• Title/Summary/Keyword: Entity

Search Result 2,094, Processing Time 0.027 seconds

The Estrogen Receptor Negative-Progesterone Receptor Positive Breast Carcinoma is a Biological Entity and not a Technical Artifact

  • Ng, Char Hong;Pathy, Nirmala Bhoo;Taib, Nur Aishah;Mun, Kein Seong;Rhodes, Anthony;Yip, Cheng Har
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.4
    • /
    • pp.1111-1113
    • /
    • 2012
  • The ER-/PR+ breast tumor may be the result of a false ER negative result. The aim of this study was to investigate whether there is a difference in patient and tumor characteristics of the ER-/PR+ phenotype in an Asian setting. A total of 2629 breast cancer patients were categorized on the basis of their age, ethnicity, tumor hormonal receptor phenotype, grade and histological type. There were 1230 (46.8%) ER+/PR+, 306 (11.6%) ER+/PR-, 122 (4.6%) ER-/PR+ and 972 (37%) ER-/PR-. ER-/PR+ tumors were 2.5 times more likely to be younger than 50 years at diagnosis (OR: 2.52; 95% CI: 1.72-3.67). Compared to ER+/PR+ tumors, the ER-/PR+ phenotype was twice more likely to be associated with grade 3 tumors (OR:2.02; 95%CI: 1.00-4.10). In contrast, compared to ER-/PR- tumors, the ER-/PR+ phenotype was 90% less likely to be associated with a grade 3 tumor (OR: 0.12; 95%CI:0.05-0.26), and more likely to have invasive lobular than invasive ductal histology (OR: 3.66; 95%CI: 1.47-9.11). These results show that the ER-/PR+ phenotype occurs in a younger age group and is associated with intermediate histopathological characteristics compared to ER+/PR+ and ER-/PR- tumors. This may imply that it is a distinct entity and not a technical artifact.

Design of Unification Meta-data and Entity-Relationship Model for Educational Digital Content (교수.학습 디지털 컨텐트 통합 메타데이터 및 개체-관계 모델 설계)

  • Koo, Duk-Hoi
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.3
    • /
    • pp.317-327
    • /
    • 2002
  • The need to support the ICT-using teaching and learning at elementary and secondary schools has led to various digital content service systems. The systems are designed to target the teachers and the students as the major users. The problems involved in them is that they do not provide such services as the integrated search and the systematic use of interface in terms of actual users' use of teaching and learning digital content. It's because they have been created at demands at each time. In an attempt to solve this problem, this study set out to suggest the integrated meta-data items of a teaching and learning digital content, which reflects the Dublin Core Education, the international meta-data standard. It also aimed to design an entity-relationship model to realize the digital content. The results of the integrated meta-data and the entity-relationship model will be utilized as a basic research to help the users to search for various teaching and learning digital contents on an integrated basis and to realize a consistent user interface. Furthermore, they are expected to contribute to the development a service system the teachers and the students can make better use of.

  • PDF

Generation of Zero Pronouns using Center Transition of Preceding Utterances (선행 발화의 중심 전이를 이용한 영형 생성)

  • Roh, Ji-Eun;Na, Seung-Hoon;Lee, Jong-Hyeok
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.10
    • /
    • pp.990-1002
    • /
    • 2005
  • To generate coherent texts, it is important to produce appropriate pronouns to refer to previously-mentioned things in a discourse. Specifically, we focus on pronominalization by zero pronouns which frequently occur in Korean. This paper investigates zero pronouns in Korean based on the cost-based centering theory, especially focusing on the center transitions of adjacent utterances. In previous centering works, only one type of nominal entity has been considered as the target of pronominalization, even though other entities are frequently pronominalized as zero pronouns. To resolve this problem, and explain the reference phenomena of real texts, four types of nominal entity (Npair, Ninter, Nintra, and Nnon) from centering theory are defined with the concept of inter-, intra-, and pairwise salience. For each entity type, a case study of zero phenomena is performed through analyzing corpus and building a pronominalization model. This study shows that the zero phenomena of entities which have been neglected in previous centering works are explained via the renter transition of the second previous utterance. We also show that in Ninter, Nintra, and Nnon, pronominalization accuracy achieved by complex combination of several types of features is completely or nearly achieved by using the second previous utterance's transition across genres.

