• Title/Summary/Keyword: block recovery

Search Result 257, Processing Time 0.024 seconds

The Effect of Bilateral Femoral Nerve Block Combined with Intravenous Patient-controlled Analgesia after a Bilateral Total Knee Replacement (양측 슬관절 전치환술 후 정맥 내 통증자가조절 시 대퇴신경차단의 병용이 미치는 영향)

  • Chung, Mee Young;Kim, Chang Jae
    • The Korean Journal of Pain
    • /
    • v.21 no.3
    • /
    • pp.211-216
    • /
    • 2008
  • Background: Postoperative pain after bilateral total knee replacement (TKR) is expected to be more severe than unilateral TKR. Intravenous patient-controlled analgesia (IV PCA) is less effective than other methods of pain management especially immediately after an operation even though it is an easily controlled method for managing pain. This study was designed to evaluate the effect of femoral nerve blocks combined with IV PCA after bilateral TKR for postoperative pain control. Methods: The patients in group I (n = 20) were given only IV PCA with morphine and group II (n = 20) were given bilateral femoral nerve blocks with 12 ml of 0.25% bupivacaine and epinephrine 1 : 400,000 before extubation followed by an IV PCA. Main outcome measures included numerical rating pain score, cumulative opioid consumption, hourly dose during each time interval, and side effects. Results: The pain score in group II was significantly lower than that in group I immediately after recovery of awareness and at 3, 6, 12 hours postoperatively. Cumulative opioid consumption was significantly decreased in group II during the first 48 hours postoperatively. The hourly dose in group II was also significantly lower than that in group I until 12 hours postoperatively. There was no difference in side effects between the groups. Conclusions: We concluded that bilateral femoral nerve blocks improve analgesia and decrease morphine use during IV PCA after bilateral TKR.

Recovering Corrupted Motion Vectors using Discontinuity Features of an Image (영상의 불연속 특성을 이용한 손상된 움직임 벡터 복원 기법)

  • 손남례;이귀상
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.3
    • /
    • pp.298-304
    • /
    • 2004
  • In transmitting a compressed video bit-stream over Internet, a packet loss causes an error propagation in both spatial and temporal domain, which in turn leads to a severe degradation in image quality. In this paper, a new error concealment algorithm is proposed to repair damaged portions of the video frames in the receiver. Conventional BMA(Boundary Matching Algorithm) assumes that the pixels on the boundary of the missing block and its neighboring blocks are very similar, but has no consideration of edges t)r discontinuity across the boundary. In our approach, the edges are detected across the boundary of the lost or erroneous block. Once the edges are detected and the orientation of each edge is found, only the pixel difference along the expected edges across the boundary is measured instead of calculating differences between all adjacent pixels on the boundary. Therefore, the proposed approach needs very few computations and the experiment shows an improvement of the performance over the conventional BMA in terms of both subjective and objective quality of video sequences.

The Effect of EMG-stim on Upper Limb Function in Chronic Stroke Patients (근전도 유발 신경근 전기자극치료가 뇌졸중 환자의 상지기능에 미치는 효과)

  • Cho, In-Sul;Chang, Jong-Sung;Kim, Kyoung;Kim, Wook-Ro;Park, Rae-Joon
    • The Journal of Korean Physical Therapy
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Purpose: This study examined the effect of EMG-stim related to the functional recovery of the upper extremity in chronic stroke patients with an intensive massed practice protocol. Methods: The subjects were assigned randomly to either the EMG-stim group (n=10) or sham treatment group (n=10). Both groups received conventional physical therapy, occupational therapy and FES, five times per week over a four week period. In the EMG-stim group, EMG-stim was applied to the hemiplegic wrist and finger extensors for 2 sessions for 30 minutes per day, 5 times per week over a 4 week period. As the pre- and the post-test, the following four motor tests were assessed as the function of the upper extremity clinical functional test: extensor digitorum strength test, Box and Block test, Fugl-Mayer Assessment, and Jebson-Taylor Hand Function Test. Results: In the Box and Block test and Fugl-Mayer Assessment, there were statistically significant differences between both groups as well as between pre- and post-test. The extensor digitorum and wrist extensor strength were similar in both groups. In the Jebson-Taylor Hand Function Test, there was a significant difference in simulated page turning but not in the other subtests. Conclusion: Intensive massed practice with EMG-stim intervention applied to the hemiplegic upper extremity is an effective therapeutic method for chronic stroke patients. However, a variety of intervention methods designed for stroke patients in clinical settings are needed.

