• Title/Summary/Keyword: 개인 속성

Search Result 1,572, Processing Time 0.024 seconds

Computer Aided Diagnosis Applications for the Differential Diagnosis of Infarction: Apply on Brain CT Image (뇌경색 감별진단을 위한 컴퓨터보조진단 응용: Brain CT Images 적용)

  • Park, Hyong-Hu;Cho, Mun-Joo;Im, In-Chul;Lee, Jin-Soo
    • Journal of the Korean Society of Radiology
    • /
    • v.10 no.8
    • /
    • pp.645-652
    • /
    • 2016
  • In this study, based on the analysis of texture feature values of statistical properties. And we examined the normal and the applicability of the computer-aided diagnosis of cerebral infarction in the brain computed tomography images. The experiment was analyzed to evaluate the ROC curve recognition rate of disease using six parameters representing the feature values of the texture. As a result, it showed average mean 88%, variance 92%, relative smoothness 94%, uniformity of 88%, a high disease recognition rate of entropy 84%. However, it showed a slightly lower disease recognition rate and 58% for skewness. In the analysis using ROC curve, the area under the curve for each parameter indicates 0.886 (p = 0.0001) or more, resulted in a meaningful recognition of the disease. Further, to determine the cut-off values for each parameter are determined to be the prediction of disease through the computer-aided diagnosis.

On Providing Anonymity in Ad Hoc Networks (Ad Hoc Network에서 익명성 제공에 관한 연구)

  • Kang, Seung-Seok
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.93-103
    • /
    • 2007
  • Networking environments are exposed to outside attacks and privacy threats. Due to broadcast nature of radio transmissions, wireless devices experience more vulnerable situations than those of wired network devices. This paper assumes that a wireless device has two network interfaces, one for accessing internet using 3G services, and the other for constructing an ad hoc network. To deal with privacy threats, this paper introduces an approach in which wireless devices form a special ad hoc network in order to exchange data using anonymous communications. One or more intermediate peers should be involved in the construction of an anonymous path. The proposed anonymous communication mechanism discourages traffic analysis and improves user privacy. According to simulation results, the anonymous connection in an ad hoc network prefers the intermediate peer(s) which is located near the source and/or the destination peer, rather than randomly-selected peers.

  • PDF

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Matching Method of Digital Map and POI for Geospatial Web Platform (공간정보 플랫폼 구축을 위한 전자지도와 POI 정보의 매칭 방법)

  • Kim, Jung-Ok;Huh, Yong;Lee, Won-Hee;Yu, Ki-Yun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.4
    • /
    • pp.23-29
    • /
    • 2009
  • Recent growth of the geospatial information on the Web has made it possible to easily access a wide variety of geospatial information. An integration of different geospatial objects consists of the following three steps; extracting geospatial objects from the maps, converting the coordinate system and discovering pairs of objects that represent the same real-world entity in the two maps. This paper deals mainly with the third step to correspond conjugate objects and four matching types and criteria is presented. The techniques designed and developed can be utilized to efficiently integrate distributed heterogeneous spatial databases such as the digital maps and POIs from other data sources. To achieve the goal, we presented four types and criteria for the matching schema. The main contributions of this paper are as follows. A complete process of integrating data from maps on the Web is presented. Then, we show how attributes of the objects can be used in the integration process.

  • PDF

Absorption Capacity of Heavy Metals and Harmful Elements of Waste Leachate Using by Fast Growing Trees (속성수를 이용한 쓰레기 매립지 침출수의 중금속 및 유해성분의 흡수, 제거 가능성)

  • 이동섭;우수영;김동근;김판기;권오규;배관호;이은주
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.3 no.2
    • /
    • pp.81-87
    • /
    • 2001
  • Populus euramericana and Betula platyphylla var. japonica have been identified as possible species for use for phytoremediation of landfills. To identify the capacity of waste leachate absorption in Populus euramericana and Betula platyphylla var, japonica, four different treatments were applied to these seedlings: leachate solution (100% leachate), 50% dilution (50% leachate: 50% water, v/v) and 25% dilution (25% leachate: 75% water, v/v) were applied to these two species. After the experiment, concentrations of heavy metals in tree biomass were analyzed by Inductively Coupled Plasma emission spectrometer (ICP). These two species can take up the hazardous parts of the leachate such as heavy metals. Especially, these species showed good absorption capacity of Al, Cr, and Fe elements. The result of this study suggested that these two species can take up the toxic materials through their roots and transport them to stems or leaves.