A Semi-automatic Construction method of a Named Entity Dictionary Based on Wikipedia (위키피디아 기반 개체명 사전 반자동 구축 방법)

  • Song, Yeongkil;Jeong, Seokwon;Kim, Harksoo
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1397-1403
    • /
    • 2015
  • A named entity(NE) dictionary is an important resource for the performance of NE recognition. However, it is not easy to construct a NE dictionary manually since human annotation is time consuming and labor-intensive. To save construction time and reduce human labor, we propose a semi-automatic system for the construction of a NE dictionary. The proposed system constructs a pseudo-document with Wiki-categories per NE class by using an active learning technique. Then, it calculates similarities between Wiki entries and pseudo-documents using the BM25 model, a well-known information retrieval model. Finally, it classifies each Wiki entry into NE classes based on similarities. In experiments with three different types of NE class sets, the proposed system showed high performance(macro-average F1-score of 0.9028 and micro-average F1-score 0.9554).

Enhancing Expressiveness of Conceptual Modeling for Bibliographic Relationships - A Reflection on the FRBR Entity-Relationship Model - (공통기술표현포맷에 기반한 다매체자료의 검색효율 향상에 관한 연구)

  • Choi, Yun-Seon;Renear, Allen
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.4 s.62
    • /
    • pp.5-15
    • /
    • 2006
  • The Functional Requirements for Bibliographic Records (FRBR) is a 'conceptual model of the bibliographic universe' developed by the International Federation of Library Associations and Institutions (IFLA). Although some studies have suggested improvements in FRBR, and others explore alternative approaches, less attention has been paid to analyzing the internal coherence and consistency of the FRBR view as presented not only in the FRBR entity-relationship model and text of the FRBR document, but also in the related explanations and presentations of FRBR expositors. Our investigations have noted some interesting discrepancies between the general FRBR approach as presented in various expository documents and the specific account presented in the FRBR ER model and the FRBR document. We see that in one case these discrepancies can be easily remedied by adding additional modeling constructs and assertions, but in another case (the supposed 'inheritance' of attributes across the Group 1 entities), there is a substantial difficulty in maintaining a consistent model. We discuss several alternative approaches to enhancing the expressiveness of FRBR in order remedy this problem. We note that none is entirely satisfactory.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

Morphological optimization of process parameters of randomly oriented carbon/carbon composite

  • Raunija, Thakur Sudesh Kumar;Manwatkar, Sushant Krunal;Sharma, Sharad Chandra;Verma, Anil
    • Carbon letters
    • /
    • v.15 no.1
    • /
    • pp.25-31
    • /
    • 2014
  • A microstructure analysis is carried out to optimize the process parameters of a randomly oriented discrete length hybrid carbon fiber reinforced carbon matrix composite. The composite is fabricated by moulding of a slurry into a preform, followed by hot-pressing and carbonization. Heating rates of 0.1, 0.2, 0.3, 0.5, 1, and $3.3^{\circ}C/min$ and pressures of 5, 10, 15, and 20 MPa are applied during hot-pressing. Matrix precursor to reinforcement weight ratios of 70:30, 50:50, and 30:70 are also considered. A microstructure analysis of the carbon/carbon compacts is performed for each variant. Higher heating rates give bloated compacts whereas low heating rates give bloating-free, fine microstructure compacts. The compacts fabricated at higher pressure have displayed side oozing of molten pitch and discrete length carbon fibers. The microstructure of the compacts fabricated at low pressure shows a lack of densification. The compacts with low matrix precursor to reinforcement weight ratios have insufficient bonding agent to bind the reinforcement whereas the higher matrix precursor to reinforcement weight ratio results in a plaster-like structure. Based on the microstructure analysis, a heating rate of $0.2^{\circ}C/min$, pressure of 15 MPa, and a matrix precursor to reinforcement ratio of 50:50 are found to be optimum w.r.t attaining bloating-free densification and processing time.

