• Title/Summary/Keyword: 컴퓨터 모의

Search Result 3,380, Processing Time 0.035 seconds

Descending Necrotizing Mediastinitis : The Retrospective Review of Surgical Management (하행 괴사성 종격동염 : 외과적 치료의 후향적 조사)

  • 이재진;신호승;신윤철;지현근;이원진;홍기우
    • Journal of Chest Surgery
    • /
    • v.34 no.10
    • /
    • pp.769-774
    • /
    • 2001
  • Background: Descending necrotizing mediastinitis(DNM) is a serious complication originating in odontogenic or oropharyngeal infection with previously reported mortality rates of 25% to 40%. We retrospectively reviewed the 4 years of our surgical drainage and debridement in DNM. Material and Method: We studied 7 cases diagnosed as DNM from 1997 through 2000. Primary oropharyngeal infection lead to DNM in four cases(57%) and odontogenic abscess in three cases(43%). All patients were received emergent cervicotomy and thoracotomy or sternotomy for debridement of necrotic tissue and mediastinal or pleural drainage. Result: Five cases were evolved well and were discharged after a mean of 42 days. Two patients(28.6%) died. Three patients required reoperation due to local surgical complication; empyema(two) and impending cardiac tamponade. One of these patients died on 12 post-reoperative day due to great vessel erosion, renal and respiratory insufficiency. The other patient died of broncho- esophageal fistula and asphyxia on 10 postoperative day without reoperation. Conclusion: On the basis of experience accrued in treating these patients, early diagnosis by cervicothoracic computed tomographic scan of neck and thorax aids in rapid indication of a surgical approach of DNM. We emphasize that performing early surgical drainage and debridement of necrotic tissues with intensive postoperative care can significantly reduce the mortality rate.

  • PDF

Comparison of the Dose of the Normal Tissues among Various Conventional Techniques for Whole Brain Radiotherapy (여러 통상적인 전뇌방사선치료 기법에서의 정상조직의 조사선량 비교)

  • Kang, Min-Kyu
    • Radiation Oncology Journal
    • /
    • v.28 no.2
    • /
    • pp.99-105
    • /
    • 2010
  • Purpose: To compare radiation dose of the brain and lens among various conventional whole brain radiotherapy (WBRT) techniques. Materials and Methods: Treatment plans for WBRT were generated with planning computed tomography scans of 11 patients. A traditional plan with an isocenter located at the field center and a parallel anterior margin at the lateral bony canthus was generated (P1). Blocks were automatically generated with a 1 cm margin on the brain (5 mm for the lens). Subsequently, the isocenter was moved to the lateral bony canthus (P2), and the blocks were replaced into the multileaf collimator (MLC) with a 5 mm leaf width in the craniocaudal direction (P3). For each patient plan, 30 Gy was prescribed at the isocenter of P1. Dose volume histogram (DVH) parameters of the brain and lens were compared by way of a paired t-test. Results: Mean values of $D_{max}$ and $V_{105}$ of the brain in P1 were 111.9% and 23.6%, respectively. In P2 and P3, $D_{max}$ and $V_{105}$ of the brain were significantly reduced to 107.2% and 4.5~4.6%, respectively (p<0.001). The mean value of $D_{mean}$ of the lens was 3.1 Gy in P1 and 2.4~2.9 Gy in P2 and P3 (p<0.001). Conclusion: WBRT treatment plans with an isocenter located at the lateral bony canthus have dosimetric advantages for both the brain and lens without any complex method changes.

Rough Computational Annotation and Hierarchical Conserved Area Viewing Tool for Genomes Using Multiple Relation Graph. (다중 관계 그래프를 이용한 유전체 보존영역의 계층적 시각화와 개략적 전사 annotation 도구)

  • Lee, Do-Hoon
    • Journal of Life Science
    • /
    • v.18 no.4
    • /
    • pp.565-571
    • /
    • 2008
  • Due to rapid development of bioinformatics technologies, various biological data have been produced in silico. So now days complicated and large scale biodata are used to accomplish requirement of researcher. Developing visualization and annotation tool using them is still hot issues although those have been studied for a decade. However, diversity and various requirements of users make us hard to develop general purpose tool. In this paper, I propose a novel system, Genome Viewer and Annotation tool (GenoVA), to annotate and visualize among genomes using known information and multiple relation graph. There are several multiple alignment tools but they lose conserved area for complexity of its constrains. The GenoVA extracts all associated information between all pair genomes by extending pairwise alignment. High frequency conserved area and high BLAST score make a block node of relation graph. To represent multiple relation graph, the system connects among associated block nodes. Also the system shows the known information, COG, gene and hierarchical path of block node. In this case, the system can annotates missed area and unknown gene by navigating the special block node's clustering. I experimented ten bacteria genomes for extracting the feature to visualize and annotate among them. GenoVA also supports simple and rough computational annotation of new genome.

