• Title/Summary/Keyword: redundancy method

Search Result 557, Processing Time 0.027 seconds

Large-Scale Ultrasound Volume Rendering using Bricking (블리킹을 이용한 대용량 초음파 볼륨 데이터 렌더링)

  • Kim, Ju-Hwan;Kwon, Koo-Joo;Shin, Byeong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.117-126
    • /
    • 2008
  • Recent advances in medical imaging technologies have enabled the high-resolution data acquisition. Therefore visualization of such large data set on standard graphics hardware became a popular research theme. Among many visualization techniques, we focused on bricking method which divided the entire volume into smaller bricks and rendered them in order. Since it switches bet\W8n bricks on main memory and bricks on GPU memory on the fly, to achieve better performance, the number of these memory swapping conditions has to be minimized. And, because the original bricking algorithm was designed for regular volume data such as CT and MR, when applying the algorithm to ultrasound volume data which is based on the toroidal coordinate space, it revealed some performance degradation. In some areas near bricks' boundaries, an orthogonal viewing ray intersects the single brick twice, and it consequently makes a single brick memory to be uploaded onto GPU twice in a single frame. To avoid this redundancy, we divided the volume into bricks allowing overlapping between the bricks. In this paper, we suggest the formula to determine an appropriate size of these shared area between the bricks. Using our formula, we could minimize the memory bandwidth. and, at the same time, we could achieve better rendering performance.

  • PDF

Integrated Authentication and Key Management Method among Heterogeneous Wireless Mobile Networks (이기종 무선 이동망간 통합 인증 및 키관리 기법)

  • Park Hyung-Soo;Lee Hyung-Woo;Lee Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.50-59
    • /
    • 2006
  • The new communication paradigm is rapidly shifted from wireless mobile networks to an All-IP(Internet Protocol) network, led by service industry leaders and communication manufacturers. In this paradigm, providing authentication and session keys of a subscriber becomes one of the critical tasks because of IP open accessibility among heterogeneous networks. In this paper, we introduce authentication process procedure of heterogeneous wireless mobile networks and develop so-called IMAS(Integrated Mobile Authentication Server) which can securely inter-work among all mobile networks and support the legacy networks with backward compatibility. Especially, in designing IMAS, mobile authentication inter-working mechanism, key management technique, and other issues to be overcome are presented. We analyze and evaluate the performance of authentication algorithm which creates session key. A simulation environment of IMAS is established, and a performance(TPS; Transaction Per Second) result is analyzed and evaluated. It turned out that IMAS works among heterogeneous wireless mobile networks without compensating efficiency and functionalities of the legacy networks and decrease the entropy of data redundancy and data inconsistency among networks because of the integrity of the distributed Data Base(DB).

Improvement of Ortho Image Quality by Unmanned Aerial Vehicle (UAV에 의한 정사영상의 품질 개선 방안)

  • Um, Dae-Yong;Park, Joon-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.568-573
    • /
    • 2018
  • UAV(Unmanned Aerial Vehicle) is widely used in space information construction, agriculture, fisheries, weather observation, communication, and entertainment fields because they are cheaper and easier to operate than manned aircraft. In particular, UAV have attracted much attention due to the speed and cost of data acquisition in the field of spatial information construction. However, ortho image images produced using UAVs are distorted in buildings and forests. It is necessary to solve these problems in order to utilize the geospatial information field. In this study, fixed wing, rotary wing, vertical take off and landing type UAV were used to detect distortions of ortho image of UAV under various conditions, and various object areas such as construction site, urban area, and forest area were captured and analysed. Through the research, it was found that the redundancy of the unmanned aerial vehicle image is the biggest factor of the distortion phenomenon, and the higher the flight altitude, the less the distortion phenomenon. We also proposed a method to reduce distortion of orthoimage by lowering the resolution of original image using DTM (Digital Terrain Model) to improve distortion. Future high-quality unmanned aerial vehicles without distortions will contribute greatly to the application of UAV in the field of precision surveying.

Feasibility of a Clinical-Radiomics Model to Predict the Outcomes of Acute Ischemic Stroke

