• Title/Summary/Keyword: most powerful

Search Result 1,256, Processing Time 0.028 seconds

Diagnostic Value of MRI in Schwannoma (신경초종 진단에 있어 자기공명영상촬영(MRI)의 진단적 가치)

  • Kim, Jeung Il;Kim, Um Ji;Moon, Tae Yong;Lee, In Sook;Song, You Seon;Choi, Kyung Un
    • The Journal of the Korean bone and joint tumor society
    • /
    • v.20 no.2
    • /
    • pp.60-65
    • /
    • 2014
  • Purpose: To diagnose soft tissue tumor, such as lipoma and Schwannoma, magnetic resonance imaging (MRI) is sufficient in most cases. However, various characteristics are found in MRI images of Schwannoma, thus other type of tumors are often misdiagnosed as Schwannoma with MRI images. In this study, we evaluate the diagnostic value of specific MRI findings of Schwannoma. Materials and Methods: From January 2002 to May 2013, 104 patients who are suspected as Schwannoma rith MRI images are included in data, and the final diagnosis is confirmed with biopsy. Patients are divided into group 1 and group 2 who are confirmed as Schwannoma and other disease with biopsy, respectively. Results: 92 patients were diagnosed as Schwannoma (group 1) and 12 patients were diagnosed as other disease (group 2). We investigate the diagnostic value of specific MRI findings of Schwannoma. 41 patients of group 1 (45%) and 0 patients of group 2 (0%) showed target sign, 47 patients of group 1 (51%) and 2 patients of group 2 (17%) showed fascicular sign, 44 patients of group 1 (48%) and 5 patients of group 2 (42%) showed fat split sign, 28 patients of group 1 (30%) and 1 patients of group 2(9%) showed nerve entering and exiting sign, and 8 patients of group 1 (9%) and 6 patients of group 2 (50%) showed none of four specific findings on their MRI images. 52 patients of group 1 (57%) and 5 patients of group 2 (42%) have tumors on the pathway of nerve. Target sign could be considered as the best diagnostic value of the sign we investigate (p<0.05). Conclusion: Although specific MRI findings have powerful diagnostic value, patients are often misdiagnosed as Schwannoma with MRI findings. Therefore, if patients who are suspected as Schwannoma based on MRI findings have no target sign on their MRI images, we should consider the possibility of other disease.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Factors Affecting the Weight Control Intention of the Female Adolescent by Body Size - In Daegu Area - (청년기 여성의 체형에 따른 체중조절 행동의도에 영향을 미치는 요인 분석 - 대구지역을 중심으로 -)

  • Ryu, Ho-Kyung
    • The Korean Journal of Community Living Science
    • /
    • v.16 no.4
    • /
    • pp.83-93
    • /
    • 2005
  • This study was conducted to provide information about the behavioral intentions to diet in adolescent females. To explain the behavior intention to diet, a conceptual framework based on the ' Social Support, Control and the Stress Process Model ' and the ' Theory of Reasoned Actio ' was used. The survey was carried out by self-questionnaires with 463 female high school and college students in Daegu. Analysis of data was done by using mean, correlation and multiple regression analysis with the SAS computer program. Subjects were divided into 3 groups-underweight, normal weight, and overweight-according to their current body size. The most powerful influencing factor related to perceived stress -that is dissatisfaction with body image- was the current figure, regardless of current body size. The fatter the current body size, the higher the score for the behavioral intention to diet. In attitude toward the behavior of dieting, the fatter the current figure, the higher the attitude score, and the belief of behavioral outcome was the main decision variable. For the score of the subjective norm, the overweight group was significantly higher than other groups. The influencing factors for the behavioral intention to diet were perceived stress and attitude toward dieting behavior, especially beliefs of behavioral outcome.

