• Title/Summary/Keyword: Digital Number

Search Result 2,991, Processing Time 0.031 seconds

A Proposal for a Predictive Model for the Number of Patients with Periodontitis Exposed to Particulate Matter and Atmospheric Factors Using Deep Learning

  • Septika Prismasari;Kyuseok Kim;Hye Young Mun;Jung Yun Kang
    • Journal of dental hygiene science
    • /
    • v.24 no.1
    • /
    • pp.22-28
    • /
    • 2024
  • Background: Particulate matter (PM) has been extensively observed due to its negative association with human health. Previous research revealed the possible negative effect of air pollutant exposure on oral health. However, the predictive model between air pollutant exposure and the prevalence of periodontitis has not been observed yet. Therefore, this study aims to propose a predictive model for the number of patients with periodontitis exposed to PM and atmospheric factors in South Korea using deep learning. Methods: This study is a retrospective cohort study utilizing secondary data from the Korean Statistical Information Service and the Health Insurance Review and Assessment database for air pollution and the number of patients with periodontitis, respectively. Data from 2015 to 2022 were collected and consolidated every month, organized by region. Following data matching and management, the deep neural networks (DNN) model was applied, and the mean absolute percentage error (MAPE) value was calculated to ensure the accuracy of the model. Results: As we evaluated the DNN model with MAPE, the multivariate model of air pollution including exposure to PM2.5, PM10, and other atmospheric factors predict approximately 85% of the number of patients with periodontitis. The MAPE value ranged from 12.85 to 17.10 (mean±standard deviation=14.12±1.30), indicating a commendable level of accuracy. Conclusion: In this study, the predictive model for the number of patients with periodontitis is developed based on air pollution, including exposure to PM2.5, PM10, and other atmospheric factors. Additionally, various relevant factors are incorporated into the developed predictive model to elucidate specific causal relationships. It is anticipated that future research will lead to the development of a more accurate model for predicting the number of patients with periodontitis.

A Study of the Improvement Method of I-pin Mass Illegal Issue Accident (아이핀 대량 부정발급 사고에 대한 개선방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.11-22
    • /
    • 2015
  • The almost of Web page has been gathered the personal information(Korean resident registration number, name, cell-phone number, home telephone number, E-mail address, home address, etc.) using the membership and log-in. The all most user of Web page are concerned for gathering of the personal information. I-pin is the alternative means of resident registration number and has been used during the last ten-year period in the internet. The accident of I-pin mass illegal issue was happened by hacker at February, 2015. In this paper, we analysis the problems of I-pin system about I-pin mass illegal issue accident and propose a improvement method of it. First, I-pin issue must be processed by the off-line of face certification in spite of user's inconvenience. Second, I-pin use must be made up through second certification of password or OTP. The third, the notification of I-pin use must be sent to the user by the text messaging service of cell-phone or the E-mail. The forth, I-pin must be used an alternative means of Korean resident registration number in Internet. The methods can reduce the problems of I-pin system.

Programmable Digital On-Chip Terminator

  • Kim, Su-Chul;Kim, Nam-Seog;Kim, Tae-Hyung;Cho, Uk-Rae;Byun, Hyun-Guen;Kim, Suki
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1571-1574
    • /
    • 2002
  • This paper describes a circuit and its operations of a programmable digital on-chip terminator designed with CMOS circuits which are used in high speed I/O interface. The on-chip terminator matches external reference resistor with the accuracy of ${\pm}$ 4.1% over process, voltage and temperature variation. The digital impedance codes are generated in programmable impedance controller (PIC), and the codes are sent to terminator transistor arrays at input pads serially to reduce the number of signal lines. The transistor array is thermometer-coded to reduce impedance glitches during code update and it is segmented to two different blocks of thermometer-coded transistor arrays to reduce the number of transistors. The terminator impedance is periodically updated during hold time to minimize inter-symbol interferences.

  • PDF

Trends in Mobile Ransomware and Incident Response from a Digital Forensics Perspective

  • Min-Hyuck, Ko;Pyo-Gil, Hong;Dohyun, Kim
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.280-287
    • /
    • 2022
  • Recently, the number of mobile ransomware types has increased. Moreover, the number of cases of damage caused by mobile ransomware is increasing. Representative damage cases include encrypting files on the victim's smart device or making them unusable, causing financial losses to the victim. This study classifies ransomware apps by analyzing several representative ransomware apps to identify trends in the malicious behavior of ransomware. We present a technique for recovering from the damage, from a digital forensic perspective, using reverse engineering ransomware apps to analyze vulnerabilities in malicious functions applied with various cryptographic technologies. Our study found that ransomware applications are largely divided into three types: locker, crypto, and hybrid. In addition, we presented a method for recovering the damage caused by each type of ransomware app using an actual case. This study is expected to help minimize the damage caused by ransomware apps and respond to new ransomware apps.

DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION (전자증거 관리시스템의 설계)

  • 김종섭;하옥현;김귀남
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2001.05a
    • /
    • pp.275-280
    • /
    • 2001
  • DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION Digital evidence will be used as a term, which means the electronic form of information which is necessary to confirm or prove the factum of all kinds of behaviors committed through the devices which have data processing ability including computer. It is expected that there will be the increase of legal conflicts surrounding electronic commerce activities as well as the increase of cyber crimes, as the number of Internet users are getting bigger. In order to solve the problems of conflicts derived from electronic commerce, the factum of electronic commerce activities must be confirmed. In order to confirm the factum of electronic commerce activities, the evidence is prerequisite. Almost all evidences relating to the electronic commerce activities exist in digital form. For the reason that the digital evidence can be easily damaged and changed, special management is required to collect, analyze, and preserve the digital evidence. In order to meet this requirement, this study proposes a basic model of digital evidence management system applying computer forensics and electronic authentication.

