• 제목/요약/키워드: information routine

검색결과 388건 처리시간 0.033초

무인항공측량을 통한 해안 지형 모델링의 정확도 분석 (Accuracy Analysis of Coastal Area Modeling through UAV Photogrammetry)

  • 최경아;이임평
    • 대한원격탐사학회지
    • /
    • 제32권6호
    • /
    • pp.657-672
    • /
    • 2016
  • 빈번하게 다양한 유형으로 발생하는 해안 침식 현상에 대하여 지속적인 모니터링을 통하여 변화 자료를 축적함으로써 효과적으로 침식 지역을 관리하고 대응 방안을 수립할 수 있다. 경제적으로 정밀한 해안지역 모니터링을 수행하기 위한 수단으로써 저고도 자율 비행이 가능한 드론사진측량 시스템이 제안되고 있다. 본 연구에서는 해안 지역에서 드론 시스템으로부터 취득된 데이터를 처리하여 생성된 정사영상과 수치표고모델(Digital Elevation Model: DEM)을 다양한 기준 데이터와 비교함으로써 정확도를 분석하고자 한다. 비교 검증 방법을 수립하고, 이에 따라 분석된 정확도를 확인함으로써 해안 침식 모니터링에 드론 사진측량의 활용 가능성을 검증하였다. 기준 데이터와 다양한 조건에서 취득된 드론 영상으로부터 생성된 공간정보를 비교한 결과, 수평 및 수직 정확도(RMSE)는 각각 약 2.9 cm와 4.8 cm이었으며, 이는 해안 침식 모니터링의 요구정확도인 5 cm를 거의 만족시키는 수준으로 판단된다.

대한민국 상급 종합병원 임상현장에서 환자자기평가결과(Patient-Reported Outcome)의 일상적인 사용 현황 (Current status of routine use of Patient-Reported Outcome in the tertiary hospital clinical setting in Republic of Korea)

  • 방가람;강단비;조주희
    • 한국임상약학회지
    • /
    • 제32권2호
    • /
    • pp.74-83
    • /
    • 2022
  • Objective: There is a growing movement to introduce Patient-Reported Outcome (PRO) to clinical settings. This study aimed to investigate the routine use of PRO in tertiary hospital clinical settings. Methods: From January 2016 to December 2018, the usage status of Patient-Reported Outcome Measures (PROMs) submitted to the electronic medical record of a tertiary hospital clinical setting was investigated. Descriptive analysis was conducted to investigate the usage status of PROMs by 42 departments. Also, the most frequently used PROMs by departments, the purpose of measurement, the use rate of verified PROMs were investigated. Results: The PROMs accounted for 66% (98) of the 148 Instruments. Of the 98 PROMs, 64% (63) were using a validation Korean version of PROMs. Only about 1% of total outpatient visits applied PROMs, and among them, it was frequently used in urology (13%), orthopedics (8%), and otolaryngology (5%). The use rate of the validated PROMs was found to be 64%. Conclusions: The use of PROMs in domestic clinical settings was found to be very limited and frequently used only in specific departments. It is essential to use a PROMs that has been validated according to guidelines, as the use of validated PROMs will provide beneficial information to health professionals and also for the patient health improvement by objectively measuring the patient's health status.

Exploring the Use of Information Technology in Dietetics Practice among Clinical Dietitians

  • Wong Karine;Ham Sunny;Forsythe Hazel W.
    • Journal of Community Nutrition
    • /
    • 제7권3호
    • /
    • pp.149-155
    • /
    • 2005
  • This exploratory study investigated the software programs utilized by clinical dietitians and their perceptions on the use of information technology. The study focused on the use of specialized software for dietetics, general software for any office use and the Internet. A self-administered survey was used to collect data from clinical dietitians identified in the Kentucky Dietetic Association Directory 2003-2004. The survey was conducted in March through April, 2004. A total of 22 responses were collected, which yielded a response rate of $68\%$. Findings suggest that computer use has become a routine for optimal clinical practice ; major specialized software programs are used for nutrition assessment, nutrition analysis and menu development. Use of specialized software appears to be unassociated with dietitians' age and years of experience ; however, the associations are indicated between use of specialized software and education level as well as their specialty ; word processing and spreadsheet are the major general software used. Internet is used mainly for information search and communication. Respondents perceived that overall work efficiency and productivity significantly increased with computer use. The complexity of software is the major barrier encountered so training is the most needed support by the department. Strategic promotion on the use of specialized software should be targeted to the management team of the hospitals/facilities.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

