• Title/Summary/Keyword: Redundant System

Search Result 606, Processing Time 0.028 seconds

A Study on the Sufficiency of Anticipated Effect of Order Communication System Introduced to Medium-Sized Hospitals (Focused on the case of S Hospital) (중소병원의 처방전달시스템 도입효과분석에 관한 연구 (S병원의 사례를 중심으로))

  • Hong, Suk-Won;Jung, Key-Sun;Choi, Sung-Woo
    • Korea Journal of Hospital Management
    • /
    • v.7 no.4
    • /
    • pp.172-192
    • /
    • 2002
  • The purpose of this study is to ascertain whether the effect of introduction of OCS(Order Communication System) to the hospital is satisfied or not comparing the anticipated effect with the actual effect. For this purpose, a domestic hospital which has introduced and has been operating OCS for several years was chosen. Based on the internal data of S Hospital prepared before introducing OCS, researcher has analyzed the basic direction, design standard and status of operation after the introduction of OCS, etc. After analyzing the status of operations of several departments using OCS and interviewing with the chiefs of pertinent departments, a survey form was designed. Actual survey and interviews were conducted by the researcher for weeks to know whether doctors, nurses, medical technicians and clerks of the patient management dept. were satisfied with OCS and to find if they have any recommendations to improve OCS. Based on the analysis of survey, the effect of OCS was evaluated whether it has satisfied the anticipated effectiveness. For the question if they feel convenient in using OCS, doctors, nursing staffs in charge of ward and the staffs of billing dept. has answered that they were all satisfied(100%). The answers for the same question were relatively high in the case of nurses in charge of outpatient and staffs of radiography. Of course, there have been some nurses and staffs who complained for the inconvenience. However, overall satisfaction was high on the average. Some common problems occurred after the introduction of OCS were frequent errors due to instability of OCS system, paralysis of function of hardware on data back-up system and redundant investment due to erroneous choice of DB program in setting DB. It was also pointed out that lack of computer education and low participation of medical staffs has resulted in failure of developing effective software. As a result, it has lowered the efficiency of OCS. For example, some works have to be done by hands even after OCS. Based on the result of this research, recommendations to maximize the effect of OCS were presented as follows. First, strong leadership of CEO and active cooperation of doctors are mandatory. Second, all the process of hospital work should be analyzed and be redesigned in more efficient ways. Third, OCS should be designed to be user-based system which can be used efficiently by all staffs of the hospital. Forth, prior to the operation of OCS, proper tests of the program and trainings of the pertinent staff are required. Fifth, prior to the selection of hardware, BMT(Bench Marking Test) should be conducted. Sixth, before introducing OCS, staffs in charge of OCS should visit many hospitals operating the OCS system and take their cases into account.

  • PDF

Vulnerability Assessment Procedure for the Warship Including the Effect of Shotline and Penetration of Fragments (탄두의 관통 효과를 고려한 함정 취약성 평가 절차에 관한 기본 연구)

  • Kim, Kwang-Sik;Lee, Jang-Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.49 no.3
    • /
    • pp.254-263
    • /
    • 2012
  • The survivability of warship is assessed by susceptibility, vulnerability and recoverability. Essentially, a vulnerability assessment is a measure of the effectiveness of a warship to resist hostile weapon effects. Considering the shot line and its penetration effect on the warship, present study introduces the procedural aspects of vulnerability assessments of warship. Present study also considers the prediction of penetration damage to a target caused by the impact of projectiles. It reflects the interaction between the weapon and the target from a perspective of vulnerable area method and COVART model. The shotline and tracing calculation have been directly integrated into the vulnerability assessment method based on the penetration equation empirically obtained. A simplified geometric description of the desired target and specification of a threat type is incorporated with the penetration effect. This study describes how to expand the vulnerable area assessment method to the penetration effect. Finally, an example shows that the proposed method can provide the vulnerability parameters of the warship or its component under threat being hit through tracing the shotline path thereby enabling the vulnerability calculation. In addition, the proposed procedure enabling the calculation of the component's multi-hit vulnerability introduces a propulsion system in dealing with redundant Non-overlapping components.

