• 제목/요약/키워드: Preserving, Preservation

검색결과 306건 처리시간 0.032초

Periodontal granulation tissue preservation in surgical periodontal disease treatment: a pilot prospective cohort study

  • Rodriguez, Jose A. Moreno;Ruiz, Antonio J. Ortiz
    • Journal of Periodontal and Implant Science
    • /
    • 제52권4호
    • /
    • pp.298-311
    • /
    • 2022
  • Purpose: The aim of this study was to evaluate the clinical outcomes of periodontal granulation tissue preservation (PGTP) in access flap periodontal surgery. Methods: Twenty patients (stage III-IV periodontitis) with 42 deep periodontal pockets that did not resolve after non-surgical treatment were consecutively recruited. Access flap periodontal surgery was modified using PGTP. The clinical periodontal parameters were evaluated at 9 months. The differences in the amount of granulation tissue width (GTw) preserved were evaluated and the influence of smoking was analyzed. Results: GTw >1 mm was observed in 97.6% of interproximal defects, and the granulation tissue extended above the bone peak in 71.4% of defects. At 9 months, probing pocket depth reduction (4.33±1.43 mm) and clinical attachment gain (CAG; 4.10±1.75 mm) were statistically significant (P<0.001). The residual probing depth was 3.2±0.89 mm. When GTw extended above the interproximal bone peak (i.e., the interproximal supra-alveolar granulation tissue thickness [iSUPRA-GT] was greater than 0 mm), a significant CAG was recorded in the supra-alveolar component (1.67±1.32 mm, P<0.001). Interproximal gingival recession (iGR) was significant (P<0.05) only in smokers, with a reduction in the interdental papillary tissue height of 0.93±0.76 mm. In non-smokers, there was no increase in the iGR when the iSUPRA-GT was >0 mm. The clinical results in smokers were significantly worse. Conclusions: PGTP was used to modify access flap periodontal surgery by preserving affected tissues with the potential for recovery. The results show that preserving periodontal granulation tissue is an effective and conservative procedure in the surgical treatment of periodontal disease.

운동하는 몸에 대한 생태윤리학적 접근(1): 퇴계의 경을 중심으로 (Eco-ethical Approach to Sporting body: Focusing on Toegye's Gyeong)

  • 이정란
    • 한국체육학회지인문사회과학편
    • /
    • 제55권3호
    • /
    • pp.15-25
    • /
    • 2016
  • 이 연구는 퇴계의 경(敬)을 중심으로 운동하는 몸에 대한 생태윤리학적 접근을 시도하였다. 인간과 자연의 갈등원인은 인간의 욕망에서 비롯된 잘못된 자연관을 들 수 있다. 퇴계는 욕망의 문제를 경을 통해 극복할 수 있다고 보았다. 퇴계 경사상의 생태윤리학적 접근 가능성은 다음과 같다. 첫째, 퇴계의 경은 자연 속에서 완성된 것이기에 가능하다. 둘째, 퇴계의 경은 자연에 대한 인간의 책임(배려)을 강조한다. 셋째, 경은 도덕 실천능력과 연관되기 때문이다. 한편, 퇴계는 '몸을 잘 보존하는 것'이 자기보존인 동시에 자연의 순리를 따르는 천리의 의미로 이해하였다. 이러한 관점에서 운동하는 몸은 신체건강과 마음건강의 의미가 존재하며 동시에 인간과 자연을 하나의 관계망으로 이해하여 자연 질서를 따르는 생태적 가치의 측면도 존재한다. 운동하는 몸을 통한 경의 획득은 '경신(敬身)'과 '활경(活敬)'의 실천을 제안한다. 자연과 함께하는 신체운동을 할 때 몸을 공경하는 '경신'의 단계에 머무르는 것뿐만 아니라 생태환경을 보전(活敬)하면서 자연을 통해 요산요수(樂山樂水)의 덕을 함양하는 단계로 나아가는 것이다.

