• Title/Summary/Keyword: infection algorithm

검색결과 61건 처리시간 0.026초

Adaptation of Evidence-based Surgical Wound Care Algorithm

  • Han, Jung-Yeon;ChoiKwon, Smi
    • 대한간호학회지
    • /
    • 제41권6호
    • /
    • pp.768-779
    • /
    • 2011
  • Purpose: This study was designed to adapt a surgical wound care algorithm that is used to provide evidence-based surgical wound care in a critical care unit. Methods: This study used, the 'ADAPTE process', an international clinical practice guideline development method. The -'Bonnie Sue wound care algorithm' - was used as a draft for the new algorithm. A content validity index (CVI) targeting 135 critical care nurses was conducted. A 5-point Likert scale was applied to the CVI test using a statistical criterion of .75. Results: A surgical wound care algorithm comprised 9 components: wound assessment, infection control, necrotic tissue management, wound classification by exudates and depths, dressing selection, consideration of systemic factors, wound expected outcome, reevaluate non-healing wounds, and special treatment for non-healing wounds. All of the CVI tests were ${\leq}$.75. Compared to existing wound care guidelines, the new wound care algorithm provides precise wound assessment, reliabilities of wound care, expands applicability of wound care to critically ill patients, and provides evidence and strength of recommendations. Conclusion: The new surgical wound care algorithm will contribute to the advancement of evidence-based nursing care, and its use is expected as a nursing intervention in critical care.

HIV감염과 AIDS의 전파특성에 관한 수학적 모델화 (Mathematical Modelling for the Transmission Dynamics of HIV infection and AIDS)

  • 정형환;주석민;정문규;이광우
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제48권2호
    • /
    • pp.89-95
    • /
    • 1999
  • This study investigates the population model of the spread of HIV/AIDS which the infection is generated by an infectious individual in a population of susceptible. A mathematical model is presented for the transmission dynamics of HIV infection within the communities of homosexual males. The pattern on the epidemic character of HIV, the causative agent of AIDS, was analysed by the mathematical model of AIDS system which is derived according to the ecological relationship between five epidemilogic states of individuals. The computer simulation was performed using real data and the following conclusions are drawn on the basis of the simulations. 1. The model structure and the algorithm described n the thesis is good. 2. In proportion to increase Ro, the population of AIDS patient increases and the time of its widespread reaches earlier. 3. The AIDS patients will be maximum between 7 and 21 years after an attack of AIDS and widespread between 10 and 20 years. 4. Considering the properties of the incubation periods, the maximum number of infected person is increased, and the attack rate is decreased.

  • PDF

A GENETIC ALGORITHM BY USE OF VIRUS EVOLUTIONARY THEORY FOR SCHEDULING PROBLEM

  • Saito, Susumu
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2001년도 The Seoul International Simulation Conference
    • /
    • pp.365-370
    • /
    • 2001
  • The genetic algorithm that simulates the virus evolutionary theory has been developed applying to combinatorial optimization problems. The algorithm in this study uses only one individual and a population of viruses. The individual is attacked, inflected and improved by the viruses. The viruses are composed of flour genes (a pair of top gene and a pair of tail gene). If the individual is improved by the attacking, the inflection occurs. After the infection, the tail genes are mutated. If the same virus attacks several times and fails to inflect, the top genes of the virus are mutated. By this mutation, the individual can be improved effectively. In addition, the influence of the immunologic mechanism on evolution is simulated.

  • PDF

T세포 발생과정의 긍정 및 부정 선택에 기반한 변경 검사 알고리즘 (Change Detection Algorithm based on Positive and Negative Selection of Developing T-cell)

