• Title/Summary/Keyword: Database Evaluation

Search Result 1,245, Processing Time 0.027 seconds

A Computed Tomography-Based Anatomic Comparison of Three Different Types of C7 Posterior Fixation Techniques : Pedicle, Intralaminar, and Lateral Mass Screws

  • Jang, Woo-Young;Kim, Il-Sup;Lee, Ho-Jin;Sung, Jae-Hoon;Lee, Sang-Won;Hong, Jae-Taek
    • Journal of Korean Neurosurgical Society
    • /
    • v.50 no.3
    • /
    • pp.166-172
    • /
    • 2011
  • Objective : The intralaminar screw (ILS) fixation technique offers an alternative to pedicle screw (PS) and lateral mass screw (LMS) fixation in the C7 spine. Although cadaveric studies have described the anatomy of the pedicles, laminae, and lateral masses at C7, 3-dimensional computed tomography (CT) imaging is the modality of choice for pre-surgical planning. In this study, the goal was to determine the anatomical parameter and optimal screw trajectory for ILS placement at C7, and to compare this information to PS and LMS placement in the C7 spine as determined by CT evaluation. Methods : A total of 120 patients (60 men and 60 women) with an average age of $51.7{\pm}13.6$ years were selected by retrospective review of a trauma registry database over a 2-year period. Patients were included in the study if they were older than 15 years of age, had standardized axial bone-window CT imaging at C7, and had no evidence of spinal trauma. For each lamina and pedicle, width (outer cortical and inner cancellous), maximal screw length, and optimal screw trajectory were measured, and the maximal screw length of the lateral mass were measured using m-view 5.4 software. Statistical analysis was performed using Student's t-test. Results : At C7, the maximal PS length was significantly greater than the ILS and LMS length (PS, $33.9{\pm}3.1$ mm; ILS, $30.8{\pm}3.1$ mm; LMS, $10.6{\pm}1.3$; p<0.01). When the outer cortical and inner cancellous width was compared between the pedicle and lamina, the mean pedicle outer cortical width at C7 was wider than the lamina by an average of 0.6 mm (pedicle, $6.8{\pm}1.2$ mm; lamina, $6.2{\pm}1.2$ mm; p<0.01). At C7, 95.8% of the laminae measured accepted a 4.0-mm screw with a 1.0 mm of clearance, compared with 99.2% of pedicle. Of the laminae measured, 99.2% accepted a 3.5-mm screw with a 1.0 mm clearance, compared with 100% of the pedicle. When the outer cortical and inner cancellous height was compared between pedicle and lamina, the mean lamina outer cortical height at C7 was wider than the pedicle by an average of 9.9 mm (lamina, $18.6{\pm}2.0$ mm; pedicle, $8.7{\pm}1.3$ mm; p<0.01). The ideal screw trajectory at C7 was also measured ($47.8{\pm}4.8^{\circ}$ for ILS and $35.1{\pm}8.1^{\circ}$ for PS). Conclusion : Although pedicle screw fixation is the most ideal instrumentation method for C7 fixation with respect to length and cortical diameter, anatomical aspect of C7 lamina is affordable to place screw. Therefore, the C7 intralaminar screw could be an alternative fixation technique with few anatomic limitations in the cases when C7 pedicle screw fixation is not favorable. However, anatomical variations in the length and width must be considered when placing an intralaminar or pedicle screw at C7.

Evaluation of Dietary Manganese Intake in Korean Men and Women over 20 Years Old (20세 이상 일부 성인남녀의 망간 섭취상태 평가)

