• 제목/요약/키워드: DISPLAY

검색결과 16,156건 처리시간 0.044초

텍스트 마이닝을 활용한 OTT 서비스 플랫폼별 사용자 반응 비교 연구 (Comparative Study of User Reactions in OTT Service Platforms Using Text Mining)

  • 권순찬;김지은;장백철
    • 인터넷정보학회논문지
    • /
    • 제25권3호
    • /
    • pp.43-54
    • /
    • 2024
  • 본 연구는 텍스트 마이닝 기법을 활용하여 다양한 OTT(Over-The-Top) 서비스 플랫폼에 대한 사용자 반응을 비교한다. 연구의 주요 목표는 OTT 서비스 플랫폼의 사용자 만족도를 파악하여 보다 효과적인 리뷰 전략을 수립하는 데 기여하는 것이다. 본 연구에서 다루는 주요 질문에는 다양한 OTT 서비스에 대한 사용자 리뷰에서 두드러진 토픽과 키워드를 식별하고 플랫폼별 사용자 반응을 이해하는 것이 포함된다. 이를 위해 긍정, 부정 리뷰에서 중요 단어를 추출하기 위해 Tf-idf를, 복잡한 사용자 리뷰를 보다 정교하고 포괄적으로 분석하기 위해 고급 토픽 모델링 기법인 BERTopic을 사용한다. Tf-idf 분석한 결과, 앱에 대한 긍정 리뷰는 콘텐츠와 관련된 단어들의 수치가 높았으며 부정 리뷰에서는 앱 사용 과정에서 발생할 수 있는 문제점에 관한 단어 수치가 높게 기록되었다. BERTopic을 활용한 토픽 모델링에서는 콘텐츠의 속성과 연관 지어 콘텐츠의 다양성, 앱 성능 요소, 결제, 호환성에 관한 키워드를 도출하였으며, 플랫폼 별로 두각을 보이는 속성이 다르다는 점도 확인하였다. 본 연구 결과는 사용자 행동과 선호도에 대한 중요한 인사이트를 제공하며, 이를 통해 OTT 서비스 제공업체는 사용자 경험과 만족도를 개선하는 데 활용할 수 있다. 또한, 연구자들은 사용자 리뷰 텍스트 분석에서 딥러닝 모델을 활용한 연구의 아이디어를 얻을 수 있을 것이라 기대한다.

조건부가치측정법(CVM)을 활용한 지능형 CCTV 플랫폼의 편익 추정 연구 (A Study on Valuation of Intelligent CCTV Platforms Using Contingent Valuation Method (CVM))

  • 김태균;심동녘
    • 산업융합연구
    • /
    • 제22권7호
    • /
    • pp.1-13
    • /
    • 2024
  • 전자정부 서비스 중 지능형 CCTV 관제 플랫폼은 인공지능을 활용하여 사람, 자동차 등 주요 객체가 CCTV상에 나타났을 경우, 관제요원에게 표출해 주는 선별 관제 서비스이다. 지능형 CCTV 관제 플랫폼을 운영할 경우 비상 상황 발생 시 신속한 대처가 가능하고 민원 해결 증가로 시민들의 삶의 질 제고가 가능할 것으로 기대를 모으고 있다. 이에 본 연구는 비(非)시장재화인 지능형 CCTV 관제 플랫폼의 편익을 선택실험기법인 조건부가치측정법(CVM)을 적용하여 가구당 평균 지불의사액을 추정하고, 이를 토대로 사회적 편익을 계산하였다. 분석 결과 가구의 평균 지불의사액은 연간 6,908원, 국가 전체의 경제적 편익은 연간 약 1,504억 원으로 추정되었다. 본 연구는 그간 환경·공공재의 적용되던 CVM의 적용 범위를 지능형 전자정부 서비스 분야로 확장한 점에서 학술적 의의가 있다. 나아가, 지능형 CCTV 관제 플랫폼 도입이 활발하게 논의되는 현 상황에서, 이에 대한 편익을 화폐가치로 추정하였다는 점에서 실무적 시사점을 지닌다.

