• Title/Summary/Keyword: time-window

Search Result 1,449, Processing Time 0.03 seconds

Use of Anti-TNF Alpha Blockers Can Reduce Operation Rate and Lead to Growth Gain in Pediatric Crohn's Disease

  • Woo, Min Hyung;Cho, Young Hoon;Sohn, Min Ji;Lee, Eun Joo;Kim, Ju Whi;Moon, Jin Soo;Ko, Jae Sung;Kim, Hyun-young
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.22 no.4
    • /
    • pp.358-368
    • /
    • 2019
  • Purpose: Pediatric Crohn's disease (CD) is directly related to growth and has a high probability of requiring surgical intervention(s); therefore, more active treatment for CD is required for children. This study investigated the impact of biologics on growth and disease course associated with surgery. Methods: This was a retrospective cohort study involving patients diagnosed with CD at the Seoul National University Children's Hospital (Seoul, Korea) between January 2006 and October 2017. The aim was to determine the characteristics of pediatric patients with CD and whether biologics affected growth and the surgical disease course. Results: Among patients who underwent surgery for CD, the mean number of operations per patient was 1.89. The mean time from initial diagnosis to surgery was 19.3 months. The most common procedure was fistulectomy (34%), followed by incision and drainage (25%). In all patients, the use of biologics increased the height (p=0.002) and body mass index (BMI) (p=0.005). Among patients who underwent surgery, height (p=0.004) and BMI (p=0.048) were increased in the group using biologics. Patients who used biologics exhibited a low operation rate only within 2 years after diagnosis, with no differences thereafter (p=0.027). Conclusion: Although biologics could not mitigate the operation rate in pediatric patients who underwent surgery for CD, biological therapy delayed disease progression within 2 years of disease onset. Additionally, biologics conferred growth and BMI benefits in this window period. Therefore, it may be helpful to use biologics for optimal growth in pediatric patients with a high probability of undergoing future surgery.

A Study on Dynamic Code Analysis Method using 2nd Generation PT(Processor Trace) (2세대 PT(Processor Trace)를 이용한 동적 코드분석 방법 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.97-101
    • /
    • 2019
  • If the operating system's core file contains an Intel PT, the debugger can not only check the program state at the time of the crash, but can also reconfigure the control flow that caused the crash. We can also extend the execution trace scope to the entire system to debug kernel panics and other system hangs. The second-generation PT, the WinIPT library, includes an Intel PT driver with additional code to run process and core-specific traces through the IOCTL and registry mechanisms provided by Windows 10 (RS5). In other words, the PT trace information, which was limited access only by the first generation PT, can be executed by process and core by the IOCTL and registry mechanism provided by the operating system in the second generation PT. In this paper, we compare and describe methods for collecting, storing, decoding and detecting malicious codes of data packets in a window environment using 1/2 generation PT.

Mitigating TCP Incast Issue in Cloud Data Centres using Software-Defined Networking (SDN): A Survey

  • Shah, Zawar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5179-5202
    • /
    • 2018
  • Transmission Control Protocol (TCP) is the most widely used protocol in the cloud data centers today. However, cloud data centers using TCP experience many issues as TCP was designed based on the assumption that it would primarily be used in Wide Area Networks (WANs). One of the major issues with TCP in the cloud data centers is the Incast issue. This issue arises because of the many-to-one communication pattern that commonly exists in the modern cloud data centers. In many-to-one communication pattern, multiple senders simultaneously send data to a single receiver. This causes packet loss at the switch buffer which results in TCP throughput collapse that leads to high Flow Completion Time (FCT). Recently, Software-Defined Networking (SDN) has been used by many researchers to mitigate the Incast issue. In this paper, a detailed survey of various SDN based solutions to the Incast issue is carried out. In this survey, various SDN based solutions are classified into four categories i.e. TCP Receive Window based solutions, Tuning TCP Parameters based solutions, Quick Recovery based solutions and Application Layer based solutions. All the solutions are critically evaluated in terms of their principles, advantages, and shortcomings. Another important feature of this survey is to compare various SDN based solutions with respect to different performance metrics e.g. maximum number of concurrent senders supported, calculation of delay at the controller etc. These performance metrics are important for deployment of any SDN based solution in modern cloud data centers. In addition, future research directions are also discussed in this survey that can be explored to design and develop better SDN based solutions to the Incast issue.

