• Title/Summary/Keyword: Identification Infrastructure

Search Result 195, Processing Time 0.031 seconds

Research Trends of Randomized Controlled Trials on Herbal Medicine Treatment for Atopic Dermatitis-Focusing on CNKI (아토피 피부염의 한약 치료에 대한 무작위대조군연구 중심의 연구 동향 - CNKI를 중심으로)

  • Yang, Geum-Jin;Jo, Eun-hee;Kang, Su-Jin;Hong, Jieun;Shim, Yu-Hwa;Lee, Ju-Hyun;Park, Min-cheol
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.34 no.2
    • /
    • pp.102-116
    • /
    • 2020
  • The purpose of this study was to analyze the research trends of randomized controlled trials on herbal medicine treatment for atopic dermatitis in China for the last 5 years. We searched for randomized controlled trials with the intervention of herbal medicine for the treatment of atopic dermatitis in the CNKI (China National Knowledge Infrastructure) from January 2014 to December 2018. For the screening of the paper, we used '特应性皮炎' and '异位性皮炎' which mean atopic dermatitis and search was limited to three areas within Medicine & Public Health: Traditional Chinese Medicine, Traditional Chinese Medicinal Herbs, Combination of Traditional Chinese Medicine with Western Medicine. Among the 136 searched studies, we selected a total of 34 studies and analyzed a year of publication, subject characteristics, study design and intervention, prescribed herbal medicine and herbs, pattern identification, evaluation criteria, and outcomes. Longmu decoction (龍牡湯) and Polia Sclerotium (茯笭) was the most frequently prescribed medicine and herb. The most commonly used pattern identification was Blood deficiency and Wind-dryness (血虛風燥), and among them, the most frequently prescribed herb is Rehmanniae Radix (生地黃). In most studies using the total effectiveness and SCORAD index as an outcome measure, the herbal medicine treatment group showed statistically better results than the control group. As a result of the safety assessment, the herbal medicine treatment group was reported having significantly fewer side effects compared to the control group. Hence, it was confirmed that the intervention including herbal medicine had a significant effect on atopic dermatitis. This study would be able to provide the basis of clinical research on atopic dermatitis and applied to the treatment of atopic dermatitis.

Real-Time Construction Resource Monitoring using RFID/USN Inter-working System (RFID/USN 연동 시스템을 활용한 건설자원 실시간 모니터링 시스템)

  • Ryu, Jeoung-Pil;Kim, Hyoung-Kwan;Kim, Chang-Yoon;Kim, Chang-Wan;Han, Seung-Heon;Kim, Moon-Kyum
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.90-94
    • /
    • 2007
  • Location tracking automation of resources in construction industry is one of the most important procedures to improve construction project performance and reduce the period of construction. Recently, location tracking technologies have proven to be effective in tracking construction materials and equipment in real time through the instrumentality of RFID (Radio Frequency Identification). By using wireless communication and inter-working system between RFID and USN, it is possible that construction engineers receive the location information of construction resources without additional efforts that move the RFID reader to read tags periodically. In the inter-working system, RFID reader delivers the acquired materials information to sensor node which is connected by serial interface. Then sensor node transmits the received data to the data aggregation terminal that is a sink node. The data aggregation terminal can transmit collected data to construction manager who is out of construction site using infrastructure such as CDMA(Code Division Multiple Access) network. The combination model of the two system and field test scenarios are presented in this paper.

  • PDF

Research on DDoS Detection using AI in NFV (인공지능 기술을 이용한 NFV 환경에서의 DDoS 공격 탐지 연구)

  • Kim, HyunJin;Park, Sangho;Ryou, JaeCheol
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.837-844
    • /
    • 2018
  • Recently, the cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake virtual network functions and the encryption of communication between entities. Because the VNFs are open to subscribers and able to implement service directly, which can make them an attack target. In this paper, we propose a virtual public key infrastructure mechanism that detects a fake VNFs and guarantees data security through mutual authentication between VNFs. To evaluate the virtual PKI, we built a management and orchestration environment to test the performance of authentication and key generation for data security. And we test the detection of a distributed denial of service by using several AI algorithms to enhance the security in NFV.

