• Title/Summary/Keyword: comprehensive

Search Result 10,345, Processing Time 0.029 seconds

Evaluation of Creative Space Efficiency in China' Provinces Based on AHP Method

  • Hu, Shan-Shan;Kim, Hyung-Ho
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.52-61
    • /
    • 2020
  • The AHP method was used in 30 provinces of China to construct the index system of creative space efficiency evaluation and determine the weight of each index. The fuzzy comprehensive evaluation method was further used to score the indexes at all levels, and then the total efficiency score was sorted. The purpose of this study is to adjust the regional layout of creative space reasonably and implement financial policies accurately through the evaluation of the efficiency of creative space. The results is ranking top in weight of several indicators, which include the number of incubated Startups, the number of innovation and entrepreneurship mentors, the survival rate of incubator, the innovative training activities, etc. It was also found that Beijing, Shanghai, Jiangsu, Guangdong and Zhejiang ranked first in the score of creative space efficiency. This study is meaningful in that it was In order to effectively solve the problem of the imbalance of the creative space efficiency in China's province, by coordinating the regional pattern, establishing a sound service system and improving the efficiency evaluation system.

Detection Mechanism on Vehicular Adhoc Networks (VANETs) A Comprehensive Survey

  • Shobana, Gopalakrishnan;Arockia, Xavier Annie R.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.294-303
    • /
    • 2021
  • VANET is an upcoming technology with an encouraging prospect as well as great challenges, specifically in its security. This paper intends to survey such probable attacks and the correlating detection mechanisms that are introduced in the literature. Accordingly, administering security and protecting the owner's privacy has become a primary argument in VANETs. To furnish stronger security and preserve privacy, one should recognize the various probable attacks on the network and the essence of their behavior. This paper presents a comprehensive survey on diversified attacks and the recommended unfolding by the various researchers which concentrate on security services and the corresponding countermeasures to make VANET communications more secure.

Introducing Contemporary Blockchain Platforms

  • Alrumaih, Malak Suliman
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.9-18
    • /
    • 2021
  • Blockchain and its infrastructure technology have expanded rapidly in the last decade and are in high demand, but there is a lack of comprehensive studies on those platforms. Blockchain is a new technology based on the distributed digital ledger system. Decentralized trust is one of the key factors behind the blockchain-based system. Transparency of such a system is better than a conventional centralized ledger system. By using a blockchain-based transaction system, any business organization can harness key benefits like data integrity, confidentiality, and anonymity without involving any third party in control of the transactions. Since the blockchain is used in numerous applications and the horizon is expanding at an unprecedented pace. So, there is a need for an introducing and reviewing of blockchain platforms. In this paper, we have reported a review on existing contemporary blockchain platforms. In particular, From the existing studies, we have identified eighty blockchain platforms and the majority of them have a lack of technical details. To provide the researchers a comprehensive introducing on blockchain platforms to perform a broad guideline for future research and investment in the blockchain domain.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

Generative Linguistic Steganography: A Comprehensive Review

  • Xiang, Lingyun;Wang, Rong;Yang, Zhongliang;Liu, Yuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.986-1005
    • /
    • 2022
  • Text steganography is one of the most imminent and promising research interests in the information security field. With the unprecedented success of the neural network and natural language processing (NLP), the last years have seen a surge of research on generative linguistic steganography (GLS). This paper provides a thorough and comprehensive review to summarize the existing key contributions, and creates a novel taxonomy for GLS according to NLP techniques and steganographic encoding algorithm, then summarizes the characteristics of generative linguistic steganographic methods properly to analyze the relationship and difference between each type of them. Meanwhile, this paper also comprehensively introduces and analyzes several evaluation metrics to evaluate the performance of GLS from diverse perspective. Finally, this paper concludes the future research work, which is more conducive to the follow-up research and innovation of researchers.

