• Title/Summary/Keyword: Preemptive

Search Result 412, Processing Time 0.023 seconds

Preemptive pyloroplasty for iatrogenic vagus nerve injury in intrahepatic cholangiocarcinoma patients undergoing extensive left-sided lymph node dissection: a retrospective observational study

  • Hwang, Shin;Jung, Dong-Hwan;Jwa, Eun-Kyoung;Kim, Yumi
    • Journal of Yeungnam Medical Science
    • /
    • v.39 no.3
    • /
    • pp.235-243
    • /
    • 2022
  • Background: Intrahepatic cholangiocarcinoma (ICC) of the left liver often shows left-sided lymph node (LN) metastasis. If gastric lesser curvature is extensively dissected, it can induce an iatrogenic injury to the extragastric vagus nerve branches that control motility of the pyloric sphincter and lead to gastric stasis. To cope with such LN dissection-associated gastric stasis, we performed pyloroplasty preemptively. The objective of this study was to analyze our 20-year experience of preemptive pyloroplasty performed in 10 patients. Methods: We investigated clinical sequences of 10 patients with ICC who underwent preemptive pyloroplasty following left hepatectomy and extended left-sided LN dissection. Incidence of gastric stasis and oncological survival outcomes were analyzed. Results: All 10 patients were classified as stage IIIB due to T1-3N1M0 stage according to the 8th edition of American Joint Committee on Cancer staging system. The overall patient survival rate was 51.9% at 1 year, 25.9% at 2 years, and 0% at 3 years. Seven patients showed uneventful postoperative recovery after surgery. Two patients suffered from gastric stasis, which was successfully managed with supportive care. One patient suffered from overt gastric paresis, which was successfully managed with azithromycin administration for 1 month. Conclusion: We believe that preemptive pyloroplasty is an effective surgical option to prevent gastric stasis in patients undergoing extensive left-sided LN dissection. Azithromycin appears to be a potent prokinetic agent in gastroparesis.

Method for Reduction of Power Consumption using Buffer Processing Time Control in Home Gateway (홈 게이트웨이에서 서비스 특성에 따른 버퍼 동작 시간 제어를 통한 전력 소비 감소 방안)

  • Yang, Hyeon;Yu, Gil-Sang;Kim, Yong-Woon;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.8
    • /
    • pp.69-76
    • /
    • 2012
  • This paper proposes an efficient power consumption scheme using sleep mode in home gateway. The scheme by this paper classifies incoming real time packet and non-real time packet in home gateway and delay non-real time packet. Therefore, the home gateway can have longer sleep time because non-real time packet can get additional delay time by proposing mechanism using timer. We use non-preemptive two priority queueing model for performance analysis. As a results, we verify that power consumption of proposed scheme is reduced more than existing scheme by delay of non-real time traffic.

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

Preemptive Failure Detection using Contamination-Based Stacking Ensemble in Missiles

  • Seong-Mok Kim;Ye-Eun Jeong;Yong Soo Kim;Youn-Ho Lee;Seung Young Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1301-1316
    • /
    • 2024
  • In modern warfare, missiles play a pivotal role but typically spend the majority of their lifecycle in long-term storage or standby mode, making it difficult to detect failures. Preemptive detection of missiles that will fail is crucial to preventing severe consequences, including safety hazards and mission failures. This study proposes a contamination-based stacking ensemble model, employing the local outlier factor (LOF), to detect such missiles. The proposed model creates multiple base LOF models with different contamination values and combines their anomaly scores to achieve a robust anomaly detection. A comparative performance analysis was conducted between the proposed model and the traditional single LOF model, using production-related inspection data from missiles deployed in the military. The experimental results showed that, with the contamination parameter set to 0.1, the proposed model exhibited an increase of approximately 22 percentage points in accuracy and 71 percentage points in F1-score compared to the single LOF model. This approach enables the preemptive identification of potential failures, undetectable through traditional statistical quality control methods. Consequently, it contributes to lower missile failure rates in real battlefield scenarios, leading to significant time and cost savings in the military industry.

Effect of Intraoperative Continuous I.V. Fentanyl on Tourniquet Induced Cardiovascular Changes and Postoperative Preemptive Analgesia in Total Knee Replacements (슬관절 전치환술 중 지속 정주한 Fentanyl이 압박띠로 인한 심혈관계 변화 및 수술 후 선행 진통에 미치는 효과)

  • Lee, Jong Won;Jun, Jong Hun;Kim, Young Sun;Cheong, Mi Ae;Shim, Jae Chol;Kim, Kyo Sang
    • The Korean Journal of Pain
    • /
    • v.18 no.2
    • /
    • pp.165-170
    • /
    • 2005
  • Background: It is difficult to treat tourniquet-induced hypertension despite adequate anesthesia, and the mechanism of that is not known. And it may be possible that intraoperative continuous infusion of opioid induces preemptive analgesia postoperatively. We investigated the effect of intraoperative continuous i.v. fentanyl on tourniquet induced cardiovascular changes and postoperative preemptive analgesia in total knee replacements. Methods: Sixty patients were randomly assigned to two groups; In study group ($1.5{\mu}g/kg$ loading and $0.5{\mu}g/kg/hr$ continuous infusion of fentanyl before skin incision and tourniquet inflation) and control group (no treatment). Anesthesia was maintained with enflurane (1-2 MAC) and 50% nitrous oxide in oxygen. Arterial pressure and heart rate were compared between two groups. They received postoperative pain treatment with patient-controlled analgesia (PCA) with fentanyl during the postoperative 48 hours after total knee replacement. Visual analog scale (VAS) scores at either rest or movement were used to assess pain. Total fentanyl dose delivered, number of PCA requests, supplemental analgesics, overall satisfaction score and adverse events were evaluated. Results: There were no significant differences between the two groups on cardiovascular changes by tourniquet induced pain effect. VAS, PCA delivered dose and PCA demands at movement in the 24-48 hour decreased in study group compared with control group (P < 0.05). But there were no significant differences between the two groups on the other time periods except 24-48 hour's patient satisfaction and adverse events. Conclusions: We suggest that intraoperative continuous i.v. fentanyl infusion dose not affect cardiovascular change by tourniquet induced pain. But it may induce preemptive analgesia postoperatively.

