• Title/Summary/Keyword: leakage problems

Search Result 545, Processing Time 0.027 seconds

A Study on urinary Incontinence of Adult Women : Preliminary Study (성인여성의 요실금에 관한 기초 연구)

  • 최영희;홍재엽;김문실;김애정;김정아;백성희
    • Journal of Korean Academy of Nursing
    • /
    • v.28 no.1
    • /
    • pp.171-183
    • /
    • 1998
  • The purpose of this study was to identify the incidence of urinary incontinence in adult women and to identify factors related to life style and sexual intercourse that were related to incontinence. The sample consisted of 1,065 women living in Seoul or one of five provinces. Data for this study were collected from January 16 to June 23 using structured questionnaires. The Urinary Symptom Questionnaire developed by Jackson and a demographic questionnaire were used to collect the data. The data were analyzed using frequency, percentage with an SPSS/PC$^{+}$ program. The major finding are as follows : 1. The distribution of age of subjects was as follows : 20-29(10.1%), 20-39(17.8%), 40-49(27.3%). 50-59(22.3%), 60-69(12.9%), 70-79(6.1%). 80-89(2.8%), more than 90(0.6%). The frequency of normal delivery, 0(155%), 1-2(36.0%), 3-4(29.2%), 5-6(13.0%). more than 7(6.3%). The rate of subjects with menopause was 40.8%. 2. It was reported that 50.7% of the subjects experienced urinary incontinence with stress, mixed. and urgency incontinence being 49.8%, 43.4%, 6.8% respectively. 3. The lower urinary symptoms and incidence with urinary incontinence were as follows : Daily frequency. 22.3%, nocturia. 40.8%, urgency, 71.2%, bladder pain 47.8%, unexplainned incontinence, 32.4%, noctural incontinence, 16.1%, and frequency of incontinence, 37.7%. In term of quantity of incontinence, drop/pants damp, 29.5%, dribble/pants wet, 20.5%, flood or soaking through to outer clothing, 1.7%, and flood or running down legs or onto floor, 0.2%. 4. The symptoms related to sexual intercourse and incidence of urinary incontinence were as follows : dry vagina, 39.1%, sex life trouble, 10.8%, pain during sexual intercourse, 27.4%, and urine leakage during sexual intercourse. 8.8%. 5. Life style problems related to urinary incontinence were as follows : fluid intake restriction, 20.0%, affected daily task, 24.5%. avoidance of placess and situations, 35.0%, interference in physical activities, 30.6%, interference in relationships with other people. 19.0%. interference in relationships with husband/companion, 8.1%, and time after attack of urinary symptoms, 76.9%. In term of the feeling about the rest of their lifves the women reported : perfectly happy, 11.3%. pleased, 16.9%. mostly satisfied, 20.2%, mixed feelings, 21.0%, mostly dissatisfied, 21.0%, very unhappy 8.5%, and desperate. 1.0%. In conclusion. this study was a preliminary study to provide nursing practices guidelines for incontinence in adult women. Nurse working with adult women should develop and provide adequate care for these women.n.

  • PDF

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Maxillofacial rehabilitation of hemi-maxillectomy patient using a closed hollow bulb obturator fabricated by one-step polymerization technique: a clinical report (상악골 부분절제술 시행 환자에서 one-step 중합 기술로 만든 hollow bulb 폐색장치를 이용한 악안면 수복 증례)

  • Sim, Jae-Hyuk;Kim, Min-Kyoo;Han, Jung-Suk;Lee, Jai-Bong;Kim, Sung-Hun;Yeo, In-Sung
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.54 no.1
    • /
    • pp.35-40
    • /
    • 2016
  • The maxillary defects lead to anatomical and functional deformity of the maxillofacial region. As far as functions are concerned, such defects can produce difficulty in speech, mastication, and deglutition. Obturator prostheses play a very important role in functional recovery for post-maxillectomy patients. To achieve rigidity of the obturator, appropriate retention should be given, and the weight of the prosthesis be reduced. There are two types of hollow bulb obturator: open and closed. A closed type has many advantages. Nevertheless, some problems, including complexity of fabrication and water leakage into the bulb, have the closed hollow obturator not be widely used. The one-step polymerization technique described in this case overcomes the shortcomings by easily constructing a small hollow bulb with two thermoplastic resin sheets.

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

Design of Portable Welded-Nitrogen Vessel (11 kg, 10 L and 50 bar) for Shipbuilding (선박용 휴대형 질소용기(11 kg, 10 L 및 50 bar)의 두께 및 외형 설계)

  • Seong, Hansaem;Kim, Jaeyeol;Eom, Taejin;Kawk, Hyo Seo;Lee, Kwang O;Kim, Chul
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.4
    • /
    • pp.263-270
    • /
    • 2017
  • The shipbuilding industry uses large stationary tanks to store low-pressure air, which is used to open and close large shut-off valves. However, when supplying air from the tank to a distant valve, there are problems related to the need for supplementary pipes and the pressure drop during transportation. In this study, a portable welded vessel for storing high-pressure nitrogen (11 kg, 10 L, and 50 bar) was designed to prevent air leakage and improve the convenience of workers. This pressure vessel was elliptical to reduce the number of welded parts, which are structurally weak. The thickness and ratio of the major and minor axes of the pressure vessel were calculated to verify its structure stability at the working pressure (50 bar), and that the proposed weight and capacity were satisfactory. The residual stress caused by the welding process was calculated by performing a transient thermal-structural coupled field analysis using the ANSYS parametric design language (APDL), and the fatigue life of the vessel was verified based on the Goodman criterion.

