• Title/Summary/Keyword: Necessity and possibility operations

Search Result 7, Processing Time 0.022 seconds

Operations on Generalized Intuitionistic Fuzzy Soft Sets

  • Park, Jin-Han
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.3
    • /
    • pp.184-189
    • /
    • 2011
  • Generalized intuitionistic fuzzy soft set theory, proposed by Park et al. [Journal of Korean Institute of Intelligent Systems 21(3) (2011) 389-394], has been regarded as an effective mathematical tool to deal with uncertainties. In this paper, we prove that certain De Margan's law hold in generalized intuitionistic fuzzy soft set theory with respect to union and intersection operations on generalized intuitionistic fuzzy soft sets. We discuss the basic properties of operations on generalized intuitionistic fuzzy soft sets such as necessity and possibility. Moreover, we illustrate their interconnections between each other.

Lattice Structure of Generalized Intuitionistic Fuzzy Soft Sets

  • Park, Jin Han
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.2
    • /
    • pp.201-208
    • /
    • 2014
  • Park et al. introduced the concept of generalized intuitionistic fuzzy soft sets, which can be seen as an effective mathematical tool to deal with uncertainties. In this paper, we introduce new operations such as restricted union and restricted intersection and study their basic properties, and deal with the algebraic structure of generalized intuitionistic fuzzy soft sets. The lattice structures of generalized intuitionistic fuzzy soft sets are constructed.

An Exploratory Study on Block chain based IoT Edge Devices for Plant Operations & Maintenance(O&M) (플랜트 O&M을 위한 블록체인 기반 IoT Edge 장치의 적용에 관한 탐색적 연구)

  • Ryu, Yangsun;Park, Changwoo;Lim, Yongtaek
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.1
    • /
    • pp.34-42
    • /
    • 2019
  • Receiving great attention of IoT and 4th industrial revolution, the necessity comes to the fore of the plant system which aims making it smart and effective. Smart Factory is the key realm of IoT to apply with the concept to optimize the entire process and it presents a new and flexible production paradigm based on the collected data from numerous sensors installed in a plant. Especially, the wireless sensor network technology is receiving attention as the key technology of Smart Factory, researches to interface those technology is actively in progress. In addition, IoT devices for plant industry security and high reliable network protocols are under development to cope with high-risk plant facilities. In the meanwhile, Blockchain can support high security and reliability because of the hash and hash algorithm in its core structure and transaction as well as the shared ledger among all nodes and immutability of data. With the reason, this research presents Blockchain as a method to preserve security and reliability of the wireless communication technology. In regard to that, it establishes some of key concepts of the possibility on the blockchain based IoT Edge devices for Plant O&M (Operations and Maintenance), and fulfills performance verification with test devices to present key indicator data such as transaction elapsed time and CPU consumption rate.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Uncertainty and Factors Affecting Organ Donation in Living Liver Donors (생체 간이식 공여자의 불확실성과 간 공여 영향 요인)

  • Chon Hee Ok;Park Ho Ran;Park Jin Hee
    • Journal of Korean Public Health Nursing
    • /
    • v.19 no.1
    • /
    • pp.129-138
    • /
    • 2005
  • As the patients who need to undergo liver transplant operation continues to grow. the number of livers that are donated can not keep pace with the demand. With the development of surgery skills, the necessity for operations from living donors is increasing. Nevertheless, satisfactory research has been conducted on the factors which generally affect the living donors. In this article. therefore. researchers focused on the factors which generally affect the donating liver donor in order to design a plan for recommending liver donation from living donors. The subjects were 91 living liver donors in C university hospital from October 1. 2000 to December 31. 2003. The results on the uncertainty of living donor, by test sheet. were analyzed with SAS program. The final results were as follows: 1. The uncertainty of the living donors was 51.54 marks per full credit 100. 2. The factor with the greatest effect on donation was the possibility of survival of the donor, followed by the admission period. marriage status and age. In recommending the living donation, the rate of donor survival after the operation was 5.2 times higher than death, 5.2 times higher when the admission period was under 20 days. 5.0 times higher when married. and 27.3 times higher when the family-related donation was very active at the age of 20s than in the 50s. These results suggest that all medical staffs should care for living donors with more interest and activity to give them the least complaints in admission and the lowest possibilities for complication. To enhance the survival rate and improve the surgical success rate. on-going monitoring should include regular health-checks. and continual efforts and education should be made to care for the health condition of the living donors after donation.

