• Title/Summary/Keyword: service state

Search Result 2,258, Processing Time 0.031 seconds

Infection control among dental hygienists according to infection control education experiences (치과위생사의 감염관리 교육경험에 따른 감염관리 실태)

  • Kim, Ji-Hyun;Kim, Jin-Kyoung
    • Journal of Korean society of Dental Hygiene
    • /
    • v.11 no.4
    • /
    • pp.547-556
    • /
    • 2011
  • Objectives : The purpose of this study was to examine the relationship between the infection control education experiences of dental hygienists and the state of their infection control. Methods : The subjects in this study were the dental hygienists who worked in Seoul. The relationship of their infection control education experiences to their gender, marital status, academic credential, workplace, length of service, infection control implementation, experience of being exposed to infection, way of coping with it, hand washing, use of personal protection devices and equipment management was analyzed. Results : It is found that the variable to affect the state of infection control was educational experiences about handpiece water pipe management, ultrasonic scaler water pipe management and three-way syringe water pipe management. Conclusions : Dental hygienists who are one of major dental personnels should receive systematic education on infection control to acquire accurate knowledge to ensure the successful prevention of cross infection.

Performance analysis of packet transmission for a Signal Flow Graph based time-varying channel over a Wireless Network (무선 네트워크 time-varying 채널 상에서 Signal Flow Graph를 이용한 패킷 전송 성능 분석)

  • Kim, Sang-Yang;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.65-67
    • /
    • 2004
  • Change of state of Channel between two wireless terminals which is caused by noise and multiple environmental conditions for happens frequently from the Wireles Network. So, When it is like that planning a wireless network protocol or performance analysis, it follows to change of state of time-varying channel and packet the analysis against a transmission efficiency is necessary. In this paper, analyzes transmission time of a packet and a packet in a time-varying and packet based Wireless Network. To reflecte the feature of the time-varying channel, we use a Signal Flow Graph model. From the model the mean of transmission time and the mean of queue length of the packet are analyzed in terms of the packet distribution function, the packet transmission service time, and the PER of the time-varying channel.

  • PDF

Digital Competence In Education At The Present Stage Of Development Information Society

  • Blahodyr, Liudmyla;Kononenko, Andrii;Kulynych, Olena;Ianytskyi, Taras;Sinelnikova, Valentina;Mykytenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.13-16
    • /
    • 2021
  • The article defines the hypothesis of the research, it is an assumption that the process of forming ICT competence will be effective if: theoretically substantiated, developed and practically implemented a structural and functional model for the formation of ICT competence, taking into account interdisciplinary integration, the pedagogical conditions that contribute to the formation of ICT competence have been determined: interdisciplinary integration as the basis for building an interdisciplinary course, the content of which is aimed at the formation of ICT competence.

Research Trends of Ultra-reliable and Low-latency Machine Learning-based Wireless Communication Technology (기계학습기반 초신뢰·저지연 무선통신기술 연구동향)

  • Lee, H.;Kwon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.3
    • /
    • pp.93-105
    • /
    • 2019
  • This study emphasizes the importance of the newly added Ultra-Reliable and Low-Latency Communications (URLLC) service as an important evolutionary step for 5G mobile communication, and proposes a remedial application. We analyze the requirements for the application of 5G mobile communication technology in high-precision vertical industries and applications, introduce the 5G URLLC design principles and standards of 3GPP, and summarize the current state of applied artificial intelligence technology in wireless communication. Additionally, we summarize the current state of research on ultra-reliable and low-latency machine learning-based wireless communication technology for application in ultra-high-precision vertical industries and applications. Furthermore, we discuss the technological direction of artificial intelligence technology for URLLC wireless communication.

Energy-efficient Power Allocation based on worst-case performance optimization under channel uncertainties

  • Song, Xin;Dong, Li;Huang, Xue;Qin, Lei;Han, Xiuwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4595-4610
    • /
    • 2020
  • In the practical communication environment, the accurate channel state information (CSI) is difficult to obtain, which will cause the mismatch of resource and degrade the system performance. In this paper, to account for the channel uncertainties, a robust power allocation scheme for a downlink Non-orthogonal multiple access (NOMA) heterogeneous network (HetNet) is designed to maximize energy efficiency (EE), which can ensure the quality of service (QoS) of users. We conduct the robust optimization model based on worse-case method, in which the channel gains belong to certain ellipsoid sets. To solve the non-convex non-liner optimization, we transform the optimization problem via Dinkelbach method and sequential convex programming, and the power allocation of small cell users (SCUs) is achieved by Lagrange dual approach. Finally, we analysis the convergence performance of proposed scheme. The simulation results demonstrate that the proposed algorithm can improve total EE of SCUs, and has a fast convergence performance.

