• Title/Summary/Keyword: 컴퓨터가이드

Search Result 302, Processing Time 0.031 seconds

Trends of Semantic Web Services and Technologies : Focusing on the Business Support (비즈니스를 지원하는 시멘틱 웹서비스와 기술의 동향)

  • Kim, Jin-Sung;Kwon, Soon-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.113-130
    • /
    • 2010
  • During the decades, considerable human interventions to comprehend the web information were increased continually. The successful expansion of the web services made it more complex and required more contributions of the users. Many researchers have tried to improve the comprehension ability of computers in supporting an intelligent web service. One reasonable approach is enriching the information with machine understandable semantics. They applied ontology design, intelligent reasoning and other logical representation schemes to design an infrastructure of the semantic web. For the features, the semantic web is considered as an intelligent access to understanding, transforming, storing, retrieving, and processing the information gathered from heterogeneous, distributed web resources. The goal of this study is firstly to explore the problems that restrict the applications of web services and the basic concepts, languages, and tools of the semantic web. Then we highlight some of the researches, solutions, and projects that have attempted to combine the semantic web and business support, and find out the pros and cons of the approaches. Through the study, we were able to know that the semantic web technology is trying to offer a new and higher level of web service to the online users. The services are overcoming the limitations of traditional web technologies/services. In traditional web services, too much human interventions were needed to seek and interpret the information. The semantic web service, however, is based on machine-understandable semantics and knowledge representation. Therefore, most of information processing activities will be executed by computers. The main elements required to develop a semantic web-based business support are business logics, ontologies, ontology languages, intelligent agents, applications, and etc. In using/managing the infrastructure of the semantic web services, software developers, service consumers, and service providers are the main representatives. Some researchers integrated those technologies, languages, tools, mechanisms, and applications into a semantic web services framework. Therefore, future directions of the semantic web-based business support should be start over from the infrastructure.

A Survey on the Radiation Exposure Doses Reduction Plan through Dose Index Analysis in the Pediatric Brain Computed Tomography (소아 두부 컴퓨터단층촬영검사에서 선량지표 분석을 통한 방사선 피폭선량 감소 방안에 대한 연구)

  • Kim, Hyeon-Jin;Lee, Hyo-Yeong;Im, In-Chul;Yu, Yun-Sik
    • Journal of the Korean Society of Radiology
    • /
    • v.10 no.3
    • /
    • pp.161-169
    • /
    • 2016
  • In this study, the proposal to seek ways to reduce the amount of radiation is drawn by comparing and analyzing CT Dose Index(CTDI) on the pediatric head CT which was performed at the busan regional hospitals, to the national diagnostic reference levels. As a result, it was appeared to exceed the amount of the dose recommendation in order of hospital, general hospital and senior general hospital in the hospital-specific classification and from 2 to 5 year, from 1 month to 1 year and from 6 to 10 year in the age-specific classification. In addition, the amount of the dose recommendation was exceed in order of helical, axial and volume in the scan-specific classification. As the results of the scan range reset to match the diagnostic reference level, the dose reduction showed 11.68%, 15.79% and 20.66% in senior general hospital, general hospital and hospital respectively. In the results of analysing patient average scan ranges which does not deviate from the guideline of patient dose recommendation, there was age of 1 month to 1 year, 2 to 5 year and 6 to 10 year of $03.2{\pm}11.8mm$, $110.5{\pm}14.5mm$, and $117.8{\pm}17.2mm$ respectively.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

A Study of IT Outsourcing Model for a Public Institution (공공기관의 IT 아웃소싱 모델 연구)

  • Oh, Yeon-Chil;Park, So-Ah;Lee, Young-Seok;Yang, Hae-Kwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1723-1730
    • /
    • 2008
  • The national IT outsourcing is actively achieved centering around the manufacturing enterprise and financial institution. The If outsourcing of the public institution is generalized. The IT development and operation management task are the field in which first an outsourcing is introduced due to a factor including the technological change, the efper increase in demand, and etc. Particularly, the core business of the public institution is the public service. Therefore, the core business of the public institution can concentrate on the core business and by drastically outsourcing the etc task ran improve an efficiency. Therefore, as to the IT outsourcing, the innovative method that can enhance the quality of the public service can become. In this paper, We analyze how the Supply Administration introducing the service level agreement (SLA: Service Level Agreement) and the problem that the Samsung SDS is faced with were solved. And the practical affairs guide-line for managing elements which can minimize trial and error and successfully implement the IT outsourcing is presented.