한국학(韓國學) 고문헌자료(古文獻資料) 전문도서관(專門圖書館) 건축계획(建築計劃)에 관한 연구(硏究) (A Study on Architectural Design of Library Building for Preserving Ancient Documents of Koreanology)

  • 이근영;박지훈;공순구
    • 한국비블리아학회지
    • /
    • 제20권4호
    • /
    • pp.143-157
    • /
    • 2009
  • 본 연구는 시설 프로그램, 면적 구성비, 공간 구획, 순환 시스템 등 공간 구성의 분석을 통해 고문헌 전문도서관의 건축 계획 및 설계에 대한 기초적인 자료를 제공하는데 목적을 두며, 이러한 과정을 통하여 도출된 본 연구의 결과는 다음과 같다. 첫째, 각 사례의 공간구성은 크게 자료영역, 이용자영역, 사무/유지관리영역, 서비스/공공부분으로 구분되며, 각 영역은 세부영역으로 구분된다. 둘째, 자료영역은 다른 영역보다 큰 면적을 차지한다(39~56%). 셋째, 서고의 위치, 보존처리영역의 위치, 하역장의 설치 유무에 따라 다른 특성을 보인다. 넷째, 각 사례의 공간구성체계를 분석하면 각 사례별 공간구성은 자료의 이동경로와 관계가 있다.

소셜미디어 아카이빙을 위한 수집 및 보존방안 (Acquisition and Preservation Methods for Social Media Archiving)

  • 김태영;양동민;최상기;오효정
    • 정보관리학회지
    • /
    • 제36권2호
    • /
    • pp.79-104
    • /
    • 2019
  • 최근 공공기관에서 국민과 소통하는 방법의 하나로 소셜미디어를 활발하게 활용함에 따라 기록관리 영역에서도 이를 수집하고 보존하기 위한 다양한 방안들이 논의되고 있다. 미국에서는 정부 차원에서 소셜미디어를 수집 보존하고자 하는 움직임이 일고 있고, 영국 국립기록관에서는 이미 공공기관의 트위터와 유튜브를 대상으로 아카이브를 구축하여 이용자에게 서비스를 제공하고 있다. 이에 본 연구에서는 소셜미디어 아카이빙의 수집 및 보존 측면에서의 사례조사 결과를 토대로 소셜미디어의 유형별 특징과 그에 따른 수집 방안과 보존모형을 제안하고자 한다. 또한 제안방안의 실효성을 검증하기 위해 경상남도 도청의 소셜미디어를 대상으로 시범 적용하였다. 본 연구는 실제 수집한 결과를 통해 수집 및 보존방안을 제시하였다는 점에서 그 의의가 있으며, 차후 소셜미디어 아카이빙을 위한 모델 수립에 도움이 될 수 있을 것으로 기대한다.

Quality attributes and shelf-life of freshly cut beef coated with waste feather keratin-ginger starch composite enriched with avocado peel polyphenolic-rich extract

  • Olarewaju M Oluba;Samuel I Ojeaburu;Opeyemi A Bayo-Olorunmeke;Georgina Erifeta;Sunday J Josiah
    • 한국식품저장유통학회지
    • /
    • 제31권1호
    • /
    • pp.1-14
    • /
    • 2024
  • The utilization of coatings composed of bio-based materials in the processing and preservation of meat presents an environmentally conscious, secure, cost-effective, and superior method for prolonging the storage life of meat while also preserving its nutritional value. In this study, changes in physical, chemical, and microbiological characteristics of freshly cut beef coated with distilled water (control) and keratin-starch composites (K-S) functionalized with 0.0-, 0.2-, 0.6-, and 1.0-mL avocado peel polyphenolic-rich extract (APPPE) kept at 4℃ for 12 days were evaluated periodically at 3-day interval using standard techniques. Keratin was extracted from waste feathers, while starch was obtained from ginger rhizomes. Following a 12-day storage period, beef coated with APPPE-enriched K-S composites exhibited a significant (p<0.05) improvement in shelf life by minimizing deteriorative changes in pH and color (as determined by metmyoglobin level) in addition to inhibiting oxidative changes in lipids (as determined by TBARS level) and proteins (protein carbonyl level) in comparison to control and K-S composite without APPPE. Furthermore, microbial growth was significantly (p<0.05) suppressed in meat coated with K-S composite functionalized with APE at 0.6 and 1.0 mL compared to the control. The study suggested that APPPE-enriched K-S composite could offer an eco-friendly and safe food preservation technique for fresh meat.

