• Title/Summary/Keyword: 실패확률

Search Result 189, Processing Time 0.023 seconds

A Study of Inter-observer Agreements of Spiral Chest Computed Tomography in Diagnosing Pulmonary Embolism (폐색전증에서 나선형 컴퓨터 전산화 단층촬영의 관찰자간의 일치도에 관한 연구)

  • Kim, Yang-Ki;Lee, Young Mok;Kim, Ki-up;Uh, Soo-taek;Kim, Yong Hoon;Park, Choon Sik;Hwang, Jung-Hwa;Kim, Dong Hun;Goo, Dong-Erk;Choi, Deuk-Lin
    • Tuberculosis and Respiratory Diseases
    • /
    • v.59 no.5
    • /
    • pp.473-479
    • /
    • 2005
  • Background : A pulmonary embolism often presents with nonspecific symptoms and signs. However, a delayed diagnosis can result in catastrophic outcome. The majority of preventable deaths associated with a pulmonary embolism can be ascribed to a missed diagnosis rather than to the failure of existing treatments. Therefore, accurate and rapid diagnostic methods are essential for the management of a pulmonary embolism. The recent generation of multidetector-row spiral CT scanners appears to outperform other imaging modalities in detecting a central and peripheral pulmonary embolism. However, there are some variations in the interpretations of the findings between observers. This study examined the inter-observer differences of the diagnoses in patients with a pulmonary embolism. Method : 64 patients who were diagnosed with a pulmonary embolism either clinically or with spiral chest CT from 2002 to 2004, were included. Two thoracic radiologists interpreted the multidetector-row spiral CT in terms of the diagnosis of a pulmonary embolism and the location of the thrombus independently. Among 64 patients, 14 patients were excluded because there was no evidence of a pulmonary embolism or there was different interpretation of the pulmonary embolism between radiologists. A clinical diagnosis was based on "Rules for predicting the probability of embolism". Results : The mean score of the patients according to the Wells method was $3.91{\pm}0.30$ (0-9). The accordance of the radiologists was 95% in the main, 85% in the lobar, 91.2% in the segmental, and 96% in the sub-segmental pulmonary arteries. After excluding the negative interpretation from both radiologists, their agreement was 76.2%(${\kappa}.$ 0.83) in the main, 57.6%(${\kappa}.$ 0.63) in the lobar, 51.5%(${\kappa}.$ 0.63) in the segmental, and 34.6%(${\kappa}.$ 0.49) in the sub-segmental pulmonary arteries. Conclusion : Chest CT has been recently applied to patients suspected of having a pulmonary embolism. It was found that spiral CT is a rapid test for diagnosing a thrombus, and there was reliable accordance between the observers from the area of the large pulmonary arteries. However, there was a lack of agreement between the observers in diagnosing thrombi located distal to the sub-segmental arteries.

Establishment of the High-Throughput Hair Roots' DNA Isolation System and Verification of Its Appicability for Hanwoo Traceability Using the 11 Microsatellite Makes (대량 모근 시료 DNA 분리 체계 확립과 11 microsatellite maker를 사용하는 한우 생산이력제로의 적용가능성 검증)

  • Lim, Hyun-Tae;Lee, Sang-Ho;Yoo, Chae-Kyoung;Sun, Du-Won;Cho, In-Cheol;Yoon, Du-Hak;Yang, Dae-Young;Cheong, Il-Cheong;Lee, Jung-Gyu;Jeon, Jin-Tae
    • Journal of agriculture & life science
    • /
    • v.44 no.6
    • /
    • pp.91-99
    • /
    • 2010
  • We used a multiplex PCR primer set composed of 11 microsatellite (MS) markers and two sexing markers for gender detection. Genomic DNA extracted from hair roots of 3,510 Hanwoo were genotyped. Based on the 11MS markers, no animals had identical genotypes(TGLA227, BM2113, TGLA53, ETF10, SPS115, TGLA122, ETH3, ETH225, BM1824 and INRA23). The expected probability of identity among genotypes of random individuals (PI), the probability of identity among genotypes from random half-sibs ($PI_{half-sibs}$) and among genotypes of random individuals, and the probability of identity among genotypes from random sibs ($PI_{sibs}$) were estimated as $1.31{\times}10^{-23}$, $2.52{\times}10^{-16}$and $1.09{\times}10^{-6}$, respectively using the API-CALC program, version 1.0. We successfully completed the genotype analysis of 3,510 Hanwoo with a 3.93% genotyping failure rate. It was revealed that extracting DNA from the hair root was a time-efficient and cost-effective method to collect specimens for DNA isolation from live animals. This method also minimized stress for the animals during specimen collection. Among the hair roots from the back, belly, upper tail and lower tail, 5~13 hair roots of the lower tail led to the best genotype analysis results. Finally, we established a 96-well-format method of DNA preparation applicable for high- throughput genotype analysis.

Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States (유비쿼터스 서비스 상태지속을 지원하는 안전한 Jini 서비스 구조)

  • Kim, Sung-Ki;Jung, Jin-Chul;Park, Kyung-No;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.157-166
    • /
    • 2008
  • The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.

New Contention Window Control Algorithm for TCP Performance Enhancement in IEEE 802.11 based Wireless Multi-hop Networks (IEEE 802.11 기반 무선 멀티홉 망에서 TCP의 성능향상을 위한 새로운 경쟁 윈도우 제어 알고리즘)

  • Gi In-Huh;Lee Gi-Ra;Lee Jae-Yong;Kim Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.165-174
    • /
    • 2006
  • In this paper, we propose a new contention window control algorithm to increase TCP performance in wireless multi-hop networks. The new contention window control algorithm is suggested to reduce the hidden and exposed terminal problems of wireless multi-hop networks. Most of packet drops in wireless multi-hop networks results from hidden and exposed terminal problems, not from collisions. However, in normal DCF algorithm a failed user increases its contention window exponentially, thus it reduces the success probability of fined nodes. This phenomenon causes burst data transmissions in a particular node that already was successful in packet transmission, because the success probability increases due to short contention window. However, other nodes that fail to transmit packet data until maximum retransmission attempts try to set up new routing path configuration in network layer, which cause TCP performance degradation and restrain seamless data transmission. To solve these problems, the proposed algorithm increases the number of back-of retransmissions to increase the success probability of MAC transmission, and fixes the contention window at a predetermined value. By using ns-2 simulation for the chain and grid topology, we show that the proposed algorithm enhances the TCP performance.

Separated Control Signaling Protocol for WDM Optical Networks (파장 분할 다중화 방식을 사용하는 광 전송망을 위한 분리 제어 신호 방식)

  • No, Seon-Sik;Kim, Su-Hyeon;So, Won-Ho;Kim, Yeong-Cheon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.6
    • /
    • pp.1-11
    • /
    • 2000
  • In this paper, we propose a novel control signaling protocol that efficiently controls connection setup and increases the utilization of network resources. The proposed protocol, Separated Control Signaling Protocol(SCSP), separates bearer control from call control lot WDM optical networks. The main function of call control is to check the availability of network resources such as wavelengths and receivers at destination node. Bearer control is to reserve and assign wavelengths. The signaling architecture of this protocol consists of call controller and hearer controller The call controller handles call setup and release, activates the beater controller, and manages the status of call and bearer. The bearer controller reserves wavelengths, sets up bearer, tears down bearer. and notifies the status of beater to call controller. The state transition diagrams of each controller are designed. Using control messages and related primitives, the information flows for call setup and bearer setup, hearer teardown and call release, and reaction for setup failures are described to evaluate the performance. The simulation results show that the separated control signaling protocol is superior to conventional one in terms of call blocking probability and resource utilization.

  • PDF

Toward Successful Adaptation from Games to Films (게임 원작의 성공적인 각색)

  • Park, Soo-Jin;Song, Seung-Keun
    • Journal of Korea Game Society
    • /
    • v.11 no.1
    • /
    • pp.3-14
    • /
    • 2011
  • Nowadays, it becomes a widespread and frequent practice that one content as a source is converted into diverse media formats. However, it is hard to answer the question whether the converted content might become successful again. That is mainly because one needs to have clear understanding about the characteristics of the target media format. This explains the phenomenon that there are very few successful movies which have been adapted from successful digital games. Thus, it is essential to conduct thorough and sufficient researches on the success factors of the adapted movies. The objective of this research is to investigate and analyze common factors of successful movies from digital games in terms of their visuals and narratives. We have found that successfully adapted movies from digital games shares three commonalities in the work of adaptation for effective cinematic impacts. Firstly, the adaptors of the successful movies have composed scripts with riveting storytelling through simplification, compression and removal of the original story. Secondly, they have satisfactorily re-implemented the original game avatars in the process of adaptation. Finally, they have effectively discovered inherent attractiveness of the original games and incorporated into the target movies with faithful following of cinematic grammar. We expect that our work contribute to reduce failure rate of the prospective movies converted from games by the proposed analysis of success factors shared among successfully adapted movies through the proposed case studies.

Robust Obstacle Detection and Avoidance Algorithm for Infrastructure-Based Vehicle Communication Under Signal Interference (중계기를 통한 다중 차량 간 통신 상황에서 신호 간섭에 강한 장애물 감지 및 회피 알고리즘)

  • Choi, Byung Chan;Kwon, Hyuk Chan;Son, Jin Hee;Nam, Haewoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.574-580
    • /
    • 2016
  • In this paper, we will introduce the system that can control multiple vehicles on the road through Single Board Computers and V2I (Vehicle-To-Infrastructure). Also, we will propose the group evasive maneuver decision algorithm, which plays a critical role in deciding whether the vehicles in the system have to conduct evasive maneuvers to avoid obstacles on the road. In order to test this system, we have utilized Wi-Fi and TCP/IP for establishing the communication between multiple vehicles and the relay server, and observed their driving states on the road with obstacles. During the experiments, we have discovered that our original decision algorithm possesses high failure rate when there is frequency interference in ISM (Industrial Scientific Medical) band. In order to reduce this failure rate, we have implemented the data transition detector. This paper will focus on how the use of data transition detector can affect the reliability of the system under the frequency interference of ISM band. If this technology is improved and applied in the field, we will effectively deal with such dangerous situations as multiple collision accidents through vehicle-to-vehicle communication or vehicle-to-infrastructure communication. Furthermore, this can be applied to the autonomous driving technologies. This can be used as the reference data for the development of the similar system.

