• Title/Summary/Keyword: concealment

Search Result 345, Processing Time 0.025 seconds

Chewing gum as a non-pharmacological alternative for orthodontic pain relief: A randomized clinical trial using an intention-to-treat analysis

  • da Silva Santos, Diego Junior;Capelli, Jonas Jr.
    • The korean journal of orthodontics
    • /
    • v.51 no.5
    • /
    • pp.346-354
    • /
    • 2021
  • Objective: To compare the effectiveness of ibuprofen, acetaminophen, and chewing gum for orthodontic pain relief and to assess if chewing gum can be a non-pharmacological alternative for orthodontic pain relief. Methods: The study enrolled 106 patients of both sexes, aged ≥ 12 years, with body weight > 50 kg, and mild-to-moderate dental crowding in the upper arch. After randomization and allocation concealment, the intervention groups were either administered with ibuprofen (400 mg) or acetaminophen (500 mg) or chewed sugar-free chewing gum immediately after initial archwire placement and every 6 hours for 1 week if the pain persisted. The control group did not receive any pain relief. The pain was assessed on a 100-mm visual analog scale at rest and while biting down at T1 (2 hours), T2 (24 hours), T3 (2 days), T4 (3 days), T5 (7 days), and T6 (21 days). Statistical analyses were performed using the Kruskal-Wallis and post-hoc Mann-Whitney U tests (α = 0.05). Results: The chewing gum group experienced more pain relief than the ibuprofen group at while biting down at T3 (p = 0.04) and at rest at T4 (p < 0.001). The chewing gum group reported more pain relief than the acetaminophen and control groups while biting down at T3 (p = 0.03 and p = 0.0006, respectively) and T4 (both p < 0.001). Conclusions: Chewing gum can be a non-pharmacological alternative for orthodontic pain relief at 2 and 3 days after initial archwire placement.

Review of U.S. Courts' Procedural and Substantive Unconscionability Doctrine Regarding Mandatory Arbitration Agreement in the Nursing Home Contracts (미국 요양원 입소계약상의 강제적 중재 조항에 관한 미국 법원의 절차적, 실체적 비양심성 법리 고찰)

  • Shin, Seungnam
    • Journal of Arbitration Studies
    • /
    • v.31 no.1
    • /
    • pp.83-105
    • /
    • 2021
  • If aggrieving consumers or employees cannot prove both substantive and procedural unconscionability, many U.S. state courts will enforce arbitration agreements. Additionally, U.S. courts weigh a variety of factors to determine whether an arbitration agreement is substantively unconscionable. For example, U.S. courts have considered one or a combination of the following factors: (1) the fairness of contractual terms; (2) the severity of contractual terms' deviation from prevailing standards, customs, or practices within a particular industry; (3) the reasonableness of goods-and-services contract prices; (4) the commercial reasonableness of the contract terms; (5) the purpose and effect of the terms and (6) "the allocation of risks between the parties." Further, procedural unconscionability characterized by surprise or lack of knowledge focuses on terms that are deceptively hidden in a mass of contract language, the object of another concealment, or imposed in the circumstances involving haste or high-pressure tactics so that they are not likely to be read or understood. This unconscionability doctrine can be applied to a situation where an alcoholic dementia-afflicted older adult is admitted to a nursing home. At that time, because she had alcoholic dementia, which precluded her reading, comprehending, writing, negotiating, or signing of any legal document, her son, who did not understand the adhesion contract, signed the standardized residential contract and the arbitration agreement.

The Quantification of Considerations related with Decision-making in Ground Operation : Focusing on Evaluating Avenues of Approach in IPB (지상작전과 연관된 의사결정 고려요소의 정량화 방안 : 전장정보분석의 접근로 평가요소를 중심으로)

  • Han, Seung Jo;Lee, Seungmin
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.129-136
    • /
    • 2019
  • The main tasks of commander and staffs in ground operations are a continuation performing the process of making decisions in various situations. Since the current decision-making process is largely dependent on qualitative methods, it is difficult to integrate with the decision-making tools associated with the 4th Industrial Revolution. The purpose of this study is to suggest the process of deriving the relative importance of the evaluation factors using the AHP with focusing on assessing the avenues of approach in IPB related to the ground operation plan. The most important aspect of IPB is the evaluation of the avenues of approach. Evaluation factors include target accessibility, observation and seasons, concealment and cover-up, ease of maneuverability, and ease of transition to adjacent access roads. The existing methods are the comparison method with evaluation factors and the analysis with the advantages and disadvantages. However, it has been criticized that they regard evaluation factors as equal importance. The results show that target accessibility has the highest score related with priority when considering the criteria.

