• Title/Summary/Keyword: Multi-Core

Search Result 1,184, Processing Time 0.028 seconds

Chuna Manual Therapy for Stroke: A Systematic Review and Meta-analysis (뇌졸중의 추나요법에 대한 체계적 문헌 고찰)

  • Kim, Mi-Kyung;Han, Chang-Ho
    • The Journal of Churna Manual Medicine for Spine and Nerves
    • /
    • v.14 no.2
    • /
    • pp.15-28
    • /
    • 2019
  • Objectives : This study aimed to systematically and comprehensively review controlled clinical trials on the effectiveness and safety of Chuna Manual Therapy for stroke. Methods : By October 7, 2019, three core databases and three domestic databases were searched. Seven major academic journals on the related field were also hand-searched. Methodological quality of the included studies was evaluated using the Cochrane risk of bias tool. Meta-analysis was conducted and the quality of its evidence was assessed using the GRADE methodology. Results : Five articles met the eligibility criteria. The results of most of included studies were in favor of Chuna Manual Therapy. No study described any adverse events during or after the clinical trials. Meta-analysis of three eligible studies showed that the pre- and post-treatment scores on the Modified Barthel Index (mean difference 8.00, 95% confidence interval 0.26 to 15.74) and Berg Balance Scale (mean difference 3.57, 95% confidence interval 0.64 to 6.51) of the Chuna-treated group were significantly different, but only marginally higher than those of the non-treatment group. Thus, the level of evidence gathered from these studies was assessed to be low. Conclusions : Based on current available evidence, any confirmative conclusions cannot be made on the effectiveness and safety of Chuna Manual Therapy for stroke because of the small sample size, low methodological quality, presence of statistical heterogeneity, and missing safety information. More rigorously designed large-scale multi-center studies are needed to establish more specific and credible evidence to support or oppose the use of Chuna Manual Therapy for stroke.

Design and Implementation for Efficient Multi Version ADS-B Target Report Message Processing (효율적인 다중 버전 ADS-B 타깃 리포트 메시지 처리를 위한 모듈 설계 및 구현)

  • Kim, Kanghee;Jang, Eunmee;Song, Inseong;Cho, Taehwan;Choi, Sangbang
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.265-277
    • /
    • 2015
  • Automatic dependent surveillance-broadcast (ADS-B) is the core technology of communication, navigation and surveillance/air traffic management (CNS/ATM), automatically broadcasts its own position information using GNSS and has an advantage of lower geological constraints and faster update speed compared with legacy radar systems. EUROCONTROL defined all purpose structured eurocontrol surveillance information exchange (ASTERIX) CAT.021. ASTERIX CAT.021 is modified several times, but it has compatibility issues with previous version of it. In this paper, we have designed an efficient message processing module regardless of the version of ASTERIX CAT.021. This implemented module generates patterns to collect messages received from the network, after that, received messages are processed in the routine that is defined in accordance with the patterns.

EFFECT OF BASE FLOW AND TURBULENCE ON THE SEPARATION MOTION OF STRAP-ON ROCKET BOOSTERS (기저부 유동 및 난류가 다단 로켓의 단 분리 운동에 미치는 영향)

  • Ko, S.H.;Kim, J.K.;Han, S.H.;Kim, J.H.;Kim, C.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2007.04a
    • /
    • pp.83-86
    • /
    • 2007
  • Turbulent flow analysis is conducted around the multi-stage launch vehicle including base region and detachment motion of strap-on boosters due to resultant aerodynamic forces and gravity is simulated. Aerodynamic solution procedure is coupled with rigid body dynamics for the prediction of separation behavior. An overset mesh technique is adopted to achieve maximum efficiency in simulating relative motion of bodies and various turbulence models are implemented on the flow solver to predict the aerodynamic forces accurately. At first, some preliminary studies are conducted to show the importance of base flow for the exact prediction of detachment motion and to find the most suitable turbulence model for the simulation of launch vehicle configurations. And then, developed solver is applied to the simulation of KSR-III, a three-stage sounding rocket researched in Korea. From the analyses, after-body flow field strongly affects the separation motions of strap-on boosters. Negative pitching moment at initial stage is gradually recovered and a strap-on finally results in a safe separation, while fore-body analysis shows collision phenomena between core rocket and booster. And a slight variation of motion is observed from the comparison between inviscid and turbulent analyses. Change of separation trajectory based on viscous effects is just a few percent and therefore, inviscid analysis is sufficient for the simulation of separation motion if the study is focused only on the movement of strap-ons.

