• Title/Summary/Keyword: Open Protocol

Search Result 478, Processing Time 0.03 seconds

Laparoscopic Primary Repair with Omentopexy for Duodenal Ulcer Perforation: A Single Institution Experience of 21 Cases

  • Ma, Chung Hyeun;Kim, Min Gyu
    • Journal of Gastric Cancer
    • /
    • v.12 no.4
    • /
    • pp.237-242
    • /
    • 2012
  • Purpose: Despite the great advances in laparoscopic techniques, most active general surgeons do not apply laparoscopic surgery in the treatment of duodenal ulcer perforation when facing a real-life emergency. Therefore, our study was designed to evaluate the feasibility of laparoscopic surgery in duodenal ulcer perforation, and provide a step-by-step protocol with tips and recommendations for less experienced surgeons. Materials and Methods: Between March, 2011 and May, 2012, 21 patients presenting with duodenal ulcer perforation underwent laparoscopic primary repair with omentopexy. There were no contraindications to perform laparoscopic surgery, and the choice of primary repair was decided according to the size of the perforation. The procedure for laparoscopic primary repair with omentopexy consisted of peritoneal lavage, primary suture, and omentopexy using a knot pusher. Results: During the operation, no conversion to open surgery or intra-operative events occurred. The median operation time was 45.0 minutes (20~80 minutes). Median day of commencement of a soft diet was day 6 (4~17 days). After surgery, the median hospital stay was 8.0 days (5~27 days). Postoperative complications occurred in one patient, which included a minor leakage. This complication was resolved by conservative management. Conclusions: Although our study was carried out on a small number of patients at a single institution, we conclude that laparoscopic primary repair can be an effective surgical method in the treatment of duodenal ulcer perforation. We believe that the detailed explanation of our procedure will help beginners to perform laparoscopic primary repair more easily.

Effects of a Closed Endotracheal Suction System on Oxygen Saturation, Ventilator-Associated Pneumonia, and Nursing Efficacy (폐쇄형 흡인술이 인공호흡기 환자의 산소포화도, 인공호흡기 관련 폐렴 및 흡인간호 효율성에 미치는 영향)

  • Lee Eun-Sook;Kim Sung-Hyo;Kim Jung-Sook
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.7
    • /
    • pp.1315-1325
    • /
    • 2004
  • Purpose: The purpose of this study was to examine the effects of a closed endotracheal suction system(CES) on oxygen saturation, ventilator associated pneumonia(VAP), and nursing efficacy in mechanically ventilated patients. Method: This study was conducted in the intensive care unit of a University Hospital in Gwangju City. Data was collected from July to October, 2003. Seventy mechanically ventilated patients were randomly divided into two groups; 32 for CES and 38 for open endotracheal suction system(OES) protocol. Twenty one nurses were also involved to examine the nurses' attitude of usefulness about CES. Result: $SaO_2$ was significantly different between CES and OES. The incidence of VAP in CES was lower than that of OES. Nursing efficacy was related to time, cost, and usefulness of the suction system. Time of suctioning in CES was shorter than that of OES. CES also contributed significantly to lower the cost of treatment than OES. The usefulness score of CES increased after 6 months of use. Conclusion: CES prevented VAP, was cost effective, and a safe suctioning system. CES can be used with patients with sensitivity to hypoxygenation and with a high risk of VAP.

The Study on the implementation of Portable Http Live Streaming Transmitter based the Embedded Linux (임베디드 리눅스 기반의 휴대용 Http 라이브 스트리밍 전송기 구현에 관한 연구)

  • Lee, Jea-Hee;Cho, Tae-Kyung
    • Journal of Digital Convergence
    • /
    • v.13 no.11
    • /
    • pp.141-148
    • /
    • 2015
  • In this paper, for developing and implementing the HLS(Http Live Streaming) transmitter based embedded linux which is operated easily and cheap and lower power, portable in all networks and client environments compared to exist video live streaming transmitters. We design the developed HLS transmitter hardware using the Arm11 core and then porting the Embedded Linux OS(Operating System) and implementing the HLS protocol using the open source FFmpeg and Segmenter. For proving the performance of developed HLS transmitter, we make the testing environment for testing the performance of HLS transmitter including the notebook, iPhone, android Phone, Notebook and then analysis the received video in the client displayer. In this paper, we suggest the developed HLS transmitter performance data values higher than the Apple company's HLS recommended specification values and the picture of developed HLS transmitter operation in the testing environment. The application field of this paper result is that the man who works in the emergency situation take HLS and transmit the live emergency situation to the head quarter using this portable HLS.

