• Title/Summary/Keyword: Share of Code

Search Result 87, Processing Time 0.027 seconds

Increased risk of chronic otitis media in chronic rhinosinusitis patients: a longitudinal follow-up study using a national health screening cohort

  • Sung Kyun Kim;Min-Woo Park;Chanyang Min;Il-Seok Park;Bumjung Park;Soo-Hwan Byun;Hyo Geun Choi;Seok Jin Hong
    • Journal of Rhinology
    • /
    • v.59 no.3
    • /
    • pp.292-300
    • /
    • 2021
  • Background: Chronic rhinosinusitis (CRS) and chronic otitis media (COM) share pathophysiological mechanisms such as bacterial infection, biofilm, and persistence of the obstruction state of ventilation routes. However, only a few studies have investigated the relationship between these two diseases nationwide and in the general population. The purpose of this study was to determine whether the incidence of COM in patients with CRS differed from that of a matched control from the national health screening cohort. Methods: Data from the Korean Health Insurance Review and Assessment Service-National Patient Samples were collected from 2002 to 2015. Participants who were treated ≥2 times and underwent head and neck computed tomography evaluation were selected. A 1:4 matched CRS group (n=8,057) and a control group (n=32,228) were selected. The control group included participants who were never treated with the ICD-10 code J32 from 2002 to 2015. The CRS group included CRS patients with/without nasal polyps. Results: The incidence of COM was significantly higher in the CRS group than in the control group. In a subgroup analysis, the incidence of COM in all age groups and in men and women was significantly higher in the CRS group than in the control group. More, CRS increased the risk of COM. Conclusions: A significant association was observed between CRS and COM. This indicates that CRS patients have a high risk of developing COM.

Design of Network-based Game Using the GoF Design Patterns

  • Kim Jong-Soo;Kim Tai-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.6
    • /
    • pp.742-749
    • /
    • 2006
  • In the network-based game where it uses the Internet infrastructure, the implementation is possible with the various methods. Such Applications are developed in the multi-tired architecture. There are many cases for the server to be separated from the hardware or the software. In this case, a lot of applications make the distributed process possible and are made as the multi-tiered architecture to develop the reusability of the existing software module. Especially, it is mostly general to separate for the case of a database server to a new tier. One of the important points of multi-tiered server side applications is security and because of this, it is difficult to share the related data about the design skill. Using design patterns, it gives help in reusing the existing written-code for the design of the game that needs a lot of money and time. Design Patterns are related to the software reuse. For the development of more efficient games, if well-defined design patterns are provided to the developers, then it would make more easy advanced game API and make possible the framework for the game development based on the API Through the analysis of the general network-based game currently servicing in the Internet, in this paper, we discuss how to implement a business logic tier using database system among the server side architectures. The main objective of this article is to show an efficient APIs(Application Programming Interfaces) design method which can be used to manage the data that must be saved to the database system among the packets that client/server have to be exchange.

  • PDF

A study on narrative text analysis from the perspective of information processing - focusing on four computational methodologies (정보처리 관점에서의 서사 텍스트 분석에 관한 연구 - 네 가지 전산적 방법론을 중심으로)

  • Kwon, Hochang
    • Trans-
    • /
    • v.13
    • /
    • pp.141-169
    • /
    • 2022
  • Analysis of narrative texts has been regarded as academically and practically important, and has been made from various perspectives and methods. In this paper, the computational narrative analysis methodology from the perspective of information processing was examined. From the point of view of information processing, the creation and acceptance of narrative is a bidirectional coding process mediated by narrative text, and narrative text can be said to be a multi-layered structured code. In this paper, four methodologies that share this point of view - character network analysis, text mining and sentiment analysis, continuity analysis of event composition, and knowledge analysis of narrative agents - were examined together with cases. Through this, the mechanism and possibility of computational methodology in narrative analysis were confirmed. In conclusion, the significance and side effects of computational narrative analysis were examined, and the necessity of designing a human-computer collaboration model based on the consilience of the humanities and science/technology was discussed. Based on this model, it was argued that aesthetically creative, ethically good, politically progressive, and cognitively sophisticated narratives could be made more effectively.

