• Title/Summary/Keyword: Evaluation and Implementation

Search Result 2,447, Processing Time 0.034 seconds

A Research on Managing Assurance Level for Guaranteeing Quality of Web Services (웹 서비스 품질보장을 위한 보증수준 유지방안 연구)

  • Lee, Young-Kon;Kim, Eun-Ju
    • The KIPS Transactions:PartD
    • /
    • v.14D no.3 s.113
    • /
    • pp.319-328
    • /
    • 2007
  • As the coverage of Web services become wider and the number of implementation cases is growing, the importance of applying the Web services quality model to real world is increased. For maintaining the level of Web services qualify, it should be required to study on assurance method of Web services qualify level. Assurance for Web services, which is newly proposed by OASIS TC, means the totality of activities for managing the quality level of them. For managing Web service quality, Web service associates could usually use SLA(Service Level Agreement) method in which a service consumer contracts for some service level with a service provider and gives for penalty or pays incentives according to the result of evaluation of services. But, there are some difficulties in applying SLA to Web services, because Web services have publicity, multiple users, and 3rd party for management. So, we need a new assurance method for Web service by considering the characteristics of Web services. This paper provides the new concept of committed assurance level for Web services. This concept can be defined as the set of maximum level of quality expected by each user, which provide the consistent view of Web service quality. This paper presents the method for duality associates to preserve some quality level of Web service by using this concept.

Corpus-based Korean Text-to-speech Conversion System (콜퍼스에 기반한 한국어 문장/음성변환 시스템)

  • Kim, Sang-hun; Park, Jun;Lee, Young-jik
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.24-33
    • /
    • 2001
  • this paper describes a baseline for an implementation of a corpus-based Korean TTS system. The conventional TTS systems using small-sized speech still generate machine-like synthetic speech. To overcome this problem we introduce the corpus-based TTS system which enables to generate natural synthetic speech without prosodic modifications. The corpus should be composed of a natural prosody of source speech and multiple instances of synthesis units. To make a phone level synthesis unit, we train a speech recognizer with the target speech, and then perform an automatic phoneme segmentation. We also detect the fine pitch period using Laryngo graph signals, which is used for prosodic feature extraction. For break strength allocation, 4 levels of break indices are decided as pause length and also attached to phones to reflect prosodic variations in phrase boundaries. To predict the break strength on texts, we utilize the statistical information of POS (Part-of-Speech) sequences. The best triphone sequences are selected by Viterbi search considering the minimization of accumulative Euclidean distance of concatenating distortion. To get high quality synthesis speech applicable to commercial purpose, we introduce a domain specific database. By adding domain specific database to general domain database, we can greatly improve the quality of synthetic speech on specific domain. From the subjective evaluation, the new Korean corpus-based TTS system shows better naturalness than the conventional demisyllable-based one.

  • PDF

Dynamic Computed Tomography based on Spatio-temporal Analysis in Acute Stroke: Preliminary Study (급성 뇌졸중 환자의 시공간 분석 기법을 이용한 동적 전산화 단층 검사: 예비 연구)

  • Park, Ha-Young;Pyeon, Do-Yeong;Kim, Da-Hye;Jung, Young-jin
    • Journal of radiological science and technology
    • /
    • v.39 no.4
    • /
    • pp.543-547
    • /
    • 2016
  • Acute stroke is a one of common disease that require fast diagnosis and treatment to save patients life. however, the acute stroke may cause lifelong disability due to brain damage with no prompt surgical procedure. In order to diagnose the Stroke, brain perfusion CT examination and possible rapid implementation of 3D angiography has been widely used. However, a low-dose technique should be applied for the examination since a lot of radiation exposure to the patient may cause secondary damage for the patients. Therefore, the degradation of the measured CT images may interferes with a clinical check in that blood vessel shapes on the CT image are significantly affected by gaussian noise. In this study, we employed the spatio-temporal technique to analyze dynamic (brain perfusion) CT data to improve an image quality for successful clinical diagnosis. As a results, proposed technique could remove gaussian noise successfully, demonstrated a possibility of new image segmentation technique for CT angiography. Qualitative evaluation was conducted by skilled radiological technologists, indicated significant quality improvement of dynamic CT images. the proposed technique will be useful tools as a clinical application for brain perfusion CT examination.

