• Title/Summary/Keyword: Entity-based

Search Result 761, Processing Time 0.035 seconds

Highlights of the 2023 Bethesda System for Reporting Thyroid Cytopathology, 3rd Edition (갑상선 세침흡인세포검사 2023년 베데스다 시스템, 3판의 하이라이트)

  • Dong Eun Song
    • Korean Journal of Head & Neck Oncology
    • /
    • v.40 no.1
    • /
    • pp.1-5
    • /
    • 2024
  • The Bethesda System for Reporting Thyroid Cytopathology (TBSRCT) is crucial for cytopathologists to use a standardized, category-based reporting system for thyroid fine needle aspirations and is effective for clear communication with the referring physicians. The new Bethesda System for Reporting Thyroid Cytopathology, the third edition in 2023, provides several key updates. The most important update is the assignment of only single name for each of the six diagnostic categories: (I) nondiagnostic; (II) benign; (III) atypia of undetermined significance; (IV) follicular neoplasm; (V) suspicious for malignancy; and (VI) malignant. An implied risk of malignancy (ROM) for each of six categories has been updated based on extensively published data since the second edition of TBSRTC in 2017 and offers both an average ROM for each category and the expected range of cancer risk. Estimated final ROM after excluding "Noninvasive Follicular Thyroid Neoplasm with Papillary Like Nuclear Features (NIFTP)" for each of six categories has been updated based on the reported mean decreases in the ROM if excluding NIFTP. For atypia of undetermined significance (AUS) category, the subcategorization is simplified and more formalized into 2 subgroups, AUS-nuclear atypia or AUS-other, based on the implied ROM and molecular profiling. For the pediatric thyroid disease, pediatric ROMs and management algorithms are newly added for the same six reporting categories for this age group. New or revised disease nomenclatures including high-grade follicular-derived carcinoma has been updated according to the recently published 2022 World Health Organization Classification of Thyroid Neoplasms. Brand new two chapters are added including clinical perspectives and imaging studies (Chap. 13) and the use of molecular and other ancillary tests (Chap. 14). The atlas is updated with new images to illustrate more effectively for new disease entity and diagnostic criteria.

A Study on Development in Metadata Framework for Internet Information Service (인터넷 정보서비스를 위한 메타데이터 프레임워크 개발에 관한 연구)

  • 황상규;윤세진;오경묵
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.2
    • /
    • pp.159-179
    • /
    • 2002
  • The Dublin Core, MARC. IFLA-FRBR user communities are developing international standards for describing textual, physical and audiovisual resources to enable their resources discovery over the Internet. Therefore the metadata interoperability Problem has been exacerbated by the need for more complex metadata descriptions. In this paper we propose a new mechanism for metadata interoperability based on the new semantic web applications : IFLA-FRBR framework, INDECS metadata and an event-aware ABC models. This study introduces a new approach method which is essential to the generation of interoperable metadata descriptions, particularly in the context of multimedia contents.

Technical Entity Recognition System based on Distributed Parallel Processing (분산병렬처리 기반 기술개체 인식 시스템)

  • Choi, Yun-Soo;Lee, Won-Goo;Lee, Min-Ho;Choi, Dong-Hoon;Yoon, Hwa-Mook;Cho, Min-Hee;Jeong, Han-Min
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.242-244
    • /
    • 2012
  • 과학기술 문헌의 기술개체 인식에 관한 연구는 정보추출, 텍스트마이닝, 질의응답 분야 등의 선행 연구로서 다양한 통계적 방법론을 사용하여 기술개체 인식 정확률을 향상시키기 위해 연구되어 왔다. 하지만 기존의 연구는 단일-코어 또는 단일 머신 상에서 수행되었기 때문에, 폭발적으로 증가하는 문헌들에 대한 실시간 분석 요구를 처리할 수 없는 상황에 직면하고 있다. 이에 본 논문에서는 기술개체를 인식하는 과정에서 병목현상이 발생하는 작업을 "후보개체 추출 과정"의 언어처리 부분과 "개체 가중치 할당 과정"에서 통계정보를 취합하는 부분으로 분류하고, 각 작업을 하둡의 맵 작업과 리듀스 작업을 이용하여 해결하는 분산 병렬 처리 기반의 기술개체 인식 방법에 대해 살펴보고자 한다.

