• 제목/요약/키워드: Software availability

검색결과 255건 처리시간 0.021초

딥러닝 프레임워크의 비교: 티아노, 텐서플로, CNTK를 중심으로 (Comparison of Deep Learning Frameworks: About Theano, Tensorflow, and Cognitive Toolkit)

  • 정여진;안성만;양지헌;이재준
    • 지능정보연구
    • /
    • 제23권2호
    • /
    • pp.1-17
    • /
    • 2017
  • 딥러닝 프레임워크의 대표적인 기능으로는 '자동미분'과 'GPU의 활용' 등을 들 수 있다. 본 논문은 파이썬의 라이브러리 형태로 사용 가능한 프레임워크 중에서 구글의 텐서플로와 마이크로소프트의 CNTK, 그리고 텐서플로의 원조라고 할 수 있는 티아노를 비교하였다. 본문에서는 자동미분의 개념과 GPU의 활용형태를 간단히 설명하고, 그 다음에 logistic regression을 실행하는 예를 통하여 각 프레임워크의 문법을 알아본 뒤에, 마지막으로 대표적인 딥러닝 응용인 CNN의 예제를 실행시켜보고 코딩의 편의성과 실행속도 등을 확인해 보았다. 그 결과, 편의성의 관점에서 보면 티아노가 가장 코딩 하기가 어렵고, CNTK와 텐서플로는 많은 부분이 비슷하게 추상화 되어 있어서 코딩이 비슷하지만 가중치와 편향을 직접 정의하느냐의 여부에서 차이를 보였다. 그리고 각 프레임워크의 실행속도에 대한 평가는 '큰 차이는 없다'는 것이다. 텐서플로는 티아노에 비하여 속도가 느리다는 평가가 있어왔는데, 본 연구의 실험에 의하면, 비록 CNN 모형에 국한되었지만, 텐서플로가 아주 조금이지만 빠른 것으로 나타났다. CNTK의 경우에도, 비록 실험환경이 달랐지만, 실험환경의 차이에 의한 속도의 차이의 편차범위 이내에 있는 것으로 판단이 되었다. 본 연구에서는 세 종류의 딥러닝 프레임워크만을 살펴보았는데, 위키피디아에 따르면 딥러닝 프레임워크의 종류는 12가지가 있으며, 각 프레임워크의 특징을 15가지 속성으로 구분하여 차이를 특정하고 있다. 그 많은 속성 중에서 사용자의 입장에서 볼 때 중요한 속성은 어떤 언어(파이썬, C++, Java, 등)로 사용가능한지, 어떤 딥러닝 모형에 대한 라이브러리가 잘 구현되어 있는지 등일 것이다. 그리고 사용자가 대규모의 딥러닝 모형을 구축한다면, 다중 GPU 혹은 다중 서버를 지원하는지의 여부도 중요할 것이다. 또한 딥러닝 모형을 처음 학습하는 경우에는 사용설명서가 많은지 예제 프로그램이 많은지 여부도 중요한 기준이 될 것이다.

연속촬영 전자조사 문 영상을 이용한 오프라인 기반 치료 중 내부 장기 움직임 확인 시스템의 개발 (Development of an Offline Based Internal Organ Motion Verification System during Treatment Using Sequential Cine EPID Images)

