• Title/Summary/Keyword: software development and applications

Search Result 807, Processing Time 0.027 seconds

Development of Program for Renal Function Study with Quantification Analysis of Nuclear Medicine Image (핵의학 영상의 정량적 분석을 통한 신장기능 평가 프로그램 개발)

  • Song, Ju-Young;Lee, Hyoung-Koo;Suh, Tae-Suk;Choe, Bo-Young;Shinn, Kyung-Sub;Chung, Yong-An;Kim, Sung-Hoon;Chung, Soo-Kyo
    • The Korean Journal of Nuclear Medicine
    • /
    • v.35 no.2
    • /
    • pp.89-99
    • /
    • 2001
  • Purpose: In this study, we developed a new software tool for the analysis of renal scintigraphy which can be modified more easily by a user who needs to study new clinical applications, and the appropriateness of the results from our program was studied. Materials and Methods: The analysis tool was programmed with IDL5.2 and designed for use on a personal computer running Windows. For testing the developed tool and studying the appropriateness of the calculated glomerular filtration rate (GFR), $^{99m}Tc$-DTPA was administered to 10 adults in normal condition. In order to study the appropriateness of the calculated mean transit time (MTT), $^{99m}Tc-DTPA\;and\;^{99m}Tc-MAG3$ were administered to 11 adults in normal condition and 22 kidneys were analyzed. All the images were acquired with ORBITOR. the Siemens gamma camera. Results: With the developed tool, we could show dynamic renal images and time activity curve (TAC) in each ROI and calculate clinical parameters of renal function. The results calculated by the developed tool were not different statistically from the results obtained by the Siemens application program (Tmax: p=0.68, Relative Renal Function: p:1.0, GFR: p=0.25) and the developed program proved reasonable. The MTT calculation tool proved to be reasonable by the evaluation of the influence of hydration status on MTT. Conclusion: We have obtained reasonable clinical parameters for the evaluation of renal function with the software tool developed in this study. The developed tool could prove more practical than conventional, commercial programs.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

An Empirical Study on the Success Factors of Implementing Product Life Cycle Management Systems (제품수명주기관리 시스템 도입의 성공요인에 관한 실증연구)

  • Kim, Jeong-Beom
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.12
    • /
    • pp.909-918
    • /
    • 2010
  • To analyze the national competitiveness of Korea leads to the conclusion that global high-tech enterprises have been playing leading and pulling roles in making Korea in line with advanced countries even though the country is lacking in various natural resources. The characteristics of these companies above are as follows; Firstly, these enterprises continue to accumulate core technologies and know-how with highly competent human resources and well-organized management. Secondly, they are well structured and equipped with information technology infrastructures which are, for example, ERP, SCM, CRM, and PLM. Among them PLM is considered to be the principal core information technology infra in manufacturing industry. The urgent task of manufacturing industry recently is to develop new products to accept various needs of consumers, and to launch the products in time to market, which requires the manufactures to be equipped with product development infra and system to upgrade product fulfillment and mass production system in a short period. The introduction of PLM System is a solution of core strategy as a manufacturer for collaboration, global development, reengineering of manufacturing system, the innovation and efficiency of manufacturing process, and product quality improvement. The purpose of this study is to analyze the success factors of introducing PLM System and its practicing effectiveness. And the results of empirical study are as follows; (1) Technical success factors positively impact system quality and user satisfaction, (2) Organizational success factors positively impact system quality, but does not impact user satisfaction, (3) Environmental success factors positively impact system quality and user satisfaction, (4) System quality positively impacts user satisfaction, (5) User satisfaction positively impacts the effectiveness of implementing PLM systems, but system quality does not impact it.

A Study on a Basic Model for GIS Audit, Based on Various Types of GIS Projects (GIS 사업유형을 고려한 GIS 감리의 기반 모델 연구)

  • Koh, Kwang-Chul;Kim, Eun-Hyung
    • Journal of Korea Spatial Information System Society
    • /
    • v.2 no.2 s.4
    • /
    • pp.5-23
    • /
    • 2000
  • Since 1995, national and local governments have competitively initiated many and large GIS projects and audit for the projects becomes an important issue. So far, the audit in the Information Technology(IT) area has tried to deal with the issue but ineffectiveness has been found for the successful GIS project management. Effective auditing is a critical element for the project management. In order to establish a proper audit model for the GIS projects and to promote auditing activities in the projects, this study constructs two hypotheses and tries to prove them. The hypotheses are as follows : 1) For a good audits model for GIS, unique characteristics of a GIS project audit items and the scope of the audit need to be identified. 2) The scope of audit needs to be classified according to the requests from tasks in the projects. To prove the hypotheses, this study analyzes positive aspects of audit in IT and construction projects, clarifies the audit items in GIS projects by comparing with them, and classifies the scope of the GIS audit based on various types of GIS projects. As a results, 5 types of the GIS audit are identified : (1) audit for project management, (2) audit focused on IT, (3) audit characterized by GIS technologies, (4) GIS database audit and (5) consulting services for critical problems in the projects. In addition, 4 criteria in classifying the GIS projects are suggested for the GIS audit. The 4 criteria are domain, scope, duration, and GIS applications technologies. Especially, GIS technology considered in this study includes GIS software, methodologies for GIS development, GIS database and quality control of GIS data, which are not usually reflected in the existing studies about in GIS audit. Because the GIS audit depends on a type of GIS projects, scopes of the audit can be flexibly reconstructed in accordance with the types of GIS projects. This is a key to effective and realistic audit for the future GIS projects. Strategies for effective GIS audit are also proposed in terms of the following: GIS project management, goal establishment in each audit stage, documentation from GIS audit, timing strategies for intensive GIS audit, and designing team structure.