Stochastic Timed Net and Its Minimum Cycle Time Analysis (확률적 시간 넷과 최소 순회 시간 분석)

  • Yim Jae-Geol;Shim Kyu-Bark
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.671-680
    • /
    • 2006
  • As a mathematical technique with which we can find the minimum duration time needed to fire all the transitions at least once and coming back to the initial marking in a timed net, the minimum cycle time method has been widely used in computer system analysis. A timed net is a modified version of a Petri net where a transition is associated with a delay time. A delay time used in a timed net is a constant even though the duration time associated with an event in the world is a stochastic number in general. In the consequence, the result of minimum cycle time analysis is not realistic. Therefore, we propose ‘Stochastic Timed Net' where a transition can be associated with a stochastic number and introduce a minimum cycle time analysis method for ‘Stochastic Timed Net’ As an example of the application of ‘Stochastic Timed Net’, we introduce a ‘Stochastic Timed Net' model of a Location Based Service Providing Multimedia System and the result of minimum cycle time analysis of it. Whereas the typical form of the result of the existing minimum cycle time analysis is 'It takes at least 10 time units', the typical form of the result of minimum cycle time analysis of a ‘Stochastic Timed Net' is in the probability form such as "The probability of the events in which it finishes its job within 10 time units is 85%."

  • PDF

Energy-efficient Set-associative Cache Using Bi-mode Way-selector (에너지 효율이 높은 이중웨이선택형 연관사상캐시)

  • Lee, Sungjae;Kang, Jinku;Lee, Juho;Youn, Jiyong;Lee, Inhwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.1
    • /
    • pp.1-10
    • /
    • 2012
  • The way-lookup cache and the way-tracking cache are considered to be the most energy-efficient when used for level 1 and level 2 caches, respectively. This paper proposes an energy-efficient set-associative cache using the bi-mode way-selector that combines the way selecting techniques of the way-tracking cache and the way-lookup cache. The simulation results using an Alpha 21264-based system show that the bi-mode way-selecting L1 instruction cache consumes 27.57% of the energy consumed by the conventional set-associative cache and that it is as energy-efficient as the way-lookup cache when used for L1 instruction cache. The bi-mode way-selecting L1 data cache consumes 28.42% of the energy consumed by the conventional set-associative cache, which means that it is more energy-efficient than the way-lookup cache by 15.54% when used for L1 data cache. The bi-mode way-selecting L2 cache consumes 15.41% of the energy consumed by the conventional set-associative cache, which means that it is more energy-efficient than the way-tracking cache by 16.16% when used for unified L2 cache. These results show that the proposed cache can provide the best level of energy-efficiency regardless of the cache level.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

The Identified Self: Location-Based Technologies, Surveillance, and Non-place (식별되는 자: 위치기반기술, 원격성과 감시의 문제, 그리고 비-장소(non-place))

  • Yi, Doogab
    • Journal of Science and Technology Studies
    • /
    • v.16 no.2
    • /
    • pp.1-31
    • /
    • 2016
  • This essay examines the recent proliferation of location-based services (LBS) within the context the expansion of the technologies of remote identification, monitoring, and tracking. Following the spatial turn in the social sciences, this essay aims to analyze LBS as a surveillance technology that can re-shape the spatial configuration of its users and their identity. The analytic focus of this essay is on LBS within the global information infrastructure, and it utilizes key LBS examples in the US and South Korea. First, as a way to discuss the technical possibilities of LBS for spatial coordination and surveillance, this essay investigates its technical architecture in terms of information flow. It then discusses the issue of privacy in LBS by analyzing some of its key legal and regulatory issues. The combination of the global information infrastructure with location-related technologies has enabled LBS companies to expand the scope of surveillance over the ever-increasing computer-mediated activities, prompting heated discussions over whether LBS is capturing "Every Moment in Your Life." This essay concludes with a discussion on how location technologies have provided a key platform for the rise of surveillance capitalism through the creation of what Marc $Aug{\acute{e}}$ called a "non-place," a place where the identified self is constituted by LBS.

