• Title/Summary/Keyword: Stable management

Search Result 1,616, Processing Time 0.021 seconds

Renal replacement therapy in children with acute renal failure (소아 급성 신부전증의 신장 대체 요법)

  • Paik, Kyung Hoon
    • Clinical and Experimental Pediatrics
    • /
    • v.50 no.10
    • /
    • pp.938-947
    • /
    • 2007
  • Many dialysis modalities such as peritoneal dialysis (PD), hemodialysis (HD) and continuous hemofiltration or hemodialysis (CRRT) are available for the management of pediatric patients with acute renal failure (ARF). PD is a relatively simple, inexpensive modality and can be used in hemodynamically unstable patients. But, it may not be the optimal therapy for patients with severe volume overload or life threatening hyperkalemia. HD is the preferred modality for the treatment of severe volume overload, severe hyperkalemia, but it needs vascular access. Improvements in the HD equipment have allowed HD to be performend in small children. Recents technological improvements in CRRT therapies have enabled pediatric patients who are less stable to be treated. CRRT is becoming the preferred method of acute therapy in pediatric intensive care units. A sound knowledge of the underlying principles of dialysis and awareness of recent technological advancements in differnet dialysis modalities will hopefully result in improved management of children with ARF.

Evolutionary Operation with Many Process Variables (다수의 공정변수가 있는 경우의 진화적 조업법)

  • Byun Jai-Hyun;Rhee Chang-Kwon
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2004.04a
    • /
    • pp.513-516
    • /
    • 2004
  • Evolutionary operation is useful to improve on-line full-scale manufacturing processes by systematically changing the levels of the process variables while meeting production schedule. Evolutionary operation was developed using two or three process variables for process operators who are not good at statistics. Recently, when a product is developed, it is very important for the engineers to make the production line stable as soon as possible. And there are many causes which have influences to the product performance. This paper presents an evolutionary operation procedure with many process variables using saturated two level fractional factorial designs including Plackett-Burman design.

  • PDF

A Case Study on Management Situations of Environment-friendly Farming and Its Implications (친환경농업의 경영실태에 대한 사례분석과 그 시사점)

  • Kim, Ho
    • Korean Journal of Organic Agriculture
    • /
    • v.21 no.3
    • /
    • pp.321-334
    • /
    • 2013
  • This case study surveyed management situations of environmentally friendly farming (EFF) and their awareness situations. Farmers are aging as an average age of 62-year old. The EFF did not increase farmer's income, however, farm income of EFF was more than that of conventional farming. Farm household liabilities showed large deviation among farmers. Livestock and greenhouse farm households have more liabilities because of facilities and feed cost. Farmers of EFF have been also cultivating conventional farming, but they don't plan much conversion intention of conventional farming into EFF owing to lack of differentiated and stable market for their environment-friendly agriculture products. And they are guessing that EFF income will usually not increase more. For increasing of EFF income, they think that it is necessary to enlarge production area, change to high-income crop, develop processing foods, change to organic farming and so on.

Copyright Protection Protocol providing Privacy (프라이버시를 제공하는 저작권 보호 프로토콜)

  • Yoo, Hye-Joung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.

Polymer Gel Electrolytes for EDLCs (EDLC용 폴리머 겔 전해질)

  • 정세일;정현철;강안수
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2003.11a
    • /
    • pp.351-357
    • /
    • 2003
  • The optimum polymer gel electrolyte composition ratio was 23 : 66 : 11 wt% of P(VdF-co-HFP) : PVP =20 : 3), (PC: EC =44 : 22) and TEABF$_4$. And the optimal thickness of polymer gel electrolyte was 50 ${\mu}{\textrm}{m}$. The electrochemical characteristics result of unit cell were 31.41 Fig of specific capacitance, and 3.21$\times$10$^{-3}$ S/cm of ion conductivity. Ion conductivity of polymer gel electrolytes decreased according to added PVP through impedance analysis, and it was higher in 7 wt%, but electrochemical characteristics of unit cell were better in 3 wt% PVP. And for excellent ion conductivity of polymer gel electrolytes, the use of a thin layer electrolyte(20 $\mu\textrm{m}$) was an effective method, but with unit cell application, the best thickness was 50 $\mu\textrm{m}$. Unit cell showed higher capacitance and more stable electrochemical performance when hot pressed between polymer gel electrolyte and electrode. This results from enhancement of the physical contact between the electrode and the polymer gel electrolyte and good accessibility of the liquid electrolyte to the electrode surface.

