• Title/Summary/Keyword: Safe End

Search Result 358, Processing Time 0.026 seconds

Results of Tracheal Resection with End-to-end Anastomosis (기관절제술후 기관 단단문합술 치험 결과)

  • Shin Dong-Jin;Cho Woo-Jin;Baek Sungkuk;Woo Jeong Su;Kwon Soon-Young;Jung Kwang-Yoon
    • Korean Journal of Bronchoesophagology
    • /
    • v.10 no.1 s.19
    • /
    • pp.41-45
    • /
    • 2004
  • Tracheostomy and endotracheal intubation are often performed in patients with acute and chronic respiratory failure. Recently, the incidence of iatrogenic tracheal stenosis has increased. Tracheal resection and end-to-end anastomosis would be one of the most physiologic treatment options for severe tracheal stenosis. Also, this treatment can be applied to the management of trachea invaded by thyroid cancer and tracheal neoplasm. The authors aimed to analyze the outcomes of end-to-end anastomosis of trachea following segmental resection in tracheal stenosis and tracheal invasion of cancer that we have recently experienced. Materials and methods Authors retrospectively studied 19 cases treated by tracheal resection with end-to-end anastomosis between Feburuary 1996 and January 2003. 12 patients had tracheal stenosis, 6 patients had tracheal invasion by thryroid cancer and 1 patient had tracheal cancer. We analyzed the direct causes of tracheal stenosis, preoperative vocal cord function, operation technique, early and delayed postoperative complications, and the outcome of end-to-end anastomois. Result Decannulation without significant aspiration was achieved in 16 cases($89.5\%$). A 27 year-old man could not be decannulated because of restenosis. A 62 year-old woman could not be decannulated because of bilateral vocal cord palsy. Conclusion End-to-end anastomosis is a safe and effective surgical method for tracheal stenosis. Case selection for end-to-end anastomosis and preservation of recurrent laryngeal nerve during operation is very important.

  • PDF

A Round-Robin Analysis of Temperature and Residual Stresses in Dissimilar Metal Weld (이종금속용접부 온도 및 잔류응력의 라운드로빈 해석)

  • Song, Min-Sup;Kang, Sun-Ye;Park, June-Soo;Sohn, Gap-Heon
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.85-87
    • /
    • 2008
  • DMWs are common feature of the PWR in the welded connections between carbon steel and stainless steel piping. The nickel-based weld metal, Alloy 82/182, is used for welding the dissimilar metals and is known to be susceptible to PWSCC. A round-robin program has been implemented to benchmark the numerical simulation of the transient temperature and weld residual stresses in the DMWs. To solve the round-robin problem related to Pressurizer Safety & Relief nozzle, the thermal elasto-plastic analysis is performed in the DMW by using the FEM. The welding includes both the DMW of the nozzle to safe-end and the SMW of the safe-end and piping. Major results of the analyses are discussed: The axial and circumferential residual stresses are found to be -88MPa(225MPa) and -38MPa(293MPa) on the inner surface of the DMW; where the values in parenthesis are the residual stresses after the DMW. Thermo-mechanical interaction by the SMW has a significant effect on the residual stress fields in the DMW.

  • PDF

Ad-hoc Security Authentication Technique based on Verifier (검증자 기반 Ad-hoc 보안 인증기법)

  • Lee, Cheol-Seung;Hong, Seong-Pyo;Lee, Ho-Young;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.713-716
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on Ad-hoc Networks and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier.

  • PDF

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

Experimental Study on the Structural Safety of the Tractor Front-End Loader Against Impact Load

  • Park, Young-Jun;Shim, Sung-Bo;Nam, Ju-Seok
    • Journal of Biosystems Engineering
    • /
    • v.41 no.3
    • /
    • pp.153-160
    • /
    • 2016
  • Purpose: This study was conducted to experimentally investigate the structural safety of and identify critical locations in a front-end loader under impact loads. Methods: Impact and static tests were conducted on a commonly used front-end loader mounted on a tractor. In the impact test, the bucket of the front-end loader with maximum live load was raised to its maximum lift height and was allowed to free fall to a height of 500 mm above the ground where it was stopped abruptly. For the static test, the bucket with maximum live load was raised and held at the maximum lift height, median height, and a height of 500 mm from the ground. Strain gages were attached at twenty-three main locations on the front-end loader, and the maximum stresses and strains were measured during respective impact and static tests. Results: Stresses and strains at the same location on the loader were higher in the impact test than in the static test, for most of measurement locations. This indicated that the front-end loader was put under a severe environment during impact loading. The safety factors for stresses were higher than 1.0 at all locations during impact and static tests. Conclusions: Since the lowest safety factor was higher than 1.0, the front-end loader was considered as structurally safe under impact loads. However, caution must be exercised at the locations having relatively low safety factors because failure may occur at these locations under high impact loads. These important design locations were identified to be the bucket link elements and the connection elements between the tractor frame and front-end loader. A robust design is required for these elements because of their high failure probability caused by excessive impact stress.

