• Title/Summary/Keyword: Session Complete

Search Result 42, Processing Time 0.029 seconds

Extracorporeal Shock Wave Lithotripsy for Proximal Ureter Stone with Complete Obstruction : Analysis of the Appropriate Session for Changing Treatment Modality According to Stone Size (완전 폐색을 동반한 상부 요관 결석에 대한 체외충격파쇄석술 : 결석의 크기에 따른 적절한 치료 전환 시기 분석)

  • Son, Soon-Yong;Lee, Won-Hong
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.287-291
    • /
    • 2005
  • To determine the appropriate session for changing treatment modality according to the size of proximal ureter stone with complete obstruction, We analyzed 201 patients with proximal ureter stone primarily treated by Dornier MPL 9000 lithotripter from January, 2002 to August, 2004. Of total 201 patients, the patients without complete obstruction were 142, and with complete obstruction were 59. In the patients without complete obstruction, the accumulative stone free rate of the first, second, and third session were 68.3%, 86.6%, and 94.4%, respectively. The accumulative stone free rate according to the stone size at third session were 100%, 90.5%, 00.0% in stones less than 10 mm, 10 to less than 20 mm, and larger than or 20 mm, respectively. In the patients with complete obstruction, the accumulative stone free rate of the first, second, and third session were 44.1%, 66.1%, and 76.3%, respectively. The accumulative stone free rate according to the stone size at third session were 100%, 65.5%, 33.3% in stones less than 10 mm, 10 to less than 20 mm, and larger than or 20 mm, respectively. In our study, the size of proximal ureter stone with complete obstruction influenced noticeably on the success rate of extracorporeal shock wave lithotripsy (ESWL). We propose that the proximal ureter stones larger than or 10 mm with complete obstruction are treated by ureteroscopic manipulation than ESWL as the first line treatment modality.

  • PDF

Impact of a "TED-Style" presentation on potential patients' willingness to accept dental implant therapy: a one-group, pre-test post-test study

  • Ghanem, Henry;Afrashtehfar, Kelvin Ian;Abi-Nader, Samer;Tamimi, Faleh
    • The Journal of Advanced Prosthodontics
    • /
    • v.7 no.6
    • /
    • pp.437-445
    • /
    • 2015
  • PURPOSE. A survey was conducted to assess the impact of a TED-like educational session on participants' willingness to accept dental implant therapy. MATERIALS AND METHODS. Volunteers interested in having information about dental implant therapies were recruited and asked to complete a two-part survey before and after an educational session. The initial survey elicited demographic information, self-perceived knowledge on dental implants and willingness to this kind of treatment. A "TED-style" presentation that provided information about dental implant treatments was conducted before asking the participants to complete a second set of questions assessing the impact of the session. RESULTS. The survey was completed by 104 individuals, 78.8% were women and the mean age was $66.5{\pm}10.8$. Before the educational session, 76.0% of the participants refused dental implants mainly due to lack of knowledge. After the educational session, the rejection of dental implants decreased by almost four folds to 20.2%. CONCLUSION. This study proved that an educational intervention can significantly increase willingness to accept treatment with dental implants in a segment of the population who is interested in having information about dental implant therapy. Furthermore, educational interventions, such as TED-like talks, might be useful to increase popular awareness on dental implant therapy.

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.

User Identification and Session completion in Input Data Preprocessing for Web Mining (웹 마이닝을 위한 입력 데이타의 전처리과정에서 사용자구분과 세션보정)

  • 최영환;이상용
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.843-849
    • /
    • 2003
  • Web usage mining is the technique of data mining that analyzes web users' usage patterns by large web log. To use the web usage mining technique, we have to classify correctly users and users session in preprocessing, but can't classify them completely by only log files with standard web log format. To classify users and user session there are many problems like local cache, firewall, ISP, user privacy, cookey etc., but there isn't any definite method to solve the problems now. Especially local cache problem is the most difficult problem to classify user session which is used as input in web mining systems. In this paper we propose a heuristic method which solves local cache problem by using only click stream data of server side like referrer log, agent log and access log, classifies user sessions and completes session.

Development and Application of a Nutrition Education Game for Preschoolers

  • Oh, Yu-Jin;Kim, Dong-Sik
    • Journal of Community Nutrition
    • /
    • v.8 no.4
    • /
    • pp.165-170
    • /
    • 2006
  • This study was conducted to develop and apply a computer-based multimedia nutrition education program for preschoolers based on the Dick and Carey model of instructional design. The Dick and Carey model included 4 phases: analysis, design, development, and evaluation. The program's instructional goals, objectives, assessment instruments, content, examples, and practice questions with feedback were written in the design phase. To be familiar with the 5 food groups, 'Nutrition exploration' were programmed using Hyperstudio. 'Nutrition exploration' was designed as a five-session, interactive multimedia game, with each session taking about 5 minutes to complete. Nineteen preschoolers, aged 6, volunteered to participate formative evaluation. The effectiveness of the program was examined using a pre-post test design. Participants were recruited by personal contact at the individual preschool education center. The application was carried out during 4 weeks. The results showed that intervention participants significantly increased knowledge between pre-test and post-test. The results support using IMM (interactive multimedia) to disseminate nutrition education to the target population. This research provides the basis for continuing development of computer-based nutrition education materials.

