• 제목/요약/키워드: Recovery of function

Search Result 1,301, Processing Time 0.025 seconds

Effects of 3-dimensional balance trainer in combination with a video-game system on balance and gait ability in subacute stroke patients

  • Ha, Hyun Geun;Ko, Young Jun;Lee, Hwang Jae;Lee, Wan Hee
    • Physical Therapy Rehabilitation Science
    • /
    • v.3 no.1
    • /
    • pp.7-12
    • /
    • 2014
  • Objective: The purpose of this study was to investigate the effects of a three dimensional balance trainer in combination with a video-game system and visual feedback on balance recovery and gait function in subacute stroke patients. Design: Randomized controlled trial. Methods: Twenty-three subacute stroke patients were assigned to either an experimental (n=12) or a control group (n=11) using a random permuted block design and sealed envelopes. The experimental group received additional 3-dimensional balance training combined with visual feedback and a game program for 30 min/day, 5 days/week for 4 weeks. Both groups received 30-min of conservative physical therapy sessions based on neurodevelopmental therapy. Before and after the 20 sessions, walking abilities were evaluated by the the GaitRite system and balances were evaluated using the Berg Balance Scale (BBS). The Trunk Impairment Scale (TIS) was used to assess trunk muscle performances. Results: After the 4-week intervention, BBS and TIS scores were significantly increased in both groups (p<0.05), and increases in these scores were significantly greater in the experimental group (p<0.05). After the 4-week intervention, gait speed and cadence were significantly increased in both groups (p<0.05), and as was observed for BBS and TIS scores, changes of gait speed and cadence were significantly greater in the experimental group (p<0.05). Conclusions: The study shows that the 3-dimensional balance trainer combined with visual biofeedback and a video-game system provides a therapeutic means for improving balance and gait ability in subacute stroke patients.

Effect of robot arm reach training on upper extremity functional movement in chronic stroke survivors: a preliminary study

  • Cho, Ki Hun;Song, Won-Kyung
    • Physical Therapy Rehabilitation Science
    • /
    • v.8 no.2
    • /
    • pp.93-98
    • /
    • 2019
  • Objective: The purpose of this study was to investigate the effect of robot arm reach training on upper extremity functional movement in chronic stroke survivors. Design: One group pretest-posttest design. Methods: Thirteen chronic stroke survivors participated in this study. Robot arm reach training was performed with a Whole Arm Manipulator (WAM) and a 120-inch projective display to provide visual and auditory feedback. During the robotic arm reach training, WAM provided gravity compensation and assist-as-needed (AAN) force according to the robot control mode. When a participant could not move the arm toward the target for more than 2 seconds, WAM provided AAN force to reach the desired targets. All patients participated in the training for 40 minutes per day, 3 times a week, for 4 weeks. Main outcome measures were the Fugl-Meyer Assessment (FMA), Action Research Arm Test (ARAT) and Box and Block Test (BBT) to assess upper extremity functional movement. Results: After 4 weeks, significant improvement was observed in upper extremity functional movement (FMA: 42.15 to 46.23, BBT: 12.23 to 14.00, p<0.05). In the subscore analysis of the FMA upper extremity motor function domains, significant improvement was observed in upper extremity and coordination/speed units (p<0.05). However, there were no significant differences in the ARAT. Conclusions: This study showed the positive effects of robot arm reach training on upper extremity functional movement in chronic stroke survivors. In particular, we confirmed that robot arm reach training could have a positive influence by leading to improvement of motor recovery of the proximal upper extremity.

A Model of Systems Management for Quality of Service in ATM Networks (ATM 망에서 Qos를 위한 시스템 관리의 모델)

  • Lee, Jae-Oh;Park, Phan-Woo;Lee, Kee-Hyun;Cho, Kuk-Hyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.6
    • /
    • pp.918-926
    • /
    • 1995
  • In this paper, we study on the systems management for managing ATM network which is especially related to the management of Quality of Service(QoS). QoS management is considered as monitoring function. Therefore, we establish the management model of control and information aspects to manage ATM layer which has resource control, Operation and Maintenance (OAM) functions for performance management and monitoring functions. In particular, we focus on the effective processing of reported performance information caused by the indication of QoS degradation being represented as "QoSAlarm". In order to perform these management activities, the manager can process problem reports of QoS degradation in the proposed manner which uses the priority concepts based on QoS classes. In this circumstance, it is possible to take recovery actions in a predetermined and limited time for managed objects with fault and performance problems.