Security Architecture Proposal for Threat Response of insider in SOA-based ESB Environment (SOA 기반 ESB 환경에서 내부 종단 사용자 위협 대응을 위한 보안 아키텍처 제안)

  • Oh, Shi-hwa;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.55-63
    • /
    • 2016
  • SOA(service oriented architecture) based ESB(enterprise service bus) model is widely adopted in many companies for the safe processing of enormous data and the integration of business system. The existing web service technologies for the construction of SOA, however, show unsatisfactory in practical applications though the standardization of web service security technologies is in progress due to their limitations in safe exchange of data. Internal end users using a large business system based on such environment are composed of the variety of organizations and roles. Companies might receive more serious damage from insider threat than that from external one when internal end users get unauthorized information beyond the limits of their authority for private profit and bad purposes. In this paper, we propose a security architecture capable of identifying and coping with the security threats of web service technologies arouse from internal end users.

Occupant Analysis and Seat Design to Reduce the Neck Injury for Rear End Impact (후방추돌시 목상해를 고려한 승객거동해석 및 좌석설계)

  • 신문균;박기종;박경진
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.7 no.9
    • /
    • pp.182-194
    • /
    • 1999
  • Occupant injury in rear end impact is rapidly becoming one of the most aggravating traffic safety problems with high human suffering and societal costs. Although rear end impact occurs at relatively low speed , it may cause permanent disability due to neck injuries resulting from an abrupt moment, shear force , and tension/compression force at the occipital condyles. The analysis is performed for a combined occupant-eat model response, using the SAFE(Safety Analysis for occupant crash Environment) computer program. The computational results are verified by those from sled tests. A parameter study is conducted for many physical and mechanical properties. Seat design has been performed based on the design of experiment process with respect to five parameters; seat-back upholstery stiffness, torsional stiffness of the seat-back. An orthogonal array is selected from the parameter study. A good design has been found from the analysis results based on the orthogonal array. The results show that reductions of stiffness in seat-back upholstery and joint are the most effective for preventing neck injuries.

  • PDF

Evaluation on Shear Behavior of Double-tee Dap-ends with the Least Depth from Optimization Proces (최적이론에 의하여 설계된 최소 깊이 더블티 댑단부 전단거동 평가)

  • 유승룡;김대훈
    • Journal of the Korea Concrete Institute
    • /
    • v.11 no.4
    • /
    • pp.43-54
    • /
    • 1999
  • Shear tests are performed on four full-scale 12.5 m proto-type models, "least depth double tee," which are resulted from the optimization process. Domestic superimposed live load regulation, domestic material properties which is available to product. Korean building code requirements, construction environments and economy are considered as the main factors to establish the process. All of the specimens tested fully comply with the shear strength requirements as specified by ACI 318-95. The research has shown following results. 1) The development length requirement of ACI 318-95 does not seem a good predictor for the estimation of bond failure in a beam with the strands below the supports. 2) The load required for the first initial coner cracking in the dap end and first web shear cracking does not seem to have any relation with the dimension and shear strength of the section in the test beams. 3) The strand slip has a direct relationship with the web shear cracking. However, the coner cracking in the dap end does not give any help for the slip in anchorage. 4) Use of whole area for bearing steel at the bottom of dap end is desired for safe bearing pressure design in the precast prestressed double tee beams. 5) The deflection of beam influences directly on the amount of strand slip at the anchorage after initiation of it, and relationship between them are very linear.

Lateral Compression and Dowel Bearing Property of Japanese Larch Grown in Korea (국산 낙엽송재의 횡압축과 다우얼 지압 성능)

  • Hwang, Kweonhwan;Park, Byung-Su
    • Journal of the Korean Wood Science and Technology
    • /
    • v.36 no.3
    • /
    • pp.61-69
    • /
    • 2008
  • To examine the compression properties of structural members, the compression and bearing tests were conducted in parallel- and perpendicular-to-grain loading using domestic Japanese larch (Larix kaempferi (Lamb.) Carriere). Compression (bearing) properties with the length of a specimen and the contact length of the bearing plate were investigated, and deformations at each specimen length from the point of bearing force were measured to evaluate the effective end distance tabulated in the present practice (Korean Building Code). Compression (bearing) properties varied with the size of the bearing plate, and the end distance for dowel-type fastener taken into consideration of the specimen's deformation, for the safe design, should be applied with over 7 D.

The Countermeasure for Threat of Cyber Terror in Sociological Perspective (사회적 이슈 관점에서 바라 본 사이버 테러 유형에 대한 위험 대응방안)

  • Choi, Heesik;Kim, Hyunkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.59-67
    • /
    • 2017
  • In recent years, cyber terror that break into major institution's information system and destroy and paralyzed important information occurs frequently. Some countries do dangerous acts such as train hackers and order hackers to hack important industrial confidential documents which are core of national competitiveness to reduce the competitiveness of the country and cause social confusion. In this thesis, it will study problems of cyber terror to help people to use Internet in web environment that safe from cyber terror and to avoid the risk from cyber terror such as malware and DDos. This thesis is organized as following. In second chapter, it will look thorough the research that are related to cyber terror. In third chapter, it will study attack types of cyber terror. In fourth chapter, to defend from cyber violence, it will suggest safe solution. In fifth chapter, it will end with conclusion. Finally, to prevent urgent incidents like North Korean Cyber-attack, every Internet user must indicate their recognition on Internet security and it is significant to make a quick response treatment to create the safe online environment.