• Title/Summary/Keyword: Key sharing

Search Result 611, Processing Time 0.029 seconds

Review on Studies of Wild Ginseng Complex Pharmacopuncture Related to Obesity Treatment (비만치료와 관련된 산삼복합약침요법에 대한 연구 동향 고찰)

  • Park, Jung-Sik
    • Journal of Korean Medicine for Obesity Research
    • /
    • v.21 no.1
    • /
    • pp.42-48
    • /
    • 2021
  • Objectives: The purpose of this study was to review the studies of the wild ginseng complex pharmacopuncture related to obesity treatment. Methods: We searched the papers with key words of 'wild ginseng complex pharmacopuncture', 'wild ginseng pharmacopuncture', 'obesity', 'fat', 'weight' in Oriental medicine Advanced Searching Integrated System, KRpia, Koreanstudies Information Service System, Research Information Sharing Service, KoreaMed and PubMed, Scopus. We classified the papers by year, content and study type. Results: There were 7 studies about the wild ginseng pharmacopuncture related to obesity treatment. Cell studies were excluded because they were not related to obesity. Analysis of 3 animal experiments and 4 clinical studies were conducted to describe each research subject, method, and research results. Conclusion: More interest and further research will be needed on wild ginseng pharmacopuncture related to obesity treatment in the Korean medicine to achieve clinical application and to develop treatment protocols for the obesity disease.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

Trends in Clinical Research of Catgut Embedding for Obesity Treatment (비만 치료에 매선을 이용한 임상 연구 동향 분석)

  • Jung-Sik Park
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.33 no.3
    • /
    • pp.129-134
    • /
    • 2023
  • Objectives The purpose of this study was to review the studies of catgut embedding related to obesity treatment. Methods We searched the papers with key words of obesity and catgut embedding via searching Research Information Sharing Service, DBpia, Koreanstudies Information Service System, Oriental Medicine Advanced Searching Integrated System, Scopus, PubMed. Additional data including study design, study topics, characteristics of participants and treatment, outcomes was extracted from full text of each study. Results There were nine studies about the catgut embedding related to obesity treatment. Five articles were conducted in China, two articles were conducted in Mexico, and two articles was published in Korea. Analysis of seven experimental studies and two observational studies were conducted to describe each research subject, method, and research results. Conclusions More interest and further research will be needed on catgut embedding related to obesity treatment in the Korean medicine to achieve clinical application and to develop treatment protocols for the obesity disease.

Lessons Learned from Conducting Design-Based Research Studies

  • LEE, Ji-Yeon
    • Educational Technology International
    • /
    • v.14 no.1
    • /
    • pp.27-40
    • /
    • 2013
  • Design-Based Research (DBR) focuses on developing key principles of interventions to advance both theory and practicalities of dissemination (Brown, 1992), yet its methodological details have not been quite established. Thus, the purpose of this paper is to address the pragmatics of DBR by sharing the researcher's reflections on conducting a longitudinal DBR project for five years. In an attempt to advance college teaching practices as well as theories related to student plagiarism, the project focused on refining "humble" theories on how and why college students engage in plagiarism to design classroom interventions for promoting academic integrity. Similar to the Integrative Learning Design (ILD) framework proposed by Bannan-Ritland (2003), but conducted in a much simpler and less formal format, this study followed DBR cycles from initial conceptualization to design and enact instructional interventions in authentic contexts while collecting both quantitative and qualitative data from each phase. Finally, the paper addresses some challenges encountered throughout the DBR project as well as the lessons learned from this experience. Like many previous DBR studies whose practical relevance is limited to local context, the findings from this study may not be easily generalized for other contexts.

Human Visual Intelligence and the New Territory of Educational Technology Research

  • RHA, Ilju
    • Educational Technology International
    • /
    • v.8 no.1
    • /
    • pp.1-16
    • /
    • 2007
  • The general aim of this article is to explicate what can be researched in our field based on the new understanding on the ability of human visual intelligence. To follow this aim, three key discussions were followed. The first is to explain why the human visual intelligence research is so important in our field and how it was neglected. The basic orientations of the research questions used in its framing and in answering are reviewed. After reviewing traditional research orientations, as the second discussion, alternative, more useful perspective for thinking about human visual intelligence is suggested. And the possibility of contribution for the future research in general is discussed. In doing so, human visual intelligence was defined in rather practically oriented ways rather than theoretically oriented ones. More practical perspectives were suggested. The third discussion is to show how to use the alternative perspectives of human visual intelligence in the areas of educational technology research. It was hoped that the article lays out conceptual groundwork for generation of educational technology research frameworks which can be used for the research conduct, reproduction and sharing by adopting practically oriented views on human visual intelligence as a new territory of educational technology research.

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

Analyis of the Structure and Impact of SCM Advanced Planning System : Lessons from POSCO Case (SCM 첨단계획수립시스템의 구조와 도입효과 분석 : 포스코 사례를 중심으로)

  • No, Gyeong Ho;Park, Seong Taek;Kim, Tae Ung
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.145-155
    • /
    • 2014
  • POSCO has been chosen as the most competitive steelmaker in the world, for the 4th year in a row. It's potentials and key success points lay at technology innovation as well as effective partnerships with suppliers and customers. Partnership with suppliers is based upon the effective supply chain management. While ERP system supports the standard business work flows, the biggest impact on business performance is created by exceptions and variability. A SCM Advanced Planning System reduces the amount of exceptional situations, helping to keep business in a standard mode of operation. A case summary on SCM Advanced Planning System of POSCO as well as its impact on firm performances is presented. As a supplement to this case study, we also investigate the employees' perceived level of SCM-related factors, including information sharing, collaboration, incentive system for suppliers and their impacts on SCM performances. As a conclusion, the practical implications of these findings are discussed.

