• Title/Summary/Keyword: 프로파일 관리

Search Result 478, Processing Time 0.032 seconds

Development of Preliminary Quality Assurance Software for $GafChromic^{(R)}$ EBT2 Film Dosimetry ($GafChromic^{(R)}$ EBT2 Film Dosimetry를 위한 품질 관리용 초기 프로그램 개발)

  • Park, Ji-Yeon;Lee, Jeong-Woo;Choi, Kyoung-Sik;Hong, Semie;Park, Byung-Moon;Bae, Yong-Ki;Jung, Won-Gyun;Suh, Tae-Suk
    • Progress in Medical Physics
    • /
    • v.21 no.1
    • /
    • pp.113-119
    • /
    • 2010
  • Software for GafChromic EBT2 film dosimetry was developed in this study. The software provides film calibration functions based on color channels, which are categorized depending on the colors red, green, blue, and gray. Evaluations of the correction effects for light scattering of a flat-bed scanner and thickness differences of the active layer are available. Dosimetric results from EBT2 films can be compared with those from the treatment planning system ECLIPSE or the two-dimensional ionization chamber array MatriXX. Dose verification using EBT2 films is implemented by carrying out the following procedures: file import, noise filtering, background correction and active layer correction, dose calculation, and evaluation. The relative and absolute background corrections are selectively applied. The calibration results and fitting equation for the sensitometric curve are exported to files. After two different types of dose matrixes are aligned through the interpolation of spatial pixel spacing, interactive translation, and rotation, profiles and isodose curves are compared. In addition, the gamma index and gamma histogram are analyzed according to the determined criteria of distance-to-agreement and dose difference. The performance evaluations were achieved by dose verification in the $60^{\circ}$-enhanced dynamic wedged field and intensity-modulated (IM) beams for prostate cancer. All pass ratios for the two types of tests showed more than 99% in the evaluation, and a gamma histogram with 3 mm and 3% criteria was used. The software was developed for use in routine periodic quality assurance and complex IM beam verification. It can also be used as a dedicated radiochromic film software tool for analyzing dose distribution.

The Method for Transforming the Shape File in ESRI into the Oracle Spatial DB for the Spatial DB Construction of the Drainage System (하수관거 공간DB 구축을 위한 ESRI 공간 파일의 오라클 공간DB 자동 변환 기법)

  • Kim, Ki-Uk;Hwang, Hyun-Suk;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.989-996
    • /
    • 2009
  • Recently, use of the GIS (Geographic Information System) for the disaster of the urban inundation is increasing. The digital disaster map is the system which analyzes the occurrence area of inundation in the past and forecasts the flood areas by the hydrology method. The development of the system which simulates the flood forecast area by the SWMM(Storm Water Management System) and hydrology method and displays the danger areas is required for the construction of the inundation forecast system. And the spatial database which contains information of the urban facilities such as the street and building and the sewer system such as the manhole and drainage and the result of the hydrology analysis is constructed. In this paper, we propose the method for transforming the Shape File in ESRI into the Oracle spatial database to construct the spatial data for the drainage systems and urban facilities using the Shape File format in the ESRI. We suggest the algorithm for the transformation of the data format, and develop the prototype system to display the inundation area using the spatial database.

  • PDF

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

A Scheme of Embedded System Performance Evaluations Using Embedded Kernel Trace Toolkit (임베디드 커널 추적 도구를 이용한 임베디드 시스템 성능 측정 기법)

  • Bae, Ji-Hye;Yoon, Nam-Sik;Park, Yoon-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.462-475
    • /
    • 2007
  • The Embedded system provides human-centric services in many fields of education, information, industry and service, and monitoring programs have been variously developed for managing, controlling and testing for these embedded systems. Currently, many kernel trace toolkits are being used for monitoring. These trace toolkits are so complicate that we present $ETT^{plus}$, our simple and explicit embedded kernel trace toolkit, for embedded systems and describe the transmission method for trace data between the embedded target system and the host system. $ETT^{plus}$ provides the solution to solve the problems such as the difficult kernel patch and file system dependency in existing kernel trace toolkits like LTT. Furthermore, we present the experimental results about embedded system performance evaluations such as system call execute time or network data transmission time by using $ETT^{plus}$.

Designing a Repository Independent Model for Mining and Analyzing Heterogeneous Bug Tracking Systems (다형의 버그 추적 시스템 마이닝 및 분석을 위한 저장소 독립 모델 설계)

  • Lee, Jae-Kwon;Jung, Woo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.103-115
    • /
    • 2014
  • In this paper, we propose UniBAS(Unified Bug Analysis System) to provide a unified repository model by integrating the extracted data from the heterogeneous bug tracking systems. The UniBAS reduces the cost and complexity of the MSR(Mining Software Repositories) research process and enables the researchers to focus on their logics rather than the tedious and repeated works such as extracting repositories, processing data and building analysis models. Additionally, the system not only extracts the data but also automatically generates database tables, views and stored procedures which are required for the researchers to perform query-based analysis easily. It can also generate various types of exported files for utilizing external analysis tools or managing research data. A case study of detecting duplicate bug reports from the Firfox project of the Mozilla site has been performed based on the UniBAS in order to evaluate the usefulness of the system. The results of the experiments with various algorithms of natural language processing and flexible querying to the automatically extracted data also showed the effectiveness of the proposed system.