Multiparametric Cardiac Magnetic Resonance Imaging Detects Altered Myocardial Tissue and Function in Heart Transplantation Recipients Monitored for Cardiac Allograft Vasculopathy

  • Muhannad A. Abbasi;Allison M. Blake;Roberto Sarnari;Daniel Lee;Allen S. Anderson;Kambiz Ghafourian;Sadiya S. Khan;Esther E. Vorovich;Jonathan D. Rich;Jane E. Wilcox;Clyde W. Yancy;James C. Carr;Michael Markl
    • Journal of Cardiovascular Imaging
    • /
    • 제30권4호
    • /
    • pp.263-275
    • /
    • 2022
  • BACKGROUND: Cardiac allograft vasculopathy (CAV) is a complication beyond the first-year post-heart transplantation (HTx). We aimed to test the utility of cardiac magnetic resonance (CMR) to detect functional/structural changes in HTx recipients with CAV. METHODS: Seventy-seven prospectively recruited HTx recipients beyond the first-year post-HTx and 18 healthy controls underwent CMR, including cine imaging of ventricular function and T1- and T2-mapping to assess myocardial tissue changes. Data analysis included quantification of global cardiac function and regional T2, T1 and extracellular volume based on the 16-segment model. International Society for Heart and Lung Transplantation criteria was used to adjudicate CAV grade (0-3) based on coronary angiography. RESULTS: The majority of HTx recipients (73%) presented with CAV (1: n = 42, 2/3: n = 14, 0: n = 21). Global and segmental T2 (49.5 ± 3.4 ms vs 50.6 ± 3.4 ms, p < 0.001;16/16 segments) were significantly elevated in CAV-0 compared to controls. When comparing CAV-2/3 to CAV-1, global and segmental T2 were significantly increased (53.6 ± 3.2 ms vs. 50.6 ± 2.9 ms, p < 0.001; 16/16 segments) and left ventricular ejection fraction was significantly decreased (54 ± 9% vs. 59 ± 9%, p < 0.05). No global, structural, or functional differences were seen between CAV-0 and CAV-1. CONCLUSIONS: Transplanted hearts display functional and structural alteration compared to native hearts, even in those without evidence of macrovasculopathy (CAV-0). In addition, CMR tissue parameters were sensitive to changes in CAV-1 vs. 2/3 (mild vs. moderate/severe). Further studies are warranted to evaluate the diagnostic value of CMR for the detection and classification of CAV.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

시스템 다이내믹스 기법을 활용한 온라인 쇼핑몰의 전략에 관한 연구 : 소비자의 구매 및 재구매 행동을 중심으로 (A Study for Strategy of On-line Shopping Mall: Based on Customer Purchasing and Re-purchasing Pattern)

  • 이상근;민석기;강민철
    • Asia pacific journal of information systems
    • /
    • 제18권3호
    • /
    • pp.91-121
    • /
    • 2008
  • Electronic commerce, commonly known as e-commerce or eCommerce, has become a major business trend in these days. The amount of trade conducted electronically has grown extraordinarily by developing the Internet technology. Most electronic commerce has being conducted between businesses to customers; therefore, the researches with respect to e-commerce are to find customer's needs, behaviors through statistical methods. However, the statistical researches, mostly based on a questionnaire, are the static researches, They can tell us the dynamic relationships between initial purchasing and repurchasing. Therefore, this study proposes dynamic research model for analyzing the cause of initial purchasing and repurchasing. This paper is based on the System-Dynamic theory, using the powerful simulation model with some restriction, The restrictions are based on the theory TAM(Technology Acceptance Model), PAM, and TPB(Theory of Planned Behavior). This article investigates not only the customer's purchasing and repurchasing behavior by passing of time but also the interactive effects to one another. This research model has six scenarios and three steps for analyzing customer behaviors. The first step is the research of purchasing situations. The second step is the research of repurchasing situations. Finally, the third step is to study the relationship between initial purchasing and repurchasing. The purpose of six scenarios is to find the customer's purchasing patterns according to the environmental changes. We set six variables in these scenarios by (1) changing the number of products; (2) changing the number of contents in on-line shopping malls; (3) having multimedia files or not in the shopping mall web sites; (4) grading on-line communities; (5) changing the qualities of products; (6) changing the customer's degree of confidence on products. First three variables are applied to study customer's purchasing behavior, and the other variables are applied to repurchasing behavior study. Through the simulation study, this paper presents some inter-relational result about customer purchasing behaviors, For example, Active community actions are not the increasing factor of purchasing but the increasing factor of word of mouth effect, Additionally. The higher products' quality, the more word of mouth effects increase. The number of products and contents on the web sites have same influence on people's buying behaviors. All simulation methods in this paper is not only display the result of each scenario but also find how to affect each other. Hence, electronic commerce firm can make more realistic marketing strategy about consumer behavior through this dynamic simulation research. Moreover, dynamic analysis method can predict the results which help the decision of marketing strategy by using the time-line graph. Consequently, this dynamic simulation analysis could be a useful research model to make firm's competitive advantage. However, this simulation model needs more further study. With respect to reality, this simulation model has some limitations. There are some missing factors which affect customer's buying behaviors in this model. The first missing factor is the customer's degree of recognition of brands. The second factor is the degree of customer satisfaction. The third factor is the power of word of mouth in the specific region. Generally, word of mouth affects significantly on a region's culture, even people's buying behaviors. The last missing factor is the user interface environment in the internet or other on-line shopping tools. In order to get more realistic result, these factors might be essential matters to make better research in the future studies.