Speech Packet Transmission Using the AMR-WB Coder with FEC (FEC기능을 추가한 AMR-WB 음성 부호화기를 이용한 음성 패킷 전송)

  • 황정준;이인성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.11
    • /
    • pp.63-71
    • /
    • 2003
  • This paper suggests the packet loss recovery method to communicate in real time in the Internet. To reduce the effects of packet loss, Forward Error Correction (FEC) that adds redundant information to voice packets can be used. Adaptive Multi Rate Wideband(AMR-WB) codec which is recently selected by the Third Generation Partnership Project(3GPP) for GSM and the third generation mobile communication WCDMA system and has also been standardized in ITU-T for providing wideband speech services is used. The major cause for speech qualitly degradation in IP-networks is packet loss. So, We recovered single lossy packet by using FEC method and concealed continued errors. The proposed scheme if evaluated in the Gilbert Internet channel model. The high quality of audio maintained up to 30% packet loss.

Montgomery Multiplier Base on Modified RBA and Hardware Architecture (변형된 RBA를 이용한 몽고메리 곱셈기와 하드웨어 구조)

  • Ji Sung-Yeon;Lim Dae-Sung;Jang Nam-Su;Kim Chang-Han;Lee Sang-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.351-355
    • /
    • 2006
  • RSA 암호 시스템은 IC카드, 모바일 및 WPKI, 전자화폐, SET, SSL 시스템 등에 많이 사용된다. RSA는 모듈러 지수승 연산을 통하여 수행되며, Montgomery 곱셈기를 사용하는 것이 효율적이라고 알려져 있다. Montgomery 곱셈기에서 임계 경로 지연 시간(Critical Path Delay)은 세 피연산자의 덧셈에 의존하고 캐리 전파를 효율적으로 처리하는 문제는 Montgomery 곱셈기의 효율성에 큰 영향을 미친다. 최근 캐리 전파를 제거하는 방법으로 캐리 저장 덧셈기(Carry Save Adder, CSA)를 사용하는 연구가 계속 되고 있다. McIvor외 세 명은 지수승 연산에 최적인 CSA 3단계로 구성된 Montgomery 곱셈기와 CSA 2단계로 구성된 Montgomery 곱셈기를 제안했다. 시간 복잡도 측면에서 후자는 전자에 비해 효율적이다. 본 논문에서는 후자보다 빠른 연산을 수행하기 위해 캐리 전파 제거 특성을 가진 이진 부호 자리(Signed-Digit, SD) 수 체계를 사용한다. 두 이진 SD 수의 덧셈을 수행하는 잉여 이진 덧셈기(Redundant Binary Adder, RBA)를 새로 제안하고 Montgomery 곱셈기에 적용한다. 기존의 RBA에서 사용하는 이진 SD 덧셈 규칙 대신 새로운 덧셈 규칙을 제안하고 삼성 STD130 $0.18{\mu}m$ 1.8V 표준 셀 라이브러리에서 지원하는 게이트들을 사용하여 설계하고 시뮬레이션 하였다. 그 결과 McIvor의 2 방법과 기존의 RBA보다 최소 12.46%의 속도 향상을 보였다.

  • PDF

Improving Energy Consumption of Directed Diffusion with Mobile Sinks By Prefetching and Pruning (이동 싱크 환경에서 사전경로설정과 가지치기를 이용한 Directed Diffusion의 에너지 소모 개선)

  • Kim, Sung-Hoon;Lee, Sang-Mok;Yang, Hyun;Park, Chang-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • In dynamic wireless sensor networks where sources and sinks are moving or are created/died, control overheads for route establishment are increased and thus become one of the major factors for energy consumption. This study introduces prefetching and pruning for Directed Diffusion to remove redundant control messages. Prefetching collects path information for each event with "AnyEvent" in advance and gives quick responses without further flooding of requests. Pruning accumulates history information from previous requests and replies, and then stops forwarding a request towards where the event does not exist. Simulation results with ns show that it is possible to build implicit and soft infrastructures within a Directed Diffusion system through these active collection and passive accumulation and they improve energy consumption more as control overhead goes higher.

Trust Discrimination Scheme Considering Limited Resources in Mobile P2P Environments (모바일 P2P환경에서 제한적인 자원을 고려한 신뢰성 판별 기법)

  • Choi, Minwoong;Ko, Geonsik;Jeon, Hyeonnwook;Kim, Yeonwoo;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.662-672
    • /
    • 2017
  • Recently, with the development of mobile devices and near field communication, mobile P2P networks have been actively studied to improve the limits of the existing centralized processing system. A peer has limited components such as batteries, memory and storage spaces in mobile P2P networks. The trust of a peer should be discriminated in order to share reliable contents in mobile P2P networks. In this paper, we propose a trust discrimination scheme considering limited resources in mobile P2P environments. The proposed scheme discriminates the trust of a peer by direct rating values using the rating information of the peer and indirect rating values by the other peers. The recent update time is included in the rating information. The proposed scheme reduces the redundant rating information by comparing the recent update times of the rating information. It is shown through performance evaluation that the proposed scheme reduces the number of messages and improves the accuracy of trust over the existing scheme.

