• Title/Summary/Keyword: code search

Search Result 341, Processing Time 0.026 seconds

The Current Status and Medical Fee Propriety of Psychotherapy and Neuropsychological Test for Dementia in Korean Medicine (한방정신요법 및 치매 검사의 현황, 수가 적절성 연구)

  • Jang, Jae-Soon;Hwang, Wei-Wan;Cho, Seung-Hun
    • Journal of Oriental Neuropsychiatry
    • /
    • v.25 no.4
    • /
    • pp.411-422
    • /
    • 2014
  • Objectives: A large number of patients require psychiatric therapy. We attempted to determine the present situation regarding psychotherapy and neuropsychological tests for dementia in Korean medicine for the benefit of the Health Insurance Review and Assessment Service (HIRAS). The aim of this study was to aware of the current status about psychotherapy and neuropsychological test for dementia in Korean medicine. Methods: We searched the medical practice records for psychotherapy and neuropsychological tests in oriental neuropsychiatry between 2009 and 2013 using the Health Insurance Review and Assessment Service (HIRAS) database. The search categories were: IJeongByunGi (Medical practice code:59001), JiUnGoRoen (59002), Kyungjapyungji (59003), OhJiSangSeung (59004), neuropsychological test for dementia (29005). Results: 1. The number of patients treated with Korean Medical Psychotherapy increased annually by 151%. The total number of patients treated with Korean Medical Psychotherapy was 4,289 in 2013. 2. The total cost for patients treated with Korean medical Psychotherapy in the public health medical insurance budget was 268,032,000 won in 2013. The average medical cost for one therapy was 17,000 won in 2013. 3. The number of patients in local clinics is increasing faster than the number in Korean medical hospitals. 4. The age group between 20~30 years of age, for both men and women, is the group with the greatest density in Korean Medical Psychotherapy. 5. Neuropsychological Testing for Dementia in Korean Medicine is slowly decreasing. Conclusions: The prevalence of mental illness in Korea is increasing, therefore, the demand for Korean Medical Psychotherapy has increased recently. Authorizing Korean Medical psychiatrists to utilize Korean mental Health resources is essential. This study could be helpful in understanding the current status for the purpose of expanding Korean Medical Psychotherapy.

Telemedicine Software Application

  • UNGUREANU, Ovidiu Costica;POPESCU, Marius-Constantin;CIOBANU, Daniela;UNGUREANU, Elena;SARLA, Calin Gabriel;CIOBANU, Alina-Elena;TODINCA, Paul
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.171-180
    • /
    • 2021
  • Currently, hospitals and medical practices have a large amount of unstructured information, gathered in time at each ward or practice by physicians in a wide range of medical branches. The data requires processing in order to be able to extract relevant information, which can be used to improve the medical system. It is useful for a physician to have access to a patient's entire medical history when he or she is in an emergency situation, as relevant information can be found about the patient's problems such as: allergies to various medications, personal history, or hereditary collateral conditions etc. If the information exists in a structured form, the detection of diseases based on specific symptoms is much easier, faster and with a higher degree of accuracy. Thus, physicians may investigate certain pathological profiles and conduct cohort clinical trials, including comparing the profile of a particular patient with other similar profiles that already have a confirmed diagnosis. Involving information technology in this field will change so the time which the physicians should spend in front of the computer into a much more beneficial one, providing them with the possibility for more interaction with the patient while listening to the patient's needs. The expert system, described in the paper, is an application for medical diagnostic of the most frequently met conditions, based on logical programming and on the theory of probabilities. The system rationale is a search item in the field basic knowledge on the condition. The web application described in the paper is implemented for the ward of pathological anatomy of a hospital in Romania. It aims to ease the healthcare staff's work, to create a connection of communication at one click between the necessary wards and to reduce the time lost with bureaucratic proceedings. The software (made in PHP programming language, by writing directly in the source code) is developed in order to ease the healthcare staff's activity, being created in a simpler and as elegant way as possible.

Design and Implementation of Real Time Device Monitoring and History Management System based on Multiple devices in Smart Factory (스마트팩토리에서 다중장치기반 실시간 장비 모니터링 및 이력관리 시스템 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Jae-min;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.124-133
    • /
    • 2021
  • Smart factory is a future factory that collects, analyzes, and monitors various data in real time by attaching sensors to equipment in the factory. In a smart factory, it is very important to inquire and generate the status and history of equipment in real time, and the emergence of various smart devices enables this to be performed more efficiently. This paper proposes a multi device-based system that can create, search, and delete equipment status and history in real time. The proposed system uses the Android system and the smart glass system at the same time in consideration of the special environment of the factory. The smart glass system uses a QR code for equipment recognition and provides a more efficient work environment by using a voice recognition function. We designed a system structure for real time equipment monitoring based on multi devices, and we show practicality by implementing and Android system, a smart glass system, and a web application server.

