• Title/Summary/Keyword: Location Technology

Search Result 4,494, Processing Time 0.036 seconds

Stock Identification of Todarodes pacificus in Northwest Pacific (북서태평양에 서식하는 살오징어(Todarodes pacificus) 계군 분석에 대한 고찰)

  • Kim, Jeong-Yun;Moon, Chang-Ho;Yoon, Moon-Geun;Kang, Chang-Keun;Kim, Kyung-Ryul;Na, Taehee;Choy, Eun Jung;Lee, Chung Il
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.17 no.4
    • /
    • pp.292-302
    • /
    • 2012
  • This paper reviews comparison analysis of current and latest application for stock identification methods of Todarodes pacificus, and the pros and cons of each method and consideration of how to compensate for each other. Todarodes pacificus which migrates wide areas in western North Pacific is important fishery resource ecologically and commercially. Todarodes pacificus is also considered as 'biological indicator' of ocean environmental changes. And changes in its short and long term catch and distribution area occur along with environmental changes. For example, while the catch of pollack, a cold water fish, has dramatically decreased until today after the climate regime shift in 1987/1988, the catch of Todarodes pacificus has been dramatically increased. Regarding the decrease in pollack catch, overfishing and climate changes were considered as the main causes, but there has been no definite reason until today. One of the reasons why there is no definite answer is related with no proper analysis about ecological and environmental aspects based on stock identification. Subpopulation is a group sharing the same gene pool through sexual reproduction process within limited boundaries having similar ecological characteristics. Each individual with same stock might be affected by different environment in temporal and spatial during the process of spawning, recruitment and then reproduction. Thereby, accurate stock analysis about the species can play an efficient alternative to comply with effective resource management and rapid changes. Four main stock analysis were applied to Todarodes pacificus: Morphologic Method, Ecological Method, Tagging Method, Genetic Method. Ecological method is studies for analysis of differences in spawning grounds by analysing the individual ecological change, distribution, migration status, parasitic state of parasite, kinds of parasite and parasite infection rate etc. Currently the method has been studying lively can identify the group in the similar environment. However It is difficult to know to identify the same genetic group in each other. Tagging Method is direct method. It can analyse cohort's migration, distribution and location of spawning, but it is very difficult to recapture tagged squids and hard to tag juveniles. Genetic method, which is for useful fishery resource stock analysis has provided the basic information regarding resource management study. Genetic method for stock analysis is determined according to markers' sensitivity and need to select high multiform of genetic markers. For stock identification, isozyme multiform has been used for genetic markers. Recently there is increase in use of makers with high range variability among DNA sequencing like mitochondria, microsatellite. Even the current morphologic method, tagging method and ecological method played important rolls through finding Todarodes pacificus' life cycle, migration route and changes in spawning grounds, it is still difficult to analyze the stock of Todarodes pacificus as those are distributed in difference seas. Lately, by taking advantages of each stock analysis method, more complicated method is being applied. If based on such analysis and genetic method for improvement are played, there will be much advance in management system for the resource fluctuation of Todarodes pacificus.

The comparison of lesion localization methods in breast lymphoscintigraphy (Breast lymphoscintigraphy 검사 시 체표윤곽을 나타내는 방법의 비교)

  • Yeon, Joon ho;Hong, Gun chul;Kim, Soo yung;Choi, Sung wook
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.19 no.2
    • /
    • pp.74-80
    • /
    • 2015
  • Purpose Breast lymphoscintigraphy is an important technique to present for body surface precisely, which shows a lymph node metastasis of malignant tumors at an early stage and is performed before and after surgery in patients with breast cancer. In this study, we evaluated several methods of body outline imaging to present exact location of lesions, as well as compared respective exposure doses. Materials and Methods RANDO phantom and SYMBIA T-16 were used for obtaining imaging. A lesion and an injection site were created by inserting a point source of 0.11 MBq on the axillary sentinel lymph node and 37 MBq on the right breast, respectively. The first method for acquiring the image was used by drawing the body surface of phantom for 30 sec using $Na^{99m}TcO_4$ as a point source. The second, the image was acquired with $^{57}Co$ flood source for 30 seconds on the rear side and the left side of the phantom, the image as the third method was obtained using a syringe filled with 37 MBq of $Na^{99m}TcO_4$ in 10 ml of saline, and as the fourth, we used a photon energy and scatter energy of $^{99m}Tc$ emitting from phantom without any addition radiation exposure. Finally, the image was fused the scout image and the basal image of SPECT/CT using MATLAB$^{(R)}$ program. Anterior and lateral images were acquired for 3 min, and radiation exposure was measured by the personal exposure dosimeter. We conducted preference of 10 images from nuclear medicine doctors by the survey. Results TBR values of anterior and right image in the first to fifth method were 334.9 and 117.2 ($1^{st}$), 266.1 and 124.4 ($2^{nd}$), 117.4 and 99.6 ($3^{rd}$), 3.2 and 7.6 ($4^{th}$), and 565.6 and 141.8 ($5^{th}$). And also exposure doses of these method were 2, 2, 2, 0, and $30{\mu}Sv$, respectively. Among five methods, the fifth method showed the highest TBR value as well as exposure dose, where as the fourth method showed the lowest TBR value and exposure dose. As a result, the last method ($5^{th}$) is the best method and the fourth method is the worst method in this study. Conclusion Scout method of SPECT/CT can be useful that provides the best values of TBR and the best score of survey result. Even though personal exposure dose when patients take scout of SPECT/CT was higher than another scan, it was slight level comparison to 1 mSv as the dose limit to non-radiation workers. If the scout is possible to less than 80 kV, exposure dose can be reduced, and also useful lesion localization provided.

