• Title/Summary/Keyword: one-to-one session

Search Result 686, Processing Time 0.159 seconds

Surgery for Bilateral Large Intracranial Traumatic Hematomas : Evacuation in a Single Session

  • Kompheak, Heng;Hwang, Sun-Chul;Kim, Dong-Sung;Shin, Dong-Sung;Kim, Bum-Tae
    • Journal of Korean Neurosurgical Society
    • /
    • v.55 no.6
    • /
    • pp.348-352
    • /
    • 2014
  • Objective : Management guidelines for single intracranial hematomas have been established, but the optimal management of multiple hematomas has little known. We present bilateral traumatic supratentorial hematomas that each has enough volume to be evacuated and discuss how to operate effectively it in a single anesthesia. Methods : In total, 203 patients underwent evacuation and/or decompressive craniectomies for acute intracranial hematomas over 5 years. Among them, only eight cases (3.9%) underwent operations for bilateral intracranial hematomas in a single session. Injury mechanism, initial Glasgow Coma Scale score, types of intracranial lesions, surgical methods, and Glasgow outcome scale were evaluated. Results : The most common injury mechanism was a fall (four cases). The types of intracranial lesions were epidural hematoma (EDH)/intracerebral hematoma (ICH) in five, EDH/EDH in one, EDH/subdural hematoma (SDH) in one, and ICH/SDH in one. All cases except one had an EDH. The EDH was addressed first in all cases. Then, the evacuation of the ICH was performed through a small craniotomy or burr hole. All patients except one survived. Conclusion : Bilateral intracranial hematomas that should be removed in a single-session operation are rare. Epidural hematomas almost always occur in these cases and should be removed first to prevent the hematoma from growing during the surgery. Then, the other hematoma, contralateral to the EDH, can be evacuated with a small craniotomy.

A Caching Scheme to Support Session Locality in Hierarchical SIP Networks

  • Choi, KwangHee;Kim, Hyunwoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.1
    • /
    • pp.1-9
    • /
    • 2013
  • Most calls of a called user are invoked by the group of calling users. This call pattern is defined as call locality. Similarly Internet sessions including IP telephony calls have this pattern. We define it session locality. In this paper, we propose a caching scheme to support session locality in hierarchical SIP networks. The proposed scheme can be applied easily by adding only one filed to cache to a data structure of the SIP mobility agent. And this scheme can reduce signaling cost, database access cost and session setup delay to locate a called user. Moreover, it distributes the load on the home registrar to the SIP mobility agents. Our performance evaluation shows the proposed caching scheme outperforms the hierarchical SIP scheme when session to mobility ratio is high.

Authentication and Session Management based on Ajax (Ajax를 기반으로 한 인증 및 세션 관리)

  • Nam Sang-On;Daguil Rolyn C;Kim Gi-Weon;Song Jung-Gil
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.157-174
    • /
    • 2006
  • Ajax interaction model changes the posture of web application to become a stateful over HTTP. Ajax applications are long-lived inthe browser. XMLHTTPRequest (XHR) is used to facilitate the data exchange. Using HTTPS over this interaction is not viable because of the frequency of data exchange. Moreover, switching of protocols form HTTP to HTTPS for sensitive information is prohibited because of server-of-origin policy. The longevity, constraint, and asynchronous features of Ajax application need to hove a different authentication and session fondling mechanism that invoke re-authentication. This paper presents an authentication and session management scheme using Ajax. The scheme is design lo invoke periodic and event based re-authentication in the background using digest authentication with auto-generated password similar to OTP (One Time Password). The authentication and session management are wrapped into a framework called AWASec (Ajax Web Application Security) for coupling to avoid broken authentication and session management.

  • PDF

The Relationship Between Networks Accuracy and Duration of Session in Static GPS Method

  • Kang, Joon-Mook;Lee, Young-Wook;Park, Joung-Hyun;Lee, Eun-Soo
    • Korean Journal of Geomatics
    • /
    • v.1 no.1
    • /
    • pp.35-41
    • /
    • 2001
  • In order to investigate duration of session in static GPS method, data from a network of 7 points, with baseline length of from 64 km to 358 km, were processed. The network were observed by Trimble 4000SSE and Trimble 4000SSi with duration of 24 hours. Data extracted from this session were processed as if they were measured in 3, 6, 9 ... 21, and 24 hours session. The results (Baselines, Sloop Closures, Coordinates, and Standard errors of coordinates) of these sessions were compared to 24 hours one. Some conclusions were made, which seem to be useful in selection of duration for the same dimension GPS network for different purposes.

  • PDF

Assessment of Regulatory Effect of Electro-acupuncture at Jogsamni($ST_{36}$), on Electrogastrography in Diabetic Patients with Gastric Dysrhythmia;A Case Series Study (위장 비율동성 당뇨환자에서 족삼리(足三里)($ST_{36}$) 전침처치의 위전도 조절 영향 사례군 연구)

