• Title/Summary/Keyword: 소프트웨어 신뢰도 측정

Search Result 190, Processing Time 0.023 seconds

Statistical Data Extraction and Validation from Graph for Data Integration and Meta-analysis (데이터통합과 메타분석을 위한 그래프 통계량 추출과 검증)

  • Sung Ryul Shim;Yo Hwan Lim;Myunghee Hong;Gyuseon Song;Hyun Wook Han
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.61-70
    • /
    • 2021
  • The objective of this study was to describe specific approaches for data extraction from graph when statistical information is not directly reported in some articles, enabling data intergration and meta-analysis for quantitative data synthesis. Particularly, meta-analysis is an important analysis tool that allows the right decision making for evidence-based medicine by systematically and objectively selects target literature, quantifies the results of individual studies, and provides the overall effect size. For data integration and meta-analysis, we investigated the strength points about the introduction and application of Adobe Acrobet Reader and Python-based Jupiter Lab software, a computer tool that extracts accurate statistical figures from graphs. We used as an example data that was statistically verified throught an previous studies and the original data could be obtained from ClinicalTrials.gov. As a result of meta-analysis of the original data and the extraction values of each computer software, there was no statistically significant difference between the extraction methods. In addition, the intra-rater reliability of between researchers was confirmed and the consistency was high. Therefore, In terms of maintaining the integrity of statistical information, measurement using a computational tool is recommended rather than the classically used methods.

Computer Assisted EPID Analysis of Breast Intrafractional and Interfractional Positioning Error (유방암 방사선치료에 있어 치료도중 및 분할치료 간 위치오차에 대한 전자포탈영상의 컴퓨터를 이용한 자동 분석)

  • Sohn Jason W.;Mansur David B.;Monroe James I.;Drzymala Robert E.;Jin Ho-Sang;Suh Tae-Suk;Dempsey James F.;Klein Eric E.
    • Progress in Medical Physics
    • /
    • v.17 no.1
    • /
    • pp.24-31
    • /
    • 2006
  • Automated analysis software was developed to measure the magnitude of the intrafractional and interfractional errors during breast radiation treatments. Error analysis results are important for determining suitable planning target volumes (PTV) prior to Implementing breast-conserving 3-D conformal radiation treatment (CRT). The electrical portal imaging device (EPID) used for this study was a Portal Vision LC250 liquid-filled ionization detector (fast frame-averaging mode, 1.4 frames per second, 256X256 pixels). Twelve patients were imaged for a minimum of 7 treatment days. During each treatment day, an average of 8 to 9 images per field were acquired (dose rate of 400 MU/minute). We developed automated image analysis software to quantitatively analyze 2,931 images (encompassing 720 measurements). Standard deviations ($\sigma$) of intrafractional (breathing motion) and intefractional (setup uncertainty) errors were calculated. The PTV margin to include the clinical target volume (CTV) with 95% confidence level was calculated as $2\;(1.96\;{\sigma})$. To compensate for intra-fractional error (mainly due to breathing motion) the required PTV margin ranged from 2 mm to 4 mm. However, PTV margins compensating for intefractional error ranged from 7 mm to 31 mm. The total average error observed for 12 patients was 17 mm. The intefractional setup error ranged from 2 to 15 times larger than intrafractional errors associated with breathing motion. Prior to 3-D conformal radiation treatment or IMRT breast treatment, the magnitude of setup errors must be measured and properly incorporated into the PTV. To reduce large PTVs for breast IMRT or 3-D CRT, an image-guided system would be extremely valuable, if not required. EPID systems should incorporate automated analysis software as described in this report to process and take advantage of the large numbers of EPID images available for error analysis which will help Individual clinics arrive at an appropriate PTV for their practice. Such systems can also provide valuable patient monitoring information with minimal effort.

  • PDF

A Design Process to Generate Consumers' Preference Form (소비자 선호형태 창출 프로세스에 관한 연구)

  • 김태호;홍정표;양종렬;오해춘
    • Archives of design research
    • /
    • v.11 no.2
    • /
    • pp.275-284
    • /
    • 1998
  • It's required to develop new design process which reflects objective and quantative data of real market structure and consumers' demand and to understand, use statistical packages and softwares for it in order to make a product design which can satisfy consumr's needs. Product design approachs have, however, merely focused on simple methods of design and have not been improved much so far with regards to customer-oriented design. Therefore, This study aims to help customer-oriented product design with validity and reliability by suggesting successful product design process based on reviewing existing literatures and by providing each steps of design process with optimal approaches reflecting consumers' preference. The results of this study may provide all design related fields with theoretical framework of successful design process and may reinforce competitive ability of design with the development of customer-oriented design process. We need to verify vality of this study by doing some case studies with various products in real market situations and need to develop measurements and survey methods to measure exact customers' perception dimensions.