  • PDF

Efficient Topic Modeling by Mapping Global and Local Topics (전역 토픽의 지역 매핑을 통한 효율적 토픽 모델링 방안)

  • Choi, Hochang;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.69-94
    • /
    • 2017
  • Recently, increase of demand for big data analysis has been driving the vigorous development of related technologies and tools. In addition, development of IT and increased penetration rate of smart devices are producing a large amount of data. According to this phenomenon, data analysis technology is rapidly becoming popular. Also, attempts to acquire insights through data analysis have been continuously increasing. It means that the big data analysis will be more important in various industries for the foreseeable future. Big data analysis is generally performed by a small number of experts and delivered to each demander of analysis. However, increase of interest about big data analysis arouses activation of computer programming education and development of many programs for data analysis. Accordingly, the entry barriers of big data analysis are gradually lowering and data analysis technology being spread out. As the result, big data analysis is expected to be performed by demanders of analysis themselves. Along with this, interest about various unstructured data is continually increasing. Especially, a lot of attention is focused on using text data. Emergence of new platforms and techniques using the web bring about mass production of text data and active attempt to analyze text data. Furthermore, result of text analysis has been utilized in various fields. Text mining is a concept that embraces various theories and techniques for text analysis. Many text mining techniques are utilized in this field for various research purposes, topic modeling is one of the most widely used and studied. Topic modeling is a technique that extracts the major issues from a lot of documents, identifies the documents that correspond to each issue and provides identified documents as a cluster. It is evaluated as a very useful technique in that reflect the semantic elements of the document. Traditional topic modeling is based on the distribution of key terms across the entire document. Thus, it is essential to analyze the entire document at once to identify topic of each document. This condition causes a long time in analysis process when topic modeling is applied to a lot of documents. In addition, it has a scalability problem that is an exponential increase in the processing time with the increase of analysis objects. This problem is particularly noticeable when the documents are distributed across multiple systems or regions. To overcome these problems, divide and conquer approach can be applied to topic modeling. It means dividing a large number of documents into sub-units and deriving topics through repetition of topic modeling to each unit. This method can be used for topic modeling on a large number of documents with limited system resources, and can improve processing speed of topic modeling. It also can significantly reduce analysis time and cost through ability to analyze documents in each location or place without combining analysis object documents. However, despite many advantages, this method has two major problems. First, the relationship between local topics derived from each unit and global topics derived from entire document is unclear. It means that in each document, local topics can be identified, but global topics cannot be identified. Second, a method for measuring the accuracy of the proposed methodology should be established. That is to say, assuming that global topic is ideal answer, the difference in a local topic on a global topic needs to be measured. By those difficulties, the study in this method is not performed sufficiently, compare with other studies dealing with topic modeling. In this paper, we propose a topic modeling approach to solve the above two problems. First of all, we divide the entire document cluster(Global set) into sub-clusters(Local set), and generate the reduced entire document cluster(RGS, Reduced global set) that consist of delegated documents extracted from each local set. We try to solve the first problem by mapping RGS topics and local topics. Along with this, we verify the accuracy of the proposed methodology by detecting documents, whether to be discerned as the same topic at result of global and local set. Using 24,000 news articles, we conduct experiments to evaluate practical applicability of the proposed methodology. In addition, through additional experiment, we confirmed that the proposed methodology can provide similar results to the entire topic modeling. We also proposed a reasonable method for comparing the result of both methods.