햄릿 공연을 위한 무대의상 디자인 (II) - 패턴 및 실물제작 - (Stage Costume Design for Performance Hamlet (II) - The Study on Pattern and Manufactured Product -)

  • 김순구;황성원
    • 한국의류산업학회지
    • /
    • 제6권1호
    • /
    • pp.41-50
    • /
    • 2004
  • This research proposes the on-stage costumes for the play Hamlet of Shakespeare performed by Yunheedan Guhri Pae - the Street Theater Troupe. Stage costumes have an important role in displaying the characteristics of each characters to the audience and has big visual effects. However, in order to design the costumes in the object viewpoints of the audience, the survey on the images of the characters who had actually watched the performance was taken place and proposed the costume design according to the results of the survey. Hamlet a: This result was applied to propose a sweater in black color, black leather pants and vest. Hamlet b: This result was applied to propose hooded coat in purple in middle level of brightness and color spectrum and yellow coat. For free image, loose pants in blue and vest in the same color tone were proposed. Gertrude a: This result was applied to use purple (violet) with reddish tone to propose the formation of a dress applying tailored suit. Gertrude b: This result was applied to propose purple gown and the one-piece dress with black laces. Ophelia a: This result was applied to propose feminine white dress and cape in purple color tone. Ophelia b: This result was applied to propose dyed and weaved clothes. Through the surveys as above, the images of each character was driven in adjectives, and using the results driven from the brightness, coloration, and color, color images were proposed. Only one costume cannot make up for the stage costumes and because it exists as an element of stage production, it is true that costumes are limited in some areas. However, that limit can become the motive of the costume. There is a limit, which the designer cannot produce the costumes as he or she had designed but I believe it is the center of the on-stage customers to display the characteristics of the characters according to the given concept. The limit of this research is the fact that because the costumes were designed so they fit the conditions already given, thus it was difficult to regard the process of designing and producing the costume as a project done according to the interaction. And in the future, if it is possible, I wish for the joint research with the people responsible for stage art to take place as a practical stage art. It was possible to produce practical costume since they were produced for actual performance and the production of costumes considering the dance steps, line of flow, and acting, was able to reduce the trial and error on stage. Through this research, I felt that the understanding and smooth interaction on diverse other areas not limited to the costume design should be taken place and believe that this was a research that proposes new research method since there had been only a few previous research regarding the on-stage costumes for actual performances. Therefore, this research had depended on the surveys given to the audiences to endow objectivity, however, I wish this research can contribute to defining effective process and methods for the on-stage costumes with more active researches with diverse methods and in diverse areas. I am sorry that the costume production for all the characters and all the scenes in Hamlet couldn't be done due to many limitations. As the following research assignment, I am planning on designing the costumes for all the scenes.

