• Title/Summary/Keyword: 우회 경로

Search Result 230, Processing Time 0.019 seconds

Anticoagulant Therapy for Left Ventricular Thrombosis after Dor Procedure (Dor 술식 후 좌심실 혈전증에서의 항응고제의 역할)

  • Baek, Man-Jong;Na, Chan-Young;Oh, Sam-Se;Kim, Woong-Han;Whang, Sung-Wook;Lee, Cheol;Chang, Yun-Hee;Jo, Won-Min;Kim, Jae-Hyun;Seo, Hong-Ju;Kang, Ho-Kyong;Moon, Hyun-Soo;Park, Young-Kwan;Kim, Chong-Whan
    • Journal of Chest Surgery
    • /
    • v.36 no.7
    • /
    • pp.518-522
    • /
    • 2003
  • Left ventricular thrombosis is a frequent and potentially dangerous complication in acute myocardiac infarction, but its occurrence and adequate therapy has not been known in patients with Dor procedure for the ischemic cardiomyopathy. We report a patient, 45 year-old male, who had a new left ventricular thrombus developed after coronary arterial bypass graft, Dor procedure, and removal of the left ventricular thrombus for ischemic car-diomyopathy. Left ventricular thrombus was disappeared on the follow-up cardiac MRI following intravenous heparin injection and oral coumadin therapy. This case suggest that anticoagulation therapy may prevent patients with the severe left ventricular dysfunction and apical aneurysm and dyskinesia from developing the left ventricular thrombus, and that thrombi will resolve without clinical evidence of systemic embolism.

Analysis of the Research Trend and Developmental Direction against the VDS Data (차량검지기 자료 관련 연구동향 분석 및 발전방향)

  • Kim, Han-Soo;Park, Dong-Joo;Shin, Seung-Jin;Beck, Seung-Kirl;NamKoong, Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.1 s.12
    • /
    • pp.13-26
    • /
    • 2007
  • A VDS data in the domestic has been used within limits to real time information such as congestion management, incident management, and route guidance service. On the other hand, a VDS data in the foreign countries had been used to various objectives such as transportation policy assessment, transportation construction evaluation, franc safety improvement, and etc. The scope and method of the study is the VDS data which was installed in the uninterrupted flow such as the freeway and the interrupted flow in a diversion route of the leeway. It has investigated and analyzed the VDS as our subject to study, study objective and study methodology for each study generally classified as 1) data collection 2) data processing 3) data store and 4) data quality section. This study has investigated and analyzed the various literatures in domestic and foreign countries regarding the VDS data. And It drew the development direction of the study which is about VDS data in domestic from now.

  • PDF

Evaluation on Effectiveness of the Parallel Importation Policy in Korea: Luxury Apparel Brands (한국의 병행수입에 따른 정책의 유효성 평가: 럭셔리 의류브랜드)