An Ontology Model for Public Service Export Platform (공공 서비스 수출 플랫폼을 위한 온톨로지 모형)

  • Lee, Gang-Won;Park, Sei-Kwon;Ryu, Seung-Wan;Shin, Dong-Cheon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.149-161
    • /
    • 2014
  • The export of domestic public services to overseas markets contains many potential obstacles, stemming from different export procedures, the target services, and socio-economic environments. In order to alleviate these problems, the business incubation platform as an open business ecosystem can be a powerful instrument to support the decisions taken by participants and stakeholders. In this paper, we propose an ontology model and its implementation processes for the business incubation platform with an open and pervasive architecture to support public service exports. For the conceptual model of platform ontology, export case studies are used for requirements analysis. The conceptual model shows the basic structure, with vocabulary and its meaning, the relationship between ontologies, and key attributes. For the implementation and test of the ontology model, the logical structure is edited using Prot$\acute{e}$g$\acute{e}$ editor. The core engine of the business incubation platform is the simulator module, where the various contexts of export businesses should be captured, defined, and shared with other modules through ontologies. It is well-known that an ontology, with which concepts and their relationships are represented using a shared vocabulary, is an efficient and effective tool for organizing meta-information to develop structural frameworks in a particular domain. The proposed model consists of five ontologies derived from a requirements survey of major stakeholders and their operational scenarios: service, requirements, environment, enterprise, and county. The service ontology contains several components that can find and categorize public services through a case analysis of the public service export. Key attributes of the service ontology are composed of categories including objective, requirements, activity, and service. The objective category, which has sub-attributes including operational body (organization) and user, acts as a reference to search and classify public services. The requirements category relates to the functional needs at a particular phase of system (service) design or operation. Sub-attributes of requirements are user, application, platform, architecture, and social overhead. The activity category represents business processes during the operation and maintenance phase. The activity category also has sub-attributes including facility, software, and project unit. The service category, with sub-attributes such as target, time, and place, acts as a reference to sort and classify the public services. The requirements ontology is derived from the basic and common components of public services and target countries. The key attributes of the requirements ontology are business, technology, and constraints. Business requirements represent the needs of processes and activities for public service export; technology represents the technological requirements for the operation of public services; and constraints represent the business law, regulations, or cultural characteristics of the target country. The environment ontology is derived from case studies of target countries for public service operation. Key attributes of the environment ontology are user, requirements, and activity. A user includes stakeholders in public services, from citizens to operators and managers; the requirements attribute represents the managerial and physical needs during operation; the activity attribute represents business processes in detail. The enterprise ontology is introduced from a previous study, and its attributes are activity, organization, strategy, marketing, and time. The country ontology is derived from the demographic and geopolitical analysis of the target country, and its key attributes are economy, social infrastructure, law, regulation, customs, population, location, and development strategies. The priority list for target services for a certain country and/or the priority list for target countries for a certain public services are generated by a matching algorithm. These lists are used as input seeds to simulate the consortium partners, and government's policies and programs. In the simulation, the environmental differences between Korea and the target country can be customized through a gap analysis and work-flow optimization process. When the process gap between Korea and the target country is too large for a single corporation to cover, a consortium is considered an alternative choice, and various alternatives are derived from the capability index of enterprises. For financial packages, a mix of various foreign aid funds can be simulated during this stage. It is expected that the proposed ontology model and the business incubation platform can be used by various participants in the public service export market. It could be especially beneficial to small and medium businesses that have relatively fewer resources and experience with public service export. We also expect that the open and pervasive service architecture in a digital business ecosystem will help stakeholders find new opportunities through information sharing and collaboration on business processes.

Improvement of Certification Criteria based on Analysis of On-site Investigation of Good Agricultural Practices(GAP) for Ginseng (인삼 GAP 인증기준의 현장실천평가결과 분석에 따른 인증기준 개선방안)

  • Yoon, Deok-Hoon;Nam, Ki-Woong;Oh, Soh-Young;Kim, Ga-Bin
    • Journal of Food Hygiene and Safety
    • /
    • v.34 no.1
    • /
    • pp.40-51
    • /
    • 2019
  • Ginseng has a unique production system that is different from those used for other crops. It is subject to the Ginseng Industry Act., requires a long-term cultivation period of 4-6 years, involves complicated cultivation characteristics whereby ginseng is not produced in a single location, and many ginseng farmers engage in mixed-farming. Therefore, to bring the production of Ginseng in line with GAP standards, it is necessary to better understand the on-site practices of Ginseng farmers according to established control points, and to provide a proper action plan for improving efficiency. Among ginseng farmers in Korea who applied for GAP certification, 77.6% obtained it, which is lower than the 94.1% of farmers who obtained certification for other products. 13.7% of the applicants were judged to be unsuitable during document review due to their use of unregistered pesticides and soil heavy metals. Another 8.7% of applicants failed to obtain certification due to inadequate management results. This is a considerably higher rate of failure than the 5.3% incompatibility of document inspection and 0.6% incompatibility of on-site inspection, which suggests that it is relatively more difficult to obtain GAP certification for ginseng farming than for other crops. Ginseng farmers were given an average of 2.65 points out of 10 essential control points and a total 72 control points, which was slightly lower than the 2.81 points obtained for other crops. In particular, ginseng farmers were given an average of 1.96 points in the evaluation of compliance with the safe use standards for pesticides, which was much lower than the average of 2.95 points for other crops. Therefore, it is necessary to train ginseng farmers to comply with the safe use of pesticides. In the other essential control points, the ginseng farmers were rated at an average of 2.33 points, lower than the 2.58 points given for other crops. Several other areas of compliance in which the ginseng farmers also rated low in comparison to other crops were found. These inclued record keeping over 1 year, record of pesticide use, pesticide storages, posts harvest storage management, hand washing before and after work, hygiene related to work clothing, training of workers safety and hygiene, and written plan of hazard management. Also, among the total 72 control points, there are 12 control points (10 required, 2 recommended) that do not apply to ginseng. Therefore, it is considered inappropriate to conduct an effective evaluation of the ginseng production process based on the existing certification standards. In conclusion, differentiated certification standards are needed to expand GAP certification for ginseng farmers, and it is also necessary to develop programs that can be implemented in a more systematic and field-oriented manner to provide the farmers with proper GAP management education.