정보사회의 도서관봉사 (Library Services in Information Society)

  • 전명숙
    • 한국문헌정보학회지
    • /
    • 제27권
    • /
    • pp.161-181
    • /
    • 1994
  • As information technologies are applied to the libraries in information society, the library services have been changing its feature. Therefore, the purpose of this paper is to explore and to establish a paradigm of the library services in information society. It is hypothesized that the application of information technologies leads to the change of the library services in information society. To prove the hypothesis, the data were collected from various research results carried out in the developed countries and by observing various libraries where the information technologies are extensively applied. The findings are as follows: 1. As information technologies are applied to the library, many new library services emerge for the society. 2. As the electronic data replace the paper data, the collection of a library becomes the collection of the libraries in the world. Therefore, the accessibility to the information network is more important than to own information in the library. Librarians select various electronic data according to the library policy which distinguishes their own library collection from others. The policy also solves the various problems related to weeding and preserving library collection. And the use of CD-ROM selection tools enable library users to select their own data. Now, the censorship becomes the concems of the library users, not the library. 3. The catalogs are reorganized for the electronic data for the international use. The most important information in the catalog is the location of the data and the multi access to the data are necessary. 4. As the information technologies are applied in book selection, cataloguing, information retreival and circulation, the library users are enable to service themselves in the library. And most of the routine works related to the information service are taken over by the library staffs. Professional librarians engage in user education, information marketing and fund raising. 5. Public libraries in information society serves those who have no access to the information. They help the illiterates. patients in the hospital, prisoners, and homeless in the city. Therefore, the information technologies enhance the role of librarians in professional work in the library as well as in the information society.

  • PDF

의료정보기술은 환자안전을 향상시키는가? (Can Health Information Technology Really Improve Patient Safety?)

  • 이재호
    • 한국의료질향상학회지
    • /
    • 제19권1호
    • /
    • pp.16-26
    • /
    • 2013
  • Health information technology (HIT) is one of the most familiar tools to healthcare providers. It is used in routine practice to reduce cost, to improve clinical performance, and to improve patient safety. Patient safety is the driving force of recent expansion of HIT industry. But there are many evidences that it can be harmful to patient safety. Role of HIT and HIT-related error became big issues because more and more healthcare providers and healthcare organizations are willing to adopt it. Adoption rate of HIT in Korea is higher than that of United States. But researches of HIT regarding patient safety are rare. In this article, types of HIT, their mechanisms of improving patient safety and HIT-related errors were reviewed. Status of HIT in terms of patient safety in Korea was also reviewed. Knowledge of how HIT can improve patient safety, its' limitation, and how to make it safer is crucial to whom have to use it to improve patient safety. Impact of HIT on patient safety must be evaluated actively in Korea. HIT which was proven to improve patient safety must be widely adopted. Government must prepare a strategic plan to improve HIT quality, support hospitals financially and institutionally to introduce qualified HIT, and develop HIT infrastructures and standard designed for patient safety.

  • PDF

정확한 위상정보를 얻기 위한 탈초점 영상들의 이미지 처리기법 (Image Processing of Defocus Series TEM Images for Extracting Reliable Phase Information)

  • 송경;신가영;김종규;오상호
    • Applied Microscopy
    • /
    • 제41권3호
    • /
    • pp.215-222
    • /
    • 2011
  • We discuss the experimental procedure for extracting reliable phase information from a defocus series of transmission electron microscopy (TEM) dark-field images using the transport of intensity equation (TIE). Taking InGaN/GaN multi-quantum well light-emitting diode as a model system, various factors affecting the final result of reconstructed phase such as TEM sample preparation, TEM imaging condition, image alignment, the correction of defocus values and the use of high frequency pass filter are evaluated. The obtained phase of wave function was converted to the geometric phase of the corresponding lattice planes, which was then used for the two-dimensional mapping of lattice strain following the dark-field inline holography (DIH) routine. The strain map obtained by DIH after optimized image processing is compared with that obtained by the geometric phase analysis of high resolution TEM (HRTEM) image, manifesting that DIH yields more accurate and reliable strain information than HRTEM-based GPA.

