• Title/Summary/Keyword: frequent convergence

Search Result 205, Processing Time 0.027 seconds

Hip Muscle Strength and Ratio Differences in Delivery Workers With and Without Iliotibial Band Syndrome

  • Eun-su Lee;Ui-jae Hwang;Hwa-ik Yoo;Il-kyu Ahn;Oh-yun Kwon
    • Physical Therapy Korea
    • /
    • v.30 no.1
    • /
    • pp.15-22
    • /
    • 2023
  • Background: Delivery workers repeatedly get in and out of trucks and walk or run to deliver packages during work. Iliotibial band syndrome (ITBS) is a well-known non-traumatic overuse injury of the lateral side of the knee caused by frequent knee flexion and extension. Hip muscle strength is among the factors that prevent lower extremity injuries. Although many studies have examined the relationship between ITBS and hip muscle strengths, there was no study comparing hip muscle strength and ratio between delivery workers with and without ITBS. Objects: This study aimed to compare hip muscle strength and hip internal/external rotator and adductor/abductor strength ratios between delivery workers with and without ITBS. Methods: Fourteen delivery workers with ITBS matched inclusion criteria in the present study among 20 participants. Because total sample size was required 28 subjects by G*power program (ver. 3.1.9.4; University of Trier), 14 delivery workers without ITBS were recruited. Hip muscle strengths were measured in a side-lying position using a Smart KEMA pulling sensor (KOREATECH Co. Ltd.). An independent t-test was used to compare hip muscle strengths and hip internal/external rotator and hip adductor/abductor strength ratios between delivery workers with and without ITBS. Results: The adductor/abductor strength ratio was significantly greater in delivery workers without ITBS than in those with ITBS (p < 0.05). The strengths of the hip abductor, hip adductor, hip internal rotator, hip external rotator, and the ratio of internal/external rotator strengths were not significantly different between the delivery workers with and without ITBS (p > 0.05). Conclusion: This study's findings showed that delivery workers with ITBS had significantly lesser adductor/abductor strength ratio, while the strengths of the hip abductor and adductor muscles did not differ significantly. These results suggest that adductor/abductor strength ratio should be considered when evaluating and treating ITBS in delivery workers.

Business Processes Automation and Analysis Techniques by Using BPM and SOA (BPM과 SOA기반의 비즈니스 프로세스 자동화와 분석기법)

  • Lee, Chung-Hun;Lee, Jong-Hak;Seo, Jeong-Man;Cho, Wan-Sup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.171-178
    • /
    • 2009
  • Recently, a combination of Business Process Management (BPM) and Service Oriented Architecture (SOA) is being recommended as the best approach for automating large business systems. And the need to create meaningful information from daily operational data is increased today. In this paper, we propose a methodology for automating business processes based on the BPM-SOA convergence trend and verify the methodology by implementing the project management business process. BPM-SOA convergence provides higher extensibility and productivity due to the loosely coupled system construction and maintenance. The system has good properties for frequent process changes and reuse of duplicate processes. We then analyze extensibility of the system as new business processes are added to the existing system. We finally analyze the data generated by BPM by using SAP business intelligence to support management's decision making and strategy. Business intelligence provides not only useful data for business decisions but also chance to optimize the business processes.

Fire Monitoring System for Traditional Markets based on Digital Twin-IoT Sensing (디지털 트윈 & IoT Sensing 융합 기반 전통시장 화재 모니터링 시스템)

  • Jung-Taek Hong;Kyu-Hyup Lee;Jin-Woo Song;Seo-Joon Lee;Young-Hee Chang;Soon-Wook Kwon
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.6_3
    • /
    • pp.1251-1258
    • /
    • 2023
  • Traditional markets are infrastructure with facilities and characteristics of very high population density. Recently, arcades have been installed through traditional market modernization policies, and aging infrastructure has been repaired. However, gas and electrical facilities of traditional markets cannot be easily replaced because of its high density. And because regular inspections are not conducted, management of facilities is on very poor condition. In addition, when a fire occurs in a traditional market, the fire easily spreads to nearby stores and is likely to spread to a large fire because of a lot of highly flammable substances. Smoke detectors and heat detectors are installed in most traditional markets to monitor fires, but malfunctions are frequent due to the nature of smoke detectors and heat detectors, and network facilities are not properly maintained. Therefore, in this study, gas detection sensors and flame detectors are additionally installed in Gwangmyeong Traditional Market, and a digital twin-based traditional market fire monitoring system is implemented in conjunction with existing sensors in the market's 3D model. With this digital twin based fire monitoring system, we can reduce the malfunctions of fire detect sensors, and can easily guide the evacuation route.

