• Title/Summary/Keyword: device access

Search Result 951, Processing Time 0.038 seconds

A Retrospective Clinical Study: Complications of Totally Implanted Central Venous Access Ports

  • Seok, June Pill;Kim, Young Jin;Cho, Hyun Min;Ryu, Han Young;Hwang, Wan Jin;Sung, Tae Yun
    • Journal of Chest Surgery
    • /
    • v.47 no.1
    • /
    • pp.26-31
    • /
    • 2014
  • Background: When managing patients who require repeated venous access, gaining a viable intravenous route has been problematic. To improve the situation, various studies on techniques for venous access have been conducted. The aim of this study is to evaluate the clinical results of complications following totally implanted central venous access port (TICVAP) insertion. Methods: A retrospective analysis was conducted on 163 patients, from December 2008 to March 2013. The occurrence of complications was studied in three separate periods of catheter use: the intraoperative period, postoperative period, and period during the treatment. Results: A total of 165 cases of TICVAP insertions involving 156 patients were included in the final analysis. There were 35 complications (21%) overall. Among these, 31 cases of complications (19%) occurred during the treatment period and the other 4 cases were intraoperative and postoperative complications (2%). There were no statistically significant differences in age and gender of the patients between the two groups to be risk factors (p=0.147, p=0.08). Past history of chemotherapy, initial laboratory findings, and the locations of TICVAP insertion also showed no statistical significance as risk factors (p>0.05). Conclusion: Because the majority of complications occurred after port placement and during treatment, meticulous care and management and appropriate education are necessary when using TICVAPs.

A Study on the Environmental Design Factors of Children's Park Access Area - A Survey Focusing on the Perceptions of Professional Groups - (어린이공원 주변공간의 환경계획요인에 관한 연구 - 전문가 의식조사를 중심으로 -)

  • Bae, Yeonhee;Byun, Gi-dong;Ha, Mikyoung
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.5
    • /
    • pp.71-78
    • /
    • 2018
  • This study seeks to identify elements of spatial planning for areas surrounding children's parks in order to improve child safety. It will identify different aspects of child safety and extract elements of safety planning for the areas surrounding children's parks from a literature review of both domestic and international research. The study classifies the space between one's residence and the children's park as either a "means of access", such as pedestrian walkways and streets, or a "boundary", which consists of the entrance, exit, and fences; then, the derived safety planning elements were categorized in accordance with this classification. In order to ensure the validity of the planning elements, an expert survey was conducted of environment planners who specialize in the palnning and designing of residential area as well as government employees who are in direct charge of managing children's parks. The survey findings were as follow. First, the pedestrian walkway(means of access) near the park is the most crucial factor in regards to the safety of children, followed by the entrance and exit(boundary), fency(boundary), and streets (means of access), in descending order of importance. Thus, improving the safety of the pedestrian walkway should be considered first and foremost, and it should precede improving the surrounding streets. Second, an investigation of the need for safety devices near the children's park showed that securing visibility, through the installation of an illegal parking prevention device, is imperative. Illegal parking near children's parks poses a grave risk to pedestrian safety and demands immediate action. Furthermore, a section of streets within 300m of the park entrance should be designated as a children protection zone, in addition to the designation of school zones near elementary schools.

A transmit function implementation of wireless LAN MAC with QoS using single transmit FIFO (단일 송신 피포를 이용한 QoS 기능의 무선랜 MAC의 송신 기능 구현)

  • Park, Chan-Won;Kim, Jung-Sik;Kim, Bo-Kwan
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.237-239
    • /
    • 2004
  • Wireless LAN Voice over IP(VoIP) equipment needs Quality-of-Service(QoS) with priority for processing real-time traffic. This paper shows transmit function implementation of wireless LAN(WLANs) media access control(MAC) support VoIP, and it has an advantage of guarantee of QoS and is adaptable to VoIP or mobile wireless equipment. The IEEE 802.11e standard in progress has four queues according to four access categories(AC) for transmit and the MAC transmits the data based on EDCA. The value of AC is from AC0 to AC3 and AC3 has the highest priority. The transmit method implemented at this paper ensure QoS using one transmit FIFO in hardware since real-time traffic data and non real-time traffic data has the different priority. The device driver classifies real-time data and non real-time data and transmit data to hardware with information about data type. The hardware conducts shorter backoff and selects faster AIFS slot for real-time data than it for non real-time data. Therefor It make give the real-time traffic data faster channel access chance than non real-time data and enhances QoS.

  • PDF

Implementation of Remote Physical Security Systems Using Smart Phone (스마트폰을 이용한 원격 물리적 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.217-224
    • /
    • 2011
  • Existing wire based physical security system solutions show limitations in time and space. In order to solve these deficiencies, a remote physical security system has been implemented using smart phone based on mobile cloud computing technique. The security functions of mobile cloud computing technique include mobile device user authentication, confidentiality of communication, integrity of information, availability of system, and target system access control, authority management and secure hand off etc. Proposed system has been constructed as remote building management system using smart phone, and also has been efficient to reduce energy cost (5~30%), result of system average access and response time 7.082 second. This systems are evaluated to have high efficiency compared to performance.

