• Title/Summary/Keyword: delivery cost

Search Result 834, Processing Time 0.023 seconds

An Epidemiological Study on the Complications caused by the Sterilization Program (불임시술의 합병증에 관한 역학적 연구)

  • Hong, Myung-Sun
    • Research in Community and Public Health Nursing
    • /
    • v.7 no.1
    • /
    • pp.138-153
    • /
    • 1996
  • Intending to offer basic information for a prospective health services in Korea, this study is to investigate the complication caused by sterilization in goverment family planning program from 1962 to 1995. The results are as follows: 1. Total number of sterilization performed during the period from 1962 to 1995 were 1.367,772 cases of male sterilization and 2,889,635 cases of female sterilization. 2. Incidence of the complication caused by sterilization operation from 1980 to 1995 were 1,883(0.20%) out of 925,801 cases in vasectomies and 15,866(0.70%) out of 2,256,020 cases in tubal sterilizations. 3. Major complications in vasectomy were epididymities of 658 cases (34.9%), vas recanalization of 326 cases(17.3%), hematoma of 266 cases(14.1%), scrotal abscess of 184 cases(9.8%), sperm granuloma of 76 cases(4.0%),and other of 373 cases(19.8%). On the other hand, in tubal sterilization, ectopic pregnancy was the most significant complication of 15,078 cases (95.0%) among 15,866 total complications, followed by pelvic inflammatory diseases of 155 cases(0.9%), peritonities of 96 cases(0.6%), ovarian & tubal bleeding of 31 cases(0.2%), intestinal perforation of 16 cases (0.1%), uterine bleeding of 14 cases(0.1%), uterine cervix laceration of 1 case (0.1%), and other of 271 cases(1.7%), while 161 pregnancies(0.1%) were terminated and 43 cases(0.3%) with normal delivery. 4. The occurrence rate of the complication for each period showed that most of the complication cases by vasectomy occurred in a year after the operation -the cases were 1,256 (66.7%). 254 cases(13.5%) occurred between the next year and the 2nd year, 138 cases (7.3%) between the 2nd year and the 3rd year, 73 cases(3.9%) between the 3rd year and the 4th year, 52 cases(2.8%) between the 4th year and the 5th year, 31 cases(1.6%) between the 5th year and the 6th year, 79 cases(4.2%) over the 6th year. Tubal sterilization indicated that the occurred complication cases in a year were 2,175 cases(13.7%), 2,113 cases(13.3%) occurred between the next year and the 2nd year, 2,082 cases(13.1%) between the 2nd year and the 3rd year, 2,049 cases (12. 9%) between the 3rd year and the 4th year, 1,819 cases(11.5%) between the 4th year and the 5th year, 621 cases(10.2%) between the 5th year and the 6th year, 4,007 cases(25.3%) over the 6th year. 5. For the cost of complication treatment, total \7,928,229,000 were paid as medical expenditure in which \609,438,000 for vasectomy and \7,318,791,000 for tubal sterilization. Accordingly per capita expenses were \345,000 for vasectomy and \467,000 for tubal sterilization. As the proportion of government sterilization program was decreased after 1988, that of private sterilization program would be increased. So it is recommended to set a guideline for the private sterilization program and to continue government sterilization program for the lower class.

  • PDF

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

Changes in the Training Conditions of Residents by Enforcement of Medical Residents Act (전공의법 시행에 따른 전공의 수련환경 변화)

  • Oh, Su-Hyun;Kim, Jin-Suk
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.427-434
    • /
    • 2019
  • The Medical Residents Act was enacted in December 2016 to protect the rights of residents, and to ensuring the safety of patients, and nurturing good medical human resources. This study analyzed the changes of training conditions according to the enforcement of The Medical Residents Act by comparing the results of two surveys conducted in 2015(1,793 Residents) and 2017(1,768 Residents). As a result, Residents worked over 80 hours per week on average('15=92.4h, '17=87.3h) and they worked twice as many times as 36 hours('15=89.4h, '17=70.1h). Female residents' leave before and after childbirth('15=78.5day, '17=82.2day), Preparation of Standard training contract('15=19.3%, '17=40.8%), Delivery of training contract('15=12.4%, '17=36.1%) did not comply with the regulations. The training conditions of the residents is directly related to the safety of patients and the public's health. National support is needed for the support of substitute workforces, fair training evaluation conditions and incentives based on the evaluation results, labor costs for residents and supervising medical specialists, and the cost of making training programs.