Network-Adaptive HD Video Streaming with Cross-Layered WLAM Channel Monitoring (Cross Layer 기반의 무선랜 채널 모니터링을 적용한 네트워크 적응형 HD 비디오 스트리밍)

  • Park Sang-Hoon;Yoon Ha-Young;Kim Jong-Won;Cho Chang-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4A
    • /
    • pp.421-430
    • /
    • 2006
  • In this paper, we propose a practical implementation of network-adaptive HD(high definition) MPEG-2 video streaming with a cross-layered channel monitoring(CLM) over the IEEE 802.11a WLAN(wireless local area network). For wireless channel monitoring, AP(access point) periodically measures the MAC(medium access control) layer transmission information and sends the monitoring information to a streaming server. This makes that the streaming server reacts more quickly as well as efficiently to the fluctuated wireless channel than that of the end-to-end monitoring(E2EM) scheme for the video adaptation. The streaming sewer dynamically performs the priority-based frame dropping to adjust the video sending rate according to the measured wireless channel condition. For this purpose, our streaming system nicely provides frame-based prioritized packetization by using a real-time stream parsing module. Various evaluation results over an IEEE 802.11a WLAM testbed are provided to verify the intended QoS adaptation capability The experimental results show that the proposed system can effectively mitigate the quality degradation of video streaming caused by the fluctuations of time-varying wireless channel condition.

Future Development Strategies for KODISA Journals : Overview of 2017 and Strategic Plans for the Future (KODISA 학술지 성장전략: 2017 개관 및 미래 성장개요)

  • Hwang, Hee-Joong;Shin, Dong-Jin;Lee, Jung-Wan;Kim, Dong-Ho;Lee, Jong-Ho;Kim, Byung-Goo;Kim, Tae-Joong;Lee, Yong-Ki;Suh, Eung-Kyo;Kang, Min-Soo;Seo, Won-Jae;Kim, Jong-Jin;Zhang, Fan;Su, Shuai;Youn, Myoung-Kil
    • Journal of Distribution Science
    • /
    • v.16 no.5
    • /
    • pp.83-90
    • /
    • 2018
  • Purpose - Journals of Korea Distribution Science Association (KODISA) made great efforts in responding to the constant shifts in academic paradigms and in producing synergetic effects among KODISA journals to achieve the goal of maintaining their status in the world's reputable scholarly journals. The aim of this study is to analyze the current practice and performance of KODISA journals and develop strategies that will continuously meet and respond to the changes and success in the future. Research design, data, and methodology - This is a case study, an analytical approach, which focuses on analyzing current and previous strategies, practices, and performances of the four major journals of KODISA and the association. The organizational structure, including election and terms of KODISA officers, new membership, and members of editorial board, is discussed and analyzed. The citation, submission, publication, and rejection rates of all four journals are examined, and the progress, including the status of indexing of each journal, is discussed. Results - The analysis indicates that KODISA has significantly invested its resources into improving its journals and attracting new members. The analysis also shows the strategy of the organizational structure, which includes election and terms of officers and editorial board members that implemented over the years, was successful. Both Journal of Distribution Science (JDS) and Journal of Finance, Economics, and Business (JAFEB) are indexed in SCOPUS, with East Asian Journal of Business Management (EAJBM) in the final stage of the SCOPUS indexing evaluation, and International Journal of Industrial Distribution and Business (IJIDB) will complete and submit their indexing evaluation materials to SCOPUS this summer. Conclusions - The success and progress of KODISA and its journals clearly support the need for continuous development, analysis, revision, and implementation of strategies. Based on the analysis, conducting the annual performance reviews of the association and its journals and planning and strategizing based on the reviews since 2011 have greatly contributed to the overall success. In terms of meeting the short term strategy, KODISA has to continue developing relationships with relevant and appropriate scholarly/academic associations to expand the scope of its business, establishing independence of each journal and its respective procedures and practices and improving the quality of the journals and their publications through KODISA's international conferences.

