• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.033 seconds

Effectiveness of Soft Stimulation Protocol, Compared with Conventional GnRH Antagonist Multiple dose Protocol in Patients Undergoing Controlled Ovarian Stimulation with Intrauterine Insemination (과배란유도하 자궁강내 인공수정시술을 받는 환자에서 연성자극요법과 성선자극호르몬 길항제 다회투여법의 효과 비교)

  • Kim, Chung-Hoon;Kang, Hyuk-Jae;Kim, So-Ra;Jeon, Gyun-Ho;Lee, Hyang-Ah;Kim, Sung-Hoon;Chae, Hee-Dong;Kang, Byung-Moon
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.37 no.2
    • /
    • pp.135-142
    • /
    • 2010
  • Objective: To evaluate the effectiveness of soft stimulation protocol using GnRH antagonist/clomiphene citrate (CC)/recombinant FSH (rFSH) in patients undergoing controlled ovarian stimulation (COS) with intrauterine insemination (IUI), compared with GnRH antagonist multiple dose protocol (MDP) using GnRH antagonist/rFSH. Methods: Eighty infertile women were randomized to soft stimulation protocol group (n=40) or GnRH antagonist MDP group (n=40). In both groups, IUI was performed 36~40 hours after hCG injection. Statistical analysis was performed using Student's t-test, $\chi^2$ test or Fisher's exact test as appropriate. Results: Total dose and days of rFSH required for COS were significantly fewer in soft stimulation protocol group (p<0.001, p<0.001). A premature LH surge did not occur in any patients of both groups. Clinical pregnancy rate per cycle was similar between the two groups. Conclusion: Soft stimulation protocol provides comparable pregnancy rates to GnRH antagonist MDP despite fewer total dose and days of rFSH, and so can become one of the patient-friendly, cost-effective alternatives for infertile patients undergoing COS with IUI.

Future Education Skills Needs Analysis through Patent Analysis in the field of Information Security (특허분석을 통한 정보보안 부문 미래교육 수요분석)

  • Hwang, Gyuhee;Rim, Myung-Hwan;Song, Kyungseok;Lee, Jung Mann
    • Korean Management Science Review
    • /
    • v.31 no.4
    • /
    • pp.1-13
    • /
    • 2014
  • This study aims to expand the future study methodology and to develop a methodology of future-oriented curriculum analysis with future skills needs derived from patent analysis. With the case of information security, the methodology is applied to the 16 universities, which have information security department in undergraduate course. From the results, the followings are suggested : 1) for the increasing importance area including hacking, infiltration and PC security, a practical exercise should be emphasized; 2) for the convergence area including security policy, security legislation and OS security, proper faculties should be filed with recruiting field-based experts; 3) for the increasing importance area including professional area including security audit and information security protocol, the advanced curriculum related to graduate level should be provided.

Implementation of Analysis Tool and Design of Event Recorder in Express Railway (고속열차용 Event Recorder 설계와 분석도구의 구현)

  • Kim, Kwang-Ryul;Jang, Dong-Wook;Han, Kwang-Rok;Sohn, Surg-Won;Ryu, Hee-Mon;Song, Gyu-Youn
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1159-1160
    • /
    • 2008
  • For safety railway vehicle movement, analysis and recoding of railway vehicle speed and driving information has written by law. nowadays, base in europe, these system is spread of various advanced country. In this paper, We implement an event recorder which record the driving and breaking information of running railway vehicle. For the event recorder, We designed the data structures with data analysis tools and a protocol between Event recorder and data analysis tool. The verification of Analysis tool was tested by to made data by Event Recorder's emulator and information of real railway driving recording.

  • PDF

Statistical Analysis of the Performance Reliability Data for Stroke Patients (뇌졸중 환자 운동신뢰성 측정치의 통계적 분석)

  • Byun, Jae-Hyun;Lee, Seung-Mi
    • Journal of Applied Reliability
    • /
    • v.16 no.1
    • /
    • pp.64-70
    • /
    • 2016
  • Purpose: The purpose of this study was to evaluate performance reliability of stroke patients using kinematic analysis. Methods: A protocol to evaluate performance reliability was performed for three tasks on 20 stroke patients and 10 normal people. The tasks include hand to head (HH) task, hand to mouth (HM) task, and hand to target (HT) task. Results: The affected arms showed smaller joint angle, slower peak velocity, longer time to peak velocity for task performances than control group. Also, slower peak velocity and longer movement time for task performance in unaffected arm of stroke patients were obtained compared with the control group. Conclusion: Kinematic analysis is very useful quantitative tool to provide understanding on upper extremity function of stroke patients.