  • Kwon, Soongi
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.25 no.9
    • /
    • pp.1583-1592
    • /
    • 2001
  • 연구의 목적은 병행수입제도의 정책운용적인 관점에서 고가품 수입의 큰 비중을 차지 하고있는 럭셔리의류 브랜드를 중심으로 병행수입제도 도입 이후 현 시점에서 공정경쟁의 관점에서 병행수입의 문제점 추출과 대안을 도출함으로써 정책적 시사점을 제시하고자 한다. 연구 방법은 문헌조사와 in-depth 인터뷰를 실시하였다. 연구 결과 제도적 측면에서는 병행수입제도 도입 당시 병행수입과 직접 관련된 지적재산법과 독점규제법 사이에는 전용사용권자의 보호와 규제라는 입법적 목적이 서로 다른 이유로 병행수입 도입 여부에 대한 논란이 있는 것으로 나타났다 , 상표권 침해 기준의 모호, 세관절차에 있어서의 문제점 등이 추출되었다. 럭셔리의류 산업적 측면에서 병행수입제도는 수입물품의 가격인하를 선도하여 소비자 이익 증진에 기 여 하는 반면에 명품의 유통경로가 다양해짐에 따라 위조상품의 처벌실적 이 증가하고, 이월상품과overrun된 제품의 저가수입 등의 문제점이 야기되고 있다. 이에 대한 정책적 해결방안으로는 공정거래법의 개정을 통한 병행수입 허용기준의 보완, 지적재산권법 에 병행수입허용 규정 명시 , 소비자 관점에서의 병행수입 제품에 대한 정확한 정보의 전달 등의 내용 보완이 이루어져 야 한다. 본 연구의 시사점은 정책당국에게 경쟁조건의 Global Standard라는 견지에서 제도적 운용의 개선이 시급히 이루어져야 하는 논거와 토대를 제공하였다. 또한 전용사용권자와 병행수입업체에는 정보의 비대칭성에 의존한 판매전략을 지양하고 소비자 보호와 적 정 한 상표권 보호의 합리적 조화가 궁극적으로 생존의 핵심전략임을 인식시켜 줄 수 있는 계기를 마련해 주었다.가치관은 이들의 의복관심과 의복착용 그리고 구매에 지대한 영향을 미친다는 것을 알 수 있다.포제로 평가되었다. 모든 남자포제가 전통적, 순수한 이미지의 포제로, 철릭을 제외한 모든 포제가 단순한 이미지로 나타나 조선시대 남자 포제가 공통적으로 가지는 이미지는 단순하고 순수한 이미지를 가지고 있음을 알 수 있다. 3. 남자 포제의 시기별 복식이미지에서는 조선전기(철릭, 답호, 직령)의 포제는 관할성 요인이 높은 의례적인, 관할한, 특이한 이미지로 평가되었고 조선중기(도포, 창의)의 포제는 품위있는, 절제된, 풍성한 이미지로 평가되었으며, 조선후기(주의)의 포제는 활동적인, 단순한, 직선적인 이미지로 나타났다. 따라서 시대별 남자 포제의 이미지는 시대적 여건과 상황에 따라 변화되어 왔으며, 시대에 따라 추구하는 이미지가 달랐다는 것을 알 수 있이러한 논란의 해결방안으로 관세법 고시에 의한 우회적 도입을 결정한 정부의 방침에 대해 제도적 측면에서의 문제점으로 저작권 침해 기준의 결여다.lavonoid 함량의 판단지표로 활용될 수 있을 것으로 사료되었다.

  • PDF

Location Privacy Enhanced Routing for Sensor Networks in the Presence of Dormant Sources (휴면 소오스들이 존재하는 환경의 센서 네트워크를 위한 위치 보호 강화 라우팅)

  • Yang, Gi-Won;Lim, Hwa-Jung;Tscha, Yeong-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.12-23
    • /
    • 2009
  • Sensor networks deployed in battlefields to support military operations or deployed in natural habitats to monitor the rare wildlifes must take account of protection of the location of valuable assets(i.e., soldiers or wildlifes) from an adversary or malicious tracing as well as the security of messages in transit. In this paper we propose a routing protocol GSLP(GPSR-based Source-Location Privacy) that is capable of enhancing the location privacy of an active source node(i.e., message-originating node) in the presence of multiple dormant sources(i.e., nodes lying nearby an asset whose location needs to be secured). Extended is a simple, yet scalable, routing scheme GPSR(greedy perimeter stateless routing) to select randomly a next-hop node with a certain probability for randomizing paths and to perform perimeter routing for detouring dormant sources so that the privacy strength of the active source, defined as safety period, keeps enhanced. The simulation results obtained by increasing the number of dormant sources up to 1.0% of the total number of nodes show that GSLP yields increased and nearly invariant safety periods, while those of PR-SP(Phantom Routing, Single Path), a notable existing protocol for source-location privacy, rapidly drop off as the number of dormant sources increases. It turns out that delivery latencies of GSLP are roughly less than two-fold of the shortest path length between the active source and the destination.