A Scheme of Resource Reallocation and Server Replication against DoS Attacks (서비스 거부 공격에 대비한 자원 재할당 및 서버 중복 방안)

  • Min, Byoung-Joon;Kim, Sung-Ki;Na, Yong-Hi;Lee, Ho-Jae;Choi, Joong-Sup;Kim, Hong-Geun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.1
    • /
    • pp.7-14
    • /
    • 2003
  • In order to cope with DoS (Denial of Service) attacks disturbing delivery of intended services by exhausting resources of computing nodes, we need a solution to recognize important resources for the essential services which have to be maintained under any circumstances and to adapt the system to the urgent situation and reconfigure itself properly. In this paper, we present a two-phase scheme to handle the problem. In the first phase, by means of dynamic resource reallocation within a computing node, we try to make the selected essential services survive even after the occurrence of an attack. For the second phase when it becomes impossible to continue the service in spite of the actions taken in the first phase, we apply server replication in order to continue the transparent provision of the essential services with the end users by utilizing redundant computing nodes previously arranged. Experimental result obtained on a testbed reveals the validity of the proposed scheme. A comparison with other proposed schemes has been conducted by analyzing the performance and the cost.

The Static Nonlinear Analysis of the Offshore Pipeline (해저(海底)파이프라인의 정적(靜的) 비선형(非線形) 해석(解析))

  • Park, Young Suk;Chung, Tae Ju;Cho, Young
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.10 no.1
    • /
    • pp.57-69
    • /
    • 1990
  • The static nonlinear analysis of offshore pipeline is carried out by the finite element method. The governing equilibrium equation are derived by the principle of minimum potential energy and the modified Newton-Raphson procedure is used to solve the system of nonlinear algebraic equation. Geometrically nonlinear beam elements and spring elements are utilized to model the pipeline, stinger, pipe supports and seabed simultaneously. The beam element developed can be used to model redundant structures. It provides for both the torsional deformation and elongation of pipeline, and permits the use of different physical properties in each principal direction. The validity of this method is investigated by comparing the results with these obtained by other methods.

  • PDF

Robust Speech Recognition Using Missing Data Theory (손실 데이터 이론을 이용한 강인한 음성 인식)

  • 김락용;조훈영;오영환
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.56-62
    • /
    • 2001
  • In this paper, we adopt a missing data theory to speech recognition. It can be used in order to maintain high performance of speech recognizer when the missing data occurs. In general, hidden Markov model (HMM) is used as a stochastic classifier for speech recognition task. Acoustic events are represented by continuous probability density function in continuous density HMM(CDHMM). The missing data theory has an advantage that can be easily applicable to this CDHMM. A marginalization method is used for processing missing data because it has small complexity and is easy to apply to automatic speech recognition (ASR). Also, a spectral subtraction is used for detecting missing data. If the difference between the energy of speech and that of background noise is below given threshold value, we determine that missing has occurred. We propose a new method that examines the reliability of detected missing data using voicing probability. The voicing probability is used to find voiced frames. It is used to process the missing data in voiced region that has more redundant information than consonants. The experimental results showed that our method improves performance than baseline system that uses spectral subtraction method only. In 452 words isolated word recognition experiment, the proposed method using the voicing probability reduced the average word error rate by 12% in a typical noise situation.

  • PDF

New Distance Measure for Vector Quantization of Image (영상 벡터양자화를 위한 편차분산을 이용한 거리계산법)

  • Lee, Kyeong-Hwan;Choi, Jung-Hyun;Lee, Bub-Ki;Cheong, Won-Sik;Kim, Kyoung-Kyoo;Kim, Duk-Gyoo
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.11
    • /
    • pp.89-94
    • /
    • 1999
  • In vector quantization (VQ), mean squared error (MSE) is widely used as a distance measure between vectors. But the distance between averages appears as a dominant quantity in MSE. In the case of image vectors, the coincidence of edge pattern is also important considering human visual system (HVS). Therefore, this paper presents a new distance measure using the variance of difference (VD) as a criterion for the coincidence of edge pattern. By using this in the VQ encoding, we can reduce the degradation of edge region in the reconstructed image. And applying this to the codebook design, we can obtain the final codebook that has a lot of various edge codevectors instead of redundant shade ones.

  • PDF