  • PDF

Design of Border Surveillance and Control System Based on Wireless Sensor Network (WSN 기반 국경 감시 및 제어 시스템 설계)

  • Hwang, Bo Ram;An, Sun Shin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.11-14
    • /
    • 2015
  • WSN (Wireless Sensor Network) based on low-power is one of the core technologies in the ubiquitous society. In this paper, we present a border surveillance and control system in WSN environment. The system consists of static sensor node, mobile sensor node, static gateway, mobile gateway, server and mobile application. Mobile applications are divided into user mode and manager mode. So users monitor border surveillance through mobile phone and get information of border network environment without time and space constraints. In manager mode, for the flexible operation of nodes, manager can update to the software remotely and adjust the position of the mobile node. And also we implement a suitable multi-hop routing protocol for scalable low-power sensor nodes and confirm that the system operates well in WSN environment.

Computing Performance Comparison of CPU and GPU Parallelization for Virtual Heart Simulation (가상 심장 시뮬레이션에서 CPU와 GPU 병렬처리의 계산 성능 비교)

  • Kim, Sang Hee;Jeong, Da Un;Setianto, Febrian;Lim, Ki Moo
    • Journal of Biomedical Engineering Research
    • /
    • v.41 no.3
    • /
    • pp.128-137
    • /
    • 2020
  • Cardiac electrophysiology studies often use simulation to predict how cardiac will behave under various conditions. To observe the cardiac tissue movement, it needs to use the high--resolution heart mesh with a sophisticated and large number of nodes. The higher resolution mesh is, the more computation time is needed. To improve computation speed and performance, parallel processing using multi-core processes and network computing resources is performed. In this study, we compared the computational speeds of CPU parallelization and GPU parallelization in virtual heart simulation for efficiently calculating a series of ordinary differential equations (ODE) and partial differential equations (PDE) and determined the optimal CPU and GPU parallelization architecture. We used 2D tissue model and 3D ventricular model to compared the computation performance. Then, we measured the time required to the calculation of ODEs and PDEs, respectively. In conclusion, for the most efficient computation, using GPU parallelization rather than CPU parallelization can improve performance by 4.3 times and 2.3 times in calculations of ODEs and PDE, respectively. In CPU parallelization, it is best to use the number of processors just before the communication cost between each processor is incurred.

Relationship between shear behavior characteristics and mechanical parameters of fractures (절리면에서의 전단거동 특성과 역학적 파라미터들 간의 상관성)

  • 이종욱;이찬구;황신일;장천중;최원학
    • The Journal of Engineering Geology
    • /
    • v.3 no.1
    • /
    • pp.1-20
    • /
    • 1993
  • In this study, laboratory direct shear tests on 37 core specimens of gneiss were performed to examine the characteristics of shear behavior on fractures by using a portable direct shear box. The multi-stage shear testing method was used and normal stress applied to specimens ranges from 5.60 to $25.67kg/\textrm{cm}^2$. On the basis of test results, the empirical equations for the shear strength on fractures were suggested. The methanical parameters that can influence the shear behavior were derived and compared between each parameter. The values of shear stiffness have a trend showing rapid increase with the increase of normal stress and joint roughness coeffident, and the average value of secant shear stiffness for all specimens is about $110.68kg/\textrm{cm}^3$ under the range of normal stress applied in this test In addition, the relationship between the length of specimen and shear stiffness is inversely correlated due to the size effect. Therefore, even the specimens with the same joint roughness coeffident show the trend of decreasing shear stiffness in case of the specimens being the longer length.

  • PDF

Profiling of Differentially Expressed Genes in Human Stem Cells by cDNA Microarray

  • Kim, Chul Geun;Lee, Jong Joo;Jung, Dae Young;Jeon, Jinseon;Heo, Hyen Seok;Kang, Ho Chul;Shin, June Ho;Cho, Yoon Shin;Cha, Kyung Joon;Kim, Chan Gil;Do, Byung-Rok;Kim, Kyung Suk;Kim, Hyun-Soo
    • Molecules and Cells
    • /
    • v.21 no.3
    • /
    • pp.343-355
    • /
    • 2006
  • Stem cells are unique cell populations with the ability to undergo both self-renewal and differentiation, although a wide variety of adult stem cells as well as embryonic stem cells have been identified and stem cell plasticity has recently been reported. To identify genes implicated in the control of the stem cell state as well as the characteristics of each stem cell line, we analyzed the expression profiles of genes in human embryonic, hematopoietic ($CD34^+$ and $CD133^+$), and mesenchymal stem cells using cDNA microarrays, and identified genes that were differentially expressed in specific stem cell populations. In particular we were able to identify potential hESC signature-like genes that encode transcription factors (TFAP2C and MYCN), an RNA binding protein (IMP-3), and a functionally uncharacterized protein (MAGEA4). The overlapping sets of 22 up-regulated and 141 down-regulated genes identified in this study of three human stem cell types may also provide insight into the developmental mechanisms common to all human stem cells. Furthermore, our comprehensive analyses of gene expression profiles in various adult stem cells may help to identify the genetic pathways involved in self-renewal as well as in multi-lineage specific differentiation.