Home monitoring system based on sound event detection for the hard-of-hearing (청각장애인을 위한 사운드 이벤트 검출 기반 홈 모니터링 시스템)

  • Kim, Gee Yeun;Shin, Seung-Su;Kim, Hyoung-Gook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.4
    • /
    • pp.427-432
    • /
    • 2019
  • In this paper, we propose a home monitoring system using sound event detection based on a bidirectional gated recurrent neural network for the hard-of-hearing. First, in the proposed system, packet loss concealment is used to recover a lost signal captured through wireless sensor networks, and reliable channels are selected using multi-channel cross correlation coefficient for effective sound event detection. The detected sound event is converted into the text and haptic signal through a harmonic/percussive sound source separation method to be provided to hearing impaired people. Experimental results show that the performance of the proposed sound event detection method is superior to the conventional methods and the sound can be expressed into detailed haptic signal using the source separation.

The Dynamics between Accountability Concealment and Problem Solving according to the Governmental Structure: Comparison of Humidifier Disinfectant Case in Korea and Hepatitis C from Tainted Products in Japan (정부 조직구조에 따른 책임은폐와 문제해결의 동학(動學): 국내 가습기 살균제 사건과 일본의 약해간염 사고의 비교)

  • Hyeon, Seung Hyo;Lee, Min Kyu;Ryoo, Hwa Shin
    • Health Policy and Management
    • /
    • v.30 no.4
    • /
    • pp.444-450
    • /
    • 2020
  • Background: In this study, we compared the incidents of humidifier disinfectants and incidents of mild hepatitis in Japan to highlight the differences in government response in the health care field in terms of "chain of responsibility". Methods: We examined whether the three mechanisms of action and the chain of responsibility hypothesis were applied to compare the cases of Korea and Japan. The incident of Japan occurred in 1987 in Misawa city, Aomori prefecture. In the 1990s, the safety of blood products increased dramatically. However, relief for infected victims was neglected. Green Cross did not notify the parties. In Korea, in the spring of 2011, a number of lung disease patients were accidentally admitted to a hospital in Seoul, and a female patient with respiratory failure symptoms expired. The Korea Centers for Disease Control and Prevention conducted animal tests and the Ministry of Health and Welfare issued an order for forced collection of humidifier disinfectants. Results: In the case of Japan, the Ministry of Health and Welfare had to take responsibility for follow-up measures such as the investigation of the cause, so it was tied to a "chain of responsibility". However, in the case of Korea, the Ministry of Health and Welfare was free from the chain. Conclusion: Through the comparison between the cases of Japan and Korea, we confirmed that whether or not a government organization chooses to conceal responsibility depends on its past behavior, which is whether it is free from the chain of responsibility or not. Therefore, it was reaffirmed that an organization (ministry or department) free from the chain of responsibility must exist within the government.

An Approach to Improve the Rooftop Space of Commercial Facilities (상업시설의 루프탑 공간 개선방안 연구)

  • Kim, Hye-Ri;Kim, Young-Hwa;Lee, Sang-Hong
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.6
    • /
    • pp.93-103
    • /
    • 2018
  • In the past, the rooftop was a place where a water tank was to be installed, and a space of secretion and concealment such as a warehouse exposed in the air. It was because it was judged to hinder the beauty of a city as a whole without having any functional value per se. However, the roof portion is increasingly being utilized for a space such as a cafe, a pub, and a lounge as the rooftop is highly recognized as a place for leisure activities other than an idle space in modern times. Nonetheless, there are no detailed ordinances and criteria corresponding to such circumstances. For example, in case of the rooftop space, the building code applied to the rooftop space is a legal system when the rooftop was an idle space in the past though people have now accessed more increasingly to the rooftop than in the past. This study investigated the definition on the rooftop space evolved in accordance with the change of the rooftop space and the related legal system in Korea, and conducted a survey for the purpose of performing the field investigation for the analysis of physical status in 117 spaces that form the rooftop space in the rooftop of small-scale commercial facilities with 2 stories through 4 stories in Korea and analyze the recognition of users and analyzing the recognition of users. We analyzed the problems in the rooftop space through analysis of derived data, and suggested improvement plans.

