• Title/Summary/Keyword: common zero

Search Result 238, Processing Time 0.027 seconds

Current status and future tasks of visiting oral health care services for elders (우리나라 노인 방문 구강건강관리 서비스의 현황과 향후과제)

  • Lee, Sue-Hyang;Bae, Soo-Myoung;Shin, Bo-Mi;Lee, Hyo-Jin;Shin, Sun-Jung
    • Journal of Korean society of Dental Hygiene
    • /
    • v.20 no.4
    • /
    • pp.457-467
    • /
    • 2020
  • Objectives: This study confirms the current status of visiting oral health-care services for the elderly to draw policy implications for revitalization of the visiting oral health care services in the future. Methods: First, a survey was conducted on health centers about the current status of the elderly visiting oral health-care service and how to revitalize it. Next, the number of oral hygiene services provided to the elderly was checked in the long-term care insurance system. Results: Oral health education (100%) was the most common practice in visiting oral health-care service for the elderly, and the most difficult thing in providing services was the lack of dental hygienists (38.9%). The status of oral health-care services in the long-term care insurance system for elderly revealed that the total number of service claims has been confirmed to be zero since the introduction of the system. Conclusions: Despite the existence of a system that provides elderly visiting oral healthcare services, to revitalize it, the law must be amended to secure a dental hygienist as the main agent of the activity and to further take responsibility for autonomous authority and performance.

A Study on the Improvement of DTW with Speech Silence Detection (음성의 묵음구간 검출을 통한 DTW의 성능개선에 관한 연구)

  • Kim, Jong-Kuk;Jo, Wang-Rae;Bae, Myung-Jin
    • Speech Sciences
    • /
    • v.10 no.4
    • /
    • pp.117-124
    • /
    • 2003
  • Speaker recognition is the technology that confirms the identification of speaker by using the characteristic of speech. Such technique is classified into speaker identification and speaker verification: The first method discriminates the speaker from the preregistered group and recognize the word, the second verifies the speaker who claims the identification. This method that extracts the information of speaker from the speech and confirms the individual identification becomes one of the most efficient technology as the service via telephone network is popularized. Some problems, however, must be solved for the real application as follows; The first thing is concerning that the safe method is necessary to reject the imposter because the recognition is not performed for the only preregistered customer. The second thing is about the fact that the characteristic of speech is changed as time goes by, So this fact causes the severe degradation of recognition rate and the inconvenience of users as the number of times to utter the text increases. The last thing is relating to the fact that the common characteristic among speakers causes the wrong recognition result. The silence parts being included the center of speech cause that identification rate is decreased. In this paper, to make improvement, We proposed identification rate can be improved by removing silence part before processing identification algorithm. The methods detecting speech area are zero crossing rate, energy of signal detect end point and starting point of the speech and process DTW algorithm by using two methods in this paper. As a result, the proposed method is obtained about 3% of improved recognition rate compare with the conventional methods.

  • PDF

A Characteristics Analysis of Push Pull type High Frequency DC-DC Converter using Resonant Element with ZVS Capacitor (ZVS 커패시터를 공진요소로 이용한 Push Pull형 고주파 DC-DC 컨버터의 특성해석)

  • 안항목;남승식;김동희;노채균;이달해
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.14 no.4
    • /
    • pp.65-72
    • /
    • 2000
  • This paper proposes a Push type High Frequency DC-DC Converter using Zero Voltage Switching to reduce turn on and off loss at the switching instants. This paper has a advantage which is able to operating safely in load short, because DC reactor is connected with resonance reactor in order to supply a fixed safely in load short, because DC reactor is connected with resonance reactor in order to supply a fixed current with low ripple from DC power supply. The capacitor $(C_1, C_2)$ connected in switch are a common using as resonance capacitor and ZVS capacitor. The analysis of the proposed high frequency resonance DC-DC converter is generally described by using normallized parameter, and we has evaluated characteristic values which is needed to design a circuit. We conform a rightfulness of theoritical analysis by comparing a theoretical values and experimental values obtained from experiment using MOSFET as switching devices.

