Since the restoration or masticatory function is the most important aim of implants, it should be substituted for the role of natural teeth and deliver the stress to the bone under the continous load during function. In natural teeth, stress distribution can be obtained through enamel, dentin and cementum and the elasticity of the periodontal ligament play a role of buffering action. In contrast, implant prosthesis has a very unique characteristics that it delvers the load directly to bone through the implant and superstructure. This fact arise the needs to evaluate the stress distribution of the implant in the mechnical aspects, which has a similar role of natural teeth but different pathway of stress. With 3 kinds of implant in prevalent use, 2 types of experimental PEA implant models were made, axisymmetric and 2-dimensional type. In axisymmetric model, the stiffness of the part including the prosthesis and implant which extrude out of bony surface could be calculated with displacement of the superstructure un er 100N vertical load and then damping effects could be determined through this stiffness. In axisymmetric FEA model, load to the bone could be deduced by evaluation the stress distribution of the designed surface under the 100N vertical force and in 2-dimensional model, 100N eccentric vertical load and 20N horizontal loda. The result are as follows. 1. In every implant, stress to the bone tends to be concenturated on the cortical bone. 2. Though the stress of the cancellous bone is larger at the apex of implants, it is less compared with cortical bone. 3. Under 20N horizontal load, stress of the left and right sides of implant shows a symmetrical pattern. But under 100N eccentric vertical load, loaded side shows much larger stress value. 4. In the 1mm interface, stress distribution among implants tend to have a similar pattern. But under 20N horizontal load apposite side of being loaded shows less stress in IMZ. 5. In the case of screw type implant, stress tends to vary along with screw shape. 6. According to the result determined with microstrain, cancellous bone id generally under the condition of overload, while cortical bone is usually within the limitation of physiologic load. 7. In the Branemark implant, maximum stress to the cortical bone is larger than any other implant except for the condition of 20N horizontal force and 0.05mm interface. 8. Damping effects of implants is maximum in IMZ.
The purposes of this study were to investigate the effects of strength training on the change of ground reaction force for the children with trisomy 21 Down syndrome. The subjects of this study were consisted of eight elementary school students with Down syndrome who participated in the strength training. The strength training was administered by six items such as squat, leg curl, leg extension, toe raise, sit-ups, and hyperextension. For strengthening muscle, each group also was treated by walking for 8 weeks, three times a week, 10-15RM, 3sets, which was based on the principle of progressive overload. For inquiring the effect of strength training, the ground reaction force variables were measured in two phases : before-training and 8 week-after training. The gait of each subject was acquisition using 2 AMTI force platforms set at 100 frequency. The results of this study were as follows: The pattern of vertical, antero-posterior and medio-lateral forces, trajectory of net COP and the timing ratio of reaching the each events were shown variously. So, it is not easy to explain these variables clearly. As the result of strength training, these variables were changed. However, the results of within subjects differ greatly, there was no difference statistically.
Ji, Ae-Ttie;Yeon, Cheol;Lee, Seung-Hun;Jo, Geun-Sik;Kim, Heung-Nam
Journal of Intelligence and Information Systems
/
v.13
no.3
/
pp.119-140
/
2007
Recommender systems enable a user to decide which information is interesting and valuable in our world of information overload. As the recent studies of distributed computing environment have been progressing actively, recommender systems, most of which were centralized, have changed toward a peer-to-peer approach. Collaborative Filtering (CF), one of the most successful technologies in recommender systems, presents several limitations, namely sparsity, scalability, cold start, and the shilling problem, in spite of its popularity. The move from centralized systems to distributed approaches can partially improve the issues; distrust of recommendation and abuses of personal information. However, distributed systems can be vulnerable to attackers, who may inject biased profiles to force systems to adapt their objectives. In this paper, we consider both effective CF in P2P environment in order to improve overall performance of system and efficient solution of the problems related to abuses of personal data and attacks of malicious users. To deal with these issues, we propose a multi-agent framework for a distributed CF focusing on the trust relationships between individuals, i.e. web of trust. We employ an agent-based approach to improve the efficiency of distributed computing and propagate trust information among users with effect. The experimental evaluation shows that the proposed method brings significant improvement in terms of the distributed computing of similarity model building and the robustness of system against malicious attacks. Finally, we are planning to study trust propagation mechanisms by taking trust decay problem into consideration.
