• Title/Summary/Keyword: network response time

Search Result 746, Processing Time 0.024 seconds

Chronic pain control in patients with rheumatoid arthritis (만성통증 환자의 통증 조절)

  • Eun, Young
    • Journal of muscle and joint health
    • /
    • v.2 no.1
    • /
    • pp.17-40
    • /
    • 1995
  • Rheumatoid arthritis is the one of the chronic diseases, one of its major symptoms is a chronic pain. Despite developing medical treatment and surgical techniques, it is suggested that to control the pain is the goal of the treatment. But pain is an inner experience and even those closest to the patient cannot truly observe its progress or share in its suffering. The National Academy of Sciences Institute of Medicine's report on Pain and Disability concluded that there is no objective measure of pain-(exactly) no pain thermometer-nor can there ever be one, because the experience of pain is inseparable from personal perception and social influence such as culture. To explore chronic pain experience is to understand the process and property of the patient's perception of pain through the response to pain, the coping with pain, and the adaptation to pain. Therefore a qualitative study was conducted in order to gain an understanding of pain experience of patients with RA in korea. I used naturalistic inquiry as a research methodology, which had 5 axioms, the first is that realities are multiple, constructed, and holistic, the second is that knower and known are interactive, inseparable, the third is only time and context bound working hypotheses(idiographic statements) are possible, the forth is all entities are in a state of mutual simultaneous shaping, so that it is impossible to distinguish causes from effects and the last is that inquiry is value-bound. Purposive sampling was conducted as a sampling. 20 subjects who experienced pain over 10 years, lived in middle-sized city and big city in Korea, and 17 women and 3 men. The subject's age was from 32 to 62 (average 48.8), all were married, living with their spouse and children, except two-one divorced and the other widow before they became ill. I collected data using In depth structured interview. I had interviews two or three times with each subject, and the interviews were conducted at each subject's home. Each interview lasted about two hours an average. A recording was taken with the consent of the subject. I used inductive data analysis-such as unitizing and categorizing. unitizing is a process of coding, whereby raw data are systematically transformed and aggregated into units. Categorizing is a process wherby previously unitized data are organized into categories that provide descriptive or inferential information about the context or setting from which the units were derived. This process is used constant comparative method. The pain controlling process is composed of behavior of pain control. The behaviors of pain control are rearranging of ADL, hiddening role conflict, balancing treatment, and changing social relation. Rearranging of ADL includes diet management, sleep management, and the adjustment of daily life activities. The subjects try to rearrange their daily activities by modified style of motions, rearranging time span & range of activities, using auxillary facilities, and getting help in order to keep on the pace of daily life. Hiddening role conflict means to reduce conflicts between sick role and their role as a family member. In this process, the subjects use two modes, one is to control the pain complaints, and the other is to internalize the value which is to stay home is good for caring her children and being a good mother. To control pain complaints is done by 'enduring', 'understanding' the other family members, or making them undersood in order to reduce pain. Balancing treatment is composed of two aspects. One is to keep the pain within the endurable level, the other is to keep in touch with medical personnel in order to get the information of treatment and emotional support. Changing social relation is made by information seeking and sharing, formation of mutual support relation, and finally simplification of social relationships. The subjects simplify their social relationships by refraining from relations with someone who makes them physically and psychologically strained. In particular the subjects are apt to avoid contact with in-laws, and the change of relation to in-laws results in lessening the family boundary. In the course of this process, they confront the crisis of family confict result in family dissolution. This crisis is related to the threat of self-existence. Findings from this study contribute to understanding the chronic pain experience. To advance this study, we should compare this result with other cases in different cultural contexts. I think to interpret these results, korean cultural background should be considered. Especially the different family concept, more broader family members and kinship network, and the traditional medical knowledge influences patients' behavior.

  • PDF

A Study on Interactions of Competitive Promotions Between the New and Used Cars (신차와 중고차간 프로모션의 상호작용에 대한 연구)