The lesson From Korean War (한국전쟁의 교훈과 대비 -병력수(兵力數) 및 부대수(部隊數)를 중심으로-)

  • Yoon, Il-Young
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.49-168
    • /
    • 2010
  • Just before the Korean War, the total number of the North Korean troops was 198,380, while that of the ROK(Republic of Korea) army troops 105,752. That is, the total number of the ROK army troops at that time was 53.3% of the total number of the North Korean army. As of December 2008, the total number of the North Korean troops is estimated to be 1,190,000, while that of the ROK troops is 655,000, so the ROK army maintains 55.04% of the total number of the North Korean troops. If the ROK army continues to reduce its troops according to [Military Reform Plan 2020], the total number of its troops will be 517,000 m 2020. If North Korea maintains the current status(l,190,000 troops), the number of the ROK troops will be 43.4% of the North Korean army. In terms of units, just before the Korean War, the number of the ROK army divisions and regiments was 80% and 44.8% of North Korean army. As of December 2008, North Korea maintains 86 divisions and 69 regiments. Compared to the North Korean army, the ROK army maintains 46 Divisions (53.4% of North Korean army) and 15 regiments (21.3% of North Korean army). If the ROK army continue to reduce the military units according to [Military Reform Plan 2020], the number of ROK army divisions will be 28(13 Active Division, 4 Mobilization Divisions and 11 Local Reserve Divisions), while that of the North Korean army will be 86 in 2020. In that case, the number of divisions of the ROK army will be 32.5% of North Korean army. During the Korean war, North Korea suddenly invaded the Republic of Korea and occupied its capital 3 days after the war began. At that time, the ROK army maintained 80% of army divisions, compared to the North Korean army. The lesson to be learned from this is that, if the ROK army is forced to disperse its divisions because of the simultaneous invasion of North Korea and attack of guerrillas in home front areas, the Republic of Korea can be in a serious military danger, even though it maintains 80% of military divisions of North Korea. If the ROK army promotes the plans in [Military Reform Plan 2020], the number of military units of the ROK army will be 32.5% of that of the North Korean army. This ratio is 2.4 times lower than that of the time when the Korean war began, and in this case, 90% of total military power should be placed in the DMZ area. If 90% of military power is placed in the DMZ area, few troops will be left for the defense of home front. In addition, if the ROK army continues to reduce the troops, it can allow North Korea to have asymmetrical superiority in military force and it will eventually exert negative influence on the stability and peace of the Korean peninsular. On the other hand, it should be reminded that, during the Korean War, the Republic of Korea was attacked by North Korea, though it kept 53.3% of troops, compared to North Korea. It should also be reminded that, as of 2008, the ROK army is defending its territory with the troops 55.04% of North Korea. Moreover, the national defense is assisted by 25,120 troops of the US Forces in Korea. In case the total number of the ROK troops falls below 43.4% of the North Korean army, it may cause social unrest about the national security and may lead North Korea's misjudgement. Besides, according to Lanchester strategy, the party with weaker military power (60% compared to the party with stronger military power) has the 4.1% of winning possibility. Therefore, if we consider the fact that the total number of the ROK army troops is 55.04% of that of the North Korean army, the winning possibility of the ROK army is not higher than 4.1%. If the total number of ROK troops is reduced to 43.4% of that of North Korea, the winning possibility will be lower and the military operations will be in critically difficult situation. [Military Reform Plan 2020] rums at the reduction of troops and units of the ground forces under the policy of 'select few'. However, the problem is that the financial support to achieve this goal is not secured. Therefore, the promotion of [Military Reform Plan 2020] may cause the weakening of military defence power in 2020. Some advanced countries such as Japan, UK, Germany, and France have promoted the policy of 'select few'. However, what is to be noted is that the national security situation of those countries is much different from that of Korea. With the collapse of the Soviet Unions and European communist countries, the military threat of those European advanced countries has almost disappeared. In addition, the threats those advanced countries are facing are not wars in national level, but terrorism in international level. To cope with the threats like terrorism, large scaled army trops would not be necessary. So those advanced European countries can promote the policy of 'select few'. In line with this, those European countries put their focuses on the development of military sections that deal with non-military operations and protection from unspecified enemies. That is, those countries are promoting the policy of 'select few', because they found that the policy is suitable for their national security environment. Moreover, since they are pursuing common interest under the European Union(EU) and they can form an allied force under NATO, it is natural that they are pursing the 'select few' policy. At present, NATO maintains the larger number of troops(2,446,000) than Russia(l,027,000) to prepare for the potential threat of Russia. The situation of japan is also much different from that of Korea. As a country composed of islands, its prime military focus is put on the maritime defense. Accordingly, the development of ground force is given secondary focus. The japanese government promotes the policy to develop technology-concentrated small size navy and air-forces, instead of maintaining large-scaled ground force. In addition, because of the 'Peace Constitution' that was enacted just after the end of World War II, japan cannot maintain troops more than 240,000. With the limited number of troops (240,000), japan has no choice but to promote the policy of 'select few'. However, the situation of Korea is much different from the situations of those countries. The Republic of Korea is facing the threat of the North Korean Army that aims at keeping a large-scale