• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.029 seconds

A Study of the Chief Complaint of Pediatric Outpatients in the Oriental Hospital (모 한방병원 소아과 외래 환자의 주소증에 대한 연구 ('01-'04년))

  • Chang, Gyu-Tae;Kim, Jang-Hyun;Choi, Eun-Young
    • The Journal of Pediatrics of Korean Medicine
    • /
    • v.19 no.2
    • /
    • pp.197-213
    • /
    • 2005
  • Objective : The purpose of this study was to investigate chief complaints of pediatric outpatients .Fin the oriental hospital and search for a trend of patients and their symtoms. Method : The study was composed of 2,915 new patients aged between 0 and 20 who had been visited pediatrics in ${\bigcirc}{\bigcirc}$ university oriental hospital from 2001 to 2004. Results : The percentage of new patients decreased every year with 30.7% in 2001, 25.5% in 2002, 24.1% in 2003, 17.8% in 2004. The age distribution showed 9.9% in infancy patients, 62.6% in early childhood, 16.8% in late childhood, 10.6% in adolescence. The percentage of infants decreased every year with 13.3% in 2001, 9.4% in 2002, 8.8% in 2003, 7.1% in 2004. The percentage of adolescents increased every year with 8.0% in 2001, 9.6% in 2002, 12.8% in 2003, 13.5% in 2004. Systemic division of chief complaints was respiratory symtoms(37.6%), general symtoms(26.1%), digestive symtoms(19.2%), skin symtoms(6.8%), nervous and mental symtoms (6.1%), urinary symtoms(2.2%), musculoskeletal symtoms(1.3%) and others(0.7%) in order of frequency. The main chief complaints were nasal mucus/obstruction(17.5%), weakness(16.9%), cough(12.8%), loss of appetite(9.8%), inappropriate growth(4.3%), atopic skin problem(3.4%), repeated common cold(2.4%), abdominal pain(2.4%), vomiting (2.2%), diarrhea(2.0%) and fever (1.9%). Loss of appetite, inappropriate growth and repeated common cold increased every year. Diarrhea and convulsion decreased every year. Conclusions : The two main causes of visit of patients were respiratory problems and improvement of general condition. More data of patients should be accumulated for further study. Not only analysis according to chief complaint, but also analysis according to diagnosis will accomplish more aaccurate information about disease of childrens in the future.

  • PDF

Falls in the General Hospital Inpatients: Incidence, Associated Factors (일개 종합병원 입원환자의 낙상 실태 및 관련 요인)

  • Yang, Hwa-Mi;Chun, Byung-Chul
    • Quality Improvement in Health Care
    • /
    • v.15 no.2
    • /
    • pp.107-120
    • /
    • 2009
  • Background : To estimate fall incidence rate and associated factors in inpatients from a general hospital. Method : The data were collected from 104 fall incident reports developed by the patient safety committee in a general hospital in Seoul from 01 January 2007 to 31 December 2008. Information included general characteristics of patients, factors related to fall, types, places, circumstances and outcomes of fall. Result : The incidence rate of fall, which was 4.4 per 1,000 total discharged patients and 0.5 per 1,000 patient-days, was much lower than that of several hospitals in the United States. The difference may reflect the different incidence reporting system of each hospital. Fall-prone patients were, in general, $$\geq_-$$65 years of age, had an alert mental status, were ambulatory with some assistance, and were dependent on and ambulatory device. High incidence of falls was associated with patients with circulatory disease. The majority of fall events usually occurred in bed or at the bedside in the patient's room, and occurred more often during the night than during the day or evening. Risk factors of fall were use of drugs (antihypertensive or neuropsychiatric drugs) and environmental factors (e.g., overly high bed height, surrounding objects, inadequate fitness shoes and slippery floor). Physical injury occurred in 43.3% of fall events, which typically required diagnosis of injury and treatment such as suturing. Risk factors for repeated falls were use of a neuropsychiatric drug (odds ratio=13.9) and gait disturbance (odds ratio=91.2). Risk factors for fall-related injury were alert mental status (odds ratio=3.3 times more likely to fall than those who were drowsy or in a stupor) and general weakness(odds ratio=3.3 times more likely to fall than those who were not generally weak). Conclusion : Medical and nursing staff should be aware of the fall risk factors of hospitalized patients and should intensively pursue preventative strategies. Development of fall prevention education based on these results is recommended.