Study on Reducing Logistics Costs and Inventory Control System according to facilities integration in the Closed-Loop Supply Chain Environment (순환형 공급체인 환경에서 시설 통합에 의한 물류원가 절감 및 재고관리시스템 모델구축에 관한 연구)

  • Lee, Jeong Eun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.81-90
    • /
    • 2014
  • It is an element certainly required for the cost reduction of a company that forward and reverse logistics chain are unified and constitutes a resource closed-loop supply chain (CLSC). In this study, the inventory control which unifies inventory of distribution centers (DCs) of forward logistics and processing center of reverse logistics in the CLSC environment is proposed. The inventory system model for newly-constructed CLSC considers the JIT(Just-In-Time) delivery from the processing center to the manufacturer, including the making of decisions on whether to wait for the arrival of end-of-life products or to back-order necessary products for manufacturer when the supply of end-of-life products at the processing center via the returning center is insufficient for the demands of the manufacturers. The validity of the proposed model was verified using the genetic algorithm (GA). In order that a parameter might investigate the effect which it has on a solution, the simulation was carried out for priGA(priority-based GA) on three kinds of parameter conditions. Moreover, mhGA(modified hybrid GA) to which a parameter is adjusted for every Study on Reducing Logistics Costs and Inventory Control System according to facilities integration in the Closed-Loop Supply Chain Environment generation, the simulation was carried out to a four-kind numerical example.

A Defect Prevention Model based on SW-FMEA (SW-FMEA 기반의 결함 예방 모델)

  • Kim Hyo-Young;Han Hyuk-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.7
    • /
    • pp.605-614
    • /
    • 2006
  • The success of a software development project can be determined by the use of QCD. And as a software's size and complexity increase, the importance of early quality assurance rises. Therefore, more effort should be given to prevention, as opposed to correction. In order to provide a framework for the prevention of defects, defect detection activities such as peer review and testing, along with analysis of previous defects, is required. This entails a systematization and use of quality data from previous development efforts. FMEA, which is utilized for system safety assurance, can be applied as a means of software defect prevention. SW-FMEA (Software Failure Mode Effect Analysis) attempts to prevent defects by predicting likely defects. Presently, it has been applied to requirement analysis and design. SW-FMEA utilizes measured data from development activities, and can be used for defect prevention on both the development and management sides, for example, in planning, analysis, design, peer reviews, testing, risk management, and so forth. This research discusses about related methodology and proposes defect prevention model based on SW-FMEA. Proposed model is extended SW-FMEA that focuses on system analysis and design. The model not only supports verification and validation effectively, but is useful for reducing defect detection.

A Resource Adaptive Data Dissemination Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 자원 적응형 데이터 확산프로토콜)

  • Kim, Hyun-Tae;Choi, Nak-Sun;Jung, Kyu-Su;Jeon, Yeong-Bae;Ra, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2091-2098
    • /
    • 2006
  • In this paper, it proposes a protocol of resource adaptive data dissemination for sensor nodes in a wireless sensor network. In general, each sensor node used in a wireless sensor network delivers the required information to the final destination by conducting cooperative works such as sensing, processing, and communicating each other using the battery power of a independent sensor node. So, a protocol used for transferring the acquired information to users through the wireless sensor network can minimize the power consumption of energy resource given to a sensor node. Especially, it is very important to minimize the total amount of power consumption with a method for handling the problems on implosion. data delivery overlapping, and excessive message transfer caused by message broadcasting. In this paper, for the maintaining of the shortest path between sensor nodes, maximizing of the life time of a sensor node and minimizing of communication cost, it presents a method for selecting the representative transfer node for an event arising area based on the negotiation scheme and maintaining optimal transfer path using hop and energy information. Finally, for the performance evaluation, we compare the proposed protocol to existing directed diffusion and SPIN protocol. And, with the simulation results, we show that the proposed protocol enhances the performance on the power consumption rate when the number of overall sensor nodes in a sensor network or neighbor sensor nodes in an event area are increased and on the number of messages disseminated from a sensor node.

