• Title/Summary/Keyword: time-reuse

Search Result 540, Processing Time 0.032 seconds

A Cross-Sectional Satisfaction Survey of 845 Traffic Accident Patients Treated with Korean Medicine

  • Kim, No H.;Lee, Yoon J.;Suh, Chang Y.;Lee, Gi B.;Yang, Kyu J.;Kim, Tae-Gyu;Gi, Yu-Mi;Kwon, Mijung;Ha, In-Hyuk
    • Journal of Acupuncture Research
    • /
    • v.35 no.2
    • /
    • pp.69-74
    • /
    • 2018
  • Background: We conducted a cross-sectional study to analyze the pain characteristics and satisfaction scores in traffic accident (TA) patients seeking Korean medicine treatment. Methods: A survey was conducted in 845 outpatients who visited 10 Korean medicine institutions due to TA-associated symptoms from February 25th, 2016 to March 9th, 2016. The questionnaire included information about patient sociodemographic characteristics, accident circumstance details, pain levels, treatment methods, satisfaction and pre-existing musculoskeletal disorders. All statistical analyses were performed using STATA 14.0. Results: A total 754 of the 845 respondents had experienced acute pain of onset within 1-2 days. Pain in the neck or low back was most common, and low back pain (LBP) was more prevalent in pedestrian-vehicle accident cases. Patients showed highest satisfaction with pharmacopuncture treatment, followed by acupuncture and Chuna manual therapy. Although treatments were not completed at the time of the survey, the majority of patients were satisfied with the Korean medicine treatments they received and indicated their intent to reuse this treatment in the future. The degree of pain reduction after treatment was a factor that influenced patient satisfaction with and intention to reuse Korean medicine. Conclusion: This study determined the characteristics and status of TA patients using Korean medicine and suggests the need for further more inclusive studies.

An Efficient Data-reuse Deblocking Filter Algorithm for H.264/AVC (H.264/AVC 비디오 코덱을 위한 효율적인 자료 재사용 디블록킹 필터 알고리즘)

  • Lee, Hyoung-Pyo;Lee, Yong-Surk
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.30-35
    • /
    • 2007
  • H.264/AVC provides better quality than other algorithms by using a deblocking filter to remove blocking distortion on block boundary of the decoded picture. However, this filtering process includes lots of memory accesses, which cause delay of overall decoding time. In this paper, we propose a data-reuse algorithm to speed up the process for the deblocking filter. To reuse the data, a new filtering order is suggested. By using this order, we reduce the memory access and accelerate the deblocking filter. The modeling of proposed algorithm is compiled under ARM ADS1.2 and simulated with Armulator. The results of the experiment compared with H.264/AVC standard are achieved on average 58.45% and 57.93% performance improvements at execution cycles and memory access cycles, respectively.

A Study on the Standardization of System Support Software in the Combat Management System

  • Heo, Young-Dong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.147-155
    • /
    • 2020
  • System support software is one of the software that makes up ship combat management system and has the characteristics of being mounted in the combat management systems of all ships but with little functional change. However, despite these characteristics, software modifications due to equipment, etc. are inevitable in the application of new ships. Modification of software causes software reliability testing which is a key factor in increasing development costs. In this paper, the structure of the existing system support software was analyzed to identify and supplement the code change factors, and the system support standardization architecture was designed. The feature model elicited common and variable elements of system support software, and applied white-box reuse to improve software design. In addition, the results of comparing existing system support software with the new architecture in terms of development elements and time to perform reliability test were presented to verify the effectiveness of the new one.

A study on elderly people's satisfaction level with oral exercise program (입 체조 프로그램에 참가한 노인의 만족도에 관한 조사연구)

  • Hwang, Yoon-Sook;Cho, Eun-Pyol
    • Journal of Korean society of Dental Hygiene
    • /
    • v.9 no.4
    • /
    • pp.795-807
    • /
    • 2009
  • Objectives : This study was to examine the satisfaction level of participants in a oral exercise program geared toward the improvement of oral function, their reuse intention of the program and their willingness of recommendation in an effort to facilitate the advancement of the program. Methods : The subjects in this study were 85 senior citizens who used senior welfare centers and nursing homes in Seoul. A oral exercise program was implemented 24 times from April to June 2009, twice a week, and the selected elderly people participated in the program 20 times or more. An interview survey was conducted by two trained dental hygienists, and the collected data were analyzed. Results : 1. As for satisfaction level with each part of the program, the elderly people investigated expressed the best satisfaction with the service supplier(a mean of 3.81), followed by the usefulness of the procedure of the program(3.77) and oral exercise(3.64). 2. The satisfaction level with oral exercise had a significant impact on their overall satisfaction with the program, reuse intention and willingness of recommendation, and the entire satisfaction level with the program was correlated to reuse intention and willingness of recommendation(p<0.001). 3. Out of the demographic characteristics, marital status and whether to live with their families or not made a significant difference to their satisfaction level with oral exercise(p<0.05). Conclusions : It took 20 minutes to get oral exercise, which consisted of warming-up, exercise for each part of oral and cooking-down, and they found it appropriate to spend that time and had no difficulties in repeating after the instructor.