A Model-based Performance Study of the EPCglobal Network (모델 기반 EPCglobal 네트워크의 성능 분석)

  • Kang, Yong-Shin;Son, Kyung-Won;Lee, Yong-Han;Rhee, Jong-Tae
    • IE interfaces
    • /
    • v.24 no.2
    • /
    • pp.139-150
    • /
    • 2011
  • The EPCglobal Network is a computer network used to share product data among trading partners. It provides the supply chain with improved visibility and traceability by using Electronic Product Code (EPC), which is stored on an RFID tag. Although this network model is widely accepted as a global standard and the growth of EPCglobal-subscriber base is considerable, the EPC technology adoption process is still in its infancy. This is because some of the critical issues on this model still remain to be verified such as scalability, data management, security, privacy and the economic value of data sharing. In this paper, we focus on scalability issue among the challenges to overcome and we regard performance of the EPCglobal Network only as a track and trace query-processing cost in the network. We developed performance models consisting of three elements of the EPCglobal Network : Discovery Services (DS), EPC Information Services (EPCIS), Object Naming Services (ONS). Then we abstracted out the track and trace query execution model to evaluate performance of the overall EPCglobal Network. Finally using the proposed models, we carried out simulation analysis based on an RFID-based inbound logistics process of automobile parts. This work is an important step towards the EPC technology diffusion and provides guidelines for businesses looking to buy or build the EPCglobal Network-based systems.

Development of Protection Profile for Malware App Analysis Tool (악성 앱 분석 도구 보호프로파일 개발)

  • Jung, Jae-eun;Jung, Soo-bin;Gho, Sang-seok;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.374-376
    • /
    • 2022
  • The Malware App Analysis Tool is a system that analyzes Android-based apps by the AI-based algorithm defined in the tool and detects whether malware code is included. Currently, as the spred of smartphones is activated, crimes using malware apps have increased, and accordingly, security for malware apps is required. Android operating systems used in smartphones have a share of more than 70% and are open-source-based, so not only will there be many vulnerabilities and malware, but also more damage to malware apps, increasing demand for tools to detect and analyze malware apps. However, this paper is proposed because there are many difficulties in designing and developing a malware app analysis tool because the security functional requirements for the malware app analysis tool are not clearly specified. Through the developed protection profile, technology can be improved based on the design and development of malware app analysis tools, safety can be secured by minimizing damage to malware apps, and furthermore, trust in malware app analysis tools can be guaranted through common criteria.

  • PDF

Convolutional auto-encoder based multiple description coding network

  • Meng, Lili;Li, Hongfei;Zhang, Jia;Tan, Yanyan;Ren, Yuwei;Zhang, Huaxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1689-1703
    • /
    • 2020
  • When data is transmitted over an unreliable channel, the error of the data packet may result in serious degradation. The multiple description coding (MDC) can solve this problem and save transmission costs. In this paper, we propose a deep multiple description coding network (MDCN) to realize efficient image compression. Firstly, our network framework is based on convolutional auto-encoder (CAE), which include multiple description encoder network (MDEN) and multiple description decoder network (MDDN). Secondly, in order to obtain high-quality reconstructed images at low bit rates, the encoding network and decoding network are integrated into an end-to-end compression framework. Thirdly, the multiple description decoder network includes side decoder network and central decoder network. When the decoder receives only one of the two multiple description code streams, side decoder network is used to obtain side reconstructed image of acceptable quality. When two descriptions are received, the high quality reconstructed image is obtained. In addition, instead of quantization with additive uniform noise, and SSIM loss and distance loss combine to train multiple description encoder networks to ensure that they can share structural information. Experimental results show that the proposed framework performs better than traditional multiple description coding methods.

A Study On The Wireless ATM MAC Protocol Using Mini-slot With Dynamic Bandwidth Allocation Algorithm (동적 대역 할당 알고리즘을 이용한 미니슬롯 기반의 무선 ATM 매체 접속 제어 프로토콜에 관한 연구)

  • Jeong, Geon-Jin;Lee, Seong-Chang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.2
    • /
    • pp.17-23
    • /
    • 2000
  • Wireless link has high bit error rate compared with wired link and many users share this limited bandwidth. So it needs more powerful error control code and efficient media access control(MAC) to provide multimedia service reliably. In this paper we proposed efficient MAC frame format based on TDMA using mini-slot for request access. The number of mini-slots is variable based on the result of collision in the previous frame. This dynamic allocation of request mini-slots helps resolve the contention situation quickly and avoids the waste of bandwidth that may occur when there are several unneeded request mini-slots. The simulation results are also presented in terms of channel utilization, call blocking probability and cell transmission delay for mixed traffic environment.