  • PDF

Determination of the Impact Fee Zone by the Parcel Based Information of Development Permit (개발행위허가 지적정보에 의한 기반시설부담구역 선별방안)

  • Choei, Nae-Young
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.3
    • /
    • pp.89-95
    • /
    • 2009
  • One of the criteria provided by the law to designate the Impact Fee Zone requires that the increase rate of the development permit should exceed that of the entire locality by more than twenty percent. Since the permits are issued to scattered parcels on the individual basis, however, it renders significant difficulties in accurately figuring out the finite local areas that exceed such legal criteria. This study, in this context, tries to join the development permit time-series data with the Korea Land Information System (KLIS) so that, with the aid of the landform layer and existing infrastructure layer, it could pinpoint the local area where the development activities are concentrating. Taking a sector in Yangpyong County as the case, the study practically demonstrates as to how the designation process is geospatially processed.

  • PDF

A Study on Management Method of Point and Line Data Using Mobile GIS (모바일 GIS를 이용한 Point 및 Line형 데이터 갱신 방법에 관한 연구)

  • Jeon, Jae-Yong;Cho, Gi-Sung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.15 no.3
    • /
    • pp.3-10
    • /
    • 2007
  • As information communication technology matures, GIS is being evolved from wire communication GIS to mobile GIS. This is due that mobile GIS satisfy mobility, field work, speed and time. Also, this is proper that mobile GIS accomplish investigation, confirmation, input and modification operations of spatial and attribute data at field. I think mobile GIS's use is the best way. Because, Mobile GIS's use can accomplish effectively the management of various kinds facilities in city. On this study, we consider diversified methods a person in charge can management point and line data with more easy and more effective method. The management methods of pint type data are free method, offset method two point method. The management methods of line type data are free method, point connection method, point and line connection method and the minimum distance connection method between point and line.

  • PDF

A Study on Face Recognition Based on Modified Otsu's Binarization and Hu Moment (변형 Otsu 이진화와 Hu 모멘트에 기반한 얼굴 인식에 관한 연구)

  • 이형지;정재호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1140-1151
    • /
    • 2003
  • This paper proposes a face recognition method based on modified Otsu's binarization and Hu moment. Proposed method is robust to brightness, contrast, scale, rotation, and translation changes. As the proposed modified Otsu's binarization computes other thresholds from conventional Otsu's binarization, namely we create two binary images, we can extract higher dimensional feature vector. Here the feature vector has properties of robustness to brightness and contrast changes because the proposed method is based on Otsu's binarization. And our face recognition system is robust to scale, rotation, and translation changes because of using Hu moment. In the perspective of brightness, contrast, scale, rotation, and translation changes, experimental results with Olivetti Research Laboratory (ORL) database and the AR database showed that average recognition rates of conventional well-known principal component analysis (PCA) are 93.2% and 81.4%, respectively. Meanwhile, the proposed method for the same databases has superior performance of the average recognition rates of 93.2% and 81.4%, respectively.

A Purchase Pattern Analysis Using Bayesian Network and Neural Network (베이지안 네트워크와 신경망을 이용한 구매패턴 분석)

  • Hwang Jeong-Sik;Pi Su-Young;Son Chang-Sik;Chung Hwan-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.306-311
    • /
    • 2005
  • To analyze the consumer's purchase pattern, we must consider a factor which is a cultural, social, individual, psychological and so on. If we consider the internal state by the consumer's purchase, Both the consumer's purchase action and the purchase factor can be predicted, so the corporation can use effectively in suitable goods development in a consumer's preference. These factors need a technology that treat uncertain information, because it is difficult to analyze by directly information processing. Therefore, bayesian network manages elements those the observation of inner state such as consumer's purchase is difficult. In addition, it is interpretable about data that the observation is impossible. In this paper, we examine the seller's know-how and the way of consumer's purchase to analyze consumer's purchase action pattern through goods purchase. Also, we compose the bayesian network based on the examined data, and propose the method that predicts purchase patterns. Finally, we remove the data including unnecessary attribute using the bayesian network, and analyze the consumer's Purchase pattern using Kohonen's SOM method.

The Analyses of Customer Satisfaction Index on University Library Service (대학도서관서비스에 대한 고객만족도 분석)

  • 백항기
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.12 no.1
    • /
    • pp.43-64
    • /
    • 2001
  • The purpose of this study was to measure performance of university libraries, especially investigating the components of service quality and their relationship to the customer satisfaction. The result of the statistical analyses is summarized as follows: The result of 5 point scale study shows the following degree of satisfaction in 55 components: timeliness of circulation, processing of fine. location of library, usefulness of retrieval system, library user education, speed of retrieval. number of terminals, and cleaning. On the other hand, shows the following degree of dissatisfaction in 55 components: speed of civil petitions, hour for program use, result of civil petitions, fixing of library user education, speed of retrieval, method of public relation, waiting time for Internet use, and use of the other library materials. Also. customers’matters of weight and importance was availability. learning facilities, suitable collections, circulation, and system of retrieval.

  • PDF