• Title/Summary/Keyword: fixed pattern

Search Result 674, Processing Time 0.028 seconds

The effects of residential proximity on parents' mental and physical health: Parental age and the adult child's gender as moderators (세대 간 거주근접성과 부모의 정신 및 신체 건강 : 부모 연령, 성인자녀 성별의 조절효과분석)

  • Nam, Boram;Choi, Heejeong
    • Journal of Family Relations
    • /
    • v.23 no.2
    • /
    • pp.111-131
    • /
    • 2018
  • Objectives: This study examined the effects of residential proximity to adult children on the mental and physical health of middle-aged and older parents. The study also evaluated whether the parental age and gender of the adult child in closest proximity to the parent might moderate the association. Method: Data were drawn from five waves of the Korean Longitudinal Study of Aging(2006-2014). The analytic sample consisted of 7,359 parents aged 45 or older who had at least one non-coresidential adult child aged 19 or older. The analyses were conducted by estimating a series of fixed effects models while adjusting for the nested structure of the data. Results: The results showed that first, a closer distance between an adult child and the parent was generally associated with the parent experiencing a decrease in depressive symptoms. Yet, the mental health benefit was smaller for parents aged 65 years or older whose closest living adult child was a son. Second, a closer distance was observed to affect chronic illness only among middle-aged parents (aged 45 to 64). When the closest living adult child was a daughter, the middle-aged parent experienced deterioration in their chronic illness. On the other hand, the opposite pattern was observed when the closest living adult child was a son. Conclusions: The parental age and gender of the adult child in closest proximity to the parent might have varying effects on parents' health. A closer distance between an adult child and their parent has a positive impact on the mental health of the parent as a whole, whereas the effect of living closer was mixed in relation to the parental physical health.

Distance of insertion points in a mattress suture from the wound margin for ideal primary closure in alveolar mucosa: an in vitro experimental study

  • Lee, Won-Ho;Kuchler, Ulrike;Cha, Jae-Kook;Stavropoulos, Andreas;Lee, Jung-Seok
    • Journal of Periodontal and Implant Science
    • /
    • v.51 no.3
    • /
    • pp.189-198
    • /
    • 2021
  • Purpose: This study was conducted to determine how the distance of the near insertion points in a vertical mattress suture from the wound margin influences the pattern of primary closure in an in vitro experimental model. Methods: Pairs of 180 porcine gingival and alveolar mucosa samples were harvested from 90 pig jaws and fixed to a specially designed model. A vertical mattress suture was performed with the near insertion point at 3 different distances from the wound margin (1-, 3-, and 5-mm) on both the gingival and mucosal samples (6 groups; n=30 for each group). The margin discrepancy and the presence of epithelium between the wound margins were measured on histologic slides. Results: The margin discrepancy decreased significantly as the near insertion point became closer to the wound margin both in mucosal tissue (0.241±0.169 mm, 0.945±0.497 mm, and 1.306±0.773 mm for the 1-, 3-, and 5-mm groups, respectively) and in gingival tissue (0.373±0.304 mm, 0.698±0.431 mm, and 0.713±0.691 mm, respectively). The frequency of complications of wound margin adaptation reduced as the distance of the near insertion point from the wound margin decreased both in the mucosal and gingival tissues. Conclusions: Placing the near insertion point close to the wound margin enhances the precision of wound margin approximation/adaptation using a vertical mattress suture.

Product Characteristics Assessment and Wearing Evaluation of Waist-protection Corset Design (허리보호 코르셋 디자인을 위한 제품 분석 및 착용 평가)

  • Kim, Soyoung;Lee, Heeran
    • Fashion & Textile Research Journal
    • /
    • v.23 no.6
    • /
    • pp.781-789
    • /
    • 2021
  • To enhance the design and comfort of waist-protection corsets, this study analyzed the product characteristics of five types of posture-correction corsets that are available commercially. Additionally, subjective evaluation of the corsets was conducted on women aged 20 to 60 years, in terms of design, material preference, fit, comfort, degree of correction, freedom of movement, tightness, and convenience of front fastening. Following product analysis, the five corset types were divided into: two soft, one semi-hard, and two hard types in terms of the degree of elongation. As a result of pattern analysis, the soft type was designed to improve fit by reflecting the body curvature, whereas the semi-hard and hard types were relatively flat. Through the wearing sensation assessment, the hard type manufactured by company S was the best in terms of design, material, fit, comfort, correction degree, and freedom of movement. The soft type was average in design, material, and fit while relatively poor in the correction degree and tightness. The results indicated that soft materials, flexible bones with appropriate tension, patterns designed to snugly fit the body with large curvature at the top and bottom for better inflection, and adjustable support belts that can be double-fixed are crucial elements in improving the corset design to boost the comfort of wearing. These study results are helpful in the development of waist-protection corsets with excellent wearing comfort and design appreciated by customers.

