Purpose: The purpose of this study is to find out the patterns of teenage girls who is easy to suffer from dysmenorrhea with the Inbody test results by Sasang constitutions. Methods: The data from the 1681 participants were collected using a structured menstrual history questionnaire. Based on the survey responses, we had 97 adolescents with menstrual disorder as the test group and 97 adolescents without menstrual disorder as the control group. The clinical trials subjects were asked to respond to another questionnaire for identifying their constitutional types and undergo Inbody test. Results: The result of a comparison of the test and control groups showed that there' no relevance to the body fat mass and body fat percentage with menstrual irregularities. The lesser yang person with menstrual irregularities was no relevance to the body fat percentage. The greater yin person with menstrual irregularities was especially lacking in body fat mass and body fat percentage. The lesser yin person with menstrual irregularities was poor in body fat mass. Conclusions: As for study, female high school students with menstrual disorders have nothing to do with muscle mass. Body fats shortage could pose problems. According to the study, Taeumin female high school students usually needed to higher body fat than a general standard. It seems to be needed more body fat and weight than modern standards in period of poor sexuality for having a normal menorrhea especially Taeumin. It will take some continuing study that BMI standards should be changed or not on the Sasang constitutions.
IEIE Transactions on Smart Processing and Computing
/
v.6
no.3
/
pp.158-167
/
2017
Internet-based social and interactive video applications have become major constituents of the envisaged applications for next-generation multimedia networks. However, inherently dynamic network conditions, together with varying user expectations, pose many challenges for resource allocation mechanisms for such applications. Yet, in addition to addressing these challenges, service providers must also consider how to mitigate their operational costs (e.g., energy costs, equipment costs) while satisfying the end-user quality of service (QoS) expectations. This paper proposes a heuristic solution to the problem, where the energy incurred by the applications, and the monetary costs associated with the service infrastructure, are minimized while simultaneously maximizing the average end-user QoS. We evaluate the performance of the proposed solution in terms of serving probability, i.e., the likelihood of being able to allocate resources to groups of users, the computation time of the resource allocation process, and the adaptability and sensitivity to dynamic network conditions. The proposed method demonstrates improvements in serving probability of up to 27%, in comparison with greedy resource allocation schemes, and a several-orders-of-magnitude reduction in computation time, compared to the linear programming approach, which significantly reduces the service-interrupted user percentage when operating under variable network conditions.
Objectives: Because the amount of medical waste (i.e., health-care waste) generated in Korea is rapidly increasing and social concern against its safety is widespread, a number of issues related with medical wastes are being discussed. The purpose of this study is to compare diverse medical waste management systems worldwide and propose future directions of a medical waste management system in Korea. Methods: Literature review was conducted mainly on the WHO, and developed countries such as the European Union (Germany, Belgium and UK), Japan and the United States. For these countries, the data with respect to their systems for medical waste management ranging from the definition of medical waste to the whole processes of collection, transportation and disposal were summarized and compared. Results: The terminology and classification of medical wastes were not consistent for WHO recommendation, EU, Japan, US and Korea. Comparison of the collection, storage, transportation and disposal of medical waste showed that Korea had rather stronger regulations for medical waste management compared to developed countries including Belgium (Flanders region), Germany, Japan and the US. Considering that developed countries adopt rather flexible disposal system especially for general medical wastes which pose lower possibility of infection, Korean government could consider diversifying disposal methods other than incineration. It may also be very important to try to reduce the amount of medical wastes and enough capacity for off-site incineration are secured. Conclusion: Our study of international comparisons suggests that it is necessary to continue to identify advantages and disadvantages of the current medical waste management systems and establish more effective one in Korea.