  • PDF

A comparative study on defluoridation capabilities of biosorbents: Isotherm, kinetics, thermodynamics, cost estimation and regeneration study

  • Yihunu, Endashaw Workie;Yu, Haiyan;Junhe, Wen;Kai, Zhang;Teffera, Zebene Lakew;Weldegebrial, Brhane;Limin, Ma
    • Environmental Engineering Research
    • /
    • v.25 no.3
    • /
    • pp.384-392
    • /
    • 2020
  • The presence of high fluoride concentration (> 1.5 mg/L) in water causes serious health problems such as fluorosis, infertility, brain damage, etc., which are endemic to many places in the world. This study has investigated the fluoride removal capacity of the novel activated biochar (BTS) and hydrochar (HTS) using Teff (Eragrostis tef) straw as a precursor. Activated biochar with mesoporous structures and large specific surface area of 627.7 ㎡/g were prepared via pyrolysis process. Low-cost carbonaceous hydrochar were also synthesized by an acid assisted hydrothermal carbonization process. Results obtained from both adsorbents show that the best local maximum fluoride removal was achieved at pH 2, contact time 120 min and agitation speed 200 rpm. The thermodynamic studies proved that the adsorption process was spontaneous and exothermic in nature. Both adsorbents equilibrium data fitted to Langmuir isotherm. However, Freundlich isotherm fitted best for BTS. The maximum fluoride loading capacity of BTS and HTS was found to be 212 and 88.7 mg/g, respectively. The variation could primarily be attributed to a relatively larger Surface area for BTS. Hence, to treat fluoride contaminated water, BTS can be promising as an effective adsorbent.

Power Saving Algorithm based on Data Reuse in Tree Structured Wireless Sensor Networks (트리 구조 무선 센서 네트워크에서의 데이터 재사용 기반의 전력 절감 기법)

  • Lee, Sang-Hyun;Yoo, Myung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7B
    • /
    • pp.649-658
    • /
    • 2009
  • Due to limited size and limited battery lifetime of sensor node, one has to address the power saving issue in wireless sensor network. The existing power saving algorithm based on data reuse was proposed for the cluster structured wireless sensor network. We state the problem of existing power saving algorithm and propose new power saving algorithm for tree structured wireless sensor network. The proposed algorithm reduces power consumption by buffering the sensed data at the selected relay node for its data lifetime. The optimum buffering node is selected so that the power saving gain is maximized and at the same time, power consumption among sensor nodes are equally distributed in the network. With computer simulations, it is shown that the proposed algorithm outperforms the conventional algorithm in terms of power saving gain.

Software Architecture Recovery for Android Application Reuse (안드로이드 어플리케이션의 재사용을 위한 소프트웨어 아키텍처 생성)

  • Park, Jin-Soo;Kwon, Jang-Jin;Hong, Jang-Eui;Choi, Min
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.9-17
    • /
    • 2013
  • Android applications market has increased rapidly due to the popularity of smart phones. In order to high competitiveness in the application market should be high productivity, reduce cost. And short development cycle is required because of increased the android applications demand. Owing to develop applications in short time, the requirements analysis, design process are able to omitted. But in the case of reuse application at development phase, involved many problems because omit document or design. so target of this paper is android application source code that omit document or design. we propose architecture recovery techniques from android application source code by reverse engineering with identify functions are reused. We expect that increase productivity and reduce development cost, smooth maintain by proposed technique.

  • PDF

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

Ephemeral Key Reuse Attack of the SABER Algorithm by Meta-PKE Structure (Meta-PKE 구조에 의한 SABER 알고리즘의 임시 키 재사용 공격)

  • Lee, Changwon;Jeon, Chanho;Kim, Suhri;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.765-777
    • /
    • 2022
  • The SABER algorithm, a PKE/KEM algorithm presented in NIST PQC Standardization Round 3, is an algorithm based on the Module-LWR problem among lattice-based problems and has a Meta-PKE structure. At this time, the secret information used in the encryption process is called a ephemeral key, and in this paper, the ephemeral key reuse attack using the Meta-PKE structure is described. For each parameter satisfying the security strengths required by NIST, we present a detailed analysis of the previous studies attacked using 4, 6, and 6 queries, and improve them, using only 3, 4, and 4 queries. In addition, we introduce how to reduce the computational complexity of recovering ephemeral keys with a single query from the brute-force complexity on the n-dimension lattice, 27.91×n, 210.51×n, 212.22×n to 24.91×n, 26.5×n, 26.22×n, for each parameter, and present the results and limitations.

Identifying unsafe habits of construction workers based on real-time location

  • Li, Heng;Chan, Greg
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.10-14
    • /
    • 2015
  • Unsafe behavior is one of the major causes of construction accidents. Managing the behavior of workers in real-time is difficult and requires huge manpower. In this paper, a new real-time locating framework is proposed to improve safety management by collecting and analyzing data describing the behavior of workers to identify habits that may lead to accidents. The aim of the study is to identify working habits of workers based on their location history. Location data is used to compare with that of other workers and equipment. The results indicate that the reuse of real-time location data can provide extra safety information for safety management and that the proposed system has the potential to prevent struck-by accidents and caught-in between accidents by predicting unwanted interaction between workers and equipment. This adds to current research aimed at automating construction safety to the point where the continuous monitoring, managing and protection of site workers on site is possible.

  • PDF