Comparison of One-day and Two-day Protocol of $^{11}C$-Acetate and $^{18}F$-FDG Scan in Hepatoma (간암환자에 있어서 $^{11}C$-Acetate와 $^{18}F$-FDG PET/CT 검사의 당일 검사법과 양일 검사법의 비교)

  • Kang, Sin-Chang;Park, Hoon-Hee;Kim, Jung-Yul;Lim, Han-Sang;Kim, Jae-Sam;Lee, Chang-Ho
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.2
    • /
    • pp.3-8
    • /
    • 2010
  • Purpose: $^{11}C$-Acetate PET/CT is useful in detecting lesions that are related to livers in the human body and leads to a sensitivity of 87.3%. On the other hand, $^{18}F$-FDG PET/CT has a sensitivity of 47.3% and it has been reported that if both $^{18}F$-FDG and $^{11}C$-Acetate PET/CT are carried out together, their cumulative sensitivity is around 100%. However, the normal intake of the pancreas and the spleen in $^{11}C$-Acetate PET/CT can influence the $^{18}F$-FDG PET/CT leading to an inaccurate diagnosis. This research was aimed at the verification of the usefulness of how much influence these two radioactive medical supplies can cause on the medical images through comparative analysis between the one-day and two-day protocol. Materials and Methods: This research was carried out based on 46 patients who were diagnosed with liver cancer and have gone through the PET/CT (35 male, 11 female participants, average age: $54{\pm}10.6$ years, age range: 29-69 years). The equipment used for this test was the Biograph TruePoint40 PET/CT (Siemens Medical Systems, USA) and 21 participants who went through the one-day protocol test were first given the $^{11}C$-Acetate PET/CT and the $^{18}F$-FDG PET/CT, the latter exactly after one hour. The other 25 participants who went through the two-day protocol test were given the $^{11}C$-Acetate PET/CT on the first day and the $^{18}F$-FDG PET/CT on the next day. These two groups were then graded comparatively by assigning identical areas of interest of the pancreas and the spleen in the $^{18}F$-FDG images and by measuring the Standard Uptake Value (SUV). SPSS Ver.17 (SPSS Inc., USA) was used for statistical analysis, where statistical significance was found through the unpaired t-test. Results: After analyzing the participants' medical images from each of the two different protocol types, the average${\pm}$standard deviation of the SUV of the pancreas carried out under the two-day protocol were as follows: head $1.62{\pm}0.32$ g/mL, body $1.57{\pm}0.37$ g/mL, tail $1.49{\pm}0.33$ g/mL and the spleen $1.53{\pm}0.28$ g/mL. Whereas, the results for participants carried out under the one-day protocol were as follows: head $1.65{\pm}0.35$ g/mL, body $1.58{\pm}0.27$ g/mL, tail $1.49{\pm}0.28$ g/mL and the spleen $1.66{\pm}0.29$ g/mL. Conclusion: It was found that no statistical significant difference existed between the one-day and two-day protocol SUV in the pancreas and the spleen (p<0.05), and nothing which could be misconceived as false positive were found from the PET/CT medical image analysis. From this research, it was also found that no overestimation of the SUV occurred from the influence of $^{11}C$-Acetate on the $^{18}F$-FDG medical images where those two tests were carried out for one day. This result was supported by the statistical significance of the SUV of measurement. If $^{11}C$-Acetate becomes commercialized in the future, the diagnostic ability of liver diseases can be improved by $^{18}F$-FDG and one-day protocol. It is from this result where tests can be accomplished in one day without the interference phenomenon of the two radioactive medical supplies and furthermore, could reduce the waiting time improving customer satisfaction.