Journal of the Korean Association of Oral and Maxillofacial Surgeons
/
v.34
no.5
/
pp.571-577
/
2008
Introduction: Possible etiologic factors associated with bone loss around implants after implantation are surgical trauma, occlusal overload, periimplantitis, presence of micro gap and the formation of biologic distances. Tarnow et al. observed that the crestal bone loss was greater when the distance between the implants was <3mm than when the implants were ${\geq}\;3mm$ apart. The aim of this study was to evaluate the influence of different interimplant distance on marginal bone and crestal bone resorption in the beagle dogs. Materials and methods: The mandibular premolars of 5 dogs were extracted bilaterally. After 12 weeks of healing, each dog received 7 implants. On each side, implants were separated by 2mm (Group 1) and by 5mm (Group 2). After 16 weeks of healing, the dogs were sacrificed. Marginal bone loss was determined through linear measurements made between the implant-abutment junctions and the most coronal portions of the bone in contact with the implant surface. A line was drawn uniting the implant-abutment junctions of the adjacent implants, and a linear measurement was made at the midpoint in the direction of the most coronal peak of the interimplant bone crest to determine the crestal bone loss. Both of them was measured radiologically and histologically. Result and conclusion: In radiological analysis, the mean of marginal bone loss was $1.26{\pm}0.14mm$ for group 1 and $1.23{\pm}0.34mm$ for group 2, the mean of crestal bone loss was $1.10{\pm}0.14mm$ for group 1 and $1.02{\pm}0.30mm$ for group 2. The results were not statistically significant between 2 groups. In histological analysis, the mean of marginal bone loss was $1.63{\pm}0.48mm$ for group 1 and $1.62{\pm}0.50mm$ for group 2, the mean of crestal bone loss was $1.23{\pm}0.35mm$ for group 1 and $1.15{\pm}0.39mm$ for group 2. The differences were also not statistically significant. The clinical significance of this result is that the increase in the crestal bone loss results in the increase in the distance between the base of the interproximal contact of the crowns and the bone crest, and this determines if papilla will be present or absent between implants. Considering this fact, keeping up sufficient interimplant distance is important to minimize crestal bone loss.
Proceedings of the Korea Society for Industrial Systems Conference
/
1999.12a
/
pp.121-129
/
1999
When continuous media are transmitted over the communication networks, asynchrony which can not maintain temporal relationships among packets may occur due to a random transit delay. There exist two types of synchronization schemes ; for guaranteed or non-guaranteed resource networks. The former which applies a resource reservation technique maintains delay characteristics, however, the latter supply a best-effort service. In this paper, I propose a intra-media synchronization scheme to transmit continuous media on general networks not guaranteeing a bounded delay tome. The scheme controls transmission times of the packets by estimating next delay time with the delay distribution. So, the arriving packets may be maintained within a limited delay boundary, and playout will be performed after buffering to smoothen small delay variations. The continually increasing delay due to network overload causes buffer underflow at the receiver. To solve it, the transmitter is required to speed up instantaneously. Too much increase of transmission-rate may cause network congestion. At that time, the transmitter drops the current packet when informed excessive delay from the receiver.
Location-based services have been expanded rapidly in local and overseas markets due to technological advances and increasing applications of wireless internet. Various researches have been made to manage efficiently the location information of moving objects. A basic location-based alert service provides alerting messages automatically when either entering or leaving a specific location and it is expected to become one of the most important location-based services. Location-based alert services require a location polling method to acquire current locations for a large number of moving objects. However, a simple periodical location polling method causes severe system overload because a system should keep updating location information of the moving objects ceaselessly. Most location polling algorithms for location-based alerting services are not suitable for mobile users with dynamic and unsteady moving patterns. In this paper, we propose an improved location polling algorithm for location-based alerting services to reduce the amount of location information acquisition and therefore, to decrease the system load. Various experiments show that the proposed algorithm outperforms other algorithms.