The Effects on Postoperative Oral Surgery Pain by Varying NSAIDs Administration Times (비스테로이드성 항염진통제의 투여시기가 구강외과 술 후 통증에 미치는 효과에 대한 연구)

  • Jung, Young-Soo;Kim, Moon-Key;Um, Yoo-Jung;Park, Hyung-Sik;Lee, Eui-Wung;Kang, Jeong-Wan
    • Journal of The Korean Dental Society of Anesthesiology
    • /
    • v.4 no.2 s.7
    • /
    • pp.84-89
    • /
    • 2004
  • Background: Many studies on efficacy of preemptive analgesia have been processed in different ways. But the value of preemptive analgesia is still controversial. The goal of this study was to compare analgesic effect of an NSAID according to three different administration times for oral surgical pain. Patients and Methods: Using a randomized, parallel-group, single-center, and active-controlled test design, this study was conducted to healthy 80 patients undergoing a surgical removal of an impacted mandibular third molar requiring bone removal. The oral NSAID was first administered 1 hour preoperatively, or 1 hour postoperatively, or no scheduled administration in pre or postsurgery. Whenever patients felt at least moderate pain (score ${\ge}$ 5 on a 10-point scale) after surgery, they were instructed to take the same drug. Pain intensities and times to the first and second onset of postoperative pain from end of surgery were assessed for 24 hours. Results: Of the enrolled eighty subjects in this study, 25 patients were assigned to preemptive, 26 to post-treatment and 29 to no treatment group. The demographic distribution and duration of surgery in the three groups were statistically similar. The mean time to first onset of postoperative pain was significantly prolonged in post-treatment group (277.2 minutes, p < 0.05) compared to preemptive (158.4 minutes) and no treatment group (196.5 minutes). The mean time to second onset of postoperative pain was not significantly different among the three groups. No significant statistical difference was found among the mean pain intensities at the first and second onset of postoperative pain in the three groups. Conclusions: In this small selected group of subjects and limited study design, the analgesic effects of NSAID administered preoperatively were no longer effective for postoperative pain. The results in this population imply that scheduled postoperative analgesics before pain development are adequate for postoperative analgesia without preoperative administration.

  • PDF

STOCHASTIC SINGLE MACHINE SCHEDULING SUBJECT TO MACHINES BREAKDOWNS WITH QUADRATIC EARLY-TARDY PENALTIES FOR THE PREEMPTIVE-REPEAT MODEL

  • Tang, Hengyong;Zhao, Chuanli
    • Journal of applied mathematics & informatics
    • /
    • v.25 no.1_2
    • /
    • pp.183-199
    • /
    • 2007
  • In this paper we research the problem in which the objective is to minimize the sum of squared deviations of job expected completion times from the due date, and the job processing times are stochastic. In the problem the machine is subject to stochastic breakdowns and all jobs are preempt-repeat. In order to show that the replacing ESSD by SSDE is reasonable, we discuss difference between ESSD function and SSDE function. We first give an express of the expected completion times for both cases without resampling and with resampling. Then we show that the optimal sequence of the problem V-shaped with respect to expected occupying time. A dynamic programming algorithm based on the V-shape property of the optimal sequence is suggested. The time complexity of the algorithm is pseudopolynomial.

A Study on Improvement Plans for Technology Protection of SMEs in Korea (중소기업 기술보호 개선방안에 대한 연구)

  • Lee, Jang Hoon;Shin, Wan Seon;Park, Hyun Ju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.37 no.2
    • /
    • pp.77-84
    • /
    • 2014
  • The purpose of this research is to identify and develop technology protection plans for small and medium-sized enterprises (SMEs) by analyzing past technology leakage patterns which were experienced by SMEs. We identified factors which affect the technology leakage, and analyzed patterns of the influences using a data mining algorithms. A decision tree analysis showed several significant factors which lead to technology leakage, so we conclude that preemptive actions must be put in place for prevention. We expect that this research will contribute to determining the priority of activities necessary to prevent technology leakage accidents in Korean SMEs. We expect that this research will help SMEs to determine the priority of preemptive actions necessary to prevent technology leakage accidents within their respective companies.

Non-preemptive Queueing Model of Spectrum Handoff Scheme Based on Prioritized Data Traffic in Cognitive Wireless Networks

  • Bayrakdar, Muhammed Enes;Calhan, Ali
    • ETRI Journal
    • /
    • v.39 no.4
    • /
    • pp.558-569
    • /
    • 2017
  • In this study, a non-preemptive M/G/1 queueing model of a spectrum handoff scheme for cognitive wireless networks is proposed. Because spectrum handoff gives secondary users an opportunity to carry on their transmissions, it is crucially important to determine the actions of primary users. In our queueing model, prioritized data traffic is utilized to meet the requirements of the secondary users. These users' packets are categorized into three different priority classes: urgent, real-time, and non-real time. Urgent data packets have the highest priority, while non-real time data packets have the lowest priority. Riverbed (OPNET) Modeler simulation software was used to simulate both reactive and proactive decision spectrum handoff schemes. The simulation results were consistent with the analytical results obtained under different load and traffic conditions. This study also revealed that the cumulative number of handoffs can be drastically decreased by exploiting priority classes and utilizing a decent spectrum handoff strategy, such as a reactive or proactive decision-based strategy.