• Title/Summary/Keyword: Session Analysis

Search Result 645, Processing Time 0.025 seconds

Design and Analysis of a New Video Conference System Supporting the NAT of Firewall (방화벽 NAT를 지원하는 새로운 다자간 화상회의 시스템의 설계 및 분석)

  • Jung, Yong-Deug;Kim, Gil-Choon;Jeon, Moon-Seog
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.4
    • /
    • pp.137-155
    • /
    • 2004
  • A video-conference system is being utilized in web based application services in various fields due to the widespread use of Internet and the progress of computer technologies. This system should use the public IP address for sharing file and white board and it is difficult to manage the internal network users of the firewall and non-public IP address users. In this paper, we propose an Application Level Gateway which transforms non-public IP address into public IP address. This mechanism is for the internal network users of the firewall or non-public IP address users over the Internet. We also propose a Control Daemon which manages video and audio media dynamically according to network bandwidth. This mechanism can start and terminate a video conference and manage the process of the video conference.

  • PDF

Systematic Review of the Literatures on Music Intervention for Neurological Patients in Korea (신경계 질환자 대상의 국내 음악중재연구에 대한 체계적 문헌고찰)

  • Jeong, Seong Hee
    • Journal of Korean Biological Nursing Science
    • /
    • v.15 no.2
    • /
    • pp.65-73
    • /
    • 2013
  • Purpose: The purpose of this study was to review the literature on music intervention for neurological patients in Korea and to explore the effect of music intervention on functional rehabilitation of neurological patients. Methods: This systematic review examined literature from 2005 to 2010. The existing literature was searched in the electronic databases of RISS and KISS using the following keywords: music, rhythmic movement, stroke, brain injury, dementia, Parkinson, spinal cord injury. Seventy-seven studies were founded through the database. After The exclusion of duplicates, case studies, literature review, and irrelevant studies, nine studies were included for analysis. Results: They included nine quasi-experimental studies. The medical diagnoses of the study participants were stroke, dementia, brain injury, and spinal cord injury. Among nine studies, only two studies were conducted in the nursing area. Eight studies used comprehensive music programs composed of health education, gait training, vocal training, or relaxation therapy, and these comprehensive programs were effective in the areas of physical and psychosocial treatment. Seventeen sessions were provided on average throughout intervention, and the average duration of each session was 49.4 minutes. Conclusion: Comprehensive music intervention can be implemented in nursing care for patients with neurological problem.

The Effects of Pulsed Electromagnetic Field on Functional Recovery and Expression of GAP-43 after Incomplete Spinal Cord Injury in Rats (맥동전자장이 불완전 척수손상 흰쥐의 기능회복과 GAP-43의 발현에 미치는 영향)

  • Bang, Hyun-Soo
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.7 no.3
    • /
    • pp.349-356
    • /
    • 2012
  • Purpose : This study was designed to investigate the effects of pulsed electromagnetic field on functional recovery and expression of GAP-43 after incomplete spinal cord injury (SCI) in rats. Methods : To confirm the damage of SCI and effects of pulsed electromagnetic field, 20 Sprague-Dawley male rats were used and divided randomly 2groups (SCI, PEMF). Incomplete SCI was induced by using modified NYU drop model. After operation, functional recovery test, immunohistochemistry and western blot analysis were measured at 1, 2, 3 weeks. Pulsed electromagnetic field were apply three weeks (one times a day, five days a week and twenty minutes a session). Results : In the this study, applications of pulsed electromagnetic field after incomplete SCI induced the significant improvement in functional recovery and expression of neurotrophic factor. The results were as follows; Foot print test, PEMF were significantly decreased than the SCI (p<.05). Expression of GAP-43, PEMF were significantly increased than the SCI at 2 and 3 weeks (p<.05). Conclusion : In conclusion, pulsed electromagnetic field were positive effect in functional recovery and expression of GAP-43 after incomplete SCI in rats.

Effects of Group Training Based on the Health Belief Model on Knowledge and Behavior Regarding the Pap Smear Test in Iranian Women: a Quasi-Experimental Study

  • Shobeiri, Fatemeh;Javad, Masoumeh Taravati;Parsa, Parisa;Roshanaei, Ghodratollah
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.6
    • /
    • pp.2871-2876
    • /
    • 2016
  • The Pap smear test is recommended for early diagnosis of cervical cancer. The aim of this study was to assess knowledge and behavior regarding the Pap smear test based on the Health Belief Model (HBM) in women referred to premarital counseling classes, Hamadan, Iran. This quasi-experimental study was conducted on 330 women, who were allocated randomly to two case and control groups (n=165). Two educational session classes were performed in the case group. Two stages in before and after intervention groups were evaluated. Analysis of data was performed by SPSS/16.0, using t-test, $x^2$, and McNemar's test. P-values <0.05 were regarded as significant. There was no significant difference between the mean scores of the various structures of this model in two groups before the intervention. However, after the intervention there were significant increase in mean score of knowledge and all variables of HBM in the intervention group(P<0.001). The findings of this study highlight the important role of education about cervical cancer on changing women's beliefs about cervical screening.

Automated CFD analysis for multiple directions of wind flow over terrain

  • Morvan, Herve P.;Stangroom, Paul;Wright, Nigel G.
    • Wind and Structures
    • /
    • v.10 no.2
    • /
    • pp.99-119
    • /
    • 2007
  • Estimations of wind flow over terrain are often needed for applications such as pollutant dispersion, transport safety or wind farm location. Whilst field studies offer very detailed information regarding the wind potential over a small region, the cost of instrumenting a natural fetch alone is prohibitive. Wind tunnels offer one alternative although wind tunnel simulations can suffer from scale effects and high costs as well. Computational Fluid Dynamics (CFD) offers a second alternative which is increasingly seen as a viable one by wind engineers. There are two issues associated with CFD however, that of accuracy of the predictions and set-up and simulation times. This paper aims to address the two issues by demonstrating, by way of an investigation of wind potential for the Askervein Hill, that a good level of accuracy can be obtained with CFD (10% for the speed up ratio) and that it is possible to automate the simulations in order to compute a full wind rose efficiently. The paper shows how a combination of script and session files can be written to drive and automate CFD simulations based on commercial software. It proposes a general methodology for the automation of CFD applied to the computation of wind flow over a region of interest.