A Study on Data Preprocessing for the Activity-Travel Simulator: A Case of FEATHERS Seoul (활동기반 시뮬레이터 입력 자료의 전처리 방안에 대한 연구: FEATHERS Seoul을 사례로)

  • Cho, Sungjin;Hwang, Jeong Hwan;Bellemans, Tom;Kochan, Bruno;Lee, Won Do;Choi, Keechoo;Joh, Chang-Hyeon
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.5
    • /
    • pp.531-543
    • /
    • 2014
  • Research on activity-based travel demand forecasting and activity-travel simulator has received an international attention for the last two decades. Ways to develop the activity-based simulator may be manifold. It is obvious that importing an existing simulator that has been proven internationally likely reduces the development cost and the risk of failure. By definition of the activity-based approach, however, the details of an activity-based simulator inevitably relies on particular social, economic and cultural characteristics of the society where the simulator is developed. When importing such a simulator from overseas, the researcher should be aware of the importance of tuning the system for the society to which the imported system is applied. There are many potential works on this, including for example the tuning of data structure that is likely different form of the original system. The authors are yet aware of certain research on those. The current paper aims to report the result of transforming the input data for applying the existing activity-travel simulator to Seoul. The paper first introduces FEATHERS that was developed in Belgium having Albatross which is the core of system. FEATHERS Seoul that is under development and modified version of the original FEATHERS is briefly described and the related problems are discussed. The paper then explored to resolve and to alleviate such problems.

Efficient Fault-Tolerant Multicast on Hypercube Multicomputer System (하이퍼 큐브 컴퓨터에서 효과적인 오류 허용 다중전송기법)

  • 명훈주;김성천
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.273-279
    • /
    • 2003
  • Hypercube multicomputers have been drawing considerable attention from many researchers due to their regular structure and short diameter. One of keys to the performance of Hypercube is the efficiency of communication among processors. Among several communication patterns, multicast is important, which is found in a variety of applications as data replication and signal processing. As the number of processors increases, the probability of occurrences of fault components also increases. So it would be desirable to design an efficient scheme that multicasts messages in the presence of faulty component. In fault-tolerant routing and multicast, there are local information based scheme, global information based scheme and limited information based scheme in terms of information. In general, limited information is easy to obtain and maintain by compressing information in a concise format. In this paper, we propose a new routing scheme and a new multicast scheme using recently proposed fully reachability information scheme and new local information scheme. The proposed multicast scheme increases multicast success possibility and reduce deroute cases. Experiments show that multicast success possibility can increase at least 15% compared to previous method.

A Study on MAC Protocol Design for Mobile Healthcare (모바일 헬스케어를 위한 MAC 프로토콜 설계에 관한 연구)

  • Jeong, Pil-Seong;Kim, Hyeon-Gyu;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.323-335
    • /
    • 2015
  • Mobile healthcare is a fusion of information technology and biotechnology and is a new type of health management service to keep people's health at anytime and anywhere without regard to time and space. The WBAN(Wireless Body Area Network) technology that collects bio signals and the data analysis and monitoring technology using mobile devices are essential for serving mobile healthcare. WBAN consisting of users with mobile devices meet another WBAN during movement, WBANs transmit data to the other media. Because of WBAN conflict, several nodes transmit data in same time slot so a collision will occur, resulting in the data transmission being failed and need more energy for re-transmission. In this thesis, we proposed a MAC protocol for WBAN with mobility to solve these problems. First, we proposed a superframe structure for WBAN. The proposed superframe consists of a TDMA(Time Division Muliple Access) based contention access phase with which a node can transmit data in its own time slot and a contention phase using CSMA/CA algorithm. Second, we proposed a network merging algorithm for conflicting WBAN based on the proposed MAC protocol. When a WBAN with mobility conflicts with other WBAN, data frame collision is reduced through network reestablishment. Simulations are performed using a Castalia based on the OMNeT++ network simulation framework to estimate the performance of the proposed superframe and algorithms. We estimated the performance of WBAN based on the proposed MAC protocol by comparing the performance of the WBAN based on IEEE 802.15.6. Performance evaluation results show that the packet transmission success rate and energy efficiency are improved by reducing the probability of collision using the proposed MAC protocol.