• Title/Summary/Keyword: national protocols

Search Result 838, Processing Time 0.031 seconds

Acute lymphoblastic leukemia in children: past, present and future (소아 급성 림프모구 백혈병: 과거, 현재, 미래)

  • Kang, Hyoung Jin;Shin, Hee Young;Ahn, Hyo Seop
    • Clinical and Experimental Pediatrics
    • /
    • v.50 no.7
    • /
    • pp.601-605
    • /
    • 2007
  • The cure rate of acute lymphoblastic leukemia (ALL) in children dramatically improved over past 5 decades from zero to about 80%. The main cause of improvement is owing to the development of chemotherapy by multicenter clinical trial of large study groups with the understanding of leukemia biology. Recently, pediatric ALL protocols were applied to the treatment of adolescent and even adult ALL patients. For nearly 30 years, clinical factors have been used to risk-stratify therapy for children with ALL, so that the most intensive therapies are reserved for those patients at the highest risk of relapse. The risk groups of ALL are divided as standard- (low- plus intermediate-), high- and very high-risk group according to the prognostic factors, and treatment results improved by this risk based treatment. The factors used to risk-stratify therapy include age, gender, presenting leukocyte count, immunophenotype, cytogenetic aberrations including ploidy and translocations, and initial response after 1 to 2 weeks of therapy. But treatment efficacy is the most important determinant and can abolish the clinical significance of most, if at all, prognostic factors. Today, in the era of intensive, multiagent regimens, there is increasing evidence that we have reached the limits of prognostic significance of currently applied clinical risk factors in childhood ALL. As the cure rate of ALL is about 80%, introducing new prognostic factors such as new molecular prognostic markers, new methods of assessment about minimal residual disease, and pharmacogenetic study, with the development of stem cell transplantation and molecular targeted therapy are needed to cure residual 20% of childhood ALL patients without short and long term complications.

Decolorization of a Dye by Immobilized Lignin Degrading Enzymes Generated from Transformants of Merulius tremellosus Fr. (아교버섯 형질전환체가 생산한 리그닌분해 고정화효소에 의한 염료 탈색)

  • Min, Dong-Suk;Ryu, Sun-Hwa;Kim, Myung-Kil;Choi, Hyoung-T.
    • Korean Journal of Microbiology
    • /
    • v.48 no.3
    • /
    • pp.225-227
    • /
    • 2012
  • Lignin degrading enzymes from white rot fungi show broad substrate specificities, and therefore they can degrade variety of recalcitrant compounds. We have used three different protocols for the generation of immobilized laccase and manganese peroxidase crude enzymes from the genetically transformed strains of Merulius tremellosus Fr. These immobilized enzymes were used in the decolorization of Remazol Brilliant Blue R (RBBR), and they showed about 75% decolorization rates during the 48 h reactions. Although the decolorization efficiency decreased by 10-15% after a repeated use of the immobilized enzymes, these can be reused in various degrading reactions.

A Study on the Deperm of Ferromagnetic Material using Preisach Model (Preisach 모델을 이용한 강자성체의 탈자기법 연구)

  • Ju, Hye Sun;Park, Gwan Soo;Won, Hyuk
    • Journal of the Korean Magnetics Society
    • /
    • v.23 no.2
    • /
    • pp.54-61
    • /
    • 2013
  • Ferromagnetic material's residual magnetization is remained because of the interaction between domains from external apply field, so the electrical and electronic industry and area of defense development request deperm protocol which makes the residual magnetization to 0. But the deperm protocols which are used theses days are developed by using only experience and experiment, so we have to develop deperm protocol considering hysteresis curve. In this paper, Anhysteretic Deperm, Deperm-ME, Flash-Deperm were analyzed using two dimensional finite element method and Preisach model that was formulated by property of magnetic materials. From that analysis, the relations between hysteresis curve and deperm variable are compared by analyzing the trace of Preisach plane. Also, an efficient current ratio of deperm protocol, is proposed.