Group Key Assignment Scheme based on Secret Sharing Scheme for Dynamic Swarm Unmanned Systems (동적 군집 무인체계를 위한 비밀분산법 기반의 그룹키 할당 기법)

  • Jongkwan Lee
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.93-100
    • /
    • 2023
  • This paper presents a novel approach for assigning group keys within a dynamic swarm unmanned system environment. In this environment, multiple groups of unmanned systems have the flexibility to merge into a single group or a single unmanned system group can be subdivided into multiple groups. The proposed protocol encompasses two key steps: group key generation and sharing. The responsibility of generating the group key rests solely with the leader node of the group. The group's leader node employs a secret sharing scheme to fragment the group key into multiple fragments, which are subsequently transmitted. Nodes that receive these fragments reconstruct a fresh group key by combining their self-generated secret fragment with the fragment obtained from the leader node. Subsequently, they validate the integrity of the derived group key by employing the hash function. The efficacy of the proposed technique is ascertained through an exhaustive assessment of its security and communication efficiency. This analysis affirms its potential for robust application in forthcoming swarm unmanned system operations scenarios characterized by frequent network group modifications.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

Analysis of Patent Trends in Industrial Information and Communication Technology Convergence: Personal Protection and Convenience Equipment Applicable to Agriculture (농업분야에 적용이 가능한 산업용 ICT 융합 개인보호 및 편이장비 특허동향 분석)

  • Kim, Insoo;Kim, Kyungsu;Chae, Hye-Seon;Kim, Hyo-Cher;Kim, Kyung-Ran
    • The Korean Journal of Community Living Science
    • /
    • v.28 no.3
    • /
    • pp.377-390
    • /
    • 2017
  • This study identified technological trends through an analysis of patents for the industrialization of personal protection and convenience equipment using information and communication technology (ICT) as a part of efforts to prevent farm work-related disasters. The analysis was conducted on patents registered and published between January 1974 and May 2016 by the world's five largest intellectual property offices, including the KIPO, USPTO, JPO, EPO, and SIPO. The results of the analysis indicate that the US (36.8%) and South Korea (30.9%) led technological research and development (R&D) with frequent patent applications. An analysis of the technological market revealed that these countries are in the growth and maturity stages, in which the number of patents and number of patent applicants grow rapidly. In terms of the technological market shares of major countries, the US recorded the highest market shares in the field of sensing systems for workers' dangerous conditions and convenience protection equipment based on the internet of things (IoT) convergence. South Korea marked the highest share of 41.8% in the field of sensing devices for dangerous conditions in the working environment. An analysis of the trend of patent applications by specific technologies disclosed the following results: sensing systems for workers' dangerous conditions accounted for the highest share (49.2%), followed by IoT convergence-based convenience protection equipment (26.3%) and sensing devices for dangerous conditions in the working environment (24.6%). Based on this study, ICT-based personal protection and convenience equipment technologies are expected to be actively developed in the future. It will be necessary to secure national competitiveness through R&D investments and commercialization in personal protection and convenience equipment appropriate for farm work as well as through the acquisition of patent technologies and intellectual property rights.