Field Application of a Cable NDT System for Cable-Stayed Bridge Using MFL Sensors Integrated Climbing Robot (누설자속센서를 탑재시킨 이동로봇을 이용한 사장교 케이블 비파괴검사 시스템의 현장 적용)

  • Kim, Ju-Won;Choi, Jun-Sung;Lee, Eun-Chan;Park, Seung-Hee
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.34 no.1
    • /
    • pp.60-67
    • /
    • 2014
  • In this study, an automated cable non-destructive testing(NDT) system was developed to monitor the steel cables that are a core component of cable-stayed bridges. The magnetic flux leakage(MFL) method, which is suitable for ferromagnetic continuum structures and has been verified in previous studies, was applied to the cable inspection. A multi-channel MFL sensor head was fabricated using hall sensors and permanent magnets. A wheel-based cable climbing robot was fabricated to improve the accessibility to the cables, and operating software was developed to monitor the MFL-based NDT research and control the climbing robot. Remote data transmission and robot control were realized by applying wireless LAN communication. Finally, the developed element techniques were integrated into an MFL-based cable NDT system, and the field applicability of this system was verified through a field test at Seohae Bridge, which is a typical cable-stayed bridge currently in operation.

TOUSE: A Fair User Selection Mechanism Based on Dynamic Time Warping for MU-MIMO Networks

  • Tang, Zhaoshu;Qin, Zhenquan;Zhu, Ming;Fang, Jian;Wang, Lei;Ma, Honglian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4398-4417
    • /
    • 2017
  • Multi-user Multiple-Input and Multiple-Output (MU-MIMO) has potential for prominently enhancing the capacity of wireless network by simultaneously transmitting to multiple users. User selection is an unavoidable problem which bottlenecks the gain of MU-MIMO to a great extent. Major state-of-the-art works are focusing on improving network throughput by using Channel State Information (CSI), however, the overhead of CSI feedback becomes unacceptable when the number of users is large. Some work does well in balancing tradeoff between complexity and achievable throughput but is lack of consideration of fairness. Current works universally ignore the rational utilizing of time resources, which may lead the improvements of network throughput to a standstill. In this paper, we propose TOUSE, a scalable and fair user selection scheme for MU-MIMO. The core design is dynamic-time-warping-based user selection mechanism for downlink MU-MIMO, which could make full use of concurrent transmitting time. TOUSE also presents a novel data-rate estimation method without any CSI feedback, providing supports for user selections. Simulation result shows that TOUSE significantly outperforms traditional contention-based user selection schemes in both throughput and fairness in an indoor condition.

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model

  • Xie, Dong;Peng, HaiPeng;Li, Lixiang;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2427-2445
    • /
    • 2016
  • In contrast to traditional "store-and-forward" routing mechanisms, network coding offers an elegant solution for achieving maximum network throughput. The core idea is that intermediate network nodes linearly combine received data packets so that the destination nodes can decode original files from some authenticated packets. Although network coding has many advantages, especially in wireless sensor network and peer-to-peer network, the encoding mechanism of intermediate nodes also results in some additional security issues. For a powerful adversary who can control arbitrary number of malicious network nodes and can eavesdrop on the entire network, cryptographic signature schemes provide undeniable authentication mechanisms for network nodes. However, with the development of quantum technologies, some existing network coding signature schemes based on some traditional number-theoretic primitives vulnerable to quantum cryptanalysis. In this paper we first present an efficient network coding signature scheme in the standard model using lattice theory, which can be viewed as the most promising tool for designing post-quantum cryptographic protocols. In the security proof, we propose a new method for generating a random lattice and the corresponding trapdoor, which may be used in other cryptographic protocols. Our scheme has many advantages, such as supporting multi-source networks, low computational complexity and low communication overhead.