  • Chang, Kwangpil
    • Asia Marketing Journal
    • /
    • v.14 no.1
    • /
    • pp.83-98
    • /
    • 2012
  • In a market where new and used cars are competing with each other, we would run the risk of obtaining biased estimates of cross elasticity between them if we focus on only new cars or on only used cars. Unfortunately, most of previous studies on the automobile industry have focused on only new car models without taking into account the effect of used cars' pricing policy on new cars' market shares and vice versa, resulting in inadequate prediction of reactive pricing in response to competitors' rebate or price discount. However, there are some exceptions. Purohit (1992) and Sullivan (1990) looked into both new and used car markets at the same time to examine the effect of new car model launching on the used car prices. But their studies have some limitations in that they employed the average used car prices reported in NADA Used Car Guide instead of actual transaction prices. Some of the conflicting results may be due to this problem in the data. Park (1998) recognized this problem and used the actual prices in his study. His work is notable in that he investigated the qualitative effect of new car model launching on the pricing policy of the used car in terms of reinforcement of brand equity. The current work also used the actual price like Park (1998) but the quantitative aspect of competitive price promotion between new and used cars of the same model was explored. In this study, I develop a model that assumes that the cross elasticity between new and used cars of the same model is higher than those amongst new cars and used cars of the different model. Specifically, I apply the nested logit model that assumes the car model choice at the first stage and the choice between new and used cars at the second stage. This proposed model is compared to the IIA (Independence of Irrelevant Alternatives) model that assumes that there is no decision hierarchy but that new and used cars of the different model are all substitutable at the first stage. The data for this study are drawn from Power Information Network (PIN), an affiliate of J.D. Power and Associates. PIN collects sales transaction data from a sample of dealerships in the major metropolitan areas in the U.S. These are retail transactions, i.e., sales or leases to final consumers, excluding fleet sales and including both new car and used car sales. Each observation in the PIN database contains the transaction date, the manufacturer, model year, make, model, trim and other car information, the transaction price, consumer rebates, the interest rate, term, amount financed (when the vehicle is financed or leased), etc. I used data for the compact cars sold during the period January 2009- June 2009. The new and used cars of the top nine selling models are included in the study: Mazda 3, Honda Civic, Chevrolet Cobalt, Toyota Corolla, Hyundai Elantra, Ford Focus, Volkswagen Jetta, Nissan Sentra, and Kia Spectra. These models in the study accounted for 87% of category unit sales. Empirical application of the nested logit model showed that the proposed model outperformed the IIA (Independence of Irrelevant Alternatives) model in both calibration and holdout samples. The other comparison model that assumes choice between new and used cars at the first stage and car model choice at the second stage turned out to be mis-specfied since the dissimilarity parameter (i.e., inclusive or categroy value parameter) was estimated to be greater than 1. Post hoc analysis based on estimated parameters was conducted employing the modified Lanczo's iterative method. This method is intuitively appealing. For example, suppose a new car offers a certain amount of rebate and gains market share at first. In response to this rebate, a used car of the same model keeps decreasing price until it regains the lost market share to maintain the status quo. The new car settle down to a lowered market share due to the used car's reaction. The method enables us to find the amount of price discount to main the status quo and equilibrium market shares of the new and used cars. In the first simulation, I used Jetta as a focal brand to see how its new and used cars set prices, rebates or APR interactively assuming that reactive cars respond to price promotion to maintain the status quo. The simulation results showed that the IIA model underestimates cross elasticities, resulting in suggesting less aggressive used car price discount in response to new cars' rebate than the proposed nested logit model. In the second simulation, I used Elantra to reconfirm the result for Jetta and came to the same conclusion. In the third simulation, I had Corolla offer $1,000 rebate to see what could be the best response for Elantra's new and used cars. Interestingly, Elantra's used car could maintain the status quo by offering lower price discount ($160) than the new car ($205). In the future research, we might want to explore the plausibility of the alternative nested logit model. For example, the NUB model that assumes choice between new and used cars at the first stage and brand choice at the second stage could be a possibility even though it was rejected in the current study because of mis-specification (A dissimilarity parameter turned out to be higher than 1). The NUB model may have been rejected due to true mis-specification or data structure transmitted from a typical car dealership. In a typical car dealership, both new and used cars of the same model are displayed. Because of this fact, the BNU model that assumes brand choice at the first stage and choice between new and used cars at the second stage may have been favored in the current study since customers first choose a dealership (brand) then choose between new and used cars given this market environment. However, suppose there are dealerships that carry both new and used cars of various models, then the NUB model might fit the data as well as the BNU model. Which model is a better description of the data is an empirical question. In addition, it would be interesting to test a probabilistic mixture model of the BNU and NUB on a new data set.

  • PDF

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Effects of Lipopolysaccride-induced Stressor on the Expression of Stress-related Genes in Two Breeds of Chickens (Lipopolysaccride 감염처리가 닭의 품종간 스트레스연관 유전자 발현에 미치는 영향)

