• Title/Summary/Keyword: bounds

Search Result 1,345, Processing Time 0.028 seconds

Total and Partial Prevalence of Cancer Across Kerman Province, Iran, in 2014, Using an Adapted Generalized Network Scale-Up Method

  • Vardanjani, Hossein Molavi;Baneshi, Mohammad Reza;Haghdoost, AliAkbar
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.13
    • /
    • pp.5493-5498
    • /
    • 2015
  • Due to the lack of nationwide population-based cancer registration, the total cancer prevalence in Iran is unknown. Our previous work in which we used a basic network scale-up (NSU) method, failed to provide plausible estimates of total cancer prevalence in Kerman. The aim of the present study was to estimate total and partial prevalence of cancer in southeastern Iran using an adapted version of the generalized network scale-up method. A survey was conducted in 2014 using multi-stage cluster sampling. A total of 1995 face-to-face gender-matched interviews were performed based on an adapted version of the NSU questionnaire. Interviewees were asked about their family cancer history. Total and partial prevalence were estimated using a generalized NSU estimator. The Monte Carlo method was adopted for the estimation of upper/lower bounds of the uncertainty range of point estimates. One-yr, 2-3 yr, and 4-5 yr prevalence (per 100,000 people) was respectively estimated at 78 (95%CI, 66, 90), 128 (95%CI, 118, 147), and 59 (95%CI, 49, 70) for women, and 48 (95%CI, 38, 58), 78 (95%CI, 66, 91), and 42 (95%CI, 32, 52) for men. The 5-yr prevalence of all cancers was estimated at 0.18 percent for men, and 0.27 percent for women. This study showed that the generalized familial network scale-up method is capable of estimating cancer prevalence, with acceptable precision.

Spatio-temporal Analysis of Snowfall for 5 Heavy Snowfall Areas in South Korea (우리나라 5대 대설지역의 적설량 변화 분석)

  • Kim, Saet Byul;Shin, Hyung Jin;Ha, Rim;Kim, Seong Joon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.2B
    • /
    • pp.103-111
    • /
    • 2012
  • This study is to analyze the spatio-temporal trend of snowfall using 30 years (1980-2010) data for 5 selected heavy snowfall areas (Ulleungdo (a), Northeastern Region (b), Western Taebaek Range Inland Region (c), Northwestern Sobaek Range Inland Region (d) and Southern Coastal Region (e)). The snow depth and snowfall frequency during 30 years showed some decreasing trend in parts of c and d. From the spatial comparison for 2 periods between 1980-2000 (A) and 1990-2010 (B), we could identified that the frequency of advisory for heavy snowfall from A to B decreased in c and d showing clear bounds for some areas in period B. For the average snow depth from A to B, the area d decreased while the area b increased with enlarging the areal range.

A Study on 3D Animation Emotional Lighting Style (3D애니메이션의 감성적 라이팅 스타일 연구)

  • Cho Jung-Sung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.153-160
    • /
    • 2005
  • It is within bounds to say that the mood expressed in the Scenes of 3D Animation influences by mostly setting up of 3D CG lighting. Tn the context of CG, lighting is the process of illuminating digital scenes in an artistic and technical manner so the audience can perceive what the director intends to display on the screen with the appropriate clarity and mood. The lighting has the role of making the scenes beautiful and harmonious as an aesthetics of light and color created and controlled by people. It can be also stylized in symbolic and metaphorical methods environmental mood which we pursue to expose and story which we want to express. It thus appears that the concept of lighting style is intimately related to the particular context and art direction of animation film. But unfortunately, there are no foolproof formulas to the process of lighting a scene. In short, the lighting contributes to define the style of the scene as a conditional lighting setups' elements including position, color, intensity, shadow's area and scope. But at the same time, we must not overlook the artistic aspects that the lighting might suggest over all moods the animation genre and the style of scene like tranquility, suspense, and high-drama.

