• Title/Summary/Keyword: Computer software

Search Result 8,400, Processing Time 0.039 seconds

Measurement of facial soft tissues thickness using 3D computed tomographic images (3차원 전산화단층찰영 영상을 이용한 얼굴 연조직 두께 계측)

  • Jeong Ho-Gul;Kim Kee-Deog;Han Seung-Ho;Shin Dong-Won;Hu Kyung-Seok;Lee Jae-Bum;Park Hyok;Park Chang-Seo
    • Imaging Science in Dentistry
    • /
    • v.36 no.1
    • /
    • pp.49-54
    • /
    • 2006
  • Purpose : To evaluate accuracy and reliability of program to measure facial soft tissue thickness using 3D computed tomographic images by comparing with direct measurement. Materials and Methods : One cadaver was scanned with a Helical CT with 3 mm slice thickness and 3 mm/sec table speed. The acquired data was reconstructed with 1.5 mm reconstruction interval and the images were transferred to a personal computer. The facial soft tissue thickness were measured using a program developed newly in 3D image. For direct measurement, the cadaver was cut with a bone cutter and then a ruler was placed above the cut side. The procedure was followed by taking pictures of the facial soft tissues with a high-resolution digital camera. Then the measurements were done in the photographic images and repeated for ten times. A repeated measure analysis of variance was adopted to compare and analyze the measurements resulting from the two different methods. Comparison according to the areas was analyzed by Mann-Whitney test. Results : There were no statistically significant differences between the direct measurements and those using the 3D images (p>0.05). There were statistical differences in the measurements on 17 points but all the points except 2 points showed a mean difference of 0.5 mm or less. Conclusion : The developed software program to measure the facial soft tissue thickness using 3D images was so accurate that it allows to measure facial soft tissues thickness more easily in forensic science and anthropology.

  • PDF

Cache Performance Analysis of Multiprocessor Systems for OLTP Applications based on a Memory-Resident DBMS (메모리 상주 DBMS 기반의 OLTP 응용을 위한 다중프로세서 시스템 캐쉬 성능 분석)

  • Chung, Yong-Wha;Hahn, Woo-Jong;Yoon, Suk-Han;Park, Jin-Won;Lee, Kang-Woo;Kim, Yang-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.383-392
    • /
    • 2000
  • Currently, multiprocessors are evaluated almost exclusively with scientific applications. Commercial applications are rarely explored because it is difficult to obtain the source codes of commercial DBMS. Even when the source code is available, such as for POSTGRES, understanding the source code enough to perform detailed meaningful performance evaluations is a daunting task for computer architects.To evaluate multiprocessors with commercial applications, we have developed our own DBMS, called EZDB. EZDB is a parallelized DBMS, loosely inspired from POSTGRES, and running on top of a software architecture simulator. It is capable of executing parallel programs written in SQL. Contrary to POSTGRES, EZDB is not intended as a prototype for a production-quality DBMS. Its purpose is to easily run and evaluate the performance of commercial applications on multiprocessor architectures. To illustrate the usefulness of EZDB, we showed the cache performance data collected for the TPC-B benchmark on a shared-memory multiprocessor. The simulation results showed that the data structures exhibited unique sharing characteristics and that their locality properties and working sets were very different from those in scientific applications.

  • PDF

Caching and Concurrency Control in a Mobile Client/Sever Computing Environment (이동 클라이언트/서버 컴퓨팅환경에서의 캐싱 및 동시성 제어)

  • Lee, Sang-Geun;Hwang, Jong-Seon;Lee, Won-Gyu;Yu, Heon-Chang
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.974-987
    • /
    • 1999
  • 이동 컴퓨팅 환경에서 자주 접근하는 데이터에 대한 캐싱은 무선 채널의 좁은 대역폭에서 경쟁을 줄일 수 있는 유용한 기술이다. 그러나, 트랜잭션 캐시 일관성을 지원하는 전통적인 클라이언트/서버 전략은 클라이언트와 서버간에 많은 양의 통신을 필요로 하기 때문에 이동 클라이언트/서버 컴퓨팅 환경에서는 적절하지 않다. 본 논문에서는 브로드캐스트-기반 캐시 무효화 정책을 사용하면서 트랜잭션 캐시 일관성을 지원하는 OCC-UTS (Optimistic Concurrency Control with Update TimeStamp) 프로토콜을 제안한다. 접근한 데이터에 대한 일관성 검사 및 완료 프로토콜은 캐시 무효화 과정의 내부 과정으로 완전 분산 형태로 효율적으로 구현되며, 일관성 체크의 대부분이 이동 클라이언트에서 수행된다. 또한, 분석 모델에 기반한 성능 비교를 통해, 본 논문에서 제안하는 OCC-UTS 프로토콜이 다른 경쟁 프로토콜보다 높은 트랜잭션 처리율을 얻으며, 데이터 항목을 자주 접근하면 할수록 지역 캐시를 사용하는 OCC-UTS 프로토콜이 더 효율적임을 보인다. 이동 클라이언트의 접속 단절에 대해서는 무효화 브로드캐스트 윈도우를 크게 하여 접속 단절에 적절히 대처할 수 있다.Abstract In a mobile computing environment, caching of frequently accessed data has been shown to be a useful technique for reducing contention on the narrow bandwidth of the wireless channels. However, the traditional client/server strategies for supporting transactional cache consistency that require extensive communications between a client and a server are not appropriate in a mobile client/server computing environment. In this paper, we propose a new protocol, called OCC-UTS (Optimisitic Concurrency Control with Update TimeStamp), to support transactional cache consistency in a mobile client/server computing environment by utilizing the broadcast-based solutions for the problem of invalidating caches. The consistency check on accessed data and the commitment protocol are implemented in a truly distributed fashion as an integral part of cache invalidation process, with most burden of consistency check being downloaded to mobile clients. Also, our experiments based on an analytical model substantiate the basic idea and study the performance characteristics. Experimental results show that OCC-UTS protocol without local cache outperforms other competitor protocol, and the more frequent a mobile client accesses data items the more efficient OCC-UTS protocol with local cache is. With respect to disconnection, the tolerance to disconnection is improved if the invalidation broadcast window size is extended.

