• Title/Summary/Keyword: Directory System

Search Result 185, Processing Time 0.023 seconds

Use of Complementary and Alternative Medicine in Patients with Gynecologic Cancer: a Systematic Review

  • Akpunar, Dercan;Bebis, Hatice;Yavan, Tulay
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.17
    • /
    • pp.7847-7852
    • /
    • 2015
  • Purpose: Research carried out with gynecologic cancer patients using CAM was reviewed to provide a source for discussing which CAM method is used for which purpose, patients' perceptions on the effects/side effects occurred during/after using CAM and their sources of information regarding CAM. Materials and Methods: This literature review was carried out for the period between January 2000 and March 2015 using Scopus, Dynamed, Med-Line, Science Dırect, Ulakbim, Research Starters, Ebscohost, Cinahl Complete, Academic Onefile, Directory of Open Access Journals, BMJ Online Journals (2007-2009), Ovid, Oxford Journal, Proquest Hospital Collection, Springer-Kluwer Link, Taylor & Francis, Up To Date, Web Of Science (Citation Index), Wiley Cochrane-Evidence Base, Wiley Online Library, and Pub-Med search databases with "complementary and alternative medicine, gynecologic cancer" as keywords. After searching through these results, a total of 12 full length papers in English were included. Results: CAM use in gynecologic cancer patients was discussed in 8 studies and CAM use in breast and gynecologic cancer patients in 4. It was determined that the frequency of CAM use varies between 40.3% and 94.7%. As the CAM method, herbal medicines, vitamins/minerals were used most frequently in 8 of the studies. When the reasons why gynecologic cancer patients use CAM are examined, it is determined that they generally use to strengthen the immune system, reduce the side effects of cancer treatment and for physical and psychological relaxation. In this review, most of the gynecologic cancer patients perceived use of CAM as beneficial. Conclusions: In order that the patients obtain adequate reliable information about CAM and avoid practices which may harm the efficiency of medical treatment, it is recommended that "Healthcare Professionals" develop a common language.

A Study on the Effective Method of Generating the Dynamic Web Documents in the Multi-user System (다중-사용자 시스템에서의 효과적인 동적 웹 문서 발생 방법에 관한 연구)

  • Lee Hyun-Chang;Lee Jong-Eon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.478-485
    • /
    • 2006
  • In this paper, we analyze the conditions of generating the dynamic Web documents in multi-user server and propose effective method for it. PSSI technique leads to replace the complex process of modifying a CGI source program by simply correcting the HTML Web document in the external file form. This technique has the strong points of CGI, flexibility and security of programming as well as those of SSI, easiness of modifying Web documents. Due to the characteristics of PSSI that Web source documents are in the form of external file, we show that with a single CGI program an individual user can design and modify his own Web documents in his directory. This means that PSSI technique has more advantage in managing the server than the CGI method which requires CGI program to be set up whenever that service is needed.

Design and Implementation of the Extended DNS Security Mechanism (확장된 DNS 보안 메커니즘의 설계 및 구현)

  • Sim, Hui-Won;Kim, Jin-Seong;Sim, Yeong-Cheol;Im, Chan-Sun;Byeon, Ok-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.134-147
    • /
    • 1999
  • The DNS provides naming services which are the basis for the application of the Internet and the security of the DNS should be provided for the security of the Internet. Recently IETF proposed a method which guarantees the integrity of DNS database contents and DNS queries/replies and distributes host public keys. In this paper we describe the design and implementation of the secure DNS which is built based on the IETF proposal and extended to facilitate its sue and management. In the extended secure DNS, DNS servers are used ad the directory system in a public key infrastructure and stores/distributes user public key certificates. The Web-based management interface and security log functions are added and the extended secure DNS is being built so that new cryptographic algorithms can be easily added.

