• Title/Summary/Keyword: Connection and Transmission

Search Result 462, Processing Time 0.031 seconds

The biblographical study on $T{\acute{o}}u\;f{\bar{e}}ng$ and Migraine -(Comparative study between Oriental and Western Medicine)- (두풍(頭風)과 편두통(Migraine)에 대(對)한 동서의학적(東西醫學的) 문헌고찰(文獻考察))

  • Oh, So-Jeo;Jeong, Ji-Cheon;Lee, Won-Chul
    • The Journal of Internal Korean Medicine
    • /
    • v.14 no.1
    • /
    • pp.129-138
    • /
    • 1993
  • This report on the $T{\acute{o}}u\;f{\bar{e}}ng$ and Migraine comes to conclude, through the study of the Oriental- Western medical references, as follow; 1. First, $T{\acute{o}}u\;f{\bar{e}}ng$ and Migraine had some concurrencies that both the two symptoms have appeared severe and recurrent headache and more often to the female. 2 Many of them e.g. Sensory disturbance, Vertigo, Nausea, Vomiting, Tinnitus etc. in the prodrome and main symptom of $T{\acute{o}}u\;f{\bar{e}}ng$ and Migraine were identical, especially the symptom of the $f{\bar{e}}ng\;t{\acute{a}}n\;t{\acute{o}}u\;t{\grave{o}}ng$ was similar to the prodrome of the Migraine. We could find out the semilarity of the symptoms through that Migraine is proximately set in unilateral, and $Pi{\bar{a}}nT{\acute{o}}u\;f{\bar{e}}ng$ is so called alias $B{\grave{a}}n\;bi{\bar{a}}n\;t{\acute{o}}u\;t{\grave{o}}ng$. 3. The pathogeny of $T{\acute{o}}u\;f{\bar{e}}ng$ include the case of ‘$f{\bar{e}}ng\;xi{\acute{e}}\;r{\grave{u}}\;n{\bar{a}}o$’, the patient feeling weak condition, $T{\acute{a}}n,\;T{\acute{a}}nshi,\;T{\acute{a}}nhu{\breve{o}},\;Y{\grave{u}}q{\grave{i}}$, etc. and, ‘$t{\acute{a}}n\;zhu{\grave{o}}\;sh{\grave{a}}ng\;y{\acute{a}}o$’, ‘$G{\bar{a}}n\;y{\acute{a}}ng\;hu{\grave{a}}\;f{\bar{e}}ng$’. There were variable that $F{\bar{e}}ng,\;Xu{\grave{e}},\;F{\bar{e}}ngr{\grave{a}},\;F{\bar{e}}ngx{\bar{u}},\;Xu{\grave{e}}x{\bar{u}},\;Hu{\check{o}}$ in the left, and $t{\acute{a}}n,\;R{\grave{e}},\;t{\acute{a}}nr{\grave{e}},\;Qir{\acute{a}}$ in the right partial pathogeny. It was referred $Sh{\grave{a}}o\;y{\acute{a}}ng\;j{\bar{i}}ng$, $Ju{\acute{e}}\;y{\bar{i}}n\;j{\bar{i}}ng$, $Y{\acute{a}}ng\;m{\acute{i}}ng\;j{\bar{i}}ng$, $T{\grave{a}}i\;y{\acute{a}}ng\;j{\bar{i}}ng$ in connection with the Meridian system. And otherwise the primary cause of Migraine is still unknown to us. Heredity is probably important, but the mode of transmission is uncertain. Recently, the important assumption is the vasomotor change caused by vasoconstrictors like that norepinephrine, epinephrine, and serotonin etc.