SAR 영상의 SPECKLE 잡음 제거 (EFFICIENT SPECKLE NOISE FILTERING OF SAR IMAGES)

  • 김병수;최규홍;원중선
    • Journal of Astronomy and Space Sciences
    • /
    • 제15권1호
    • /
    • pp.175-182
    • /
    • 1998
  • SAR 영상은 speckle 잡음의 multiplicative 특성으로 인해 영상 해석에 많은 제약을 받고 있다. Speckle 잡음을 제거하기 위한 방법은 크게 여러 개의 독립 영상을 multi-looks 처리 방법과 디지털 영상 처리 기술을 이용하는 방법으로 speckle 잡음 특성에 따른 비선형필터의 적용이다. 본 연구에서는 국지적 통계 자료를 이용하는 LEE와 Refined LEE 필터 그리고 speckle 자체의 통계 특성을 이용하는 EPOS(Edge Preserving Optimal Speckle)필터를 이용하여 speckle 잡음을 제거하여 SAR 영상의 화질을 개선하고 그 결과를 기존의 mean과 median 필터와 비교하였다.

  • PDF

Anonymizing Graphs Against Weight-based Attacks with Community Preservation

  • Li, Yidong;Shen, Hong
    • Journal of Computing Science and Engineering
    • /
    • 제5권3호
    • /
    • pp.197-209
    • /
    • 2011
  • The increasing popularity of graph data, such as social and online communities, has initiated a prolific research area in knowledge discovery and data mining. As more real-world graphs are released publicly, there is growing concern about privacy breaching for the entities involved. An adversary may reveal identities of individuals in a published graph, with the topological structure and/or basic graph properties as background knowledge. Many previous studies addressing such attacks as identity disclosure, however, concentrate on preserving privacy in simple graph data only. In this paper, we consider the identity disclosure problem in weighted graphs. The motivation is that, a weighted graph can introduce much more unique information than its simple version, which makes the disclosure easier. We first formalize a general anonymization model to deal with weight-based attacks. Then two concrete attacks are discussed based on weight properties of a graph, including the sum and the set of adjacent weights for each vertex. We also propose a complete solution for the weight anonymization problem to prevent a graph from both attacks. In addition, we also investigate the impact of the proposed methods on community detection, a very popular application in the graph mining field. Our approaches are efficient and practical, and have been validated by extensive experiments on both synthetic and real-world datasets.

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권8호
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.

QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing

  • Liu, Guoxiu;Yang, Geng;Wang, Haiwei;Dai, Hua;Zhou, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권7호
    • /
    • pp.3375-3400
    • /
    • 2018
  • With the advent of database-as-a-service (DAAS) and cloud computing, more and more data owners are motivated to outsource their data to cloud database in consideration of convenience and cost. However, it has become a challenging work to provide security to database as service model in cloud computing, because adversaries may try to gain access to sensitive data, and curious or malicious administrators may capture and leak data. In order to realize privacy preservation, sensitive data should be encrypted before outsourcing. In this paper, we present a secure and practical system over encrypted cloud data, called QSDB (queryable and secure database), which simultaneously supports SQL query operations. The proposed system can store and process the floating point numbers without compromising the security of data. To balance tradeoff between data privacy protection and query processing efficiency, QSDB utilizes three different encryption models to encrypt data. Our strategy is to process as much queries as possible at the cloud server. Encryption of queries and decryption of encrypted queries results are performed at client. Experiments on the real-world data sets were conducted to demonstrate the efficiency and practicality of the proposed system.

PEC: A Privacy-Preserving Emergency Call Scheme for Mobile Healthcare Social Networks

  • Liang, Xiaohui;Lu, Rongxing;Chen, Le;Lin, Xiaodong;Shen, Xuemin (Sherman)
    • Journal of Communications and Networks
    • /
    • 제13권2호
    • /
    • pp.102-112
    • /
    • 2011
  • In this paper, we propose a privacy-preserving emergency call scheme, called PEC, enabling patients in life-threatening emergencies to fast and accurately transmit emergency data to the nearby helpers via mobile healthcare social networks (MHSNs). Once an emergency happens, the personal digital assistant (PDA) of the patient runs the PEC to collect the emergency data including emergency location, patient health record, as well as patient physiological condition. The PEC then generates an emergency call with the emergency data inside and epidemically disseminates it to every user in the patient's neighborhood. If a physician happens to be nearby, the PEC ensures the time used to notify the physician of the emergency is the shortest. We show via theoretical analysis that the PEC is able to provide fine-grained access control on the emergency data, where the access policy is set by patients themselves. Moreover, the PEC can withstandmultiple types of attacks, such as identity theft attack, forgery attack, and collusion attack. We also devise an effective revocation mechanism to make the revocable PEC (rPEC) resistant to inside attacks. In addition, we demonstrate via simulation that the PEC can significantly reduce the response time of emergency care in MHSNs.