• Title/Summary/Keyword: International code

Search Result 1,066, Processing Time 0.025 seconds

Standardization of the Method of Measuring Average Glandular Dose (AGD) and Evaluation of the Breast Composition and Thickness for AGD (평균 유선선량 측정방법의 표준화 및 유방 두께, 실질양상과의 상관관계 분석)

  • Park, Hye-Suk;Kim, Hee-Joung;Lee, Chang-Lae;Cho, Hyo-Min;Yu, A-Ram
    • Progress in Medical Physics
    • /
    • v.20 no.1
    • /
    • pp.21-29
    • /
    • 2009
  • Breast cancer is the most common form of cancer among korean woman. Therefore, the early detection activities of breast cancer such as breast self-examinations, clinical breast examinations, mammography are important. A yearly mammography examination has been recommended for women aged 40 and older for the early detection of breast cancer in asymptomatic periods. However, the glandular tissue of breast is the most radiation-sensitive tissue, and the determination of average glandular dose (AGD) forms an important part of the quality control of the mammographic systems. Because of the difficulty of estimating AGD directly, it is often estimated from the measurements of the incident air kerma and by applying the appropriate conversion factors. The primary objective of this study was to standardize the method of measuring AGD. The secondary objective was to evaluate the relationships between AGD per various composition and thickness of the breast using Monte Carlo simulations. As a result, we standardized the method of measuring AGD according to International Atomic Energy Agency (IAEA) guidelines (CoP: an international code of practice). Overall, AGD for mammographic practice in Korea was less than 3.0 mGy recommended by the Korea Food and Drug Adminstration (KFDA) protocol, and Korean Institute for Accreditation of Medical Image (KIAMI). The measured and simulated AGD for a given condition were calculated as 1.7 and 1.6 mGy, respectively. For the AGDs obtained, there was no significant difference between them. The simulated AGD was dependent on the fraction of glandular tissue of the breast. The AGD increases with increasing of the breast glandularity due to increasing absorption of low energy photons. The AGD also increases as a function of breast thickness. In conclusion, the results of this study could be used as a baseline to establish a reference level of radiation dose in mammography.

  • PDF

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India

  • Simmi Chawla;Parul Tomar;Sapna Gambhir
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.163-169
    • /
    • 2024
  • India is a developing nation and has come with comprehensive way in modernizing its reducing poverty, economy and rising living standards for an outsized fragment of its residents. The STEM (Science, Technology, Engineering, and Mathematics) education plays an important role in it. STEM is an educational curriculum that emphasis on the subjects of "science, technology, engineering, and mathematics". In traditional education scenario, these subjects are taught independently, but according to the educational philosophy of STEM that teaches these subjects together in project-based lessons. STEM helps the students in his holistic development. Youth unemployment is the biggest concern due to lack of adequate skills. There is a huge skill gap behind jobless engineers and the question arises how we can prepare engineers for a better tomorrow? Now a day's Industry 4.0 is a new fourth industrial revolution which is an intelligent networking of machines and processes for industry through ICT. It is based upon the usage of cyber-physical systems and Internet of Things (IoT). Industrial revolution does not influence only production but also educational system as well. IoT in academics is a new revolution to the Internet technology, which introduced "Smartness" in the entire IT infrastructure. To improve socio-economic status of the India students must equipped with 21st century digital skills and Universities, colleges must provide individual learning kits to their students which can help them in enhancing their productivity and learning outcomes. The major goal of this paper is to present a low cost, effective learning mechanism for STEM implementation using Raspberry Pi 3+ model (Single board computer) and Node Red open source visual programming tool which is developed by IBM for wiring hardware devices together. These tools are broadly used to provide hands on experience on IoT fundamentals during teaching and learning. This paper elaborates the appropriateness and the practicality of these concepts via an example by implementing a user interface (UI) and Dashboard in Node-RED where dashboard palette is used for demonstration with switch, slider, gauge and Raspberry pi palette is used to connect with GPIO pins present on Raspberry pi board. An LED light is connected with a GPIO pin as an output pin. In this experiment, it is shown that the Node-Red dashboard is accessing on Raspberry pi and via Smartphone as well. In the final step results are shown in an elaborate manner. Conversely, inadequate Programming skills in students are the biggest challenge because without good programming skills there would be no pioneers in engineering, robotics and other areas. Coding plays an important role to increase the level of knowledge on a wide scale and to encourage the interest of students in coding. Today Python language which is Open source and most demanding languages in the industry in order to know data science and algorithms, understanding computer science would not be possible without science, technology, engineering and math. In this paper a small experiment is also done with an LED light via writing source code in python. These tiny experiments are really helpful to encourage the students and give play way to learn these advance technologies. The cost estimation is presented in tabular form for per learning kit provided to the students for Hands on experiments. Some Popular In addition, some Open source tools for experimenting with IoT Technology are described. Students can enrich their knowledge by doing lots of experiments with these freely available software's and this low cost hardware in labs or learning kits provided to them.