Use of a Genetic Algorithm to Predict the Stiffness Reductions and Retrofitting Effects on Structures Subjected to Seismic Loads (지진하중을 받은 구조물의 유전알고리즘 기반 강성저하 및 보강 효과 추정)

  • Lee, Jae-Hun;Ahn, Kwang-Sik;Lee, Sang-Youl
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.3
    • /
    • pp.193-199
    • /
    • 2020
  • This study examines a method for identifying stiffness reductions in structures subjected to seismic loads and retrofitting effects using a combination of the finite element method and an advanced genetic algorithm. The novelty of this study is the application of seismic loading and its response to anomalies in the tested structure. The technique described in this study may enable not only detection of damaged elements but also the identification of their locations and the extent of damage due to seismic loading. To demonstrate the feasibility of the method, the advanced genetic algorithm is applied to frame and truss bridge structures subjected to El Centro and Pohang seismic loads. The results reveal the excellent computational efficiency of the method and its ability to prevent severe damage from earthquakes.

Application of the Small UAV Defense System (무인항공기 대응체계 도입 방안)

  • Park, Jehong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.145-152
    • /
    • 2017
  • As a popularization of small UAS to have improved flight performance and easiness of controlling, the UAS industry is increased and also small UAS is to be a new threat for airspace security of national strategic infrastructure. Rising the new threat makes the negative side effect of small UAS operation. This phenomena brought to new R&D needs "defense system" for small UAS/UAV - called Anti-Drone. The paper addressed case study of defects, accidents and threats by small UAS/UAV as world wide level, and research and development trend of UAS defense system as each technical category - CONOP (Concept of Operation), identification/recognition method and control/supremacy techniques. As a result, this suggests the direction what and where drone defense system should be applied first and required for Korean society in the view of society system (regime) and a point of view for minimizing side effect as UAS popularization.

Perception of Patient Safety Risk Factors and Performance Level of Safety Care Activities among Hospital Nurses (환자안전 위험요인에 대한 병원간호사의 인식수준과 안전간호활동 수행정도)

  • Son, Young Shin;Lee, Young Whee;Kim, Young Shin;Song, Eun Jeong;Lee, Hye Ryun;Lee, Ju Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.2
    • /
    • pp.190-200
    • /
    • 2018
  • Purpose: The purpose of this study was to identify the level of perception of safety risk factors and the degree of performance of safety nursing activities in order to develop an education program to improve the safety of patients. Methods: The subjects were 217 nurses from 3 university hospitals in Incheon. Data were collected with structured questionnaires and analyzed using descriptive analysis, t-test, and ANOVA using SPSS 22.0. Results: The level of perception of patient's safety risk factors and safety care activities was 2.93 and 4.68, respectively. Perception of patient safety risk factors which belonging to the risk type of therapeutic devices, equipment, service and infrastructure all scored below average; also in addition, behavior, performance, and violence risk type and work system, information and communication risk type showed relatively low perception levels. Safety nursing activities showed a low level of performance in accurate communication among medical teams, management of fire and disaster, security management, use of restraints, identification of patients, and correct performance of operations and procedures. Conclusion: Based on these results, it is necessary to improve the safety of patients by taking proper management measures along with education.

Development of DNA-Based Assessment Method for Mold in Floor Dust of Dwellings in Korea (바닥 먼지내에서 DNA 기반 곰팡이 분석기법 개발)

  • Lee, Jeong-Sub;Kim, Sung Yeon;Choi, Kil Yong;Ryu, Jungmin;Hwang, Eun Seol;Lee, Juyeong;Kwon, Myunghee;Chung, Hyenmi;Seo, SungChul
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.27 no.4
    • /
    • pp.324-332
    • /
    • 2017
  • Objectives: Much scientific evidence indicate a positive association between moldy environments and respiratory illnesses and/or symptoms. However, few comprehensive assessments of mold have been performed for such settings. Spore counts or microscopic enumeration only may not be sufficient for evaluating fungal exposure. Recently, Mold Specific QPCR technology developed by the US EPA (Environmental Relative Moldiness Index, ERMI) has been widely used worldwide and great performance for assessing fungal exposure has been shown. Methods: We aimed to develop a Korean version of ERMI suitable for the distribution of fungal flora in Korea. Thirty dwellings in the Seoul and Incheon area were selected for sampling, and each was classified as 'Flooded, 'Water-damaged' or 'Non-water-damaged'. Results: Dust on the floor and airborne sampling were collected using an MAS100 and a 'Dustream' collector. Samples were analyzed by quantitative polymerase chain reaction(QPCR) for the 36 molds belonging to ERMI. Student t-test and ANOVA tests were carried out using SAS software. The median ERMI values of flooded, water damaged, and non-water damaged dwellings were 8.24(range: -5.6 to 27.9), 5.47(-25. 4 to 32.7), and -15.30(-24.6 to 14.8), respectively. Significant differences were observed between flooded and non-water damaged dwellings (P=0.001) and between water-damaged and non-water damaged dwellings (P=0.032). Conclusion: Our findings indicate that ERMI values attributed to dust samples in Korea could be applicable for the identification of flooded or water damaged buildings. However, much data is needed for continuously developing the Korean version of ERMI values.