Enabling Environment for Participation in Information Storage Media Export and Digital Evidence Search Process using IPA (정보저장매체 반출 및 디지털 증거탐색 과정에서의 참여권 보장 환경에 대한 중요도-이행도 분석)

  • Yang, Sang Hee;Lee, Choong C.;Yun, Haejung
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • Recently, the use of digital media such as computers and smart devices has been rapidly increasing, The vast and diverse information contained in the warrant of the investigating agency also includes the one irrelevant to the crime. Therefore, when confiscating the information, the basic rights, defense rights and privacy invasion of the person to be seized have been the center of criticism. Although the investigation agency guarantees the right to participate, it does not have specific guidelines, so they are various by the contexts and environments. In this process, the abuse of the participation right is detrimental to the speed and integrity of the investigation, and there is a side effect that the digital evidence might be destroyed by remote initialization. In this study, we conducted surveys of digital evidence analysts across the country based on four domains and thirty measurement items for enabling environment for participation in information storage media export and digital evidence search process. The difference between the level of importance and the performance was analyzed by the IPA matrix based on process, location, people, and technology dimensions. Seven items belonging to "concentrate here" area are one process-related, three location-related, and three people-related items. This study is meaningful to be a basis for establishing the proper policies and strategies for ensuring participation right, as well as for minimizing the side effects.

Study on Three-Dimensional Analysis of Agricultural Plants and Drone-Spray Pesticide (농작물을 위한 드론 분무 농약 살포의 3차원 분석에 관한 연구)

  • Moon, In Sik;Kown, Hyun Jin;Kim, Mi Hyeon;Chang, Se Myong;Ra, In Ho;Kim, Heung Tae
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.176-186
    • /
    • 2020
  • The size and shape of crops are diverse, and the growing environment is also different. Therefore, when one uses a drone to spray pesticides, the characteristics of each crop must be considered, and flight conditions such as the flight height and forwarding velocity of the drone should be changed. The droplet flow of pesticides is affected by various flight conditions, and a large change occurs in the sprayed area. As a result, an uneven distribution of liquid may be formed at the wake, and the transport efficiency will be decreased as well as there would be a risk of toxic scatter. Therefore, this paper analyzes the degree of distribution of pesticides to the crops through numerical analysis when pesticide is sprayed onto the selected three crops with different characteristics by using agricultural drones with different flight conditions. On the purpose of establishing a guideline for spraying pesticides using a drone in accordance with the characteristics of crops, this paper compares the amount of pesticides distributed in the crops at the wake of nozzle flow using the figure of merit, and the sum of transported liquid rate divided by the root mean square of the probability density function.

Prosthetic rehabilitation with digital implant planning for a minimally invasive surgery approach (디지털 임플란트 플래닝을 통한 최소침습 보철수복 증례)

  • Jeong, Areum;Lee, Younghoo;Hong, Seoung-Jin;Paek, Janghyun;Noh, Kwantae;Pae, Ahran;Kim, Hyeong-Seob;Kwon, Kung-Rock
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.3
    • /
    • pp.283-292
    • /
    • 2022
  • For fixed prosthetic treatment using implants, implants must be placed in a suitable location for prosthetic treatment. During surgery, minimally invasive prosthetic restoration is possible using a flapless method using a surgical guide. The patient in this case was an 86-year-old male patient who wanted treatment due to discomfort when using conventional dentures. Due to systemic disease, the patient had difficulty using removable local dentures, so full dentures for the maxilla and fixed implants for the mandible were restored. Because there is a high risk of bleeding due to systemic disease, the implant was placed in a flapless method using a surgical guide. Finally, prostheses were fabricated with maxillary full denture and mandibular screw-retained zirconia, and this report shows satisfactory esthetic and functional recovery.