  • PDF

Performance Analysis of Ad hoc Networks on Real world Test-bed for High Speed Video Streaming (고속 영상 데이터 전송을 위한 애드혹 네트워크의 테스트베드 기반 성능 분석)

  • Ahmed, Md Shohel;Yoon, Seokhoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.141-150
    • /
    • 2013
  • Simulation is an important technique to test and verify routing protocol correctness. However, simulation does not guarantee that the protocol works expectedly on a real world environment because it needs to rely on assumptions and simplified properties such as radio characteristics and effects of geographical constraints that may not reflect the real world networking environments. Therefore, a real world experiments are necessary to gain a practical insight into the actual performance of ad hoc networks. In this paper, we build a test-bed to evaluate multi-hop ad hoc networks for high speed video streaming inside a building using AODV-UU routing protocol. Our observation indicates that the considered ad hoc network can provide a sufficient performance for a low rate streaming data in terms of throughput, PDR (Packet delivery ratio) and the average delay.

Reliable Mobility Management Using CoAP in Internet of Things Environments (사물 인터넷 환경에서 CoAP 기반의 신뢰성 있는 이동성 관리 방법)

  • Chun, Seung Man;Kim, Hyun Su;Ham, Chang Gyun;Chung, Yun Seok;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.13-18
    • /
    • 2016
  • In Internet of Things (IoT) environment, a variety of smart devices are connected to Internet through various network technologies such as 4G/5G, WiBro, Bluetooth, etc. in order to provide the remote monitoring service such as smart healthcare service, etc. Most standard mobility management protocols based on IETF Mobile IP may not be suitable for Internet of Things (IoT) environments due to constrained power, constrained CPU processing and memory capacity, and large signalling overhead which are inherently accompanied by various devices in IoT environments. In this article, we propose a new mobility management protocol CoMP (CoAP-based Mobility Managemenbt Protocol) for reliable mobility management in IoT environments. The architecture and algorithm to achieve both reliability and simplicity for IoT mobility management are proposed. Finally, performance has been evaluated by both mathematical analysis and simulation.

Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application (IPv6 기반의 모바일용 가상 저장장치 드라이버 구현 및 응용)

  • Lim, Hyo-Taek;Choi, Sae-Bom;Singh, Vinay;Cha, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.1
    • /
    • pp.74-82
    • /
    • 2007
  • IPv6 is the internet protocol for next generation which can solve the problem of IPv4 protocol. Mobile IPv6 efficiently provides the mobility for mobile devices holding the properties of IPv6. iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard Ethernet switch and router for this kind of access, it can not only be applized to Ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the IPv6 iSCSI initiator driver which was originally designed for wired networks. Also, this paper describes about the implementation and performance analysis of mobile education service system using virtual storage devices in IPv6 wireless networks.

  • PDF

Implementation of WAP Gateway Agents for Wireless Communication Efficiency Improvement (무선통신 효율 향상을 위한 WAP 게이트웨이 에이전트)

  • Park, Kee-Hyun;Kang, Dong-Woo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.45-54
    • /
    • 2005
  • Recently, researches on various base technologies for wireless Internet services have been conducted. In the WAP (Wireless Application Protocol) Forum, a WAP gateway which does mutual conversion between existent wired Internet protocols and WAP protocols was proposed. In this paper, CSA(Client Side Agent) and SSA(Server Side Agent) for WAP gateway environments are designed and implemented, as a way of improving communication efficiency in such restrictive environments as wireless communications. Located on mobile WAP devices(CSA) and a WAP Gateway(SSA), the agents perform communication efficiency improvement activities such as a packet header reduction mechanism and a data reduction mechanism using data differencing analysis in order to reduce the size of data transmission in wireless communication environments. The Internet phone emulator of Phone.com is used in order to make sure that the implemented agents work correctly, Experimental results show that the implemented agents reduce the size of data transmission significantly.

  • PDF

Design and Implementation of a Location Privacy System supporting Privacy Self Controls (프라이버시 자기제어를 지원하는 위치정보 프라이버시 시스템의 설계 및 구현)

  • Lee, Eung-Jae;Ju, Yong-Wan;Nam, Kwang-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.853-862
    • /
    • 2010
  • As the mobile device and broadband wireless internet such as WiBro, HSDPA is widely spreading, various types of advertisement and services based on personal location information can be provided. However, with convenience supported by these services, it is possible to be increased an invasion of privacy such as personal location and moving pattern. In this paper, we analysis an essential element for protection of privacy related on location information in mobile environment and propose location privacy protocol for managing location privacy self-control. And we design and implementation prototype of location privacy self-control system which is able to manage user's location privacy condition oneself using the proposed location privacy protocol.