  • PDF

Epidemiological Investigation on an Outbreak of Enterotoxigenic E. coli among the Baseball Club Students of High School in Ulsan City, 2014 (2014년 울산시 일개 고등학교 야구부원들에서 발생한 장독소생성대장균의 유행에 관한 역학조사)

  • Kang, Young-Eun;Lim, Hyun-Sul;Lee, Kwan;Kim, Byung-Seok
    • Journal of agricultural medicine and community health
    • /
    • v.40 no.2
    • /
    • pp.53-61
    • /
    • 2015
  • Objectives: An outbreak of food poisoning occurred among the baseball club students at a high school in Ulsan city in 2014. An epidemiological investigation was carried out to examine the infection source and the transmission route of pathogen, and to prevent a recurrence. Methods: A questionnaire survey was conducted for 26 male students and 2 food handlers. Rectal swabs were examined in 7 students and the 2 food handlers, and an environmental investigation was performed. A retrospective cohort study was used to evaluate the association between risk factors and disease. Results: The attack rate was 35.7% (10 persons/28 persons) from June 9 to 14, and Enterotoxigenic E. coli ST/LT was isolated from 7 among 28 persons. The study revealed that no food was a significant risk factor for the outbreak. There were no connection between environmental factors and the outbreak. Conclusions: The major risk factors for this outbreak were presumed to be the contaminated ice cube and ice making machines and eating ice cube from the machines. More strict personal and environmental hygiene need to be enforced to prevent such outbreaks.

Conductive Yarn Stitch Circuit Design and Output Power Analysis for Power Transfer in Solar Wearable Energy Harvesting (태양광 웨어러블 에너지 하베스팅의 전력 전달을 위한 최적의 전도사 스티치 회로 설계 및 출력 전력 분석)

  • Jun-hyeok Jang;Ji-seon Kim;Jung-Eun Yim;Jin-Yeong Jang;Jooyong Kim
    • Science of Emotion and Sensibility
    • /
    • v.25 no.4
    • /
    • pp.119-128
    • /
    • 2022
  • This study analyzes the effects of the number of angles and bends on resistance in a conductor-embroidered stitch circuit for efficient power transfer through a conductor of wearable energy harvesting to study changes in power lost through connection with actual solar panels. In this study, the angle of the conductive stitch circuit was designed in units of 30˚, from 30˚ to 180˚, and the resistance was measured using an analog Discovery 2 device. The measured resistance value was analyzed, and in the section of the angle where the resistance value rapidly changes, it was measured again and analyzed in units of 5˚. Following this, from the results of the analysis, the angle at which the tension was applied to the stitch converges was analyzed, and the resistance was measured again by varying the number of bends of the stitch at the given angle. The resistance decreases as the angle of the stitch decreases and the number of bends increases, and the conductor embroidery stitch can reduce the loss of power by 1.61 times relative to general embroidery. These results suggest that the stitching of embroidery has a significant effect on the power transfer in the transmission through the conductors of wearable energy harvesting. These results indicate the need for a follow-up study to develop a conductor circuit design technology that compares and analyzes various types of stitches, such as curved stitches, and the number of conductors, so that wearable energy harvesting can be more efficiently produced and stored.

Operation and Analysis of Network for Multivendor PLC Group Management in the Wall Paper Process (발포 벽지 공정에서 이기종 PLC 그룹 관리를 위한 네트워크 운영과 해석)

  • Gang, Seong-Deok;Lee, Dong-Chun;Kim, Jeong-Ho;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.2
    • /
    • pp.283-294
    • /
    • 1996
  • To operate the automatic devices of manufacturing process more effectively and to solve the needs of the resource sharing, network technology is applied to the unit control devices located in common manufacturing zone and operated by connecting them. This paper introduces deign and test operation of cell system for the management of multivendor PLC by applying to wall paper process based on the manufacturing standardization of CIM. The analysis of designed multivendor PLC group is performed by selecting the parameters such as variation of data packet size and node number of PLC ladder logic program and variation by analyzing the corresponding variation values of token rotation time and waiting time for the system operation. For the method of the analysis,the equation is considering the overhead such as indicated packet service time and transmission safety margin for PLC network connection in M/G/1 queue model,and it is applied to the cell system and PLC group manage-ment for operation .Through the experiment,it is found that the realtime processing is possible with expanded and better result than the resuit obtained by Jayasumana.Browaka with PLC scan time considered,response lower limit of 10-20 msec. data packet size not more than 50 bytes.and the number of nodes less than 40.