Homonym Disambiguation based on Mutual Information and Sense-Tagged Compound Noun Dictionary (상호정보량과 복합명사 의미사전에 기반한 동음이의어 중의성 해소)

  • Heo, Jeong;Seo, Hee-Cheol;Jang, Myung-Gil
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.12
    • /
    • pp.1073-1089
    • /
    • 2006
  • The goal of Natural Language Processing(NLP) is to make a computer understand a natural language and to deliver the meanings of natural language to humans. Word sense Disambiguation(WSD is a very important technology to achieve the goal of NLP. In this paper, we describe a technology for automatic homonyms disambiguation using both Mutual Information(MI) and a Sense-Tagged Compound Noun Dictionary. Previous research work using word definitions in dictionary suffered from the problem of data sparseness because of the use of exact word matching. Our work overcomes this problem by using MI which is an association measure between words. To reflect language features, the rate of word-pairs with MI values, sense frequency and site of word definitions are used as weights in our system. We constructed a Sense-Tagged Compound Noun Dictionary for high frequency compound nouns and used it to resolve homonym sense disambiguation. Experimental data for testing and evaluating our system is constructed from QA(Question Answering) test data which consisted of about 200 query sentences and answer paragraphs. We performed 4 types of experiments. In case of being used only MI, the result of experiment showed a precision of 65.06%. When we used the weighted values, we achieved a precision of 85.35% and when we used the Sense-Tagged Compound Noun Dictionary, we achieved a precision of 88.82%, respectively.

A Study on Application and Stability Analysis of Spiral Pipe Nailing System (스파이럴 파이프 네일링 시스템의 안정해석 및 적용성에 관한 연구)

  • Park, Si-Sam;Park, Sung-Chul;Jung, Sung-Pill;Kim, Hong-Taek
    • Journal of the Korean GEO-environmental Society
    • /
    • v.5 no.2
    • /
    • pp.41-49
    • /
    • 2004
  • In this study, a newly modified soil nailing technology named as the SPN (Spiral Pipe Nailing) system, is developed to self drilling method can apply to ground which is hard to keep shape of bore hole. And limit equilibrium analysis with simplified trial wedge method while length ratio and bond ratio being altered was performed to evaluate slope stability considered of tensile strength and bending stiffness. Also, using $FLAC^{2D}$ program, superiority of the SPN system was compared to the GSN (General Soil Nailing) system about an example section. And effects of various factors related to the design of the SPN system, such as the type of drilling method and the bit, are examined throughout a series of the displacement-controlled field pull-out tests. As a result, the SPN system is better than the GSN system in slope stability because of having larger bending stiffness, tensile strength and unit skin friction. And results of simplified trial wedge method are similar to results of TALREN 97 program, commercial limit equilibrium analysis computer software, about an example section. Consequently, it will find out of that the SPN system reduce displacements and settlements in down excavation process as well as to increase the global stability.

  • PDF

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

Counterfeit Money Detection Algorithm based on Morphological Features of Color Printed Images and Supervised Learning Model Classifier (컬러 프린터 영상의 모폴로지 특징과 지도 학습 모델 분류기를 활용한 위변조 지폐 판별 알고리즘)

  • Woo, Qui-Hee;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.12
    • /
    • pp.889-898
    • /
    • 2013
  • Due to the popularization of high-performance capturing equipments and the emergence of powerful image-editing softwares, it is easy to make high-quality counterfeit money. However, the probability of detecting counterfeit money to the general public is extremely low and the detection device is expensive. In this paper, a counterfeit money detection algorithm using a general purpose scanner and computer system is proposed. First, the printing features of color printers are calculated using morphological operations and gray-level co-occurrence matrix. Then, these features are used to train a support vector machine classifier. This trained classifier is applied for identifying either original or counterfeit money. In the experiment, we measured the detection rate between the original and counterfeit money. Also, the printing source was identified. The proposed algorithm was compared with the algorithm using wiener filter to identify color printing source. The accuracy for identifying counterfeit money was 91.92%. The accuracy for identifying the printing source was over 94.5%. The results support that the proposed algorithm performs better than previous researches.

