• Title/Summary/Keyword: 개인 프로파일

Search Result 649, Processing Time 0.028 seconds

The Effect of female Hormone on Knee Joint Laxity (여성 호르몬이 무릎의 느슨함(laxity)에 미치는 영향)

  • Park, Sang-Kyoon
    • Korean Journal of Applied Biomechanics
    • /
    • v.19 no.1
    • /
    • pp.99-106
    • /
    • 2009
  • The purpose of this study was to determine whether hormone levels change knee laxity in healthy females. Twenty three healthy females were recruited for the study. Serum estradiol and progesterone levels were recorded three times during the subjects' menstrual cycles. The first measurements were taken between day 3 and 7 of the follicular phase and the second data collection coincided with ovulation, 24 to 48 hours after the estrogen surge detected by an ovulation predictor kits. Based on a 28 day cycle, the third data collection occurred approximately 7 days later during the luteal phase. Knee joint laxity was recorded at the same intervals with a KT 2000 arthometer. Hormone levels and phases were compared to passive knee joint laxity with multiple regression analysis. Estradiol and progesterone levels differed significantly across the three tests. Knee joint laxity increased during ovulation. Based on a multiple regression analysis, estradiol and progesterone levels predicts 77.9% to 80.9% of the laxity at 20lb and 30lb loads. An antagonistic relationship between estradiol and progesterone was found when testing for knee laxity. Serum hormone levels have moderate power in predicting knee joint laxity. Individual hormonal profiling in female athletes would allow researchers to access the structural properties of the ACL, such as the laxity which may provide beneficial information to understand female ACL injury mechanism in sports activity.

Correlation of Sleep and Sensory Processing Patterns With University Students (대학생의 수면과 감각처리 특성의 상관관계)

  • Lee, Ye-Jin;Kim, Ga-Yeon;Kim, Lee-Jin;Park, So-Bin;Park, Si-Won;Kim, Kyeong-Mi
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.15 no.1
    • /
    • pp.33-45
    • /
    • 2017
  • Objective : This study was to investigate the relationship between sensory processing patterns and sleep quality for poor sleepers enrolled in universities. Methods : The participants are 191 students, aged 18 to 25, at the 6 universities located in Busan, Daegu, and other Gyeongsang Provinces. These participants completed the Korean version of Adolescent/Adults Sensory Profile (AASP) and the Pittsburgh Sleep Quality Index (PSQI). Results : The group with lower sleep quality of this study participants suggested low but positive correlation with sleep disturbance which is one of sleep quality components of the PSQI. Low sensory registration suggested high positive correlation and Sensory sensitivity suggested low positive correlation with daytime dysfunction. Conclusion : We identified that sensory processing patterns and sleep quality may influence each other and sleep quality can be more significantly influenced by specific sensory processing pattern. More studies requires on sleep quality and sensory processing patterns in children, adults, and elders.

The Implementation of Sign Board Receiving DARC for Vehicle (차량용 FM 부가 방송 수신 전광판의 구현)

  • 김남두;최재석;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.560-565
    • /
    • 2002
  • In this paper, we implemented the sign board system that displays user's image, user's sentence, the information from DARC an[1 information based position by GPS module for vehicle. The existing sign board is displaying only user's image and sentence. Or other existing sign board is displaying the information via CDMA network. However, our system is also able to display the user's message like other system and gain the information more cheap by DARC. This system consists of 6 parts. The DARC control part classes the DARC information - news, weather, stock and time. The GPS control part gains moment and item to display with calculating the information of global position, direction, speed and satellite. The LED control part has two buffers to store and handle the image. The buffers help the system display various effected images on LED board. An external memory card includes the location based data, the option file and the displayed data files. The data files are stored by FAT 16 with the folder structure on external memory card. The USB controls the communication with PC. PC programs can control and monitor this system. This system is using G72l voice file format, for casting the information. This system was established at the vehicle and we monitored this system. The system displayed the DARC data , user's data and the location based data on the LED board, successfully.