  • PDF

A Study of Public Health Project Based on Family Unit (가정단위(家庭單位) 보건관리사업(保健管理事業)에 관(關)한 연구(硏究))

  • Maeng, Shi-Soun
    • Journal of Preventive Medicine and Public Health
    • /
    • v.9 no.1
    • /
    • pp.39-47
    • /
    • 1976
  • The organized community is the one of the best system for the effective public health administration, and a model area was selected for the study to see what would be achieved when a certain small community is placed under the special public health control based on the family unit. The 178 families involved total of 875 populations. The rate of vaccination with B.C.G. among 191 infants and children could be increased upto 100.0% from 72.5% of the time when the basic study was performed after 8 months period of this study; 99.0% from 47.1% with D.P.T.; 96,9% from 71.7% against smallpox; 83.2% from 69.1% against poliomyelitis; but only 25,7% from 21.5% against measles. The status of family planing was 36.8% among 155 women of possible conception at the time of the basic research. And, at the end of this study, the number of women utilizing one of the methods of contraception for family planning were increased upto 52.9% among the same number. The most frequently utilized method was 34.1% of oral pills followed by 30.5% of intrauterine device; but both of which had higher rate of interruption of use because of the complications, 14.3% and 16.0% respectively. The 10 pregnant women at the time of basic research experienced normal deliveries during the period of study and they had received pre and postnatal health care through this health center. The status of oral hygiene, pulmonary tuberculosis control, and parasitological examination were also reported as well as the cases with diseases seen among the population and vaccinations performed against other infectious diseases. The stress on discussion was placed upon the effectiveness of public health administration when it is undergone on the individual family unit to achieve the best results. However, the shortness of both personnel and material resources were considered to be the one of the major difficulties retarding the generalization of the idea obtained through this study based on family unit public health administration.

  • PDF

Recommendation Method of SNS Following to Category Classification of Image and Text Information (이미지와 텍스트 정보의 카테고리 분류에 의한 SNS 팔로잉 추천 방법)

  • Hong, Taek Eun;Shin, Ju Hyun
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.54-61
    • /
    • 2016
  • According to many smart devices are development, SNS(Social Network Service) users are getting higher that is possible for real-time communicating, information sharing without limitations in distance and space. Nowadays, SNS users that based on communication and relationships, are getting uses SNS for information sharing. In this paper, we used the SNS posts for users to extract the category and information provider, how to following of recommend method. Particularly, this paper focuses on classifying the words in the text of the posts and measures the frequency using Inception-v3 model, which is one of the machine learning technique -CNN(Convolutional Neural Network) we classified image word. By classifying the category of a word in a text and image, that based on DMOZ to build the information provider DB. Comparing user categories classified in categories and posts from information provider DB. If the category is matched by measuring the degree of similarity to the information providers is classified in the category, we suggest that how to recommend method of the most similar information providers account.

Adaptive Inter-Agent Communication Protocol for Large-Scale Mobile Agent Systems (대규모 이동 에이전트 시스템을 위한 적응적 에이전트간 통신 프로토콜)

  • Ahn Jin-Ho
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.351-362
    • /
    • 2006
  • This paper proposes an adaptive inter-agent communication protocol to considerably reduce the amount of agent location information maintained by each service node and the message delivery time while avoiding the dependency of the home node of a mobile agent. To satisfy this goal, the protocol enables each mobile agent to autonomously leave its location information only on some few of its visiting nodes. Also, it may significantly reduce the agent cache updating frequency of each service node by keeping the identifier of the location manager of each agent in the smart agent location cache of the node. Simulation results show that the proposed protocol reduces about $76%{\sim}80%$ of message delivery overhead and about $76%{\sim}79%$ of the amount of agent location information each service node should maintain compared with the traditional one.

