• Title/Summary/Keyword: ICN

Search Result 125, Processing Time 0.027 seconds

Notchplasty for Treatment of Impingement of the Cranial Cruciate Ligament on Osteophyte in a Cat

  • Hong, Youngchae;Park, Jiyoung;Choi, Ho-Jung;Lee, Young-Won;Jeong, Seong Mok;Lee, Haebeom
    • Journal of Veterinary Clinics
    • /
    • v.34 no.6
    • /
    • pp.459-462
    • /
    • 2017
  • A 3-year-old, 5.6 kg, castrated, male, British short hair cat presented with subtle weight-bearing lameness of the right hindlimb when walking suddenly after rest. On physical examination, the patient experienced pain when the right stifle joint was hyperextended. There was no clinical improvement of lameness or pain of the right hindlimb, despite the administration of analgesic drugs for one week. During diagnostic arthroscopy of right stifle, mild synovitis and cranial cruciate ligament (CCL) impingement on osteophyte of the intercondylar notch (ICN) was observed. Computed tomography was applied to determine an accurate surgical plan. Arthroscopy-assisted notchplasty, including removal of the osteophyte, was performed using chisel and arthroscopic burr. At 4 weeks postoperatively, the frequency of subtle weight-bearing lameness of the right hindlimb was significantly reduced. At 6 months postoperatively, the patient exhibited normal ambulation without recurrence of lameness. Impingement of CCL may cause subtle lameness and pain. Arthroscopy can be a good diagnostic tool for early-stage CCL disease. Notchplasty can be recommended for osteophyte-induced CCL disease.

Nursing Missionary Elizabeth J. Shepping's Education and Holistic Care for Koreans (한국인을 위한 간호선교사 엘리자베스 쉐핑(Elizabeth J. Shepping, R. N.)의 교육과 전인적 간호)

  • Yoon, Me Ok
    • Research in Community and Public Health Nursing
    • /
    • v.27 no.1
    • /
    • pp.60-71
    • /
    • 2016
  • Purpose: This study was to present education and holistic care of Elizabeth J. Shepping (1880~1934), a nursing missionary and a founder of the Chosun Nursing Association who visited Korea during the Japanese colonial period. Methods: Primary and secondary sources were collected and analyzed. Results: This study provides important implications regarding Shepping's holistic nursing as follows: First, she came to Korea after studying nursing and bibliology and being trained for nursing missionary works. Second, she cared for many Koreans, especially Korean women, to protect them from poverty, oppression, ignorance, and illnesses. Third, she continued to spread holistic care in hospitals and other local communities. She trained nurses, developed nursing education, and produced a large number of domestic nursing leaders by establishing women's Bible school. Fourth, she founded the Chosun Nursing Association, serving as its first president for 10 years and applied to join the International Council of Nurses (ICN). Conclusion: Finally, suggestions were provided for future research, and it will be necessary to study thoroughly nursing achievements by nurses from other countries who practiced their nursing activities in Korea, and such studies are expected to lead to analysis of nursing missionaries' experiences.

Content Centric Networking Naming Scheme for Efficient Data Sharing (효율적인 데이타 교환을 위한 Content-Centric Networking 식별자 방안)

  • Kim, Dae-Youb
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.9
    • /
    • pp.1126-1132
    • /
    • 2012
  • To enhance network efficiency, CCN allow intermediate network nodes between a content consumer and a content publisher to temporarily cache transmitted contents. Then the network nodes immediately return back the cached contents to another consumers when the nodes receives relevant contents request messages from the consumers. For that, CCN utilizes hierarchical content names to forward a request message as well as a response message. However, such content names semantically contain much information about domain/user as well as content itself. So it is possible to invade users' privacy. In this paper, we first review both the problem of CCN name in the view point of privacy and proposed schemes. Then we propose an improved name management scheme for users' privacy preservation.

Factors Affecting Core Competencies among Infection Control Nurses in Korea (국내 감염관리간호사의 핵심역량과 영향요인 분석)

  • Kim, Kyung Mi;Choi, Jeong Sil
    • Korean Journal of Adult Nursing
    • /
    • v.26 no.1
    • /
    • pp.11-21
    • /
    • 2014
  • Purpose: This study was conducted to describe core competencies and identify factors affecting core competencies among infection control nurses (ICN). Methods: Infection control nurses from hospital with more than 200 beds comprised the sample. Questionnaires were sent to the sample via e-mail. One hundred and three questionnaires were returned. Data were analyzed with descriptive statistics and stepwise multiple regression via SPSS/WIN 21.0. Results: The core competency level of healthcare workers area was the highest that of the education and research was the lowest. There were significant differences in core competencies related to demographics such as age, clinical carrier, infection control carrier, position, academic degree, infection control specialist license, hospital location, and hospital type. The explained variances for the core competency were 38.3% and the contributing factors to core competencies were infection control carrier and infection control specialist license. Conclusion: It showed various levels of core competencies depending on infection control nurses' demographics and hospital traits, therefore consistent management efforts for the licensing and career path of infection control would be required.