  • PDF

A Novel Control Strategy of Three-phase, Four-wire UPQC for Power Quality Improvement

  • Pal, Yash;Swarup, A.;Singh, Bhim
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2012
  • The current paper presents a novel control strategy of a three-phase, four-wire Unified Power Quality (UPQC) to improve power quality. The UPQC is realized by the integration of series and shunt active power filters (APF) sharing a common dc bus capacitor. The realization of shunt APF is carried out using a three-phase, four-leg Voltage Source Inverter (VSI), and the series APF is realized using a three-phase, three-leg VSI. To extract the fundamental source voltages as reference signals for series APF, a zero-crossing detector and sample-and-hold circuits are used. For the control of shunt APF, a simple scheme based on the real component of fundamental load current (I $Cos{\Phi}$) with reduced numbers of current sensors is applied. The performance of the applied control algorithm is evaluated in terms of power-factor correction, source neutral current mitigation, load balancing, and mitigation of voltage and current harmonics in a three-phase, four-wire distribution system for different combinations of linear and non-linear loads. The reference signals and sensed signals are used in a hysteresis controller to generate switching signals for shunt and series APFs. In this proposed UPQC control scheme, the current/voltage control is applied to the fundamental supply currents/voltages instead of fast-changing APF currents/voltages, thus reducing the computational delay and the required sensors. MATLAB/Simulink-based simulations that support the functionality of the UPQC are obtained.

Effects of Aromatics and T90 Temperature of Low Cetane Number Fuels on Exhaust Emissions in Low-Temperature Diesel Combustion (저온디젤연소에서 저세탄가 연료의 방향족 및 T90 온도가 배기가스에 미치는 영향)

  • Han, Man-Bae
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.34 no.12
    • /
    • pp.1121-1126
    • /
    • 2010
  • This study is to investigate the effects of aromatics and T90 for low cetane number (CN) fuels on combustion and exhaust emissions in low-temperature diesel combustion. We use a 1.9-L common rail direct injection diesel engine at 1500 rpm and 2.6 bar BMEP. Low temperature diesel combustion was achieved via a high external EGR rate and strategic injection control. The tested fuels four sets: the aromatic content was 20% (A20) or 45% (A45) and the T90 temperature was $270^{\circ}C$ (T270) or $340^{\circ}C$ (T340) with CN 30. Given the engine operating conditions, the T90 was the stronger factor on the ignition delay time, resulting in a longer ignition delay time for higher T90 fuels. All the fuels produced nearly zero PM because of the extension of the ignition delay time induced by the low cetane number. The aromatic content was the main factor that affected the NOx and the NOx increased with the aromatic content.

A New Information Index of Axiomatic Design for Robustness (강건성을 고려한 공리적 설계의 새로운 정보 지수)

  • Hwang, Kwang-Hyeon;Park, Gyung-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.26 no.10
    • /
    • pp.2073-2081
    • /
    • 2002
  • In product design and manufacturing, axiomatic design provides a systematic approach for the decision-making process. Two axioms have been defined such as the Independence Axiom and the Information Axiom. The Information Axiom states that the best design among those that satisfy the independence axiom is the one with the least information content. In other words, the best design is the one that has the highest probability of success. On the other hand, the Taguchi robust design is used in the two-step process; one is "reduce variability," and the other is "adjust the mean on the target." The two-step can be interpreted as a problem that has two FRs (functional requirements). Therefore, the Taguchi method should be used based on the satisfaction of the Independence Axiom. Common aspects exist between the Taguchi method and Axiomatic Design in that a robust design is induced. However, different characteristics are found as well. The Taguchi method does not have the design range, and the probability of success may not be enough to express robustness. Our purpose is to find the one that has the highest probability of success and the smallest variation. A new index is proposed to satisfy these conditions. The index is defined by multiplication of the robustness weight function and the probability density function. The robustness weight function has the maximum at the target value and zero at the boundary of the design range. The validity of the index is proved through various examples.gh various examples.

