• 제목/요약/키워드: Key sharing

검색결과 611건 처리시간 0.027초

비만치료와 관련된 산삼복합약침요법에 대한 연구 동향 고찰 (Review on Studies of Wild Ginseng Complex Pharmacopuncture Related to Obesity Treatment)

  • 박정식
    • 한방비만학회지
    • /
    • 제21권1호
    • /
    • pp.42-48
    • /
    • 2021
  • Objectives: The purpose of this study was to review the studies of the wild ginseng complex pharmacopuncture related to obesity treatment. Methods: We searched the papers with key words of 'wild ginseng complex pharmacopuncture', 'wild ginseng pharmacopuncture', 'obesity', 'fat', 'weight' in Oriental medicine Advanced Searching Integrated System, KRpia, Koreanstudies Information Service System, Research Information Sharing Service, KoreaMed and PubMed, Scopus. We classified the papers by year, content and study type. Results: There were 7 studies about the wild ginseng pharmacopuncture related to obesity treatment. Cell studies were excluded because they were not related to obesity. Analysis of 3 animal experiments and 4 clinical studies were conducted to describe each research subject, method, and research results. Conclusion: More interest and further research will be needed on wild ginseng pharmacopuncture related to obesity treatment in the Korean medicine to achieve clinical application and to develop treatment protocols for the obesity disease.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

비만 치료에 매선을 이용한 임상 연구 동향 분석 (Trends in Clinical Research of Catgut Embedding for Obesity Treatment)

  • 박정식
    • 한방재활의학과학회지
    • /
    • 제33권3호
    • /
    • pp.129-134
    • /
    • 2023
  • Objectives The purpose of this study was to review the studies of catgut embedding related to obesity treatment. Methods We searched the papers with key words of obesity and catgut embedding via searching Research Information Sharing Service, DBpia, Koreanstudies Information Service System, Oriental Medicine Advanced Searching Integrated System, Scopus, PubMed. Additional data including study design, study topics, characteristics of participants and treatment, outcomes was extracted from full text of each study. Results There were nine studies about the catgut embedding related to obesity treatment. Five articles were conducted in China, two articles were conducted in Mexico, and two articles was published in Korea. Analysis of seven experimental studies and two observational studies were conducted to describe each research subject, method, and research results. Conclusions More interest and further research will be needed on catgut embedding related to obesity treatment in the Korean medicine to achieve clinical application and to develop treatment protocols for the obesity disease.

Lessons Learned from Conducting Design-Based Research Studies

  • LEE, Ji-Yeon
    • Educational Technology International
    • /
    • 제14권1호
    • /
    • pp.27-40
    • /
    • 2013
  • Design-Based Research (DBR) focuses on developing key principles of interventions to advance both theory and practicalities of dissemination (Brown, 1992), yet its methodological details have not been quite established. Thus, the purpose of this paper is to address the pragmatics of DBR by sharing the researcher's reflections on conducting a longitudinal DBR project for five years. In an attempt to advance college teaching practices as well as theories related to student plagiarism, the project focused on refining "humble" theories on how and why college students engage in plagiarism to design classroom interventions for promoting academic integrity. Similar to the Integrative Learning Design (ILD) framework proposed by Bannan-Ritland (2003), but conducted in a much simpler and less formal format, this study followed DBR cycles from initial conceptualization to design and enact instructional interventions in authentic contexts while collecting both quantitative and qualitative data from each phase. Finally, the paper addresses some challenges encountered throughout the DBR project as well as the lessons learned from this experience. Like many previous DBR studies whose practical relevance is limited to local context, the findings from this study may not be easily generalized for other contexts.

Human Visual Intelligence and the New Territory of Educational Technology Research

  • RHA, Ilju
    • Educational Technology International
    • /
    • 제8권1호
    • /
    • pp.1-16
    • /
    • 2007
  • The general aim of this article is to explicate what can be researched in our field based on the new understanding on the ability of human visual intelligence. To follow this aim, three key discussions were followed. The first is to explain why the human visual intelligence research is so important in our field and how it was neglected. The basic orientations of the research questions used in its framing and in answering are reviewed. After reviewing traditional research orientations, as the second discussion, alternative, more useful perspective for thinking about human visual intelligence is suggested. And the possibility of contribution for the future research in general is discussed. In doing so, human visual intelligence was defined in rather practically oriented ways rather than theoretically oriented ones. More practical perspectives were suggested. The third discussion is to show how to use the alternative perspectives of human visual intelligence in the areas of educational technology research. It was hoped that the article lays out conceptual groundwork for generation of educational technology research frameworks which can be used for the research conduct, reproduction and sharing by adopting practically oriented views on human visual intelligence as a new territory of educational technology research.

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

SCM 첨단계획수립시스템의 구조와 도입효과 분석 : 포스코 사례를 중심으로 (Analyis of the Structure and Impact of SCM Advanced Planning System : Lessons from POSCO Case)

  • 노경호;박성택;김태웅
    • 디지털융복합연구
    • /
    • 제12권4호
    • /
    • pp.145-155
    • /
    • 2014
  • 포스코는 지난 4년 연속 세계 최고의 경쟁력을 가진 철강기업으로 뽑혔다. 포스코의 성공은 기술혁신과 함께 수많은 협력업체와 고객과의 파트너십에 기인한다. 특히 협력업체와의 파트너십은 효과적인 공급망관리(SCM)를 기반으로 한다. ERP시스템이 표준화된 영업관리를 지원해 주지만 예외사항과 변동으로 이어지는 환경의 변화에는 효과적이지 못하다. SCM 첨단계획수립기능(APS)는 이런 예외적인 사항에 대한 강력한 대응을 가능하게 한다. 본 연구에서는 포스코가 운영 중인 APS의 구조와 성과에 대한 사례를 살펴보았다. 더불어 SCM과 관련된 업무를 담당하는 구성원들에 대한 설문조사를 통해 정보공유, 협업, 협력업체에 대한 인센티브, SCM 성과 등에 대한 인지정도를 연구모형을 통해 분석을 시도하였다. 사례연구 및 통계적 분석결과가 시사하는 몇 가지 함의도 제시하였다.