Resilient Routing Protocol Scheme for 6LoWPAN (6LoWPAN에서 회복력 있는 라우팅 프로토콜 기법)

  • Woo, Yeon Kyung;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.141-149
    • /
    • 2013
  • IETF 6LoWPAN standard technique has been studied in IoT environment to support the IPv6 packet communication. 6LoWPAN protocol for transmission of packets mainly in the AODV routing protocol and a variety of extended techniques have been investigated. In particular, consisting of nodes with limited resources in a network error occurs when the 6LoWPAN reliable data transfer and fast routing method is needed. To this end, in this paper, we propose resilient routing protocol and extension of IETF LOAD algorithm, for optimal recovery path, More specifically, the optimal recovery path setup algorithm, signal flow, and detailed protocols for the verification of the reliability of packet transmission mathematical model is presented. The proposed protocol techniques to analyze the performance of the NS-3 performance through the simulation results that is end-to-end delay, throughput, packet delivery fraction and control packet overhead demonstrated excellence in comparison with existing LOAD.

An Area-efficient Design of SHA-256 Hash Processor for IoT Security (IoT 보안을 위한 SHA-256 해시 프로세서의 면적 효율적인 설계)

  • Lee, Sang-Hyun;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.109-116
    • /
    • 2018
  • This paper describes an area-efficient design of SHA-256 hash function that is widely used in various security protocols including digital signature, authentication code, key generation. The SHA-256 hash processor includes a padder block for padding and parsing input message, so that it can operate without software for preprocessing. Round function was designed with a 16-bit data-path that processed 64 round computations in 128 clock cycles, resulting in an optimized area per throughput (APT) performance as well as small area implementation. The SHA-256 hash processor was verified by FPGA implementation using Virtex5 device, and it was estimated that the throughput was 337 Mbps at maximum clock frequency of 116 MHz. The synthesis for ASIC implementation using a $0.18-{\mu}m$ CMOS cell library shows that it has 13,251 gate equivalents (GEs) and it can operate up to 200 MHz clock frequency.

Guidelines for Cardiovascular Magnetic Resonance Imaging from Korean Society of Cardiovascular Imaging (KOSCI) - Part 1: Standardized Protocol

  • Jo, Yeseul;Kim, JeongJae;Park, Chul Hwan;Lee, Jae Wook;Hur, Jee Hye;Yang, Dong Hyun;Lee, Bae Young;Im, Dong Jin;Hong, Su Jin;Kim, Eun Young;Park, Eun-Ah;Kim, Pan Ki;Yong, Hwan Seok
    • Investigative Magnetic Resonance Imaging
    • /
    • v.23 no.4
    • /
    • pp.296-315
    • /
    • 2019
  • Cardiac magnetic resonance (CMR) imaging is widely used in many areas of cardiovascular disease assessment. This is a practical, standard CMR protocol for beginners that is designed to be easy to follow and implement. This protocol guideline is based on previously reported CMR guidelines and includes sequence terminology used by vendors, essential MR physics, imaging planes, field strength considerations, MRI-conditional devices, drugs for stress tests, various CMR modules, and disease/symptom-based protocols based on a survey of cardiologists and various appropriate-use criteria. It will be of considerable help in planning and implementing tests. In addressing CMR usage and creating this protocol guideline, we particularly tried to include useful tips to overcome various practical issues and improve CMR imaging. We hope that this document will continue to standardize and simplify a patient-based approach to clinical CMR and contribute to the promotion of public health.

Effects of Music Therapy and Phone Counseling on Postpartum Depression and Maternal Identity in High Risk Women (음악요법과 전화상담이 고위험 산모의 산후우울과 모성정체성에 미치는 효과)

  • Kim, Hae Won;Kim, Sun Ok;Kim, Hye Gyung;Jeon, Hyang Ran
    • Perspectives in Nursing Science
    • /
    • v.11 no.1
    • /
    • pp.63-73
    • /
    • 2014
  • Purpose: This study examine the effects of music therapy and phone counseling on postpartum depression and maternal identity in high risk women. Methods: A nonequivalent control group time series research design was employed. Eighteen women comprised the experimental group and seventeen women, the control group. Experimental group received 4 weeks of music therapy and phone counseling. Postpartum depression and maternal identity were measured prior to intervention and on the 1st, 2nd, and 4th weeks after its introduction. Results: The first hypothesis (i.e., "the degree of postpartum depression would be lower in the experimental group than in the control group in a month's time") was not supported (z=-0.47, p=.641). The second hypothesis (i.e., "the degree of maternal identity would be lower in the experimental group than in the control group in a month") was not supported as well (z=1.08, p=.285). Conclusion: There is the need to monitor long-term effects of music therapy and phone counseling on high risk postpartum women, beyond 4 weeks observed in this study. Additionally, the development of music therapy tailored to high risk individuals and systematic phone counseling protocols for postpartum depression is required.