  • PDF

Comparative analysis of distance measurement on the rendering screen between dental CAD programs (치과용 CAD 프로그램의 렌더링 화면상 거리측정 비교분석)

  • Cha, Cheol-Ho;Lim, Seon-Young;Bang, Ju-Hyuk;Kim, Seong-Ah;Kim, Seong-Yong;Lee, Yong-Sang
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.59 no.1
    • /
    • pp.11-17
    • /
    • 2021
  • Purpose: This study was to find out whether the rendering screen difference affect to measuring distance in a CAD program according to three types of CAD programs. Materials and methods: The model presented in ISO 12836 for dental scanner evaluation was reduced by 70%. This model was repeatedly scanned 15 times using Trios II (3Shape, Denmark). Using the output STL file, 3Shape CAD, inLab 15, and ExoCAD programs were used to measure the horizontal distance (H) and vertical distance (V) between adjacent point angle, and for each experiment, three groups were set according to the CAD program type. Statistical analysis was performed using One-way ANOVA test and post hoc was performed using Dunnett T3 test. Results: In the horizontal and vertical distance measurement, there was no difference in the average of the measured values between the three groups according to the CAD program (P>.05). Conclusion: There were no effect of the difference in the rendering screen in the horizontal and vertical linear distance measurements of the inlay model on the dental CAD program.

A Study on PAI Traits of Beauty Major Male Students (미용전공 남학생의 특성비교 연구)

  • Koh, SungYoun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.8
    • /
    • pp.587-595
    • /
    • 2022
  • In this study, in order to understand the social psychological characteristics of college male students majoring in beauty, PAI tests were conducted on 163 university students located in Gyeonggi-do and Chungnambuk area in 2020. First, when comparing the average scales of men who majored in beauty and men who majored in general, the major male students of beauty showed an overall high clinically recognized type compared to students who majored in beauty, and a negative impression on a valid scale (NIM) considered treatment for physical complaints (SOM), depression (DEP) and drinking problems (ALC) on a clinical scale, and a significant difference was shown on a suicide idea (SUI) scale. Secondly, in order to navigate the PAI scale that significantly predicts beauty major male students, a stepwise regression analysis was performed using 15 significant scales as search factors in comparison between beauty major male and general major male students. As a result, physical complaints (SOM) and depression (DEP) scales were extracted, which became a factor that can predict male students in beauty major. Therefore, it can be understood that the male students in the beauty major have behavior patterns that are more obsessed with and more impulsive to physical problems than the male majors. These results will provide a lot of suggestions for the selection of future male students in beauty major, selection, management, education, consultation materials, and selection of occupations after graduation.

Analysis of the Influence of Examination Gowns on the Image and the Suitable Fabrics for Chest AP Examinations on DR X-ray Systems (디지털 X-선 시스템에서 흉부 전·후 방향 검사 시 검사복이 영상에 미치는 영향과 적정 검사복 원단의 분석)

  • Eun-Bi Baek;Yoo-Jin Jeong;Su-Bin Lim;Sang-Jo Park;Yeong-Cheol Heo
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.6
    • /
    • pp.865-872
    • /
    • 2023
  • The purpose of this study was to analyze fabrics suitable for use as examination gowns to determine whether examination gowns affect imaging during anterior to posterior chest examinations(Chest AP) on a digital X-ray system. Examination gowns in use at five medical centers in Seoul were collected and included modal, tencel, cotton, and rayon fabrics. The selection of fabrics was based on studies that reported fabrics with good tactile, absorbent, stretchable, and wrinkle resistance. Phantoms of five hospital gowns and four fabrics, arranged in overlapping layers from one to eight, were created and examined on a digital X-ray system in both Chest AP examination. The images examined were subjected to a first-step profile analysis, a second-step signal intensity averaging analysis, and a third-step microscopic analysis. The results showed that all nine materials had an increasing impact on the image as the number of layers of fabric increased, with the modal fabric having the least impact on the image in the first, second, and third analyses. In conclusion, as the resolution of digital x-ray systems increases, the impact of examination clothing on the image will increase, and research to find suitable materials for examination clothing will continue to be necessary.