A Study on Generation and Parsing System for MPEG-21 Broadcasting Digital Item (MPEG-21 방송 디지털 아이템을 위한 생성 및 파싱 시스템에 대한 연구)

  • 김천석;한희준;노용만;남제호;홍진우
    • Journal of Broadcast Engineering
    • /
    • v.8 no.1
    • /
    • pp.80-90
    • /
    • 2003
  • Today, thanks to the spread of Internet and the development of various multimedia technologies, broadcasting environment is changing in a way to merging broadcasting and communication environment. In such a new environment, transparent delivery and interoperability between different technologies become an important issue. In ISO/IEC MPEG meeting, MPEG-21 has been established. In MPEG-21, it is discussed actively about big picture to build an infrastructure for the delivery and consumption of multimedia contents. In this paper, we have applied Digital Item in MPEG-21 to broadcasting contents. Broadcasting Digital Item is generated using MPEG-7 MDS for the description of resources as well as Digital Item Declaration, and Digital Item Identification. Furthermore, we develop Digital Item generation system and parsing system. In experiment, we verify the usefulness of Broadcasting Digital Item by generating an education video contents and consuming it at different user environments.

Implementation of Bistatic Backscatter Wireless Communication System Using Ambient Wi-Fi Signals

  • Kim, Young-Han;Ahn, Hyun-Seok;Yoon, Changseok;Lim, Yongseok;Lim, Seung-ok;Yoon, Myung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1250-1264
    • /
    • 2017
  • This paper presents the architecture design, implement, experimental validation of a bistatic backscatter wireless communication system in Wi-Fi network. The operating principle is to communicate a tag's data by detecting the power level of the power modulated Wi-Fi packets to be reflected or absorbed by backscatter tag, in interconnecting with Wi-Fi device and Wi-Fi AP. This system is able to provide the identification and sensor data of tag on the internet connectivity without requiring extra device for reading data, because this uses an existing Wi-Fi AP infrastructure. The backscatter tag consists of Wi-Fi energy harvesting part and a backscatter transmitter/a power-detecting receiver part. This tag can operate by harvesting and generating energy from Wi-Fi signal power. Wi-Fi device decodes information of the tag data by recognizing the power level of the backscattered Wi-Fi packets. Wi-Fi device receives the backscattered Wi-Fi packets and generates the tag's data pattern in the time-series of channel state information (CSI) values. We believe that this system can be achieved wireless connectivity for ultra- low-power IoT and wearable device.

Secure Mobile Credit Card Payment Protocol based on Certificateless Signcryption (무인증서 서명 암호화 기법을 이용한 안전한 모바일 신용카드 결제 프로토콜)

  • Choi, Hui-Jin;Kim, Hyung-Jung
    • Journal of Digital Contents Society
    • /
    • v.14 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • The increase of the smartphone users has popularized the mobile payment and the mobile credit card users are rapidly getting increased. The mobile credit cards that currently used provide its users with the service through downloading mobile credit card information into USIM. The mobile credit card saved in USIM has the minimized information for the security and is based on PKI. However certificate-based payment system has a complicated procedure and costs a lot of money to manage the certificates and CRL(Certificate Revocation List). Furthermore, It can be a obstacle to develop local e-commerce in Korea because it is hard for foreigners to use them. We propose the secure and efficient mobile credit card payment protocol based on certificateless signcryption which solve the problem of certificate use.