It has been always the issue to discuss 'how we teach mathematics' for the mathematical learning. As for an answer to this, it was suggested to use the history of mathematics. The reason is simple that is, the education of mathematics requires to understand mathematics and to know the history of mathematics is effective for mathematical understanding. In particular, the history of algebra was discussed to some extent as an illustration. This study focuses on the history of geometry from this point of view. We review the history of geometry by comparison in terms of three criteria from the origin of geometry to modem differential geometry in the middle of the 20th century, which are backgrounds (inner or outer ones), characterizations (approach, method, object), influences to modem mathematics. As an application of such historical data to the education of mathematics, we pose the problem to determine the order of instruction in mathematics.
Journal of the Korea Society of Computer and Information
/
v.10
no.3
s.35
/
pp.19-34
/
2005
The difficulties in implementing of image processing algorithms are a major reason for the lack of research into algorithm comparison. This fact makes an image processing research with difficult. We conclude that it is important to represent algorithms in form of reusable code. Since current image processing systems do not fulfill all requirements we must pose on reusable implementations, we propose to solve the reuse problem by applying generic programming. We define two dimensional iterators, which mediate between image processing algorithms and their underlying data structures, so that the same algorithm implementation can be applied to any number of different image formats. The elegance and efficiency of this approach is illustrated by a number of useful examples and demonstrated by porting in existing image processing algorithm IDE(Integrated Development Environment).
In MIPv6, unauthenticated binding updates expose the involved MN and CN to various security attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols have been proposed. In this paper, we pro-pose a novel protocol for the secure binding updates in MIPv6, which can resolve the drawbacks of the Deng-Zhou-Bao's protocol [2], by adopt-ing Aura's CGA scheme with two hashes [9]. Aura's scheme enables our protocol to achieve stronger security than other CGA-based protocols without a trusted CA, resulting in less cost of verifying the HA's public key than the Deng-Zhou-Bao's protocol. Through the comparison of our protocol with other protocols such as the Deng-Zhou-Bao's protocol, CAM-DH and SUCV, we show that our protocol can provide better performance and manageability in addition to stronger security than other approaches.
Southeast Asian studies in Singapore has had a problem with locating local scholarship from the outset. The initiation of English-track scholarship was done by British scholars while Chinese scholars in the beginning were not considered as local people but as sojourners who identified China as their fatherland. If the latter had successfully located their scholarship in the post-colonial environment of Singapore, the job of identifying local scholarship would have been much easier. Indeed, for some time in the 1960s-70s, there existed a relatively strong local scholarship that was based mainly at Nanyang University. However, they became marginalized as English became dominant not just in education but also in Singapore society. Unlike the Chinese-track scholarship, the English-track scholarship in Singapore has developed greatly over the years. The establishment of ISEAS was the crystallized form of Singapore's endeavors to develop a Singapore brand of Southeast Asian studies to the world. Alongside ISEAS, NUS has carried on the English-track Southeast Asian studies and become a world-class university in this academic field. The formation of the Southeast Asian Programme and ARI marked a cornerstone for NUS in advancing Southeast Asian studies. However, Singaporean scholarship continues to be weak in comparison to foreign scholarship. In the absence of strong local scholarship, the typical way in which Singapore has chosen to develop Southeast Asian studies has been to establish world-class institutes and to bring in foreign talents. This strategy has perhaps paid off since it has situated Singapore as the prime place where scholars gather, information goes around and quality research outcomes are published. However, whether or not it has strengthened local scholarship remains a controversial issue. The dominant contribution of foreign scholars continues to pose the problem of whether the ownership of Southeast Asian studies in Singapore belongs to Singapore itself. The identification of scholarship in Singapore is an unsettled matter.
