• Title/Summary/Keyword: Large-scale database

Search Result 298, Processing Time 0.028 seconds

The Analysis Method based on the Business Model for Developing Web Application Systems (웹 응용 시스템 개발을 위한 업무모델 기반의 분석방법)

  • 조용선;정기원
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1193-1207
    • /
    • 2003
  • Various web applications are developed as the Internet is popularized in many fields. However, in most cases of web application development, systematic analysis is omitted and developers jump into the implementation. Therefore developers have difficulties with applying the development methods for a large scale project. The approach of creating an analysis models of a web application from a business model is proposed for the rapid and efficient development. The analysis process, tasks and techniques are proposed for this approach. The use case diagram and web page list are created from business modes that is depicted using the notation of UML activity diagram. The page diagram and logical / physical database models are created using the use case diagram and the web page list. These analysis models are refined during the detailed design phase. The efficiency of proposed method has been shown using a practical case study which reflects the development project of the web application for supporting the association of auto repair shops.

Variations of AlexNet and GoogLeNet to Improve Korean Character Recognition Performance

  • Lee, Sang-Geol;Sung, Yunsick;Kim, Yeon-Gyu;Cha, Eui-Young
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.205-217
    • /
    • 2018
  • Deep learning using convolutional neural networks (CNNs) is being studied in various fields of image recognition and these studies show excellent performance. In this paper, we compare the performance of CNN architectures, KCR-AlexNet and KCR-GoogLeNet. The experimental data used in this paper is obtained from PHD08, a large-scale Korean character database. It has 2,187 samples of each Korean character with 2,350 Korean character classes for a total of 5,139,450 data samples. In the training results, KCR-AlexNet showed an accuracy of over 98% for the top-1 test and KCR-GoogLeNet showed an accuracy of over 99% for the top-1 test after the final training iteration. We made an additional Korean character dataset with fonts that were not in PHD08 to compare the classification success rate with commercial optical character recognition (OCR) programs and ensure the objectivity of the experiment. While the commercial OCR programs showed 66.95% to 83.16% classification success rates, KCR-AlexNet and KCR-GoogLeNet showed average classification success rates of 90.12% and 89.14%, respectively, which are higher than the commercial OCR programs' rates. Considering the time factor, KCR-AlexNet was faster than KCR-GoogLeNet when they were trained using PHD08; otherwise, KCR-GoogLeNet had a faster classification speed.

Image Identifier based on Local Feature's Histogram and Acceleration Technique using GPU (지역 특징 히스토그램 기반 영상식별자와 GPU 가속화)

  • Jeon, Hyeok-June;Seo, Yong-Seok;Hwang, Chi-Jung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.9
    • /
    • pp.889-897
    • /
    • 2010
  • Recently, a cutting-edge large-scale image database system has demanded these attributes: search with alarming speed, performs with high accuracy, archives efficiently and much more. An image identifier (descriptor) is for measuring the similarity of two images which plays an important role in this system. The extraction method of an image identifier can be roughly classified into two methods: a local and global method. In this paper, the proposed image identifier, LFH(Local Feature's Histogram), is obtained by a histogram of robust and distinctive local descriptors (features) constrained by a district sub-division of a local region. Furthermore, LFH has not only the properties of a local and global descriptor, but also can perform calculations at a magnificent clip to determine distance with pinpoint accuracy. Additionally, we suggested a way to extract LFH via GPU (OpenGL and GLSL). In this experiment, we have compared the LFH with SIFT (local method) and EHD (global method) via storage capacity, extraction and retrieval time along with accuracy.

Optimization of Planning-Level Locomotive Scheduling at KNR and Development of Its Implementation Prototype Program (한국철도에서의 계획단계 동력차 스케줄링 최적화 및 전문가 지원시스템의 프로토타입 프로그램 개발에 관한 연구)

  • 문대섭;김동오
    • Proceedings of the KSR Conference
    • /
    • 1999.11a
    • /
    • pp.46-53
    • /
    • 1999
  • As of July 1999, i,185 lomocotives(excluding metropolitan area electric locomotives) are in Korean National Railroad(KNR). With this limited number of resources assigning locomotives to each trains of timetable is very important in the entire railway management point of view because schedule can be regarded as goods in transportation industry. On a simple rail network, it is rather easier to assign proper locomotives to trains with the experience of operating experts and get optimal assignment solution. However, as the network is getting bigger and complicated, the number of trains and corresponding locomotives will be dramatically increased to rover all the demands required to service all of the trains in timetable. There will be also numerous operational constraints to be considered. Assigning proper locomotives to trains and building optimal cyclic rotations of locomotive routings will result in increasing efficiency of schedule and giving a guarantee of more profit. The purpose of this study is two fold: (1) we consider a planning-level locomotive scheduling problem with the objective of minimizing the wasting cost under various practical constraints and (2) development of implementation prototype program of its assigning result. Not like other countries, i.e. Canada, Sweden, Korean railroad operates on n daily schedule basis. The objective is to find optimal assignment of locomotives of different types to each trains, which minimize the wasting cost. This problem is defined on a planning stage and therefore, does not consider operational constraints such as maintenance and emergency cases. Due to the large scale of the problem size and complexity, we approach with heuristic methods and column generation to find optimal solution. The locomotive scheduling prototype consists of several modules including database, optimization engine and diagram generator. The optimization engine solves MIP model and provides an optimal locomotive schedule using specified optimization algorithms. A cyclic locomotive route diagram can be generated using this optimal schedule through the diagram generator.