A Scheme to Categorize Ubiquitous Sensor Network Services and Their Practical Issues (유비쿼터스 센서네트워크 서비스 분류 기법 및 상용화 이슈)

  • Eun, Seongbae;So, Sun Sup;Chae, Yigeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.3
    • /
    • pp.202-208
    • /
    • 2007
  • Recently, a lot of research have been studied to apply wireless sensor networks to USN applications. The characteristics of USN applications is that they are varied according to the sort of sensors and sensing objects. They includes military applications, water pollusion monitoring, intelligent traffic system, farm, logistics, location position applications, and so on. There is no traditional method to classify these applications. In this paper, we propose a taxonomy scheme to classify USN applications. The criteria is based on 3 properties, the criticalness of services, the mobility of sensing entity, and the mobility of sensed objects, to classify them into 8 groups. We also describe the technical issues and related works in them. Our taxonomy can make USN applications to be easily understood and memorized.

  • PDF

Syllables-based Named Entity Extraction and Automatic Corpus Construction using Bidirectional Dynamic LST (Bidirectional Dynamic LSTM 을 이용한 음절 단위 개체명 추출 및 자동화된 말뭉치 구축)

  • Oh, Sungsik;Lim, Changdae;Ahn, Keeho;Park, Weijin
    • Annual Conference on Human and Language Technology
    • /
    • 2017.10a
    • /
    • pp.317-320
    • /
    • 2017
  • 개체명 인식은 자연어 문장에서 장소, 제작물, 사람 등 분류를 통한 의미 부여가 가능한 단어를 파악하는 기술로서 의미 분석을 위한 핵심 기술이다. 현재 많은 개체명 분석 관련 연구들은 형태소 분석 결과에 의존적인 형태를 갖고 있어서, 형태소 분석 결과의 정확성이 개체명 분석 결과의 성능에 영향을 미치고 있다. 본 연구에서는 형태소 분석 과정을 거치지 않는 음절 기반의 개체명 분석 기술을 제안하여 형태소 분석의 정확도가 낮은 통신어, 신조어 분석 성능을 향상하였다. 또한, 자동화된 방법으로 음절 단위 개체명 말뭉치 및 개체명 사전을 구축하는 프로세스를 정의하여 개체명 분석의 정확도 향상 및 인지 범주의 확대를 도모하였다. 본 연구에서 제안한 개체명 인식 기술은 한국어 개체명 표준에 기반한 129가지의 개체명 분류가 가능하며, 이는 자연어 처리 기술이 필요한 산업계에서 상용화하는데 큰 기여를 할 것으로 판단된다.

  • PDF

Simulation Methodology for Automation of Port Systems : Example of Container Terminal (항만 시스템의 자동화를 위한 시뮬레이션 방법론 : 컨테이너 터미널의 예)

  • Lee, Jang-Se
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.1
    • /
    • pp.154-162
    • /
    • 2010
  • A simulation technique is very useful method to analyze the performance on various engineering area. To automate port systems, we have need of simulation to analyze an effect of assigning and operating devices. Thus we propose simulation methodology to be applied to an analysis, evaluation, planning for port automation. To do this, we have adopted the discrete event system specification based system entity structure / model base framework for modeling and simulation environment. We have performed modeling and simulation on entities of port systems such as container crane, yard tractor, transfer crane, etc. The proposed methodology has an advantage being able to effectively simulate on alternatives of composition and operation strategy for port systems. Some case studies will show the validity of proposed simulation methodology.

RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates (타원곡선 좌표계를 이용한 RFID 다중객체 간 인증 암호기법)

  • Kim, Sung-Jin;Park, Seok-Cheon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.43-50
    • /
    • 2008
  • Authenticated Encryption scheme in RFID system is the important issue for ID security. But, implementing authenticated Encryption scheme in RFID systems is not an easy proposition and systems are often delivered for reasons of complexity, limited resources, or implementation, fail to deliver required levels of security. RFID system is so frequently limited by memory, performance (or required number of gates) and by power drain, that lower levels of security are installed than required to protect the information. In this paper, we design a new authenticated encryption scheme based on the EC(Elliptic Curve)'s x-coordinates and scalar operation. Our scheme will be offers enhanced security feature in RFID system with respect to user privacy against illegal attack allowing a ECC point addition and doubling operation.

  • PDF

Self-weighted Decentralized Cooperative Spectrum Sensing Based On Notification for Hidden Primary User Detection in SANET-CR Network

  • Huang, Yan;Hui, Bing;Su, Xin;Chang, KyungHi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2561-2576
    • /
    • 2013
  • The ship ad-hoc network (SANET) extends the coverage of the high data-rate terrestrial communications to the ships with the reduced cost in maritime communications. Cognitive radio (CR) has the ability of sensing the radio environment and dynamically reconfiguring the operating parameters, which can make SANET utilize the spectrum efficiently. However, due to the dynamic topology nature and no central entity for data fusion in SANET, the interference brought into the primary network caused by the hidden primary user requires to be carefully managed by a sort of decentralized cooperative spectrum sensing schemes. In this paper, we propose a self-weighted decentralized cooperative spectrum sensing (SWDCSS) scheme to solve such a problem. The analytical and simulation results show that the proposed SWDCSS scheme is reliable to detect the primary user in SANET. As a result, secondary network can efficiently utilize the spectrum band of primary network with little interference to primary network. Referring the complementary receiver operating characteristic (ROC) curves, we observe that with a given false alarm probability, our proposed algorithm reduces the missing probability by 27% than the traditional embedded spectrally agile radio protocol for evacuation (ESCAPE) algorithm in the best condition.

A User Anonymous Mutual Authentication Protocol

  • Kumari, Saru;Li, Xiong;Wu, Fan;Das, Ashok Kumar;Odelu, Vanga;Khan, Muhammad Khurram
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4508-4528
    • /
    • 2016
  • Widespread use of wireless networks has drawn attention to ascertain confidential communication and proper authentication of an entity before granting access to services over insecure channels. Recently, Truong et al. proposed a modified dynamic ID-based authentication scheme which they claimed to resist smart-card-theft attack. Nevertheless, we find that their scheme is prone to smart-card-theft attack contrary to the author's claim. Besides, anyone can impersonate the user as well as service provider server and can breach the confidentiality of communication by merely eavesdropping the login request and server's reply message from the network. We also notice that the scheme does not impart user anonymity and forward secrecy. Therefore, we present another authentication scheme keeping apart the threats encountered in the design of Truong et al.'s scheme. We also prove the security of the proposed scheme with the help of widespread BAN (Burrows, Abadi and Needham) Logic.

Development of a Diagnosis System far CAD Model Errors using OpenCASCADE (OpenCASCADE를 이용한 CAD 모델의 오류 진단 시스템의 개발)

  • Yang, Jeong-Sam;Han, Soon-Hung;Choi, Yong;Park, Sang-Ho
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.10 no.3
    • /
    • pp.151-158
    • /
    • 2002
  • Automotive engineers involved in a new car project use various CAD systems that are chosen based on work requirements. For example, engineers in Hyundai Motors are using Pro/Designer and Alias fur the style design, but they use CATIA to design parts and assemblies, ANSYS for FEM analysis, and Pro/Engineer to design engines. Because they use different CAD systems, they have difficulties in collaborative design. Data, which contains errors, is transferred between CAD systems. It is difficult to find out such errors in a large CAD model. An evaluation method for CAD models has been developed in this study. This diagnosis tool analyses a STEP or an IGES file generated from a CAD system, and produces a quantitative error report. The tool has been tested with actual data sets. This paper proposes an algorithm that produces mathematical error values of entities of IGES models that have geometrical data, and entities of STEP models that have topological data, and inspects every part off model. To develop this system, we have used the OpenCASCADE kernel, which is an open source kernel developed by Matra Datavision of France.