• Title/Summary/Keyword: Data validation

Search Result 3,228, Processing Time 0.034 seconds

A case of interdigitating dendritic cell sarcoma studied by whole-exome sequencing

  • Hong, Ki Hwan;Song, Soyoung;Shin, Wonseok;Kang, Keunsoo;Cho, Chun?Sung;Hong, Yong Tae;Han, Kyudong;Moon, Jeong Hwan
    • Genes and Genomics
    • /
    • v.40 no.12
    • /
    • pp.1279-1285
    • /
    • 2018
  • Interdigitating dendritic cell sarcoma (IDCS) is an aggressive neoplasm and is an extremely rare disease, with a challenging diagnosis. Etiology of IDCS is also unknown and most studies with only case reports. In our case, immunohistochemistry showed that the tumor cells were positive for S100, CD45, and CD68, but negative for CD1a and CD21. This study aimed to investigate the causative factors of IDCS by sequencing the protein-coding regions of IDCS. We performed whole-exome sequencing with genomic DNA from blood and sarcoma tissue of the IDCS patient using the Illumina Hiseq 2500 platform. After that, we conducted Sanger sequencing for validation of sarcoma-specific variants and gene ontology analysis using DAVID bioinformatics resources. Through comparing sequencing data of sarcoma with normal blood, we obtained 15 nonsynonymous single nucleotide polymorphisms (SNPs) as sarcoma-specific variants. Although the 15 SNPs were not validated by Sanger sequencing due to tumor heterogeneity and low sensitivity of Sanger sequencing, we examined the function of the genes in which each SNP is located. Based on previous studies and gene ontology database, we found that POLQ encoding DNA polymerase theta enzyme and FNIP1 encoding tumor suppressor folliculin-interacting protein might have contributed to the IDCS. Our study provides potential causative genetic factors of IDCS and plays a role in advancing the understanding of IDCS pathogenesis.

Development and Validation of Short Form of the Normal Depression Scale for Individual Screening (개인선별용 일상우울척도 단축형의 개발 및 타당화)

  • Lee, Soonmook;Kim, Jong-Nam;Chae, Jungmin;Choi, Seungwon;Seo, Dong Gi
    • Stress
    • /
    • v.26 no.4
    • /
    • pp.277-289
    • /
    • 2018
  • Background: The purpose of this study is to develop a short form of the normal depression scale for individual use in the school, health, industry, organization, and counseling settings, based on the original normal depression scale (17 items). Methods: To achieve this purpose, we selected five items from the original test and analyzed data using Mplus 7.4 and SPSS 21.0. Results: The normal depression scale-short form consists of 5 items. The reliability of the short form (test-retest reliability) was good. The content validity and internal structure validity (1 factor model) were verified. The cut score between normal and dysfunctional depression was determined to be 18. Conclusions: The normal depression scale-short form for individual screening is verified to have good reliability and validity, so it is expected to be useful to perform quick screening of normal depression in the practical settings.

The Effect of Information Privacy Concerns on E-Trust and E-Loyalty : The Moderating Role of Switching Cost (정보보안우려감이 e-신뢰도와 e-충성도에 미치는 영향: 전환비용의 조절효과를 중심으로)

  • Moon, Yun Ji;Choi, Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.131-134
    • /
    • 2014
  • The Internet allows firms to serve customers more effectively than ever before. In the B2C context, we examine the interrelationships among information privacy concerns, e-trust, and e-loyalty. The authors extend prior research by incorporating constructs of information privacy concerns into a more holistic conceptual framework. This study answers three research questions: Will the three components of information privacy concerns have a significant effect on e-loyalty through e-trust?, Does e-trust mediate e-loyalty?, Finally, do switching costs have a moderation effect between e-trust and e-loyalty?, The authors examine data from customers who have booked hotel accommodations online. The results support our hypotheses and confirm both the mediation role of e-trust and the moderation role of switching costs. Conceptually, this study provides an empirical validation of information privacy concerns, e-trust, and loyalty linkage. On the managerial level, this research provides insights into critical drivers of loyalty in the emerging online marketplace.

  • PDF

Mediating Effect of Relationship Addiction on the Relationship between Anxious Attachment and Psychological Violence Victimization (불안애착이 심리적 폭력 피해에 미치는 영향에서 관계중독의 매개효과)

  • Song, Yeon-Joo;Choi, Ga-Yeon;Park, Dae-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.6
    • /
    • pp.292-301
    • /
    • 2019
  • The purpose of this study was to investigate the effects of anxious attachment on psychological violence victimization and the role of relationship addiction on the relationship between anxious attachment and psychological violence victimization. To do this, 201 adults between 20~30 years old who live in G city and J area were administered anxious attachment, relationship addiction, and psychological violence victimization scale. Data analysis was performed using SPSS 22.0 for correlational analysis to examine the relationship between variables, and the structural equation for mediating effect validation was performed using AMOS 22.0. As a result, there were positive correlations among anxious attachment, relationship addiction and psychological violence victimization. Also, the effects of relationship addiction on the relationship showed full mediation effect. This suggests that anxious attachment may lead to psychological violence victimization through relationship addiction. Through this study, a counseling intervention method which is helpful to clients who have psychological violence victimization is presented. Based on the study, findings and implications are discussed.