Effects of Aquarobic Exercise on Body Composition and Cardiovascular Index in Elderly Women

  • KIM, Chankyu;LEE, Byunghoon
    • Physical Therapy Rehabilitation Science
    • /
    • v.10 no.3
    • /
    • pp.320-327
    • /
    • 2021
  • Objective: The community has implemented a variety of exercise programs for the elderly population. However, studies comparing changes in the cardiovascular system through body composition and blood analysis after applying aqua aerobic exercise are insufficient. The purpose of this study was to investigate the effect of a 12 weeks aqua exercise on body composition and cardiovascular index in elderly women. Design: Non-equivalence pre-post design. Methods: Thirty elderly women were assigned to aquarobic group(n=15) and control group(n=15). The aquarobic exercise was 60 minutes per every session, 2times per week, for 12weeks. Weight, skeletal muscle mass, body fat percentage, total cholesterol, triglyceride, HDL cholesterol, and LDL cholesterol were measured before and after the exercise program. Paired and independent t-tests were performed using SPSS program. Results: The result showed was weight(p<0.05), body fat percentage(p<0.05), total cholesterol(p<0.05), triglyceride(p<0.05), HDL cholesterol(p<0.05), and LDL cholesterol(p<0.05) were significantly decreased and skeletal muscle mass(p>0.05) was not significantly increased after aquatic exercise program. Conclusions: According to the study result, aqua exercise program made a positive effect in the improvement of obesity and cardiovascular function in elderly women. Therefore, we suggest that you actively consider implementing the Aquarobic exercise program when operating the community health promotion program in the future. In addition, in future studies, comparative studies according to various ages and genders and studies on the effects of aqua aerobic exercise as a community exercise program for chronically illness patients are needed.

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

Analysis of Clinical Research Trends for Acupotomy Treatment of Peripheral Facial Palsy

  • Jeon, Seok Hee;Choi, Ji Min;Yoo, Jae Hee;Shin, Jeong Cheol
    • Journal of Acupuncture Research
    • /
    • v.38 no.4
    • /
    • pp.276-283
    • /
    • 2021
  • The purpose of this review was to investigate acupotomy treatment for peripheral facial palsy. By reviewing recent clinical trends, this may contribute to standardizing acupotomy treatment methods. There were 7 randomized controlled trials and 6 case series using acupotomy treatment for peripheral facial palsy published between January 01, 2014 and April 05, 2021, which were retrieved from 9 online databases. The number and characteristics of participants, main treatment sites, combination treatments, size of acupotomy needle, frequency and total period of treatment, evaluation indices, efficacy, and adverse events were analyzed. "Tender point or induration," "infraorbical foramen," and "buccal mucosa" were the most used treatment sites. The sizes of acupotomy needles varied from 20 mm to 80 mm in length, and 0.35 mm to 1.0 mm in diameter. One treatment cycle was performed every 3 to 5-7 days, and the number of treatments per treatment session ranged from 3 to 5-9 cycles. The results were evaluated using 1 to 4 evaluation indices and 9 different evaluation indices were used overall. The efficacy rate was the most used index, followed by the House-Brackmann grade, and electrocardiography. The "Risk of Bias 2," categorized most studies as having "some concerns." There were few adverse events reported.

Development and Evaluation of the Parenting Support Group Program for Mothers with Infants (영아기 자녀를 둔 어머니를 위한 양육지지 집단 프로그램 개발 및 평가)

  • Park, Sun Hwa;June, Kyung Ja
    • Research in Community and Public Health Nursing
    • /
    • v.32 no.1
    • /
    • pp.40-50
    • /
    • 2021
  • Purpose: The purpose of this study is to evaluate the changes in parenting competency, parenting environment, and parenting stress by developing and applying parenting support group program based on the social support intervention model for mothers with infants. Methods: In this experimental study, mothers with infants of 8~12 weeks old were recruited. 23 mothers were selected for analysis (11 in the experimental group and 12 in the control group). The parenting support group program was provided to the experimental group for seven sessions with 120 minutes per session. Results: The experimental group showed that the parenting competency and parenting environment were significantly increased and the parenting stress was significantly decreased immediately after intervention. In the case of parenting environment, it was found to have a lasting effect until the point of further investigation. Conclusion: The results indicate that the program as a social support intervention strategy for mothers rearing up infants is effective intervention in a universal context in the community.

Split Password-Based Authenticated Key Exchange (분할된 패스워드 기반 인증된 키교환 프로토콜)

  • 류종호;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.23-36
    • /
    • 2004
  • This paper presents a password based authentication and key exchange protocol which can be used for both authenticating users and exchanging session keys for a subsequent secure communication over an untrusted network. Our idea is to increase a randomness of the password verification data, i.e., we split the password, and then amplify the split passwords in the high entropy-structured password verification data. And in order to prevent the verifier-compromised attack, we construct our system such that the password verification data is encrypted with the verifier's key and the private key of verifier used to encrypt it is stored in a secure place like a smart cards. Also we propose the distributed password authentication scheme utilizing many authentication servers in order to prevent the server-compromised attack occurred when only one server is used. Furthermore, the security analysis on the proposed protocol has been presented as a conclusion.