• Title/Summary/Keyword: CRC software

Search Result 23, Processing Time 0.021 seconds

Artificial Neural Network for Prediction of Distant Metastasis in Colorectal Cancer

  • Biglarian, Akbar;Bakhshi, Enayatollah;Gohari, Mahmood Reza;Khodabakhshi, Reza
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.3
    • /
    • pp.927-930
    • /
    • 2012
  • Background and Objectives: Artificial neural networks (ANNs) are flexible and nonlinear models which can be used by clinical oncologists in medical research as decision making tools. This study aimed to predict distant metastasis (DM) of colorectal cancer (CRC) patients using an ANN model. Methods: The data of this study were gathered from 1219 registered CRC patients at the Research Center for Gastroenterology and Liver Disease of Shahid Beheshti University of Medical Sciences, Tehran, Iran (January 2002 and October 2007). For prediction of DM in CRC patients, neural network (NN) and logistic regression (LR) models were used. Then, the concordance index (C index) and the area under receiver operating characteristic curve (AUROC) were used for comparison of neural network and logistic regression models. Data analysis was performed with R 2.14.1 software. Results: The C indices of ANN and LR models for colon cancer data were calculated to be 0.812 and 0.779, respectively. Based on testing dataset, the AUROC for ANN and LR models were 0.82 and 0.77, respectively. This means that the accuracy of ANN prediction was better than for LR prediction. Conclusion: The ANN model is a suitable method for predicting DM and in that case is suggested as a good classifier that usefulness to treatment goals.

A Custom Code Generation Technique for ASIPs from High-level Language (고급 언어에서 ASIP을 위한 전용 부호 생성 기술 연구)

  • Alam, S.M. Shamsul;Choi, Goangseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.31-43
    • /
    • 2015
  • In this paper, we discuss a code generation technique for custom transport triggered architecture (TTA) from a high-level language structure. This methodology is implemented by using TTA-based Co-design Environment (TCE) tool. The results show how the scheduler exploits instruction level parallelism in the custom target architecture and source program. Thus, the scheduler generates parallel TTA instructions using lower cycle counts than the sequential scheduling algorithm. Moreover, we take Tensilica tool to make a comparison with TCE. Because of the efficiency of TTA, TCE takes less execution cycles compared to Tensilica configurations. Finally, this paper shows that it requires only 7 cycles to generate the parallel TTA instruction set for implementing Cyclic Redundancy Check (CRC) applications as an input design, and presents the code generation technique to move complexity from the processor software to hardware architecture. This method can be applicable lots of channel Codecs like CRC and source Codecs like High Efficiency Video Coding (HEVC).

Survival of Colorectal Cancer in the Presence of Competing-Risks - Modeling by Weibull Distribution

  • Baghestani, Ahmad Reza;Daneshvar, Tahoura;Pourhoseingholi, Mohamad Amin;Asadzadeh, Hamid
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.3
    • /
    • pp.1193-1196
    • /
    • 2016
  • Background: Colorectal cancer (CRC) is the commonest malignancy in the lower gastrointestinal tract in both men and women. It is the third leading cause of cancer-dependent death in the world. In Iran the incidence of colorectal cancer has increased during the last 25 years. Materials and Methods: In this article we analyzed the survival of 447 colorectal patients of Taleghani hospital in Tehran using parametric competing-risks models. The cancers of these patients were diagnosed during 1985 - 2012 and followed up to 2013. The purpose was to assess the association between survival of patients with colorectal cancer in the presence of competing-risks and prognostic factors using parametric models. The analysis was carried out using R software version 3.0.2. Results: The prognostic variables included in the model were age at diagnosis, tumour site, body mass index and sex. The effect of age at diagnosis and body mass index on survival time was statistically significant. The median survival for Iranian patients with colorectal cancer is about 20 years. Conclusions: Survival function based on Weibull model compared with Kaplan-Meier survival function is smooth. Iranian data suggest a younger age distribution compared to Western reports for CRC.

Comparative Proteomics Analysis of Colorectal Cancer

  • Wang, Jun-Jiang;Liu, Ying;Zheng, Yang;Lin, Feng;Cai, Guan-Fu;Yao, Xue-Qing
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.4
    • /
    • pp.1663-1666
    • /
    • 2012
  • Background and Objective: Protein expression in colon and rectal cancer (CRC) and paired normal tissues was examined by two-dimensional gel electrophoresis (2-DE) to identify differentially expressed proteins. Materials and Methods: Five fresh colorectal cancer and paired adjacent normal tissues were obtained and differentially expressed protein spots were determined using PDQuest software, with identification on the basis of MALDI-TOF mass spectra. Results: Compared with normal colorectal mucosa, protein abnormal expression of 65 spots varying more than 1.5 times were found in 2-DE gels from colorectal cancer samples (P<0.05); forty-two proteins were up-regulated and 23 were down-regulated; twelve protein spots were identified using mass spectrometry, of which 8 were up-regulated, includimng HSPB1and Annexin A4, while 4 were down-regulated, the results being consistent with Western blot findings. Conclusions: Two-dimensional electrophoresis reference maps for CRC tissues and adjacent normal mucosa (NMC) were established and 12 differentially expressed proteins were identified. Up-regulated HSPB1 and Annexin A4 may play many important roles in the pathogenesis of colorectal cancer.