  • PDF

An Extended SIP-based Network Architecture and Session Management Methods for Internet QoS (QoS를 지원하는 확장 SIP 기반 네트워크 구조 및 세션 제어 방법)

  • Shin Kang-Sik;Lee Jong-Hoon;Hong Kyung-Pyo;Yoo Sang-Jo;Cho Eun-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.1
    • /
    • pp.73-88
    • /
    • 2006
  • With the development of Next Generation convergence Network, the current Internet needs a new network architecture and new session establishment methods, which can support various applications requiring differentiated traffic processing and high quality of service instead of the conventional best-effort service. It is expected that, in next generation network based on All-IP. SIP will play an important role in the session establishment between the end to end user terminals. In this paper, we propose a new network architecture that can provide quality of service based on SIP using the QoS enabled SIP servers and policy servers, and we also propose a new session establishment method that apply the user's demands participating the session establishment when setting up the session using the SIP. Through simulations under various environments, we show the parameter ranges in terms of server capacity and the number of users in access networks to achieve reasonable delay bounds.

  • PDF

Performance analysis of campus wireless LAN in outdoor environment (실외환경에서 캠퍼스무선랜의 성능분석)

  • Kang Min-soo;Kim Myeong-hwan;Park Yeoun-sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.753-757
    • /
    • 2005
  • Wireless LAN was developed by alternative of LAN and because establishment was easy, have used into special field and special expenditure. Recently, Standard and a technology developed by leaps and bounds. Present is used into purpose of the Building to Building or wide connection etc. and relay of the high speed Internet and usage of picture communication that require multimedia band width. Specially, campus wireless LAM is thought that must secure radius $100\;\~\;200\;m$ dimension at the minimum 10Mbps speed as Internet transit trunk. But, there is difference as degressive here. In this paper, wireless LAN measured for effectiveness proof as Internet transit trunk in actuality utilization environment. Proved that should compose IEEE802.11b as AP more than minimum 3 when compose network to base as measuring result. Hereafter, there is the purpose that achieve performance evaluation of wireless UM in marine environment.

Improving Compiler to Prevent Buffer Overflow Attack (버퍼오버플로우 공격 방지를 위한 컴파일러 기법)

  • Kim, Jong-Ewi;Lee, Seong-Uck;Hong, Man-Pyo
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.453-458
    • /
    • 2002
  • Recently, the number of hacking, that use buffer overflow vulnerabilities, are increasing. Although the buffer overflow Problem has been known for a long time, for the following reasons, it continuos to present a serious security threat. There are three defense method of buffer overflow attack. First, allow overwrite but do not allow unauthorized change of control flow. Second, do not allow overwriting at all. Third, allow change of control flow, but prevents execution of injected code. This paper is for allowing overwrites but do not allow unauthorized change of control flow which is the solution of extending compiler. The previous defense method has two defects. First, a program company with overhead because it do much thing before than applying for the method In execution of process. Second, each time function returns, it store return address in reserved memory created by compiler. This cause waste of memory too much. The new proposed method is to extend compiler, by processing after compiling and linking time. To complement these defects, we can reduce things to do in execution time. By processing additional steps after compile/linking time and before execution time. We can reduce overhead.

Virtual Slot Multiple Access for Wireless Personal Area Network (WPAN을 위한 가상 슬롯 기반 다중 접근 방식)

  • Hwang Do-Youn;Kwon Eui-Hyeok;Lim Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9A
    • /
    • pp.837-843
    • /
    • 2006
  • IEEE802.15.3 and IEEE802.15.4 have defined the hybrid MAC protocols based on TDMA and CSMA where a multi-frame TDMA structure is employed so that multiple data frames can be transmitted within one timeslot to guarantee minimum delay bounds of isochroous traffic. However, TDMA has an intrinsic problem that cannot dynamically allocate optimal length of timeslot to each station. Therefore the idle timeslot can be produced by stations when each transmission queue is instantaneously empty during its timeslot, which would waste lots of timeslots especially in the multi-frame TDMA systems. In this paper, we propose a more flexible multiple-access scheme for the multi-frame TDMA system based on the concept of virtual slot which is accessible by every station with the highest priority for slot owner and lower priority for other stations. Finally, our simulation results from various environments show that proposed scheme can achieve magnitude improvement of total system throughput and average message delay by maximizing channel utilization.