Power Disturbance Detection using the Inflection Point Estimation (변곡점 추정을 이용한 전력선 신호의 이상현상 검출)

  • Iem, Byeong-Gwan
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.710-715
    • /
    • 2021
  • Power line signal can show disturbances due to various causes. Typical anomalies are temporary sag/swell of the amplitude, flat topped signal, and harmonic distortions. The disturbances need to be detected and treated properly for the quality of the power signal. In this study, the power disturbances are detected using the inflection points (IP). The inflection points are defined as points where local maxima/minima or the slope changes occur. The power line signal has a fixed IP pattern since it is basically sinusoidal, and it may have additional inflection points if there is any disturbance. The disturbance is detected by comparing the IP patterns between the normal signal and distorted signal. In addition, by defining a cost function, the time instant where the disturbance happens can be decided. The computer simulation shows that the proposed method is useful for the detection of various disturbances. The simple sag or swell signal only shows the amplitude changes at the detected inflection points. However, the flat top signal and harmonically distorted signal produce additional inflection points and large values in the cost function. These results can be exploited for the further processing of disturbance classification.

A Study on Micro-Mobility Pattern Analysis using Public Bicycle Rental History Data (공공자전거 임대내역 데이터를 활용한 마이크로 모빌리티 패턴분석 연구)

  • Cho, Jaehee;Baik, Gaeun
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.83-95
    • /
    • 2021
  • In this study, various usage patterns were analyzed after establishing a data mart for micro mobility analysis based on the rental history of public bicycles in Seoul. Rental history data is origin-destination data that includes the rental location and time, and the return location and time. About 1500 rental locations were classified according to the characteristics of the location to create a 'station type' dimension. We also created a 'path type' dimension that displays whether the rental location and return location are the same. In addition, a derived variable called speed, which is obtained by dividing the distance used by the time used, is added, and through this, the characteristics of the riding area and the reason for the rental can be estimated. Meanwhile, administrative district link, administrative neighborhood link, and station type link were created to apply network analysis. Through this analysis, the roles and proportions of administrative districts, public facilities, and private facilities engaged in micro-mobility services were visualized. 49.9% of rentals occur at rental offices near transportation facilities, and half of them occur at rental offices near subway stations. The number of rentals during the evening rush hour is more than double that of the morning rush hour. When the path type is unidirectional, there is a fixed destination, so the distance and time used are short, and the movement speed tends to be high. In the case of round-trip, the purpose of use is exercise or leisure, so the distance and time used are long, and the movement speed is slow. It is expected that the results of the analysis can be used as reference materials for selecting new rental locations, providing convenient services for users, and developing user-specialized products.

Development of a distributed high-speed data acquisition and monitoring system based on a special data packet format for HUST RF negative ion source

  • Li, Dong;Yin, Ling;Wang, Sai;Zuo, Chen;Chen, Dezhi
    • Nuclear Engineering and Technology
    • /
    • v.54 no.10
    • /
    • pp.3587-3594
    • /
    • 2022
  • A distributed high-speed data acquisition and monitoring system for the RF negative ion source at Huazhong University of Science and Technology (HUST) is developed, which consists of data acquisition, data forwarding and data processing. Firstly, the data acquisition modules sample physical signals at high speed and upload the sampling data with corresponding absolute-time labels over UDP, which builds the time correlation among different signals. And a special data packet format is proposed for the data upload, which is convenient for packing or parsing a fixed-length packet, especially when the span of the time labels in a packet crosses an absolute second. The data forwarding modules then receive the UDP messages and distribute their data packets to the real-time display module and the data storage modules by PUB/SUB-pattern message queue of ZeroMQ. As for the data storage, a scheme combining the file server and MySQL database is adopted to increase the storage rate and facilitate the data query. The test results show that the loss rate of the data packets is within the range of 0-5% and the storage rate is higher than 20 Mbps, both acceptable for the HUST RF negative ion source.

