• Title/Summary/Keyword: statement

Search Result 1,564, Processing Time 0.024 seconds

Herbal medicine prescription analyses of bronchiectasis patients with claim data during 5 years (2013~2017) (최근 5개년 (2013~2017)간 기관지확장증(J47) 환자에게 처방한 급여한약제제 현황 분석 - 건강보험청구자료 중심으로)

  • Kang, Sohyeon;Kim, Jinhee;Jang, Soobin;Lee, Mee-Young;Lee, Ju Ah;Park, Sunju
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.23 no.3
    • /
    • pp.1-12
    • /
    • 2019
  • Objectives : Korean national health insurance data is a useful real-world data representing whole medical bills submitted to Health Insurance Review Agency. This study aims to understand recent benefit trend of insurance herbal preparations for treating bronchiectasis(disease code J47) utilizing insurance data. Methods : We reviewed national health insurance claims data from 2013 to 2017 which have main diagnosis or sub diagnosis code of J47 and with the record of prescribing insurance herbal medication. Frequency analysis was performed to analyze the most frequently prescribed prescription. Results & Conclusions : Both the number of claims statement(770 to 1,746cases) and patients(266 to 484) of insurance herbal preparations increased considerably from 2013 to 2017. Top 10 preparations based on the number of claims statement were 'Samso-eum', 'Yeonkyopaedok-san', 'Socheongryong-tang', 'Bojungikgi-tang', 'Hyangsapyungwi-san', 'Yijin-tang', 'Saengmaek-san', 'Jaeumganghwa-tang', 'Ojeok-san' and 'Gungha-tang'. Top 10 preparations based on the number of patients were 'Samso-eum', 'Socheongryong-Tang', 'Saengmaek-san', 'Yeonkyopaedok-san', 'Haengso-tang', 'Hyangsapyungwi-san', Yijin-tang', 'Jaeumganghwa-tang', 'Bojungikgi-tang' and 'Hyeonggaeyeongyo-tang' in respectiv order. Claims of top 10 frequent preparations occupied more than 60% of total claims. We hope this finding to be utilized as basic data for future research of evidence-based bronchiectasis treatment utilizing Korean traditional medicine.

A Case Analysis of Intentional Car Explosion (고의에 의한 승용차폭발 사례의 분석)

  • Lee, Eui-Pyeong
    • Fire Science and Engineering
    • /
    • v.31 no.4
    • /
    • pp.119-127
    • /
    • 2017
  • This study analyzed the cause of car explosion that occurred in the riverside park. The car carrying a male driver and a female passenger was parked in the park and explosion occurred inside the car. After the explosion, the driver and the passenger got burned. When they went to the hospital by the 119 Rescue Service, they stated that the car was sprayed with thinner before they had a quarrel and the explosion occurred during their quarrel. However, after several days, they changed their statement. They said that gasoline in the plastic bottle was poured and ran into the cigarette lighter. They tried to pull the cigarette lighter but pushed it by mistake. Then explosion occurred. Because only the explosion by mistake could receive car insurance, whether the cause of explosion was intentional or not became an issue. The car exploded was carefully investigated and analyzed. The statement of the driver and passenger was analyzed in the aspect of fire science. As a result, it was demonstrated that this car explosion occurred by driver's intention.

A Study on Keijo Imperial University's Landscaping Characteristics and Construction Process in the Period of Japanese Occupation (일제강점기 경성제국대학 정원 특성과 시행과정 고찰)

  • Kim, Hai-Gyoung;Yu, Joo-Eun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.30 no.3
    • /
    • pp.1-11
    • /
    • 2012
  • This study examines the implementation process of landscaping projects in Japanese colonial era focusing on landscaping of Keijo Imperial University and draws conclusions as follows. First, landscaping of Keijo Imperial University in Japanese colonial era progressed based on Hoegyebeop and it provides important materials including the floor plan of the garden, detailed statement and other documents required for the construction. Second, it was all Japanese enterprises that took part in landscaping of Keijo Imperial University and the construction progressed under a private contract by lowest-price contract-awarding system after five enterprises' submitting estimates. Third, according to the floor plan for the landscaping, the garden had a shape of a quadrant and its boundaries were utilized as side gutters and connected to a drainage system. Fourth, though the floor plan doesn't clarify specific names of trees, detailed statement shows sorts of trees of the time. Trees of Chosun were plentifully introduced due to regional features and pines were the most expensive one when they were voluminous. This study has significance that it conducts an empirical research on main materials and techniques of landscaping projects in Japanese colonial era.