  • PDF

Detection of Lamivudine-Resistant Mutations of HBV DNA Polymerase Gene Using PCR-Direct Sequencing

  • Lee, Kyung-Ok;Lee, Hye-Jung;Byun, Ji-Young;Lee, Sung-Yeun;Kim, Jeong-Sook;Jung, Na-Young;Chung, Soo-Jin;Seong, Hye-Soon;Kim, Kyung-Tae
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.38 no.3
    • /
    • pp.196-202
    • /
    • 2006
  • Treatment of hepatitis B virus (HBV) with lamivudine is effective in suppressing virus replication and results in reduced inflammatory activity. However the most troublesome problem of lamivudine treatment is the emergence of lamivudine-resistant strains with amino acid substitution in the YMDD motif of DNA polymerase gene during the treatment. The aim of this study was to determine the mutation of YMDD motif (codon 552) and codon 528 in chronic HBV patients with lamivudine therapy using PCR-direct sequencing and to investigate the relationship between lamivudine mediated HBV mutation and HBeAg. HBV DNA was extracted from serum samples of HBV patients and amplified by nested PCR with two sets of primer pairs selected in HBV DNA polymerase gene. Amplified PCR product was analyzed by 2% agarose gel electrophoresis and direct sequencing. HBV mutation was detected in 124 out of 207 samples (60%). Single mutation was 50.8% for M552I, 43.5% for M552V, 5.7% for M552I/V and the L528M mutation was 67.0%. Double mutation was 43.6% for M552V/L528M, 33.1% for M552I/L528(wild type), 17.7% for M552I/L528M and 5.6% for M552I/V/L528M. Serine mutation at YMDD motif (M552S) was not found and the L528M mutation frequently accompanied M552V type. In this study, the typical difference of frequencies for HBV mutation depending on HBeAg was not found. Moreover, the PCR-direct sequencing method used in this study might be a powerful tool for the mutation study in clinical reference laboratories with high volume.

  • PDF

Knowledge Management Strategy of a Franchise Business : The Case of a Paris Baguette Bakery (프랜차이즈 기업의 지식경영 전략 : 파리바게뜨 사례를 중심으로)

  • Cho, Joon-Sang;Kim, Bo-Yong
    • Journal of Distribution Science
    • /
    • v.10 no.6
    • /
    • pp.39-53
    • /
    • 2012
  • It is widely known that knowledge management plays a facilitating role that contributes to upgrading organizational performance. Knowledge management systems (KMS), especially, support the knowledge management process including the sharing, creating, and using of knowledge within a company, and maximize the value of knowledge resources within an organization. Despite this widely held belief, there are few studies that describe how companies actually develop, share, and practice their knowledge. Companies in the domestic small franchise sector, which are in the early stages in terms of knowledge management, need to improve their KMS to manage their franchisees effectively. From this perspective, this study uses a qualitative approach to explore the actual process of knowledge management implementation. This article presents a case study of PB (Paris Baguette) company, which is the first to build a KMS in the franchise industry. The study was able to confirm the following facts through the analysis of target companies. First, the chief executive's support is a critical success factor and this support can increase the participation of organization members. Second, it is important to build a process and culture that actively creates and leverages information in knowledge management activities. The organizational learning culture should be one where the creation, learning, and sharing of new knowledge is developed continuously. Third, a horizontal network organization is needed in order to make relationships within the organization more close-knit. Fourth, in order to connect the diverse processes such as knowledge acquisition, storage, and utilization of knowledge management activities, information technology (IT) capabilities are essential. Indeed, IT can be a powerful tool for improving the quality of work and maximizing the spread and use of knowledge. However, during the construction of an intranet based KMS, research is required to ensure that the most efficient system is implemented. Finally, proper evaluation and compensation are important success factors. In order to develop knowledge workers, an appropriate program of promotion and compensation should be established. Also, building members' confidence in the benefits of knowledge management should be an ongoing activity. The company developed its original KMS to achieve a flexible and proactive organization, and a new KMS to improve organizational and personal capabilities. The PB case shows that there are differences between participants perceptions and actual performance in managing knowledge; that knowledge management is not a matter of formality but a paradigm that assures the sharing of knowledge; and that IT boosts communication skills, thus creating a mutual relationship to enhance the flow of knowledge and information between people. Knowledge management for building organizational capabilities can be successful when considering its focus and ways to increase its acceptance. This study suggests guidelines for major factors that corporate executives of domestic franchises should consider to improve knowledge management and the higher operating activities that can be used.