In the past most major accidents resulted in death, but today there is a dramatic increase in the number of people who survive such accidents but who are left with permanent injury. Particularly, children who are inquisitive about their surroundings but immature in their ability to assess danger, are more vulnerable to accidents and their causes as well as to determine attitudes towards prevention. The main objective of the study was to assess the effectiveness of using an accident prevention manual for accident for accident prevention education. The study was a quasi-experimental study using a questionnaire format. The subjects of the study were 393 mothers of children attending six day care centers in Seoul. Data collection was done between May 1 and June 15, 1997. The tools used for the study were a questionnaire developed the researchers and a manual for accident prevention. The collected data were analyzed using SPSS. The results of the study are as follows: 1. Types of accidents included stabbing, bums, falls from heights, choking, falls on slippery surfaces, traffic accidents, drowning, poisoning, and electrical shock in that order of frequency. 2. The main causes of accidents in children were from cosmetics and household medications. 3. The most frequent locations of accidents in the home were the bathroom, kitchen, and stairways in that order. 4. For $90.4\%$ of children safety seats were not used when the ridding in a car. 5. In examining the parents' accident prevention practices, it was found that many parents used only . one electrical outlet for many appliances, tending to overload the electricity lines and that they were not practically concerned bout the flammability of children's pajamas, indicating a less than positive attitude towards fire prevention. 6. The parents had not provided their children with any instruction on accident prevention or on what to do after an accident had occurred. 7. After the use of pamphlet in an accident prevention education program, it was found that there was a statistically significant difference in the degree to which children carried out safety measures (t=14.96, p=.000) and in their safety habits (t=-1.67, p<.1) indicating an effectiveness in this method of education. The results of this study showed that there are many things in a child's environment that can cause accidents and that the possibility of an accident occurring is high. So nurses looking after children should be aware of the need for safety education to prevent accidents in the home and plan to provide appropriate educational material to help parents with this education.
Dramatic increase in the number of Internet users want highly qualified service of continuous media contents on the web. To solve these problems, we present two network caching schemes(PPC, PPCwP) which consider the characteristics of continuous media objects and user access pattern in this paper. While there are plenty of reasons to create rich media contents, delivering this high bandwidth contents over the internet presents problems such as server overload, network congestion and client-perceived latency. PPC scheme periodically calculates the popularity of objects based on the playback quantity and determines the optimal size of the initial fraction of a continuous media object to be cached in proportion to the calculated popularity. PPCwP scheme calculates the expected popularity using the series information and prefetches the expected initial fraction of newly created continuous media objects. Under the PPCwP scheme, the initial client-perceived latency and the data transferred from a remote server can be reduced and limited cache storage space can be utilized efficiently. Trace-driven simulation have been performed to evaluate the presented caching schemes using the log-files of iMBC. Through these simulations, PPC and PPCwP outperforms LRU and LFU in terms of BHR and DSR.
To perform on-line maintenance for Distributed Information System, it is indispensable to disseminate files to participant nodes in the network. When users' requests for file deployment occur simultaneously in a short period a deployment server falls into overload phase, which is often called Flash Crowds. h common solution to avoid Flash Crowds is to increase hardware capacity. In this paper, we propose a software solution based on P2P, which does not cost any additional expense. In the proposed solution, nodes in the network are grouped into subnetworks one of which is composed of only neighboring nodes. In each subnetwork, copies of deployment files can be transferred to each other. Consequently, it brings about the effect of load balancing in deployment server. To raise the effectiveness, target files for deployment are packed into one package. Before being transferred, each package is divided into multiple equal-sized segments. A deployment server in a normal phase transmits a package requested from nodes in segment units. However a deployment server is overloaded, if segments already exist in the subnetwork participant nodes in the subnetwork receive necessary segments from neighboring nodes. In this paper, we propose data structures and algorithm for this approach and show performance improvement through simulation.
On-line reorganization in a shared nothing database cluster is crucial to the performance of the database system in a dynamic environment like WWW where the number of users grows rapidly and changing access patterns may exhibit high skew. In the existing method of on-line reorganization have a drawback that needs excessive data migrations in case more than two nodes within a cluster have overload at the same time. In this paper, we propose an advanced B$^{+}$ tree based on-line reorganization method that solves data skew on multi-nodes. Our method facilitates fast and efficient data migration by including spare nodes that are added to cluster through on-line scaling. Also we apply CSB$^{+}$ tree (Cache Sensitive B$^{+}$ tree) to our method instead of B$^{+}$ tree for fast select and update queries. We conducted performance study and implemented the method on Ultra Fault-Tolerant Database Cluster developed for high scalability and availability. Empirical results demonstrate that our proposed method is indeed effective and fast than the existing method. method.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.