Radiosurgical Considerations in the Treatment of Large Cerebral Arteriovenous Malformations

  • Lee, Sung-Ho;Lim, Young-Jin;Choi, Seok-Keun;Kim, Tae-Sung;Rhee, Bong-Arm
    • Journal of Korean Neurosurgical Society
    • /
    • v.46 no.4
    • /
    • pp.378-384
    • /
    • 2009
  • Objective : In order to establish the role of Gamma Knife radiosurgery (GKS) in large intracranial arteriovenous malformations (AVMs), we analyzed clinical characteristics, radiological features, and radiosurgical outcomes. Methods : Between March 1992 and March 2005, 28 of 33 patients with large AVMs (> $10\;cm^3$ in nidus-volume) who were treated with GKS underwent single session radiosurgery (RS), and the other 5 patients underwent staged volumetric RS. Retrospectively collected data were available in 23 cases. We analyzed treatment outcomes in each subdivided groups and according to the AVM sizes. We compared the estimated volume, defined as primarily estimated nidus volume using MR images, with real target volume after excluding draining veins and feeding arteries embedded into the nidus. Results : Regarding those patients who underwent single session RS, 44.4% (8/18) had complete obliteration; regarding staged volumetric RS, the obliteration rate was 40% (2/5). The complete obliteration rate was 60% (6/10) in the smaller nidus group ($10-15\;cm^3$ size), and 25% (2/8) in the larger nidus group (over $15\;cm^3$ size). One case of cerebral edema and two cases (8.7%) of hemorrhage were seen during the latent period. The mean real target volume for 18 single sessions of RS was $17.1\;cm^3$ ($10.1-38.4\;cm^3$), in contrast with the mean estimated volume of $20.9\;cm^3$ ($12.0-45.0\;cm^3$). Conclusion : The radiosurgical treatment outcomes of large AVMs are generally poor. However, we presume that the recent development in planning software and imaging devices aid more accurate measurement of the nidus volume, therefore improving the treatment outcome.

Using Transaction Logs to Better Understand User Search Session Patterns in an Image-based Digital Library (이미지 기반 디지털 도서관에서 이용자 검색 패턴의 효과적 이해를 위한 트랜잭션 로그 데이터 분석)

  • Han, Hye-Jung;Joo, Soohyung;Wolfram, Dietmar
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.1
    • /
    • pp.19-37
    • /
    • 2014
  • Server transaction logs containing complete click-through data from a digital library of primarily image-based documents were analyzed to better understand user search session behavior. One month of data was analyzed using descriptive statistics and network analysis methods. The findings reveal iterative search behaviors centered on result views and evaluation and topical areas of focus for the search sessions. The study is novel in its combined analytical techniques and use of click-through data for image collections.

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

3D CACT-assisted Radiofrequency Ablation Following Transarterial Chemoembolization for Hepatocellular Carcinoma: Early Experience

  • Jiao, De-Chao;Han, Xin-Wei;Wu, Gang;Ren, Jian-Zhuang
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.17
    • /
    • pp.7897-7903
    • /
    • 2015
  • Background: To explored the value of 3D C-arm CT (CACT) guidance system in performing radiofrequency ablation (RFA) following transarterial chemoembolizationon (TACE) for hepatocellular carcinomas. Materials and Methods: RFA of hepatocellular carcinomas (HCC) were performed on 15 patients (21 lesions) with the assistance of CACT guidance system. Technical success, procedure time, complications and patient radiation exposure were investigated. The puncture performance level was evaluated on a five-point scale (5-1: excellent-poor). Complete ablation rate was evaluated after two months follow-up using enhanced CT scans. Results: The technical success rate of RFA procedure under CACT navigation system was 100 %. Mean total procedure time was $24.24{\pm}6.53min$, resulting in a mean effective exposure dose of $15.4{\pm}5.1mSv$. The mean puncture performance level rated for CACT guided RFA procedure was $4.87{\pm}0.35$. Complete ablation (CA) was achieved in 20 (95.2%) of the treated 21 tumors after the first RFA session. None of patients developed intra-procedural complications. Conclusions: 3D CACT guidance system enables reliable and efficient needle positioning by providing real-time intraoperative guidance for performing RFA on HCCs.

Analysis of the Bandwidth Consumed by Restoration Paths for Service Guarantee in the Protection Switching Scheme (보호 스위칭에 의한 경로 설정에 있어서 서비스 보장을 위한 복구 경로의 소비 대역 분석)

  • Lee, Hwang-Kyu;Hong, Sug-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.155-162
    • /
    • 2003
  • Fast restoration time and service guarantee are the important goals to achieve the network reliability. In the protection switching scheme, one way to guarantee service fro an application session if a network happens to fail is to establish the restoration path that amounts to the same bandwidth of the working path of the session at the same time. When we setup the restoration path, we can reduce the bandwidth consumption by the restoration path if the path can share the bandwidth required by the other paths. This paper explains the methods how to determine the shared bandwidth of the restoration path in the protection switching scheme, given the maximum bandwidth assigned to a link along the working path. We point out that such sharing algorithm can not reduce the bandwidth consumption by the restoration paths in some cases, which contradict the general conception. We explain why this can happen, and show the simulation results in real network topologies to prove our arguments. We explain the reason of the failure of the sharing effect by the simple sharing algorithm. Finally we propose the way of how we can overcome the failure of the sharing effect, using the complete sharing algorithm based on the link database and showing the results.