• Title/Summary/Keyword: File system

Search Result 2,291, Processing Time 0.034 seconds

Efficacy of reciprocating and rotary retreatment nickel-titanium file systems for removing filling materials with a complementary cleaning method in oval canals

  • Said Dhaimy;Hyeon-Cheol Kim;Lamyae Bedida;Imane Benkiran
    • Restorative Dentistry and Endodontics
    • /
    • v.46 no.1
    • /
    • pp.13.1-13.9
    • /
    • 2021
  • Objectives: This study aimed to evaluate and compare the efficacy of the S1 reciprocating system and the D-Race retreatment rotary system for filling material removal and the apical extrusion of debris. Materials and Methods: Sixty-four freshly extracted maxillary canines were shaped with size 10 and size 15 K-files, instrumented using ProTaper Gold under irrigation with 2.5% sodium hypochlorite (NaOCl), obturated according to the principle of thermo-mechanical condensation with gutta-percha and zinc oxide eugenol sealer, and allowed to set for 3 weeks at 37℃. Subsequently, the teeth were divided into a control group (n = 4), the D-Race rotary instrument group (n = 30), and the S1 reciprocating instrument group (n = 30). After classical retreatment, the canals were subjected to a complementary approach with the XP-Endo Shaper. Desocclusol was used as a solvent, and irrigation with 2.5% NaOCl was performed. Each group was divided into subgroups according to the timing of radiographic readings. The images were imported into a software program to measure the remaining filling material, the apical extrusion, and the root canal space. The data were statistically analyzed using the Z-test and JASP graphics software. Results: No significant differences were found between the D-Race and S1 groups for primary retreatment; however, using a complementary cleaning method increased the removal of remnant filling (p < 0.05). Conclusions: Classical removal of canal filling material may not be sufficient for root canal disinfection, although a complementary finishing approach improved the results. Nevertheless, all systems left some debris and caused apical extrusion.

Optimizing LRU Lock Management in the Linux Kernel for Improving Parallel Write Throughout in Many-Core CPU Systems (매니코어 CPU 시스템의 병렬 쓰기 성능 향상을 위한 리눅스 커널의 LRU 관리 최적화 기법)

  • Eun-Kyu Byun;Gibeom Gu;Kwang-Jin Oh;Jiwoo Bang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.7
    • /
    • pp.209-216
    • /
    • 2023
  • Modern HPC systems are equipped with many-core CPUs with dozens of cores. When performing parallel I/O in such a system, there is a limit to scalability due to the problem of the LRU lock management policy of the Linux system. The study proposes an improved FinerLRU to solve this problem. Our new FinerLRU improves the parallel write performance of file systems using the buffer cache through granular lock management by increasing the number of LRU locks upto the maximum number of cores. The proposed method was implemented in Linux 5.18.11, and the performance was measured on two types of CPUs, Intel Icelake Xeon and Intel Knights landing, with different characteristics, and it was found that a performance improvement of about two times can be obtained in both types of systems.

Drone Flight Record Forensic System through DUML Packet Analysis (DUML 패킷 분석을 통한 드론 비행기록 포렌식 시스템)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.103-114
    • /
    • 2024
  • In a situation where drone-related crimes continue to rise, research in drone forensics becomes crucial for preventing and responding to incidents involving drones. Conducting forensic analysis on flight record files stored internally is essential for investigating illegal activities. However, analyzing flight record files generated through the exclusive DUML protocol requires a deep understanding of the protocol's structure and characteristics. Additionally, a forensic analysis tool capable of handling cryptographic payloads and analyzing various drone models is imperative. Therefore, this study presents the methods and characteristics of flight record files generated by drones. It also explains the structure of the flight record file and the features of the DUML packet. Ultimately, we conduct forensic analysis based on the presented structure of the DUML packet and propose an extension forensic analysis system that operates more universally than existing tools, performing expanded syntactic analysis.

A Design and Implementation of MCC Test Cases Generator using Binary Numbers (2진수를 활용한 MCC 테스트 케이스 생성기 설계 및 구현)

  • Robin Lee;Young Ho Nam
    • Smart Media Journal
    • /
    • v.13 no.8
    • /
    • pp.9-15
    • /
    • 2024
  • Software testing is essential in the software development process. Modified Condition / Decision Coverage (MC/DC) is a test case derivation technique that enhances the stability and reliability of software by effectively verifying complex conditions and decision structures. We propose the MCC Test Cases (MTC) generator in this study. This generator generates Multiple Condition Coverage (MCC) test cases using binary numbers to confirm the maximum coverage value of MC/DC testing. The proposed MTC generator utilizes some conditions from the Traffic Alert and Collision Avoidance System (TCAS)-II specification. It converts them into a Comma-Separated Values (CSV) file and then validates the coverage results through the VectorCAST program. So, MC/DC testing was performed using the MCC test case to confirm the maximum coverage value when performing MC/DC tests for each condition of the TCAS-II specification. This research is helpful for the verification of MC/DC test cases by confirming the maximum coverage value when performing MC/DC tests. Moreover, having more test cases increases the likelihood of discovering defects. Therefore, it can improve the efficiency of software test coverage verification, as well as the quality and stability of software.