A hybrid algorithm for the synthesis of computer-generated holograms

  • Nguyen The Anh;An Jun Won;Choe Jae Gwang;Kim Nam
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2003.07a
    • /
    • pp.60-61
    • /
    • 2003
  • A new approach to reduce the computation time of genetic algorithm (GA) for making binary phase holograms is described. Synthesized holograms having diffraction efficiency of 75.8% and uniformity of 5.8% are proven in computer simulation and experimentally demonstrated. Recently, computer-generated holograms (CGHs) having high diffraction efficiency and flexibility of design have been widely developed in many applications such as optical information processing, optical computing, optical interconnection, etc. Among proposed optimization methods, GA has become popular due to its capability of reaching nearly global. However, there exits a drawback to consider when we use the genetic algorithm. It is the large amount of computation time to construct desired holograms. One of the major reasons that the GA' s operation may be time intensive results from the expense of computing the cost function that must Fourier transform the parameters encoded on the hologram into the fitness value. In trying to remedy this drawback, Artificial Neural Network (ANN) has been put forward, allowing CGHs to be created easily and quickly (1), but the quality of reconstructed images is not high enough to use in applications of high preciseness. For that, we are in attempt to find a new approach of combiningthe good properties and performance of both the GA and ANN to make CGHs of high diffraction efficiency in a short time. The optimization of CGH using the genetic algorithm is merely a process of iteration, including selection, crossover, and mutation operators [2]. It is worth noting that the evaluation of the cost function with the aim of selecting better holograms plays an important role in the implementation of the GA. However, this evaluation process wastes much time for Fourier transforming the encoded parameters on the hologram into the value to be solved. Depending on the speed of computer, this process can even last up to ten minutes. It will be more effective if instead of merely generating random holograms in the initial process, a set of approximately desired holograms is employed. By doing so, the initial population will contain less trial holograms equivalent to the reduction of the computation time of GA's. Accordingly, a hybrid algorithm that utilizes a trained neural network to initiate the GA's procedure is proposed. Consequently, the initial population contains less random holograms and is compensated by approximately desired holograms. Figure 1 is the flowchart of the hybrid algorithm in comparison with the classical GA. The procedure of synthesizing a hologram on computer is divided into two steps. First the simulation of holograms based on ANN method [1] to acquire approximately desired holograms is carried. With a teaching data set of 9 characters obtained from the classical GA, the number of layer is 3, the number of hidden node is 100, learning rate is 0.3, and momentum is 0.5, the artificial neural network trained enables us to attain the approximately desired holograms, which are fairly good agreement with what we suggested in the theory. The second step, effect of several parameters on the operation of the hybrid algorithm is investigated. In principle, the operation of the hybrid algorithm and GA are the same except the modification of the initial step. Hence, the verified results in Ref [2] of the parameters such as the probability of crossover and mutation, the tournament size, and the crossover block size are remained unchanged, beside of the reduced population size. The reconstructed image of 76.4% diffraction efficiency and 5.4% uniformity is achieved when the population size is 30, the iteration number is 2000, the probability of crossover is 0.75, and the probability of mutation is 0.001. A comparison between the hybrid algorithm and GA in term of diffraction efficiency and computation time is also evaluated as shown in Fig. 2. With a 66.7% reduction in computation time and a 2% increase in diffraction efficiency compared to the GA method, the hybrid algorithm demonstrates its efficient performance. In the optical experiment, the phase holograms were displayed on a programmable phase modulator (model XGA). Figures 3 are pictures of diffracted patterns of the letter "0" from the holograms generated using the hybrid algorithm. Diffraction efficiency of 75.8% and uniformity of 5.8% are measured. We see that the simulation and experiment results are fairly good agreement with each other. In this paper, Genetic Algorithm and Neural Network have been successfully combined in designing CGHs. This method gives a significant reduction in computation time compared to the GA method while still allowing holograms of high diffraction efficiency and uniformity to be achieved. This work was supported by No.mOl-2001-000-00324-0 (2002)) from the Korea Science & Engineering Foundation.

  • PDF

A Study on Implementation of Primary Health Care Delivery System meet to Rural Area in Korea -Village Health Voluntary Worker Development- (우리 나라 농촌지역(農村地域)에 부합하는 1차(次) 보건의료전달체계(保健醫療傳達體系) 정착구현(定着具現)에 관한 연구(硏究) -마을 보건임원(保健任員) 개발(開發)-)