  • PDF

BIM Mesh Optimization Algorithm Using K-Nearest Neighbors for Augmented Reality Visualization (증강현실 시각화를 위해 K-최근접 이웃을 사용한 BIM 메쉬 경량화 알고리즘)

  • Pa, Pa Win Aung;Lee, Donghwan;Park, Jooyoung;Cho, Mingeon;Park, Seunghee
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.2
    • /
    • pp.249-256
    • /
    • 2022
  • Various studies are being actively conducted to show that the real-time visualization technology that combines BIM (Building Information Modeling) and AR (Augmented Reality) helps to increase construction management decision-making and processing efficiency. However, when large-capacity BIM data is projected into AR, there are various limitations such as data transmission and connection problems and the image cut-off issue. To improve the high efficiency of visualizing, a mesh optimization algorithm based on the k-nearest neighbors (KNN) classification framework to reconstruct BIM data is proposed in place of existing mesh optimization methods that are complicated and cannot adequately handle meshes with numerous boundaries of the 3D models. In the proposed algorithm, our target BIM model is optimized with the Unity C# code based on triangle centroid concepts and classified using the KNN. As a result, the algorithm can check the number of mesh vertices and triangles before and after optimization of the entire model and each structure. In addition, it is able to optimize the mesh vertices of the original model by approximately 56 % and the triangles by about 42 %. Moreover, compared to the original model, the optimized model shows no visual differences in the model elements and information, meaning that high-performance visualization can be expected when using AR devices.

A Study on the standardization of ETCS (Focused on RF) (자동요금징수시스템(ETCS) 표준화 연구(주파수방식을 중심으로))

  • Kwon, Han-Joon;Lee, Ki-Hyun;Kim, Yong-Deak
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.62-73
    • /
    • 2008
  • In this paper, domestic standard revision plan of dynamic frequency method which is used both in unmanned automatic toll collection system and manned collection system of the express highway is presented. For such ETCS, the infrared rays (870 nm) of active frequency method and the frequency integrated method (5.8 GHz) are adopted and extended to be operated to the all around the Toll Gate. This standardization plan is based on inter connection reference model between OSI (Open System Interconnection) in process of ITS short range radio communication standardization of 5.8 GHz bandwidth to support traffic information and control system service, and the derived revision plan by starting from physical layer which support interoperability for multiple access between RSE (Road Side Equipment) and OBE (On Board Equipment), in which is categorized into physical layer, data link layer, and application layer. In case of radiation power, existing standard is divided by class1 (within 10 m) and Class2 (within 100 m) according to transmission lengthwhile it is operated with just single standard 'Class1' because of notification of Ministry of Information and Communication in 2004. In the case of the limitation value of incident power in communication area, considering operation plan of ETCS that is on actuality operation the measurements are reflected to the standard. In other wort this paper proposed the improvement standard of incident power, pseudo response in the communication area and radiated power in order to secure stability and compatibility among operator systems about the needed part on ETCS operation.

  • PDF

Research Trends in English-Language Journals of Korean Studies Published in Korea (국내에서 간행된 한국학 분야 영문학술지의 연구 동향 분석)

  • Min Jung, Kim;Hye-Eun, Lee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.1
    • /
    • pp.145-166
    • /
    • 2023
  • This study aims to analyze the research trends of English-language journals in Korean studies published in Korea. Data were collected from four English journals in Korean studies indexed in A&HCI and SCOPUS. A total of 1,840 were selected, including 768 articles of the Korea Journal, 466 articles of The Review of Korean Studies, 285 articles of the Seoul Journal of Korean Studies, and 321 articles of the Acta Koreana, in connection with content analysis, author analysis, author keyword frequency analysis, and topic modeling. In results, the domain research of Korean studies is Humanities, followed by Social Science, and Arts and Kinesiology. These three sectors have grown significantly in publishing numbers since 2000. The subject period of the study is in the order of the modern period, late Joseon, and Japanese colonial period. Authors from domestic affiliations made up 73.34% of the total, but the proportion of authors belonging to foreign institutions continued to increase. As for author keywords, 'Korea'(41), 'Buddhism'(20), 'Koreanwar'(18), and 'Joseon'(18) were derived as top keywords. In topic modeling, six topics were identified; 'Korean culture, cultural transmission,' 'Korean modern political history,' 'Korean social democratization process,' 'Japanese colonial period,' 'Korean religious philosophy,' and 'Korean ancient history.' Through this study, it was possible to identify the interests in and research areas of the recent international academic community of Korean studies.