3~4 GHz 대 주파수 공동사용을 위한 스펙트럼 액세스 모델 제안 (Spectrum Access Model Proposal for Frequency Sharing in 3~4 GHz)

  • 강영흥;이대영;박덕규
    • 한국전자파학회논문지
    • /
    • 제25권8호
    • /
    • pp.821-827
    • /
    • 2014
  • 최근의 주파수 부족현상을 해결하면서 간섭 없이 스펙트럼을 효율적으로 사용하는 주파수 공동 사용에 대한 연구가 많이 이루어지고 있다. 또한, 이와 더불어 급증하는 모바일 데이터 수요에 대처하기 위한 주요 스펙트럼 정책으로서 ASA/LSA(Authorized Shared Access/Licensed Shared Access) 개념을 많은 나라에서 도입하고 있는데, 이는 모바일 트래픽 증가를 해결하기 위한 스몰셀(small cell) 기술을 적용하는데 가장 적합한 스펙트럼 액세스 모델이다. ASA/LSA 주파수로 3.5 GHz 대역이 고려되고 있는 바, 본 논문에서는 가능한 ASA/LSA 대역을 발굴하고, 나아가 면허 없는 대역을 확장하기 위해 국내 3~4 GHz 대역에 대한 SAM(Spectrum Access Model)을 제안하고, 그 결과는 향후 스몰셀 수용 및 개방 주파수 확보를 위한 SAM을 개발하는데 필요한 데이터를 제공하게 될 것이다.

Hybrid-clustering game Algorithm for Resource Allocation in Macro-Femto HetNet

  • Ye, Fang;Dai, Jing;Li, Yibing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1638-1654
    • /
    • 2018
  • The heterogeneous network (HetNet) has been one of the key technologies in Long Term Evolution-Advanced (LTE-A) with growing capacity and coverage demands. However, the introduction of femtocells has brought serious co-layer interference and cross-layer interference, which has been a major factor affecting system throughput. It is generally acknowledged that the resource allocation has significant impact on suppressing interference and improving the system performance. In this paper, we propose a hybrid-clustering algorithm based on the $Mat{\acute{e}}rn$ hard-core process (MHP) to restrain two kinds of co-channel interference in the HetNet. As the impracticality of the hexagonal grid model and the homogeneous Poisson point process model whose points distribute completely randomly to establish the system model. The HetNet model based on the MHP is adopted to satisfy the negative correlation distribution of base stations in this paper. Base on the system model, the spectrum sharing problem with restricted spectrum resources is further analyzed. On the basis of location information and the interference relation of base stations, a hybrid clustering method, which takes into accounts the fairness of two types of base stations is firstly proposed. Then, auction mechanism is discussed to achieve the spectrum sharing inside each cluster, avoiding the spectrum resource waste. Through combining the clustering theory and auction mechanism, the proposed novel algorithm can be applied to restrain the cross-layer interference and co-layer interference of HetNet, which has a high density of base stations. Simulation results show that spectral efficiency and system throughput increase to a certain degree.

간호사의 정보기술(IT)활용이 지식관리활동에 미치는 영향 (The Effect of Information Technology Application on Knowledge Management Process in Clinical Nurses)

  • 정석희
    • 간호행정학회지
    • /
    • 제10권1호
    • /
    • pp.141-159
    • /
    • 2004
  • Purpose: The purpose of this study was to investigate the degree of information technology application, and to identify the effect of information technology application en knowledge management process in clinical nurses. Method: Participants were 629 regular clinical nurses who had worked for over 1 year in general units of 9 tertiary medical hospitals including 2 national university hospitals, 5 university hospitals, and 2 hospitals founded by business enterprises. Data were collected from March to May 2003 through questionnaires. Thee structured instruments were used to collect the data: Information Technology Application scale, Knowledge Management Process Scale(Jeong, Lee, Lee, & Kim, 2003), and one for general characteristics. The data were analyzed using reliability analysis, descriptive analysis, one-way ANOVA, $Scheff{\acute{e}$ test, correlation analysis, partial correlation analysis, and multiple regression analysis with the SPSS for Windows 10,0 program. Result: 1) The HIS application degree, IT application ability, and IT application frequency were significantly correlated with the degree of knowledge management process activation and 4 elements of knowledge management process, Knowledge Creation, Knowledge Storage, Knowledge Sharing, and Knowledge Utilization(p=.000). 2) The 3 variables, HIS application degree, IT application ability, and IT application frequency explained 47.2% of the total variance of the degree of knowledge management process activation, and 352% of me total variance of Knowledge Storage. And 2 variables, HIS application degree and IT application frequency explained 17.6% of the total variance of Knowledge Creation, 39.9% of the total variance of Knowledge sharing, and 33.8% of the total variance of Knowledge utilization(p=.000). 3) As a result of multiple regression analysis, the key determinant of the degree of knowledge management process activation for nurses was HIS application degree The HIS application degree, IT application frequency, position, IT application ability, and continuous total numbers of years working at the present hospital explained 51.1% of the total variance of the degree of knowledge management process activation(p=.000). Conclusions: These results suggest that the information technology application positively affects the nurses' knowledge management process. From the above findings, information technology application is empirically verified as a useful and effective method to activate knowledge management process, and knowledge management.

  • PDF