Development of cardiopulmonary resuscitation nursing education program of web-based instruction (웹 기반의 심폐소생술 간호교육 프로그램 개발)

  • Sin, Hae-Won;Hong, Hae-Sook
    • Journal of Korean Biological Nursing Science
    • /
    • v.4 no.1
    • /
    • pp.25-39
    • /
    • 2002
  • The purpose of this study is to develop and evaluate a web-based instruction Program(WBI) to help nurses improving their knowledge and skill of cardiopulmonary resuscitation. Using the model of web-based instruction(WBI) program designed by Rhu(1999), this study was carried out during February-April 2002 in five different steps; analysis, design, data collection and reconstruction, programming and publishing, and evaluation. The results of the study were as follows; 1) The goal of this program was focused on improving accuracy of knowledge and skills of cardiopulmonary resuscitation. The program texts consists of the concepts and importances of cardiopulmonary resuscitation(CPR), basic life support(BLS), advanced cardiac life support(ACLS), treatment of CPR, nursing care after CPR treatment. And in the file making step, photographs, drawings and image files were collected and edited by web-editor(Namo), scanner and Adobe photoshop program. Then, the files were modified and posted on the web by file transfer protocol(FTP). Finally, the program was demonstrated and once again revised by the result, and then completed. 2) For the evaluation of the program, 36 nurses who in K university hospital located in D city, and related questionnaire were distributed to them as well. Higher scores were given by the nurses in its learning contents with $4.2{\pm}.67$, and in its structuring and interaction of the program with $4.0{\pm}.79$, and also in its satisfactory of the program with $4.2{\pm}.58$ respectively. In conclusion, if the contents of this WBI educational program upgrade further based upon analysis and applying of the results the program evaluation, it is considered as an effective tool to implement for continuing education as life-long educational system for nurse.

  • PDF

THE COMPARISON OF DIFFERENT CANAL IRRIGATION METHODS TO PREVENT REACTION PRECIPITATE BETWEEN SODIUM HYPOCHLORITE AND CHLORHEXIDINE (차아염소산나트륨과 클로르헥시딘의 반응침전물 형성방지를 위한 여러 가지 근관세척 방법의 비교)

  • Choi, Moon-Sun;Park, Se-Hee;Cho, Kyung-Mo;Kim, Jin-Woo
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.2
    • /
    • pp.80-87
    • /
    • 2010
  • The purpose of this study was to compare the different canal irrigation methods to prevent the formation of precipitate between sodium hypochlorite (NaOCl) and chlorhexidine (CHX). Extracted 50 human single-rooted teeth were used. The root canals were instrumented using NiTi rotary file (Profile .04/#40) with 2.5% NaOCl and 17% EDTA as irrigants. Teeth were randomly divided into four experimental groups and one control group as follows; Control group: 2.5% NaOCl only, Group 1: 2.5% NaOCl + 2% CHX, Group 2: 2.5% NaOCl + paper points + 2% CHX, Group 3: 2.5% NaOCl + preparation with one large sized-file + 2% CHX, Group 4: 2.5% NaOCl +95% alcohol+ 2% CHX. The teeth were split in bucco-lingual aspect and the specimens were observed using Field Emission Scanning Electron Microscope. The percentages of remaining debris and patent dentinal tubules were determined. Statistical analysis was performed with one-way analysis of variance (ANOVA). Energy Dispersive x-ray Spectroscopy was used for analyzing the occluded materials in dentinal tubule for elementary analysis. There were no significant differences in percentage of remaining debris and patent tubules between all experimental groups at all levels (p > .05). In elementary analysis, the most occluded materials in dentinal tubule were dentin debris. NaOCl/CHX precipitate was detected in one tooth specimen of Group 1. In conclusion, there were no significant precipitate on root canal, but suspected material was detected on Group 1. The irrigation system used in this study could be prevent the precipitate formation.