An Empirical Analysis of Corporate Performance According to Existence and Types of Venture Capital (벤처캐피탈 투자기업의 성과에 관한 연구: 코스닥 IPO 기업을 중심으로)

  • Lee, Kwang Yong;Shin, Hyun-Han;Kim, So Yeon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.14 no.2
    • /
    • pp.15-30
    • /
    • 2019
  • This study investigates the effects of venture capital investment and corporate venture capital investment on the performance of IPOs listed on KOSDAQ between 2000 and 2014. We classified venture firms with venture capital-backed companies and non-venture capital-backed companies, having the former of which further divided into corporate venture capital-backed companies and independent venture capital-backed companies. The time window of the analysis was set to between 2 years before and 3 years after IPO. Main results of this study reveal that there is little difference between venture capital-backed companies and non-venture capital-backed companies in terms of profitability before and after going public. However, we found out that after IPO venture capital-backed companies display higher ROA than independent venture capital-backed companies or non-venture capital-backed companies, suggesting that corporate venture capital-backed companies might be more advantageous in growing a venture capital ecosystem in Korea.

Cardiac Activation Associated with Non-Periodic Leg Movements in Comparison to Periodic Leg Movements during Sleep in Patients with Restless Legs Syndrome and Healthy Subjects

  • Kim, Min-Jong;Cha, Kwang Su;Kim, Tae-Joon;Jun, Jin-Sun;Jung, Ki-Young
    • Journal of Sleep Medicine
    • /
    • v.15 no.2
    • /
    • pp.68-73
    • /
    • 2018
  • Objectives: Periodic leg movements in sleep (PLMS) are associated with arousals and autonomic activation, which may contribute to higher cardiovascular disease risk in patients with restless legs syndrome (RLS). Non-periodic leg movements in sleep (NPLM) are leg jerks in sleep that does not satisfy standard criteria of PLMS. The aim of this study was to evaluate impact of short-interval leg movements in sleep (SILMS) and isolated leg movements in sleep (ILMS) in comparison to PLMS on heart rate in both patients with RLS and healthy controls. Methods: Seven idiopathic RLS patients and 9 controls were enrolled in this study. Polysomnographic studies were analyzed and leg movements (LM) were automatically detected. NPLM can be classified as SILMS and ILMS. SILMS are LM separated by an inter-movement interval (IMI) shorter than 10 s, and ILMS are LM with IMI longer than 90 s. Frequency and heart rate associated with SILMS, ILMS, and PLMS in RLS patients were compared to those in controls. Heart rate change associated with LM were determined for a fixed time window. Results: Frequencies of SILMS and ILMS of patients with RLS were not significantly different to those of controls. RLS patients presented higher heart rate change associated with SILMS than PLMS before movement onset, while heart rate change associated with SILMS, ILMS, and PLMS were not different in the controls. Conclusions: Although the number of SILMS is not higher than PLMS, SILMS may have closely associated with higher cardiac activation of RLS than PLMS. Therefore, SILMS might be an important treatment target for patients with RLS to reduce long-term cardiovascular risk. Long-term prospective studies are needed to evaluate the relationship between NPLM and cardiovascular disease in patients with RLS.

A Study on the Revision Process of the National Basic Livelihood Security Act Focusing on Customized Benefits (국민기초생활보장법의 개정과정 연구: 맞춤형급여를 중심으로)

  • Nam, Eun-hee;Park, Yun-yung;Kim, Woo-hyun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.631-640
    • /
    • 2021
  • The purpose of this study focuses on and explain the policy-determining factors that emerged in the process of revising customized wages for the National Basic Livelihood Security Act on December 30, 2014. This is an analysis of the reasons why the rapid revision of the welfare system could have been made at a certain time in a situation that did not progress despite the specific demand for revision of the law surrounding the blind spot. To this end, using Kingdon's policy flow model, which emphasizes the contingency of policy decisions, the flow of problems, political flows, and policy alternatives were reviewed respectively. In the course of each of these flows, the suicide incident of mother and 2 daughters in Songpa served as a major medium that played a large role in the policy-making process and the window of policy could be opened. As a result, This incident triggered social and policy interest in the issue of the National Basic Livelihood Security Act. It was found that the law was revised quickly, causing a great wave of waves as a social issue.