Surgical Treatment and Analysis of Esophageal Diseases (식도 질환의 외과적 치료 및 분석)

  • Choe, Yeong-Ho;Jo, Seong-Jun;Jo, Won-Min;Kim, Gwang-Taek
    • Journal of Chest Surgery
    • /
    • v.29 no.10
    • /
    • pp.1123-1128
    • /
    • 1996
  • A clinical study was performed on 152 cases of surgical esophageal disease treated by the Department of Thoracic & Cardiovascular Surgery of Korea University Hospital from Jan. 1989 through July 1994. The most common esophageal disease was cancer which was seen in 73 cases (48%) among 152 cases. All were treated surgically' 52 patients (71%) were managed by curative or palliative resection with reconstruction and feeding gastrostomy or jejunostomy, otherwise Celestine tube insertion was performed on the remaining 21 patients for palliatio'n. Esophageal leiomyoma occurred in 6 cases(3.9%), among them 1 case was performed with trio recoscopic enucleation . Achalasia were in 7 cases (4.6%) and was treated with modified Heller's m otomy and with Belsey Mark IV operation. Diverticulum were in 11 cases (7.2%). Esophageal stricture occurred in 20 cases (14.1 %) and 17 of 20 cases were managed with bypass surgery. Esophageal perforation was seen in 20 cases, its cause was instrumental trauma in 7 cases, stab wound in 4 cases, foreign body in 4 cases, spontaneous perforation in 3 cases, and others 1 case Other disease including congenital lesion was seen In 1 Scases.

  • PDF

Analysis of Traffic Safety Facilities in Pedestrian Protection Area: Focusing on Variable Speed Limit Signs and Beacons (보행자 보호구역의 교통안전시설물 효과분석: 가변형속도제한표지와 비콘 중심으로)

  • Kim, Joong Hyo;Ha, Dong Ik;Park, Min Chul;Song, Won Chul;Ha, Tae Jun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.5
    • /
    • pp.121-133
    • /
    • 2017
  • Since the mid 1990s, policies have been actively promoted to improve safety and pedestrian environment around the school such as the improvement of School zone. However, the prevention of accidents was not effective because it did not extend to the school road where the main transportation route for children's commuting takes place. In addition, due to the rapid increase of automobiles, trunk road traffic in the peak time bypasses the back roads, which threatens children's safety and the environment by invading the school area, which is the main living space of children. In this study, the characteristics of domestic children's traffic accidents were investigated and the problems were analyzed by conducting a field survey on Yeouido Secondary School in Seoul and Unjung Elementary School in Gyeonggi Province. In addition, Variable speed limit signs and Beacons were installed in the pedestrian road of comunity including School zone, and the effects of facilities on the speed of vehicles were analyzed. As a result of the analysis, the Variable speed limit sign showed a deceleration effect of about 8.3km/h, and the Beacon showed a phenomenon in which the traveling speed of 0.8km/h increased only slightly. In addition, the traffic violation rate of passenger cars, buses, and lorries decreased by about 3% as a result of investigating the number of traffic violation vehicles before and after installation.

A Study on the Effectiveness of Remanufacturing Technology for the Catalyzed Diesel Particulate Filter-trap(DPF) Deactivated by Diesel Exhaust Gas (촉매가 담지된 사용후 경유차 매연저감장치 DPF의 재제조 효과에 관한연구)