  • PDF

A MAC Protocol Based on Adaptive Timeout for Energy Efficient Wireless Sensor Networks (에너지 효율적인 무선 센서 네트워크를 위한 적응형 Timeout 기반 MAC 프로토콜)

  • Kwon, Yong-Hun;Kong, In-Yeup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.890-893
    • /
    • 2010
  • In wireless sensor networks, each node generally uses a battery because it is hard to replace or charge. For this reason, study for life time prolongation of each node within the limited energy source has become an important issue. So many ways are suggested to minimize the energy consumption for each node, especially energy efficient MAC protocols have been studied actively. T-MAC of contention based MAC protocol is that added the adaptability on fixed duty cycle of S-MAC. T-MAC allocates the fixed timeout before each node goes to sleep mode from active mode. If no data exchanged in a timeout, each node goes to sleep mode. Because of the timeout is always fixed, the absence of data exchange in a timeout will cause unnecessary energy consumption. In this paper, in order to improve the energy efficiency, we propose a MAC protocol based on adaptive timeout that analyze the probability of the timeout, and provides the modified timeout.

  • PDF

A Design of the Smart Control System for Industrial Automation Equipment (산업용 자동화 장비를 위한 스마트 제어 시스템 설계)

  • Kim, Bo-Hun;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.677-684
    • /
    • 2017
  • Smart devices are used in a variety of industries, because applications for them are easy to develop and portable. However, industrial equipment can cause security problems for information and accidents when controlling the actuator of the equipment at a remote location. In this paper, we studied methods of solving these problems and the advantages of applying smart control systems to industrial equipment. We propose a manual manipulation method using queries and a smart control access procedure for controlling equipment using a smart device. In addition, we propose a data transmission method employing multiple encryption protocols and a user authentication method using unique information from the smart device and Q & A as the communication data protection and user authentication methods, respectively. In order to evaluate its performance, an operation test of the smart control system and user authentication comparison experiment were performed. In order to understand the advantages of applying the smart control system to the equipment, we conducted a comparative experiment with a teach pendant and evaluated its reaction time in case of error.

Efficient Algorithms for Causal Message Logging and Revoery (인과적 메시지 로그 및 복구를 위한 효율적인 알고리즘)

  • Lee, Byeong-Ju;Park, Tae-Sun;Yeom, Heon-Yeong;Jo, Yu-Geun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.767-777
    • /
    • 1999
  • 인과적 메시지 로깅 기법은 정상프로세스를 역전(roll-back)시키거나 메시지의 저장을 위해 프로세스의 수행을 중단시키지 않는 장점을 지니고 있지만, 메시지의 크기가 지나치게 커진다는 단점을 지니고 있다. 본 논문에서는 인과적 메시지 로깅 기법의 이러한 문제점을 해결하기 위하여 로그 상속의 개념을 정의하고 로그 연혁을 이용하여 로그 비용, 특히 로그 크기 면에서 효율적인 로깅 기법을 제안한다. 또한 이 로깅 알고리즘을 이용하여 복구시 메시지의 수와 크기를 줄여 복구시간을 줄이는 효율적인 복구 알고리즘을 제안하고, 제안한 알고리즘이 메시지 로그 크기 면에서 효율적임을 증명한다. 또 제안한 알고리즘의 성능을 검증하기 위하여 두 가지 종류의 모의 실험을 수행하여 기존의 로깅 프로토콜과 메시지 크기 면에서의 성능을 비교한 결과를 제시하였다.Abstract Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging algorithm based on the new message log structure, LogOn, which represents the causal inter-process dependency relation with much smaller overhead compared to the existing algorithms. The proposed algorithm is efficient in the sense that it entails no additional information other than LogOn to be carried in each message, while other existing algorithms require extra information other than the message logs. This paper also presents an efficient recovery algorithm to solve the problem of a large amount of data exchanges during the recovery. To verify the performance of our algorithm, we give an analysis of the algorithm and perform two simulations and compare the log size with other causal logging protocols.