military force. In addition, the countries surrounding Korea are also super powers containing strong military forces. Therefore, to cope with the actual threat of present and unspecified threat of future, the importance of maintaining a carefully calculated large-scale military force cannot be denied. Furthermore, when considering the fact that Korea is in a peninsular, the Republic of Korea must take it into consideration the tradition of continental countries' to maintain large-scale military powers. Since the Korean War, the ROK army has developed the technology-force combined military system, maintaining proper number of troops and units and pursuing 'select few' policy at the same time. This has been promoted with the consideration of military situation in the Koran peninsular and the cooperation of ROK-US combined forces. This kind of unique military system that cannot be found in other countries can be said to be an insightful one for the preparation for the actual threat of North Korea and the conflicts between continental countries and maritime countries. In addition, this kind of technology-force combined military system has enabled us to keep peace in Korea. Therefore, it would be desirable to maintain this technology-force combined military system until the reunification of the Korean peninsular. Furthermore, it is to be pointed out that blindly following the 'select few' policy of advanced countries is not a good option, because it is ignoring the military strategic situation of the Korean peninsular. If the Republic of Korea pursues the reduction of troops and units radically without consideration of the threat of North Korea and surrounding countries, it could be a significant strategic mistake. In addition, the ROK army should keep an eye on the fact the European advanced countries and Japan that are not facing direct military threats are spending more defense expenditures than Korea. If the ROK army reduces military power without proper alternatives, it would exert a negative effect on the stable economic development of Korea and peaceful reunification of the Korean peninsular. Therefore, the desirable option would be to focus on the development of quality of forces, maintaining proper size and number of troops and units under the technology-force combined military system. The tableau above shows that the advanced countries like the UK, Germany, Italy, and Austria spend more defense expenditure per person than the Republic of Korea, although they do not face actual military threats, and that they keep achieving better economic progress than the countries that spend less defense expenditure. Therefore, it would be necessary to adopt the merits of the defense systems of those advanced countries. As we have examined, it would be desirable to maintain the current size and number of troops and units, to promote 'select few' policy with increased defense expenditure, and to strengthen the technology-force combined military system. On the basis of firm national security, the Republic of Korea can develop efficient policies for reunification and prosperity, and jump into the status of advanced countries. Therefore, the plans to reduce troops and units in [Military Reform Plan 2020] should be reexamined. If it is difficult for the ROK army to maintain its size of 655,000 troops because of low birth rate, the plans to establish the prompt mobilization force or to adopt drafting system should be considered for the maintenance of proper number of troops and units. From now on, the Republic of Korean government should develop plans to keep peace as well as to prepare unexpected changes in the Korean peninsular. For the achievement of these missions, some options can be considered. The first one is to maintain the same size of military troops and units as North Korea. The second one is to maintain the same level of military power as North Korea in terms of military force index. The third one is to maintain the same level of military power as North Korea, with the combination of the prompt mobilization force and the troops in active service under the system of technology-force combined military system. At present, it would be not possible for the ROK army to maintain such a large-size military force as North Korea (1,190,000 troops and 86 units). So it would be rational to maintain almost the same level of military force as North Korea with the combination of the troops on the active list and the prompt mobilization forces. In other words, with the combination of the troops in active service (60%) and the prompt mobilization force (40%), the ROK army should develop the strategies to harmonize technology and forces. The Korean government should also be prepared for the strategic flexibility of USFK, the possibility of American policy change about the location of foreign army, radical unexpected changes in North Korea, the emergence of potential threat, surrounding countries' demand for Korean force for the maintenance of regional stability, and demand for international cooperation against terrorism. For this, it is necessary to develop new approaches toward the proper number and size of troops and units. For instance, to prepare for radical unexpected political or military changes in North Korea, the Republic of Korea should have plans to protect a large number of refugees, to control arms and people, to maintain social security, and to keep orders in North Korea. From the experiences of other countries, it is estimated that 115,000 to 230,000 troops, plus ten thousands of police are required to stabilize the North Korean society, in the case radical unexpected military or political change happens in North Korea. In addition, if the Republic of Korea should perform the release of hostages, control of mass destruction weapons, and suppress the internal wars in North Korea, it should send 460,000 troops to North Korea. Moreover, if the Republic of Korea wants to stop the attack of North Korea and flow of refugees in DMZ area, at least 600,000 troops would be required. In sum, even if the ROK army maintains 600,000 troops, it may need additional 460,000 troops to prepare for unexpected radical changes in North Korea. For this, it is necessary to establish the prompt mobilization force whose size and number are almost the same as the troops in active service. In case the ROK army keeps 650,000 troops, the proper number of the prompt mobilization force would be 460,000 to 500,000.