A Study on the NFC Services for Social Networking Applications (소셜 네트워킹 응용을 위한 NFC 서비스에 관한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae;Lee, Man-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.568-570
    • /
    • 2013
  • NFC represents the 2nd generation of the proximity contact-less technology, which beyond the RFID, supports peer-to-peer communication, and enables consumer access to aggregated services, anytime, anywhere, with any type of consumer stationary and mobile devices. NFC is a short range device wireless technology designed to exchange data, initiate connections with other wireless networks and act as a secured smart key for access to services such as cashless payment, ticketing, on-line entertainment and access control. In this paper, the NFC services for social networking applications are studied, and the signal flow of SNS application based on NFC P2P for smart devices and server model is proposed.

  • PDF

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Analysis of Secure Remote Access to Virtual Private Home Network with L2TP Tunneling methods (L2TP tunneling 방법을 기반으로 한 가설 사설망의 보안 원격 접속분석)

  • Basukala, Roja Kiran;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2188-2194
    • /
    • 2008
  • Home network is the connection and communication of several electronic and electrical devices at hone with the integration of several technologies like Ethernet, wireless, phone line and power-line at the residential gateway to the internet. This internet based home network can be accessed from any part of the world through any device by any poison via internet. Since home network is developed for comfortable and safe life of home users, the information flow to/from home network needs to be private. Hence the remote access of the home network must be secured. This paper analyses two secure tunneling methods, voluntary and compulsory for L2TP(Layer Two Tunneling Protocol) based VPN(Virtual Private Network) for secure remote access of the home network.

Wide and Dual-Band MIMO Antenna with Omnidirectional and Directional Radiation Patterns for Indoor Access Points

  • Yeom, Insu;Jung, Young Bae;Jung, Chang Won
    • Journal of electromagnetic engineering and science
    • /
    • v.19 no.1
    • /
    • pp.20-30
    • /
    • 2019
  • A wide-band multiple-input multiple-output (MIMO) antenna with dual-band (2.4 and 5 GHz) operation is proposed for premium indoor access points (IAPs). Typically, an omni-directional pattern is used for dipole antennas and a directional radiation pattern is used for patch antennas. In this paper, both antenna types were used to compare their performance with that of the proposed $2{\times}2$ MIMO antenna. We simulated and measured the performance of the MIMO antenna, including the isolation, envelope correlation coefficient (ECC), mean effective gain (MEG) for the IAPs, and the throughput, in order to determine its communication quality. The performance of the antennas was analyzed according to the ECC and MEG. The proposed antenna has sufficient performance and excellent characteristics, making it suitable for IAPs. We analyzed the communication performance of wireless networks using the throughput data of a typical office environment. The network throughput of an 802.11n device was used for the comparison and was conducted according to the antenna type. The results showed that the values of the ECC, MEG, and the throughput have unique characteristics in terms of their directivity, antenna gains, isolation, etc. This paper also discusses the communication performance of various aspects of MIMO in multipath situations.

A Study on a Smart Home Access Control using Lightweight Proof of Work (경량 작업증명시스템을 이용한 스마트 홈 접근제어 연구)

  • Kim, DaeYoub
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.931-941
    • /
    • 2020
  • As natural language processing technology using machine learning develops, a Smart Home Network Service (SHNS) is drawing attention again. However, it is difficult to apply a standardized authentication scheme for SHNS because of the diversity of components and the variability of users. Blockchain is proposed for data authentication in a distributed environment. But there is a limit to applying it to SHNS due to the computational overhead required when implementing a proof-of-work system. In this paper, a lightweight work proof system is proposed. The proposed lightweight proof-of-work system is proposed to manage block generation by controlling the work authority of the device. In addition, this paper proposes an access control scheme for SHNS.

MTJ based MRAM Core Cell

  • Park, Wanjun
    • Journal of Magnetics
    • /
    • v.7 no.3
    • /
    • pp.101-105
    • /
    • 2002
  • MRAM (Magnetoresistive Random Access Memory) is a promising candidate for a universal memory that meets all application needs with non-volatile, fast operational speed, and low power consumption. The simplest architecture of MRAM cell is a series of MTJ (Magnetic Tunnel Junction) as a data storage part and MOS transistor as a data selection part. This paper is for testing the actual electrical parameters to adopt MRAM technology in the semiconductor based memory device. The discussed topics are an actual integration of MRAM core cell and its properties such as electrical tuning of MOS/MTJ for data sensing and control of magnetic switching for data writing. It will be also tested that limits of the MRAM technology for a high density memory.