Design of Iterative Divider in GF(2163) Based on Improved Binary Extended GCD Algorithm (개선된 이진 확장 GCD 알고리듬 기반 GF(2163)상에서 Iterative 나눗셈기 설계)

  • Kang, Min-Sup;Jeon, Byong-Chan
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.145-152
    • /
    • 2010
  • In this paper, we first propose a fast division algorithm in GF($2^{163}$) using standard basis representation, and then it is mapped into divider for GF($2^{163}$) with iterative hardware structure. The proposed algorithm is based on the binary ExtendedGCD algorithm, and the arithmetic operations for modular reduction are performed within only one "while-statement" unlike conventional approach which uses two "while-statement". In this paper, we use reduction polynomial $f(x)=x^{163}+x^7+x^6+x^3+1$ that is recommended in SEC2(Standards for Efficient Cryptography) using standard basis representation, where degree m = 163. We also have implemented the proposed iterative architecture in FPGA using Verilog HDL, and it operates at a clock frequency of 85 MHz on Xilinx-VirtexII XC2V8000 FPGA device. From implementation results, we will show that computation speed of the proposed scheme is significantly improved than the existing two approaches.

Building Linked Big Data for Stroke in Korea: Linkage of Stroke Registry and National Health Insurance Claims Data

  • Kim, Tae Jung;Lee, Ji Sung;Kim, Ji-Woo;Oh, Mi Sun;Mo, Heejung;Lee, Chan-Hyuk;Jeong, Han-Young;Jung, Keun-Hwa;Lim, Jae-Sung;Ko, Sang-Bae;Yu, Kyung-Ho;Lee, Byung-Chul;Yoon, Byung-Woo
    • Journal of Korean Medical Science
    • /
    • v.33 no.53
    • /
    • pp.343.1-343.8
    • /
    • 2018
  • Background: Linkage of public healthcare data is useful in stroke research because patients may visit different sectors of the health system before, during, and after stroke. Therefore, we aimed to establish high-quality big data on stroke in Korea by linking acute stroke registry and national health claim databases. Methods: Acute stroke patients (n = 65,311) with claim data suitable for linkage were included in the Clinical Research Center for Stroke (CRCS) registry during 2006-2014. We linked the CRCS registry with national health claim databases in the Health Insurance Review and Assessment Service (HIRA). Linkage was performed using 6 common variables: birth date, gender, provider identification, receiving year and number, and statement serial number in the benefit claim statement. For matched records, linkage accuracy was evaluated using differences between hospital visiting date in the CRCS registry and the commencement date for health insurance care in HIRA. Results: Of 65,311 CRCS cases, 64,634 were matched to HIRA cases (match rate, 99.0%). The proportion of true matches was 94.4% (n = 61,017) in the matched data. Among true matches (mean age 66.4 years; men 58.4%), the median National Institutes of Health Stroke Scale score was 3 (interquartile range 1-7). When comparing baseline characteristics between true matches and false matches, no substantial difference was observed for any variable. Conclusion: We could establish big data on stroke by linking CRCS registry and HIRA records, using claims data without personal identifiers. We plan to conduct national stroke research and improve stroke care using the linked big database.

Improving development environment for embedded software (내장 소프트웨어를 위한 개발 환경의 개선)

  • AHN, ILSOO
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • RFID systems have been widely used in various fields such as logistics, distribution, food, security, traffic and others. A RFID middleware, one of the key components of the RFID system, perform an important role in many functions such as filtering, grouping, reporting tag data according to given user specifications and so on. However, manual test data generation is very hard because the inputs of the RFID middleware are generated according to the RFID middleware standards and complex encoding rules. To solve this problem, in this paper, we propose a black box test technique based on RFID middleware standards. Firstly, we define ten types of input conversion rules to generate new test data from existing test data based on the standard specifications. And then, using these input conversion rules, we generate various additional test data automatically. To validate the effectiveness of generated test data, we measure coverage of generated test data on actual RFID middleware. The results show that our test data achieve 78% statement coverage and 58% branch coverage in the classes of filtering and grouping, 79% statement coverage and 64% branch coverage in the classes of reporting.