  • 주상규;홍채선;허웅;김민규;한영이;신은혁;신정석;김진성;박희철;안성환;임도훈;최두호
    • 한국의학물리학회지:의학물리
    • /
    • 제23권2호
    • /
    • pp.91-98
    • /
    • 2012
  • 방사선치료 중 내부 장기의 움직임을 확인하고 이를 보정하는 것은 움직이는 종양에 정확히 방사선을 조사하는데 매우 중요한 역할을 한다. 실제 치료 중 획득한 연속촬영 전자조사 문(cine EPID) 영상을 이용해 치료 중 내부 장기 움직임을 추적하는 오프라인 기반 분석 시스템(IMVS, Internal-organ Motion Verification System using cine EPID)을 개발하였고 모형을 이용하여 개발된 시스템의 정확도와 유용성을 평가했다. IMVS는 cine EPID영상을 이용한 내부 장기 움직임 추적을 위해 내부 표지자를 이용한 유형 정합 알고리즘을 이용했다. 시스템의 성능평가를 위해 폐와 폐 종양을 묘사한 인체 모형과 이를 상하(SI, superior-inferior)방향으로 직선 운동시키는 구동 장치와 제어 프로그램을 고안했다. 모형을 4초 주기로 2 cm 직선 운동 시키면서 10 MV X선으로 3.3 fps, 6.6 fps속도로 cine EPID 영상($1,024{\times}768$ 해상도)를 획득했다. 획득된 cine EPID 영상은 IMVS를 이용하여 표적의 움직임을 추적하고 기존 외부 표지자를 이용한 비디오 영상 기반 추적시스템(RPM, Real-time Position Management, Varian, USA)으로부터 얻은 결과와 비교했다. 정량적 평가를 위해 두 시스템으로부터 움직임의 평균 주기(Peak-To-Peak), 진폭과 패턴(RMS, Root Mean Square)을 측정하여 비교했다. RPM과 IMVS로 측정한 폐 종양 모형의 움직임 주기는 각각 $3.95{\pm}0.02$ (RPM), $3.98{\pm}0.11$ (IMVS 3.3 fps), $4.005{\pm}0.001$ (IMVS 6.6 fps) 초로 실제움직임 주기인 4초와 잘 일치했다. IMVS로 획득한 모형 내부장기의 평균 움직임 진폭은 3.3 fps에서 $1.85{\pm}0.02$ cm, 6.6 fps에서 $1.94{\pm}0.02$ cm으로 실제 진폭 2 cm에 비해 각각 0.15 cm (오차 7.5%) 및 0.06 cm (오차 3%)의 차를 보였다. 움직임 신호의 일치성 평가를 위해 측정한 RMS는 0.1044 (IMVS 3.3 fps), 0.0480 (IMVS 6.6 fps)로 계획된 신호와 잘 일치 했다. cine EPID 영상을 이용하여 내부 표지자의 움직임을 추적하는 IMVS는 모형 실험에서 내부 장기의 움직임을 3% 오차 내에서 확인 가능했다. IMVS는 치료 중 내부장기 움직임을 측정하고 이를 사차원 방사선 치료계획과 비교하여 오차를 보정하는데 기여할 것으로 생각된다.

철근콘크리트 공사의 작업 생산성 분석을 위한 3차원 객체 활용 정보관리 시스템 구축방안 (A Framework on 3D Object-Based Construction Information Management System for Work Productivity Analysis for Reinforced Concrete Work)

  • 김준;차희성
    • 한국건설관리학회논문집
    • /
    • 제19권2호
    • /
    • pp.15-24
    • /
    • 2018
  • 국내 건설산업에서 생산성 정보의 필요성과 그 활용에 대한 중요성 인식에도 불구하고, 현장 단위의 공사계획 시 효과적인 피드백을 통한 생산성 정보관리가 미흡한 실정이다. 공사계획의 신뢰성을 향상하기 위해서는 생산성 정보의 효과적인 활용이 요구되지만, 현장에서는 공사계획을 관리자의 경험 및 직관에 의존하고 있다. 생산성 정보가 효과적으로 관리되지 못하는 이유는 생산성 정보의 관리를 위한 추가 인력투입이 어렵다는 점, 기존의 생산성 정보가 새로운 프로젝트에 적용되기 어렵다는 점 등 때문인 것으로 파악되었다. 이러한 문제의 해결방안을 제시하기 위해서 선행연구조사 및 면담조사를 하였고 그 결과 새로운 시스템이 필요하다는 사실을 확인하였다. 새로운 시스템의 요구사항으로는 최소화된 업무, 한정된 정보관리범위, 정보의 분류, 정보의 피드백, 생산성 저하요인의 고려 등이 있다. 본 연구에서는 상기 내용을 바탕으로 생산성 저하요인 및 생산성 정보의 관리가 가능한 시스템의 프레임워크를 제안하였다. 이 시스템은 사용자 접근성이 좋은 SketchUp 소프트웨어를 활용하여 프로그램의 활용에 따른 추가인력의 투입이나 업무량 증가를 최소화할 수 있도록 하였다. 제안한 시스템은 준비단계, 입력단계, 처리단계, 출력단계의 총 네 단계의 과정을 통해서 정보를 입력하여 처리하고 출력하도록 하였다. 입력한 시공정보는 건축공사 표준시방서에 기재된 내용을 참고로 구성한 Task Breakdown Structure (TBS)와 Material Breakdown Structure (MBS)를 통해서 분류되어 생산성 정보로 변환되도록 하고, 변환된 정보를 그래픽으로 화면에 출력하도록 하여 사용자는 이를 활용해 해당 현장에서의 생산성 정보를 활용할 수 있도록 하였다. 본 연구에서 제안한 생산성 정보관리 시스템을 K 사옥 공사현장에 대입하여 현장적용 가능성 및 정보 활용성 측면에서 검증하였고, 사용성 및 적용 가능성에서 매우 긍정적인 결과와 정보 활용에 따른 이득이 있을 것으로 예상되었다. 본 시스템을 활용할 경우 생산성 정보를 활용한 공사계획이 가능할 것이고 추후 정보가 지속해서 누적될 경우, 본 연구의 기대효과는 더욱 높아질 것으로 사료된다.