  • PDF

A Parallel Search Algorithm and Its Implementation for Digital k-Winners-Take-All Circuit

  • Yoon, Myungchul
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.4
    • /
    • pp.477-483
    • /
    • 2015
  • The k-Winners-Take-All (kWTA) is an operation to find the largest k (>1) inputs among N inputs. Parallel search algorithm of kWTA for digital inputs is not invented yet, so most of digital kWTA architectures have O(N) time complexity. A parallel search algorithm for digital kWTA operation and the circuits for its VLSI implementation are presented in this paper. The proposed kWTA architecture can compare all inputs simultaneously in parallel. The time complexity of the new architecture is O(logN), so that it is scalable to a large number of digital data. The high-speed kWTA operation and its O(logN) dependency of the new architecture are verified by simulations. It takes 290 ns in searching for 5 winners among 1024 of 32 bit data, which is more than thousands of times faster than existing digital kWTA circuits, as well as existing analog kWTA circuits.

Method of SSO Noise Reduction on FPGA of Digital Optical Units in Optical Communication

  • Kim, Jae Wan;Eom, Doo Seop
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.97-101
    • /
    • 2013
  • There is a growing need for optical communication systems that convert large volumes of data to optical signals and that accommodate and transmit the signals across long distances. Digital optical communication consists of a master unit (MU) and a slave unit (SU). The MU transmits data to SU using digital optical signals. However, digital optical units that are commercially available or are under development transmit data using two's complement representation. At low input levels, a large number of SSOs (simultaneous switching outputs) are required because of the high rate of bit switching in two's complement, which thereby increases the power noise. This problem reduces the overall system capability because a DSP (digital signal processor) chip (FPGA, CPLD, etc.) cannot be used efficiently and power noise increases. This paper proposes a change from two's complement to a more efficient method that produces less SSO noise and can be applied to existing digital optical units.

PHOTOGRAMMETRIC PROCESSING OF HIGH MOUNTAINS IN NEPAL

  • Baral, Toya Nath
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.85-92
    • /
    • 2003
  • Application of traditional aerial survey technologies for topographic mapping purposes has a number of principal problems. The growing worldwide acceptance of digital orthophotos has understood this need. Many trekking and expedition teams are expecting digital orthophoto and consequently 3D animation of the highest peaks and possible trekking routes, camping sites and information on how difficult the routes may be. In recent years, inexpensive computers and advance of computer technologies contributed to the rapid development of digital photogrammetry (Dowman et al., 1992; Heipke, 1995). Successful implementation of digital photogrammetric workstations in mapping have been found in various disciplines (Chen et al., 1998; Skalet et al., 1992). This paper highlights the results of the conventional photogrammetry and the possible advantages of digital photogrammetry over these and also the problems, issues and implications during digital Photogrammetric processing of high mountainous region in Asia.

  • PDF

Generalized Hardware Post-processing Technique for Chaos-Based Pseudorandom Number Generators

  • Barakat, Mohamed L.;Mansingka, Abhinav S.;Radwan, Ahmed G.;Salama, Khaled N.
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.448-458
    • /
    • 2013
  • This paper presents a generalized post-processing technique for enhancing the pseudorandomness of digital chaotic oscillators through a nonlinear XOR-based operation with rotation and feedback. The technique allows full utilization of the chaotic output as pseudorandom number generators and improves throughput without a significant area penalty. Digital design of a third-order chaotic system with maximum function nonlinearity is presented with verified chaotic dynamics. The proposed post-processing technique eliminates statistical degradation in all output bits, thus maximizing throughput compared to other processing techniques. Furthermore, the technique is applied to several fully digital chaotic oscillators with performance surpassing previously reported systems in the literature. The enhancement in the randomness is further examined in a simple image encryption application resulting in a better security performance. The system is verified through experiment on a Xilinx Virtex 4 FPGA with throughput up to 15.44 Gbit/s and logic utilization less than 0.84% for 32-bit implementations.

A Technique of Watermark Generation and Similarity Embedding for Still Images Based on Cross Reference Points (교차참조점에 기반한 정지영상의 워터마크 생성 및 유사성 삽입 기법)

  • Lee, Hang-Chan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.8
    • /
    • pp.1484-1490
    • /
    • 2007
  • The Cross Reference Point(CRP) is a robust method for finding salient points in watermarking systems because it is based on the geometrical structure of a normalized image in order to avoid pointing error caused by digital attacks. After normalization of an image, the 100 CRPs are calculated. Next, the 100 blocks centered by CRPS are formed. These 100 blocks are arranged using a secrete key. Each boundary of 50 out of 100 blocks is surrounded by 8 blocks which are selected by the ordered number of a preceding block. This number is a seed of random number generator for selecting 8 out of 50 blocks. The search area of a center block is formed by a secrete key. The pixels of a center block are quantized to 10 levels by predefined thresholds. The watermarks are generated by the 50 quantized center blocks. These watermarks are embedded directly in the remaining 50 blocks. In other words, 50 out of 100 blocks are utilized to generate watermarks and the remaining 50 blocks are used to watermark embedding. Because the watermarks are generated in the given images, we can successfully detect watermarks after several digital attacks. The reason is that the blocks for the generation and detection of watermarks are equally affected by digital attacks except for the case of local distortion such as cropping.