  • PDF

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

Open channel block of Kv1.4 potassium channels by aripiprazole

  • Park, Jeaneun;Cho, Kwang-Hyun;Lee, Hong Joon;Choi, Jin-Sung;Rhie, Duck-Joo
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.24 no.6
    • /
    • pp.545-553
    • /
    • 2020
  • Aripiprazole is a quinolinone derivative approved as an atypical antipsychotic drug for the treatment of schizophrenia and bipolar disorder. It acts as with partial agonist activities at the dopamine D2 receptors. Although it is known to be relatively safe for patients with cardiac ailments, less is known about the effect of aripiprazole on voltage-gated ion channels such as transient A-type K+ channels, which are important for the repolarization of cardiac and neuronal action potentials. Here, we investigated the effects of aripiprazole on Kv1.4 currents expressed in HEK293 cells using a whole-cell patch-clamp technique. Aripiprazole blocked Kv1.4 channels in a concentration-dependent manner with an IC50 value of 4.4 μM and a Hill coefficient of 2.5. Aripiprazole also accelerated the activation (time-to-peak) and inactivation kinetics. Aripiprazole induced a voltage-dependent (δ = 0.17) inhibition, which was use-dependent with successive pulses on Kv1.4 currents without altering the time course of recovery from inactivation. Dehydroaripiprazole, an active metabolite of aripiprazole, inhibited Kv1.4 with an IC50 value of 6.3 μM (p < 0.05 compared with aripiprazole) with a Hill coefficient of 2.0. Furthermore, aripiprazole inhibited Kv4.3 currents to a similar extent in a concentration-dependent manner with an IC50 value of 4.9 μM and a Hill coefficient of 2.3. Thus, our results indicate that aripiprazole blocked Kv1.4 by preferentially binding to the open state of the channels.

An Error position detection and recovery algorithm at 3×3 matrix digital circuit by mimicking a Neuron (뉴런의 기능을 모사한 3×3배열구조의 디지털 회로에서의 오류위치 확인 및 복구 알고리즘)

  • Kim, Seok-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2193-2198
    • /
    • 2016
  • In this study, we propose an algorithm to simulate the function of the coupling structure and having two neurons to find out exactly recover the temporary or permanent position errors that can occur during operation in a digital circuit was separated by function, a $3{\times}3$ array. If any particular part in the combined cells are differentiated cells have a problem that function to other cells caused an error and perform the same function are subjected to a step of apoptosis by the surrounding cells. Designed as a function block in the function and the internal structure having a cell structure of this digital circuit proposes an algorithm. In case of error of module 4 of block 1 considered in this study, sum of all module numbers for horizontal direction, total module number sum for vertical direction, and sum of all module numbers for diagonal direction, We were able to find the location.

Prolonged blepharoptosis following repeated stellate ganglion block in a patient with brachial plexopathy after thoracoscopic surgery (흉강경 수술 후 상완신경병증 환자에서 반복된 성상신경절블록 후 발생한 지속적인 안검하수)

  • Kim, Kangil;Lee, Sang Hyun;Seo, Eun Hui;Cho, Young Woo
    • Journal of Yeungnam Medical Science
    • /
    • v.31 no.2
    • /
    • pp.135-138
    • /
    • 2014
  • A 34-year-old female was suffered from pain and numbness of right arm for 2 months after undergoing a thoracoscopic procedure for a posterior mediastinal mass that was diagnosed as neurilemmoma. The patient was diagnosed as a complex regional pain syndrome type 2 with brachial plexopathy developed during thoracoscopic excision of posterior mediastinal mass, and stellate ganglion block (SGB) with 0.2% ropivacaine 10 mL was performed every 3-4 days. The patient revealed slightly prolonged blepharoptosis as Horner syndrome accompanied after every SGB and recovered. However, following the 23rd SGB, the blepharoptosis persisted and patient was recovered spontaneously from blepharoptosis after about 12 months. The possibility that the persistent blepharoptosis might be caused by brachial plexopathy related to patient's pathology or surgical manipulation and/or repeated SGB. If Horner syndrome occurs, its etiology should be assessed, and it would be necessary to explain and to assure the patient the possibility of recovery spontaneously from the complication within a year, without any sequelae.

