• Title/Summary/Keyword: software error

Search Result 1,344, Processing Time 0.04 seconds

Effect of Sound Velocity on Bathymetric Data Aquired by EM120(multi-beam echo sounder) (EM120(multi-beam echo sounder)을 이용한 지형조사 시 적용되는 해수 중 음속 측정의 중요성; 수중음속 측정장비의 특성 비교)

  • Ham, Dong-Jin;Kim, Hyun-Sub;Lee, Gun-Chang
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.13 no.3
    • /
    • pp.295-301
    • /
    • 2008
  • Bathymetric data collected using a multi-beam echo sounder during marine scientific survey is essential for geologic and oceanographic research works. Accurate measurment of sound velocity profile(SVP) in water-column is important for bathymetric data processing. SVP can vary at different locations during the survey undertaken for wide areas. In addition, an observational error can occur when different equipments(Sound Velocity Profiler, Conductivity Temperature Depth, eXpendable BathyThermograph) are used for measuring SVP at the same water column. In this study, we used an MB-system software to show changes in bathymetry caused by variation of SVP. The analyses showed that the sound velocity(SV) changes due to the depth and thickness of thermocline had more significant effects on the resulting bathymetric data than those of surface mixed layer. The observational errors between SVP measuring instruments did not cause much differneces in the processed bathymetric data. Bathymetric survey line is better to be established to the direction that the change of temperature can be minimize to reduce the variation of SVP during the data acquisition along the survey line.

Understanding Privacy Infringement Experiences in Courier Services and its Influence on User Psychology and Protective Action From Attitude Theory Perspective (택배 서비스 이용자의 프라이버시 침해 경험이 심리와 행동에 미치는 영향에 대한 이해: 태도이론 측면)

  • Se Hun Lim;Dan J. Kim;Hyeonmi Yoo
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.99-120
    • /
    • 2023
  • Courier services users' experience of violating privacy affects psychology and behavior of protecting personal privacy. Depending on what privacy infringement experience (PIE) of courier services users, learning about perceived privacy infringement incidents is made, recognition is formed, affection is formed, and behavior is appeared. This paradigm of changing in privacy psychologies of courier services users has an important impact on predicting responses of privacy protective action (PPA). In this study, a theoretical research framework are developed to explain the privacy protective action (PPA) of courier services users by applying attitude theory. Based on this framework, the relationships among past privacy infringement experience (PIE), perceived privacy risk (PPR), privacy concerns (i.e., concerns in unlicensed secondary use (CIUSU), concerns in information error (CIE), concerns in improper access (CIA), and concern in information collection (CIC), and privacy protective action (PPA) are analyzed. In this study, the proposed research model was surveyed by people with experience in using courier services and was analyzed for finding relationships among research variables using structured an equation modeling software, SMART-PLS. The empirical results show the causal relationships among PIE, PPR, privacy concerns (CIUSU, CIE, CIA, and CIC), and PPA. The results of this study provide useful theoretical implications for privacy management research in courier services, and practical implications for the development of courier services business model.

Numerical Simulation of Salinity Intrusion into Groundwater Near Estuary Barrage with Using OpenGeoSys (OpenGeoSys를 이용한 하굿둑 인근 지하수 내 염분 침투 수치모의)

  • Hyun Jung Lee;Seung Oh Lee;Seung Jin Maeng
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.157-164
    • /
    • 2023
  • The estuary dam is a structure installed and operated in a closed state except when flood event occurs to prevent inland saltwater intrusion and secure freshwater supply. However, the closed state of dam leads to issues such as eutrophication, so it is necessary to examine the extent of saltwater intrusion resulting from the opening of sluice gates. Groundwater, due to its subsurface conditions and slow flow characteristics, is widely analyzed using numerical models. OpenGeoSys, an open-source software capable of simulating Thermal- Hydraulic- Mechanical- Chemical phenomena, was adopted for this study. Simulations were conducted assuming natural flow conditions without dam and operating considering busy farming season, mostly from March to September. Verification of the model through analytical solutions showed error of 3.7%, confirming that OpenGeoSys is capable of simulating saltwater intrusion for these cases. From results simulated for 10 years, considering for the busy farming season, resulted in about 46% reduction in saltwater intrusion length compared to natural flow conditions, approximately 74.36 m. It may be helpful to make choices to use groundwater as a water resource.