A Real-time Collaborative Group Workflow Editor (실시간 협업 지원 그룹 워크플로우 모델링 도구)

  • Kim, Sang-Bae;Bae, Sung-Yong;Kim, Kwang-Hoon;Paik, Su-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.125-128
    • /
    • 2000
  • 본 논문에서는, 워크플로우 모델링에 사용하는 ICN(Information Control Net)을 위한 자바 기반의 워크플로우 모델링 도구의 설계 및 구현에 관하여 기술하였다. 특히, 본 워크플로우 모델링 도구는 기존의 워크플로우 모델링 도구들과는 달리, 인터넷 기반의 실시간 그룹웨어 기술을 통해 일련의 사용자 그룹이 동시에 워크플로우를 모델링 할 수 있는 기능을 제공하고 있다. 즉, 기존의 워크플로우 모델링 기능에 실시간 그룹웨어 특성들을 통합함으로써, 한 차원 높은 수준의 모델링 환경을 제공하고, 이를 통하여 기존의 워크플로우 시스템들이 지원하지 못했던 조직 내의 구성원들간의 협동 작업을 실시간으로 지원할 수 있을 뿐 만 아니라, 요즘과 같이 대형화와 복잡화 그리고 다양화의 특징을 갖는 조직내의 워크플로우(또는 사무업무 프로세스)들에 대한 효율적인 분석 및 모델링 환경을 제공하는데 그 목적이 있다. 또한, 본 도구를 통한 모델링 결과는 WPDL(Workflow Process Definition Language)라는 국제 표준화 워크플로우 정의 언어로 저장됨으로써, 기존의 다른 워크플로우 시스템들과의 상호 호환성을 제공하고자 하였다.

  • PDF

An Activity Analysis Method for Workflow Visual Verification and Mining (워크플로우 가시적 검증 및 마이닝을 위한 액티비티 분석 방법)

  • Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.133-142
    • /
    • 2008
  • This paper conceives and implements an activity analysis method as a tool to be used for workflow visual verification and mining. One of the recent issues in the workflow and business process literature is to refine and to improve the deployed workflows and business processes. The activity analysis method proposed in this paper provides a way to fine a set of activities being directly affected by the specific activity that a user tries to change its properties. I would strongly believe that the method can be a useful solution for the dynamic changes and visual verifications problems of workflow models as well as the workflow process mining problems. Finally, to prove the possibility of the proposed method and its applicability, we apply to a workflow model of the electronic approval system run by a real corporation.

  • PDF

A Role-Performer Bipartite Matrix Generation Algorithm for Human Resource Affiliations (인적 자원 소속성 분석을 위한 역할-수행자 이분 행렬 생성 알고리즘)

  • Kim, Hak-Sung
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.149-155
    • /
    • 2018
  • In this paper we propose an algorithm for generating role-performer bipartite matrix for analyzing BPM-based human resource affiliations. Firstly, the proposed algorithm conducts the extraction of role-performer affiliation relationships from ICN(Infromation Contorl Net) based business process models. Then, the role-performer bipartite matrix is constructed in the final step of the algorithm. Conclusively, the bipartite matrix generated through the proposed algorithm ought to be used as the fundamental data structure for discovering the role-performer affiliation networking knowledge, and by using a variety of social network analysis techniques it enables us to acquire valuable analysis results about BPM-based human resource affiliations.

IDNet: Beyond All-IP Network

  • Jung, Heeyoung;Lim, Wan-Seon;Hong, Jungha;Hur, Cinyoung;Lee, Joo-Chul;You, Taewan;Eun, Jeesook;Kwak, Byeongok;Kim, Jeonghwan;Jeon, Hae Sook;Kim, Tae Hwan;Chun, Woojik
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.833-844
    • /
    • 2015
  • Recently, new network systems have begun to emerge (for instance, 5G, IoT, and ICN) that require capabilities beyond that provided by existing IP networking. To fulfill the requirements, some new networking technologies are being proposed. The promising approach of the new networking technology is to try to overcome the architectural limitations of IP networking by adopting an identifier (ID)-based networking concept in which communication objects are identified independently from a specific location and mechanism. However, we note that existing ID-based networking proposals only partially meet the requirements of emerging and future networks. This paper proposes a new ID-based networking architecture and mechanisms, named IDNet, to meet all of the requirements of emerging and future networks. IDNet is designed with four major functional blocks-routing, forwarding, mapping system, and application interface. For the proof of concept, we develop numeric models for IDNet and implement a prototype of IDNet.

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF

Data Dissemination in LTE-D2D Based Vehicular Network (LTE-D2D 차량 네트워크에서 정보 전달 방법)

  • Shim, Yong-Hui;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.602-612
    • /
    • 2015
  • Current IEEE 802.11p which is suggested for vehicle to vehicle communication supports one hop communication. Thus, it has a limitation to carry out efficient data dissemination. In this thesis, we suggest LTE-D2D based vehicle network to provide efficient data dissemination in the vehicle environment. In this network architecture, we use name based message with IP packet options and we put the intermediate vehicle node called 'super vehicle node' and each normal vehicle node in the cell requests data to the super vehicle node. The super vehicle node responses data to the normal vehicle node. Performance analysis is based mathematical modeling. We compare LTE cellular network to LTE-D2D based vehicle network about throughput according to packet delivery time.