모폴린계 이온성 액체의 열 및 전기화학적 안정성 (Thermal and Electrochemical Stability of Morpholinium Ionic Liquids)

  • 김현택;홍연기;강정원;이영우;김기섭
    • Korean Chemical Engineering Research
    • /
    • 제50권4호
    • /
    • pp.702-707
    • /
    • 2012
  • 지난 수십 년간 다양한 산업에서 사용된 유독 화학물질은 심각한 환경오염을 초래했다. 그리고 이산화탄소나 메탄가스 같은 부산물로 인해 지구 온난화를 가속화 시켰다. 그래서 현재 사용하고 있는 유기 용매를 대체할 새로운 환경친화적인 소재 개발의 중요성이 부각되고 있다. 이온성 액체는 비휘발성, 비가연성, 화학적 불활성과 같은 친환경적인 물성을 지니고 있다. 이 밖에도 넓은 전기화학적 범위, 높은 전기전도도, 넓은 열적 작용 범위 그리고 유기용매와의 높은 용해성과 같은 물성을 지니고 있어 합성용매, 촉매제, 가스추출제로서 각광받고 있는 물질이다. 이번 연구에서는 모폴린 계열의 이온성 액체인 N-ethyl-N-methylmorpholine Bromide, N-butyl-N-methylmorpholine Bromide, N-octyl-N-methylmorpholine Bromide, N-ethyl-N-methylmorpholine Tetrafluoroborate, N-butyl-N-methylmorpholine Tetrafluoroborate, N-octyl-N-methylmorpholine Tetrafluoroborate, N-ethyl-N-methylmorpholine Hexafluorophosphate, N-butyl-N-methylmorpholine Hexafluorophosphate, N-octyl-N-methylmorpholine Hexafluorophosphate를 합성하였다. 합성물의 녹는점, 분해 온도, 전기화학적 안전성은 각각 DSC, TGA, CV로 측정하였다. 할로겐 음이온($Br^-$)을 지닌 이온성 액체는 대체로 높은 온도($150{\sim}200^{\circ}C$)에서 녹는점 갖고, 비교적 낮은 열분해 온도($200{\sim}230^{\circ}C$), 좁은 전기화학적 안전성(3.4~3.6 V)을 보였다. 반면에 무기 음이온($BF_4^-$, $PF_6^-$)을 지닌 이온성 액체들은 비교적 낮은 온도($50{\sim}110^{\circ}C$)에서 녹는점을 가졌고, 높은 열분해 온도($250{\sim}380^{\circ}C$), 넓은 영역에 걸친 전기화학적 안전성(6.1~6.3 V)을 보였다. 뿐만 아니라 동일한 음이온에서도 양이온의 탄소 사슬의 길이에 따라 물성이 상이함을 확인할 수 있었다. 이번 연구를 통해 얻은 자료들은 이온성 액체의 상용화에 밑거름이 될 것이다.

한국 중부와 동남부지역 금·은광화작용의 성인적 특성 (Contrasting Styles of Gold and Silver Mineralization in the Central and Southeastern Korea)

  • 최선규;최상훈
    • 자원환경지질
    • /
    • 제28권6호
    • /
    • pp.587-597
    • /
    • 1995
  • 한반도 중부지역과 동남부지역에 분포하는 금-은 광상들의 광화작용은 쥐라기 중기로부터 백악기 말기에 걸쳐서 진행되었으며, 이들 광상은 유행별로 산출지역 및 산출시기에 연관된 지질학적 지화학적 생성환경의 차이를 나타내고 있다. 중부지역 금-은 광상은 북동-남서의 방향성을 갖고 산출분포하는 중생대 화강암류 및 주변 선캠브리아기 변성암류내에 분포하지만, 동남부지역 금-은 광상은 백악기 퇴적암 및 화산암류내에 주로 배태되고 있다. 이는 한반도 대표적인 화성활동인 쥐라지 대보화성활동 및 백악기 불국사 화성활동과 각각 밀접한 성인적 연관성을 시사하고 있다. 이러한 각 광상들의 광화작용 특성(광물공생관계, 조직, 구조 등)과 연대측정결과 및 지질학적 분포특성은 쥐라가 중기로부터 백악기 말기에 이르기까지 광상형성과 연관된 열수유체의 성인적 차이를 의미하고 있다. 즉, 쥐라기로부터 초기 백악기에는 금광단일형 광상의 광화작용이 우세하게 진행되었으나, 후기 백악기에 이르면서 금-은혼합형광상 및 은광단일형 광상의 광화작용이 우세하게 야기되었음을 알 수 있다. 쥐라기 금광단일형 광상들은 괴상의 맥상 산출특성 및 단순한 광석 광불 공생관계를 보여주는 단성광맥으로 높은 fineness 값을 나타내지만, 백악기 금-은혼합형 광상과 은광단일형 광상은 다양하고 복잡한 구조 및 조치특성 갖는 복성 광맥내에 함은황인 및 황화광물과 함은tellurides 및 자연은 등을 포함하는 등 상대적으로 복잡한 광석광물 공생과계를 보여준다. 한편 황화광물의 지질온도계와 유체포유물 연구의 결과등에 의하면 백악기 금-은혼합형 광상과 은광단일형 광상은 천부(<0.5 kb)에서 천수가 우세한 광화유체로부터 $200^{\circ}{\sim}350^{\circ}C$ 온도조건하에서 주된 광화작용이 진행되었지만, 쥐라기 금광단일형 광상은 마그마기원의 열수용액으로부터 고온$(300^{\circ}{\sim}500^{\circ}C)$ 및 고압$({\approx}4-5kb)$의 생성환경하에서 광화작용이 진행되었음을 시사한다.