  • PDF

Married Women's Economic Dependency and the Welfare State (기혼여성의 경제적 의존과 복지국가)

  • Kim, Young-mi
    • Korean Journal of Social Welfare Studies
    • /
    • no.36
    • /
    • pp.55-80
    • /
    • 2008
  • Research on the welfare state or income inequality has been concerned with variations in inequality between societies or families. These studies tend to view the family as a unit of shared interests where incomes are pooled and distributed equally. This study makes a theoretical and empirical case for why it is important to look at economic dependency within the family in comparative welfare state research. Using the Luxembourg Income Study data this study examined married women's dependency on their husbands' earnings in 16 western industrialized countries. The constructed measure for married women's level of economic dependency followed the procedure of Sørensen & McLanahan(1987), which stated : "her dependency is measured by the extent to which a woman's standard of living(as determined by her share of income) is derived from a transfer from her husband." The finding suggested that married women's economic dependence was lowest in Scandinavian countries. On the contrary, in Southern Europe countries most married women were dependent on husbands' earnings. In Netherlands, Austria, Germany where the share of part-time work among married women was high, married women's economic dependence was also high. This showed the women's labor force participation did not mean that the majority of couples were equal with respect to earnings, nor that a major shift in the sexual division of labour has taken place. This paper analysed the causal relationship between the married women's economic independence and the welfare state by using Ragin(2000)'s Fuzzy-Set Qualitative Comparative Analysis. This analysis considered the various conditions of the welfare state : namely, left power, union mobilization density, women's mobilization, public service sector employment and generous support on the family. The result showed that powerful union, high level of women's mobilization and the generous support on the family were necessary conditions for 'relatively high' level of married women's economic independence.

Monitoring of a Time-series of Land Subsidence in Mexico City Using Space-based Synthetic Aperture Radar Observations (인공위성 영상레이더를 이용한 멕시코시티 시계열 지반침하 관측)

  • Ju, Jeongheon;Hong, Sang-Hoon
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.6_1
    • /
    • pp.1657-1667
    • /
    • 2021
  • Anthropogenic activities and natural processes have been causes of land subsidence which is sudden sinking or gradual settlement of the earth's solid surface. Mexico City, the capital of Mexico, is one of the most severe land subsidence areas which are resulted from excessive groundwater extraction. Because groundwater is the primary water resource occupies almost 70% of total water usage in the city. Traditional terrestrial observations like the Global Navigation Satellite System (GNSS) or leveling survey have been preferred to measure land subsidence accurately. Although the GNSS observations have highly accurate information of the surfaces' displacement with a very high temporal resolution, it has often been limited due to its sparse spatial resolution and highly time-consuming and high cost. However, space-based synthetic aperture radar (SAR) interferometry has been widely used as a powerful tool to monitor surfaces' displacement with high spatial resolution and high accuracy from mm to cm-scale, regardless of day-or-night and weather conditions. In this paper, advanced interferometric approaches have been applied to get a time-series of land subsidence of Mexico City using four-year-long twenty ALOS PALSAR L-band observations acquired from Feb-11, 2007 to Feb-22, 2011. We utilized persistent scatterer interferometry (PSI) and small baseline subset (SBAS) techniques to suppress atmospheric artifacts and topography errors. The results show that the maximum subsidence rates of the PSI and SBAS method were -29.5 cm/year and -27.0 cm/year, respectively. In addition, we discuss the different subsidence rates where the study area is discriminated into three districts according to distinctive geotechnical characteristics. The significant subsidence rate occurred in the lacustrine sediments with higher compressibility than harder bedrock.

Mythologies of Design Thinking: Based on Roland Barthes's Mythologies (디자인 씽킹의 신화성 - 롤랑바르트 기호의 신화론을 배경으로)

  • Kim, Kyung-Won
    • 기호학연구
    • /
    • no.57
    • /
    • pp.7-26
    • /
    • 2018
  • The purpose of this paper is to interpret the discourse on design thinking through the perspective of Roland Barthes' Mythologies. To this end, this paper will explore the mythologization process of design thinking using the methodological framework of Barthes, which structurally interprets the connotations produced using semiosis. Design thinking originally refers to a method which is used in the process of planning ideas about designs in order to create the final products for professional designs. However, design thinking has recently attracted more interest from the public because it has become known as a tool for solving various problems which exist outside of the field of design, such as social issues, management, and marketing strategies. Barthes points out that myths are used as a tool to deliver ideologies. He also emphasizes the importance of 'structural thinking'. It interprets the inherent connotative meanings more than the denotative meanings, which are explicitly shown. One of the most powerful ideologies which our society embraces today is creativity. Design thinking realizes the manifestation of creativity through a schematized process. This can be explained by considering design thinking as an icon that is specifically turned into a figuration to realize its objectness, in which a discourse for solving issues and social codes meet together and form a mythology. The mythologies that Barthes cites in his book refer to mythical values created by the cultural codes which humans have produced in our modern and contemporary age. The symbolic value of design thinking has become more important than the signifier which design thinking itself presents. This means that design thinking has become a sign that has mythical properties. In other words, the ideology of creativity embodied by design thinking has attained a mythological status, as it produces a new cultural code through innovation. The process of interpreting a phenomenon using the perspective of semiotics is an important tool that allows us to examine the concept of an object and its surroundings thoroughly. This paper attempts to expand the external scope of critical analysis about social phenomena by using the signs which continuously reveal themselves in common ideologies, such as design thinking, which has been gaining more popularity recently.