Spectrum Access Model Proposal for Frequency Sharing in 3~4 GHz (3~4 GHz 대 주파수 공동사용을 위한 스펙트럼 액세스 모델 제안)

  • Kang, Young-Heung;Lee, Dae-Young;Park, Duk-Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.8
    • /
    • pp.821-827
    • /
    • 2014
  • Many researches on the usage of shared spectrum have continuously been carried out to solve the recent frequency shortage problem and to use efficiently the spectrum without interference. Also, exponential mobile data growth and the solutions needed to address this challenge are parallel key objectives addressed in many countries. Spectrum policy innovation to meet this challenge is the ASA/LSA (Authorized Shared Access/Licensed Shared Access), which is the best access model to employ the small cell technology to meet this mobile traffic growth. Because 3.5 GHz bands is considered as the ASA/LSA frequency, in this paper, we propose the SAM(Spectrum Access Model) in 3~4 GHz bands to estimate the available ASA/LSA bands and to open more free spectrum. These results are utilized as the data to develop the SAM for the small cell and the open frequency in future.

Hybrid-clustering game Algorithm for Resource Allocation in Macro-Femto HetNet

  • Ye, Fang;Dai, Jing;Li, Yibing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1638-1654
    • /
    • 2018
  • The heterogeneous network (HetNet) has been one of the key technologies in Long Term Evolution-Advanced (LTE-A) with growing capacity and coverage demands. However, the introduction of femtocells has brought serious co-layer interference and cross-layer interference, which has been a major factor affecting system throughput. It is generally acknowledged that the resource allocation has significant impact on suppressing interference and improving the system performance. In this paper, we propose a hybrid-clustering algorithm based on the $Mat{\acute{e}}rn$ hard-core process (MHP) to restrain two kinds of co-channel interference in the HetNet. As the impracticality of the hexagonal grid model and the homogeneous Poisson point process model whose points distribute completely randomly to establish the system model. The HetNet model based on the MHP is adopted to satisfy the negative correlation distribution of base stations in this paper. Base on the system model, the spectrum sharing problem with restricted spectrum resources is further analyzed. On the basis of location information and the interference relation of base stations, a hybrid clustering method, which takes into accounts the fairness of two types of base stations is firstly proposed. Then, auction mechanism is discussed to achieve the spectrum sharing inside each cluster, avoiding the spectrum resource waste. Through combining the clustering theory and auction mechanism, the proposed novel algorithm can be applied to restrain the cross-layer interference and co-layer interference of HetNet, which has a high density of base stations. Simulation results show that spectral efficiency and system throughput increase to a certain degree.

The Effect of Information Technology Application on Knowledge Management Process in Clinical Nurses (간호사의 정보기술(IT)활용이 지식관리활동에 미치는 영향)

  • Jeong, Seok-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.10 no.1
    • /
    • pp.141-159
    • /
    • 2004
  • Purpose: The purpose of this study was to investigate the degree of information technology application, and to identify the effect of information technology application en knowledge management process in clinical nurses. Method: Participants were 629 regular clinical nurses who had worked for over 1 year in general units of 9 tertiary medical hospitals including 2 national university hospitals, 5 university hospitals, and 2 hospitals founded by business enterprises. Data were collected from March to May 2003 through questionnaires. Thee structured instruments were used to collect the data: Information Technology Application scale, Knowledge Management Process Scale(Jeong, Lee, Lee, & Kim, 2003), and one for general characteristics. The data were analyzed using reliability analysis, descriptive analysis, one-way ANOVA, $Scheff{\acute{e}$ test, correlation analysis, partial correlation analysis, and multiple regression analysis with the SPSS for Windows 10,0 program. Result: 1) The HIS application degree, IT application ability, and IT application frequency were significantly correlated with the degree of knowledge management process activation and 4 elements of knowledge management process, Knowledge Creation, Knowledge Storage, Knowledge Sharing, and Knowledge Utilization(p=.000). 2) The 3 variables, HIS application degree, IT application ability, and IT application frequency explained 47.2% of the total variance of the degree of knowledge management process activation, and 352% of me total variance of Knowledge Storage. And 2 variables, HIS application degree and IT application frequency explained 17.6% of the total variance of Knowledge Creation, 39.9% of the total variance of Knowledge sharing, and 33.8% of the total variance of Knowledge utilization(p=.000). 3) As a result of multiple regression analysis, the key determinant of the degree of knowledge management process activation for nurses was HIS application degree The HIS application degree, IT application frequency, position, IT application ability, and continuous total numbers of years working at the present hospital explained 51.1% of the total variance of the degree of knowledge management process activation(p=.000). Conclusions: These results suggest that the information technology application positively affects the nurses' knowledge management process. From the above findings, information technology application is empirically verified as a useful and effective method to activate knowledge management process, and knowledge management.

  • PDF