• Title/Summary/Keyword: Delivery System Tracking System

Search Result 57, Processing Time 0.02 seconds

Requirements Trace Table Expansion and How to Normalization (요구사항추적테이블의 확장 및 정규화 방안)

  • Kim, Ju-Young;Rhew, Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.201-212
    • /
    • 2009
  • There are various methods to trace output in software development to verify the consistency and completeness of requirements. Existing studies do present the trace meta-model or automated tools, but fail to list specifically traced output or traced items. Also, in regards to trace tables, which contain traced items, existing studies don‘t consider the whole software development process but merely its sub-process. Given this, the present study suggests an extended requirements tracetable that tracks output from the inception of the project through the architectural design phase to the application delivery, following up on the researcher’s previous study on a tracetable that considered only a sub-process of the whole development process. In addition, in order to address the problem of the tracking process becoming complicated with increased tracefields due to an extended trace table, the researcher suggests a method for normalizing a requirements tracetable that can integrate and separate by development process phase. Apply it to theH system development project of a D company, and this study caseverified application possibility of study, confirmed an effect of a chase to easily find out an error of requirements. Improve precision of a traceto verify consistency of requirements and completeness through this study, and will minimize failure of a software development.

An Empirical Study for Enhancing Scope Management Capability of SW Informatization Project (SW정보화 사업 범위관리 역량 강화를 위한 실증적 연구 -중견·중소사업자 중심으로)

  • Kim, Seok-Kwan;Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.1-6
    • /
    • 2019
  • This paper examines the complexity of recent SW development such as the 4th industry to apply the requirement engineering and redimimn application to the project to solve the difficulty of scope management during project management of medium and small businesses. These engineering techniques were applied to mid-sized and small-sized SW development projects. It was verified through supervision of 15 SW development projects. As a result, we observed about 30% reduction in related issues. In addition, Redmimn was introduced to SW development projects involving medium and small sized companies, and it proved that it has the effect of shortening delivery time through requirement management and tracking management. In order to secure the safety of the SW system development project, it is necessary to apply the required engineering techniques and tools, and it is necessary to continuously cultivate professional manpower to carry out this.

Implementation of Uncertainty Processor for Tracking Vehicle Trajectory (차량 궤적 추적을 위한 불확실성 처리기 구현)

  • Kim, Jin-Suk;Kim, Dong-Ho;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1167-1176
    • /
    • 2004
  • Along the advent of Internet technology, the computing environment has been considerably changed in many application domains. Especially, a lot of researches for e-Logistics have been done for the last 3 years. The e-Logistics means the virtual business activity and service architecture among the logistics companies based on the Internet technology. To construct effectively the e-Logistics framework, researches on the development of the Moving Object Technology(MOT) including GPS and GIS with spatiotemporal databases technique so far has been done The Moving Object Technology stands for the efficient management for the spatiotemporal objects such as vehicles, airplanes, and vessels which change continuously their spatial location along with time flows. However, most systems manage just only the location information detected lately by many reasons so that the uncertainty processing for the past and future location of the moving objects is still very hard. In this paper, we propose the moving object uncertainty model and system design for e-Logistics applications. The MOMS architecture in e-Logistics is suggested and the detailed explain of sub-systems including the uncertainty processor of moving objects is described. We also explain the comprehensive examples of MOMS and uncertainty processing in Delivery Parcel Application that is one of major application of e-Logistics domain.

Wireless Energy and Data Transmission Using Inductive Coupling (유도결합방식에 의한 무선 에너지 및 데이터 전송)

  • Lee, Joon-Ha
    • Progress in Medical Physics
    • /
    • v.19 no.1
    • /
    • pp.42-48
    • /
    • 2008
  • Bio-implantable devices such as heart pacers, gastric pacers and drug-delivery systems require power for carrying out their intended functions. These devices are usually powered through a battery implanted with the system or are wired to an external power source. This paper describes an inductive power transmission link, which was developed for an implantable stimulator for direct stimulation of denervated muscles. The carrier frequency is around 1MHz, the transmitter coil has a diameter of 46mm, and the implant coil is 46mm. Data transmission to the implant with amplitude shift keying (ASK) and back to the transmitter with passive telemetry can be added without major design changes. We chose the range of coil spacing (2 to 30mm) to care for lateral misalignment, as it occurs in practical use. If the transmitter coil has a well defined and reliable position in respect to the implant, a smaller working range might be sufficient. Under these conditions the link can be operated in fixed frequency mode, and reaches even higher efficiencies of up to 37%. The link transmits a current of 50 mA over a distance range of 2-15 mm with an efficiency of more than 20% in tracking frequency. The efficiency of the link was optimized with different approaches. A class E transmitter was used to minimize losses of the power stage. The geometry and material of the transmitter coil was optimized for maximum coupling. Phase lock techniques were used to achieve frequency tracking, keeping the transmitter optimally tuned at different coupling conditions caused by coil distance variations.