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

A Study on Information Exchange Scheme for Reliability in the Wireless Multicasting (무선 멀티캐스팅에서 신뢰성을 위한 정보 교환 기법에 관한 연구)

  • Im, Ji-Yeong;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.247-256
    • /
    • 2002
  • In a wireless multicasting when a mobile host moves to the new bate station being in the same multicast group it needs to exchange information about data delivery between base stations to receive data from the new base station at once. However it is inefficient to use the existence schemes because it takes too much time to exchange information and many overheads. The next, a mobile host moving to the base station not being in the same multicast group, the old base station will pre-forward data to neighboring base stations to avoid transmission delay. However, if other mobile hosts move at short interval, the old base station may retransmit the same data to the same neighboring base stations. In this paper we proposed called Information Exchange Scheme (IES). In IES in the same multicast grope the base stations exchange information locally so it takes the minimum time and overheads to use IES. Also in IES the neighboring base stations delay to delete data for continuous moving of other MHs. We also present how our scheme is efficient by producing cost ad simulating.

Pulling Force and Manure Spreading Characteristic of Tractor-drawn Animal Slurry Manure Sub-soil Injector (가축분뇨액비 지중살포기의 견인력 및 살포 특성)

  • Choe K. J;Lee S. H.;Ryu B. K.;Oh K. Y.;Park H. J.;Lee S. T.
    • Journal of Animal Environmental Science
    • /
    • v.11 no.1
    • /
    • pp.25-34
    • /
    • 2005
  • The study aimed to develop a tractor drawn animal slurry manure sub-soil injector for arable land and thus, can reduce the waste management cost through effective treatment and utilization of animal slurry manure. The application of animal slurry manure to agricultural land will probably be one of the most effective ways to enrich the soil with vital nutrients. However, some existing slurry manure spenders are not suitable in the field because of their adverse effects to the environment. Based on this premise, a prototype was designed and assembled using 5 sub-soiling standards attached to the sin injector device. The traction force of the Prototype measured in the depth of 10 cm and 15 cm from the ground surface of a paddy field was 1,062 kgf and 1,214 kgf, respectively. A unique feature of the machine was that there was an equal volume of slurry manure flowing from each delivery pipe and regulated by a pressurized container that was likewise synchronized with the speed of the tractor The sub-soiling manure injection system can mitigate or reduce the harmful emission of obnoxious gases and malodor during the injection operation.

  • PDF

Committee Learning Classifier based on Attribute Value Frequency (속성 값 빈도 기반의 전문가 다수결 분류기)

  • Lee, Chang-Hwan;Jung, In-Chul;Kwon, Young-S.
    • Journal of KIISE:Databases
    • /
    • v.37 no.4
    • /
    • pp.177-184
    • /
    • 2010
  • In these day, many data including sensor, delivery, credit and stock data are generated continuously in massive quantity. It is difficult to learn from these data because they are large in volume and changing fast in their concepts. To handle these problems, learning methods based in sliding window methods over time have been used. But these approaches have a problem of rebuilding models every time new data arrive, which requires a lot of time and cost. Therefore we need very simple incremental learning methods. Bayesian method is an example of these methods but it has a disadvantage which it requries the prior knowledge(probabiltiy) of data. In this study, we propose a learning method based on attribute values. In the proposed method, even though we don't know the prior knowledge(probability) of data, we can apply our new method to data. The main concept of this method is that each attribute value is regarded as an expert learner, summing up the expert learners lead to better results. Experimental results show our learning method learns from data very fast and performs well when compared to current learning methods(decision tree and bayesian).