• Title/Summary/Keyword: Closed access

Search Result 179, Processing Time 0.026 seconds

Revitalization of necrotic mature permanent incisors with apical periodontitis: a case report

  • Nagas, Emre;Uyanik, M. Ozgur;Cehreli, Zafer C.
    • Restorative Dentistry and Endodontics
    • /
    • v.43 no.3
    • /
    • pp.31.1-31.7
    • /
    • 2018
  • Despite considerable focus on the regenerative endodontic treatment of immature teeth with necrotic infected pulps and apical periodontitis, little data exist with regard to its possible implementation in necrotic permanent teeth with complete apical and radicular development. The present report describes the procedures and outcome of a regenerative endodontic treatment approach in 2 previously-traumatized incisors with closed apex with apical periodontitis. A 2-visit treatment procedure was employed. At initial visit, the root canals were copiously irrigated, followed by placement of a triple antibiotic paste containing ciprofloxacin, metronidazole, and clindamycin into the root canals. After 4 weeks, the antibiotic paste was removed, and apical bleeding was initiated with size 10 hand files beyond the apices. The root canals were coronally sealed with mineral trioxide aggregate, and the access cavities were restored with bonded resin composite. At post-operative 60 months, both teeth were remained asymptomatic, with the recall radiographs showing complete resolution of apical radiolucency and reestablishment of periradicular tissues. In both teeth, the dimensions of root space remained unchanged as verified by image analysis. The revitalization protocol utilizing root canal disinfection and induced apical bleeding in necrotic, closed-apex incisors may offer a clinically acceptable alternative to conventional root canal treatment.

Secure and Efficient Storage of Video Data in a CCTV Environment

  • Kim, Won-Bin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3238-3257
    • /
    • 2019
  • Closed-circuit television (CCTV) technology continuously captures and stores video streams. Users are typically required by policy to store all the captured video for a certain period. Accordingly, increasing the number of CCTV operation cycles and photographing positions expands the amount of data to be stored. However, expanding the available storage space for video data incurs increased costs. In recent years, this problem has been addressed with cloud storage solutions, which enable multiple users and devices to access and store data simultaneously. However, because of the large amount of data to be stored, a vast storage space is required. Consequently, cloud storage administrators need a way to store data more efficiently. To save storage space, deduplication technology has been proposed to prevent duplicate storage of the same data. However, because cloud storage is hosted on remote servers, data encryption technology must be applied to address data exposure issues. Although deduplication techniques for encrypted data have been studied, there have been various security vulnerabilities. We attempted to solve this problem by addressing various issues such as poison attacks, property forgery, and ownership management while removing the redundant data and handling the data more securely.

Saturated Performance Analysis of IEEE 802.11 DCF with Imperfect Channel Sensing (불완전 채널 감지하의 IEEE 802.11 DCF 포화상태 성능 분석)

  • Shin, Soo-Young;Chae, Seog
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.7-14
    • /
    • 2012
  • In this paper, performance of IEEE 802.11 carrier-sense multiple access with collision-avoidance (CSMA/CA) protocols in saturated traffic conditions is presented taking into account the impact of imperfect channel sensing. The imperfect channel sensing includes both missed-detection and false alarm and their impact on the performance of IEEE 802.11 is analyzed and expressed as a closed form. To include the imperfect channel sensing at the physical layer, we modified the state transition probabilities of well-known two state Markov process model. Simulation results closely match the theoretical expressions confirming the effectiveness of the proposed model. Based on both theoretical and simulated results, the probability of detection is concluded as a dominant factor for the performance of IEEE 802.11.

Performance Analysis of Two-Way Relay NOMA Systems with Hardware Impairments and Channel Estimation Errors

  • Tian, Xinji;Li, Qianqian;Li, Xingwang;Zhang, Hui;Rabie, Khaled;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5370-5393
    • /
    • 2019
  • In this paper, we consider a two-way relay non-orthogonal multiple access (TWR-NOMA) system with residual hardware impairments (RHIs) and channel estimation errors (CEEs), where two group users exchange their information via the decode-and-forward (DF) relay by using NOMA protocol. To evaluate the performance of the considered system, exact analytical expressions for the outage probability of the two groups users are derived in closed-form. Moreover, the asymptotic outage behavior in the high signal-to-noise ratio (SNR) regime is examined and the diversity order is derived and discussed. Numerical simulation results verify the accuracy of theoretical analyses, and show that: i) RHIs and CEEs have a deleterious effects on the outage probabilities; ii) CEEs have significant effects on the performance of the near user; iii) Due to the RHIs, CEEs, inter-group interference and intra-group interference, there exists error floors for the outage probability.

Performance Analysis of Directional CSMA/CA for IEEE 802.15.3c under Saturation Environments

  • Kim, Mee-Joung;Kim, Yong-Sang;Lee, Woo-Yong
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.24-34
    • /
    • 2012
  • In this paper, the directional carrier sense multiple access/collision avoidance (CSMA/CA) protocol in the immediate acknowledgement mode for IEEE 802.15.3c is analyzed under saturation environments. For the analysis, a sensing region and an exclusive region with a directional antenna are computed probabilistically and a Markov chain model in which the features of IEEE 802.15.3c and the effects of using directional antennas are incorporated is analyzed. An algorithm to find the maximal number of concurrently transmittable frames is proposed. The system throughput and the average transmission delay are obtained in closed forms. The numerical results show the impact of directional antennas on the CSMA/CA media access control (MAC) protocol. For instance, the throughput with a small beamwidth of antenna is more than ten times larger than that for an omnidirectional antenna. The overall analysis is verified by a simulation. The obtained results will be helpful in developing an MAC protocol for enhancing the performance of mmWave wireless personal area networks.