  • Choi, Mi-Kyeong;Kim, Eun-Young
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.36 no.4
    • /
    • pp.447-452
    • /
    • 2007
  • This study was peformed to estimate manganese intake and the major food source of manganese in Korean adults. The 354 subjects aged over 20 years were measured anthropometrics and dietary intake using 24-hour recall method. Daily intake and the major food sources of manganese were calculated using manganese database of food composition tables in Korea, USA and Japan. The average age, height, weight and BMI were 54.6years, 165.7cm, 67.2kg and $24.5kg/m^2$ for men and 53.8 years, 153.7cm, 59.1kg and $24.9kg/m^2$ for women, respectively. The daily energy and manganese intake of men were significantly higher than those of women (1740.9 kcal vs. 1432.6 kcal; p<0.001, 3.7mg vs. 3.2mg; p<0.01). However, daily manganese intake per 1000kcal between men and women was not significantly different (2.2mg/1000kcal vs. 2.3mg/1000kcal). Daily manganese intakes from each food group were 1.9mg from cereals, 0.5mg from vegetables, 0.4mg from pulses and 0.2mg from seasonings. The 20 major food sources of dietary manganese were rice, soybean, sorghum, Kimchi, tobu, wheat flour, red pepper powder, small red bean, glutinous millet, soybean paste, potato, Ramyeon, green pepper, noodle, buckwheat Naengmyeon, soybean sprout, laver, watermelon, perilla seeds powder and soy sauce. Manganese intake from these 20 foods was 74.0% of the total dietary manganese intake. In conclusion, daily manganese intake of the subject was 3.4mg (2.2mg/1000 kcal) and met adequate intake of manganese. The mai or food sources of manganese were cereals, pulses, and vegetables such as rice, soybean, sorghum, Kimchi and tobu.

Advanced Improvement for Frequent Pattern Mining using Bit-Clustering (비트 클러스터링을 이용한 빈발 패턴 탐사의 성능 개선 방안)

  • Kim, Eui-Chan;Kim, Kye-Hyun;Lee, Chul-Yong;Park, Eun-Ji
    • Journal of Korea Spatial Information System Society
    • /
    • v.9 no.1
    • /
    • pp.105-115
    • /
    • 2007
  • Data mining extracts interesting knowledge from a large database. Among numerous data mining techniques, research work is primarily concentrated on clustering and association rules. The clustering technique of the active research topics mainly deals with analyzing spatial and attribute data. And, the technique of association rules deals with identifying frequent patterns. There was an advanced apriori algorithm using an existing bit-clustering algorithm. In an effort to identify an alternative algorithm to improve apriori, we investigated FP-Growth and discussed the possibility of adopting bit-clustering as the alternative method to solve the problems with FP-Growth. FP-Growth using bit-clustering demonstrated better performance than the existing method. We used chess data in our experiments. Chess data were used in the pattern mining evaluation. We made a creation of FP-Tree with different minimum support values. In the case of high minimum support values, similar results that the existing techniques demonstrated were obtained. In other cases, however, the performance of the technique proposed in this paper showed better results in comparison with the existing technique. As a result, the technique proposed in this paper was considered to lead to higher performance. In addition, the method to apply bit-clustering to GML data was proposed.

  • PDF

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

Empirical Analysis of University Patenting in Korea (특허자료를 이용한 우리나라 대학 연구의 특성 분석)

  • Suh, Joonghae
    • KDI Journal of Economic Policy
    • /
    • v.32 no.4
    • /
    • pp.115-151
    • /
    • 2010
  • Recently Korean universities show very rapid increases in both patents and R&D (research and development) expenditures. During the period from 1970 to 2008, university R&D spending has on the average increased 15.3% annually. Along with steady increases in R&D spending, university's research outputs have also continuously increased. In 1990 Korea as a total published 1,613 SCI-level scientific papers and Korean universities applied 27 patents to Korea patent office. In 2008, Korea published more that 35,000 SCI papers and Korean universities applied about 7,300 patents. The growth of scientific articles had begun from the early 1990s whereas the growth of patent has ignited entering the 2000s. The paper tried to investigate university research through the window of patent. Patents lie between invention and innovation and represent the potential value of invention which will be realized at the marketplace. Since Korean patents do not contain citation information, the paper used US patents-NBER patent database-as the main data. The key empirical question is whether Korean university patents granted from USPTO are characteristically different from other Korean patents granted from USPTO. Previous studies on US and Europe show that corporate patents are more stylized in appropriablity of invention, whereas university patents basicness. In case of Korea, the paper confirmed the appropriability characteristic of corporate patents; but the Korean unversity patents are not distinguishable in terms of basicness. The paper estimated the citation frequency function-an empirical model which was firstly developed by Caballero and Jaffe (1993) and later articulated by Jaffe and Trajtenberg (1996, 2002). The model is specified mainly composed of two interacting parts-diffusion effect and obsolescence effect of new ideas or innovations. Estimation results show that differences in forward citations between university and corporate patents are not statistically significant, after controlling self-citation. Since forward citations represent the quality of patents, this estimation result implies that there are no statistically significant quality differences between university and corporate patents. Prior research results, based on the same model of citation frequency function, about US and some European cases show that, in terms of forward citations, university patents are generally superior to corporate patents -for the case of US- or, the former not inferior to the latter-for the case of most of Europe. It is argued that some important and significant policy changes caused the rapid rise of university patents in Korea. Policy changes include the revision of technology transfer act allowing the ownership of publicly-funded research results to researchers and the changes in faculty/professor evaluation which gives more credit to the number of patents. These policy changes have triggered the rapid growth of the number of university patents. The results of the empirical analysis in this paper indicated that Korea now needs to make further efforts to enhance the quality of university patents, not just to produce more numbers of patents.