A Study on the Ownership and Governance Structure of Fisheries Cooperative (수산업협동조합의 소유지배구조에 관한 연구)

  • 남수현
    • The Journal of Fisheries Business Administration
    • /
    • v.33 no.2
    • /
    • pp.99-125
    • /
    • 2002
  • Fisheries cooperative requires dual characteristics in performing its original function. Economic characteristic as an business enterprise and democratic characteristic as cooperative entity need to complete its objectives and survive in the complex rapidly-changing environment. After IMF crisis, fisheries cooperative received enormous government's financial support and credit-business department is perfectly under government's control. Regional fisheries cooperative also faces business failure, therefore pure cooperative movement can't save the fisheries cooperative. Economic characteristic as an business enterprise is more emphasized than democratic characteristic as cooperative entity in recent years. The theory of corporate ownership and governance can be applied to explain the ownership and governance of fisheries cooperative because fisheries cooperative is now similar to an business enterprise. During the IMF crisis the board, the auditors and the minority shareholders in business enterprise were revealed to be powerless against the mighty influence of controlling shareholders. Unconstrained discretion exercised by those controlling shareholders not only led to the firms'insolvency, but also brought down the country's financial system. During the past few years, Korea has experienced many institutional changes regarding its corporate governance structure. The introduction of outside directors, the strengthening of minority shareholders' rights, and enhanced accounting transparency are achieved to improve the efficiency of economic system. Investors, including institutional and individual, also seem to be more aware of governance issues now. Credit-business department of fisheries cooperative is recommended to introduce the institutions same as the case of the corporate governance structure. Fisheries cooperative except economic and credit-business department requires other prescriptions because it is emphasized as democratic cooperative entity. But we should be careful to interpret the ownership and governance structure because they are products of nations, eras and organizations.

  • PDF

Hierarchical Power Management Architecture and Optimal Local Control Policy for Energy Efficient Networks

  • Wei, Yifei;Wang, Xiaojun;Fialho, Leonardo;Bruschi, Roberto;Ormond, Olga;Collier, Martin
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.540-550
    • /
    • 2016
  • Since energy efficiency has become a significant concern for network infrastructure, next-generation network devices are expected to have embedded advanced power management capabilities. However, how to effectively exploit the green capabilities is still a big challenge, especially given the high heterogeneity of devices and their internal architectures. In this paper, we introduce a hierarchical power management architecture (HPMA) which represents physical components whose power can be monitored and controlled at various levels of a device as entities. We use energy aware state (EAS) as the power management setting mode of each device entity. The power policy controller is capable of getting information on how many EASes of the entity are manageable inside a device, and setting a certain EAS configuration for the entity. We propose the optimal local control policy which aims to minimize the router power consumption while meeting the performance constraints. A first-order Markov chain is used to model the statistical features of the network traffic load. The dynamic EAS configuration problem is formulated as a Markov decision process and solved using a dynamic programming algorithm. In addition, we demonstrate a reference implementation of the HPMA and EAS concept in a NetFPGA frequency scaled router which has the ability of toggling among five operating frequency options and/or turning off unused Ethernet ports.

HyperCerts : Privacy-Enhanced OTP-Based Educational Certificate Blockchian System (HyperCerts : 개인정보를 고려한 OTP 기반 디지털 졸업장 블록체인 시스템)

  • Jung, Seung Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.987-997
    • /
    • 2018
  • Blockchain has tamper-free, so many applications are developing to leverage tamper-free features of blockchain. MIT Media Labs proposed BlockCerts, educational certificate blockchain System, to solve problems of legacy certificate verifications. Existing educational certificate blockchain Systems are based on public blockchain such as bitcoin, Ethereum, so any entity can participate educational institute in principal. Moreover, the exisitng educational certricate blockchain system utilizes the integrity of blockchain, but the confidentiality of the educational certificate is not provided. This paper propose a digital certificate system based on private blockchain, name HyperCerts. Therefore, only trusted entity can participate in the private blockchain network, Hyperledger, as the issuer of digital certificate. Furthermore, the practical byzantine fault tolerance is used as consensus algorithm, HyperCerts reduce dramatically the latency of issuing digital certificate and required computing power. HyperCerts stores the hash value of digital certificate into the ledger, so breach of personal information by malicious entity in the private blockchain is protected.