  • PDF

Consideration on Shielding Effect Based on Apron Wearing During Low-dose I-131 Administration (저용량 I-131 투여시 Apron 착용여부에 따른 차폐효과에 대한 고찰)

  • Kim, Ilsu;Kim, Hosin;Ryu, Hyeonggi;Kang, Yeongjik;Park, Suyoung;Kim, Seungchan;Lee, Guiwon
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.20 no.1
    • /
    • pp.32-36
    • /
    • 2016
  • Purpose In nuclear medicine examination, $^{131}I$ is widely used in nuclear medicine examination such as diagnosis, treatment, and others of thyroid cancer and other diseases. $^{131}I$ conducts examination and treatment through emission of ${\gamma}$ ray and ${\beta}^-$ ray. Since $^{131}I$ (364 keV) contains more energy compared to $^{99m}Tc$ (140 keV) although it displays high integrated rate and enables quick discharge through kidney, the objective of this study lies in comparing the difference in exposure dose of $^{131}I$ before and after wearing apron when handling $^{131}I$ with focus on 3 elements of external exposure protection that are distance, time, and shield in order to reduce the exposure to technicians in comparison with $^{99m}Tc$ during the handling and administration process. When wearing apron (in general, Pb 0.5 mm), $^{99m}Tc$ presents shield of over 90% but shielding effect of $^{131}I$ is relatively low as it is of high energy and there may be even more exposure due to influence of scattered ray (secondary) and bremsstrahlung in case of high dose. However, there is no special report or guideline for low dose (74 MBq) high energy thus quantitative analysis on exposure dose of technicians will be conducted based on apron wearing during the handling of $^{131}I$. Materials and Methods With patients who visited Department of Nuclear Medicine of our hospital for low dose $^{131}I$ administration for thyroid cancer and diagnosis for 7 months from Jun 2014 to Dec 2014 as its subject, total 6 pieces of TLD was attached to interior and exterior of apron placed on thyroid, chest, and testicle from preparation to administration. Then, radiation exposure dose from $^{131}I$ examination to administration was measured. Total procedure time was set as within 5 min per person including 3 min of explanation, 1 min of distribution, and 1 min of administration. In regards to TLD location selection, chest at which exposure dose is generally measured and thyroid and testicle with high sensitivity were selected. For preparation, 74 MBq of $^{131}I$ shall be distributed with the use of $2m{\ell}$ syringe and then it shall be distributed after making it into dose of $2m{\ell}$ though dilution with normal saline. When distributing $^{131}I$ and administering it to the patient, $100m{\ell}$ of water shall be put into a cup, distributed $^{131}I$ shall be diluted, and then oral administration to patients shall be conducted with the distance of 1m from the patient. The process of withdrawing $2m{\ell}$ syringe and cup used for oral administration was conducted while wearing apron and TLD. Apron and TLD were stored at storage room without influence of radiation exposure and the exposure dose was measured with request to Seoul Radiology Services. Results With the result of monthly accumulated exposure dose of TLD worn inside and outside of apron placed on thyroid, chest, and testicle during low dose $^{131}I$ examination during the research period divided by number of people, statistics processing was conducted with Wilcoxon Signed Rank Test using SPSS Version. 12.0K. As a result, it was revealed that there was no significant difference since all of thyroid (p = 0.345), chest (p = 0.686), and testicle (p = 0.715) were presented to be p > 0.05. Also, when converting the change in total exposure dose during research period into percentage, it was revealed to be -23.5%, -8.3%, and 19.0% for thyroid, chest, and testicle respectively. Conclusion As a result of conducting Wilcoxon Signed Rank Test, it was revealed that there is no statistically significant difference (p > 0.05). Also, in case of calculating shielding rate with accumulate exposure dose during 7 months, it was revealed that there is irregular change in exposure dose for inside and outside of apron. Although the degree of change seems to be high when it is expressed in percentage, it cannot be considered a big change since the unit of accumulated exposure dose is in decimal points. Therefore, regardless of wearing apron during high energy low dose $^{131}I$ administration, placing certain distance and terminating the administration as soon as possible would be of great assistance in reducing the exposure dose. Although this study restricted $^{131}I$ administration time to be within 5 min per person and distance for oral administration to be 1m, there was a shortcoming to acquire accurate result as there was insufficient number of N for statistics and it could be processed only through non-parametric method. Also, exposure dose per person during lose dose $^{131}I$ administration was measured with accumulated exposure dose using TLD rather than through direct-reading exposure dose thus more accurate result could be acquired when measurement is conducted using electronic dosimeter and pocket dosimeter.