Trends in Digital Trade Policies and Trade Rules in Major Overseas Countries (해외 주요국의 디지털 통상 정책 및 무역 협정 규범 동향)

  • Kim, J.E.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.1-10
    • /
    • 2022
  • Digital trade rules are crucial in supporting the digital economy as the rules effectively reduce unnecessary trade barriers. This study introduces various approaches that major countries take regarding digital trade policies and rules. Comprehensive and Progressive Agreement for Trans-Pacific Partnership has introduced comprehensive rules on e-commerce, including binding articles on the free flow of information, location of computing facilities, and source code. More recent e-commerce provisions or digital trade agreements cover wider range of issues, from cyber security, artificial intelligence, and data innovation to electronic invoicing and payments. Multilateral negotiations on digital trade rules, including the World Trade Organization E-commerce Joint Statement Initiatives and Indo-Pacific Economic Framework, are in progress. Thus, countries involved are expected to respond to new digital trade issues with long-term strategies considering domestic policy objectives.

A Study on Fatigue Management of Aviation Maintenance Mechanics-Focusing on Shift Workers (교대근무 항공정비사의 피로관리 연구)

  • Kim, Chun-Yong;Choi, Se-Jong
    • Korean journal of aerospace and environmental medicine
    • /
    • v.30 no.2
    • /
    • pp.61-65
    • /
    • 2020
  • In the case of aviation maintenance work, several kinds of shift works are performed during day and night, and a lot of works are performed on the ramp due to the characteristics of the aircraft flight schedule. Maintenance workers are often exposed to the sun or in cold temperatures for aircraft maintenance works. The fatigue risk of the maintenance workers will be weighted. In particular, the work at night shift under normal biological rhythms can make maintenance workers feel sleepy during daytime work. It can also affect the safety of aircraft and individual workers. Accordingly, this study will consider fatigue-related previous researches in the field of aviation maintenance, review the effects of shift work, and how fatigue affects aviation mechanics during the day/night shifts. Considering these factors, we tried to present a plan that can minimize the fatigue of aviation workers through this study.

Case report: Comprehensive orthodontic treatment with Serafin clear aligner system (세라핀 투명교정창지를 이용한 포괄적 교정치료 증례 보고)

  • Kim, Dohoon;Chang, Wongun
    • Journal of the Korean Academy of Esthetic Dentistry
    • /
    • v.30 no.1
    • /
    • pp.13-23
    • /
    • 2021
  • These days, Clear aligners occupy an important position in dentistry, and have increased in popularity and in the market share of orthodontic treatment system. Currently, the world's No. 1 company occupies a significant portion of the global clear aligner market, and many latecomers are trying to follow. Serafin clear aligner system, which is one of domestic clear aligner systems pursues comprehensive orthodontic treatment, not just target tooth movement. Here I report two orthodontic treatment cases using Serafin clear aligner system.

Comprehensive Korean Medicine Treatment for Benign Essential Blepharospasm in a Patient Responding Poorly to Botulinum Toxin Treatment

  • Ha, Seojung;Kim, Sung A;Lee, Suji;Choi, Sungwoon;Lee, Sanghoon
    • Journal of Acupuncture Research
    • /
    • v.39 no.1
    • /
    • pp.49-52
    • /
    • 2022
  • Benign essential blepharospasm (BEB) is a condition/disease which involves involuntary muscle contractions causing the eye to repetitively close, making it impossible for the patient to perform daily activities. This study reports Korean medicine treatment of a rare case BEB in a 34-year-old male patient whose symptoms showed minimal improvement following botulinum toxin injection (the standard treatment). Acupuncture, pharmacopuncture, and herbal medicine treatment for 11 days resulted in clinical improvement for all symptoms as assessed by using the Jankovic Rating Scale, Blepharospasm Disability Index, numerical rating scale, duration of spasms lasting more than 1 hour per day, and number of spasms lasting less than 1 minute per day. This case report suggests that comprehensive Korean medicine treatment could be a treatment option for BEB in patients who do not respond well to botulinum toxin injection.

Five Forces Model of Computational Power: A Comprehensive Measure Method

  • Wu, Meixi;Guo, Liang;Yang, Xiaotong;Xie, Lina;Wang, Shaopeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2239-2256
    • /
    • 2022
  • In this paper, a model is proposed to comprehensively evaluate the computational power. The five forces model of computational power solves the problem that the measurement units of different indexes are not unified in the process of computational power evaluation. It combines the bidirectional projection method with TOPSIS method. This model is more scientific and effective in evaluating the comprehensive situation of computational power. Lastly, an example shows the validity and practicability of the model.