  • PDF

A Comparative Study on Strategic Plans of National Libraries (국가도서관의 전략적 계획 비교연구)

  • Lee, Yong-Jae
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.71-76
    • /
    • 2018
  • The purpose of this study is to suggest ways to improve development plan of the National Library of Korea, comparing development plan of the Library and strategic plans of national libraries in western countries, China and Japan. For this purpose, plans of national libraries in Korea and Overseas were collected and analyzed. And a rubric evaluation was applied to the case plans. The findings indicate that plan of the National Library of Korea is written for analyzing present problems, setting practical activity-centered detailed plans. On the other hand, plans of national libraries overseas present distinct mission and vision statement, and set up goals, objectives, concrete activities in the framework, which function as milestones for developing libraries. As a conclusion, this study suggests that the National Library of Korea need mission and vision statement, links among mission, vision, goals, objectives, activities, and ongoing library marketing. This study can contribute for the National Library of Korea to develop plan with the concept of strategic plan.

Improvement of EIA Associated with Greenhouse Gases Subject Matter for the Preparedness of Post-2020 (Post-2020에 연계한 온실가스 항목의 환경영향평가 개선 방안)

  • Hong, Sang-Pyo
    • Journal of Environmental Impact Assessment
    • /
    • v.28 no.5
    • /
    • pp.483-491
    • /
    • 2019
  • In orderto cope with the post-2020 in accordance with the Paris Agreement, greenhouse gas (GHG)reduction in Environmental Impact Assessment (EIA) and its contributions to post-2020 were discussed. The 26 Environmental Impact Statement (EIS) administered by Geum-River Basin Environmental Office from 2010 to 2019 were analyzed for reviewing GHG mitigation measures. From the case study, it was found that the assessment of GHG emissions reduction and climate change adaptation were not appropriately performed. In this study, the following measures are proposed to improve the inappropriate assessment of 'GHG subject matter' associated with EIA according to post-2020, 1) allotment of enforced charge on GHG emission during the EIA process, 2) addition of the 'GHG subject matter' in 'establishing permissible discharge standards' which is based on "Act on the Integrated Control of Pollutant-discharging Facilities", and 3) the participation of stakeholders in early EIA stage for governance. Also the details on the EIA for the preparedness of post-2020 were discussed here.

A Security Policy Statements Generation Method for Development of Protection Profile (PP 개발을 위한 보안정책 문장 생성방법)

  • 고정호;이강수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.13-28
    • /
    • 2003
  • The Protection Profile(PP) is a common security function and detailed statement of assurance requirements in a specific class of Information Technology security products such as firewall and smart card. The parts of TOE security environment in the PP have to be described about assumption, treat and security policy through analyzing purpose of TOE. In this paper, we present a new security policy derivation among TOE security environment parts in the PP. Our survey guides the organizational security policy statements in CC scheme through collected and analyzed hundred of real policy statements from certified and published real PPs and CC Toolbox/PKB that is included security policy statements for DoD. From the result of the survey, we present a new generic organizational policy statements list and propose a organizational security policy derivation method by using the list.

An Improved Round Reduction Attack on Triple DES Using Fault Injection in Loop Statement (반복문 오류 주입을 이용한 개선된 Triple DES 라운드 축소 공격)

  • Choi, Doo-Sik;Oh, Doo-Hwan;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.709-717
    • /
    • 2012
  • The round reduction on block cipher is a fault injection attack in which an attacker inserts temporary errors in cryptographic devices and extracts a secret key by reducing the number of operational round. In this paper, we proposed an improved round reduction method to retrieve master keys by injecting a fault during operation of loop statement in the Triple DES. Using laser fault injection experiment, we also verified that the proposed attack could be applied to a pure microprocessor ATmega 128 chip in which the Triple DES algorithm was implemented. Compared with previous attack method which is required 9 faulty-correct cipher text pairs and some exhaustive searches, the proposed one could extract three 56-bit secret keys with just 5 faulty cipher texts.