  • PDF

Architecture of SIP-based Effective Hybrid-type Multimedia Conference (SIP 기반의 효율적인 혼성형 멀티미디어 컨퍼런스 구조)

  • Lee, Ki-Soo;Jang, Choon-Seo;Jo, Hyun-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.17-24
    • /
    • 2007
  • SIP-based tightly coupled conference, which has a centrally located conference server for controlling and management, can be classified several models according to location of focus and mixer. These are centralized server model, endpoint server model, media server component model and distributed mixing model. However each model has its strength and weakness. In this paper, we propose and implement a SIP-based effective hybrid-type conference model which decreases amount of SIP signaling messages, lowers load of server media mixer, and can be easily expandable to large scale conference. In this model, when the number of participants exceeds a pre-defined limit, the conference server selects some participants which posses specific functions and let them share functions of notifications of conference state event package and media mixing. When each participant subscribes conference state event package to the server, it can indicates its possession of such functions by a specific header message. The server stores the indication to the conference information database, and later uses it to select participants for load sharing. The performance of our proposed model is evaluated by experiments.

A Study on Security Weakness and Threats in Personal Health Record Services (개인건강기록 서비스에서 보안취약성 및 위협요소에 관한 연구)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.163-171
    • /
    • 2015
  • Personal Health Records(PHR) service offers patients a convenient and easy-to-use solution for managing their personal health records, crucial medical files, and emergency contacts. In spite of the indispensable advantages, PHR service brings critical challenges that cannot be avoided from consumer side if the security of the data is concerned. The problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the fusion of PHR technology and healthcare. In this paper, therefore, we analyze the various security aspects that are vulnerable to the PHR service and needed to be resolved. Moreover, we analyze the security requirements from the point of view of the PHR users and application service providers and provides the PHR security mechanism for addressing PHR security threats and satisfying PHR security requirements.

A Method of Obstacle Detection in the Dust Environment for Unmanned Ground Vehicle (먼지 환경의 무인차량 운용을 위한 장애물 탐지 기법)

  • Choe, Tok-Son;Ahn, Seong-Yong;Park, Yong-Woon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1006-1012
    • /
    • 2010
  • For the autonomous navigation of an unmanned ground vehicle in the rough terrain and combat, the dust environment should necessarily be overcome. Therefore, we propose a robust obstacle detection methodology using laser range sensor and radar. Laser range sensor has a good angle and distance accuracy, however, it has a weakness in the dust environment. On the other hand, radar has not better the angle and distance accuracy than laser range sensor, it has a robustness in the dust environment. Using these characteristics of laser range sensor and radar, we use laser range sensor as a main sensor for normal times and radar as a assist sensor for the dust environment. For fusion of laser range sensor and radar information, the angle and distance data of the laser range sensor and radar are separately transformed to the angle and distance data of virtual range sensor which is located in the center of the vehicle. Through distance comparison of laser range sensor and radar in the same angle, the distance data of a fused virtual range sensor are changed to the distance data of the laser range sensor, if the distance of laser range sensor and radar are similar. In the other case, the distance data of the fused virtual range sensor are changed to the distance data of the radar. The suggested methodology is verified by real experiment.

Identification Technition of Malicious Behavior node Based on Collaboration in MANET (MANET에서 협업기반의 악의적인 노드 행위 식별기법)

  • Jeon, Seo-In;Ryu, Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.83-90
    • /
    • 2012
  • MANET(Mobile Ad-Hoc Network) has a weakness from a security aspect because it operates where no wired network is built, which causes the exposed media, dynamic topology, and the lack of both central monitoring and management. It is especially difficult to detect and mitigate a malicious node because there is not a mediator which controls the network. This kind of malicious node is closely connected to the routing in the field of study of Ad-Hoc security. Accordingly this paper proposes the method on how to enhance the security for the safe and effective routing by detecting the malicious node. We propose MBC(Identification technition of Malicious Behavior node based on Collaboration in MANET) that can effectively cope with malicious behavior though double detecting the node executing the malicious behavior by the collaboration between individual node and the neighbor, and also managing the individual nodes in accordance with the trust level obtained. The simulation test results show that MBC can find the malicious nodes more accurately and promptly that leads to the more effectively secure routing than the existing method.

