• Title/Summary/Keyword: meta-model

Search Result 982, Processing Time 0.022 seconds

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

The Protective Effect of Maternal Folic Acid Supplementation on Childhood Cancer: A Systematic Review and Meta-analysis of Case-control Studies

  • Ismail, Wan Rosmawati Wan;Rahman, Raudah Abdul;Rahman, Nur Ashiqin Abd;Atil, Azman;Nawi, Azmawati Mohammed
    • Journal of Preventive Medicine and Public Health
    • /
    • v.52 no.4
    • /
    • pp.205-213
    • /
    • 2019
  • Objectives: Maternal folic acid supplementation is considered mandatory in almost every country in the world to prevent congenital malformations. However, little is known about the association of maternal folic acid intake with the occurrence of childhood cancer. Hence, this study aimed to determine the effects of maternal folic acid consumption on the risk of childhood cancer. Methods: A total of 158 related articles were obtained from PubMed, Google Scholar, Scopus, and ProQuest using standardized keywords, of which 17 were included in the final review. Results: Eleven of the 17 articles showed a significant protective association between maternal folic acid supplementation and childhood cancer. Using a random-effects model, pooled odds ratios (ORs) showed a protective association between maternal folic acid supplementation and childhood acute lymphoblastic leukaemia (OR, 0.75; 95% confidence interval [CI], 0.66 to 0.86). However, there was no significant association between maternal folic acid supplementation and acute myeloid leukaemia (OR, 0.70; 95% CI, 0.46 to 1.06) or childhood brain tumours (OR, 1.02; 95% CI, 0.88 to 1.19). Conclusions: Maternal folic acid supplementation was found to have a protective effect against childhood acute lymphoblastic leukaemia. Thus, healthcare professionals are recommended to provide regular health education and health promotion to the community on the benefits of folic acid supplementation during pregnancy.

Preventive Effects of Fluoride Gel Application on Dental Caries in the Permanent Tooth: A Systematic Review of Randomized Controlled Trials

  • Do, Kyung-Yi;Lee, Eun-Sun
    • Journal of dental hygiene science
    • /
    • v.19 no.1
    • /
    • pp.9-22
    • /
    • 2019
  • Background: The purpose of this systematic review was to investigate the effects of topical fluoride gel application on dental caries prevention in the permanent teeth of children and adolescents. Methods: We searched the EMBASE, PubMed, and Cochrane Library databases for randomized controlled trials (RCTs) assessing the effects of self-applied or professionally applied topical fluoride gels in patients <18 years of age; the search was completed on April 1, 2018. All included trials involved an experimental group (fluoride gel application) and a control group (placebo or no treatment). The outcome measures were the D(M)FS and D(M)FT indices, which were compared between the two groups. Review Manager software was used for quantitative synthesis of the final selected articles, and a forest plot was generated via a meta-analysis conducted using a random effects model. Results: The results showed that the D(M)FS and D(M)FT indices were lower in the fluoride application group than in the control group, thus indicating that fluoride gel application was effective in dental caries prevention. We also performed a subgroup analysis to determine whether the effects of fluoride application differed if patients received oral prophylaxis (self or professional) before fluoride gel application. Therefore, the two groups showed slightly larger differences when studies without oral prophylaxis before fluoride gel application were considered; however, the difference was not statistically significant. Conclusion: These findings should be utilized to raise awareness about the caries-prevention effects of topical fluoride application among patients and guardians. Further RCTs should evaluate the effects of fluoride application with or without preceding oral prophylaxis, and appropriate fluoride application guidelines should be developed to maximize the effects of fluoride application in clinical practice.

A Study on the Acoustic Analysis Method of the External Ear Canal Using DICOM Images (DICOM 영상을 이용한 외이도 음향해석 방법에 관한 연구)

  • Kim, Hyeong-Gyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.73-79
    • /
    • 2019
  • This study simulated external ear canal modeling with different external ear canal lengths, vertical flexion angles, and inner/outer diameter ratios using digital imaging and communications in medicine(DICOM) of the head temporal region and measured the acoustic sensitivity. The experiment was performed by increasing the audible frequency for humans by 200 Hz and expressing the frequency constantly transmitted at 1 Pa as the eardrum acoustic volume and presented the measurements by linear and quadratic curve regression analysis. The results showed that the longer the external ear canal length and the higher the ratio of the outer/inner diameter, the faster the acoustic response at lower frequencies. The acoustic sensitivity correlation of the meta-model using regression analysis showed a 77% influence by the external ear canal length and 5% by the external/internal diameter ratio, while the vertical flexion angle did not show a significant relationship. This showed that auditory acoustic sensitivity of humans is a factor that reacts faster at a low frequency when the external ear canal length is longer and when the difference between the outer and inner diameter is higher.