The Standard of Judgement on Plagiarism in Research Ethics and the Guideline of Global Journals for KODISA (KODISA 연구윤리의 표절 판단기준과 글로벌 학술지 가이드라인)

  • Hwang, Hee-Joong;Kim, Dong-Ho;Youn, Myoung-Kil;Lee, Jung-Wan;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.12 no.6
    • /
    • pp.15-20
    • /
    • 2014
  • Purpose - In general, researchers try to abide by the code of research ethics, but many of them are not fully aware of plagiarism, unintentionally committing the research misconduct when they write a research paper. This research aims to introduce researchers a clear and easy guideline at a conference, which helps researchers avoid accidental plagiarism by addressing the issue. This research is expected to contribute building a climate and encouraging creative research among scholars. Research design, data, methodology & Results - Plagiarism is considered a sort of research misconduct along with fabrication and falsification. It is defined as an improper usage of another author's ideas, language, process, or results without giving appropriate credit. Plagiarism has nothing to do with examining the truth or accessing value of research data, process, or results. Plagiarism is determined based on whether a research corresponds to widely-used research ethics, containing proper citations. Within academia, plagiarism goes beyond the legal boundary, encompassing any kind of intentional wrongful appropriation of a research, which was created by another researchers. In summary, the definition of plagiarism is to steal other people's creative idea, research model, hypotheses, methods, definition, variables, images, tables and graphs, and use them without reasonable attribution to their true sources. There are various types of plagiarism. Some people assort plagiarism into idea plagiarism, text plagiarism, mosaic plagiarism, and idea distortion. Others view that plagiarism includes uncredited usage of another person's work without appropriate citations, self-plagiarism (using a part of a researcher's own previous research without proper citations), duplicate publication (publishing a researcher's own previous work with a different title), unethical citation (using quoted parts of another person's research without proper citations as if the parts are being cited by the current author). When an author wants to cite a part that was previously drawn from another source the author is supposed to reveal that the part is re-cited. If it is hard to state all the sources the author is allowed to mention the original source only. Today, various disciplines are developing their own measures to address these plagiarism issues, especially duplicate publications, by requiring researchers to clearly reveal true sources when they refer to any other research. Conclusions - Research misconducts including plagiarism have broad and unclear boundaries which allow ambiguous definitions and diverse interpretations. It seems difficult for researchers to have clear understandings of ways to avoid plagiarism and how to cite other's works properly. However, if guidelines are developed to detect and avoid plagiarism considering characteristics of each discipline (For example, social science and natural sciences might be able to have different standards on plagiarism.) and shared among researchers they will likely have a consensus and understanding regarding the issue. Particularly, since duplicate publications has frequently appeared more than plagiarism, academic institutions will need to provide pre-warning and screening in evaluation processes in order to reduce mistakes of researchers and to prevent duplicate publications. What is critical for researchers is to clearly reveal the true sources based on the common citation rules and to only borrow necessary amounts of others' research.

The Multi-door Courthouse: Origin, Extension, and Case Studies (멀티도어코트하우스제도: 기원, 확장과 사례분석)