Analysis Study on Patent for Scan-to-BIM Related Technology (Scan-to-BIM 관련기술 특허동향 분석연구)

  • Ryu, Jeong-Won;Byun, Na-Hyang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.107-114
    • /
    • 2020
  • Technologies related scan-to-BIM for BIM-based reverse engineering techniques are beginning to be actively introduced in the A.E.C. industry, and the scalability of the technology is growing considerably. This study uses patent analysis based on objective data to find the right direction for Korean Scan-to-BIM technology by identifying the trends in Korea, the United States, Europe, and Japan. This was done using the WIPSON patent search system to find previous research on patent analysis related to building technology, theoretical consideration of scan-to-BIM technology, and published patents. We collected information, verified the process, and extracted valid patents. We used the effective patent data to analyze the annual trend of patent applications, national trends, and technological trends through the International Patent Classification (IPC) code, the types of the top 20 major applicants, and family patent trends.

Hazelcast Vs. Ignite: Opportunities for Java Programmers

  • Maxim, Bartkov;Tetiana, Katkova;S., Kruglyk Vladyslav;G., Murtaziev Ernest;V., Kotova Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.406-412
    • /
    • 2022
  • Storing large amounts of data has always been a big problem from the beginning of computing history. Big Data has made huge advancements in improving business processes by finding the customers' needs using prediction models based on web and social media search. The main purpose of big data stream processing frameworks is to allow programmers to directly query the continuous stream without dealing with the lower-level mechanisms. In other words, programmers write the code to process streams using these runtime libraries (also called Stream Processing Engines). This is achieved by taking large volumes of data and analyzing them using Big Data frameworks. Streaming platforms are an emerging technology that deals with continuous streams of data. There are several streaming platforms of Big Data freely available on the Internet. However, selecting the most appropriate one is not easy for programmers. In this paper, we present a detailed description of two of the state-of-the-art and most popular streaming frameworks: Apache Ignite and Hazelcast. In addition, the performance of these frameworks is compared using selected attributes. Different types of databases are used in common to store the data. To process the data in real-time continuously, data streaming technologies are developed. With the development of today's large-scale distributed applications handling tons of data, these databases are not viable. Consequently, Big Data is introduced to store, process, and analyze data at a fast speed and also to deal with big users and data growth day by day.

A Dynamic Web Service Orchestration and Invocation Scheme based on Aspect-Oriented Programming and Reflection (관점지향 프로그래밍 및 리플렉션 기반의 동적 웹 서비스 조합 및 실행 기법)

  • Lim, Eun-Cheon;Sim, Chun-Bo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.1-10
    • /
    • 2009
  • The field of the web service orchestration introduced to generate a valuable service by reusing single services. Recently, it suggests rule-based searching and composition by the AI (Artificial Intelligence) instead of simple searching or orchestration based on the IOPE(Input, Output, Precondition, Effect) to implement the Semantic web as the web service of the next generation. It introduce a AOP programming paradigm from existing object-oriented programming paradigm for more efficient modularization of software. In this paper, we design a dynamic web service orchestration and invocation scheme applying Aspect-Oriented Programming (AOP) and Reflection for Semantic web. The proposed scheme makes use of the Reflection technique to gather dynamically meta data and generates byte code by AOP to compose dynamically web services. As well as, our scheme shows how to execute composed web services through dynamic proxy objects generated by the Reflection. For performance evaluation of the proposed scheme, we experiment on search performance of composed web services with respect to business logic layer and user view layer.

Using Roots and Patterns to Detect Arabic Verbs without Affixes Removal

  • Abdulmonem Ahmed;Aybaba Hancrliogullari;Ali Riza Tosun
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.1-6
    • /
    • 2023
  • Morphological analysis is a branch of natural language processing, is now a rapidly growing field. The fundamental tenet of morphological analysis is that it can establish the roots or stems of words and enable comparison to the original term. Arabic is a highly inflected and derivational language and it has a strong structure. Each root or stem can have a large number of affixes attached to it due to the non-concatenative nature of Arabic morphology, increasing the number of possible inflected words that can be created. Accurate verb recognition and extraction are necessary nearly all issues in well-known study topics include Web Search, Information Retrieval, Machine Translation, Question Answering and so forth. in this work we have designed and implemented an algorithm to detect and recognize Arbic Verbs from Arabic text.The suggested technique was created with "Python" and the "pyqt5" visual package, allowing for quick modification and easy addition of new patterns. We employed 17 alternative patterns to represent all verbs in terms of singular, plural, masculine, and feminine pronouns as well as past, present, and imperative verb tenses. All of the verbs that matched these patterns were used when a verb has a root, and the outcomes were reliable. The approach is able to recognize all verbs with the same structure without requiring any alterations to the code or design. The verbs that are not recognized by our method have no antecedents in the Arabic roots. According to our work, the strategy can rapidly and precisely identify verbs with roots, but it cannot be used to identify verbs that are not in the Arabic language. We advise employing a hybrid approach that combines many principles as a result.