A Study on Improving the Billing System of the Wireless Internet Service (무선인터넷 서비스의 과금체계 개선에 관한 연구)

  • Min Gyeongju;Hong Jaehwan;Nam Sangsig;Kim Jeongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.597-602
    • /
    • 2005
  • In this study, file size for measurement and the service system's billing data were submitted to a comparative analysis by performing a verification test on the billing system of three major mobile communication services providers, based on the wireless Internet service packet. As shown in the result of the verification test, there were some differences in the billing data due to transmission overhead, according to the network quality that is affected by the wireless environment of mobile operators. Consequently, the packet analysis system was proposed as a means of applying consistent packet billing to all service providers being compared. If the packet analysis system is added to supplement the current billing system various user requirements can be met. Billing by Packet among mobile operators and differentiated billing based on the content value are available, since the packet data can be extracted through protocol analysis by service, and it can be classified by content tape through traffic data analysis. Furthermore, customer's needs can be satisfied who request more information on the detailed usage, and more flexible and diverse billing policies can be supported like application of charging conditions to the non-charging packet handling. All these services are expected to contribute to the popularization of the wireless Internet service, since user complaints about the service charge could be reduced.

An Analysis on the Actual Condition of Land Expropriation System of Local Governments and Its Improvement Plan (지방자치단체 토지수용제도 실태분석과 개선방안)

  • Kim, Hyeong-Geun;Kim, Boo-Sung;Lim, Dong-Jin;Kim, Dong-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.929-937
    • /
    • 2011
  • This thesis is intended for addressing issues of the local expropriation committee system by drawing the policy suggestion through theoretical considerations on the land expropriation system of the UK and of the US, and for finding a plan to improve the system by focusing on the examples of land expropriation of local governments. The US' Takings utilize a public hearing and the jury system. When property is expropriated through eminent domain, stakeholders and citizens share the necessity of the expropriation and its awareness through a public hearing, and project institutes (administrative organizations) file a lawsuit to a law court to exercise takings. In the case of Compulsory Purchase in the UK, the system should be based on laws established by the Parliament, and the resolution to use CPO is also decided by district councils. So the system is able to prevent power abuse. As a plan to improve the land expropriation committee of local governments, it is necessary ${\triangle}$ to enhance the professionality of the local land expropriation committee, ${\triangle}$ to expropriate lands by the analysis of land type, and ${\triangle}$ to come up with alternative measures to prevent the rights of the expropriated.

Hierarchical Internet Application Traffic Classification using a Multi-class SVM (다중 클래스 SVM을 이용한 계층적 인터넷 애플리케이션 트래픽의 분류)

  • Yu, Jae-Hak;Lee, Han-Sung;Im, Young-Hee;Kim, Myung-Sup;Park, Dai-Hee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.7-14
    • /
    • 2010
  • In this paper, we introduce a hierarchical internet application traffic classification system based on SVM as an alternative overcoming the uppermost limit of the conventional methodology which is using the port number or payload information. After selecting an optimal attribute subset of the bidirectional traffic flow data collected from the campus, the proposed system classifies the internet application traffic hierarchically. The system is composed of three layers: the first layer quickly determines P2P traffic and non-P2P traffic using a SVM, the second layer classifies P2P traffics into file-sharing, messenger, and TV, based on three SVDDs. The third layer makes specific classification of the entire 16 application traffics. By classifying the internet application traffic finely or coarsely, the proposed system can guarantee an efficient system resource management, a stable network environment, a seamless bandwidth, and an appropriate QoS. Also, even a new application traffic is added, it is possible to have a system incremental updating and scalability by training only a new SVDD without retraining the whole system. We validate the performance of our approach with computer experiments.

A Dynamic Recommendation System Using User Log Analysis and Document Similarity in Clusters (사용자 로그 분석과 클러스터 내의 문서 유사도를 이용한 동적 추천 시스템)

  • 김진수;김태용;최준혁;임기욱;이정현
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.586-594
    • /
    • 2004
  • Because web documents become creation and disappearance rapidly, users require the recommend system that offers users to browse the web document conveniently and correctly. One largely untapped source of knowledge about large data collections is contained in the cumulative experiences of individuals finding useful information in the collection. Recommendation systems attempt to extract such useful information by capturing and mining one or more measures of the usefulness of the data. The existing Information Filtering system has the shortcoming that it must have user's profile. And Collaborative Filtering system has the shortcoming that users have to rate each web document first and in high-quantity, low-quality environments, users may cover only a tiny percentage of documents available. And dynamic recommendation system using the user browsing pattern also provides users with unrelated web documents. This paper classifies these web documents using the similarity between the web documents under the web document type and extracts the user browsing sequential pattern DB using the users' session information based on the web server log file. When user approaches the web document, the proposed Dynamic recommendation system recommends Top N-associated web documents set that has high similarity between current web document and other web documents and recommends set that has sequential specificity using the extracted informations and users' session information.