Preliminary numerical study on hydrogen distribution characteristics in the process that flow regime transits from jet to buoyancy plume in time and space

  • Wang, Di;Tong, Lili;Liu, Luguo;Cao, Xuewu;Zou, Zhiqiang;Wu, Lingjun;Jiang, Xiaowei
    • Nuclear Engineering and Technology
    • /
    • v.51 no.6
    • /
    • pp.1514-1524
    • /
    • 2019
  • Hydrogen-steam gas mixture may be injected into containment with flow regime varying both spatially and transiently due to wall effect and pressure difference between primary loop and containment in severe accidents induced by loss of coolant accident. Preliminary CFD analysis is conducted to gain information about the helium flow regime transition process from jet to buoyancy plume for forthcoming experimental study. Physical models of impinging jet and wall condensation are validated using separated effect experimental data, firstly. Then helium transportation is analyzed with the effect of jet momentum, buoyancy and wall cooling discussed. Result shows that helium distribution is totally dominated by impinging jet in the beginning, high concentration appears near gas source and wall where jet momentum is strong. With the jet weakening, stable light gas layer without recirculating eddy is established by buoyancy. Transient reversed helium distribution appears due to natural convection resulted from wall cooling, which delays the stratification. It is necessary to concern about hydrogen accumulation in lower space under the containment external cooling strategy. From the perspective of experiment design, measurement point should be set at the height of connecting pipe and near the wall for stratification stability criterion and impinging jet modelling validation.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

The impact of the introduction of information security solutions by public organizations on the improvement of information security level (공공기관의 정보보안 솔루션 도입이 정보보안 수준 향상에 미치는 영향)

  • Kim, Hyeob;Eom, Su-Seong;Kwon, HyukJun
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.19-25
    • /
    • 2017
  • Public institutions invest about half of the information protection budget annually to introduce information security products and information protection services in order to prevent cyber terrorism and establish organizational security. However, research on whether introduced information security products has a positive influence on improving the information security level of the actual institution is in an incomplete state, and accordingly, There are problems such as the measurement of the investment effect of the information security product introduced in the organization and the difficulty in selecting the optimum information security product that the agency actually needs. In this paper, prior research will conduct research on the influence of the introduction of information security products on the improvement of information security level of organization through analysis of operational data of inadequate information security products, and based on the research results, It would be useful to use it for information security practices such as optimal product selection and internal security policy formulation through validation of the introduction of information security products of public institutions.

Image Mood Classification Using Deep CNN and Its Application to Automatic Video Generation (심층 CNN을 활용한 영상 분위기 분류 및 이를 활용한 동영상 자동 생성)

  • Cho, Dong-Hee;Nam, Yong-Wook;Lee, Hyun-Chang;Kim, Yong-Hyuk
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.9
    • /
    • pp.23-29
    • /
    • 2019
  • In this paper, the mood of images was classified into eight categories through a deep convolutional neural network and video was automatically generated using proper background music. Based on the collected image data, the classification model is learned using a multilayer perceptron (MLP). Using the MLP, a video is generated by using multi-class classification to predict image mood to be used for video generation, and by matching pre-classified music. As a result of 10-fold cross-validation and result of experiments on actual images, each 72.4% of accuracy and 64% of confusion matrix accuracy was achieved. In the case of misclassification, by classifying video into a similar mood, it was confirmed that the music from the video had no great mismatch with images.

Transformational Leadership and Depressive Symptoms in Germany: Validation of a Short Transformational Leadership Scale

  • Seegel, Max Leonhard;Herr, Raphael M.;Schneider, Michael;Schmidt, Burkhard;Fischer, Joachim E.
    • Journal of Preventive Medicine and Public Health
    • /
    • v.52 no.3
    • /
    • pp.161-169
    • /
    • 2019
  • Objectives: The objective of the present study was to validate a shortened transformational leadership (TL) scale (12 items) comprising core TL behaviour and to test the associations of this shortened TL scale with depressive symptoms. Methods: The study used cross-sectional data from 1632 employees of the overall workforce of a middle-sized German company (51.6% men; mean age, 41.35 years; standard deviation, 9.4 years). TL was assessed with the German version of the Transformational Leadership Inventory and depressive symptoms with the Hospital Anxiety and Depression Scale (HADS). The structural validity of the core TL scale was assessed with confirmatory factor analysis. Associations with depressive symptoms were estimated with structural equation modelling and adjusted logistic regression. Results: Confirmatory factor analysis and structural equation modelling showed better model fit for the core TL than for the full TL score. Logistic regression revealed 3.61-fold (95% confidence interval [CI], 2.20 to 5.93: women) to 4.46-fold (95% CI, 2.86 to 6.95: men) increased odds of reporting depressive symptoms (HADS score >8) for those in the lowest tertile of reported core TL. Conclusions: The shortened core TL seems to be a valid instrument for research and training purposes in the context of TL and depressive symptoms in employees. Of particular note, men reporting poor TL were more likely to report depressive symptoms.

Soil Depth Information DB Construction Methods for Liquefaction Assessment (액상화 평가를 위한 지층심도DB 구축 방안)

  • Gang, ByeongJu;Hwang, Bumsik;Kim, Hansam;Cho, Wanjei
    • Journal of the Korean GEO-environmental Society
    • /
    • v.20 no.3
    • /
    • pp.39-46
    • /
    • 2019
  • The liquefaction is a phenomenon that the effective stress becomes zero due to the rapidly accumulated excess pore water pressure when a strong load acts on the ground for a short period of time, such as an earthquake or pile driving, resulting in the loss of the shear strength of the ground. Since the Geongju and Pohang earthquake, liquefaction brought increasing domestic attention. This liquefaction can be assessed mainly through the semi-empirical procedures proposed by Seed and Idriss (1982) and the liquefaction risk based on the penetration resistance obtained from borehole DB and SPT. However, the geotechnical information data obtained by the in-situ tests or boring information fundamentally have an issue of the representative of the target area. Therefore, this study sought to construct a ground information database by classifying and reviewing the ground information required for liquefaction assessment, and tried to solve the representative problem of the soil layer that is subject to liquefaction evaluation by performing spatial interpolation using GIS.