Validity of midsagittal reference planes constructed in 3D CT images (전산화단층사진을 이용한 3차원 영상에서 정중시상기준평면 설정에 관한 연구)

  • Jeon, Ye-Na;Lee, Ki-Heon;Hwang, Hyeon-Shik
    • The korean journal of orthodontics
    • /
    • v.37 no.3 s.122
    • /
    • pp.182-191
    • /
    • 2007
  • Objective: The purpose of this study was to evaluate the validity of midsagittal reference (MSR) planes constructed in maxillofacial 3D images. Methods: Maxillofacial computed tomography (CT) images were obtained in 36 normal occlusion individuals who did not have apparent facial asymmetry, and 3D images were reconstructed using a computer software. Six MSR planes (Cg-ANS-Ba, Cg-ANS-Op, Cg-PNS-Ba, Cg-PNS-OP, FH${\perp}$(Cg, Ba), FH${\perp}$(Cg, Op)) were constructed using the landmarks located in the midsagittal area of the maxillofacial structure, such as Cg, ANS, PNS, Ba and Op, and FH plane constructed with Po and Or. The six pairs of landmarks (Z, Fr, Fs, Zy, Mx, Ms), which represent right and left symmetry in the maxillofacial structure, were selected. Statistically significant differences of the right and the left measurements were examined through t-test, and the difference of the right and the left measurement was compared among the six MSR planes. Results: The distances from the right and the left landmarks in each pair to each MSR plane did not show a statistically significant difference. The reproducibility of the landmark identification was excellent. Conclusion: All the six planes constructed in this study can be used as a MSR plane in maxillofacial 3D analysis, particularly, the planes including Cg and ANS.

Fault Tolerant Design of Universal Soft Controller for Advanced Power Reactor (신형원전(APR+)을 위한 범용소프트제어기의 내고장성 설계)

  • Ye, Song-Hae;Lyou, Joon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.279-286
    • /
    • 2012
  • Recently, design of Universal Soft Controller(USC) has been applied to the advanced control room for nuclear power plant. USC is software-based manual control means to control safety components as well as non-safety components in the highly-integrated control room. Therefore, design feature of USC is essential for the implementation of a single workstation in the advanced control room. The traditional control room is replaced by computer-driven consolidated operator interfaces. Considering our design has further reduced the probability of USC spurious signals by requiring two distinct operator control actions to generate any control signal. The reality of USC does not increase the probability of reactor trip because the probability of spurious USC signal is negligible. Universal Soft Control represents a significant evolution in nuclear I&C/HSI System. USC integrates the indicators and controls from multiple divisions into a single integrated visual display unit(VDU) based HSI(Human System Interface). In order to prevent adverse influence on safety function performance from USC failure, ESFAS signals are applied to safety components or functions. In addition, safety manual switches have priority over USC's signals. Therefore, spurious USC signals can be momentarily blocked by selecting a soft control command from the safety VDU.

Vibration Modeling and Optimal Design of Differential Electromagnetic Transducer for Implantable Middle Ear Hearing Devices using the FEA (FEA를 이용한 이식형 인공중이용 차동전자 트랜스듀서의 진동 모델링과 최적 설계)

  • Kim Min-Kyu;Lim Hyung-Gyu;Han Chan-Ho;Song Byung-Seop;Park Il-Yong;Cho Jin-Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.7
    • /
    • pp.379-386
    • /
    • 2005
  • Among various kinds of hearing aids which have been developed so far. the conventional air conduction hearing aids have some problems such as the acoustic distortion, an howling effect due to acoustic feedback. Another type of hearing aid. the cochlear implant system can be applied to the profound imparied person. However. it shows the disadvantage that there is no possibility of recovery of the acoustic organ such as ossicle. On the other hand. the implantable middle ear heaving device directly vibratos the ossicular chain and has better sound qualify. good cosmetics for appearance. and wide frequency responses so that it can overcome the defects or the conventional hearing aids. In this paper, a mathematical modeling and a momentum equation derivation of the DET has been performed. For the optimization of the structure dimension generating maximal vibrating force of the DET. the computer simulation using a finite element analysis (FEA) software has been performed. Also. the vibrating transducer has been designed to make the frequency characteristics or the transducer be similar to those of the normal middle ear. Through the experimental results, the measured vibration characteristics of the DET has been evaluated to verify the performance for the application to implantable middle ear hearing devices.