Survey for Current Status and Prospect of Traditional Medical Market (전통의료 서비스 시장의 현황 및 전망에 대한 조사연구 -한의원을 중심으로-)

  • Yoo, Jong-Hyang;Lee, Jun-Hyuk;Park, Ki-Hyun;Jin, Hee-Jeong;Jang, Eun-Su
    • Korean Journal of Acupuncture
    • /
    • v.27 no.1
    • /
    • pp.143-150
    • /
    • 2010
  • Objectives: This research aims to know the current status and prospect of traditional medical market to provide sources in setting a development strategy and making a policy on the traditional medicine Methods: This research categorized 11,611 clinics registered in telephone directory as of 2008 by region and some clinics were extracted with simple random method. The inquiry was made with questionnaires and analyzed on the base of frequency. Results: 1. The number of the employee in a clinic were slightly decreased from 2.9 in 2005 and 2006 to 2.8 in 2007. That of the patients also showed a downward tendency from 11,811 in 2005 through 11,716 in 2006 to 11,344 in 2007. 2. An annual turnover in a clinic amounted to 257 million won in 2007 from 232 million won in 2005 through 245 million won in 2006. 3. Approximately 92% of the responses made a negative diagnosis on the traditional medical market and 21% of responses indicated the overall economic recession as a primary reason in their opinions. 4. About 29% of responses presented the extension of medical insurance on traditional medicine as a prior policy. Conclusions: Based on the survey, the prospect of traditional medical market is positive, but the effort of the people in traditional medical system and the systematic support from government are required to activate the stagnated traditional medical market.

The Human Performance Degradation in Vigilance due to Prolonged and Monotonous Tasks (경계(警戒) 임무(任務) 담당자(擔當者)의 시간지연(時間遲延)에 따르는 인간(人間) 성능(性能)의 변화(變化)에 대(對)한 연구(硏究) 및 개선방안(改善方案))

  • Myun-Woo,Lee
    • Bulletin of the Society of Naval Architects of Korea
    • /
    • v.11 no.1
    • /
    • pp.27-34
    • /
    • 1974
  • This study is aimed at a validation of the vigilance simulation model which was proposed earlier (2). The model estimates a perceived danger value, an alertness level and the probability of detection at a given elapsed time of vigilance. Twenty-nine male and seven female subjects were given a simple task. They were asked to detect a number(four numbers out of six digits in the telephone directory which have the probability of occurrence in the range of 0.0010-0.0018) in six different experimental conditions, for periods of two to three hours. Analysis of the experiments showed that although the mean detection rate varied slightly in two hours, the within-subject variance and the number of cyclic performance fluctuations increased significantly. A primal factor that affects the performance seems to be the frequency of target occurrence. By curve fitting, the relation between the probability of detection and the percentages of danger event occurrence was derived; $y=0.50(1-{\varepsilon}^{-50x^2})+0.39$. Assuming the equation represents the normal detection rate(100% performance), the Relative Vigilance Performance Rating was calculated. This rating method could be a useful criterion in selecting and training of the vigilance personnel. The results show that the simulation model is a good estimator of human a performance when the probability of danger occurrence is greater than 0.0015; it gives a good reference for improving the vigilance system. Suggestions are made that (1) the validity of proposed functional equations over the extended range of danger probability be studied, (2) an analysis of the cyclic fluctuations of the alertness level be accomplished, and (3) the cost functions of detection reliability be included in any future model.

  • PDF

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Design of a Policy based Privacy Protection System using Encryption Techniques (암호기법을 이용한 정책기반 프라이버시보호시스템설계)

  • Mun Hyung-Jin;Li Yong-Zhen;Lee Dong-Heui;Lee Sang-Ho;Lee Keon-Myung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.33-43
    • /
    • 2006
  • In order to provide the efficient personalized services, the organizations and the companies collect and manage the personal information. However, there have been increasing privacy concerns since the personal information might be misused and spread over in public by the database administrators or the information users. Even in the systems in which organizations or companies control access to personal information according to their access policy in order to protect personal information, it is not easy to fully reflect the information subjects' intention on the access control to their own Personal information. This paper proposes a policy-based access control mechanism for the personal information which prevents unauthorized information users from illegally accessing the personal information and enables the information subjects to control access over their own information. In the proposed mechanism, the individuals' personal information which is encrypted with different keys is stored into the directory repository. For the access control, information subjects set up their own access control policy for their personal information and the policies are used to provide legal information users with the access keys.