Proactive Code Verification Protocol Using Empty Memory Deletion in Wireless Sensor Network (무선 센서 네트워크에서의 메모리 공간 삭제를 이용한 선행 코드-검증 기법)

  • Choi, Young-Geun;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.37-46
    • /
    • 2007
  • The authentication in WSN(Wireless Sensor Network) usually means the entity authentication, but owing to the data centric nature of sensor network, much more importance must be put on the authentication(or attestation) for code of sensor nodes. The naive approach to the attestation is for the verifier to compare the previously known memory contents of the target node with the actual memory contents in the target node, but it has a significant drawback. In this paper, we show what the drawback is and propose a countermeasure. This scheme can verify the whole memory space of the target node and provides extremely low probability of malicious code's concealment without depending on accurate timing information unlike SWATT. We provide two modes of this verification method: BS-to-node and node-to-node. The performance estimation in various environments is shown.

Randomized Controlled Trials of Acupuncture for Healthy Volunteers in Korea: A Systematic Review (국내에서 수행된 건강인 대상 침 관련 무작위 대조 임상연구에 대한 체계적 문헌 고찰)

  • Sagong, Hye-Seon;Kim, Hyun-Tae;Heo, In;Shin, Byung-Cheul
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.31 no.1
    • /
    • pp.137-147
    • /
    • 2021
  • Objectives Domestic acupuncture research is being actively conducted in various fields. The aim of this study is to systematically analyze the current acupuncture randomized controlled trials (RCTs) conducted on healthy volunteers. Methods We searched RCTs by the search terms of (acupuncture & random & healthy) in 10 electronic databases and related journals. Then, we analyzed the characteristics and assessed the risk of bias by Cochrane tool. Results Finally, 49 acupuncture RCTs on health volunteers were included in our analysis. The purpose of research could be classified into five major categories: (1) checking the effects on physiological function, (2) comparing the effects of different acupuncture/acupuncture methods, (3) a study confirming improvement after inducing a specific condition, (4) a sham acupuncture study, and (5) a comparison of acupuncture sense. The Cochrane risk of bias was generally high, especially only 1 trial adopted allocation concealment (1/49, 2.0%) and 9 ones with assessor blinding (9/49, 18.4%). Conclusions Acupuncture RCTs in healthy subjects have confirmed various effects in various age/sex groups. However the research quality should be updated for future clinical research and to draw clear conclusion within rigorous methodology.

Mask Cognition Types of Korean in the COVID19 Era using the Q Methodology

  • Cha, Su-Joung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.157-167
    • /
    • 2022
  • This study attempted to investigate what kind of perception people in their 20s have about masks and to find out the characteristics of each type by categorizing the perception. The Q methodology was used for the study. The cognition types of masks were categorized into three. Type 1 was a 'always wear impact-important type' that always wears masks and thinks masks affect non-verbal communication and the wearer's image. Type 2 was a 'function-important negative recognition type' that wears masks to prevent germs and thinks that masks have a great negative impact. Type 3 was a 'concealment wear positive image type' that wears a mask to cover the face and thinks that a person looks young when wearing a mask. It is thought that the development of masks of various designs and functions reflecting the needs of consumers should be carried out. Also, it is thought that various products should be developed and sold so that consumers can choose according to important considerations such as design, fit, and function.

Malware Detection Technology Based on API Call Time Section Characteristics (API 호출 구간 특성 기반 악성코드 탐지 기술)

  • Kim, Dong-Yeob;Choi, Sang-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.629-635
    • /
    • 2022
  • Cyber threats are also increasing with recent social changes and the development of ICT technology. Malicious codes used in cyber threats are becoming more advanced and intelligent, such as analysis environment avoidance technology, concealment, and fileless distribution, to make analysis difficult. Machine learning technology is being used to effectively analyze these malicious codes, but a lot of effort is needed to increase the accuracy of classification. In this paper, we propose a malicious code detection technology based on API call interval characteristics to improve the classification performance of machine learning. The proposed technology uses API call characteristics for each section and entropy of binary to separate characteristic factors into sections based on the extraction malicious code and API call order of normal binary. It was verified that malicious code can be well analyzed using the support vector machine (SVM) algorithm for the extracted characteristic factors.