A Study on the Investment Review of Passive and Active Elements through Comparison of Energy Demand and Generation Variation of Zero Energy Building (제로에너지건축물의 에너지 소요량과 생산량 비교를 통한 패시브와 액티브 요소의 투자 검토 연구)

  • Lee, Soon-Myung;Lee, Tae-Kyu;Kim, Jeong-Uk
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.11
    • /
    • pp.13-22
    • /
    • 2018
  • At the time when zero energy building is expected to be generalized, this study examines whether the investment in the passive element or the active element is more effective in terms of energy in the construction process of zero energy building. In other words, the effect of energy demand by passive element and the change of energy generation by active element are examined in terms of the same investment cost. The purpose of this study is to examine the change of energy demand by passive element and the change of energy generation by active element in zero energy building and to make reasonable investment decision by comparing energy with cost aspect. For this purpose, we selected the buildings to be subjected to energy simulation and derive the required energy amount and energy generation amount by using meteorological data of four regions in Korea. The change of energy demand and energy generation according to the change of application condition was derived. In order to compare and analyze the changes in energy demand and generation at the same cost standard through price survey and quotation of window and photovoltaic power generation equipment.

Design and Theoretical Analysis of a Stepwise Intrusion Prevention Scheme (단계적 비정상 트래픽 대응 기법 설계 및 이론적 분석)

  • Ko Kwangsun;Kang Yong-hyeog;Eom Young Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.55-63
    • /
    • 2006
  • Recently, there is much abnormal traffic driven by several worms, such as Nimda, Code Red, SQL Stammer, and so on, making badly severe damage to networks. Meanwhile, diverse prevention schemes for defeating abnormal traffic have been studied in the academic and commercial worlds. In this paper, we present the structure of a stepwise intrusion prevention system that is designed with the feature of putting limitation on the network bandwidth of each network traffic and dropping abnormal traffic, and then compare the proposed scheme with a pre-existing scheme, which is a True/False based an anomaly prevention scheme for several worm-patterns. There are two criteria for comparison of the schemes, which are Normal Traffic Rate (NTR) and False Positive Rate (FPR). Assuming that the abnormal traffic rate of a specific network is $\beta$ during a predefined time window, it is known that the average NTR of our stepwise intrusion prevention scheme increases by the factor of (1+$\beta$)/2 than that of True/False based anomaly prevention scheme and the average FPR of our scheme decrease by the factor of (1+$\beta$)/2.

Bidirectional LSTM based light-weighted malware detection model using Windows PE format binary data (윈도우 PE 포맷 바이너리 데이터를 활용한 Bidirectional LSTM 기반 경량 악성코드 탐지모델)

  • PARK, Kwang-Yun;LEE, Soo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.87-93
    • /
    • 2022
  • Since 99% of PCs operating in the defense domain use the Windows operating system, detection and response of Window-based malware is very important to keep the defense cyberspace safe. This paper proposes a model capable of detecting malware in a Windows PE (Portable Executable) format. The detection model was designed with an emphasis on rapid update of the training model to efficiently cope with rapidly increasing malware rather than the detection accuracy. Therefore, in order to improve the training speed, the detection model was designed based on a Bidirectional LSTM (Long Short Term Memory) network that can detect malware with minimal sequence data without complicated pre-processing. The experiment was conducted using the EMBER2018 dataset, As a result of training the model with feature sets consisting of three type of sequence data(Byte-Entropy Histogram, Byte Histogram, and String Distribution), accuracy of 90.79% was achieved. Meanwhile, it was confirmed that the training time was shortened to 1/4 compared to the existing detection model, enabling rapid update of the detection model to respond to new types of malware on the surge.

Real-time System Identification of Aircraft in Upset Condition Using Adaptive-order Zonotopic Kalman Filter (적응 차수 조노토픽 칼만 필터를 활용한 비정상 비행상태 항공기의 실시간 시스템 식별)

  • Gim, Seongmin;Harno, Hendra G.;Saderla, Subrahmanyam;Kim, Yoonsoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.2
    • /
    • pp.93-101
    • /
    • 2022
  • It is essential to prevent LoC(Loss-of-Control) or upset situations caused by stall, icing or sensor malfunction in aircraft, because it may lead to the crash of the aircraft. With this regard, it is crucial to correctly identify the dynamic characteristics of aircraft in such upset conditions. In this paper, we present a SID(System IDentification) method utilizing the moving-window based least-square and the adaptive-order ZKF(Zonotopic Kalman Filter), which is more effective than the existing Kalman-filter based SID for the aircraft in upset condition at a high angle of attack with temporary sensor malfunction. The proposed method is then tested on real flight data and compared with the existing one.