Predicting Crime Risky Area Using Machine Learning (머신러닝기반 범죄발생 위험지역 예측)

  • HEO, Sun-Young;KIM, Ju-Young;MOON, Tae-Heon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.4
    • /
    • pp.64-80
    • /
    • 2018
  • In Korea, citizens can only know general information about crime. Thus it is difficult to know how much they are exposed to crime. If the police can predict the crime risky area, it will be possible to cope with the crime efficiently even though insufficient police and enforcement resources. However, there is no prediction system in Korea and the related researches are very much poor. From these backgrounds, the final goal of this study is to develop an automated crime prediction system. However, for the first step, we build a big data set which consists of local real crime information and urban physical or non-physical data. Then, we developed a crime prediction model through machine learning method. Finally, we assumed several possible scenarios and calculated the probability of crime and visualized the results in a map so as to increase the people's understanding. Among the factors affecting the crime occurrence revealed in previous and case studies, data was processed in the form of a big data for machine learning: real crime information, weather information (temperature, rainfall, wind speed, humidity, sunshine, insolation, snowfall, cloud cover) and local information (average building coverage, average floor area ratio, average building height, number of buildings, average appraised land value, average area of residential building, average number of ground floor). Among the supervised machine learning algorithms, the decision tree model, the random forest model, and the SVM model, which are known to be powerful and accurate in various fields were utilized to construct crime prevention model. As a result, decision tree model with the lowest RMSE was selected as an optimal prediction model. Based on this model, several scenarios were set for theft and violence cases which are the most frequent in the case city J, and the probability of crime was estimated by $250{\times}250m$ grid. As a result, we could find that the high crime risky area is occurring in three patterns in case city J. The probability of crime was divided into three classes and visualized in map by $250{\times}250m$ grid. Finally, we could develop a crime prediction model using machine learning algorithm and visualized the crime risky areas in a map which can recalculate the model and visualize the result simultaneously as time and urban conditions change.

Detection of Surface Changes by the 6th North Korea Nuclear Test Using High-resolution Satellite Imagery (고해상도 위성영상을 활용한 북한 6차 핵실험 이후 지표변화 관측)

  • Lee, Won-Jin;Sun, Jongsun;Jung, Hyung-Sup;Park, Sun-Cheon;Lee, Duk Kee;Oh, Kwan-Young
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_4
    • /
    • pp.1479-1488
    • /
    • 2018
  • On September 3rd 2017, strong artificial seismic signals from North Korea were detected in KMA (Korea Meteorological Administration) seismic network. The location of the epicenter was estimated to be Punggye-ri nuclear test site and it was the most powerful to date. The event was not studied well due to accessibility and geodetic measurements. Therefore, we used remote sensing data to analyze surface changes around Mt. Mantap area. First of all, we tried to detect surface deformation using InSAR method with Advanced Land Observation Satellite-2 (ALOS-2). Even though ALOS-2 data used L-band long wavelength, it was not working well for this particular case because of decorrelation on interferogram. The main reason would be large deformation near the Mt. Mantap area. To overcome this limitation of decorrelation, we applied offset tracking method to measure deformation. However, this method is affected by window kernel size. So we applied various window sizes from 32 to 224 in 16 steps. We could retrieve 2D surface deformation of about 3 m in maximum in the west side of Mt. Mantap. Second, we used Pleiadas-A/B high resolution satellite optical images which were acquired before and after the 6th nuclear test. We detected widespread surface damage around the top of Mt. Mantap such as landslide and suspected collapse area. This phenomenon may be caused by a very strong underground nuclear explosion test. High-resolution satellite images could be used to analyze non-accessible area.