• Title/Summary/Keyword: Transport Protocol

Search Result 558, Processing Time 0.031 seconds

Outcomes of Urgent Interhospital Transportation for Extracorporeal Membrane Oxygenation Patients

  • Jun Tae, Yang;Hyoung Soo, Kim;Kun Il, Kim;Ho Hyun, Ko;Jung Hyun, Lim;Hong Kyu, Lee;Yong Joon, Ra
    • Journal of Chest Surgery
    • /
    • v.55 no.6
    • /
    • pp.452-461
    • /
    • 2022
  • Background: Extracorporeal membrane oxygenation (ECMO) can be used in patients with refractory cardiogenic shock or respiratory failure. In South Korea, the need for transporting ECMO patients is increasing. Nonetheless, information on urgent transportation and its outcomes is scant. Methods: In this retrospective review of 5 years of experience in ECMO transportation at a single center, the clinical outcomes of transported patients were compared with those of in-hospital patients. The effects of transportation and the relationship between insertion-departure time and survival were also analyzed. Results: There were 323 cases of in-hospital ECMO (in-hospital group) and 29 cases transferred to Hallym University Sacred Heart Hospital without adverse events (mobile group). The median transportation time was 95 minutes (interquartile range [IQR], 36.5-119.5 minutes), whereas the median transportation distance was 115 km (IQR, 15-115 km). Transportation itself was not an independent risk factor for 28-day mortality (odds ratio [OR], 0.818; IQR, 0.381-1.755; p=0.605), long-term mortality (OR, 1.099; IQR, 0.680-1.777; p=0.700), and failure of ECMO weaning (OR, 1.003; IQR, 0.467-2.152; p=0.995) or survival to discharge (OR, 0.732; IQR, 0.337-1.586; p=0.429). After adjustment for covariates, no significant difference in the ECMO insertion-departure time was found between the survival and mortality groups (p=0.435). Conclusion: The outcomes of urgent transportation, with active involvement of the ECMO center before ECMO insertion and adherence to the transport protocol, were comparable to those of in-hospital ECMO patients.

Blockchain Interoperability Mechanism (블록체인 상호호환성 메커니즘)

  • Zhou, Qing;Lee, Young-seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1676-1686
    • /
    • 2021
  • In this paper, we propose a general cross-chain solution based on the idea of modularity, abstraction, and layering, which decoupling the cross-chain function from the consensus algorithm and specific application logic, and utilize a Merkle proof to ensure the validity and legality of cross-chain operations. Since the underlying implementations of homogeneous and heterogeneous blockchains are different, we treat them separately. For homogeneous blockchains, we suggest a TCP-like cross-chain transport protocol (CCTP). While for heterogeneous blockchains, we present a method to construct the relay chain to realize the cross-chain function. The proposed scheme can enable the correct, effective, reliable, orderly, and timely transmission of cross-chain data. However, the essential difference between the operations within a single blockchain and the interoperability between different blockchains is that the trust domain is different. Cross-chain interoperation itself breaks the completeness of the blockchain, therefore, some efficiency and safety must sacrifice to trade-off.

Expression and Characterization of the Human Lactoferrin in the Milk of Transgenic Mice

  • Z. Y. Zheng;Y. M. Han;Lee, K. K.
    • Proceedings of the Korean Society of Developmental Biology Conference
    • /
    • 2003.10a
    • /
    • pp.85-85
    • /
    • 2003
  • Human lactoferrin (hLF) is an 80 kDa iron-binding glycoprotein that is expressed in high concentration in milk and in lesser amount in the secondary or specific granules of neutrophils and in plasma, LF is classically considered to be related to the binding, transport, and storage of iron. The transgenic mice carrying the human hLF gene in conjunction with the bovine $\beta$-casein promoter produced the human hLF in their milk during lactation. To screen transgenic mice, PCR was carried out using chromosomal DNA extracted from tail or toe tissues. In this study, stability of germ line transmission and expression of hLF were monitored up to generation Fl7 of a transgenic line. When female mouse of generation F9 was crossbred with normal male, generation F9 to Fl7 mice showed similar transmission rates ($66.0 \pm 12.57%, 42.0 \pm 14.98%, 72.2 \pm 25.45%, 50.0 \pm 16.70%, 65.7 \pm 6.45%, 48.6 \pm 14.65%, 54 1 \pm 18 11%, 57.8 \pm 16.16% and 48.6 \pm 20.66$, respectively), implying that the hLF gene can be transmitted stably up to long term generation in the transgenic mice For ELISA analysis, hLF expression levels were determined with an hLF ELISA kit in accordance with the supplier's protocol. Expression levels of human hLF from milk of generation F9 to Fl3 mice were $ 3.2 \pm 0.69 mg/ml, 3.1 \pm 0.81 mg/ml, 4.6 \pm 1.38 mg/ml, 3.1 \pm 0.42 mg/ml, and 4.5 \pm 1,48 mg/ml$, respectively. These expression levels were lower than that of founder (6.6 mg/$m\ell$) mouse. We concluded that transgenic mice faithfully passed the transgene on their progeny and successively secreted target proteins into their milk through several generations.