  • PDF

Prediction of Target Motion Using Neural Network for 4-dimensional Radiation Therapy (신경회로망을 이용한 4차원 방사선치료에서의 조사 표적 움직임 예측)

  • Lee, Sang-Kyung;Kim, Yong-Nam;Park, Kyung-Ran;Jeong, Kyeong-Keun;Lee, Chang-Geol;Lee, Ik-Jae;Seong, Jin-Sil;Choi, Won-Hoon;Chung, Yoon-Sun;Park, Sung-Ho
    • Progress in Medical Physics
    • /
    • v.20 no.3
    • /
    • pp.132-138
    • /
    • 2009
  • Studies on target motion in 4-dimensional radiotherapy are being world-widely conducted to enhance treatment record and protection of normal organs. Prediction of tumor motion might be very useful and/or essential for especially free-breathing system during radiation delivery such as respiratory gating system and tumor tracking system. Neural network is powerful to express a time series with nonlinearity because its prediction algorithm is not governed by statistic formula but finds a rule of data expression. This study intended to assess applicability of neural network method to predict tumor motion in 4-dimensional radiotherapy. Scaled Conjugate Gradient algorithm was employed as a learning algorithm. Considering reparation data for 10 patients, prediction by the neural network algorithms was compared with the measurement by the real-time position management (RPM) system. The results showed that the neural network algorithm has the excellent accuracy of maximum absolute error smaller than 3 mm, except for the cases in which the maximum amplitude of respiration is over the range of respiration used in the learning process of neural network. It indicates the insufficient learning of the neural network for extrapolation. The problem could be solved by acquiring a full range of respiration before learning procedure. Further works are programmed to verify a feasibility of practical application for 4-dimensional treatment system, including prediction performance according to various system latency and irregular patterns of respiration.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

The evaluation of the feasibility about prostate SBRT by analyzing interfraction errors of internal organs (분할치료간(Interfraction) 내부 장기 움직임 오류 분석을 통한 전립선암의 전신정위적방사선치료(SBRT) 가능성 평가)

  • Hong, soon gi;Son, sang joon;Moon, joon gi;Kim, bo kyum;Lee, je hee
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.28 no.2
    • /
    • pp.179-186
    • /
    • 2016
  • Purpose : To figure out if the treatment plan for rectum, bladder and prostate that have a lot of interfraction errors satisfies dosimetric limits without adaptive plan by analyzing MR image. Materials and Methods : This study was based on 5 prostate cancer patients who had IMRT(total dose: 70Gy) Using ViewRay MRIdian System(ViewRay, ViewRay Inc., Cleveland, OH, USA) The treatment plans were made on the same CT images to compare with the plan quality according to adaptive plan, and the Eclipse(Ver 10.0.42, Varian, USA) was used. After registrate the 5 treatment MR images to the CT images for treatment plan to analyze the interfraction changes of organ, we measured the dose volume histogram and the changes of the absolute volume for each organ by appling the first treatment plan to each image. Over 5 fractions, the total dose for PTV was $V_{36.25}$ Gy $${\geq_-}$$ 95%. To confirm that the prescription dose satisfies the SBRT dose limit for prostate, we measured $V_{100%}$, $V_{95%}$, $V_{90%}$ for CTV and $V_{100%}$, $V_{90%}$, $V_{80%}$ $V_{50%}$ of rectum and bladder. Results : All dose average value of CTV, rectum and bladder satisfied dose limit, but there was a case that exceeded dose limit more than one after analyzing the each image of treatment. After measuring the changes of absolute volume comparing the MR image of the first treatment plan with the one of the interfraction treatment, the difference values were maximum 1.72 times at rectum and maximum 2.0 times at bladder. In case of rectum, the expected values were planned under the dose limit, on average, $V_{100%}=0.32%$, $V_{90%}=3.33%$, $V_{80%}=7.71%$, $V_{50%}=23.55%$ in the first treatment plan. In case of rectum, the average of absolute volume in first plan was 117.9 cc. However, the average of really treated volume was 79.2 cc. In case of CTV, the 100% prescription dose area didn't satisfy even though the margin for PTV was 5 mm because of the variation of rectal and bladder volume. Conclusion : There was no case that the value from average of five fractions is over the dosimetric limits. However, dosimetric errors of rectum and bladder in each fraction was significant. Therefore, the precise delivery is needed in case of prostate SBRT. The real-time tracking and adaptive plan is necessary to meet the precision delivery.

  • PDF