  • PDF

Implementation of 1.5Gbps Serial ATA (1.5Gbps 직렬 에이티에이 전송 칩 구현)

  • 박상봉;허정화;신영호;홍성혁;박노경
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.7
    • /
    • pp.63-70
    • /
    • 2004
  • This paper describes the link layer and physical layer of the Serial ATA which is the next generation for parallel ATA specification that defines data transfer between PC and peripheral storage devices. The link layer consists of CRC generation/error detection, 8b/10b decoding/encoding, primitive generation/detection block. For the physical layer, it includes CDR(Cock Data Recovery), transmission PLL, serializer/de-serializer. It also includes generation and receipt of OOB(Out-Of-Band) signal, impedance calibration, squelch circuit and comma detection/generation. Additionally, this chip includes TCB(Test Control Block) and BIST(Built-In Selt Test) block to ease debugging and verification. It is fabricated with 0.18${\mu}{\textrm}{m}$ standard CMOS cell library. All the function of the link layer operate properly. For the physical layer, all the blocks operate properly but the data transfer is limited to the 1.28Gbps. This is doe to the affection or parasitic elements and is verified with SPICE simulation.

Security Analysis of MAC Algorithm using Block Cipher (블록 암호 알고리즘을 애용한 MAC 분석)

  • Seo Chang-Ho;Yun Bo-Hyun;Maeng Sung-Reol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.39-47
    • /
    • 2005
  • This paper proposes and analyzes the MAC(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message. The MAC algorithm uses the DES algorithm which has 64-bit block and 56-bit key and we compare the security according to 64-bit and 32-bit length of MAC value. Moreover, we use the SEED algorithm which has 128-bit block and 128-bit key and compare the security according to 128-bit and 64-bit length of MAC value. We analyze the security the forgery attack according to length of message and length of MAC value. this paper, a coarse-to-fine optical flow detection method is proposed. Provided that optical flow gives reliable approximation to two-dimensional image motion, it can be used to recover the three-dimensional motion. but usually to get the reliable optical flows are difficult. The proposed algorithm uses Horn's algorithm (or detecting initial optical flow, then Thin Plate Spline is introduced to warp a image frame of the initial optical flow to the next image frame. The optical flow for the warped image frame is again used iteratively until the mean square error between two image sequence frames is lowered. The proposed method is experimented for the real moving Picture image sequence. The proposed algorithm gives dense optical flow vectors.

  • PDF

Hand Rehabilitation System Using a Hand Motion Recognition Device (모션인식 디바이스를 이용한 수부재활치료 시스템)

  • Hwang, Je-Seung;Kim, Min-Jin;Moon, Mi-Kyeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.8
    • /
    • pp.129-137
    • /
    • 2014
  • The patients who have illness of hand and upper limb should be received rehabilitation treatment to recover such illness. The rehabilitation treatments is a treatments designed to facilitate the process of recovery from injury, illness, or disease to as normal a condition as possible. This should be done continuously and repeatedly. In this paper, we describe hand-rehabilitation system which provides a treatment method improving and recovering the function of injured hands. Expecially, this system is using a leap motion device which can easily and properly identify and trace a hand motion and provide six treatment patterns for hand rehabilitation. By using this system, the patients can do rehabilitation treatment easily and continuously in their daily life and in result, the achievement of treatment will be improved.

Design of Optimal Wet-Season Injection Well for Augmenting Groundwater Resources in Coastal Areas (해안지역 지하수자원 확충을 위한 우기 인공주입정의 최적설계)

  • Park, Nam-Sik;Shi, Lei;Cui, Lei;Lee, Chan-Jong;Mun, Yu-Ri
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.5
    • /
    • pp.415-424
    • /
    • 2009
  • Artificial injection of surplus surface water during wet seasons and recovery is one of possible solutions for conjunctive uses of surface water and groundwater. The methodology is especially attractive for regions of monsoon type weather. In this work a simulation-optimization model is developed to identify an optimal injection system to sustain an over-exploiting freshwater pumping well. The injection well is to be operated during wet seasons only while the pumping well is to be operated throughout an entire year. The objective function is the minimization of injected volume of freshwater. Saltwater intrusion and dry wells are considered as constraints. An example application is made on a small hypothetical island with poor hydrogeologic conditions. The optimization model is successful in determining optimal injection locations and rates for various cases.