  • PDF

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Visual Media Education in Visual Arts Education (미술교육에 있어서 시각적 미디어를 통한 조형교육에 관한 연구)

  • Park Ji-Sook
    • Journal of Science of Art and Design
    • /
    • v.7
    • /
    • pp.64-104
    • /
    • 2005
  • Visual media transmits image and information reproduced in large quantities, such as a photography, film, television, video, advertisement, or computer image. Correspondence to the students' reception and recognition of culture in the future. arrangements for the field of studies of visual culture. 'Visual Culture' implies cultural phenomena of visual images via visual media, which includes not only the categories of traditional arts like a painting, sculpture, print, or design, but the performance arts including a fashion show or parade of carnival, and the mass and electronic media like a photography, film, television, video, advertisement, cartoon, animation, or computer image. In the world of visual media, Image' functions as an essential medium of communication. Therefore, people call the culture of today fra of Image Culture', which has been converted from an alphabet convergence era to an image convergence one. Image, via visual media, has become a dominant means for communication in large part of human life, so we can designate an Image' as a typical aspect of visual culture today. Image, as an essential medium of communication, plays an important role in contemporary society. The one way is the conversion of analogue image like an actual picture, photograph, or film into digital one through the digitalization of digital camera or scanner as 'an analogue/digital commutator'. The other is a way of process with a computer drawing, or modeling of objects. It is appropriate to the production of pictorial and surreal images. Digital images, produced by the other, can be divided into the form of Pixel' and form of Vector'. Vector is a line linking the point of departure to the point of end, which organizes informations. Computer stores each line's standard location and correlative locations to one another Digital image shows for more 'Perfectness' than any other visual media. Digital image has been evolving in the diverse aspects, such as a production of geometrical or organic image compositing, interactive art, multimedia art, or web art, which has been applied a computer as an extended trot of painting. Someone often interprets digitalized copy with endless reproduction of original even as an extension of a print. Visual af is no longer a simple activity of representation by a painter or sculptor, but now is intimately associated with a matter of application of media. There is some problem in images via visual media. First, the image via media doesn't reflect a reality as it is, but reflects an artificial manipulated world, that is, a virtual reality. Second, the introduction of digital effect and the development of image processing technology have enhanced a spectacle of destructive and violent scenes. Third, a child intends to recognize the interactive images of computer game and virtual reality as a reality, or truth. Education needs not only to point out an ill effect of mass media and prevent the younger generation from being damaged by it, but also to offer a knowledge and know-how to cope actively with social, cultural circumstances. Visual media education is one of these essential methods for the contemporary and future human being in the overflowing of image informations. The fosterage of 'Visual Literacy' can be considered as a very purpose of visual media education. This is a way to lead an individual to the discerning, active consumer and producer of visual media in life as far as possible. The elements of 'Visual Literacy' can be divided into a faculty of recognition related to the visual media, a faculty of critical reception, a faculty of appropriate application, a faculty of active work and a faculty of creative modeling, which are promoted at the same time by the education of 'visual literacy'. In conclusion, the education of 'Visual Literacy' guides students to comprehend and discriminate the visual image media carefully, or receive them critically, apply them properly, or produce them creatively and voluntarily. Moreover, it leads to an artistic activity by means of new media. This education can be approached and enhanced by the connection and integration with real life. Visual arts and education of them play an important role in the digital era depended on visual communications via image information. Visual me야a of day functions as an essential element both in daily life and in arts. Students can soundly understand visual phenomena of today by means of visual media, and apply it as an expression tool of life culture as well. A new recognition and valuation visual image and media education is required to cultivate the capability of active, upright dealing with the changes of history of civilization. 1) Visual media education helps to cultivate a sensibility for images, which reacts to and deals with the circumstances. 2) It helps students to comprehend the contemporary arts and culture via new media. 3) It supplies a chance of students' experiencing a visual modeling by means of new media. 4) There are educational opportunities of images with temporality and spaciality, and therefore a discerning person becomes to increase. 5) The modeling activity via new media leads students to be continuously interested in the school and production of plastic arts. 6) It raises the ability of visual communications dealing with image information society. 7) An education of digital image is significant in respect of cultivation of man of talent for the future society of image information as well. To correspond to the changing and developing social, cultural circumstances, and the form and recognition of students' reception of them, visual arts education must arrange the field of studying on a new visual culture. Besides, a program needs to be developed, which is in more systematic and active level in relation to visual media education. Educational contents should be extended to the media for visual images, that is, photography, film, television, video, computer graphic, animation, music video, computer game and multimedia. Every media must be separately approached, because they maintain the modes and peculiarities of their own according to the conveyance form of message. The concrete and systematic method of teaching and the quality of education must be researched and developed, centering around the development of a course of study. Teacher's foundational capability of teaching should be cultivated for the visual media education. In this case, it must be paid attention to the fact that a technological level of media is considered as a secondary. Because school education doesn't intend to train expert and skillful producers, but intends to lay stress on the essential aesthetic one with visual media under the social and cultural context, in respect of a consumer including a man of culture.