The Evaluation of Clinical Usefulness on Application of Myocardial Extract in Quantitative Perfusion SPECT (QPS 프로그램에서 Myocardial extract 적용에 따른 임상적 유용성 평가)

  • Yun, Jong-Jun;Lim, Yeong-Hyeon;Lee, Mu-Seok;Song, Hyeon-Seok;Jeong, Ji-Uk;Park, Se-Yun;Kim, Jae-Hwan;Kim, Jeong-Uk
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.15 no.2
    • /
    • pp.88-93
    • /
    • 2011
  • Purpose: As to analytical method of data, the AutoQUANT software in which it is used quantitative rating of the myocardial perfusion SPECT are reported that there is a difference. Therefore the measured value error of the mutual program is expected to be generated even if the quantitative analysis is made data of the same patient. The purpose of this study is to offer the comparative analysis of myocardial extract method in Quantitative Perfusion SPECT. Materials and methods: We analyzed the 51 patients who were examined by Tc-99m MIBI gated myocardial SPECT in nuclear medicine department of Pusan National University Hospital from June to December 2010(34 men, 17 women, mean age $66.5{\pm}9.9$). We acquired the extracted image in myocardial extract protocol. QPS program that uses the AutoQUANT software measured TID(Transient Ischemic Dilation), ESD(Extent of Stress Defect), SSS(Summed Stress Score). Then analyzed the results. Results: The correlation of appyling myocardial extract is TID(r=0.98), ESD(r=0.99), SSS(r=0.99). In the 95% confidence limit, there was no satistically significant difference(TID p=0.78, ESD p=0.31, SSS p=0.19). After blinding test with a physician for making a qualitative analysis, there was no difference. Conclusion: Quantitative indices in QPS program showed good correlation and the results showed no statistically signigicant difference. The variance between method was small. therefore, the functional parameters by each method can be used interchangeably. Also, we expect patient's satisfaction.

  • PDF

Social Network-based Hybrid Collaborative Filtering using Genetic Algorithms (유전자 알고리즘을 활용한 소셜네트워크 기반 하이브리드 협업필터링)

  • Noh, Heeryong;Choi, Seulbi;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.19-38
    • /
    • 2017
  • Collaborative filtering (CF) algorithm has been popularly used for implementing recommender systems. Until now, there have been many prior studies to improve the accuracy of CF. Among them, some recent studies adopt 'hybrid recommendation approach', which enhances the performance of conventional CF by using additional information. In this research, we propose a new hybrid recommender system which fuses CF and the results from the social network analysis on trust and distrust relationship networks among users to enhance prediction accuracy. The proposed algorithm of our study is based on memory-based CF. But, when calculating the similarity between users in CF, our proposed algorithm considers not only the correlation of the users' numeric rating patterns, but also the users' in-degree centrality values derived from trust and distrust relationship networks. In specific, it is designed to amplify the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the trust relationship network. Also, it attenuates the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the distrust relationship network. Our proposed algorithm considers four (4) types of user relationships - direct trust, indirect trust, direct distrust, and indirect distrust - in total. And, it uses four adjusting coefficients, which adjusts the level of amplification / attenuation for in-degree centrality values derived from direct / indirect trust and distrust relationship networks. To determine optimal adjusting coefficients, genetic algorithms (GA) has been adopted. Under this background, we named our proposed algorithm as SNACF-GA (Social Network Analysis - based CF using GA). To validate the performance of the SNACF-GA, we used a real-world data set which is called 'Extended Epinions dataset' provided by 'trustlet.org'. It is the data set contains user responses (rating scores and reviews) after purchasing specific items (e.g. car, movie, music, book) as well as trust / distrust relationship information indicating whom to trust or distrust between users. The experimental system was basically developed using Microsoft Visual Basic for Applications (VBA), but we also used UCINET 6 for calculating the in-degree centrality of trust / distrust relationship networks. In addition, we used Palisade Software's Evolver, which is a commercial software implements genetic algorithm. To examine the effectiveness of our proposed system more precisely, we adopted two comparison models. The first comparison model is conventional CF. It only uses users' explicit numeric ratings when calculating the similarities between users. That is, it does not consider trust / distrust relationship between users at all. The second comparison model is SNACF (Social Network Analysis - based CF). SNACF differs from the proposed algorithm SNACF-GA in that it considers only direct trust / distrust relationships. It also does not use GA optimization. The performances of the proposed algorithm and comparison models were evaluated by using average MAE (mean absolute error). Experimental result showed that the optimal adjusting coefficients for direct trust, indirect trust, direct distrust, indirect distrust were 0, 1.4287, 1.5, 0.4615 each. This implies that distrust relationships between users are more important than trust ones in recommender systems. From the perspective of recommendation accuracy, SNACF-GA (Avg. MAE = 0.111943), the proposed algorithm which reflects both direct and indirect trust / distrust relationships information, was found to greatly outperform a conventional CF (Avg. MAE = 0.112638). Also, the algorithm showed better recommendation accuracy than the SNACF (Avg. MAE = 0.112209). To confirm whether these differences are statistically significant or not, we applied paired samples t-test. The results from the paired samples t-test presented that the difference between SNACF-GA and conventional CF was statistical significant at the 1% significance level, and the difference between SNACF-GA and SNACF was statistical significant at the 5%. Our study found that the trust/distrust relationship can be important information for improving performance of recommendation algorithms. Especially, distrust relationship information was found to have a greater impact on the performance improvement of CF. This implies that we need to have more attention on distrust (negative) relationships rather than trust (positive) ones when tracking and managing social relationships between users.