Capacity Analysis of an AF Relay Cooperative NOMA System Using MRC

  • Xie, Xianbin;Bi, Yan;Nie, Xi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4231-4245
    • /
    • 2020
  • Non-orthogonal multiple access (NOMA) is widely studied in both academia and industry due to its high spectral efficiency over orthogonal multiple access (OMA). To effectively improve spectrum efficiency, an amplify-and-forward (AF) cooperative NOMA system is proposed as well as a novel detection scheme is proposed, in which we first perform successive interference cancellation (SIC) twice at U1 for the two signals received from two time slots to remove interference from symbol 2, then two new signals apply max ratio combining (MRC). In addition, a closed-form upper bound approximation for the ergodic capacity of our proposed system is derived. Monte-Carlo simulations and numerical analysis illustrate that our proposed system has better ergodic capacity performance than the conventional cooperative NOMA system with decode-forward (DF) relay, the conventional cooperative NOMA system with AF relay and the proposed AF cooperative NOMA system in [16]. In addition, we can see that ergodic capacity of all NOMA cooperative systems increase with the increase of transmit SNR. Finally, simulations display that power allocation coefficients have little effect on ergodic capacity of all NOMA cooperative systems. This is due to this fact that ergodic capacity of two symbols can be complementary with changing of power allocation coefficients.

Performance Analysis of NOMA-based Relaying Networks with Transceiver Hardware Impairments

  • Deng, Chao;Zhao, Xiaoya;Zhang, Di;Li, Xingwang;Li, Jingjing;Cavalcante, Charles Casimiro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4295-4316
    • /
    • 2018
  • In this paper, the performance of non-orthogonal multiple access (NOMA) dual-hop (DH) amplify-and-forward (AF) relaying networks is investigated, where Nakagami-m fading channel is considered. In order to cover more details, in our analysis, the transceiver hardware impairments at source, relay and destination nodes are comprehensively considered. To characterize the effects of hardware impairments brought in NOMA DH AF relaying networks, the analytical closed-form expressions for the exact outage probability and approximate ergodic sum rate are derived. In addition, the asymptotic analysis of the outage probability and ergodic sum rate at high signal-to-noise ratio (SNR) regime are carried out in order to further reveal the insights of the parameters for hardware impairments on the network performance. Simulation results indicate the performance of asymptotic ergodic sum rate are limited by levels of distortion noise.

On the user equipment (UE) side time tracker design and implementation of the WCDMA system (WCDMA 시스템의 단말기측 time tracker 설계 및 구현)

  • Yeh, Choong-Il;Chang, Kyung-Hi;Kim, Hwan-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2A
    • /
    • pp.96-101
    • /
    • 2003
  • This paper is on the user equipment (UE) side time tracker design and implementation of the wideband code division multiple access (WCDMA) system. The time tracker is constructed as a second order closed loop including time error detector (TED), loop filter (LP), numerically controlled oscillator (NCO), and sample selector (SS). Through the simulation, we found the gain of the TED as a function of the CPICH power contribution to the total transmission power of the base station. Also we derived the transfer function of the loop and the BER versus DPCH power relationships where timing offsets and loop noise bandwidths are used as parameters. In the curve, we can conclude that there are appropriate loop noise bandwidths according to the given environments for the better performance.

Channel Selection for Spectrum Sharing in Wireless Networks

  • Park, Jae Cheol;Kang, Kyu-Min;Park, Seungkeun
    • ETRI Journal
    • /
    • v.38 no.5
    • /
    • pp.952-961
    • /
    • 2016
  • In this paper, we study a spectrum sharing network (SSN) where a spectrum sharing device (SSD) coexists with multiple wireless communication systems (WCSs) in the same channel. The SSD can operate with either a duty cycle (DC) channel access mechanism or a listen-before-talk (LBT) channel access mechanism, whereas WCSs operate with an LBT mechanism. An opportunistic channel selection scheme for the SSD in the SSN is first proposed to minimize the outage probability. The optimal data transmission time for the DC-based SSD is derived to further improve the outage probability. We also derive the exact and closed-form outage probability of the proposed channel selection in the SSN by assuming that the number of WCSs operating in each channel is uniformly distributed. The simulation results show that the proposed channel selection scheme outperforms other channel selection schemes. It was also observed that a DC-based SSD with an optimal data transmission time provides a better outage performance than an LBT-based SSD. As the number of available channels increases, the channel selection scheme plays an important role in minimizing the outage probability of the SSNs.

Design of Image Processing System Additional into Automatic Access Control Door (안면인식 시스템을 탑재한 출입문 자동제어 시스템 설계)

  • Lee, Jae-ung;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.261-263
    • /
    • 2017
  • Future science fiction science film science fiction film can easily see the appearance of the futuristic inquiry. Even if a person does not open the door by force, the door is opened and closed by the system. Even now, such a door can be found easily. However, in the past, people who have not been able to perceive people have been used only in public places such as department stores and marts, where there are many people who are inundated. However, a lot of researches are being done now, and we are pursuing convenience in everyday life by integrating the image processing technology that has been developed and developed many times, by implementing the automatic door which is not infringed by the personal life and is impossible for anyone to access.

  • PDF