  • PDF

Highly Doped Nano-crystal Embedded Polymorphous Silicon Thin Film Deposited by Using Neutral Beam Assisted CVD at Room Temperature

  • 장진녕;이동혁;소현욱;홍문표
    • 한국진공학회:학술대회논문집
    • /
    • 한국진공학회 2012년도 제43회 하계 정기 학술대회 초록집
    • /
    • pp.154-155
    • /
    • 2012
  • The promise of nano-crystalites (nc) as a technological material, for applications including display backplane, and solar cells, may ultimately depend on tailoring their behavior through doping and crystallinity. Impurities can strongly modify electronic and optical properties of bulk and nc semiconductors. Highly doped dopant also effect structural properties (both grain size, crystal fraction) of nc-Si thin film. As discussed in several literatures, P atoms or radicals have the tendency to reside on the surface of nc. The P-radical segregation on the nano-grain surfaces that called self-purification may reduce the possibility of new nucleation because of the five-coordination of P. In addition, the P doping levels of ${\sim}2{\times}10^{21}\;at/cm^3$ is the solubility limitation of P in Si; the solubility of nc thin film should be smaller. Therefore, the non-activated P tends to segregate on the grain boundaries and the surface of nc. These mechanisms could prevent new nucleation on the existing grain surface. Therefore, most researches shown that highly doped nc-thin film by using conventional PECVD deposition system tended to have low crystallinity, where the formation energy of nucleation should be higher than the nc surface in the intrinsic materials. If the deposition technology that can make highly doped and simultaneously highly crystallized nc at low temperature, it can lead processes of next generation flexible devices. Recently, we are developing a novel CVD technology with a neutral particle beam (NPB) source, named as neutral beam assisted CVD (NBaCVD), which controls the energy of incident neutral particles in the range of 1~300eV in order to enhance the atomic activation and crystalline of thin films at low temperatures. During the formation of the nc-/pm-Si thin films by the NBaCVD with various process conditions, NPB energy directly controlled by the reflector bias and effectively increased crystal fraction (~80%) by uniformly distributed nc grains with 3~10 nm size. In the case of phosphorous doped Si thin films, the doping efficiency also increased as increasing the reflector bias (i.e. increasing NPB energy). At 330V of reflector bias, activation energy of the doped nc-Si thin film reduced as low as 0.001 eV. This means dopants are fully occupied as substitutional site, even though the Si thin film has nano-sized grain structure. And activated dopant concentration is recorded as high as up to 1020 #/$cm^3$ at very low process temperature (< $80^{\circ}C$) process without any post annealing. Theoretical solubility for the higher dopant concentration in Si thin film for order of 1020 #/$cm^3$ can be done only high temperature process or post annealing over $650^{\circ}C$. In general, as decreasing the grain size, the dopant binding energy increases as ratio of 1 of diameter of grain and the dopant hardly be activated. The highly doped nc-Si thin film by low-temperature NBaCVD process had smaller average grain size under 10 nm (measured by GIWAXS, GISAXS and TEM analysis), but achieved very higher activation of phosphorous dopant; NB energy sufficiently transports its energy to doping and crystallization even though without supplying additional thermal energy. TEM image shows that incubation layer does not formed between nc-Si film and SiO2 under later and highly crystallized nc-Si film is constructed with uniformly distributed nano-grains in polymorphous tissues. The nucleation should be start at the first layer on the SiO2 later, but it hardly growth to be cone-shaped micro-size grains. The nc-grain evenly embedded pm-Si thin film can be formatted by competition of the nucleation and the crystal growing, which depend on the NPB energies. In the evaluation of the light soaking degradation of photoconductivity, while conventional intrinsic and n-type doped a-Si thin films appeared typical degradation of photoconductivity, all of the nc-Si thin films processed by the NBaCVD show only a few % of degradation of it. From FTIR and RAMAN spectra, the energetic hydrogen NB atoms passivate nano-grain boundaries during the NBaCVD process because of the high diffusivity and chemical potential of hydrogen atoms.