Meta-Analysis of Endovascular Treatment for Acute M2 Occlusion

  • Kim, Chul Ho;Kim, Sung-Eun;Jeon, Jin Pyeong
    • Journal of Korean Neurosurgical Society
    • /
    • v.62 no.2
    • /
    • pp.193-200
    • /
    • 2019
  • Objective : Endovascular treatment (EVT) outcomes for acute M2 segment of middle cerebral artery occlusion remains unclear because most results are obtained from patients with large artery occlusion in the anterior circulation. The objective of this study was to assess procedural outcomes for acute M2 occlusion and compare outcomes according to thrombus location (M1 vs. M2). Methods : A systematic review was performed for online literature published from January 2004 to December 2016. Primary outcome was successful recanalization rate and symptomatic intracranial hemorrhage (S-ICH) after the procedure. A fixed effect model was used if heterogeneity was less than 50%. Results : Eight articles were included. EVT showed successful recanalization rate of 69.1% (95% confidence interval [CI], 54.9-80.4%) and S-ICH rate of 6.1% (95% CI, 4.5-8.3%). The rates of good clinical outcome at 3 months and mortality were 59.4% (95% CI, 49.9-68.2%) and 14.9% (95% CI, 11.4-19.3%), respectively. According to thrombus location (M1 vs. M2), successful recanalization (odds ratio [OR], 1.539; 95% CI, 0.293-8.092; p=0.610) and S-ICH (OR, 1.313; 95% CI, 0.603-2.861; p=0.493) did not differ significantly. Good clinical outcome was more evident in M2 occlusion after EVT than that in M1 occlusion (OR, 1.639; 95% CI, 1.135-2.368; p=0.008). However, mortality did not differ significantly according to thrombus location (OR, 0.788; 95% CI, 0.486-1.276; p=0.332). Conclusion : EVT seems to be technically feasible for acute M2 occlusion. Direct comparative studies between EVT and medical treatment are needed further to find specific beneficiary group after EVT in patient with M2 occlusion.

Influencer Attribute Analysis based Recommendation System (인플루언서 속성 분석 기반 추천 시스템)

  • Park, JeongReun;Park, Jiwon;Kim, Minwoo;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1321-1329
    • /
    • 2019
  • With the development of social information networks, the marketing methods are also changing in various ways. Unlike successful marketing methods based on existing celebrities and financial support, Influencer-based marketing is a big trend and very famous. In this paper, we first extract influencer features from more than 54 YouTube channels using the multi-dimensional qualitative analysis based on the meta information and comment data analysis of YouTube, model representative themes to maximize a personalized video satisfaction. Plus, the purpose of this study is to provide supplementary means for the successful promotion and marketing by creating and distributing videos of new items by referring to the existing Influencer features. For that we assume all comments of various videos for each channel as each document, TF-IDF (Term Frequency and Inverse Document Frequency) and LDA (Latent Dirichlet Allocation) algorithms are applied to maximize performance of the proposed scheme. Based on the performance evaluation, we proved the proposed scheme is better than other schemes.

A Study of Multi-to-Majority Response on Threat Assessment and Weapon Assignment Algorithm: by Adjusting Ballistic Missiles and Long-Range Artillery Threat (다대다 대응 위협평가 및 무기할당 알고리즘 연구: 탄도미사일 및 장사정포 위협을 중심으로)

  • Im, Jun Sung;Yoo, Byeong Chun;Kim, Ju Hyun;Choi, Bong Wan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.43-52
    • /
    • 2021
  • In weapon assignment studies to defend against threats such as ballistic missiles and long range artillery, threat assessment was partially lacking in analysis of various threat attributes, and considering the threat characteristics of warheads, which are difficult to judge in the early flight stages, it is very important to apply more reliable optimal solutions than approximate solution using LP model, Meta heuristics Genetic Algorithm, Tabu search and Particle swarm optimization etc. Our studies suggest Generic Rule based threat evaluation and weapon assignment algorithm in the basis of various attributes of threats. First job of studies analyzes information on Various attributes such as the type of target, Flight trajectory and flight time, range and intercept altitude of the intercept system, etc. Second job of studies propose Rule based threat evaluation and weapon assignment algorithm were applied to obtain a more reliable solution by reflection the importance of the interception system. It analyzes ballistic missiles and long-range artillery was assigned to multiple intercept system by real time threat assessment reflecting various threat information. The results of this study are provided reliable solution for Weapon Assignment problem as well as considered to be applicable to establishing a missile and long range artillery defense system.