  • Yiran Zhou;Di Wu;Su Yan;Yan Xie;Shun Zhang;Wenzhi Lv;Yuanyuan Qin;Yufei Liu;Chengxia Liu;Jun Lu;Jia Li;Hongquan Zhu;Weiyin Vivian Liu;Huan Liu;Guiling Zhang;Wenzhen Zhu
    • Korean Journal of Radiology
    • /
    • v.23 no.8
    • /
    • pp.811-820
    • /
    • 2022
  • Objective: To develop a model incorporating radiomic features and clinical factors to accurately predict acute ischemic stroke (AIS) outcomes. Materials and Methods: Data from 522 AIS patients (382 male [73.2%]; mean age ± standard deviation, 58.9 ± 11.5 years) were randomly divided into the training (n = 311) and validation cohorts (n = 211). According to the modified Rankin Scale (mRS) at 6 months after hospital discharge, prognosis was dichotomized into good (mRS ≤ 2) and poor (mRS > 2); 1310 radiomics features were extracted from diffusion-weighted imaging and apparent diffusion coefficient maps. The minimum redundancy maximum relevance algorithm and the least absolute shrinkage and selection operator logistic regression method were implemented to select the features and establish a radiomics model. Univariable and multivariable logistic regression analyses were performed to identify the clinical factors and construct a clinical model. Ultimately, a multivariable logistic regression analysis incorporating independent clinical factors and radiomics score was implemented to establish the final combined prediction model using a backward step-down selection procedure, and a clinical-radiomics nomogram was developed. The models were evaluated using calibration, receiver operating characteristic (ROC), and decision curve analyses. Results: Age, sex, stroke history, diabetes, baseline mRS, baseline National Institutes of Health Stroke Scale score, and radiomics score were independent predictors of AIS outcomes. The area under the ROC curve of the clinical-radiomics model was 0.868 (95% confidence interval, 0.825-0.910) in the training cohort and 0.890 (0.844-0.936) in the validation cohort, which was significantly larger than that of the clinical or radiomics models. The clinical radiomics nomogram was well calibrated (p > 0.05). The decision curve analysis indicated its clinical usefulness. Conclusion: The clinical-radiomics model outperformed individual clinical or radiomics models and achieved satisfactory performance in predicting AIS outcomes.

Hardware Approach to Fuzzy Inference―ASIC and RISC―

  • Watanabe, Hiroyuki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.975-976
    • /
    • 1993
  • This talk presents the overview of the author's research and development activities on fuzzy inference hardware. We involved it with two distinct approaches. The first approach is to use application specific integrated circuits (ASIC) technology. The fuzzy inference method is directly implemented in silicon. The second approach, which is in its preliminary stage, is to use more conventional microprocessor architecture. Here, we use a quantitative technique used by designer of reduced instruction set computer (RISC) to modify an architecture of a microprocessor. In the ASIC approach, we implemented the most widely used fuzzy inference mechanism directly on silicon. The mechanism is beaded on a max-min compositional rule of inference, and Mandami's method of fuzzy implication. The two VLSI fuzzy inference chips are designed, fabricated, and fully tested. Both used a full-custom CMOS technology. The second and more claborate chip was designed at the University of North Carolina(U C) in cooperation with MCNC. Both VLSI chips had muliple datapaths for rule digital fuzzy inference chips had multiple datapaths for rule evaluation, and they executed multiple fuzzy if-then rules in parallel. The AT & T chip is the first digital fuzzy inference chip in the world. It ran with a 20 MHz clock cycle and achieved an approximately 80.000 Fuzzy Logical inferences Per Second (FLIPS). It stored and executed 16 fuzzy if-then rules. Since it was designed as a proof of concept prototype chip, it had minimal amount of peripheral logic for system integration. UNC/MCNC chip consists of 688,131 transistors of which 476,160 are used for RAM memory. It ran with a 10 MHz clock cycle. The chip has a 3-staged pipeline and initiates a computation of new inference every 64 cycle. This chip achieved an approximately 160,000 FLIPS. The new architecture have the following important improvements from the AT & T chip: Programmable rule set memory (RAM). On-chip fuzzification operation by a table lookup method. On-chip defuzzification operation by a centroid method. Reconfigurable architecture for processing two rule formats. RAM/datapath redundancy for higher yield It can store and execute 51 if-then rule of the following format: IF A and B and C and D Then Do E, and Then Do F. With this format, the chip takes four inputs and produces two outputs. By software reconfiguration, it can store and execute 102 if-then rules of the following simpler format using the same datapath: IF A and B Then Do E. With this format the chip takes two inputs and produces one outputs. We have built two VME-bus board systems based on this chip for Oak Ridge National Laboratory (ORNL). The board is now installed in a robot at ORNL. Researchers uses this board for experiment in autonomous robot navigation. The Fuzzy Logic system board places the Fuzzy chip into a VMEbus environment. High level C language functions hide the operational details of the board from the applications programme . The programmer treats rule memories and fuzzification function memories as local structures passed as parameters to the C functions. ASIC fuzzy inference hardware is extremely fast, but they are limited in generality. Many aspects of the design are limited or fixed. We have proposed to designing a are limited or fixed. We have proposed to designing a fuzzy information processor as an application specific processor using a quantitative approach. The quantitative approach was developed by RISC designers. In effect, we are interested in evaluating the effectiveness of a specialized RISC processor for fuzzy information processing. As the first step, we measured the possible speed-up of a fuzzy inference program based on if-then rules by an introduction of specialized instructions, i.e., min and max instructions. The minimum and maximum operations are heavily used in fuzzy logic applications as fuzzy intersection and union. We performed measurements using a MIPS R3000 as a base micropro essor. The initial result is encouraging. We can achieve as high as a 2.5 increase in inference speed if the R3000 had min and max instructions. Also, they are useful for speeding up other fuzzy operations such as bounded product and bounded sum. The embedded processor's main task is to control some device or process. It usually runs a single or a embedded processer to create an embedded processor for fuzzy control is very effective. Table I shows the measured speed of the inference by a MIPS R3000 microprocessor, a fictitious MIPS R3000 microprocessor with min and max instructions, and a UNC/MCNC ASIC fuzzy inference chip. The software that used on microprocessors is a simulator of the ASIC chip. The first row is the computation time in seconds of 6000 inferences using 51 rules where each fuzzy set is represented by an array of 64 elements. The second row is the time required to perform a single inference. The last row is the fuzzy logical inferences per second (FLIPS) measured for ach device. There is a large gap in run time between the ASIC and software approaches even if we resort to a specialized fuzzy microprocessor. As for design time and cost, these two approaches represent two extremes. An ASIC approach is extremely expensive. It is, therefore, an important research topic to design a specialized computing architecture for fuzzy applications that falls between these two extremes both in run time and design time/cost. TABLEI INFERENCE TIME BY 51 RULES {{{{Time }}{{MIPS R3000 }}{{ASIC }}{{Regular }}{{With min/mix }}{{6000 inference 1 inference FLIPS }}{{125s 20.8ms 48 }}{{49s 8.2ms 122 }}{{0.0038s 6.4㎲ 156,250 }} }}