  • Oh, Dal-Seok;Choi, Jun-Yong;Jung, So-Young;Shin, Mi-Suk;Kim, Ae-Ran;Kang, Kyung-Won;Kim, Jong-In;Choi, Sun-Mi
    • Journal of Acupuncture Research
    • /
    • v.25 no.4
    • /
    • pp.95-103
    • /
    • 2008
  • Objectives : This study was to investigate the regulatory effect of electro-acupuncture on Jogsamni ($ST_{36}$) in bradygastric condition or gastroparesis which is a neuropathic complication of type 2 diabetes mellitus(T2DM), assessed using 4-channel electrogastrography (EGG). Methods : It was a case series study. Each patient was given electro-acupuncture(EA) one point, Jogsamni($ST_{36}$) or Gyeonu($LI_{15}$) bilaterally for thirty minutes with 2Hz bipolar square wave frequency and moderate intensity of stimulation. With attaching electrodes around stomach region throughout pre-acupuncture, acupuncture, and post-acupuncture session, these parameters were produced; percent rate of bradygastria power compared to sum of power in all kind of gastric rhythm(% bradygastria), dominant frequency(DF) and dominant power(DP). Parameter was analysed per each channel's variable change from pre-acupuncture session by paired t-test. Results : There was statistically significant decrease in % bradygastria parameters on one of the $ST_{36}$ treated patients from pre-acupuncture session and to post-acupuncture session(P=0.015, P=0.008 respectively). A marginal significant decrease of DP was shown in the other $ST_{36}$ treated patient from pre-acupuncture session through post-acupuncture session(P=0.049). Combined data of two $ST_{36}$ Treated patients showed that there was significant decrease of %bradygastria from pre-acupuncture session to acupuncture session(P=0.020), and was decrease of DP from pre-acupuncture session to post- acupuncture session(P=0.020). Conclusions : EA at $ST_{36}$ resulted in statistically significant decrease in %bradygastria and DP for dysrhythmic condition in T2DM gastroparesis patients. Considering this limited results, further study will be needed to elucidate the effect of multiple-acupuncture on gastric myoelectrical activities.

  • PDF

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

An Efficient Distribution Method of Inter-Session Shared Bandwidth Based on Fairness (공정성 기반의 세션간 공유 대역폭의 효율적 분배 기법)

  • Hwang, Kil-Hong;Ku, Myung-Mo;Kim , Sang-Bok
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.905-912
    • /
    • 2004
  • It is a study LVMPD to solve the fairness problem of inter-session shared bandwidth. Whenever congestion occurs in one session, the highest layer is dropped. Also the highest layer of other sessions in non-congestion is dropped by iner-session fairness. While there is spare bandwidth, receivers of session in non-congestion can't use bandwidth efficiently. In this paper, we proposed a distribution method to use efficiently spare bandwidth that occurred by inter-session fairness. In our method, we considered the highest layer those receivers receiving and the higher layer those receivers requesting. The sender assigns the packet-deleting priority to packets when congestion occurs in receivers, and sets layer add/drop flag when receivers of session in non-congestion request the higher layer. The switch deletes packets with packet-deleting priority and transfers packets with layer add/drop flag for session in non-congestion. Therefore receivers of session in non-congestion can add the higher layer. In experimental results, it was known that proposed algorithm use the inter-session shared bandwidth more effectively compared with already known method.

  • PDF

Dynamic Session Key based Pairwise Key Management Scheme for Wireless Sensor Networks

  • Premamayudu, B;Rao, Koduganti Venkata;Varma, P. Suresh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5596-5615
    • /
    • 2016
  • Security is one of the major challenges in the Wireless Sensor Networks (WSNs). WSNs are more vulnerable to adversarial activities. All cryptographic security services indirectly depend on key management. Symmetric key management is the best key establishment process for WSNs due to the resource constraints of the sensors. In this paper, we proposed dynamic session key establishment scheme based on randomly generated nonce value and sensor node identity, in which each sensor node is equipped with session key on expire basis. The proposed scheme is compare with five popular existing key management systems. Our scheme is simulated in OMNET++ with MixiM and presented experimental results. The analytical study and experimental results show the superiority of the proposed scheme over the existing schemes in terms of energy, storage, resilience and communication overhead.

The Effects of Ankle Strategy Exercise on Balance of Patients with Hemiplegia (편마비 환자의 발목관절 전략 운동이 균형 조절 능력에 미치는 영향)

  • Park, Ki-Hyeon;Kim, Won-Bok
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.9 no.1
    • /
    • pp.75-82
    • /
    • 2014
  • PURPOSE: PURPOSE: The purpose of this study was to analyze the effect and examine the feasibility of an intervention of ankle strategy exercise on balance of patients with hemiplegia. METHODS: The subject were randomly allocated to three groups: ankle strategy exercise (group A), balance exercise (group B) and control (group C). Group A was received the conventional physical therapy plus ankle strategy exercises for 20 minutes in one session. Group B was received the same conventional physical therapy plus balance exercises for 20 minutes in one session. Two active groups were performed in the session 3 times a week, for a total of 6 weeks. and Group C was only received the same conventional physical therapy. Balance test was assessed using center of pressure (COP) in the anteroposterior (A-P), mediolateral (M-L) direction, Berg balance scale (BBS) and Timed Up and Go Test (TUG). RESULTS: All groups showed improvements in balance parameters. In especial, the Group A was statistically significant differences in almost part evaluation items and showed more improvements in BBS and TUG parameters than Group B and Group C. and moving distance of M-L COP was more improvements than Group B. CONCLUSION: Ankle strategy exercises had more influence on balance than balance exercises and neurodevelopmental treatment.

Tree-based Navigation Pattern Analysis

  • Choi, Hyun-Jip
    • Communications for Statistical Applications and Methods
    • /
    • v.8 no.1
    • /
    • pp.271-279
    • /
    • 2001
  • Sequential pattern discovery is one of main interests in web usage mining. the technique of sequential pattern discovery attempts to find inter-session patterns such that the presence of a set of items is followed by another item in a time-ordered set of server sessions. In this paper, a tree-based sequential pattern finding method is proposed in order to discover navigation patterns in server sessions. At each learning process, the suggested method learns about the navigation patterns per server session and summarized into the modified Rymon's tree.

  • PDF