생들의 인식 : 한국과학영재학교를 중심으로)

  • Bae, Sae-Byok;Kim, Kyoung-Dae;Kang, Soon-Min;Yune, So-Jung
    • Journal of The Korean Association For Science Education
    • /
    • v.29 no.5
    • /
    • pp.552-563
    • /
    • 2009
  • The purpose of this study is to investigate the students' perception of the learning support system of Korea Science Academy and to propose improvements to it. The impact of the science learning support system on 129 gifted students in Korea Science Academy (KSA) was estimated by using Likert-type items and the multiple-choice method approach for more comprehensive evaluation. The results of our investigation are as follows: First, the learning support system of KSA appears globally useful to the students. The list of educational usefulness to the students comprises, in the decreasing order of utility, classroom work, Internet, lab activities, reading rooms, library, research meetings and clubs, academic advisors (AA), SAF (Science Academy Fair), e-learning system, and finally colloquia by invited lecturers. Second, what the gifted students hope for in the realm of learning support from KSA are learning guides by subject teachers, presentation skill program, the constructions of on/off-line learning communities, etc. It seems that the results of this study would be helpful in improving the learning support system, and will provide useful information for planning the direction of future science-gifted education programs at the high-school level.

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

The Ecology of the Scientific Literature and Information Retrieval (I)

  • Jeong, Jun-Min
    • Journal of the Korean Society for information Management
    • /
    • v.2 no.2
    • /
    • pp.3-37
    • /
    • 1985
  • This research deals with the problems encountered in designing systems for more efficient and effective information retrieval used in the proliferation of literature. This research was designed to develop and test 1) the partitioning a large bibliographic data base into quality oriented subsets (quality filtering), and 2) a system for effective and efficient information retrieval within subsets of data base (relevance). In order to accomplish this partitioning, the 'kernel' technique of graph theory was applied. In addition, a method of quality filtering utilizing the 'epidemic' theory and the 'obsolescence' of scientific literature was developed.

  • PDF

Breast Mass Classification using the Fundamental Deep Learning Approach: To build the optimal model applying various methods that influence the performance of CNN

  • Lee, Jin;Choi, Kwang Jong;Kim, Seong Jung;Oh, Ji Eun;Yoon, Woong Bae;Kim, Kwang Gi
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.97-102
    • /
    • 2016
  • Deep learning enables machines to have perception and can potentially outperform humans in the medical field. It can save a lot of time and reduce human error by detecting certain patterns from medical images without being trained. The main goal of this paper is to build the optimal model for breast mass classification by applying various methods that influence the performance of Convolutional Neural Network (CNN). Google's newly developed software library Tensorflow was used to build CNN and the mammogram dataset used in this study was obtained from 340 breast cancer cases. The best classification performance we achieved was an accuracy of 0.887, sensitivity of 0.903, and specificity of 0.869 for normal tissue versus malignant mass classification with augmented data, more convolutional filters, and ADAM optimizer. A limitation of this method, however, was that it only considered malignant masses which are relatively easier to classify than benign masses. Therefore, further studies are required in order to properly classify any given data for medical uses.

CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY

  • Chande, Manoj Kumar;Lee, Cheng-Chi
    • Bulletin of the Korean Mathematical Society
    • /
    • v.53 no.4
    • /
    • pp.1051-1069
    • /
    • 2016
  • Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (LZZ) gives the proxy signature scheme with message recovery using self-certified public key. The security of the proposed scheme is based on the discrete logarithm problem (DLP) and one-way hash function (OWHF). Their scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, their scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer. In this paper, it is shown that in their signature scheme a malicious signer can cheat the system authority (SA), by obtaining a proxy signature key without the permission of the original signer. At the same time malicious original signer can also cheat the SA, he can also obtain a proxy signature key without the permission of the proxy signer. An improved signature scheme is being proposed, which involves the remedial measures to get rid of security flaws of the LZZ et al.'s. The security and performance analysis shows that the proposed signature scheme is maintaining higher level of security, with little bit of computational complexity.

Research Trend Analysis on Job Stress of Hospital Nurses (병원 간호사의 직무스트레스에 관한 연구 동향 분석)

  • Oh, EunYoung;Kang, KyongHwa;Kim, KwangJum;Min, HeungKi
    • Korea Journal of Hospital Management
    • /
    • v.23 no.1
    • /
    • pp.16-27
    • /
    • 2018
  • 1) Purpose : The purpose of this research is to identify the trend of job stress of hospital nurses based on last 10 years of domestic research and to suggest directions for systematic future research. 2) Methodology : 101 studies between 2006 and 2016 were selected using key words such as registered nurse and job stress from Academic Information Service(Riss4u), the National Assembly Library and Korean studies Information Service System(KISS). 3) Findings : The researches on job stress of hospital nurses were increasing. The result showed that job stress increased for shift nurses. Especially, nurses of small-medium sized hospital showed remarkable effects to organization such as turnover intention. In addition, although the importance of approach to management is emphasized, there is little research on these aspects. 4) Practical Implications : It is necessary to develop systematic research on job stress directly effecting turnover intention of hospital nurses from hospital management aspect. The development of job stress measuring tools reflecting the characteristics of the medical institution, and the human resources management plan to resolve the imbalance in manpower for nurses should be required.