  • PDF

Data Load Process of large-sized media for avionics using FTP and JSON (FTP와 JSON을 활용한 대용량 미디어의 항공장비용 데이터 로드 프로세스)

  • Ji-Hwan Choi;Nak-Min Choi;Jae-Kwon Shin
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.610-620
    • /
    • 2023
  • The interest in the aircraft interior market is gradually growing due to technological development based on the 4th industrial revolution and competition for airlines to attract customers, and as part of that, Cabin Display System (CDS) for FAA Part.25 civil aircraft is being developed in Korea. The CDS is a system that provides various multimedia services to passengers by utilizing Flexible and Transparent Organic Light Emitting Diodes (OLED) with Integrated Display Processing Module (IDPM). This paper presents a new method for efficient Data Load Process of large-sized files and deals with their implementation and performance. The results of this study are expected to be applied to Data Load Process development of avionics that require reliable large-capacity file transmission along with reducing the costs of development compared to existing ARINC-615A.

A Study on 2010 Beijing Convention for Antiterrorism of International Aviation - Compared Beijing Convention(2010) with Montreal Protocol - (국제항공테러방지 북경협약(2010)에 관한 연구 - 몬트리올협약과의 비교를 중심으로 -)

  • Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.25 no.2
    • /
    • pp.79-112
    • /
    • 2010
  • The Beijing Convention of 2010 taken together effectively establishes a new broader and stronger civil aviation security framework. This adoption would significantly advance cooperation in prevent of the full range of unlawful acting relation to civil aviation and the prosecution and punishment of offenders. First, the Beijing Convention of 2010 will require parties to criminalize a number of new and emerging threats to the safety of civil aviation, including using aircraft as a weapon and organizing, directing and financing acts of terrorism. These new treaties reflect the international community's shared effort to prevent acts of terrorism against civil aviation and to prosecute and punish those who would commit them. Second, this convention will also require States to criminalize the transport of biological, chemical, nuclear weapons and related material. These provisions reflect the nexus between non-proliferation and terrorism and ensure that the international community will act to combat both. Third, this Convention shall not apply to aircraft used in military, customs or police services. As a substitute, International Humanitarian Law will be applied in a case. Moreover, the National Jurisdiction and the application of the law will be extended farther. The treaty promotes cooperation between States while emphasizing the human rights and fair treatment of terrorist suspects.

  • PDF

Design of Adaptive DCF algorithm for TCP Performance Enhancement in IEEE 802.11 based Mobile Ad-hoc Networks (IEEE 802.11 기반 이동 ad-hoc 망에서 TCP 성능 향상을 위한 적응적 DCF 알고리즘 설계)

  • Kim, Han-Jib;Lee, Gi-Ra;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.79-89
    • /
    • 2006
  • TCP is the most widely used transport protocol in Internet applications that guarantees a reliable data transfer. But, in the wireless multi-hop networks, TCP performance is degraded because it is designed for wired networks. The main reasons of TCP performance degradation are contention for wireless medium at the MAC layer, hidden terminal problem, exposed terminal problem, packet losses in the link layer, unfairness problem, reordering problem caused by path disconnection, bandwidth waste caused by exponential backoff of retransmission timer due to node's mobility and so on. Specially, in the mobile ad-hoc networks, discrepancy between a station's transmission range and interference range produces hidden terminal problem that decreases TCP performance greatly by limiting simultaneous transmission at a time. In this paper, we propose a new MAC algorithm for mobile ad-hoc networks to solve the problem that a node can not transmit and just increase CW by hidden terminal. In the IEEE 802.11 MAC DCF, a node increases CW exponentially when it fails to transmit, but the proposed algorithm, changes CW adaptively according to the reason of failure so we get a TCP performance enhancement. We show by ns-2 simulation that the proposed algorithm enhances the TCP performance by fairly distributing the transmission opportunity to the failed nodes by hidden terminal problems.