  • PDF

Study on Implementation Measures of Provincial Self-governing Police System : Focusing on the Implication from Enlargement of Work Scope of Self-governing Police of Jeju Province (광역자치경찰제의 정착방안에 관한 연구 - 제주자치경찰의 사무확대에 대한 시사점을 중심으로 -)

  • Kim, Seong-Hee
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.37-69
    • /
    • 2019
  • According to viewpoints of researchers and stakeholders, various opinions can be suggested on self-governing police system. Therefore, success of Korean self-governing police system will be defending on how to balance among conflicting values such as Empowerment, Political neutrality, Financial issues, Comprehensive competence in maintaining public safety. Before the launching of self-governing police system nation-wide, the experience of Jeju provincial police will be valuable model case. In specific, enlargement of work scope of self-governing police in Jeju province which has been introduced since last year will be a useful reference. There is more pessimism about self-governing police of Jeju province so far. However, this perspective is mostly based on the issue regarding hardwares such as manpower, equipment, law and organization. Issues regarding softwares such as organizational culture, operation system and work process need more attention to evaluate self-governing police system properly. To mark the first year after enlargement of work scope of Jeju police, this study demonstrate the overall result and implications of self-governing police of Jeju province based on documents, statistics, reports and media reports. In result, several preconditions are needed to implement the self-governing police system nation-wide successfully. 1. Strengthen the link between local government and local police 2. Establish the foundation for collaboration of state and local police 3. Enhance the aspect of citizen autonomy in local level 4. Reinforcing the capability of handling situation of state and local police 5. Invigorating the inter-organizational working group to operate self-governing police system effectively. The self-governing police system is unclosed topic to discuss. After this study, in-depth studies should be followed with more resources. Particularly, additional perspective including redundancy and equity need to be considered regarding self-governing police. By getting with the changes of macroscopic trends - lowbirth and aging, the fourth industrial revolution and possible reunification of north and south Koreas - these studies should suggest the long-term blueprint of self-governing police system of Korea.

Diet status of college students evaluated by applying the photographic analysis method (사진분석법을 활용한 경북 일부지역 대학생의 식생활 실태 분석)

  • Chae Hong Lee;Kyung A Lee
    • Journal of Nutrition and Health
    • /
    • v.56 no.4
    • /
    • pp.439-453
    • /
    • 2023
  • Purpose: Concerns about accelerated aging are regularly being discussed. This study analyzed the dietary status and nutritional intake of college students who are about to enter their 30s and 40s. We further suggest ways to eat healthily. Methods: Totally, 67 students attending Daegu Catholic University were provided with a three-day meal record and analyzed. Results: The average demographics of the subjects were as follows: age 23.2 ± 2.0 years, height 165.1 ± 9.0 cm, weight 65.4 ± 13.6 kg, and BMI 23.5 ± 3.9 kg/m2. Overall, 76.3% of the subjects skipped breakfast. The food intake evaluation according to the food group intake pattern and the recommended number of servings determined that 38.3% of the subjects did not consume fruits and dairy products (GMVFDS = 111001), and both men and women lacked all food groups. Analysis of the nutrient intake state revealed lesser nutrient intake than the estimated energy need. Evaluation of the %RDA found that consumption of phosphorus was above the recommended amount, whereas all other nutrients were below the recommended amount. Men had a higher intake rate of phosphorus (p < 0.01), iron (p < 0.001), and sodium (p < 0.05) than women, whereas the intake rate of dietary fiber was higher in women (p < 0.05). Evaluation of the food intake by 22 food categories revealed that intake of regular grains was more in men than in women (p < 0.05) whereas women consumed significantly more mixed grains (p< 0.01). In protein foods, men consumed more meat (p < 0.01), while women consumed more eggs (p < 0.05) and beans (p < 0.05). Evaluating the fruit intake, juices were more frequently consumed by men than by women (p < 0.05). No differences were obtained in food intake and nutrient intake status according to obesity. Conclusion: Based on these results, there is an urgent requirement for attention and support for university cafeterias in order to induce changes in the eating habits of college students. Among other initiatives, this can be achieved by providing diet improvement programs and menus that consider food preferences.