Evaluate the Change of Body Shape and the Patient Alignment State During Image-Guided Volumetric Modulated Arc Therapy in Head and Neck Cancer Patients (두경부 환자의 VMAT 시 체형변화와 환자 정렬과의 상관관계 고찰)

  • Seo, Se Jeong;Kim, Tae Woo;Choi, Min Ho;Son, Jong Gi
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.29 no.2
    • /
    • pp.109-117
    • /
    • 2017
  • Objectives: The purpose of this study was to evaluate the change of body shape and the patient alignment state during image-guided volumetric modulated arc therapy in head and neck cancer patients, Materials and Methods: We performed a image-guided volumetric modulated arc therapy plan for 89 patients with head and neck cancer who underwent curative radiotherapy. Ten of them were evaluated for set up error. The landmarks of the ramus, chin, posterior neck, and clavicle were specified using ARIA software (Offline review), and the positional difference was analyzed. Results: The re-CT simulation therapy was performed in 60 men with $17{\pm}4$ cycles of treatment. The weight loss rate was $-6.47{\pm}3.5%$. 29 women performed re-CT simulation at $17{\pm}5$ cycles As a result, weight loss rate was $-5.73{\pm}2.7%$. The distance from skin to C1, C3, and C5 was measured, and both clavicle levels were observed to measure the skin shrinkage changes. The skin shrinkage standard deviations were C1 (${\pm}0.44cm$), C3 (${\pm}0.83cm$), and C5 (${\pm}1.35cm$), which is about 1 mm shrinkage per 0.5 kg reduction. Skin shrinkage according to the number of treatments was 1 ~ 4 fractions (no change), 5 ~ 13 fractions (-2 mm), 14 ~ 22 fractions (-4 mm) and 23 ~ 30 fractions (-6 mm). Conclusion: When the body shape changes about 5 mm, the central dose starts to differ about 3 % or more. Therefore, the CT simulation treatment for the adaptive therapy should be additionally performed. In addition, it is necessary to actively study the CT simulation therapy method and set up method of the lower neck and to examine the use of a new immobilization device.

  • PDF

Evaluation of Uncertainty of IMRT QA Using 2Dimensional Array Detector for Head & Neck Patients (두경부암에서 2차원 배열 검출기를 이용한 IMRT QA의 불확실성에 대한 연구)

  • Ban, Tae-Joon;Lee, Woo-Suk;Kim, Dae-Sup;Baek, Geum-Mun;Kwak, Jung-Won
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.23 no.2
    • /
    • pp.97-102
    • /
    • 2011
  • Purpose: IMRT QA using 2Dimensional array detector is carried out with condition for discrete dose distribution clinically. And it can affect uncertainty of evaluation using gamma method. We analyze gamma index variation according to grid size and suggest validate range of grid size for IMRT QA in Hospital. Materials and Methods: We performed QA using OniPro I'mRT system software version 1.7b on 10 patients (head and neck) for IMRT. The reference dose plane (grid size, 0.1 cm; location, [0, 0, 0]) from RTP was compared with the dose plane that has different grid size (0.1 cm, 0.5 cm, 1.0 cm, 2.0 cm, 4.0 cm) and different location (along Y-axis 0 cm, 0.2 cm, 0.5 cm, 1.0 cm). The gamma index variation was evaluated by observing the level of changes in Gamma pass rate, Average signal, Standard deviation for each case. Results: The average signal for each grid size showed difference levels of 0%, -0.19%, -0.04%, -0.46%, -8.32% and the standard deviation for each grid size showed difference levels of 0%, -0.30%, 1.24%, -0.70%, -7.99%. The gamma pass rate for each grid size showed difference levels of 0%, 0.27%, -1.43%, 5.32%, 5.60%. The gamma evaluation results according to distance in grid size range of 0.1 cm to 1.0 cm showed good agreement with reference condition (grid size 0.1 cm) within 1.5% and over 5% in case of the grid size was greater than 2.0 cm. Conclusion: We recognize that the grid size of gamma evaluation can make errors of IMRT QA. So we have to consider uncertainty of gamma evaluation according to the grid size and apply smaller than 2 cm grid size to reduce error and increase accuracy clinically.