Affine Invariant Local Descriptors for Face Recognition (얼굴인식을 위한 어파인 불변 지역 서술자)

  • Gao, Yongbin;Lee, Hyo Jong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.9
    • /
    • pp.375-380
    • /
    • 2014
  • Under controlled environment, such as fixed viewpoints or consistent illumination, the performance of face recognition is usually high enough to be acceptable nowadays. Face recognition is, however, a still challenging task in real world. SIFT(Scale Invariant Feature Transformation) algorithm is scale and rotation invariant, which is powerful only in the case of small viewpoint changes. However, it often fails when viewpoint of faces changes in wide range. In this paper, we use Affine SIFT (Scale Invariant Feature Transformation; ASIFT) to detect affine invariant local descriptors for face recognition under wide viewpoint changes. The ASIFT is an extension of SIFT algorithm to solve this weakness. In our scheme, ASIFT is applied only to gallery face, while SIFT algorithm is applied to probe face. ASIFT generates a series of different viewpoints using affine transformation. Therefore, the ASIFT allows viewpoint differences between gallery face and probe face. Experiment results showed our framework achieved higher recognition accuracy than the original SIFT algorithm on FERET database.

Management of Change in the Chemical Industries Based on Risk Assessment (위험성 평가에 기반한 화학산업의 변경관리)

  • Yoo, Jin Hwan;Lee, Heon Seok;Choi, Jeong Woo;Seo, Jae Min;Ko, Jae Wook
    • Korean Chemical Engineering Research
    • /
    • v.46 no.1
    • /
    • pp.156-163
    • /
    • 2008
  • Process change and modification, which are caused by process failure, equipment life cycle and economic environment, have been generated in the chemical plants. And the MOC (management of change) base on the reasonable process safety technology such as change judgment, hazard identification by accurate technical references and risk assessment. But it is difficult to carry out the MOC because of lack of experience, shortage of knowledge and none of process safety specialists. In this study, the MOC system which could make enhancement of safety by finding and complementing weakness of MOC in chemical facilities was developed. This developed MOC system based on QRA was recommended the obvious standard for decision-making process, MOC procedure based on risk assessment and risk estimation of the process modification. The study based on the above way sought the enhancement of safety by performing Risk Based MOC for chemical plants.

A Study on Corset Look Pattern - Focused on Women in Their 20s with Standard Body Type - (코르셋 룩 원명에 관한 연구 - 20대 전기 표준체형 여성을 중심으로 -)

  • Kim, Si-Man;Sung, Ok-Jin
    • Journal of the Korean Society of Costume
    • /
    • v.57 no.8
    • /
    • pp.48-59
    • /
    • 2007
  • The purpose of this research is to develop a basic pattern of corset look taking into consideration characteristics of human body and fit, by transforming 3 dimensional information obtained from draping of standard body type of women in their 20s, which constitute the biggest consumer group of corset look in Korea, on the basis of body shape of women best reflecting 3 dimensional characteristics. In order to develop a corset look pattern suitable for standard body type of women in their 20s, wear tests of A, B, and C types of patterns in terms of the bust in the standard body type that bust circumference 86.7cm and chest circumference 87.0cm were evaluated best. Taking into consideration above findings, fer the purpose of developing a corset look pattern having an excellent fit and reflecting characteristics of Korean women in their 20s with standard body type, a corset look pattern was designed with proper ease calculated by draping incorporated, and through alteration and complementation of such a pattern, a study pattern was produced. This study is expected to provide tips for standard body type women in their 20s with smaller bust circumference to choose clothing allowing for a better fit able to make up for weakness of their body, while presenting to clothing makers ways of designing and size-setting in terms of characteristics of body type of these consumers.

Fast and Efficient Search Algorithm of Block Motion Estimation

  • Kim, Sang-Gyoo;Lee, Tae-Ho;Jung, Tae-Yeon;Kim, Duk-Gyoo
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.885-888
    • /
    • 2000
  • Among the previous searching methods, there are the typical methods such as full search and three-step search, etc. Block motion estimation using exhaustive search is too computationally intensive. To apply in practice, recently proposed fast algorithms have been focused on reducing the computational complexity by limiting the number of searching points. According to the reduction of searching points, the quality performance is aggravated in those algorithms. In this paper, We present a fast and efficient search algorithm for block motion estimation that produces better quality performance and less computational time compared with a three-step search (TSS). Previously the proposed Two Step Search Algorithm (TWSS) by Fang-Hsuan Cheng and San-Nan sun is based on the ideas of dithering pattern for pixel decimation using a part of a block pixels for BMA (Block Matching Algorithm) and multi-candidate to compensate quality performance with several locations. This method has good quality performance at slow moving images, but has bad quality performance at fast moving images. To resolve this problem, the proposed algorithm in this paper considers spatial and temporal correlation using neighbor and previous blocks to improve quality performance. This performance uses neighbor motion vectors and previous motion vectors in addition, thus it needs more searching points. To compensate this weakness, the proposed algorithm uses statistical character of dithering matrix. The proposed algorithm is superior to TWSS in quality performance and has similar computational complexity

  • PDF