  • PDF

A Study on the Club Fashion Styles for Designing Clubber Fashion - Focusing on the Hongdae and Kangnam Club Areas - (클럽 패션 스타일 분석 및 디자인 개발 - 홍대 강남 지역 비교를 중심으로 -)

  • Kim, Hyun-Kyoung;Lee, In-Seong
    • The Research Journal of the Costume Culture
    • /
    • v.18 no.4
    • /
    • pp.626-639
    • /
    • 2010
  • The club culture is not something unified. Rather, it is a group of subcultures which share intertwined areas. And it keeps its own dress code, dance style, music genre along with series of authoritarian and unlawful rituals. For young adults, a club is a new cultural space to enjoy in reasonable price and they can express themselves without thinking much about others. A club creates its unique mass culture by producing continuously changing and experimental fashion styles. As the club culture’s influence becomes powerful, the club market was established and experimental fashion styles are wide spread among general public, young adults who try to express their unique characters and even fashion-leading industry. The study results are as follows. First, dance club and its derivative, rave is symbolic axles and the center of social activity. They are also defined as culture which is related to specific space that continues to present and change sound and style. Second, the definition of clubber in a dictionary is club member or a person who is united with others. Third, based upon clubbers' fashion styles in Hongdae and Kang-nam areas, there are 5 different images including sexy casual, lingerie, dynamic, chic style and feminine style. Fourth, based upon case study above, to take unique life style of fashionista that leads fashion with trendy fashion style into account, we suggested five designs which are unique, sensitive and trendy. Fifth, through analyzing clubber generation and design factors of clubbers' fashion style combined with various trend, unique brand was developed to meet the demands of clubbers who want differentiated images and leading styles.

Implementation and Design of WISD(Web Interface System based DICOM) for Efficient Sharing of Medical Information between Clinics (의료기관간 효과적인 의료정보 공유를 위한 WISD의 설계 및 구현)

  • Cho, Ik-Sung;Kwon, Hyeog-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.500-508
    • /
    • 2008
  • For efficient compatible system between medical clinics, the medical information has to be built on a standardized protocol such as a HL7 for text data and a DICOM for image data. But it is difficult to exchange information between medical clinics because the systems and softwares are different and also a structure of data and a type of code. Therefore we analyze a structure of DICOM file and design an integrated database for effective information sharing and exchange. The WISD system suggested in this paper separate the DICOM file transmitted by medical clinics to text data and image data and store it in the integrated DB(database) by standardized protocol respectively. It is very efficient that each medical clinic can search and exchange information by web browser using the suggested system. The WISD system can not only search and control of image data and patient information through integrated database and internet, but share medical information without extra charge like construction of new system.

Research on a Conceptual Model of Architecture Framework for Simulation based Acquisition (SBA를 위한 아키텍처 프레임워크 개념모델에 관한 연구)

  • Sohn, MyE
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.309-318
    • /
    • 2010
  • Simulation-based acquisition(SBA) is a new acquisition paradigm to deliver combat systems cheaper, faster, and better. ROK MND adopts the vision of SBA and is pushing ahead with dramatic reform. However, ROK MND does not develop the SBA architecture framework which facilitates the reuse of tools and techniques and data software code and algorithms among participants of collaborative environments. In this paper, we propose a conceptual Model of architecture framework for SBA. To do so, we analyse acquisition process of MND and propose the to-be operational view that describes fundamental concept for how Government, Industry, and Academia can collaborate and share information more effectively throughout the acquisition process. Furthermore, we identify the tools and techniques that supports the operational nodes, and propose technical view and all view, too. technical view compose of set of standards that can ensure interoperability among tools, techniques and data, and all view provide an overarching description of the architecture.