학과보건교육에서의 매체활용실태 및 영향요인 분석 (An Analysis of the Use of Media Materials in School Health Education and Related Factors in Korea)

  • 김영임;정혜선;안지영;박정영;박은옥
    • 한국학교보건학회지
    • /
    • 제12권2호
    • /
    • pp.207-215
    • /
    • 1999
  • The objectives of this study are to explain the use of media materials in school health education with other related factors in elementary, middle, and high schools in Korea. The data were collected by questionnaires from June to September in 1998. The number of subjects were 294 school nurses. The PC-SAS program was used for statistical analysis such as percent distribution, chi-squared test, spearman correlation test, and logistic regression. The use of media materials in health education has become extremely common. Unfortunately, much of the early materials were of poor production quality, reflected low levels of interest, and generally did little to enhance health education programming. A recent trend in media materials is a move away from the fact filled production to a more affective, process-oriented approach. There is an obvious need for health educators to use high-quality, polished productions in order to counteract the same levels of quality used by commercial agencies that often promote "unhealthy" lifestyles. Health educators need to be aware of the advantages and disadvantages of the various forms of media. Selecting media materials should be based on more than cost, availability, and personal preference. Selection should be based on the goal of achieving behavioral objectives formulated before the review process begins. The decision to use no media materials rather than something of dubious quality usually be the right decision. Poor-quality, outdated, or boring materials will usually have a detrimental effect on the presentation. Media materials should be viewed as vehicles to enhance learning, not products that will stand in isolation. Process of materials is an essential part of the educational process. The major results were as follows : 1. The elementary schools used the materials more frequently. But the production rate of media materials was not enough. The budget was too small for a wide use of media materials in school health education. These findings suggest that all schools have to increase the budget of health education programs. 2. Computers offer an incredibly diverse set of possibilities for use in health education, ranging from complicated statistical analysis to elementary-school-level health education games. But the use rate of this material was not high. The development of related software is essential. Health educators would be well advised to develop a basic operating knowledge of media equipment. 3. In this study, the most effective materials were films in elementary school and videotapes in middle and high school. Film tends to be a more emotive medium than videotape. The difficulties of media selection involved the small amount of extant educational materials. Media selection is a multifaceted process and should be based on a combination of sound principles. 4. The review of material use following student levels showed that the more the contents were various, the more the use rate was high. 5. Health education videotapes and overhead projectors proved the most plentiful and widest media tools. The information depicted was more likely to be current. As a means to display both text and graphic information, this instructional medium has proven to be both effective and enduring. 6. An analysis of how effective the quality of school nurse and school use of media materials shows a result that is not complete (p=0.1113). But, the budget of health education is a significant variable. The increase of the budget therefore is essential to effective use of media materials. From these results it is recommended that various media materials be developed and be wide used.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.