Prevalence and extension of the anterior loop of the mental nerve in different populations and CBCT imaging settings: A systematic review and meta-analysis

  • Hadilou, Mahdi;Gholami, Leila;Ghojazadeh, Morteza;Emadi, Naghmeh
    • Imaging Science in Dentistry
    • /
    • v.52 no.2
    • /
    • pp.141-153
    • /
    • 2022
  • Purpose: This study aimed to identify the prevalence and extension of the anterior loop (AL) of the mental nerve in different populations and according to different cone-beam computed tomography (CBCT) imaging settings. Materials and Methods: Medline/PubMed, Embase, Scopus, Web of Science, and ProQuest were searched. The main inclusion criterion was ALs evaluated in CBCT images. The quality of studies was assessed with the Joanna Briggs Institute risk of bias checklist. Subgroup analyses were conducted for sex, side, continent, voxel size, field of view, and type of CBCT-reconstruction images with a random-effects model. Results: Sixty-three studies with 13,743 participants (27,075 hemimandibles) were included. An AL was found in 40.6% (95% CI: 32.8%-48.9%, P<0.05) of participants and 36.0% (95% CI: 27.5%-45.5%, P<0.05) of hemimandibles, in 34.9% (95% CI: 25.1%-46.2%, P<0.05) of males and 34.5% (95% CI: 23.5%-47.4%, P<0.05) of females. The average length of ALs was 2.39 mm (95% CI: 2.07-2.70 mm, P<0.05). Their extension was 2.13 mm (95% CI: 1.54-2.73 mm, P<0.05) in males and 1.85 mm (95% CI: 1.35-2.36 mm, P<0.05) in females. Significant differences were observed regarding the prevalence and length of ALs among continents and for its measured length on different CBCT-reconstruction images, but not between other subgroups. Conclusion: AL was a relatively common finding. The voxel size and fields of view of CBCT devices were adequate for assessing AL; however, a 2-mm safety margin from anatomical structures(such as the AL) could be recommended to be considered when using CBCT imaging.

Reducing pain and opioid consumption after body contouring of the breast by application of a perioperative nerve block: a systematic review

  • Asserson, Derek B.;Sahar, David E.
    • Archives of Plastic Surgery
    • /
    • v.48 no.4
    • /
    • pp.361-365
    • /
    • 2021
  • Background Pain in the postoperative body contouring patient has traditionally been managed with narcotic medication. In an effort to minimize side effects and prevent addiction, plastic surgeons are searching for novel ways to provide adequate analgesia, one of which is nerve blocks. This study was conducted with a meta-analysis that evaluates the efficacy of these blocks for patients who undergo breast surgery. Methods A search of the PubMed/MEDLINE database for articles including the terms "post-operative analgesia" OR "postoperative pain management" AND "in plastic surgery" OR "in cosmetic surgery" OR "in elective surgery" in February 2019 generated five studies on elective breast augmentation and reduction mammoplasty that reported pain scores and quantities of opioids consumed. Independent samples t-tests, one-way analysis of variance, and a random effects model were implemented for evaluation. Results A total of 317 patients were identified as having undergone body contouring of the breast, about half of which received a nerve block. Pain scores on a 1-10 scale and opioid dose-equivalents were calculated. Those who were blocked had an average score of 2.40 compared to 3.64 for those who did not (P<0.001), and required an average of 5.20 less narcotic doses (P<0.001). Pain relief following subpectoral augmentation was best achieved with type-II blocks as opposed to type-I and type-II with serratus plane (P<0.001). Conclusions The opioid epidemic has extended to all surgical specialties. Implementation of a nerve block seems to be an efficacious and cost-effective mechanism to not only help with post-operative pain, but also lower the need for narcotics, especially in subpectoral augmentation.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.