  • PDF

치료계획시스템에서 전산화단층촬영과 자기공명영상의 영상융합 재현성 및 선량평가 (CT and MRI image fusion reproducibility and dose assessment on Treatment planning system)

  • 안병혁;최재혁;황재웅;박지연;이두현
    • 대한방사선치료학회지
    • /
    • 제29권2호
    • /
    • pp.33-41
    • /
    • 2017
  • 목 적: 종양에는 최대한의 선량을 부여하고 주변의 정상조직에는 최소한의 선량이 조사되도록 부작용을 줄이는 목적으로 방사선 치료기술이 발전함에 따라 다양한 치료계획 및 치료 방법이 개발되고 있다. 방사선 치료 시 CT(Computed tomography)와 MRI(Magnetic resonance imaging)영상의 융합은 종양에 선량을 전달하는데 커다란 역할을 한다. 본 연구의 목적은 치료계획 시 자체 제작한 팬톰을 이용하여 CT와 MRI영상들의 융합을 통해 영상의 재현성 및 유용성을 평가하고 획득한 영상에서 타겟 선량을 비교, 분석해보고자 한다. 대상 및 방법: 자체 제작한 팬톰을 이용하여 CT 촬영을 하고, 자장의 세기가 다른 1.5T 와 3.0T의 MRI 촬영을 하여 영상을 획득한다. CT 촬영을 한 팬톰의 영상과 각기 다른 자장의 세기로 촬영한 팬톰의 MRI영상에서 팬톰 내에 존재하는 작은 홀의 크기 및 용적의 재현성을 비교하고, 임의의 타겟에서 선량 변화를 비교, 분석한다. 결 과: 13개의 작은 홀 직경은 CT 촬영에서 최대 31 mm, 최소 27.54 mm를 나타냈으며, 실제 제작한 것과 비교하여 평균 29.28 mm 1 % 이내로 측정되었다. 1.5T MRI 퓨전 영상에서는 최대 31.65 mm, 최소 24.3 mm를 나타냈으며, 평균 28.8 mm 1 % 이내로 측정되었다. 3.0T MRI 퓨전 영상에서는 최대 30.2 mm, 최소 27.92 mm를 나타냈으며, 평균 29.41 mm 1.3 % 이내로 측정되었다. 타겟의 조사된 선량변화는 CT에서 95.9-102.1 %, CT-1.5T MRI 퓨전영상에서 93.1-101.4 %, CT-3.0T MRI 퓨전영상에서는 96-102 %의 선량변화를 보였다. 결 론: CT 및 MRI는 영상획득 시 다른 알고리즘이 적용된다. 또한 인체의 장기는 각기 다른 밀도를 가지고 있으므로 영상 획득 시 이미지 왜곡이 발생할 수 있다. 이러한 부정확한 영상의 묘사는 타겟의 용적범위 및 선량에 영향을 주기 때문에 정확한 타겟의 용적과 위치는 불필요한 선량이 조사되는 것을 방지하며, 치료계획 시 오차를 방지할 수 있다. 즉 CT와 MRI 영상이 가지고 있는 영상 표출 알고리즘의 장점을 이용하여 치료계획에 적용해야 할 것이다.

  • PDF