Implementation of Worst Case Execution Time Analysis Tool For Embedded Software based on XScale Processor (XScale 프로세서 기반의 임베디드 소프트웨어를 위한 최악실행시간 분석도구의 구현)

  • Park, Hyeon-Hui;Choi, Myeong-Su;Yang, Seung-Min;Choi, Yong-Hoon;Lim, Hyung-Taek
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.365-374
    • /
    • 2005
  • Schedulability analysis is necessary to build reliable embedded real-time systems. For schedulability analysis, worst-case execution time(WCET) analysis that computes upper bounds of the execution times of tasks, is required indispensably. WCET analysis is done in two phases. The first phase is high-level analysis that analyzes control flow and finds longest paths of the program. The second phase is low-level analysis that computes execution cycles of basic blocks taking into account the hardware architecture. In this thesis, we design and implement integrated WCET analysis tools. We develop the WCET analysis tools for XScale-based system called WATER(WCET Analysis Tool for Embedded Real-time system). WATER consist of high-level flow analyzer and low-level execution time analyzer. Also, We compare real measurement for execution of program with analysis result calculated by WATER.

A Rapid Algorithm for Optimal Allocation in Combinatorial Auctions (조합 경매에서의 최적 분배를 위한 빠른 알고리즘)

  • 송진우;양성봉
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.9
    • /
    • pp.477-486
    • /
    • 2003
  • In combinatorial auctions buyers nay bid for arbitrary combinations of goods. But determining the winners of combinatorial auctions who maximize the profit of a seller is known to be NP-complete. A branch-and-bound method can be one of practical algorithm for winner determination. However, bid selection heuristics play a very important role in the efficiency of a branch-and-bound method. In this paper, we designed and implemented an algorithm which used a branch-and-bound method and Linear Programming for winner determination in combinatorial auctions. We propose new bid selection heuristics which consider a branching bid and conflicting bids simultaneously to select a branching bid in the algorithm. In addition, upper bounds are reused to reduce the running time in specific cases. We evaluated the performance of the algorithm by experiments with five data distributions and compared our method with others. The algorithm using heuristics showed a superior efficiency in two data distributions and a similar efficiency in three distributions.

Intelligent Digital Redesign for Uncertain Nonlinear Systems Using Power Series (Powrer Series를 이용한 불확실성을 갖는 비선형 시스템의 지능형 디지털 재설계)

  • Sung Hwa Chang;Park Jin Bae;Go Sung Hyun;Joo Young Hoon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.7
    • /
    • pp.881-886
    • /
    • 2005
  • This paper presents intelligent digital redesign method of global approach for hybrid state space fuzzy-model-based controllers. For effectiveness and stabilization of continuous-time uncertain nonlinear systems under discrete-time controller, Takagi-Sugeno(TS) fuzzy model is used to represent tile complex system. And global approach design problems viewed as a convex optimization problem that we minimize the error of the norm bounds between nonlinearly interpolated linear operators to be matched. Also, by using the power series, we analyzed nonlinear system's uncertain parts more precisely. When a sampling period is sufficiently small, the conversion of a continuous-time structured uncertain nonlinear system to an equivalent discrete-time system have proper reason. Sufficiently conditions for the global state-matching of tile digitally controlled system are formulated in terms of linear matrix inequalities (LMIs). Finally, a TS fuzzy model for the chaotic Lorentz system is used as an example to guarantee the stability and effectiveness of the proposed method.