Web Traffic Analysis according to the Link-down Duration of TCP and SCTP (링크다운 시간에 따른 TCP와 SCTP의 웹 트래픽 분석)

  • Choi, Yong-Woon;Cho, Kwang-Moon;Lee, Yong-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.44-52
    • /
    • 2010
  • The most popular world wide web traffic in the Internet uses TCP as the transport layer protocol. Since TCP utilizes the single path, it can not communicate with the correspondent host during the link-down. On the other hand, SCTP can still communicate with the other SCTP entity by using alternate path even while the primary path is down. Most of previous studies have conducted the performance comparison research between TCP and SCTP by using typical file transfer. Since web traffic with self-similarity is characterized by the packet inter-arrival times and shape parameter affecting the size of web file in the Pareto distribution, it is necessary to perform the experiments considering these parameters. This paper aims to compare the throughput between TCP and SCTP while varying parameters reflecting the web traffic characteristics in link-down environment. Experimental results for web traffic using NS-2 simulator show that the throughput of SCTP using multi-homing is better than that of TCP. Simulation also shows that TCP is more affected than SCTP by mean inter-arrival and shape parameters with regard to the web traffic. These results can be applied to estimate the performance variation of web traffic due to the duration of link-down.

Application of Critical Pathway in Trauma Patients (외상 환자 관리에서 Critical Pathway의 적용)

  • Shim, Hongjin;Jang, Ji Yong;Lee, Jae Gil;Kim, Seonghwan;Kim, Min Joung;Park, You Seok;Park, Inchel;Kim, Seung Ho
    • Journal of Trauma and Injury
    • /
    • v.25 no.4
    • /
    • pp.159-165
    • /
    • 2012
  • Purpose: For trauma patients, an early-transport and an organized process which are not delayed in hospital stage are necessary. Our hospital developed a procedure, the trauma Critical Pathway (CP), through which a traumatic patient has the priority over other patients, which makes the diagnostic and the therapeutic processes faster than they are for other patients. Methods: The records of patients to whom Trauma CP were applied from January 1, 2011 through April 15. 2012. were reviewed. We checked several time intervals from ER visiting to decision of admission-department, to performing first CT, to applying angio-embolization, to starting emergency operation and to discharging from ER. In addition, outcomes such as duration of ICU stay, hospital stay and mortality were checked and analyzed. Results: The trauma CP was applied to a total of 143 patients, of whom, 48 patients were excluded due to pre-hospital death, ER death, transferring to other hospital and not severe injury. Thus 95 patients (male 64, 67.3%) were enrolled in this study. Fifty-nine patients(62.1%) were injured by the traffic accident. The mortality rate was 10.5% and the mean Revised Trauma Score (RTS) of the patients was $6.4{\pm}2.0$. After visiting ER, decision making for admission was completed, on average, in 3 hours 10 seconds. The mean time intervals for the first CT, angio-embolization, surgery and discharge were 1 hour 20 minutes, 5 hours 16 minutes, 7 hours 26 minutes and 6 hours 13 minutes, respectively. Conclusion: The trauma CP did not show the improvement of time interval outcome, as well as mortality rate. However, this test did show that the trauma CP might be able to reduce delays in procedures for managing trauma patients at the university-based hospitals. To find out the benefit of CP protocol, a large scaled data is required.

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

Mutual Authentication Method between Wireless Mesh Enabled MSAPs in the Next-generation TICN (차세대 전술정보통신체계에서의 무선 메쉬 MSAP 노드 간 상호 인증 기법)

  • Son, Yu-Jin;Bae, Byoung-Gu;Shon, Tae-Shik;Ko, Young-Bae;Lim, Kwang-Jae;Yun, Mi-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.385-394
    • /
    • 2012
  • The tactical mobile communication network, which comprises a part of the next-generation Tactical Information and Communication Network (TICN), provides means of communication and control for Tactical Multi-Functional Terminals (TMFT) belonging to a Mobile Subscriber Access Point (MSAP). The next-generation of MSAP is capable of constructing a backbone network via LCTR and HCTR directional antennas. At the same time, WMN modules are used to create and manage a wireless mesh backbone. When directional antennas are used in mobile environments, seamless services cannot be efficiently supported as the movement of the node prevents the angle of the antenna to constantly match. Therefore, data communication through the wireless mesh networks is required to provide direct communication between mobile MSAPs. Accordingly, mutual authentication and data encryption mechanisms are required to provide reliable data transmission in this environment. To provide efficient mutual authentication between MSAP devices, the process of verifying a certificate of the other MSAP device through its own authentication server is required. This paper proposes mutual authentication mechanisms where the MSAP requiring authentication and the MSAP that permits it initiates low-cost and efficient authentication in a distributed way. More specifically, we propose a method of applying EAP-ELS (Extensible Authentication Protocol-Transport Layer Security) in the next-generation TICN.