  • PDF

Parenteral Nutrition in Hospitalized Adult Patients in South Korea (성인 입원환자의 정맥영양요법 사용 현황)

  • Ock, Miyoung;Lee, Sera;Kim, Hyunah
    • Journal of Clinical Nutrition
    • /
    • v.10 no.2
    • /
    • pp.38-44
    • /
    • 2018
  • Purpose: Parenteral nutrition (PN) is known to provide therapeutic beneficial improvements in malnourished patients for whom enteral nutrition is not feasible. The objective of this study was to investigate the current clinical characteristics and utilization of PN in Korea. Methods: We analyzed the Health Insurance Review Agency National Inpatients Sample database from 2014 to 2016, which included 13% of all hospitalized patients in Korea. Adult patients aged 20 years or older and receiving premixed multi-chamber bag containing PN were included for this study. Patient characteristics, admission type, primary diagnosis, and hospital demographics were evaluated. SAS version 9.4 was used for data analysis. Results: From 2014 to 2016, 149,504 patients received premixed PN, with 226,281 PN prescriptions being written. The mean patient age was 65.0 years, and 81,876 patients (54.8%) were male. Premixed 3-chamber bag and 2-chamber bag PN solutions were utilized in 131,808 (88.2%) and 32,033 (21.4%) patients, respectively. The number of patients hospitalized through the emergency department were 70,693 (47.3%), whereas 43,125 patients (28.8%) were administered PN in intensive care units. In the adult PN patients, the highest primary diagnosis was malignant neoplasm of the stomach (8,911, 6.0%), followed by organism unspecified pneumonia (7,008, 4.7%), and gastroenteritis and colitis of unspecified origin (6,381, 4.3%). Overall, 34% of adult PN patients were diagnosed with malignancies, the most common being neoplasm of the stomach (17.7%), neoplasm of bronchus/lung (11.2%), neoplasm of colon (11.1%), and neoplasm of liver/intrahepatic bile ducts (10.0%). PN solutions were most frequently administered in the metropolitan area (55.0%) and in hospitals with more than 1,000 beds (23.6%). Conclusion: PN was commonly administered in older patients, with primary diagnosis of malignancy in a significant number of cases. This study is the first large-scale description of PN-prescribing patterns in real-world clinical practice in South Korea.

Chromosome numbers and polyploidy events in Korean non-commelinids monocots: A contribution to plant systematics

  • JANG, Tae-Soo;WEISS-SCHNEEWEISS, Hanna
    • Korean Journal of Plant Taxonomy
    • /
    • v.48 no.4
    • /
    • pp.260-277
    • /
    • 2018
  • The evolution of chromosome numbers and the karyotype structure is a prominent feature of plant genomes contributing to or at least accompanying plant diversification and eventually leading to speciation. Polyploidy, the multiplication of whole chromosome sets, is widespread and ploidy-level variation is frequent at all taxonomic levels, including species and populations, in angiosperms. Analyses of chromosome numbers and ploidy levels of 252 taxa of Korean non-commelinid monocots indicated that diploids (ca. 44%) and tetraploids (ca. 14%) prevail, with fewer triploids (ca. 6%), pentaploids (ca. 2%), and hexaploids (ca. 4%) being found. The range of genome sizes of the analyzed taxa (0.3-44.5 pg/1C) falls well within that reported in the Plant DNA C-values database (0.061-152.33 pg/1C). Analyses of karyotype features in angiosperm often involve, in addition to chromosome numbers and genome sizes, mapping of selected repetitive DNAs in chromosomes. All of these data when interpreted in a phylogenetic context allow for the addressing of evolutionary questions concerning the large-scale evolution of the genomes as well as the evolution of individual repeat types, especially ribosomal DNAs (5S and 35S rDNAs), and other tandem and dispersed repeats that can be identified in any plant genome at a relatively low cost using next-generation sequencing technologies. The present work investigates chromosome numbers (n or 2n), base chromosome numbers (x), ploidy levels, rDNA loci numbers, and genome size data to gain insight into the incidence, evolution and significance of polyploidy in Korean monocots.