A Efficient Network Security Management Model in Industrial Control System Environments (산업제어시스템 환경에서 효과적인 네트워크 보안 관리 모델)

  • Kim, Il-Yong;Lim, Hee-Teag;Ji, Dae-Bum;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.664-673
    • /
    • 2018
  • The industrial control system (ICS) has operated as a closed network in the past, but it has recently been linked to information and communications services and has been causing damage due to cyber attacks. As a countermeasure, the Information Communication Infrastructure Protection Act was enacted, but it cannot be applied to various real control environments because there is only a one-way policy-from a control network to a business network. In addition, IEC62443 defines an industrial control system reference model as an international standard, and suggests an area security model using a firewall. However, there is a limit to linking an industrial control network, operating as a closed network, to an external network only through a firewall. In this paper, we analyze the security model and research trends of the industrial control system at home and abroad, and propose an industrial control system security model that can be applied to the actual interworking environments of various domestic industrial control networks. Also, we analyze the security of firewalls, industrial firewalls, network connection equipment, and one-way transmission systems. Through a domestic case and policy comparison, it is confirmed that security is improved. In the era of the fourth industrial revolution, the proposed security model can be applied to security management measures for various industrial control fields, such as smart factories, smart cars, and smart plants.

The Detection of Signaling Dos on 4G LTE Cellular Network (4G LTE 이동통신망에서의 시그널링 DoS 탐지 기술)

  • Jang, Woung;Kim, Se-Kwon;Oh, Joo-Hyung;Im, Chae-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.146-149
    • /
    • 2013
  • For in recently years, global cellular network service is changing rapidly to 4G. However, the fast introducing of 4G has been going with not enough research about security threat, it could be many kind of vulnerability. Therefore the research about security threat on 4G network is ongoing in external countries, but not sufficient in domestic. particularly in domestic situation of rapidly increased subscribers, The security threats which are hindering stability and usability could make a fatal effect on many users. 4G network should be considered about the feature of mobile network to protect 4G network stable. Mobile network has limited radio resources, it releases the radio resource which is not used in selected time and reallocate when detected the data transmission. Many signaling messages are transferred in the network entities to allocate or release the radio resource. In this paper, it will be introduced the technology to detect signaling DoS traffic hindering the stability and usability of network entities managing the radio resources by huge signaling message from the repetitive wireless connection/release message.

  • PDF

Void-less Routing Protocol for Position Based Wireless Sensor Networks (위치기반 무선 센서 네트워크를 위한 보이드(void) 회피 라우팅 프로토콜)

  • Joshi, Gyanendra Prasad;JaeGal, Chan;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.29-39
    • /
    • 2008
  • Greedy routing which is easy to apply to geographic wireless sensor networks is frequently used. Greedy routing works well in dense networks whereas in sparse networks it may fail. When greedy routing fails, it needs a recovery algorithm to get out of the communication void. However, additional recovery algorithm causes problems that increase both the amount of packet transmission and energy consumption. Communication void is a condition where all neighbor nodes are further away from the destination than the node currently holding a packet and it therefore cannot forward a packet using greedy forwarding. Therefore we propose a VODUA(Virtually Ordered Distance Upgrade Algorithm) as a novel idea to improve and solve the problem of void. In VODUA, nodes exchange routing graphs that indicate information of connection among the nodes and if there exist a stuck node that cannot forward packets, it is terminated using Distance Cost(DC). In this study, we indicate that packets reach successfully their destination while avoiding void through upgrading of DC. We designed the VODUA algorithm to find valid routes through faster delivery and less energy consumption without requirement for an additional recovery algorithm. Moreover, by using VODUA, a network can be adapted rapidly to node's failure or topological change. This is because the algorithm utilizes information of single hop instead of topological information of entire network. Simulation results show that VODUA can deliver packets from source node to destination with shorter time and less hops than other pre-existing algorithms like GPSR and DUA.