Various monitoring systems have been implemented in civil infrastructure to ensure structural safety and integrity. In long-term monitoring, these systems generate a large amount of data, where anomalies are not unusual and can pose unique challenges for structural health monitoring applications, such as system identification and damage detection. Therefore, developing efficient techniques is quite essential to recognize the anomalies in monitoring data. In this study, several machine learning techniques are explored and implemented to detect and classify various types of data anomalies. A field dataset, which consists of one month long acceleration data obtained from a long-span cable-stayed bridge in China, is employed to examine the machine learning techniques for automated data anomaly detection. These techniques include the statistic-based pattern recognition network, spectrogram-based convolutional neural network, image-based time history convolutional neural network, image-based time-frequency hybrid convolution neural network (GoogLeNet), and proposed ensemble neural network model. The ensemble model deliberately combines different machine learning models to enhance anomaly classification performance. The results show that all these techniques can successfully detect and classify six types of data anomalies (i.e., missing, minor, outlier, square, trend, drift). Moreover, both image-based time history convolutional neural network and GoogLeNet are further investigated for the capability of autonomous online anomaly classification and found to effectively classify anomalies with decent performance. As seen in comparison with accuracy, the proposed ensemble neural network model outperforms the other three machine learning techniques. This study also evaluates the proposed ensemble neural network model to a blind test dataset. As found in the results, this ensemble model is effective for data anomaly detection and applicable for the signal characteristics changing over time.
Journal of The Korean Society of Integrative Medicine
/
v.10
no.4
/
pp.93-102
/
2022
Purpose : The purpose of this study was to analyze the change in thickness of transvers abdominis, internal oblique, and external oblique when virtual reality based ring fit adventure is applied to young adults in order to investigate the effect of ring fit adventure on core stabilization. Methods : 30 subjects participated in the experiment. Subjects were randomly assigned to two groups. 15 subjects performed ring fit adventure core exercise (experimental group) and 15 subjects bridge and dead bug exercise (control group). The ring fit adventure core exercise program consists of 6 types, 1) bow pull, 2) overhead lunge twist, 3) pendulum bend, 4) seated ring raise, 5) plank, 6) warrior III pose. Each exercise was performed for 5 minutes, for a total of 30 minutes. The bridege and dead bug exercise were performed for 15 minutes each for a total of 30 minutes. All interventions were performed 3 times a week for 4 weeks. Thickness of the abdominal muscles was measured with a ultrasound. The paired t-test was used to compare the thickness of the transverse abdominis, internal oblique, and external oblique before and after intervention, and the comparison between groups was analyzed using the independent t-test. Results : As a result, in the experimental group, thickness of transverse abdominis and internal oblique increased significantly (p<.05), but external oblique decreased significantly (p<.05), and in the control group, thickness of transverse abdominis, internal oblique, and external oblique increased significantly (p<.05). There was a significant difference in external oblique in the difference between groups (p<.05). Conclusion : These study results showed that core exercise using ring fit adventure can reduce external oblique and increased selective muscle activity of transverse abdominis and internal oblique of the deep abdominal muscles, so it is meaningful as an effective intervention for core stabilization.
Accidental anchor drop can cause disturbances to seabed materials and pose significant threats to the safety and serviceability of submarine structures such as pipelines. In this study, a series of anchor drop tests was carried out to investigate the penetration mechanism of a Hall anchor in sand and clay. A special anchor drop apparatus was designed to model the inflight drop of a Hall anchor. Results indicate that Coriolis acceleration was the primary cause of large horizontal offsets in sand, and earth gravity had negligible impact on the lateral movement of dropped anchors. The indued final horizontal offset was shown to increase with the elevated drop height of an anchor, and the existence of water can slow down the landing velocity of an anchor. It is also observed that water conditions had a significant effect on the influence zone caused by anchors. The vertical influence depth was over 5 m, and the influence radius was more than 3 m if the anchor had a drop height of 25 m in dry sand. In comparison, the vertical influence depth and radius reduced to less than 3 m and 2 m, respectively, when the anchor was released from 10 m height and fell into the seabed with a water depth of 15 m. It is also found that the dynamically penetrating anchors could significantly influence the earth pressure in clay. There is a non-linear increase in the measured penetration depth with kinematic energy, and the resulted maximum earth pressure increased dramatically with an increase in kinematic energy. Results from centrifuge model tests in this study provide useful insights into the penetration mechanism of a dropped anchor, which provides valuable data for design and planning of future submarine structures.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.