A Study on Complication Intention of the Samryesugwon (정조(正祖) 친찬(親撰) 『삼례수권(三禮手圈)』의 편찬 의도에 관한 연구(硏究))

  • Hyun Joung, Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.73-100
    • /
    • 2022
  • In this study, Samryesugwon is compared with King Jeongjo's anthology because it is not clear why King Jeongjo made Samryesugwon from the Three Classics of Li in a same category but in two different text. As results of this study, it is hard to find information of title because there is no table of contents on the Samryesugwon. Also, King Jeongjo considered and respected the Yili and Zhouli as the original Classics of Li, but not the Liji. Last, it turns out that there is the passive fixed pattern in the way of abridgment instead of the unique characteristic of Jeongjo's abridgment which was compiled before. This research has an academic significance because it figure out the reason why King Jeongjo compiled the Samryesugwon and what his perspective on the Three Classics of Li by textual analyzing as abridgment book.

IoT Malware Detection and Family Classification Using Entropy Time Series Data Extraction and Recurrent Neural Networks (엔트로피 시계열 데이터 추출과 순환 신경망을 이용한 IoT 악성코드 탐지와 패밀리 분류)

  • Kim, Youngho;Lee, Hyunjong;Hwang, Doosung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.5
    • /
    • pp.197-202
    • /
    • 2022
  • IoT (Internet of Things) devices are being attacked by malware due to many security vulnerabilities, such as the use of weak IDs/passwords and unauthenticated firmware updates. However, due to the diversity of CPU architectures, it is difficult to set up a malware analysis environment and design features. In this paper, we design time series features using the byte sequence of executable files to represent independent features of CPU architectures, and analyze them using recurrent neural networks. The proposed feature is a fixed-length time series pattern extracted from the byte sequence by calculating partial entropy and applying linear interpolation. Temporary changes in the extracted feature are analyzed by RNN and LSTM. In the experiment, the IoT malware detection showed high performance, while low performance was analyzed in the malware family classification. When the entropy patterns for each malware family were compared visually, the Tsunami and Gafgyt families showed similar patterns, resulting in low performance. LSTM is more suitable than RNN for learning temporal changes in the proposed malware features.

Korean Red Ginseng inhibits methamphetamine addictive behaviors by regulating dopaminergic and NMDAergic system in rodents

  • Lee, Bo-Ram;Sung, Su-Jeong;Hur, Kwang-Hyun;Kim, Seong-Eon;Ma, Shi-Xun;Kim, Seon-Kyung;Ko, Yong-Hyun;Kim, Young-Jung;Lee, Youyoung;Lee, Seok-Yong;Jang, Choon-Gon
    • Journal of Ginseng Research
    • /
    • v.46 no.1
    • /
    • pp.147-155
    • /
    • 2022
  • Background: Methamphetamine (METH) is the most widely used psychostimulant and has been known to exhibit reinforcing effects even after long abstinence. We showed the inhibitory effect of Korean Red Ginseng extract (RGE) on METH-induced addictive behaviors in animal models mimicking the human drug-use pattern. Methods: We first investigated the effect of RGE on the acquisition of METH-induced dependence using self-administration and conditioned place preference (CPP) tests. Additionally, further experiments such as METH-induced motivational behavior and seeking behavior were conducted. To study the underlying mechanism, dopamine receptor, dopamine transporter, and N-methyl-D-aspartate receptor were assessed through Western blot analysis. Results: Treatment with RGE significantly reduced METH-induced self-administration on a fixed-ratio 1 schedule of reinforcement. It could be also decreased a progressive ratio schedule, and inhibited METH-primed reinstatement. In CPP, RGE significantly prevented the development of METH-induced CPP. Moreover, RGE not only shortened the withdrawal period clearly, but also prevented the reinstatement of CPP. RGE treatment also reversed METH-induced overexpression of dopamine transporter, dopamine receptor D1, and NMDA receptor in the nucleus accumbens. Conclusion: Our findings reflect that RGE has therapeutic potential to suppress METH-induced addictive behaviors by regulating dopaminergic and NMDAergic system.

Fuzzy Logic-based Bit Compression Method for Distributed Face Recognition (분산 얼굴인식을 위한 퍼지로직 기반 비트 압축법)

  • Kim, Tae-Young;Noh, Chang-Hyeon;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.9-17
    • /
    • 2009
  • A face database has contained a large amount of facial information data since face recognition was widely used. With the increase of facial information data, the face recognition based on distributed processing method has been noticed as a major topic. In existing studies, there were lack of discussion about the transferring method for large data. So, we proposed a fuzzy logic-based bit compression rate selection method for distributed face recognition. The proposed method selects an effective bit compression rate by fuzzy inference based on face recognition rate, processing time for recognition, and transferred bit length. And, we compared the facial recognition rate and the recognition time of the proposed method to those of facial information data with no compression and fixed bit compression rates. Experimental results demonstrates that the proposed method can reduce processing time for face recognition with a reasonable recognition rate.