  • Koo, Y.C.;Wie, J.H.;Hwang, S.J.;Choi, S.S.
    • Journal of Preventive Medicine and Public Health
    • /
    • v.12 no.1
    • /
    • pp.13-23
    • /
    • 1979
  • A study was carried out from October 1977 to September 1978 in order to develope health care delively system which will meet to rural area in Korea. For the study objective a model of health care delivery system of Myun (township) area was developed which is adopted the net-work of village health voluntary worker who will play the role of bridge for communication related with health and illness between families or village people and health subcenter, and :he model health care delivery system net-work was set in the area of Soodong Myun, Yangju Gun. which is the rural health demonstration area of Ewha Womans University since 1972. The activities and attitude of 22 village health voluntary workers were observed and analized. during the study period. The results are as follows; 1. For the field activities of village health voluntary workers. a guide line which is described with specific behavioral objectives was developed and used for not only training of the workers but also evaluation of their field activities. 2. During the study period, the number of 971 village people were served primary health care service by village health voluntary worker and the service was classified largely into symptomatic medications (92%) and preventive measures (8%). 3. Comparative percentage of the number of 894 symptomatic cases cared by village health voluntary workers to 5,695 cases of patient treated by Soodong Health Subcenter during the same period was 15.7%. 4. Annual utility rate of village health voluntary worker by Myun total people was 16.1% but utility rate by Rie was varied from 38.2% to 2.8% which shown there were considerable differences in each Rie. In order to settle the village health care service, the obstructive factors of utility should be detected and their counter measure must be taken. 5. As the health need of village people increases, it is expected that the supplement of drug excluding present sit basic drugs is inevitable, but considering the ability of village health voluntary worker, the selection of additional drugs and education, plan should be carefully studied. 6. It is desirable that a financial resource for supplementary purchase of first aid kit, drugs and materials whould be alloted from village public fund like Saemaeul Women's Club fund, which has already practiced in a few villages in the study area. 7. As pointed out by village health voluntary workers, in order to improve the village health, village leaders should be in the center of it and the cooperation of whole village people is a core of healthful village development, and it is reasonable that the health subcenter backs up these voluntary health activities by village people in techniques. 8. It seems effective that a supplementary education for village health voluntary worker be accomplished by a planned education through regular meetings like worker's monthly meeting and irregular post guide when Myun Health Workers can handle the problems found during the round trip of villages. 9. It is desirable that village health voluntary workers, who are recommended by a civil voluntary organization like Saemael Woman's Club, are charged by natural villagc unit, are given a function of village health care service and used through basic education at health subcenter. 10. It is advisable that the village health voluntary worker's service is compensated not by a form of money, but by other way such as an exemption of medical fee of worker herself or her families in health subcenter can be one method. 11. Daily health activities of each village health voluntary worker should be reported to health subcenter by biweekly or monthly in order to get not only for basic data of the program but also for evaluation the program. It is recomandable that the report form should be simple and clear enough for village health voluntary worker to fill it effectively. 12. Village health care service should be developed into a Saemaeul Movement in which village people actively participate. For this, the appointed function of village health voluntary worker should be absorbed into those of living Environment Betterment Section or Family Planning Section of Saemaeul Women's Club or it is desirable that establish a new section, Village Health Promoting Section and make it involve the appointed functions of those sections mentioned above.

  • PDF

Seismic Performance Evaluation of Full-Sized RC Bridge Piers with tap-Spliced longitudinal Steels according to Lateral Confinement (주철근 겹침이음된 실물교각의 횡구속 정도에 따른 내진성능 평가)

  • Park Chang-Kyu;Chung Young-Soo;Ko Seong-Hyun;Lee Jae-Hoon
    • Journal of the Korea Concrete Institute
    • /
    • v.16 no.5 s.83
    • /
    • pp.687-696
    • /
    • 2004
  • It has been known that practically unavoidable lap splices of longitudinal reinforcement in the plastic hinge region have a bad effect on the seismic performance of reinforced concrete bridge columns. Lap splices were usually located in the plastic hinge region of most bridge columns designed before the implementation of the new seismic design provisions of 1992 Korea Bridge Design specification. The objective of this research is to evaluate the seismic performance of full-sized reinforced concrete bridge piers with lap splice of longitudinal reinforcement in the plastic hinge region, and to develop an appropriate lateral confinement concept of RC bridge columns with lap-spliced longitudinal steels in low or moderate seismicity region. Eight test specimens in the aspect ratio of 4.0 were made with three types of lap splicing, two levels of confinement steel ratios and two types of tie configurations. It was confirmed from the Quasi-Static test that displacement ductility ratios were significantly reduced for nonseismic test columns with lap spliced longitudinal steels but were satisfied the seismic requirement for limited ductile design specimens. As a conclusion, pertinent lateral confinement content was proposed for the seismic. performance of RC bridge piers with $50\%$ lap-spliced longitudinal reinforcing steels in low or moderate seismicity region.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.