  • PDF

Analysis of Research on Non-Timber Forest Plants - Based on the Articles Published in the Journal of Korean Forest Society from 1962 to 2013 - (산림과학분야의 산림특용자원식물의 연구 - 한국임학회지에 게재된 논문을 중심으로 -)

  • Lee, Hyunseok;Yi, Jaeseon;An, Chanhoon;Lee, Jeonghoon
    • Journal of Korean Society of Forest Science
    • /
    • v.104 no.3
    • /
    • pp.337-351
    • /
    • 2015
  • The articles, published in the Journal of Korean Forest Society from Volume 1 (1962) to Volume 102 (2013), were investigated for the research trend analysis about forest plants for special purposes, i.e., edible plants, medicinal plants, feed resources, landscape plants, fiber plants, industrial usage, bee plants, bioenergy/phytoremediation uses, dye materials, and rare/endangered/endemic plants. These research articles were classified again based on the contents of research into following categories - habitat environment, ecology, physiology, propagation, silviculture (including planting and tending), genetics and breeding, identification, pest and disease control, animal-related research, components analysis and extracts, vegetation survey, biotechnology, management, recreation and forest healing, and research review. Among the total 2,433 articles published, 611 (25.1%) were related to plants for special usage or purposes. The highest frequency (14.9%) in publications was found in the field of silviculture followed by physiology, propagation, identification, and genetics and breeding, respectively. On the bases of usage, edible plants showed higher frequency (26.5%) than others, followed by industrial purpose, bioenergy/phytoremediation usage, landscape plants, medicinal plants, and rare/endangered/endemic plants. Populus plant species was the most popular in research, showing 62 articles; and Castanea crenata 36; Pinus koraiensis 35; Robinia pseudoacacia 20; Ginko biloba 17, etc. Based on the survey and analysis, the following points are suggested: 1) improved evaluation of forest plants as non-wood resources, 2) expanding research topics on the basis of production, management, and utilization of non-wood forest resources, 3) management of database of forest plant information and encouragement needed to strengthen cooperative researches satisfying the needs of other industrial and scientific areas, and 4) encouraging to promote traditional knowledge based research on forest plants.

Auxiliary Reinforcement Method for the Safety of Tunnelling Face (터널 막장안정성에 따른 보강공법 적용)

  • Kim, Chang-Yong;Park, Chi-Hyun;Bae, Gyu-Jin;Hong, Sung-Wan;Oh, Myung-Ryul
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.2 no.2
    • /
    • pp.11-21
    • /
    • 2000
  • Tunnelling has been created as a great extent in view of less land space available because the growth of population in metropolitan has been accelerated at a faster pace than the development of the cities. In tunnelling, it is often faced that measures are obliged to be taken without confirmation for such abnormality as diverged movement of surrounding rock mass, growing crack of shotcrete and yielding of rockbolts. In this case, it is usually said that the judgments of experienced engineers for the selection of measure are importance and allowed us to get over the situations in many construction sites. But decrease of such experienced engineers need us to develop the new system to assist the selection of measures for the abnormality without any experiences of similar tunnelling sites. In this study, After a lot of tunnelling reinforcement methods were surveyed and the detail application were studied, an expert system was developed to predict the safety of tunnel and choose proper tunnel reinforcement system using fuzzy quantification theory and fuzzy inference rule based on tunnel information database. The expert system developed in this study have two main parts named pre-module and post-module. Pre-module decides tunnel information imput items based on the tunnel face mapping information which can be easily obtained in-situ site. Then, using fuzzy quantification theory II, fuzzy membership function is composed and tunnel safety level is inferred through this membership function. The comparison result between the predicted reinforcement system level and measured ones was very similar. In-situ data were obtained in three tunnel sites including subway tunnel under Han river. This system will be very helpful to make the most of in-situ data and suggest proper applicability of tunnel reinforcement system developing more resonable tunnel support method from dependance of some experienced experts for the absent of guide.