Development of Realtime Multimedia Streaming Service using Mobile Smart Devices (모바일 스마트 단말을 활용한 실시간 멀티미디어 스트리밍 서비스 개발)

  • Park, Mi-Ryong;Sim, Han-Eug
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.51-56
    • /
    • 2014
  • Thesedays, there are many smart device applications developed, especially on the using various sensors included in the smart device. Smart devices have several sensors which are camera, GPS, mike, and communication module for collecting ubiquitous environment, and many applications are developed by using such sensors. In this paper, we developed the multimedia stream architecture and examined the smart device applications based on open source with front and back-end server clouds for developing the conceptual architecture. Also, we examined the back-end distributed servers, realtime multimedia stream transferring, multi-media store, and media relay for other server and smart devices. We test the examined architecture on the real target environment to collect the SIP initial setup time, media stream delay, and end-to-end play time. The test results show that there have good network operation environment to provide realtime multimedia services, and we need to improve the end-to-end play time by minimizing the initial setup time.

The Efficacy and Safety of Periocular Acupoint Stimulation on Myopia Progression in Children: A Study Protocol (소아근시에 대한 눈 주위혈 지압의 유효성 및 안전성 평가 연구)

  • Cha, Ho yeol;Jung, A Ram;Cheon, Jin Hong;Choi, Jun Yong;Kim, Ki Bong
    • The Journal of Pediatrics of Korean Medicine
    • /
    • v.29 no.4
    • /
    • pp.12-22
    • /
    • 2015
  • Objectives Myopia has a higher prevalence rate in eastern countries, which also have a higher rate of educational fever compared to western countries. Considering this, social costs paid for myopia will increase rapidly in Korea. Although the development of myopia treatment is necessary, there has been a lack of relevant studies. Thus, this study aims to produce data to prevent unnecessary treatments and medical expenses. Methods The objective is to evaluate the effect of periocular acupressure exerted by a medical massager for myopia. This is an open-label, prospective, single-arm, and pre and post superiority study. The subjects are 7~12-year-old myopia patients with under 5 D (diopter) of spherical equivalent. A total of 56 subjects were enrolled. The selected subjects will wear the massager for 15 minutes twice a day for 24 weeks. The primary endpoint is the refraction change. The secondary endpoint is the axial length change. Statistical analysis was performed at a significant level of 0.05, using a two-tailed test. The criterion for significantly improved refraction was $-0.17{\pm}0.50$ D/6 months and that of axial length change was 0.126 mm. Results and Conclusions This study did not include a control group because children represent a vulnerable group. This objective study will bring some impact on Korean medical myopia treatment. A long-term confirmatory clinical study may be necessary in future.

Implementation of Microsoft COM Software Modules for Elliptic Curve Cryptographic Applications (타원곡선 암호시스템 응용을 위한 마이크로소프트 COM 소프트웨어 모듈 구현)

  • Kim, Tae-Ho;Kim, Chang-Hoon;Nam, In-Gil;Hong, Chun-Pyo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.1
    • /
    • pp.28-38
    • /
    • 2007
  • In this paper, we implement Microsoft COM software modules for elliptic curve cryptographic applications and analyze its performance. The implemented COM software modules support all elliptic curve key exchange protocols and elliptic curve digital signature algorithm in IEEE 1363 finite fields GF(p) and GF(2m). Since the implemented software modules intend to focus on a component-based software development method, and thus it have a higher productivity and take systematic characteristics to be open outward and to be standardized. Accordingly, it enable a software to be developed easier and faster rather than a method using C library. In addition it support the Microsoft COM interface, we can easily implement secure software applications based on elliptic curve cryptographic algorithms.