  • Jang, In Surk;Sohn, Sea Hwan;Moon, Yang Soo
    • Korean Journal of Poultry Science
    • /
    • v.44 no.1
    • /
    • pp.1-9
    • /
    • 2017
  • The objective of the present study was to determine the expression of genes associated with lipopolysaccharide (LPS)-induced stressor in two breeds of chickens: the Korean native chicken (KNC) and the White Leghorn chicken (WLH). Forty chickens per breed, aged 40 weeks, were randomly allotted to the control (CON, administered the saline vehicle) and LPS-injected stress groups. Samples were collected at 0 and 48 h post-LPS injection, and total RNA was extracted from the chicken livers for RNA microarray and quantitative real-time polymerase chain reaction (qRT-PCR) analyses. In response to LPS, 1,044 and 1,193 genes were upregulated, and 1,000 and 1,072 genes were downregulated in the KNC and WLH, respectively, using a ${\geq}2$-fold cutoff change. A functional network analysis revealed that stress-related genes were downregulated in both KNC and WLH after LPS infection. The results obtained from the qRT-PCR analysis of mRNA expression of heat shock 90 (HSP90), 3-hydroxy-3-methylglutaryl-CoA reductase (HMGCR), activating transcription factor 4 (ATF4), sterol regulatory element-binding protein 1 (SREBP1), and X-box binding protein 1 (XBP1) were confirmed by the results of the microarray analysis. There was a significant difference in the expression of stress-associated genes between the control and LPS-injected KNC and WLH groups. The qRT-PCR analysis revealed that the stress-related $HSP90{\alpha}$ and HMGCR genes were downregulated in both LPS-injected KNC and WLH groups. However, the HSP70 and $HSP90{\beta}$ genes were upregulated only in the LPS-injected KNC group. The results suggest that the mRNA expression of stress-related genes is differentially affected by LPS stimulation, and some of the responses varied with the chicken breed. A better understanding of the LPS-induced infective stressors in chicken using the qRT-PCR and RNA microarray analyses may contribute to improving animal welfare and husbandry practices.

Islamist Strategic Changes against U.S. International Security Initiative (미국(美國)의 대외안보전략(對外安保戰略)에 대응한 이슬람Terrorism의 전술적(戰術的) 진화(進化))

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.517-534
    • /
    • 2007
  • Since the beginning of human society, there have always been struggles and competitions for survival and prosperity, terrorism is not a recent phenomenon, however in modern times it has progressed to reflect the advances in civilization and power structures. At the time of the 9.11 terrorist attacks in the U.S. A., a new world order was in the process of being established after the breakdown of the Cold War era. The attacks drove both the Western and the Islamic worlds into heightened fear of terrorism and war, which threatened the quality of life of the whole mankind. Through two war campaigns against the Islamic world, it seems the U.S. has been pushing its own militaristic security road map of the Greater Middle East democratic initiative, justifying it as a means to retaliate and eradicate the terrorist threats towards themselves. However, with its five-year lopsided victories that cost the nation almost four thousand military casualties, and the war expenses that could match the Vietnam war, the U.S. does not yet seem to be totally emancipated from the fears of terrorism. Terrorism, in itself, is a means of resisting forced rules a form of alternative competition by the weak against the strong, and a way of expressing a dismissive response against dictatorial ideas or orders which allow for no normal changes. Intrinsically, the nature of terrorism is a reaction opposing power logics. Confronted with the absolute military power of the U.S., the Islamic strategies of terrorism have begun to rapidly evolve into a new stage. The new strategies take advantage of their civilization and circumstances, they train and inspire their front-line fighters on the Internet, and issue their orders through the clandestine network of the Al Qaeda operatives. These spontaneously generated strategies have been gained speed among the second, and third Islamic generations, many of whom are now spread throughout western societies. This represents a failure of the power-driven, one-sided overseas security initiatives by the U.S., and is creating a culture of fear and distrust in western societies. It is feared that the U.S. war campaigns have made the clash of religions far worse than before, and may ever lead to global ethnic separations and large-scale population movements. Eventually, it may result in the terrorist groups, enlarged and secretly supported by the huge sums of oil money, driving all mankind into a series of irreparable catastrophes.

  • PDF

Utility-Based Video Adaptation in MPEG-21 for Universal Multimedia Access (UMA를 위한 유틸리티 기반 MPEG-21 비디오 적응)

  • 김재곤;김형명;강경옥;김진웅
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.325-338
    • /
    • 2003
  • Video adaptation in response to dynamic resource conditions and user preferences is required as a key technology to enable universal multimedia access (UMA) through heterogeneous networks by a multitude of devices In a seamless way. Although many adaptation techniques exist, selections of appropriate adaptations among multiple choices that would satisfy given constraints are often ad hoc. To provide a systematic solution, we present a general conceptual framework to model video entity, adaptation, resource, utility, and relations among them. It allows for formulation of various adaptation problems as resource-constrained utility maximization. We apply the framework to a practical case of dynamic bit rate adaptation of MPEG-4 video streams by employing combination of frame dropping and DCT coefficient dropping. Furthermore, we present a descriptor, which has been accepted as a part of MPEG-21 Digital Item Adaptation (DIA), for supporting terminal and network quality of service (QoS) in an interoperable manner. Experiments are presented to demonstrate the feasibility of the presented framework using the descriptor.