  • PDF

A Spatio-Temporal Clustering Technique for the Moving Object Path Search (이동 객체 경로 탐색을 위한 시공간 클러스터링 기법)

  • Lee, Ki-Young;Kang, Hong-Koo;Yun, Jae-Kwan;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.3 s.15
    • /
    • pp.67-81
    • /
    • 2005
  • Recently, the interest and research on the development of new application services such as the Location Based Service and Telemetics providing the emergency service, neighbor information search, and route search according to the development of the Geographic Information System have been increasing. User's search in the spatio-temporal database which is used in the field of Location Based Service or Telemetics usually fixes the current time on the time axis and queries the spatial and aspatial attributes. Thus, if the range of query on the time axis is extensive, it is difficult to efficiently deal with the search operation. For solving this problem, the snapshot, a method to summarize the location data of moving objects, was introduced. However, if the range to store data is wide, more space for storing data is required. And, the snapshot is created even for unnecessary space that is not frequently used for search. Thus, non storage space and memory are generally used in the snapshot method. Therefore, in this paper, we suggests the Hash-based Spatio-Temporal Clustering Algorithm(H-STCA) that extends the two-dimensional spatial hash algorithm used for the spatial clustering in the past to the three-dimensional spatial hash algorithm for overcoming the disadvantages of the snapshot method. And, this paper also suggests the knowledge extraction algorithm to extract the knowledge for the path search of moving objects from the past location data based on the suggested H-STCA algorithm. Moreover, as the results of the performance evaluation, the snapshot clustering method using H-STCA, in the search time, storage structure construction time, optimal path search time, related to the huge amount of moving object data demonstrated the higher performance than the spatio-temporal index methods and the original snapshot method. Especially, for the snapshot clustering method using H-STCA, the more the number of moving objects was increased, the more the performance was improved, as compared to the existing spatio-temporal index methods and the original snapshot method.

  • PDF

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

Characteristics of the Differences between Significant Wave Height at Ieodo Ocean Research Station and Satellite Altimeter-measured Data over a Decade (2004~2016) (이어도 해양과학기지 관측 파고와 인공위성 관측 유의파고 차이의 특성 연구 (2004~2016))

  • WOO, HYE-JIN;PARK, KYUNG-AE;BYUN, DO-SEONG;LEE, JOOYOUNG;LEE, EUNIL
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.23 no.1
    • /
    • pp.1-19
    • /
    • 2018
  • In order to compare significant wave height (SWH) data from multi-satellites (GFO, Jason-1, Envisat, Jason-2, Cryosat-2, SARAL) and SWH measurements from Ieodo Ocean Research Station (IORS), we constructed a 12 year matchup database between satellite and IORS measurements from December 2004 to May 2016. The satellite SWH showed a root mean square error (RMSE) of about 0.34 m and a positive bias of 0.17 m with respect to the IORS wave height. The satellite data and IORS wave height data did not show any specific seasonal variations or interannual variability, which confirmed the consistency of satellite data. The effect of the wind field on the difference of the SWH data between satellite and IORS was investigated. As a result, a similar result was observed in which a positive biases of about 0.17 m occurred on all satellites. In order to understand the effects of topography and the influence of the construction structures of IORS on the SWH differences, we investigated the directional dependency of differences of wave height, however, no statistically significant characteristics of the differences were revealed. As a result of analyzing the characteristics of the error as a function of the distance between the satellite and the IORS, the biases are almost constant about 0.14 m regardless of the distance. By contrast, the amplitude of the SWH differences, the maximum value minus the minimum value at a given distance range, was found to increase linearly as the distance was increased. On the other hand, as a result of the accuracy evaluation of the satellite SWH from the Donghae marine meteorological buoy of Korea Meteorological Administration, the satellite SWH presented a relatively small RMSE of about 0.27 m and no specific characteristics of bias such as the validation results at IORS. In this paper, we propose a conversion formula to correct the significant wave data of IORS with the satellite SWH data. In addition, this study emphasizes that the reliability of data should be prioritized to be extensively utilized and presents specific methods and strategies in order to upgrade the IORS as an international world-wide marine observation site.