Prognostic Value of Inferior Shift of P wave Axis after Catheter Ablation for Longstanding Persistent Atrial Fibrillation based on Dallas Lesion Set Including Anterior Line

  • Shin, Dong Geum;Kim, Tae-Hoon;Jeong, Hyunmin;Kim, Alexander;Uhm, Jae-Sun;Joung, Boyoung;Lee, Moon-Hyoung;Hwang, Chun;Pak, Hui-Nam
    • International Journal of Arrhythmia
    • /
    • 제18권2호
    • /
    • pp.66-76
    • /
    • 2017
  • Background and Objectives: Although an anterior linear ablation is an effective lesion set in radiofrequency catheter ablation (RFCA) for longstanding persistent atrial fibrillation (L-PeAF), its durability for bidirectional block (BDB) is only about 60% at repeat procedure. We hypothesized that changes in electrocardiogram (ECG) may predict an anterior line block state and the clinical outcome of L-PeAF ablation. Subjects and Methods: We studied 304 L-PeAF patients (77% male, $60{\pm}10yrs$), who consistently underwent RFCA Dallas lesion set (circumferential pulmonary vein isolation, posterior box lesion, and anterior line) protocol with subsequent comparison of pre-procedural and post-procedural P wave axes, and one year follow-up (n=205) sinus rhythm (SR) ECGs. Results: 1. P wave axis shifted inferiorly at immediate post-procedure (p<0.001), and was independently correlated with BDB of anterior line (${\ss}=10.4$, 95% confidence interval [CI] 2.79-17.94, p=0.008). 2. The degree of post-procedural inferior shift of P wave axis did not reflect clinical recurrence within one-year (n=205, p=0.923), potentially due to conduction recovery of an anterior line. However, among 160 patients without clinical recurrence within one-year, P wave axis at one-year ECG was independently associated with very late recurrence of AF after one-year (n=160, hazard ratio [HR] 0.98; 95% CI 0.97-0.99, p=0.001), during $45.6{\pm}16.7$ months of follow-up. 3. Among 22 patients who underwent repeat procedures, P wave axis shift was more significant in patients with maintained BDB of an anterior line than in those without (p=0.015). Conclusion: An inferior shift of P wave axis reflects the achievement and the maintenance of an anterior line BDB, and is associated with better long-term clinical outcome after catheter ablation for L-PeAF based on Dallas lesion set.

Online Snapshot Method based on Directory and File Change Tracking for Virtual File System (가상파일시스템에서 디렉토리 및 파일 변경 추적에 기반한 온라인 스냅샷 방법)

  • Kim, Jinsu;Song, Seokil;Shin, Jae Ryong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.417-425
    • /
    • 2019
  • Storage snapshot technology allows to preserve data at a specific point in time, and recover and access data at a desired point in time. It is an essential technology for storage protection application. Existing snapshot methods have some problems in that they dependent on storage hardware vendor, file system or virtual block device. In this paper, we propose a new snapshot method for solving the problems and creating snapshots on-line. The proposed snapshot method uses a method of extracting the log records of update operations at the virtual file system layer to enable the snapshot method to operate independently on file systems, virtual block devices, and storage hardwares. In addition, the proposed snapshot mehod creates and manages snapshots for directories and files without interruption to the storage service. Finally, through experiments we measure the snapshot creation time and the performance degradation caused by the snapshot.

SITM Attacks on GIFT-128: Application to NIST Lightweight Cryptography Finalist GIFT-COFB (GIFT-128에 대한 SITM 공격: NIST 경량암호 최종 후보 GIFT-COFB 적용 방안 연구)

  • Park, Jonghyun;Kim, Hangi;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.607-615
    • /
    • 2022
  • The SITM (See-In-The-Middle) proposed in CHES 2020 is a methodology for side-channel assisted differential cryptanalysis. This technique analyzes the power traces of unmasked middle rounds in partial masked SPN block cipher implementation, and performs differential analysis with the side channel information. Blockcipher GIFT is a lightweight blockcipher proposed in CHES 2017, designed to correct the well-known weaknesses of block cipher PRESENT and provide the efficient implementation. In this paper, we propose SITM attacks on partial masked implementation of GIFT-128. This attack targets 4-round and 6-round masked implementation of GIFT-128 and time/data complexity is 214.01 /214.01, 216 /216. In this paper, we compare the masterkey recovery logic available in SITM attacks, establishing a criterion for selecting more efficient logic depending on the situation. Finally, We introduce how to apply the this attack to GIFT-COFB, one of the finalist candidates in NIST lightweight cryptography standardization process.