Exploring the Job Competencies of Data Scientists Using Online Job Posting (온라인 채용정보를 이용한 데이터 과학자 요구 역량 탐색)

  • Jin, Xiangdan;Baek, Seung Ik
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.1-20
    • /
    • 2022
  • As the global business environment is rapidly changing due to the 4th industrial revolution, new jobs that did not exist before are emerging. Among them, the job that companies are most interested in is 'Data Scientist'. As information and communication technologies take up most of our lives, data on not only online activities but also offline activities are stored in computers every hour to generate big data. Companies put a lot of effort into discovering new opportunities from such big data. The new job that emerged along with the efforts of these companies is data scientist. The demand for data scientist, a promising job that leads the big data era, is constantly increasing, but its supply is not still enough. Although data analysis technologies and tools that anyone can easily use are introduced, companies still have great difficulty in finding proper experts. One of the main reasons that makes the data scientist's shortage problem serious is the lack of understanding of the data scientist's job. Therefore, in this study, we explore the job competencies of a data scientist by qualitatively analyzing the actual job posting information of the company. This study finds that data scientists need not only the technical and system skills required of software engineers and system analysts in the past, but also business-related and interpersonal skills required of business consultants and project managers. The results of this study are expected to provide basic guidelines to people who are interested in the data scientist profession and to companies that want to hire data scientists.

Treatment with upper complete denture and lower implant-fixed restorations on an elderly patient presenting fully edentulous maxilla and bilateral posterior edentulous mandible: a case report (상악 완전무치악 및 하악 양측 구치부 결손 고령환자에 대한 상악 가철성, 하악 고정성 보철치료: 증례보고)

  • Joseph Junesirk Choi;Richard Leesungbok;Suk-Won Lee;Phyo Ei Ei Htay;Jeong-yun Park;Jin-Young Chon
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.61 no.4
    • /
    • pp.284-292
    • /
    • 2023
  • Stable posterior occlusal support is crucial for adequate masticatory function and facial aesthetics. In elderly patients over the age of 65, masticatory ability has a significant impact on nutritional intake and overall health. This case report presents a prosthetic treatment of an elderly patient with edentulous maxilla and bilateral posterior edentulous mandible. The upper jaw was restored with a complete denture to establish an ideal occlusal plane, and the three-dimensional positions of the mandibular implants were determined accordingly. The implants were placed through computer-guided implant surgery and were immediately loaded with fixed provisional restorations. The implant-fixed zirconia final restorations were inserted in the lower posterior region, and the occlusal surface of posterior artificial teeth in the upper denture was substituted with cobalt-chrome alloy to resist occlusal wear. The patient's posterior occlusal support and masticatory function were promptly restored through this treatment process, and long-term stability against wear was also obtained.

The Workflow for Computational Analysis of Single-cell RNA-sequencing Data (단일 세포 RNA 시퀀싱 데이터에 대한 컴퓨터 분석의 작업과정)

  • Sung-Hun WOO;Byung Chul JUNG
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.56 no.1
    • /
    • pp.10-20
    • /
    • 2024
  • RNA-sequencing (RNA-seq) is a technique used for providing global patterns of transcriptomes in samples. However, it can only provide the average gene expression across cells and does not address the heterogeneity within the samples. The advances in single-cell RNA sequencing (scRNA-seq) technology have revolutionized our understanding of heterogeneity and the dynamics of gene expression at the single-cell level. For example, scRNA-seq allows us to identify the cell types in complex tissues, which can provide information regarding the alteration of the cell population by perturbations, such as genetic modification. Since its initial introduction, scRNA-seq has rapidly become popular, leading to the development of a huge number of bioinformatic tools. However, the analysis of the big dataset generated from scRNA-seq requires a general understanding of the preprocessing of the dataset and a variety of analytical techniques. Here, we present an overview of the workflow involved in analyzing the scRNA-seq dataset. First, we describe the preprocessing of the dataset, including quality control, normalization, and dimensionality reduction. Then, we introduce the downstream analysis provided with the most commonly used computational packages. This review aims to provide a workflow guideline for new researchers interested in this field.