Container Image Recognition using Fuzzy-based Noise Removal Method and ART2-based Self-Organizing Supervised Learning Algorithm (퍼지 기반 잡음 제거 방법과 ART2 기반 자가 생성 지도 학습 알고리즘을 이용한 컨테이너 인식 시스템)

  • Kim, Kwang-Baek;Heo, Gyeong-Yong;Woo, Young-Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1380-1386
    • /
    • 2007
  • This paper proposed an automatic recognition system of shipping container identifiers using fuzzy-based noise removal method and ART2-based self-organizing supervised learning algorithm. Generally, identifiers of a shipping container have a feature that the color of characters is blacker white. Considering such a feature, in a container image, all areas excepting areas with black or white colors are regarded as noises, and areas of identifiers and noises are discriminated by using a fuzzy-based noise detection method. Areas of identifiers are extracted by applying the edge detection by Sobel masking operation and the vertical and horizontal block extraction in turn to the noise-removed image. Extracted areas are binarized by using the iteration binarization algorithm, and individual identifiers are extracted by applying 8-directional contour tacking method. This paper proposed an ART2-based self-organizing supervised learning algorithm for the identifier recognition, which improves the performance of learning by applying generalized delta learning and Delta-bar-Delta algorithm. Experiments using real images of shipping containers showed that the proposed identifier extraction method and the ART2-based self-organizing supervised learning algorithm are more improved compared with the methods previously proposed.

Speckle Noise Removal by Rank-ordered Differences Diffusion Filter (순위 차 확산 필터를 이용한 스페클 잡음 제거)

  • Ye, Chul-Soo
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.1
    • /
    • pp.21-30
    • /
    • 2009
  • The purposes of this paper are to present a selection method of neighboring pixels whose local statistics are similar to the center pixel and combine the selection result with mean curvature diffusion filter to reduce noises in remote sensed imagery. The order of selection of neighboring pixels is critical, especially for finding a pixel belonging to the homogeneous region, since the statistics of the homogeneous region vary according to the selection order. An effective strategy for selecting neighboring pixels, which uses rank-order differences vector obtained by computing the intensity differences between the center pixel and neighboring pixels and arranging them in ascending order, is proposed in this paper. By using region growing method, we divide the elements of the rank-ordered differences vector into two groups, homogeneous rank-ordered differences vector and outlier rank-ordered differences vector. The mean curvature diffusion filter is combined with a line process, which chooses selectively diffusion coefficient of the neighboring pixels belonging into homogeneous rank-ordered differences vector. Experimental results using an aerial image and a TerraSAR-X satellite image showed that the proposed method reduced more efficiently noises than some conventional adaptive filters using all neighboring pixels in updating the center pixel.

Analysis of the Effect of Sincere Learning Attitudes on Academic Achievement in On-line Education (온라인 교육에서 성실한 학습 태도가 학업 성취도에 미치는 영향 분석)

  • Lee, Eunjoo;Jeong, Youngsik
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.5
    • /
    • pp.481-489
    • /
    • 2019
  • In order to explore the learning attitude of the learners and the effects of conscious learning attitudes on academic achievement in On-line education system of open high school, we analyze the log data of 2,965 first graders who studied English, Math, Integrated Society and Integrated Science during the first semester of 2018. This study examines the learning status according to the learner's background variables, and analyzes the number of lessons per hour, learning progress rate, learning period, learning start month, and formative evaluation results for each class. In addition, to verify the effects of conscious learning attitude on academic achievement, skewness and kurtosis are calculated by using learning frequency values for each class. As a result, in almost all fields, the average number of lessons per class, study duration, progress rate, and grades, women are higher than men. In addition, the older ones are, the higher they are and the Seoul area is higher than the other area. The average learning period is 2~3 months, and the longer the learning period, the higher the formative evaluation score. Lastly, even though the number of learning is lower than that of learners who concentrate on a certain period of time, the formation scores of learners who learn consciously are higher.