  • PDF

Application of Greenhouse Climate Management Model for Educational Simulation Design (교육용 시뮬레이션 설계를 위한 온실 환경 제어 모델의 활용)

  • Yoon, Seungri;Kim, Dongpil;Hwang, Inha;Kim, Jin Hyun;Shin, Minju;Bang, Ji Wong;Jeong, Ho Jeong
    • Journal of Bio-Environment Control
    • /
    • v.31 no.4
    • /
    • pp.485-496
    • /
    • 2022
  • Modern agriculture is being transformed into smart agriculture to maximize production efficiency along with changes in the 4th industrial revolution. However, rural areas in Korea are facing challenges of aging, low fertility, and population outflow, making it difficult to transition to smart agriculture. Among ICT technologies, simulation allows users to observe or experience the results of their choices through imitation or reproduction of reality. The combination of the three-dimension (3D) model and the greenhouse simulator enable a 3D experience by virtual greenhouse for fruits and vegetable cultivation. At the same time, it is possible to visualize the greenhouse under various cultivation or climate conditions. The objective of this study is to apply the greenhouse climate management model for simulation development that can visually see the state of the greenhouse environment under various micrometeorological properties. The numerical solution with the mathematical model provided a dynamic change in the greenhouse environment for a particular greenhouse design. Light intensity, crop transpiration, heating load, ventilation rate, the optimal amount of CO2 enrichment, and daily light integral were calculated with the simulation. The results of this study are being built so that users can be linked through a web page, and software will be designed to reflect the characteristics of cladding materials and greenhouses, cultivation types, and the condition of environmental control facilities for customized environmental control. In addition, environmental information obtained from external meteorological data, as well as recommended standards and set points for each growth stage based on experiments and research, will be provided as optimal environmental factors. This simulation can help growers, students, and researchers to understand the ICT technologies and the changes in the greenhouse microclimate according to the growing conditions.

Conjunction Assessments of the Satellites Transported by KSLV-II and Preparation of the Countermeasure for Possible Events in Timeline (누리호 탑재 위성들의 충돌위험의 예측 및 향후 상황의 대응을 위한 분석)

  • Shawn Seunghwan Choi;Peter Joonghyung Ryu;John Kim;Lowell Kim;Chris Sheen;Yongil Kim;Jaejin Lee;Sunghwan Choi;Jae Wook Song;Hae-Dong Kim;Misoon Mah;Douglas Deok-Soo Kim
    • Journal of Space Technology and Applications
    • /
    • v.3 no.2
    • /
    • pp.118-143
    • /
    • 2023
  • Space is becoming more commercialized. Despite of its delayed start-up, space activities in Korea are attracting more nation-wide supports from both investors and government. May 25, 2023, KSLV II, also called Nuri, successfully transported, and inserted seven satellites to a sun-synchronous orbit of 550 km altitude. However, Starlink has over 4,000 satellites around this altitude for its commercial activities. Hence, it is necessary for us to constantly monitor the collision risks of these satellites against resident space objects including Starlink. Here we report a quantitative research output regarding the conjunctions, particularly between the Nuri satellites and Starlink. Our calculation shows that, on average, three times everyday, the Nuri satellites encounter Starlink within 1 km distance with the probability of collision higher than 1.0E-5. A comparative study with KOMPSAT-5, also called Arirang-5, shows that its distance of closest approach distribution significantly differs from those of Nuri satellites. We also report a quantitative analysis of collision-avoiding maneuver cost of Starlink satellites and a strategy for Korea, being a delayed starter, to speed up to position itself in the space leading countries. We used the AstroOne program for analyses and compared its output with that of Socrates Plus of Celestrak. The two line element data was used for computation.

RGB Channel Selection Technique for Efficient Image Segmentation (효율적인 이미지 분할을 위한 RGB 채널 선택 기법)

  • 김현종;박영배
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.10
    • /
    • pp.1332-1344
    • /
    • 2004
  • Upon development of information super-highway and multimedia-related technoiogies in recent years, more efficient technologies to transmit, store and retrieve the multimedia data are required. Among such technologies, firstly, it is common that the semantic-based image retrieval is annotated separately in order to give certain meanings to the image data and the low-level property information that include information about color, texture, and shape Despite the fact that the semantic-based information retrieval has been made by utilizing such vocabulary dictionary as the key words that given, however it brings about a problem that has not yet freed from the limit of the existing keyword-based text information retrieval. The second problem is that it reveals a decreased retrieval performance in the content-based image retrieval system, and is difficult to separate the object from the image that has complex background, and also is difficult to extract an area due to excessive division of those regions. Further, it is difficult to separate the objects from the image that possesses multiple objects in complex scene. To solve the problems, in this paper, I established a content-based retrieval system that can be processed in 5 different steps. The most critical process of those 5 steps is that among RGB images, the one that has the largest and the smallest background are to be extracted. Particularly. I propose the method that extracts the subject as well as the background by using an Image, which has the largest background. Also, to solve the second problem, I propose the method in which multiple objects are separated using RGB channel selection techniques having optimized the excessive division of area by utilizing Watermerge's threshold value with the object separation using the method of RGB channels separation. The tests proved that the methods proposed by me were superior to the existing methods in terms of retrieval performances insomuch as to replace those methods that developed for the purpose of retrieving those complex objects that used to be difficult to retrieve up until now.