  • Chung, Yongkyun
    • Journal of Arbitration Studies
    • /
    • v.28 no.2
    • /
    • pp.3-43
    • /
    • 2018
  • The emergence of a multi-door courthouse is related with a couple of reasons as follows: First, a multi-door courthouse was originally initiated by the United States government that increasingly became impatient with the pace and cost of protracted litigation clogging the courts. Second, dockets of courts are overcrowded with legal suits, making it difficult for judges to handle those legal suits in time and causing delays in responding to citizens' complaints. Third, litigation is not suitable for the disputant that has an ongoing relationship with the other party. In this case, even if winning is achieved in the short run, it may not be all that was hoped for in the long run. Fourth, international organizations such as the World Bank, UNDP, and Asia Development Bank urge to provide an increased access to women, residents, and the poor in local communities. The generic model of a multi-door courthouse consists of three stages: The first stage includes a center offering intake services, along with an array of dispute resolution services under one roof. At the second stage, the screening unit at the center would diagnose citizen disputes, then refer the disputants to the appropriate door for handling the case. At the third stage, the multi-door courthouse provides diverse kinds of dispute resolution programs such as mediation, arbitration, mediation-arbitration (med-arb), litigation, and early neutral evaluation. This study suggests the extended model of multi-door courthouse comprised of five layers: intake process, diagnosis and door-selection process, neutral-selection process, implementation process of dispute resolution, and process of training and education. One of the major characteristics of extended multi-door courthouse model is the detailed specification of individual department corresponding to each process within a multi-door courthouse. The intake department takes care of the intake process. The screening department plays the role of screening disputes, diagnosing the nature of disputes, and determining a suitable door to handle disputes. The human resources department manages experts through the construction and management of the data base of mediators, arbitrators, and judges. The administration bureau manages the implementation of each process of dispute resolution. The education and training department builds long-term planning to procure neutrals and experts dealing with various kinds of disputes within a multi-door courthouse. For this purpose, it is necessary to establish networks among courts, law schools, and associations of scholars in order to facilitate the supply of manpower in ADR neutrals, as well as judges in the long run. This study also provides six case studies of multi-door courthouses across continents in order to grasp the worldwide picture and wide spread phenomena of multi-door courthouse. For this purpose, the United States and Latin American countries including Argentina and Brazil, Middle Eastern countries, and Southeast Asian countries (such as Malaysia and Myanmar), Australia, and Nigeria were chosen. It was found that three kinds of patterns are discernible during the evolution of a multi-door courthouse model. First, the federal courts of the United States, land and environment court in Australia, and Lagos multi-door courthouse in Nigeria may maintain the prototype of a multi-door courthouse model. Second, the judicial systems in Latin American countries tend to show heterogenous patterns in terms of the adaptation of a multi-door courthouse model to their own environments. Some court systems of Latin American countries including those of Argentina and Brazil resemble the generic model of a multi-door courthouse, while other countries show their distinctive pattern of judicial system and ADR systems. Third, it was found that legal pluralism is prevalent in Middle Eastern countries and Southeast Asian countries. For example, Middle Eastern countries such as Saudi Arabia have developed various kinds of dispute resolution methods, such as sulh (mediation), tahkim (arbitration), and med-arb for many centuries, since they have been situated at the state of tribe or clan instead of nation. Accordingly, they have no unified code within the territory. In case of Southeast Asian countries such as Myanmar and Malaysia, they have preserved a strong tradition of customary laws such as Dhammthat in Burma, and Shriah and the Islamic law in Malaysia for a long time. On the other hand, they incorporated a common law system into a secular judicial system in Myanmar and Malaysia during the colonial period. Finally, this article proposes a couple of factors to strengthen or weaken a multi-door courthouse model. The first factor to strengthen a multi-door courthouse model is the maintenance of flexibility and core value of alternative dispute resolution. We also find that fund raising is important to build and maintain the multi-door courthouse model, reflecting the fact that there has been a competition surrounding the allocation of funds within the judicial system.

The structural analysis and design methods considering joint bursting in the segment lining (조인트 버스팅을 고려한 세그먼트 라이닝 구조해석 및 설계방법)

  • Kim, Hong-Moon;Kim, Hyun-Su;Jung, Hyuk-Il
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.20 no.6
    • /
    • pp.1125-1146
    • /
    • 2018
  • Segment lining applied to the TBM tunnel is mainly made of concrete, and it requires sufficient structural capacity to resist loads received during the construction and also after the completion. When segment lining is design to the Limit State Design, both Ultimate Limit State (ULS) and Service Limit State (SLS) should be met for the possible load cases that covers both permanent and temporary load cases - such as load applied by TBM. When design segment lining, it is important to check structural capacity at the joints as both temporary and permanent loads are always transferred through the segment joints, and sometimes the load applied to the joint is high enough to damage the segment - so called bursting failure. According to the various design guides from UK (PAS 8810, 2016), compression stress at the joint surface can generate bursting failure of the segment. This is normally from the TBM's jacking force applied at the circumferential joint, and the lining's hoop thrust generated from the permanent loads applied at the radial joint. Therefore, precast concrete segment lining's joints shall be designed to have sufficient structural capacity to resist bursting stresses generated by the TBM's jacking force and by the hoop thrust. In this study, bursting stress at the segment joints are calculated, and the joint's structural capacity was assessed using Leonhardt (1964) and FEM analysis for three different design cases. For those three analysis cases, hoop thrust at the radial joint was calculated with the application of the most widely used limit state design codes Eurocode and AASHTO LRFD (2017). For the circumferential joints bursting design, an assumed TBM jack force was used with considering of the construction tolerance of the segments and the eccentricity of the jack's position. The analysis results show reinforcement is needed as joint bursting stresses exceeds the allowable tensile strength of concrete. This highlights that joint bursting check shall be considered as a mandatory design item in the limit state design of the segment lining.