Pedagogical Conditions And Technology Of Formation Of Management Competencies Of Future Specialists Of The System Of Higher Education Institutions

  • Rebryna, Anatolii;Kukin, Igor;Soltyk, Oleksandr;Tashmatov, Viacheslav;Bilanych, Halyna;Kramarenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.217-221
    • /
    • 2022
  • The article analyzes the main theoretical approaches to the formation of managerial competencies and establishes the degree of development of the problem. The content of the concept of "managerial competence" has been clarified, to determine the structure of managerial competencies of a future specialist in the education system and indicators of the formation of managerial competencies. The organizational and pedagogical conditions necessary for the effective process of forming the managerial competencies of future specialists are revealed. The following research methods were used in the work: theoretical (analysis of regulatory documents and scientific literature on the problem under study, comparison, generalization, modeling), empirical (diagnostics of the level of formation of managerial competencies of students of the system, questioning, observation, peer review, comparative qualitative and quantitative analysis of diagnostic results the level of formation of managerial competencies).

CRITICAL SUCCESS FACTORS OF A BUILDING DESIGN TEAM

  • T.H. Nguyen;M. Diab
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.9-18
    • /
    • 2007
  • The success of a building design team is achieved as a result of a combination of multiple events/factors and interactions, and has a great impact on the quality of the building construction process. While most of previous studies have focused on quality of the construction process, the success of a design team has not been completely investigated. This paper presents the critical factors that impact the success of a building design team and describes an assessment tool to measure the successful performance of the design team with respect to the critical factors. The development of the assessment tool employs the concept of quality function deployment (QFD), a technique to measure the service quality of an organization.

  • PDF

Vulnerable Path Attack and its Detection

  • She, Chuyu;Wen, Wushao;Ye, Quanqi;Zheng, Kesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2149-2170
    • /
    • 2017
  • Application-layer Distributed Denial-of-Service (DDoS) attack is one of the leading security problems in the Internet. In recent years, the attack strategies of application-layer DDoS have rapidly developed. This paper introduces a new attack strategy named Path Vulnerabilities-Based (PVB) attack. In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph. The attacker uses a Top M Longest Path algorithm to find M DDoS vulnerable paths that consume considerable resources when sequentially accessing the pages following any of those paths. A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks. Numerical results based on real-traffic simulations reveal the efficiency of the attack strategy and the detection mechanism.

Multiple-Phase Energy Detection and Effective Capacity Based Resource Allocation Against Primary User Emulation Attacks in Cognitive Radio Networks

  • Liu, Zongyi;Zhang, Guomei;Meng, Wei;Ma, Xiaohui;Li, Guobing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1313-1336
    • /
    • 2020
  • Cognitive radio (CR) is regarded as an effective approach to avoid the inefficient use of spectrum. However, CRNs have more special security problems compared with the traditional wireless communication systems due to its open and dynamic characteristics. Primary user emulation attack (PUEA) is a common method which can hinder secondary users (SUs) from accessing the spectrum by transmitting signals who has the similar characteristics of the primary users' (PUs) signals, and then the SUs' quality of service (QoS) cannot be guaranteed. To handle this issue, we first design a multiple-phase energy detection scheme based on the cooperation of multiple SUs to detect the PUEA more precisely. Second, a joint SUs scheduling and power allocation scheme is proposed to maximize the weighted effective capacity of multiple SUs with a constraint of the average interference to the PU. The simulation results show that the proposed method can effectively improve the effective capacity of the secondary users compared with the traditional overlay scheme which cannot be aware of the existence of PUEA. Also the good delay QoS guarantee for the secondary users is provided.

Synthesis of DOT Use of Beam End Protection for Extending the Life of Bridges

  • Radlinska, Aleksandra;McCarthy, Leslie Myers;Matzke, James;Nagel, Francis
    • International Journal of Concrete Structures and Materials
    • /
    • v.8 no.3
    • /
    • pp.185-199
    • /
    • 2014
  • As the national transportation infrastructure ages and deteriorates, many existing bridges require frequent and costly maintenance and repairs. The objective of this work was to synthesize new and existing types of beam end coatings and treatments that have been proven to extend the life of new and existing concrete and steel bridge beams. A comprehensive literature review, along with online surveys and phone interviews of State department of transportations (DOTs) and coating manufacturers was conducted to gather information about existing and recently developed technologies. The study revealed that while many promising coatings and treatments are offered on the market, there is a lack of readily available laboratory results that would enable direct comparison of the available methods. This finding applies in terms of the coatings' durability and the potential for extending the service life of existing bridges. Most of the interviewed State DOTs' personnel assessed the products listed in respective DOT's Qualified Products Lists as performing 'well'. However, there was significant variability between states in the type of the products used. Among the agencies contacted, none was able to suggest the most promising or advanced products, either for concrete or steel bridge beam end treatments. This suggests that comprehensive laboratory evaluation would be necessary for selecting the best available beam end treatments and coatings.