Design and Implementation of a 13.56 MHz RFID System (13.56 MHz RFID 시스템 설계 및 구현)

  • Lee, Sang-Hoon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.1
    • /
    • pp.46-53
    • /
    • 2008
  • This paper presents a 13.56 MHz RFID reader that can be used as a door-lock system for smart home security. The RFID reader consists of a transmitter, a receiver, and a data processing block. To verify the operation of the developed RFID reader, we present both a PSPICE simulation for transmitter/receiver and a digital simulation for data processing block. In particular, a CRC block for error detection of received data and a Manchester decoding block for position detection of collided data are designed using VHDL. In addition, we applied a binary search algorithm for multi-tag anti-collision. The anti-collision procedure is carried out by PIC microcontroller on software. The experimental results show that the developed reader can provide the right multi-tag recognition.

  • PDF

Design and Implementation of the subscriber MAC protocol in the BWA system

  • Hwang, You-Sun;Kim, Eung-bae
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.569-572
    • /
    • 2003
  • The broadband wireless access industry, which provides high-tate network connections to stationary sites, has matured to the point at which it now has a standard for second-generation wireless metropolitan area networks. IEEE Standard 802.16, with its WirelessMAN air interface, set the stage for widespread and effective deployments worldwide. This paper presents an implementation of media access control that can be applied to BWA (Broadband Wireless Access) system. Medium access control (MAC) is a key issue in multi-access networks where a common channel is shared by many users. The designed MAC prototype roughly consists of MAC Hardware and MAC Software. The MAC Hardware part includes timing process, MAC transmission control, MAC reception control, and CRC/HCS process. The MAC Software part includes control of MAC signaling, network interface, and Physical (PHY) control. The designed MAC protocol will be integrated with the PHY of BWA in future and we can test overall system performance of MAC and PHY.

  • PDF

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.

Development of a System for Hybrid Environmental Control in the Multi-Greenhouses (다동온실의 복합환경 제어를 위한 시스템 개발)

  • 고학균;이대원;최창현;김채웅;김재민;권영삼
    • Journal of Bio-Environment Control
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 1998
  • A Hardware system of hybrid environmental control was developed for using it in the multi-greenhouse. Now, an on/off control system is most utilized in protected cultivation, but a hybrid environmental control system is not yet. This system consists of a hardware to be devided by physical elements and a software for the hardware a personal computer, a hybrid environmental control and a communication Program for modules. The hardware was made of several independent modules with independent CPU. Each module was made to slots. which are very convenient to mount and take off. Also, they are managed easily to repair, add, remove, and change of their function and expansion. The software for a personal computer was a menu driven program written in visual basic within a Windows environment for easy applications by a user. The hybrid environmental control software have operating factors operate continuously with temperature, humidity and others in greenhouse. Communication programs were used both 485 communication method for long distance communication between modules and CRC communication method for making easy to program, and less errors between personal computer and modules.

  • PDF

Evaluation of Software Diagnostics for Secure Operational Environment in Nuclear I&C systems (원전 계측제어 시스템 보안성환경을 위한 진단기능 평가)

  • Yoo, Sung Goo;Seul, Namo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.107-112
    • /
    • 2016
  • Safety Critical Instrumentation and Control Systems perform those functions to maintain nuclear power plants' parameters within acceptable limits established for a design basis events and anticipated operating occurrence to ensure safety function. Those digitalized systems shall protect inadvertent and non-malicious behavior to ensure the reliable operation of systems, known as a Secure Development and Operational Environment(SDOE). SDOE would be established through managerial and technical controls. The objective of this paper is to evaluate the effectiveness of Cyclic Redundancy Checksum diagnostic, which is one of technical controls for SDOE, that can confirm the integrity of software of I&C systems to establish the secure environment. The results of this assessment would be the practical implementation of design and safety review of nuclear I&C systems.

Stability assessment of tunnel face in a layered soil using upper bound theorem of limit analysis

  • Khezri, Nima;Mohamad, Hisham;Fatahi, Behzad
    • Geomechanics and Engineering
    • /
    • v.11 no.4
    • /
    • pp.471-492
    • /
    • 2016
  • Underground tunnelling is one of the sustainable construction methods which can facilitate the increasing passenger transportation in the urban areas and benefit the community in the long term. Tunnelling in various ground conditions requires careful consideration of the stability factor. This paper investigates three dimensional stability of a shallow circular tunnel in a layered soil. Upper bound theorem of limit analysis was utilised to solve the tunnel face stability problem. A three dimensional kinematic admissible failure mechanism was improved to model a layered soil and limiting assumptions of the previous studies were resolved. The study includes calculation of the minimum support pressure acting on the face of the excavation in closed-face excavations. The effects of the characteristics of the layers on the minimum support pressure were examined. It was found that the ratio of the thickness of cover layers particularly when a weak layer is overlying a stronger layer, has the most significant influence on the minimum tunnel support pressure. Comparisons have been made with the results of the numerical modelling using FLAC3D software. Results of the current study were in a remarkable agreement with those of numerical modelling.