  • PDF

Animal Infectious Diseases Prevention through Big Data and Deep Learning (빅데이터와 딥러닝을 활용한 동물 감염병 확산 차단)

  • Kim, Sung Hyun;Choi, Joon Ki;Kim, Jae Seok;Jang, Ah Reum;Lee, Jae Ho;Cha, Kyung Jin;Lee, Sang Won
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.137-154
    • /
    • 2018
  • Animal infectious diseases, such as avian influenza and foot and mouth disease, occur almost every year and cause huge economic and social damage to the country. In order to prevent this, the anti-quarantine authorities have tried various human and material endeavors, but the infectious diseases have continued to occur. Avian influenza is known to be developed in 1878 and it rose as a national issue due to its high lethality. Food and mouth disease is considered as most critical animal infectious disease internationally. In a nation where this disease has not been spread, food and mouth disease is recognized as economic disease or political disease because it restricts international trade by making it complex to import processed and non-processed live stock, and also quarantine is costly. In a society where whole nation is connected by zone of life, there is no way to prevent the spread of infectious disease fully. Hence, there is a need to be aware of occurrence of the disease and to take action before it is distributed. Epidemiological investigation on definite diagnosis target is implemented and measures are taken to prevent the spread of disease according to the investigation results, simultaneously with the confirmation of both human infectious disease and animal infectious disease. The foundation of epidemiological investigation is figuring out to where one has been, and whom he or she has met. In a data perspective, this can be defined as an action taken to predict the cause of disease outbreak, outbreak location, and future infection, by collecting and analyzing geographic data and relation data. Recently, an attempt has been made to develop a prediction model of infectious disease by using Big Data and deep learning technology, but there is no active research on model building studies and case reports. KT and the Ministry of Science and ICT have been carrying out big data projects since 2014 as part of national R &D projects to analyze and predict the route of livestock related vehicles. To prevent animal infectious diseases, the researchers first developed a prediction model based on a regression analysis using vehicle movement data. After that, more accurate prediction model was constructed using machine learning algorithms such as Logistic Regression, Lasso, Support Vector Machine and Random Forest. In particular, the prediction model for 2017 added the risk of diffusion to the facilities, and the performance of the model was improved by considering the hyper-parameters of the modeling in various ways. Confusion Matrix and ROC Curve show that the model constructed in 2017 is superior to the machine learning model. The difference between the2016 model and the 2017 model is that visiting information on facilities such as feed factory and slaughter house, and information on bird livestock, which was limited to chicken and duck but now expanded to goose and quail, has been used for analysis in the later model. In addition, an explanation of the results was added to help the authorities in making decisions and to establish a basis for persuading stakeholders in 2017. This study reports an animal infectious disease prevention system which is constructed on the basis of hazardous vehicle movement, farm and environment Big Data. The significance of this study is that it describes the evolution process of the prediction model using Big Data which is used in the field and the model is expected to be more complete if the form of viruses is put into consideration. This will contribute to data utilization and analysis model development in related field. In addition, we expect that the system constructed in this study will provide more preventive and effective prevention.