  • PDF

Effects of Auditory Stimuli Using Pop Music on EEG (대중음악이 뇌파에 미치는 영향)

  • 이동형;남경돈;최현재
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2000.11a
    • /
    • pp.261-267
    • /
    • 2000
  • The purpose of this study is to analyze the effects of the auditory stimulation using pop music on EEG. The subjects in the study were eight healthy university students; five men and three women, age group of 22-28 years old. EEGs were measured for one minute at 19 channels, according to the international 10-20 system method, after both pop musics which the subject likes and not were provided with 100% and 50% volume of standard value, respectively, and the ratio of $\beta$/$\alpha$ was obtained. As a result, when the subjects heard their favorite music, the values of $\beta$/$\alpha$ ratio at the Right-Parietal.Temporal.Occipital lob(T6, O2) showed to be lower than stable state in the situation with 50% volume of standard value.

  • PDF

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

A Study on Pose Control for 2 wheel Robot using ARS (ARS를 이용한 2바퀴 로봇의 자세 제어에 관한 연구)

  • Kang, Jin Gu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.73-78
    • /
    • 2013
  • In this paper, configuration control for the Horizontal Maintenance of the 2 wheel robot has been studied using ARS(Attitude Refrence System). The 2 wheel robot technique is getting attention and there have been many researches on the seg-way since the US. Using its 2 freedom, a 2 wheel robot can move in various modes and Our robot performs goal reaching ARS.2 wheel robot fall down to the forward or reverse direction to converge to the stable point. Kalman Filter is normally used for the algorithm and numerous research is progressing at the moment. To calculate the attitude in ARS using 2 axis gyro(roll, pitch) and 3 axis accelerometers (x, y, z). In this paper we present a two wheel robot system for an autonomous mobile robot. This paper realized the robot control method which is much simpler but able to get desired performance by using the ARS control.

A Study on the Optimization of Position Tolerance of Fasteners Considering Process Capability (공정능력을 고려한 체결구 부품의 위치공차 최적화 방법 연구)

  • Lee, Sang-Hyun;Lee, Tae-Gun;Chang, Sung-Ho
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2008.04a
    • /
    • pp.417-428
    • /
    • 2008
  • Designers have to consider voice of customer, process capability, manufacturing standards & condition, manufacturing method, characteristics of products to decide tolerances. Especially, in case of position of hole and pin, designers have to consider process capability to decide tolerances. The traditional position tolerances used in a drawing are theoretical values which are allocated to position under the worst case assembling condition that both hole and pin are the maximum material condition(MMC). However, When the process capability is high, more exact product size can be produced under stable manufacturing condition. larger clearance of hole and pin can be allocated. In this point of view, manufacturer could increase the yield by allocating larger position tolerance than theoretical position tolerance of hole and pin considering process capability.

  • PDF

Computational Experience of Linear Equation Solvers for Self-Regular Interior-Point Methods (자동조절자 내부점 방법을 위한 선형방정식 해법)

  • Seol Tongryeol
    • Korean Management Science Review
    • /
    • v.21 no.2
    • /
    • pp.43-60
    • /
    • 2004
  • Every iteration of interior-point methods of large scale optimization requires computing at least one orthogonal projection. In the practice, symmetric variants of the Gaussian elimination such as Cholesky factorization are accepted as the most efficient and sufficiently stable method. In this paper several specific implementation issues of the symmetric factorization that can be applied for solving such equations are discussed. The code called McSML being the result of this work is shown to produce comparably sparse factors as another implementations in the $MATLAB^{***}$ environment. It has been used for computing projections in an efficient implementation of self-regular based interior-point methods, McIPM. Although primary aim of developing McSML was to embed it into an interior-point methods optimizer, the code may equally well be used to solve general large sparse systems arising in different applications.