  • PDF

An Enhanced Feature Selection Method Based on the Impurity of Words Considering Unbalanced Distribution of Documents (문서의 불균등 분포를 고려한 단어 불순도 기반 특징 선택 방법)

  • Kang, Jin-Beom;Yang, Jae-Young;Choi, Joong-Min
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.9
    • /
    • pp.804-816
    • /
    • 2007
  • Sample training data for machine learning often contain irrelevant information or redundant concept. It is also the case that the original data may include noise. If the information collected for constructing learning model is not reliable, it is difficult to obtain accurate information. So the system attempts to find relations or regulations between features and categories in the teaming phase. The feature selection is to remove irrelevant or redundant information before constructing teaming model. for improving its performance. Existing feature selection methods assume that the distribution of documents is balanced in terms of the number of documents for each class and the length of each document. In practice, however, it is difficult not only to prepare a set of documents with almost equal length, but also to define a number of classes with fixed number of document elements. In this paper, we propose a new feature selection method that considers the impurities among the words and unbalanced distribution of documents in categories. We could obtain feature candidates using the word impurity and eventually select the features through unbalanced distribution of documents. We demonstrate that our method performs better than other existing methods via some experiments.

A Survey on the Health Management Technology for Aircraft Gas Turbine Engine (항공기용 가스터빈 엔진의 건전성 관리기술 발전 동향)

  • Park, Iksoo;Kim, Junghoe;Min, Seongki
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.21 no.5
    • /
    • pp.108-120
    • /
    • 2017
  • The technology for health management of gas turbine engine has grown with engine development itself for 60 years and regarded as important area for performance monitoring and maintenance of the system. This technology which is based on several areas such as advanced measurement technology, electronics, software technology and reliable system modeling is realized. This paper analyzed the past, current and future technical trend of a technically advanced country and compared with domestic research status. Based on the analysis, the key research topics for the realization of technology is suggested.

Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy (제로 트러스트를 위한 소프트웨어 정의 경계(SDP) 인증 메커니즘 제안 및 ECC 암호 구현)

  • Lee, Yun-kyung;Kim, Jeong-nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1069-1080
    • /
    • 2022
  • Zero trust, which means never trust anything before verifying it, is emerging as a hot issue in security field. After authenticating users, zero trust establishes network boundaries so that only networks in the trusted range can be accessed. This concept is also consistent with the concept of SDP, which performs pre-verification and creates a network boundary with a dynamic firewall so that clients can access only as many as they have permission to connect. Therefore, we recommend the SDP model as an example of how zero trust can be achieved in a zero trust architecture. In this paper, we point out the areas where SDP needs to be modified for zero trust and suggest ways to overcome them. In addition, we propose an onboarding method, which is one of the processes for becoming an SDP entity, and present performance measurement results.

Development of Vibration Prediction Program of Gas Pipeline by Construction Vibration (건설진동에 의한 가스배관의 진동예측 프로그램 개발)

  • Jeong S. Y.;Hong S. K.;Kim J. H.;Koh J. P.
    • Journal of the Korean Institute of Gas
    • /
    • v.5 no.2 s.14
    • /
    • pp.30-35
    • /
    • 2001
  • Presently, working gas pipelines are being subjected to the influence of construction vibration. Especially on subway and road construction, gas pipelines are being influenced to construction vibration caused by use of construction equipment, passage of a large-sized vehicle and blasting. Buried gas pipelines are subjected to the influence of vibration caused by blast in the vicinity of pipeline, exposed gas pipelines are subjected to the influence of vehicle vibration. Therefore, in the study, it is developed to vibration prediction program of gas pipeline by analyzing measured construction vibration. This program is able to predict vibration of gas pipeline according to field conditions by using the results of structural finite element analysis and empirical equation by reliability analysis. And, this program contains the database of construction vibration. Additionally, this program is able to compute estimated blast vibration equation using measured blast vibration data in the field and to form graph of allowable charging gunpowder per delayed-action with the change of blast velocity. Therefore, field workers are able to predict construction vibration around gas pipeline and estimate safety of gas pipeline.

  • PDF

Experiments on An Network Processor-based Intrusion Detection (네트워크 프로세서 기반의 침입탐지 시스템 구현)

  • Kim, Hyeong-Ju;Kim, Ik-Kyun;Park, Dae-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.319-326
    • /
    • 2004
  • To help network intrusion detection systems(NIDSs) keep up with the demands of today's networks, that we the increasing network throughput and amount of attacks, a radical new approach in hardware and software system architecture is required. In this paper, we propose a Network Processor(NP) based In-Line mode NIDS that supports the packet payload inspection detecting the malicious behaviors, as well as the packet filtering and the traffic metering. In particular, we separate the filtering and metering functions from the deep packet inspection function using two-level searching scheme, thus the complicated and time-consuming operation of the deep packet inspection function does not hinder or flop the basic operations of the In-line mode system. From a proto-type NP-based NIDS implemented at a PC platform with an x86 processor running Linux, two Gigabit Ethernet ports, and 2.5Gbps Agere PayloadPlus(APP) NP solution, the experiment results show that our proposed scheme can reliably filter and meter the full traffic of two gigabit ports at the first level even though it can inspect the packet payload up to 320 Mbps in real-time at the second level, which can be compared to the performance of general-purpose processor based Inspection. However, the simulation results show that the deep packet searching is also possible up to 2Gbps in wire speed when we adopt 10Gbps APP solution.