A Study on Reliability Evaluation Using Dynamic Fault Tree Algorithm (시스템 신뢰도 평가를 위한 동적 결함 트리(Dynamic Fault Tree) 알고리듬 연구)

  • 김진수;양성현;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1546-1554
    • /
    • 1999
  • In this paper, Dynamic Fault Tree algorithm(DFT algorithm) is presented. This algorithm provides a concise representation of dynamic fault tolerance system including fault recovery techniques with fault detection, mask and switching function. And this algorithm define FDEP, CSP, SEQ, PAG gate which captures the dynamic characteristics of system. It show that this algorithm solved the constraints to satisfy the dynamic characteristics of system which there are in Markov and also this is able to satisfy the dynamic characteristics of system which there are in Markov and also this is able to covered the disadvantage of Fault tree methods. To show the key advantage of this algorithm, a traditional method, that is, Markov and Fault Tree, applies to TMR and Dual-Duplex systems with the dynamic characteristic and a presented method applies to those. He results proved that the DFT algorithm for solving the problems of the system is more effective than the Markov and Fault tree analysis model..

  • PDF

A Decade of the National Institute for Materials Science as an Independent Administrative Institution

  • Kishi, Teruo;Takemura, Masahiro
    • STI Policy Review
    • /
    • v.3 no.2
    • /
    • pp.152-171
    • /
    • 2012
  • In April 2001, many Japanese national institutes were reorganized as Independent Administrative Institutions (IAI) based on the General Act for Independent Administrative Institutions and the act for each institution. Under the Ministry of Education, Culture, Sports, Science and Technology (MEXT), the National Institute for Materials Science (NIMS) was established by the merger of the National Research Institute for Metals (NRIM) and the National Institute for Research in Inorganic Materials (NIRIM). One of the biggest changes was the expansion of autonomous administration. The nanotechnology and material R&D field was prioritized in the 2nd (2001-2005) and the 3rd (2006-2010) Science and Technology Basic Plans; subsequently, NIMS was assigned to take the initiative in nanotechnology as well as materials science. NIMS has proactively expanded research fields through the introduction of researchers from polymers, electronics, and biotechnology as well as member institutes of the World Materials Research Institute Forum (WMRIF). Globalization has been promoted through programs that include the International Center for Young Scientists (ICYS) and the International Center for Materials Nanoarchitectonics (MANA). The 4th Science and Technology Basic Plan (2011-2015) emphasizes outcomes-recovery and rebirth from the disaster, green innovation, and life innovation. The Midterm Plan for NIMS also follows it. R&D collaboration by multi-partners (that include industry, university, and GRI) should be strategically promoted where GRI are especially required to play a hub function for innovative R&D and open innovation. NIMS highlights are Tsukuba Innovation Arena (TIA) and the Nanotechnology Platform Project. On January 20, 2012, a new organization was decided on by the Japanese Government where several IAI from different science and technology areas will be merged to realize more effective R&D as well as administrative cost reductions. NIMS is also supposed to be merged with 4 other R&D IAI under MEXT by the end of 2013.

A Study on Efficient Design of PUF-Based RFID Authentication Protocol (PUF 기반 RFID 인증 프로토콜의 효율적 설계에 관한 연구)

  • Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.987-999
    • /
    • 2014
  • A PUF is embedded and implemented into a tag or a device, and outputs a noise y with an input of x, based on its own unique physical characteristics. Although x is used multiple times as inputs of PUF, the PUF outputs slightly different noises, ($y_1,{\cdots}y_n$), and also the PUF has tamper-resistance property, hence it has been widely used in cryptographic protocol. In this paper, we study how to design a PUF-based RFID authentication protocol in a secure and an efficient way. Compared with recent schemes, the proposed scheme guarantees both authentication and privacy of backword/forward under the compromise of long-term secrets stored in tag. And also, the most cost and time-consumming procedure, key recovery algorithm used with PUF, has been desgined in the side of RFID reader, not in the tag, and, consequently, gives possibility to minimize costs for implementation and running time.