  • PDF

The Retrospective Study of Closed Reduction of Nasal Bone Fracture

  • Park, Han-Kyul;Lee, Jae-Yeol;Song, Jae-Min;Kim, Tae-Seup;Shin, Sang-Hun
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.36 no.6
    • /
    • pp.266-272
    • /
    • 2014
  • Purpose: This study was conducted in order to investigate the therapeutic effect of closed reduction according to a classification in patients with nasal bone fracture. Methods: The study was conducted retrospectively on 186 patients with a mean age of 38 years (range: 7 to 80 years). All patients were diagnosed by clinical and radiologic examination, and then classified according to Hwang's classification by computed tomography. The patients were further classified by their age, gender, causes of fracture, operation timing after fracture, concurrent facial bone fracture, and complications. All patients underwent the same reduction and treatment protocol and were then followed up regularly for at least three months. Results: The cause of the fracture was slip down, and the highest prevalence was shown in the 20s. The mean operation timing after fracture was 4.1 days (range: 1 to 14 days), and it tended to be longer in the case of defected septal bone or more severe fracture. The most common concurrent facial bone fracture was orbital blow-out fracture, and zygomaticomaxillary complex and maxillary fracture occured frequently. The largest number of complications occurred in class III and IIBs patients, and the main complication was postoperative pain. Conclusion: Results of nasal bone closed reduction on the 186 patients showed that serious complications rarely occurred. Closed reduction is generally an effective treatment for nasal bone fracture. However, in the case of severe concurrent septal bone fracture or comminuted fracture with depression, open reduction should be considered. Further study with a larger number of patients and further classification is required.

An Opened EDI Document Management System for Electronic Commerces (전자상거래를 위한 개방형 EDI문서 관리 시스템)

  • 정재희;김성진;강현석
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.1
    • /
    • pp.1-12
    • /
    • 2001
  • EDI is being considered as a new way for exchange business data in the form of electronic document, aiming the paperless transaction in business-to-business commerce. However, only a few enterprises select and practically use EDI accepts the closed and complicated method based on exclusive protocol for electronic document exchange. There, second, is insufficient regulation and system that support it. Last, the cost for operating is too high. In this paper, Open EDI Document Information Management System (OEIMS) was designed for solving the problem that mentioned above. We represented exchange document in code from as XML DTD. OEIMS that makers feasible to transfer their document through the web with low cost and, manage and search the information more efficiently and effectively using object-oriented database. We suggest OEIMS that provide efficiency to reposit and manage a system by modulized design of structural feature from EDI unlike other systems.

  • PDF

In the Automation Environment of Factory and Production, the Implementation of Security-enhanced Mobile Device Management System using Android-based Smart Phones (공장 및 생산 자동화에 있어 안드로이드 기반의 보안성이 강화된 모바일장비관리시스템 구현)

  • Yu, Hyung-Cik;Seon, Ki-Hyun;Kim, Sung-Un
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.779-789
    • /
    • 2014
  • Utilizing smart phones based on android applications in the field of FA(Factory Automation) or PA(Production Automation) is being deployed actively. In general, MDM(Mobile Device Management) is a crucial infra-structure to build such a FA or PA environment. In this paper, we suggest an open mobile device management platform and implement its prototype. The developed prototype consists of three modules such as DMS(Device Management Server), FUMO(Firmware Update Management Object) and SCOMO(Software Component Management Object). In addition, we suggest a security module based on the concept of the EAP (Extensible Authentication Protocol) and the AES (Advanced Encryption Standard). The suggested security module's prototype is applied to guarantee the data integrity in the process of communicating among DMS, FUMO and SCOMO for the purpose of utilizing smart phones based on android applications in a FA field. We also evaluate the performance of the implemented security prototype. According to our simulation results, the implemented prototype has a good performance in a FA environment and can be utilized in the other FA, PA or OA(Office Automation) environment with guaranteeing the security.

Design and Implementation of Sinkhole Router based IP Tracing System (싱크홀 라우터 기반 IP 추적 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2733-2740
    • /
    • 2009
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhance its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. In this study, we proposed an advanced IP Tracing mechanism based on Bloom filter and Sinkhole routing mechanism. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the Tracing performance also can be enhanced compared with previously suggested mechanism.