Accuracy Assessment of Aerial Triangulation of Network RTK UAV (네트워크 RTK 무인기의 항공삼각측량 정확도 평가)

  • Han, Soohee;Hong, Chang-Ki
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.6
    • /
    • pp.663-670
    • /
    • 2020
  • In the present study, we assessed the accuracy of aerial triangulation using a UAV (Unmanned Aerial Vehicle) capable of network RTK (Real-Time Kinematic) survey in a disaster situation that may occur in a semi-urban area mixed with buildings. For a reliable survey of check points, they were installed on the roofs of buildings, and static GNSS (Global Navigation Satellite System) survey was conducted for more than four hours. For objective accuracy assessment, coded aerial targets were installed on the check points to be automatically recognized by software. At the instance of image acquisition, the 3D coordinates of the UAV camera were measured using VRS (Virtual Reference Station) method, as a kind of network RTK survey, and the 3-axial angles were achieved using IMU (Inertial Measurement Unit) and gimbal rotation measurement. As a result of estimation and update of the interior and exterior orientation parameters using Agisoft Metashape, the 3D RMSE (Root Mean Square Error) of aerial triangulation ranged from 0.153 m to 0.102 m according to the combination of the image overlap and the angle of the image acquisition. To get higher aerial triangulation accuracy, it was proved to be effective to incorporate oblique images, though it is common to increase the overlap of vertical images. Therefore, to conduct a UAV mapping in an urgent disaster site, it is necessary to acquire oblique images together rather than improving image overlap.

First Report on External Quality Assurance Study of Radioassay of Thyroid Related Hormones - First One Year of Operation From 1989. 9 To 1990. 8- (갑상선 호르몬의 외부정도 관리 분석 -1989년 9월부터 1990년 8월까지 첫해 시행 결과-)

  • Lee, Dong-Soo;Cho, Bo-Youn;Kwark, Cheol-Eun;Seo, Il-Taek;Chung, June-Key;Lee, Myung-Chul;Koh, Chang-Soon
    • The Korean Journal of Nuclear Medicine
    • /
    • v.25 no.2
    • /
    • pp.266-279
    • /
    • 1991
  • 1989년 9월부터 1990년 8월까지 국제 원자력기구의 지역 계획에 의해 국내 26개 (후반부 31개)의 기관이 참가하여 T3, T4, TSH를 측정하여 결과를 모으고, 외부정도관적를 시행한 결과가 다음과 같다. 1) 외부정도관리를 위한 컴퓨터 소프트웨어를 작성하였다. 데이타의 입력, 정도 분석, 월별 보고, 분기별 보고 및 수행 분석 프로그램을 만들되 전체 검사실결과에서 추린 평균값(all laboratories trimmed mean: ALTM)으로 모집단평균을 삼아 편차, 편이, 편이평균 그리고 이들의 경시적 변화를 분석하도록 하였다. 2) 전후반 2회에 나누어 만든 및치 사이의 편차는 유의하지 않았다. T3값의 변이계수는 7.2%이하(정상 T3 값) 또는 9.2%와 13.4%사이 (높은 T3 값), 74 값의 변이계수는 4.6%이하(정상 또는 높은 T4값), 5.4%와 9.5%사이(낮은 T4값)이었다. TSH는 정상범위 값에서 21.7%이하의 변이 계수를 보였고 정상보다 낮거나 높은 TSH의 풀은 8 7%와 21.2%사이의 변이제수를 보였다. 3) 전체 검사실 추린 평균값(ALTM)에 따른 변이계수의 변동은, ALTM이 정상 T4값범위일 때 변이계수는 15%이하이었고, 낮은 T4값일 때는 중간값이 15%이고 분포범위는 50%까지이었다. T3값의 변이계수는 대체로 20%이하이었다. TSH의 변이계수는 1mU/L를 전후로 급격히 상승하여 200%에 달하였다. 4) 3표준편차보다 높거나 낮은 값을 보인 검사실들의 분포는 전체 검사실결과에서 추린 평균값(ALTM)과 상관없었다. 5) 첨가한 T3, T4, TSH에 대한 회수율은 T4는 104, 106%, T3는 67%, 74%, TSH는 87%, 86%이었다. 이상과 같이, 저자들이 만든 소프트웨어 프로그램으로 외부정도관리를 위하여 쉽게 데이터를 분석하고 보고서를 작성하여 갑상선호르몬의 경사신뢰도를 평가할 수 있게 되었으며, 위에 요약한 첫 해의 외부정도관리 결과를 바탕으로 참가기관의 동의하에, 앞으로 정도관리 항목의 확대와 외부정도관리의 지속적인 시행이 바람직하다고 생각하였다.

  • PDF