A Basic Performance Evaluation of the Speech Recognition APP of Standard Language and Dialect using Google, Naver, and Daum KAKAO APIs (구글, 네이버, 다음 카카오 API 활용앱의 표준어 및 방언 음성인식 기초 성능평가)

  • Roh, Hee-Kyung;Lee, Kang-Hee
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.819-829
    • /
    • 2017
  • In this paper, we describe the current state of speech recognition technology and identify the basic speech recognition technology and algorithms first, and then explain the code flow of API necessary for speech recognition technology. We use the application programming interface (API) of Google, Naver, and Daum KaKao, which have the most famous search engine among the speech recognition APIs, to create a voice recognition app in the Android studio tool. Then, we perform a speech recognition experiment on people's standard words and dialects according to gender, age, and region, and then organize the recognition rates into a table. Experiments were conducted on the Gyeongsang-do, Chungcheong-do, and Jeolla-do provinces where the degree of tongues was severe. And Comparative experiments were also conducted on standardized dialects. Based on the resultant sentences, the accuracy of the sentence is checked based on spacing of words, final consonant, postposition, and words and the number of each error is represented by a number. As a result, we aim to introduce the advantages of each API according to the speech recognition rate, and to establish a basic framework for the most efficient use.

Abnormal sonar signal detection using recurrent neural network and vector quantization (순환신경망과 벡터 양자화를 이용한 비정상 소나 신호 탐지)

  • Kibae Lee;Guhn Hyeok Ko;Chong Hyun Lee
    • The Journal of the Acoustical Society of Korea
    • /
    • v.42 no.6
    • /
    • pp.500-510
    • /
    • 2023
  • Passive sonar signals mainly contain both normal and abnormal signals. The abnormal signals mixed with normal signals are primarily detected using an AutoEncoder (AE) that learns only normal signals. However, existing AEs may perform inaccurate detection by reconstructing distorted normal signals from mixed signal. To address these limitations, we propose an abnormal signal detection model based on a Recurrent Neural Network (RNN) and vector quantization. The proposed model generates a codebook representing the learned latent vectors and detects abnormal signals more accurately through the proposed search process of code vectors. In experiments using publicly available underwater acoustic data, the AE and Variational AutoEncoder (VAE) using the proposed method showed at least a 2.4 % improvement in the detection performance and at least a 9.2 % improvement in the extraction performance for abnormal signals than the existing models.

A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest (관심영역 암호화 시 발생하는 H.264 영상의 비트레이트 오버헤드 최소화 방법 연구)

  • Son, Dongyeol;Kim, Jimin;Ji, Cheongmin;Kim, Kangseok;Kim, Kihyung;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.311-326
    • /
    • 2018
  • This paper has experimented using News sample video with QCIF ($176{\times}144$) resolution in JM v10.2 code of H.264/AVC-MPEG. The region of interest (ROI) to be encrypted occurred the drift by unnecessarily referring to each frame continuously in accordance with the characteristics of the motion prediction and compensation of the H.264 standard. In order to mitigate the drift, the latest related research method of re-inserting encrypted I-picture into a certain period leads to an increase in the amount of additional computation that becomes the factor increasing the bit-rate overhead of the entire video. Therefore, the reference search range of the block and the frame in the ROI to be encrypted is restricted in the motion prediction and compensation for each frame, and the reference search range in the non-ROI not to be encrypted is not restricted to maintain the normal encoding efficiency. In this way, after encoding the video with restricted reference search range, this article proposes a method of RC4 bit-stream encryption for the ROI such as the face to be able to identify in order to protect personal information in the video. Also, it is compared and analyzed the experimental results after implementing the unencrypted original video, the latest related research method, and the proposed method in the condition of the same environment. In contrast to the latest related research method, the bit-rate overhead of the proposed method is 2.35% higher than that of the original video and 14.93% lower than that of the latest related method, while mitigating temporal drift through the proposed method. These improved results have verified by experiments of this study.