A Methodology for exchanging Business Process Model using XMI (XMI를 활용한 비즈니스 프로세스 모델 호환 방법론)

  • Lim, Tae-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.3
    • /
    • pp.73-88
    • /
    • 2006
  • As a computerized application for controlling enterprise processes, BPM(Business Process Management) has been received such concerns that many solution vendors developed their own process definition and storage methods. The fact causes the needs of process modeling standards for process model exchange and at the same time, requires the appropriate methodology for adopting the global standards. In this paper, we propose a transformation methodology of BPMN-based file into XMI(XML Metadata Interchange)-based neutral file format. We devised translation templates for 21 workflow patterns, and compared the results with BPEL4WS(Business Process Execution Language for Web Services) translation. As a result, our XMI transformation model enables more complete translation of process model in comparison with existing model, and thus can be practically utilized to the BPM vendors adopting BPMN standards.

  • PDF

Design and Implementation of A JungGanBo Authoring Tool for Traditional Korean Music (전통악보 정간보를 위한 저작도구의 설계 및 구현)

  • Lee, Sang-Bum;Lee, Yong-Hoon;Choi, Eh-Kwon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.550-558
    • /
    • 2010
  • Jungganbo is a writing method for the Korean traditional music. Since writing the Korean music needs to be done by hand and Chinese characters are used, only an expert musician might handle Jungganbo. In this paper, an authoring software tool for Jungganbo is introduced. It is useful for anybody who wants to compose the Korean tradition music with a computer. This tool also enables to standardize writing techniques of Jungganbo because a musical score was done by hands without using an authoring tool. In addition, this authoring tool can be easily used since its environment is very similar to other windows-based programs such as Ms-word and Hwp. Not only the beginners but also the experts can use this authoring tool for their Korean traditional music writing easily.

The extension of the User Controlled LightPath to support a network-level Articulated Private Network (네트워크 레벨의 Articulated Private Network을 지원하기 위한 User Controlled LightPath의 확장)

  • Yu, Yeongjae;Kim, Yusung;Chon, Kilnam;Kim, Min-A;Hong, Wontaek;Gong, Jeong-Wook
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.140-145
    • /
    • 2007
  • The Lambda Networking is emerging to provide the high bandwidth stably for advanced applications such as a large file transfer in High Energy Physics and an Uncompressed HDTV streaming. The User Controlled LightPath(UCLP) is a software to facilitate the Lambda Networking. The UCLP is scalable as using Web Services to define and manage network resources. In this paper, we describe how we deployed the UCLP into KREONet2 and GLORIAD-KR. We also present that the original UCLP creates only a link-level APN due to a SONET technology. As employing a Virtual LAN (VLAN) of the layer2 technology in the UCLP, we can efficiently create a network-level APN.

  • PDF

Factors Affecting Suicidal Ideation of Depressed Adults by Age (우울감있는 성인의 나이에 따른 자살생각 영향요인)

  • Kwon, Myoungjin
    • Journal of Digital Convergence
    • /
    • v.16 no.4
    • /
    • pp.267-276
    • /
    • 2018
  • The purpose of the study was to provide basic data for planning and offering nursing intervention to prevent suicide attempts by identifying the factors influencing the suicidal thoughts of depressed adults. The subjects of this study were 1,202 individuals who answered clearly in 2013-2015 National Health and Nutrition Survey. A composite sample plan file was generated using the IBM SPSS 23.0 program, and then the data were weighted and analyzed. Suicidal ideation was influenced by income (50-60s), number of family members (50-60s), marital status (40-50s), subjective health (30-50s, over 70s), stress (30s, over 50s), economic activity status (50s), diabetes (60s or older), alcohol consumption (60s), and Body Mass Index (BMI) (40s). These results suggest that tailor-made interventions for the prevention of suicide need to take into account the general and health-related factors of the subjects.

Design Plan of Secure IoT System based Common Criteria (CC 기반의 안전한 IoT 시스템 설계 방안)

  • Kim, Ju-Hun;Jung, Hyun-Mi;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.61-66
    • /
    • 2017
  • Recently, IoT technology is rapidly developing with the keyword "Anytime, Anywhere, Convenient". In addition, security problems in IoT systems are exploding and the damage is increasing as well. In this paper, we propose a method to develop IoT system safely by using internationally recognized CC evaluation in ICT by identifying the standardization and security technology development status defining IoT system security requirements. For this purpose, IoT system and service security aspects are analyzed. Based on this, it is possible to design the security functional requirements and to demonstrate the rationale of the security objective through the correspondence relation, and it is possible to design the protection profile for the IoT system. This is a sufficient basis for the development methodology to be presented in this paper because it is used as a means of referring to the set of security requirements of administrators, developers, and users.