  • PDF

Analysis on the Positional Accuracy of the Non-orthogonal Two-pair kV Imaging Systems for Real-time Tumor Tracking Using XCAT (XCAT를 이용한 실시간 종양 위치 추적을 위한 비직교 스테레오 엑스선 영상시스템에서의 위치 추정 정확도 분석에 관한 연구)

  • Jeong, Hanseong;Kim, Youngju;Oh, Ohsung;Lee, Seho;Jeon, Hosang;Lee, Seung Wook
    • Progress in Medical Physics
    • /
    • v.26 no.3
    • /
    • pp.143-152
    • /
    • 2015
  • In this study, we aim to design the architecture of the kV imaging system for tumor tracking in the dual-head gantry system and analyze its accuracy by simulations. We established mathematical formulas and algorithms to track the tumor position with the two-pair kV imaging systems when they are in the non-orthogonal positions. The algorithms have been designed in the homogeneous coordinate framework and the position of the source and the detector coordinates are used to estimate the tumor position. 4D XCAT (4D extended cardiac-torso) software was used in the simulation to identify the influence of the angle between the two-pair kV imaging systems and the resolution of the detectors to the accuracy in the position estimation. A metal marker fiducial has been inserted in a numerical human phantom of XCAT and the kV projections were acquired at various angles and resolutions using CT projection software of the XCAT. As a result, a positional accuracy of less than about 1mm was achieved when the resolution of the detector is higher than 1.5 mm/pixel and the angle between the kV imaging systems is approximately between $90^{\circ}$ and $50^{\circ}$. When the resolution is lower than 1.5 mm/pixel, the positional errors were higher than 1mm and the error fluctuation by the angles was greater. The resolution of the detector was critical in the positional accuracy for the tumor tracking and determines the range for the acceptable angle range between the kV imaging systems. Also, we found that the positional accuracy analysis method using XCAT developed in this study is highly useful and will be a invaluable tool for further refined design of the kV imaging systems for tumor tracking systems.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Beam Shaping by Independent Jaw Closure in Steveotactic Radiotherapy (정위방사선치료 시 독립턱 부분폐쇄를 이용하는 선량분포개선 방법)

  • Ahn Yong Chan;Cho Byung Chul;Choi Dong Rock;Kim Dae Yong;Huh Seung Jae;Oh Do Hoon;Bae Hoonsik;Yeo In Hwan;Ko Young Eun
    • Radiation Oncology Journal
    • /
    • v.18 no.2
    • /
    • pp.150-156
    • /
    • 2000
  • Purpose : Stereotactic radiation therapy (SRT) can deliver highly focused radiation to a small and spherical target lesion with very high degree of mechanical accuracy. For non-spherical and large lesions, however, inclusion of the neighboring normal structures within the high dose radiation volume is inevitable in SRT This is to report the beam shaping using the partial closure of the independent jaw in SRT and the verification of dose calculation and the dose display using a home-made soft ware. Materials and Methods : Authors adopted the idea to partially close one or more independent collimator jaw(5) in addition to the circular collimator cones to shield the neighboring normal structures while keeping the target lesion within the radiation beam field at all angles along the arc trajectory. The output factors (OF's) and the tissue-maximum ratios (TMR's) were measured using the micro ion chamber in the water phantom dosimetry system, and were compared with the theoretical calculations. A film dosimetry procedure was peformed to obtain the depth dose profiles at 5 cm, and they were also compared with the theoretical calculations, where the radiation dose would depend on the actual area of irradiation. Authors incorporated this algorithm into the home-made SRT software for the isodose calculation and display, and was tried on an example case with single brain metastasis. The dose-volume histograms (DVH's) of the planning target volume (PTV) and the normal brain derived by the control plan were reciprocally compared with those derived by the plan using the same arc arrangement plus the independent collimator jaw closure. Results : When using 5.0 cm diameter collimator, the measurements of the OF's and the TMR's with one independent jaw set at 30 mm (unblocked), 15.5 mm, 8.6 mm, and 0 mm from th central beam axis showed good correlation to the theoretical calculation within 0.5% and 0.3% error range. The dose profiles at 5 cm depth obtained by the film dosimetry also showed very good correlation to the theoretical calculations. The isodose profiles obtained on the home-made software demonstrated a slightly more conformal dose distribution around the target lesion by using the independent jaw closure, where the DVH's of the PTV were almost equivalent on the two plans, while the DVH's for the normal brain showed that less volume of the normal brain receiving high radiation dose by using this modification than the control plan employing the circular collimator cone only. Conclusions : With the beam shaping modification using the independent jaw closure, authors have realized wider clinical application of SRT with more conformal dose planning. Authors believe that SRT, with beam shaping ideas and efforts, should no longer be limited to the small spherical lesions, but be more widely applied to rather irregularly shaped tumors in the intracranial and the head and neck regions.

  • PDF