  • Choi, Kang-Yong;Park, Hea-Kyung
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.32 no.10
    • /
    • pp.957-964
    • /
    • 2010
  • The deactivated catalyzed diesel particulate filter-trap (DPF) was remanufactured by ultrasonic wave treatment with various prepared solutions, followed by active component re-impregnation, and the emission control performance and surface properties of remanufactured DPF were studied at various remanufacturing conditions. The proper ultrasonic wave cleaning time at various prepared solutions and optimal re-impregnation amounts of active component for the best emission control performance of DPF were investigated and its performance tests were also carried out with various temperatures for the conversions of CO, THC (total hydrocarbon) and PM (particulate matter) by catalytic reaction test unit using bypass gas from the diesel engine dynamo system. It was found that the emission control performance of DPF remanufactured with the high-temperature air washing, ultrasonic wave cleaning at acid/base solutions and active component re-impregnation method was recovered to 95% level of its activity compared to that of the fresh DPF, which was caused by removing the deactivating materials from the surface of the DPF, through the analyses of performance test and their surface characterization by Optical microscope, EDX, ICP, TGA, and porosimeter.

Channel Assignment and Routing using Traffic Profiles in Wireless Mesh Networks (무선 메쉬 네트워크에서 트래픽 프로파일을 고려하는 채널 할당 및 라우팅)

  • Park, Sook-Young;Lee, Sang-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.374-385
    • /
    • 2010
  • Wireless mesh networks can be deployed for various networks from home networking to last-mile broadband Internet access. Wireless mesh networks are composed of mesh routers and mesh clients. In these networks, static nodes form a multi-hop backbone of a large wireless access network that provides connectivity to end-users' mobile terminals. The network nodes cooperate with each other to relay data traffic to its destinations. In order to increase connectivity and better performance, researchers are getting interested in multi-channel and multi-interface wireless mesh networks. In these networks, non-overlapping multiple frequency channels are used simultaneously to increase the aggregate bandwidth available to end-users. Recently, researches have focused on finding suitable channel assignments for wireless network interfaces, equiped in a mesh node, together with efficient routing to improve overall system throughput in wireless mesh networks. This goal can be achieved by minimize channel interference. Less interference among using channels in a network guarantees more aggregated channel capacity and better connectivity of the networks. In this thesis, we propose interference aware channel assignment and routing algorithms for multi-channel multi-hop wireless mesh networks. We propose Channel Assignment and Routing algorithms using Traffic Profiles(CARTP) and Routing algorithms allowing detour routing(CARTP+2). Finally, we evaluate the performance of proposed algorithms in comparison to results from previous methods using ns-2 simulations. The simulation results show that our proposed algorithms can enhance the overall network performance in wireless mesh networks.

Evaluation of SWMM Snow-melt Module to Secure Bi-Modal Tram Operation (바이모달 트램 운행 안전성 확보를 위한 SWMM 융설 모듈 적용성 평가)

  • Kim, Jong-Gun;Park, Young-Kon;Yoon, Hee-Taek;Park, Youn-Shik;Jang, Won-Seok;Yoo, Dong-Seon;Lim, Kyoung-Jae
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.5
    • /
    • pp.441-448
    • /
    • 2008
  • Increasing urban sprawl and climate changes have been causing unexpected high-intensity rainfall events. Thus there are needs to enhance conventional disaster management system for comprehensive actions to secure safety. Therefore long-term and comprehensive flood management plans need to be well established. Recently torrential snowfall are occurring frequently, causing have snow traffic jams on the road. To secure safety and on-time operation of the Bi-modal tram system, well-structured disaster management system capable of analyzing the show pack melt/freezing due to unexpected snowfall are needed. To secure safety of the Bi-modal tram system due to torrential snow-fall, the snow melt simulation capability was investigated. The snow accumulation and snow melt were measured to validate the SWMM snow melt component. It showed that there was a good agreement between measured snow melt data and the simulated ones. Therefore, the Bi-modal tram disaster management system will be able to predict snow melt reasonably well to secure safety of the Bi-modal tram system during the winter. The Bi-modal tram disaster management system can be used to identify top priority area for know removal within the tram route in case of torrential snowfall to secure on-time operation of the tram. Also it can be used for detour route in the tram networks based on the disaster management system prediction.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.