Task Assignment Strategies for a Complex Real-time Network System

  • Kim Hong-Ryeol;Oh Jae-Joon;Kim Dae-Won
    • International Journal of Control, Automation, and Systems
    • /
    • 제4권5호
    • /
    • pp.601-614
    • /
    • 2006
  • In this paper, a study on task assignment strategies for a complex real-time network system is presented. Firstly, two task assignment strategies are proposed to improve previous strategies. The proposed strategies assign tasks with meeting end-to-end real-time constraints, and also with optimizing system utilization through period modulation of the tasks. Consequently, the strategies aim at the optimizationto optimize of system performance with while still meeting real-time constraints. The proposed task assignment strategies are devised using the genetic algorithmswith heuristic real-time constraints in the generation of new populations. The strategies are differentiated by the optimization method of the two objectives-meeting end-to-end real-time constraints and optimizing system utilization: the first one has sequential genetic algorithm routines for the objectives, and the second one has one multiple objective genetic algorithm routine to find a Pareto solution. Secondly, the performances of the proposed strategies and a well-known existing task assignment strategy using the BnB(Branch and Bound) optimization are compared with one other through some simulation tests. Through the comparison of the simulation results, the most adequate task assignment strategies are proposed for some as system requirements-: the optimization of system utilization, the maximization of running tasktasks, and the minimization of the number of network node nodesnumber for a network system.

A visual identification key to Orchidaceae of Korea

  • Seo, Seon-Won;Oh, Sang-Hun
    • 식물분류학회지
    • /
    • 제47권2호
    • /
    • pp.124-131
    • /
    • 2017
  • Species identification is a fundamental and routine process in plant systematics, and linguistic-based dichotomous keys are widely used in the identification process. Recently, novel tools for species identification have been developed to improve the accuracy, ease to use, and accessibility related to these tasks for a broad range of users given the advances in information and communications technology. A visual identification key is such an approach, in which couplets consist of images of plants or a part of a plant instead of botanical terminology. We developed a visual identification key for 101 taxa of Orchidaceae in Korea and evaluated its performance. It uses short statements for image couplets to avoid misinterpretations by users. The key at the initial steps (couplets) uses relatively easy characters that can be determined with the naked eye. The final steps of the visual key provide images of species and information about distributions and flowering times to determine the species that best fit the available information. The number of steps required to identify a species varies, ranging from three to ten with an average of 4.5. A performance test with senior college students showed that species were accurately identified using the visual key at a rate significantly higher than when using a linguistic-based dichotomous key and a color manual. The findings presented here suggest that the proposed visual identification key is a useful tool for the teaching of biodiversity at schools, for the monitoring of ecosystems by citizens, and in other areas that require rapid, easy, and accurate identifications of species.

아라비안 숫자를 동반한 중의적 기호의 자동전사: 온점, 쌍점, 빗금을 중심으로 (Automatic Transcription of Three Ambiguous Symbols Used with Arabic Numerals: Period, Colon and Slash.)

  • 윤애선;정영임;권혁철
    • 한국언어정보학회지:언어와정보
    • /
    • 제8권1호
    • /
    • pp.117-136
    • /
    • 2004
  • In this paper, we have proposed Auto- TSS, an automatic transcription module of three ambiguous symbols-period (.), colon (:) and slash (/)--using their linguistic contexts. Few previous studies have discussed the problems of ambiguities in reading those symbols into Korean alphabetic letters in order to improve the current Korean TTS (Text-To-Speech) systems. We have classified 9 different reading formulae of the three symbols, analyzed their left and right contexts, and investigated selection rules and distributions between the symbols and their contexts. Based on these linguistic features, 30 stereotyped patterns, 53 rules and 5 heuristics determining the types of reading formulae are investigated for Auto-TSS. This module works modularly in 4 steps. The pilot test was conducted with three test suites, which contain respectively 6,979, 3,491 and 2,450 morpheme clusters containing at least one of three ambiguous symbols and Arabic numeral(s). Encouraging results of 94.3%, 93.0%, 94.2% accuracy were obtained for the test suites. Our next phases are to develop a guessing routine for unknown contexts of the union symbols by using statistical information; to refine the proper nouns and terminology detecting module; and to apply Auto-TSS on a larger scale.

  • PDF