Implementation of Ontology-based Service by Exploiting Massive Crime Investigation Records: Focusing on Intrusion Theft (대규모 범죄 수사기록을 활용한 온톨로지 기반 서비스 구현 - 침입 절도 범죄 분야를 중심으로 -)

  • Ko, Gun-Woo;Kim, Seon-Wu;Park, Sung-Jin;No, Yoon-Joo;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.57-81
    • /
    • 2019
  • An ontology is a complex structure dictionary that defines the relationship between terms and terms related to specific knowledge in a particular field. There have been attempts to construct various ontologies in Korea and abroad, but there has not been a case in which a large scale crime investigation record is constructed as an ontology and a service is implemented through the ontology. Therefore, this paper describes the process of constructing an ontology based on information extracted from instrusion theft field of unstructured data, a crime investigation document, and implementing an ontology-based search service and a crime spot recommendation service. In order to understand the performance of the search service, we have tested Top-K accuracy measurement, which is one of the accuracy measurement methods for event search, and obtained a maximum accuracy of 93.52% for the experimental data set. In addition, we have obtained a suitable clue field combination for the entire experimental data set, and we can calibrate the field location information in the database with the performance of F1-measure 76.19% Respectively.

The Effects of Exercise Program on Pain and Balance ability in Patients with Total Knee Replacement : Meta-analysis

  • Park, Se-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.5
    • /
    • pp.119-126
    • /
    • 2021
  • This study attempted to systematically and comprehensively analyze individual studies in which exercise program on total knee replacement patients. The electronic database for literature search used the Korean educational Academic Information (RISS), Korean Academic Information (KISS) and Nuri Media (DBPIA). We investigated a prior study of exercise program applied to total knee replacement patients from 2015 to February 2021. For meta-analysis, effect size of each individual study was extracted using R project for Statistical computing version 4.0.3. Rob 2.0 tool, developed by the Cochrane group, was used to evaluate the quality of each individual study. The overall effect size exercise program with pain and balance was 0.99 (95% CI=0.53-1.44), which was significantly different than large effect size (p<0.05). The sub-group for pain was analyzed, for effect size of 0.62 and the effect size of balance scale(timed up and go test) was 1.00. Through these results, it was found that exercise program is an effective exercise for total knee replacement patients, and further research is needs.

Clinical Studies of Acupuncture Treatment for Alzheimer's Disease Using Neuroimaging Method: A Review of Literature (알츠하이머병의 신경영상 기법을 이용한 침치료 임상연구: 문헌고찰)

  • Lee, Dong Hyuk;Kim, Joo-Hee;Kwon, Bo-In
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.34 no.5
    • /
    • pp.222-228
    • /
    • 2020
  • The purpose of this article was to investigate the current state of studies on clinical trials of acupuncture treatment for Alzheimer's disease using neuroimaging method. We searched for clinical trials of acupuncture treatment for Alzheimer's disease(AD) and mild cognitive impairment(MCI) using neuroimaging method in the MEDLINE (Pubmed) database on March 18, 2020. Once the online search was finished, studies were selected manually by the inclusion criteria. Finally, we analyzed the characteristics of selected articles and reviewed the neural substrates of acupuncture treatment in AD. Total ten studies were included in this study. The most frequently applied modality for AD was functional MRI. The most frequently selected acupoints for AD were KI3, LR3 and LI4. One of studies showed that acupuncture treatment could improve the symptoms of MCI. Through the analysis, we demonstrated that neuroimaging method could capture the neural substrates associated with AD. Moreover, acupuncture may induce differential response according to the disease status. Finally, real acupuncture could produce more extensive activation/deactivation than sham acupuncture. We hope that neuroimaging method can contribute to the clinical research of acupuncture treatment for AD through large-scale RCT and diverse imaging modality.

A Strong RFID Authentication Protocol Based on Synchronized Secret Information (비밀정보 동기화에 기반한 Strong RFID 인증)

  • Ha, Jae-Cheol;Ha, Jung-Hoon;Park, Jea-Hoon;Moon, Sang-Jae;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.99-109
    • /
    • 2007
  • Lee et al. recently proposed an RFID mutual authentication scheme based on synchronized secret information. However, we found that their protocol is vulnerable to a spoofing attack in which an adversary can impersonate a legal tag to the reader by sending a malicious random number. To remedy this vulnerability, we propose two RFID authentication protocols which are secure against all possible threats including backward and forward traceability. Furthermore, one of the two proposed protocols requires only three hash operations(but, $[m/2]{\cdot}2+3$ operations in resynchronization state, m is the number of tags) in the database to authenticate a tag, hence it is well suitable fur large scale RFID systems.