  • PDF

THE EFFICACY OF PROPHYLACTIC ANTIBIOTICS FOR MANDIBULAR THIRD MOLAR EXTRACTION (하악 제3대구치 발치를 위한 예방적 항생제의 효용성)

  • Kang, Sang-Hoon;Kim, Jung-In;Park, Won-Se;Yi, Choong-Kook;Lee, Sang-Hwy
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.34 no.3
    • /
    • pp.365-369
    • /
    • 2008
  • This study analyzed the incidence of wound infection after the operation of mandibular third molar extraction in relation with antibiotic prophylaxis with the object of young and healthy patients. The study object was 1,177 mandibular third molars of 850 men of 20 to 25 years old without any specific systemic disease. Three methods of preventive antibiotic medication were selected according to the preventive antibiotic medication previously reported; three experimental groups were selected based on them, and the antibiotic used was amoxicillin($^{(R)}Kymoxin$, Yuhanyanghaeng, Seoul). The group 1 includes the patients that took the antibiotic orally before the operation(one hour earlier, 500mg) and for three days after the operation(250mg per time, three times/day), the group 2 is the ones that took the same antibiotic orally only once about one hour before the operation(500mg), and the group 3 did not take any antibiotics before and after the operation. And to compare the difficulties and the degrees of extraction during operations which can be possibly related to the wound infection after the operations, the mandibular third molars' impacted depths and extraction methods were investigated as well. To check if the wound was infected, observations with an internal of one week were performed twice after the operation, and the meaningfulness of the infection incidence was verified through Chi-square test using SPSS program(SPSS Inc., IL, USA). There was no statistically significant difference between the antibiotic medication methods and the wound infection incidence after the operation among the experimental groups. As examining the relations between the mandibular third molar operation methods and the wound infection incidence after the operation, there existed a statistically meaningful difference in the infection incidence according to the operation methods(p=0.020). And there was no statistically significant difference in the wound infection incidence according to the impacted depth of the mandibular third molar. Therefore, it is thought that there exists little necessity of prophylatic antibiotics medication when extracting the mandibular third molar of young and healthy men without any systemic disease in general; however, in case when it is expected that the possibility of infection will be high or the wound on the tissue will be severe, it is sure that the prophylactic antibiotics medication will be necessary.

The Transmission of Tele-Information System using BlueTooth (블루투스를 이용한 웹으로의 원격 의료정보 전송 시스템)

  • 채희영;강형원;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.130-133
    • /
    • 2002
  • As a society advances, an aging phenomenon and many diseases which did not exist in old times are happening. Especially, in case of the aged patient, because we cant know the time the condition of the patients health become worse, the study of the Tele-information system has been actively carried out by the necessity of a persistent observation. A ECG signal a kind of a vital signals has been widely used to the medical information system as an usual clinical diagnosis for the patients who possess heart diseases. BlueTooth is a close range wireless communication technology which uses a wireless frequency 2.4GHz and has a high trust and self - error correction technology according to a low power consumption quality and a high-speed frequency hopping. This makes get a high trust concerning a data transmission than an existing modem. In addition, though wireless modem is restricted by a minimal of a wireless terminal, It will be possible to coincide with the function of the portable with the low power consumption quality by using Bluetooth. And as the system on a chip of module progresses, the possibility of the small size is present According to this, Bluetooth module transmits the medical information, which is input from the outside among the operations that use the Bluetooth to the Bluetooth module that is connected the host PC. And the system that the host PC transmits the medical information from the connected Bluetooth module to the Internet has once embedded. this study let the host PC embedded in advance of the existing system and transmit the medical information by the addition of the Tcp/Ip protocol stark under all embedded environments to internet.

  • PDF