An Application-Specific and Adaptive Power Management Technique for Portable Systems (휴대장치를 위한 응용프로그램 특성에 따른 적응형 전력관리 기법)

  • Egger, Bernhard;Lee, Jae-Jin;Shin, Heon-Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.8
    • /
    • pp.367-376
    • /
    • 2007
  • In this paper, we introduce an application-specific and adaptive power management technique for portable systems that support dynamic voltage scaling (DVS). We exploit both the idle time of multitasking systems running soft real-time tasks as well as memory- or CPU-bound code regions. Detailed power and execution time profiles guide an adaptive power manager (APM) that is linked to the operating system. A post-pass optimizer marks candidate regions for DVS by inserting calls to the APM. At runtime, the APM monitors the CPU's performance counters to dynamically determine the affinity of the each marked region. for each region, the APM computes the optimal voltage and frequency setting in terms of energy consumption and switches the CPU to that setting during the execution of the region. Idle time is exploited by monitoring system idle time and switching to the energy-wise most economical setting without prolonging execution. We show that our method is most effective for periodic workloads such as video or audio decoding. We have implemented our method in a multitasking operating system (Microsoft Windows CE) running on an Intel XScale-processor. We achieved up to 9% of total system power savings over the standard power management policy that puts the CPU in a low Power mode during idle periods.

Design and Analysis of Data File Protection based on the Stream Cipher (데이터파일의 보호를 위한 스트림 암호방식 설계와 해석)

  • 이경원;이중한;김정호;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • Recently, as the personal computers are supplied rapidly, they formed the nucleus of the computer system. But, because of the easiness that anyone uses them to go near easily, it is the fact that the security of personal computer is weakness. So, in the paper, 1 propose the technical method that minimizes the loss and leakage of important data. This paper implemented a crypto system for security of data file on personal computer and assistance storage medium. The way of encryption/decryption is applied by complexity method which mixed Diffie-Hellman key exchange protocol, a typical RC4(Rivest Cipher version 4) algorithm of stream cipher and a typical MD5(Message Digest version 5) of Hash Function. For valuation implemented crypto system, three criteria is presented, which are crypto complexity, processing time and pattern matching. And according to analysis the three criteria the crypto system is verified the security, efficiency and usefulness. The crypto system is programmed with Visual C++ language of Microsoft. And so, as this is software system, we shall have a technical security system at a minimum cost for all personal computer.

  • PDF

Development of Programs to Analyze Mechanical Load Data of Wind Turbine Generator Systems and Case Studies on Simulation Data (풍력발전시스템의 기계적 하중 데이터 분석 프로그램 개발과 시뮬레이션 데이터 적용 사례)

  • Bang, Je-Sung;Han, Jeong-Woo;Gil, Kyehwan
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.37 no.8
    • /
    • pp.789-798
    • /
    • 2013
  • The procedures and relevant programs developed for analyzing mechanical load data of wind turbine generator systems, which are obtained through type certification tests, are verified. The following issues according to IEC 61400-13 are covered in the developed programs: data validation, time series analysis, summary load statistics, generation of fatigue load spectra, and estimation of equivalent loads. A capture matrix for normal power production is generated to determine whether the collected data sets are sufficient to carry out fatigue analysis. Fatigue load spectra are obtained through the rainflow counting method using 50 load ranges; finally, equivalent loads are calculated using different S-N curve slopes, m, according to the relevant materials. Case studies are performed using aero-elastic simulation data of the NREL 5 MW baseline wind turbine with a monopile foundation.

A Study on The Instant Messaging Security Policy in The Organizations (조직 내부에서의 인스턴트 메시징 보안 정책에 대한 연구)

  • Sattarova, Feruza;Kim, Seok-Soo;Choi, Min-Kyu;Cho, Eun-Suk;Kim, Tai-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.280-286
    • /
    • 2009
  • A policy of instant messaging usage is offered in this article. First, a brief introduction of instant messaging system structure is described. The main threats and vulnerabilities of Instant messenger (IM) are described in the second part of the paper. Instant messaging applications offer so many advantages in so many different fields that they're fast becoming the preferred communication tool for a number of different professional scenarios. When properly implemented, instant messaging can be a true asset to the business by making communications easier throughout the organization. If instant messaging is carelessly implemented, though, it can cause problems with privacy and may expose the organization to various forms of malware. The solution offered in this paper is one of the effective ways against threats of IM. However, the system cannot be secured entirely. All we can do is reducing the risks.

  • PDF