Relationship Between Subjective Symptoms with Near Work and Binocular Function (근업시 자각 증상과 양안시 기능의 관계)

  • Shin, Jin-Ah;Lee, Ok-Jin
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.12 no.3
    • /
    • pp.125-130
    • /
    • 2007
  • The aim of this work was to study the relationship between subjective symptoms and binocular function during near work in forty one(12-17yr) schoolchildren. CISS symptom survey, amplitude of accommodation, accommodative facility, neagative relative accommodation(NRA)/positive relative accommodation(PRA) near point of convergence(NPC), heterophoria, AC/A ratios were measured. The results of measurement were compared with normal expected value of each test and classified into normal and abnormal group. Accommodative insufficiency was more general than convergence insufficiency and esophoria was greater than exophoria. NRA/PRA showed very high and AC/A ratios were very low compare with normal expected value. The results of CISS was as follows; most frequent symptom was tired, mean score was $16.63{\pm}7.49$, mean number of symptoms were $10.07{\pm}3.04$, and mean number of serious symptoms were $1.98{\pm}2.13$. After classified into 4 groups according to score of symptoms, number of symptoms, and degree of symptoms and then analyze the correlation compare with binocular vision test results. NRA was most correlated with group comparison, accommodative facility was most correlated with score of symptoms, NRA was most correlated with number of symptoms, and near horizontal phorias were most correlated with serious symptoms. NRA showed most correlative relation with near symptoms.

  • PDF

Detection and Analysis of Event-Related Potential P300 in EEG by 4-Stimulus Oddball Paradigm

  • Jang, Yun-Seok;Ryu, Soo-Ah;Park, Kyu-Chil
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.234-237
    • /
    • 2010
  • P300 component of the event-related potential(ERP) has been studied for theoretical, empirical, and clinical applications. Nowadays the 1-, 2-, and 3-stimulus oddball paradigms are used for eliciting P300 component of EEG in the auditory stimulus experiments. In this paper, we used a method to add one more stimulus to the 3-stimulus auditory paradigm. The adding stimulus has not the same volume but the same tone of the target stimulus. The 4-stimulus oddball paradigm to use two targets is used to elicit the P300 event-related potentials. In 4-stimulus oddball paradigm, an infrequent non-target (p=0.10) is presented in addition to two infrequent targets (p=0.10) and a frequent standard (p=0.70). Two target stimuli elicited a P300 component with a parietal maximum distribution. The amplitude of the P300 in target 2 was larger than that in target 1 and the latency of the P300 in target 2 was longer than that in target 1. The P300 component due to target 2 stimuli was larger than that due to target 1 stimuli. The experimental results approve that the 4-stimulus oddball paradigm can elicit P300 component clearly. The results are compared with the results of the traditional oddball paradigm.

Dual-Phase Approach to Improve Prediction of Heart Disease in Mobile Environment

  • Lee, Yang Koo;Vu, Thi Hong Nhan;Le, Thanh Ha
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.222-232
    • /
    • 2015
  • In this paper, we propose a dual-phase approach to improve the process of heart disease prediction in a mobile environment. Firstly, only the confident frequent rules are extracted from a patient's clinical information. These are then used to foretell the possibility of the presence of heart disease. However, in some cases, subjects cannot describe exactly what has happened to them or they may have a silent disease - in which case it won't be possible to detect any symptoms at this stage. To address these problems, data records collected over a long period of time of a patient's heart rate variability (HRV) are used to predict whether the patient is suffering from heart disease. By analyzing HRV patterns, doctors can determine whether a patient is suffering from heart disease. The task of collecting HRV patterns is done by an online artificial neural network, which as well as learning knew knowledge, is able to store and preserve all previously learned knowledge. An experiment is conducted to evaluate the performance of the proposed heart disease prediction process under different settings. The results show that the process's performance outperforms existing techniques such as that of the self-organizing map and gas neural growing in terms of classification and diagnostic accuracy, and network structure.

A improved back-off algorithm using the gaussian model in the vehicular networks (차량 간 통신에서 가우시안 모델을 적용한 개선된 백오프 알고리즘)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.225-230
    • /
    • 2012
  • When a car accident happened, the accident vehicle should broadcast a safe message to its neighbors in multi-hop. However, the pure flooding is difficult to protect a chain-reaction collision because of the frequent collision and the communication delay. To solve this problem, we proposes a back-off algorithm applied to the estimation of the neighbor node count using the t-distribution. And we proposes a MAC protocol preventing the communication delay by separating the neighbor's count collection channel and data channel. As a result, we show the frame reception success rate of our protocol improved more 10% than the previous protocol.