  • 심귀보;이동욱
    • 한국지능시스템학회논문지
    • /
    • 제13권1호
    • /
    • pp.119-124
    • /
    • 2003
  • 본 논문에서는 생체의 면역계에서 중요한 역할을 하는 세포독성 T세포의 생성과정의 하나인 긍정 선택(positive selection)과 부정 선택(negative selection)을 모델링하였다. 그리고 침입에 의한 데이터 변경과 바이러스에 의한 데이터 감염 등을 탐지할 때 가장 중요한 요소인 변경 검사 알고리즘을 개발하였다. 제안된 방법은 자기를 인식하는 MHC 인식부와 비자기를 인식하는 항원 인식부를 생성하는 알고리즘이다. 따라서 제안한 방법은 실제 면역세포와 마찬가지로 자신과 침입자 모두에 대한 인식기를 가지고 변경을 탐지하게 된다. 시뮬레이션을 통하여 자기파일의 국소가 변경되었을 때와 블록이 변경되었을 때에 대하여 두 가지 방법을 이용한 변경 검사 알고리즘의 특성과 유효성을 밝힌다

속도검출기가 없는 유도전동기의 광범위한 속도 영역에서의 자속 기준 속도 제어 (Field-Oriented Speed Control of Induction Machine without Speed Sensor in Overall Speed Range)

  • 류형민;하정익;설승기
    • 대한전기학회논문지:전기기기및에너지변환시스템부문B
    • /
    • 제49권5호
    • /
    • pp.338-344
    • /
    • 2000
  • This paper proposes a field-oriented control strategy without speed sensor in overall speed range. At low speed region including zero speed, the electrical saliency which is due to the main flux saturation is used in order to estimate an instantaneous flux position. This electrical saliency can be obtained from the difference of high frequency impedance by the high frequency signal injection. This method enables the stable operation at zero speed or stator frequency even under heavily loaded condition. However, because of the high frequency signal injection the loss and noise in motor increase and the voltage margin is reduced as the motor speed increases. Therefore, this algorithm must be supplemented with the algorithm based on the electrical model of motor, which is conventionally used in the region except the low speed. This paper proposes the combination algorithm between the high frequency signal infection method and the adaptive observer, in which the rotor flux and motor speed can be simultaneously estimated by the adaptive control theory. This combination algorithm enables the stable operation of field-oriented speed control without speed sensor in overall speed range. This is verified by experimental results.

  • PDF

네트워크 트래픽 특성을 이용한 스캐닝 웜 탐지기법 (Detection Algorithm of Scanning worms using network traffic characteristics)

  • 김재현;강신헌
    • 정보보호학회논문지
    • /
    • 제17권1호
    • /
    • pp.57-66
    • /
    • 2007
  • 스캐닝 웜은 네트워크 관리자가 미처 대응하기 전에 넓게 전파되므로 차단하기 힘들고 그 피해가 상당히 크다. 따라서 자동으로 스캐닝 웜의 발생을 탐지하고 이에 대응할 수 있는 방법이 필요하다. 본 논문에서는 스캐닝 웜의 트래픽 특성을 분석하여 정상 트래픽과 이상 트래픽을 구분할 수 있는 탐지 알고리즘을 제안한다. 스캐닝 웜의 탐지를 위해 variance, VMR 및 correlation coefficient를 이용하는 방법을 제안하고, 시뮬레이션을 통해 기존의 방법과 성능을 비교하였다. 그 결과 기존의 방법에 비하여 간단한 계산을 통해 스캐닝 웜의 효율적인 탐지가 가능함을 확인하였다.

산발적인 데이터를 이용한 HIV 변이모델의 파라미터 추정 (Parameter Estimation of an HIV Model with Mutants using Sporadically Sampled Data)

  • 김석균;김정수;윤태웅
    • 제어로봇시스템학회논문지
    • /
    • 제17권8호
    • /
    • pp.753-759
    • /
    • 2011
  • The HIV (Human Immunodeficiency Virus) causes AIDS (Acquired Immune Deficiency Syndrome). The process of infection and mutation by HIV can be described by a 3rd order state equation. For this HIV model that includes the dynamics of the mutant virus, we present a parameter estimation scheme using two state variables sporadically measured, out of the three, by employing a genetic algorithm. It is assumed that these non-uniformly sampled measurements are subject to random noises. The effectiveness of the proposed parameter estimation is demonstrated by simulations. In addition, the estimated parameters are used to analyze the equilibrium points of the HIV model, and the results are shown to be consistent with those previously obtained.