Material Properties of Ultra Rapid Hardening Mortar for Repairing Sewage Treatment Concrete Pipes (콘크리트 하수관거 보수용 초속경 수중불분리 모르타르의 재료적 특성)

  • Lee, Byungjae;Lee, Sunmok;Bang, Jin-wook;Kim, Yun-yong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.3
    • /
    • pp.57-62
    • /
    • 2020
  • Among the sewage pipes installed in Korea, the length of concrete pipes exceeding 20 years is 66,334 km (42.5%). Deteriorated concrete sewer pipes need to be repaired due to the leakage of internal sewage, which causes problems such as sink holes by expanding the cavity around the pipeline. In this study, we tried to apply anti-washout underwater mortar with ultra rapid hardening cement and segregation reducing agent to sewage pipe repair. As a result of the setting time test, the final set time was delayed by up to 172% by incorporating segregation reducing agent. In the test for measuring the degree of mortar segregation in water, it was measured at pH 12 or less under all mixing conditions. In addition, the suspension amount was measured to be 50 mg / l or less to satisfy the KCI-AD102 standard by incorporating a segregation reducing agent. In terms of the average value of mortar compressive strength, by incorporating segregation reducing agent, the strength of the specimens produced in air was more than 80% of that of the specimens produced in water. Conversely, the bond strengths of the specimens produced in water were measured to be higher than those of the specimens produced in air. Water resistance was evaluated by measuring water absorption and water permeability. Water absorption and water permeability were reduced by 42.6% and 36.6%, respectively, by mixing segregation reducing agent.

Keyword Filtering about Disaster and the Method of Detecting Area in Detecting Real-Time Event Using Twitter (트위터를 활용한 실시간 이벤트 탐지에서의 재난 키워드 필터링과 지명 검출 기법)

  • Ha, Hyunsoo;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.7
    • /
    • pp.345-350
    • /
    • 2016
  • This research suggests the keyword filtering about disaster and the method of detecting area in real-time event detecting system by analyzing contents of twitter. The diffusion of smart-mobile has lead to a fast spread of SNS and nowadays, various researches based on studying SNS are being processed. Among SNS, the twitter has a characteristic of fast diffusion since it is written in 140 words of short paragraph. Therefore, the tweets that are written by twitter users are able to perform a role of sensor. By using these features the research has been constructed which detects the events that have been occurred. However, people became reluctant to open their information of location because it is reported that private information leakage are increasing. Also, problems associated with accuracy are occurred in process of analyzing the tweet contents that do not follow the spelling rule. Therefore, additional designing keyword filtering and the method of area detection on detecting real-time event process were required in order to develop the accuracy. This research suggests the method of keyword filtering about disaster and two methods of detecting area. One is the method of removing area noise which removes the noise that occurred in the local name words. And the other one is the method of determinating the area which confirms local name words by using landmarks. By applying the method of keyword filtering about disaster and two methods of detecting area, the accuracy has improved. It has improved 49% to 78% by using the method of removing area noise and the other accuracy has improved 49% to 89% by using the method of determinating the area.

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment (스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계)

  • Kim, Jeong-Ho;Heo, Jae-Wook;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.550-558
    • /
    • 2019
  • As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

Characteristics of Mine Liner According to the Replacement Ratio of Nano-Silica and Silica-Fume (나노실리카 및 실리카흄 대체율에 따른 차수재의 특성)

  • Kang, Suk-Pyo;Lee, Hee-Ra;Kang, Hye-Ju;Nam, Seong-Young;Kim, Chun-Sik
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.7 no.1
    • /
    • pp.66-73
    • /
    • 2019
  • Approximately 80% of the mines are vacated or abandoned mines and are mostly left without suitable environmental treatment facilities. In the area around the abandoned mine site, problems such as drainage of acidic city drainage and leakage of leachate occur, and ground subsidence caused by this can cause a safety accident due to sink hole occurrence. In this study, flow, compressive strength, water uptake, pore and hydration characteristics were investigated to investigate the basic properties of liner and cover material based on the replacement ratio of nano silica and silica fume in the existing blast - furnace slag fine powder. As a result, as the substitution ratio of nano silica and silica fume increased, the flow and compressive strength of nano silica specimens increased and the absorption rate decreased. In the case of pore characteristics, the amount of pores decreased as the substitution ratio of nano silica and silica fume increased. Especially, the capillary porosity of 10-1,000 nm diameter decreased. Ray diffraction analysis and SEM measurement showed that the peak positions of the hydration products were almost the same when compared with the 5% alternative test samples of Plain and silica fume.