• Title/Summary/Keyword: If-then 룰

Search Result 14, Processing Time 0.023 seconds

Development of Rule-based Expert System for Interpretative Report with Health Screening Tests (건강검진자를 대상으로 해석적 보고를 위한 전문가 시스템의 개발)

  • Lee, Chae-Hoon
    • Journal of Yeungnam Medical Science
    • /
    • v.24 no.2
    • /
    • pp.137-147
    • /
    • 2007
  • Background : Interpretative reporting is an important aspect of laboratory medicine. The large menu of laboratory tests available today makes it increasingly difficult for the non-specialist to order and interpret all laboratory tests. The aim of this study was to determine the usefulness of an expert system to interpret laboratory tests and help physicians order the appropriate tests. Materials and Methods : In order to interpret laboratory tests, a rules-based expert system was developed. In this module, if-then rules were used to interpret the given test result patterns (e.g. urinalysis, anemia, hepatitis B virus, hypercholesterolemia, glucose, syphilis, and tumor markers) and select matching text elements. The system was used to evaluate 535 subjects who visited a health-check program. Results : The overall abnormal rate was 50.5% in the expert system; 34% for cholesterol, 9.9% for urinalysis, 8.0% for anemia, 7.7% for thyroid function tests, 4.5% for tumor marker study, 4.7% for hepatitis virus antigen, 4.3% for serum glucose, and 1.1% for syphilis. Conclusion : These results indicate that the application of the expert system for the interpretation of laboratory tests may provide a useful method for the interpretation of reports. However more rules are needed for the application to in-patients.

  • PDF

The fuzzy handoff algorithm to send DAR signal in mobile SCTP (mobile SCTP 에서의 DAR 시그널 전송을 위한 퍼지 핸드오프 알고리즘)

  • Lee, Jae-Min;Han, Byung-Jin;Im, Heon-Jeong;Lee, Jong-Hyouk;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.950-953
    • /
    • 2007
  • 무선 인프라와 이동성 지원 기술의 발달로 한 장소에서 머물던 무선 인터넷 서비스를 이동 중에도 받을 수 있게 되었다. 이러한 환경의 변화로 인해 모바일 기기의 이동성에 대한 관심은 더욱 더 커지고 있으며, 이동성뿐만 아니라 유선과 마찬가지로 끊김 없는 서비스를 받고자 하는 요구도 높아지고 있다. 모바일 노드의 이동성을 지원하기 위해서 기존 네트워크 계층의 Mobile IP 와는 달리 전송 계층에서 동작하는 mSCTP (mobile Stream Control Transmission Protocol)가 등장하였다. mSCTP 는 기존 SCTP 의 멀티호밍과 동적으로 IP 주소를 변경할 수 있는 DAR (Dynamic Address Resolution) 시그널을 이용하여 모바일 노드의 핸드오프를 지원하고 있다. 하지만, IP 주소의 추가, 변경 및 삭제에 대한 각 시그널의 전송 시기에 대한 정의가 없어 전송 시기를 결정하는 메커니즘이 필요하다. 따라서 본 논문에서는 퍼지 IF-THEN 룰을 적용한 퍼지 모델을 이용하여 이러한 문제점을 해결하고자 한다. 모바일 노드가 이동하게 될 새로운 네트워크의 신호 세기와 현재 네트워크 신호와의 신호비를 퍼지 모델에 입력하고 그 결과 값을 통해 시그널 전송 시기를 판단한다. 모바일 노드는 핸드오프 시기를 적절히 판단 할 수 있기 때문에 잘못된 핸드오프로 인한 세션의 단절을 줄일 수 있고, 기존에 발생하던 핸드오프 지연 시간을 줄일 수 있어 이동 중에도 손실 없는 서비스를 제공 받을 수 있게 된다.

The Legal Protection Scope and Limitation of Information (정보의 법적 보호범위와 한계)

  • Kim, Hyung-Man;Yang, Myung-Sub
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.691-699
    • /
    • 2012
  • "Information", which is circulated in society by information technology development represented by computer, has brought innovation not only to physical civilization, but also deep into our daily lives. This is to say that information has brought fundamental change to its form of existence, and value system through being faster regarding the circulation and the way of management being diverse. As time goes by, this kind of change would stimulate more changes to be made as the development of scientific civilization. Therefore, informatization is one of the important characteristic that defines modern society's essence, but on the other side, information has been taken advantage of that temperament and abused in a lot of different ways. "The Law Regarding Computer Network Diffusion Expansion and Usage Promotion"(1986), as a counterplan of informatization is our nation's first Act about informatization, which enacts national policy and system about this issue. Since then, many laws has been enacted down to "Private Information Protection Act"(2011), forming a comprehensive system. The basic background of these laws are based upon the premise that even if the place where the information is managed is virtual space, rules that are considered valid in the real world should be basically applied in the virtual space. Therefore, the violation of the law in the real world is also considered the violation in the virtual space. This direction of current law regarding information is shared with both the theories and the reality. However, current law system and notion are based upon the premise that the law regards material objects, thus the characteristic of the information, which is "Immaterial Being" is not reflected. Also, the management and approach to this issue is allopathic, exposing many problems. Thus, this paper examines the way of protecting information stipulated in the current law, contemplates its protection scope and limitation, and seeks the direction of the improvement, based on the critical mind explained above.

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.