Health monitoring sensor placement optimization for Canton Tower using virus monkey algorithm

  • Yi, Ting-Hua;Li, Hong-Nan;Zhang, Xu-Dong
    • Smart Structures and Systems
    • /
    • 제15권5호
    • /
    • pp.1373-1392
    • /
    • 2015
  • Placing sensors at appropriate locations is an important task in the design of an efficient structural health monitoring (SHM) system for a large-scale civil structure. In this paper, a hybrid optimization algorithm called virus monkey algorithm (VMA) based on the virus theory of evolution is proposed to seek the optimal placement of sensors. Firstly, the dual-structure coding method is adopted instead of binary coding method to code the solution. Then, the VMA is designed to incorporate two populations, a monkey population and a virus population, enabling the horizontal propagation between the monkey and virus individuals and the vertical inheritance of monkey's position information from the previous to following position. Correspondingly, the monkey population in this paper is divided into the superior and inferior monkey populations, and the virus population is divided into the serious and slight virus populations. The serious virus is used to infect the inferior monkey to make it escape from the local optima, while the slight virus is adopted to infect the superior monkey to let it find a better result in the nearby area. This kind of novel virus infection operator enables the coevolution of monkey and virus populations. Finally, the effectiveness of the proposed VMA is demonstrated by designing the sensor network of the Canton Tower, the tallest TV Tower in China. Results show that innovations in the VMA proposed in this paper can improve the convergence of algorithm compared with the original monkey algorithm (MA).

Rapid construction delivery of COVID-19 special hospital: Case study on Wuhan Huoshenshan hospital

  • Wang, Chen;Yu, Liangcheng;Kassem, Mukhtar A.;Li, Heng;Wang, Ziming
    • Advances in Computational Design
    • /
    • 제7권4호
    • /
    • pp.345-369
    • /
    • 2022
  • Infectious disease emergency hospitals are usually temporarily built during the pneumonia epidemic with higher requirements regarding diagnosis and treatment efficiency, hygiene and safety, and infection control.This study aims to identify how the Building Information Modeling (BIM) + Industrialized Building System (IBS) approach could rapidly deliver an infectious disease hospital and develop site epidemic spreading algorithms. Coronavirus-19 pneumonia construction site spreading algorithm model mind map and block diagram of the construction site epidemic spreading algorithm model were developed. BIM+IBS approach could maximize the repetition of reinforced components and reduce the number of particular components. Huoshenshan Hospital adopted IBS and BIM in the construction, which reduced the workload of on-site operations and avoided later rectification. BIM+IBS integrated information on building materials, building planning, building participants, and construction machinery, and realized construction visualization control and parametric design. The delivery of Huoshenshan Hospital was during the most critical period of the Coronavirus-19 pneumonia epidemic. The development of a construction site epidemic spreading algorithm provided theoretical and numerical support for prevention. The agent-based analysis on hospital evacuation observed "arched" congestion formed at the evacuation exit, indicating behavioral blindness caused by fear in emergencies.

A Proposal of GA Using Symbiotic Evolutionary Viruses and Its Virus Evaluation Techniques

  • Sakakura, Yoshiaki;Taniguchi, Noriyuki;Hoshino, Yukinobu;Kamei, Katsuari
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.679-682
    • /
    • 2003
  • In this paper, we propose a Genetic Algorithm (GA) using symbiotic evolutionary viruses. Our GA is based on both the building block hypothesis and the virus theory of evolution. The proposed GA aims to control a destruction of building blocks by discovering, keeping, and propagating of building blocks based on virus operation. Concretely, we prepare the group of individuals and the group of viruses. In our GA, the group of individuals searches solutions and the group of viruses searches building blocks. These searches done based on the symbiotic relation of both groups. Also, our GA has two types of virus evaluation techniques. One is that each virus is evaluated by the difference of the fitness of an individual between before and after infection of virus. Another is that all viruses aye evaluated by the difference of the fitness of an individual between before and after infection of all viruses. Furthermore, we applied the proposed GA to the minimum value search problem of a test function which has some local solutions far from the optimal solution. And, we discuss a difference of behaviors of the proposed GA based on each virus evaluation techniques.

  • PDF