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.

Flight Trajectory Simulation via Reinforcement Learning in Virtual Environment (가상 환경에서의 강화학습을 이용한 비행궤적 시뮬레이션)

  • Lee, Jae-Hoon;Kim, Tae-Rim;Song, Jong-Gyu;Im, Hyun-Jae
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.1-8
    • /
    • 2018
  • The most common way to control a target point using artificial intelligence is through reinforcement learning. However, it had to process complicated calculations that were difficult to implement in order to process reinforcement learning. In this paper, the enhanced Proximal Policy Optimization (PPO) algorithm was used to simulate finding the planned flight trajectory to reach the target point in the virtual environment. In this paper, we simulated how this problem was used to find the planned flight trajectory to reach the target point in the virtual environment using the enhanced Proximal Policy Optimization(PPO) algorithm. In addition, variables such as changes in trajectory, effects of rewards, and external winds are added to determine the zero conditions of external environmental factors on flight trajectory learning, and the effects on trajectory learning performance and learning speed are compared. From this result, the simulation results have shown that the agent can find the optimal trajectory in spite of changes in the various external environments, which will be applicable to the actual vehicle.

Detecting Spectre Malware Binary through Function Level N-gram Comparison (함수 단위 N-gram 비교를 통한 Spectre 공격 바이너리 식별 방법)

  • Kim, Moon-Sun;Yang, Hee-Dong;Kim, Kwang-Jun;Lee, Man-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1043-1052
    • /
    • 2020
  • Signature-based malicious code detection methods share a common limitation; it is very hard to detect modified malicious codes or new malware utilizing zero-day vulnerabilities. To overcome this limitation, many studies are actively carried out to classify malicious codes using N-gram. Although they can detect malicious codes with high accuracy, it is difficult to identify malicious codes that uses very short codes such as Spectre. We propose a function level N-gram comparison algorithm to effectively identify the Spectre binary. To test the validity of this algorithm, we built N-gram data sets from 165 normal binaries and 25 malignant binaries. When we used Random Forest models, the model performance experiments identified Spectre malicious functions with 99.99% accuracy and its f1-score was 92%.

Effect of three common hot beverages on the force decay of orthodontic elastomeric chain within a 28-day period: An in vitro study

  • Maziar Nobahari;Fatemeh Safari;Allahyar Geramy;Tabassom Hooshmand;Mohammad Javad Kharazifard;Sepideh Arab
    • The korean journal of orthodontics
    • /
    • v.54 no.3
    • /
    • pp.153-159
    • /
    • 2024
  • Objective: This study aimed to assess the effects of commonly consumed hot drinks on the force decay of orthodontic elastomeric chains. Methods: This in vitro experimental study evaluated 375 pieces of elastomeric chains with six rings placed on a jig. Four rings were stretched by 23.5 mm corresponding to the approximate distance between the canine and the second premolar. Fifteen pieces served as reference samples at time zero, and 360 pieces were randomized into four groups: control, hot water, hot tea, and hot coffee. Each group was further divided into six subgroups (n = 15) according to the different exposure periods. The specimens in the experimental groups were exposed to the respective solutions at 65.5℃ four times per day for 90 seconds at 5-second intervals. The control group was exposed to artificial saliva at 37℃. The force decay of the samples was measured at 1, 2, 7, 14, 21, and 28 days using a universal testing machine. Data were analyzed using repeated-measures analysis of variance. Results: Maximum force decay occurred on day 1 in all groups. The minimum force was recorded in the control group, followed by the tea, coffee, and hot water groups on day 1. At the other time points, the minimum force was observed in the tea group, followed by the control, coffee, and hot water groups. Conclusions: Patients can consume hot drinks without concern about any adverse effect on force decay of the orthodontic elastomeric chains.