• Title/Summary/Keyword: Event Patterns

Search Result 305, Processing Time 0.023 seconds

Identifying the Patterns of Adverse Drug Responses of Cetuximab

  • Park, Ji Hyun
    • Korean Journal of Clinical Pharmacy
    • /
    • v.32 no.3
    • /
    • pp.226-237
    • /
    • 2022
  • Background: Monoclonal antibodies for the treatment of patients with different types of cancer, such as cetuximab, have been widely used for the past 10 years in oncology. Although drug information package insert contains some representative adverse events which were observed in the clinical trials for drug approval, the overall adverse event patterns on the real-world cetuximab use were less investigated. Also, there have been no published papers that deal with the full spectrums of adverse drug events of cetuximab using national-wide drug safety surveillance systems. Methods: In this study, we detected new adverse event signals of cetuximab in the Korea Adverse Event Reporting System (KAERS) by utilizing proportional reporting ratios, reporting odds ratios, and information components indices. Results: The KAERS database included 869,819 spontaneous adverse event reports, among which 2,116 reports contained cetuximab. We compared the labels of cetuximab among the United States, European Union, Australia, Japan, and Korea to compare the current labeling information and newly detected signals of our study. Some of the signals including hyperkeratosis, tenesmus, folliculitis, esophagitis, neuralgia, disseminated intravascular coagulopathy, and skin/throat tightness were not labeled in the five countries. Conclusion: We identified new signals that were not known at the time of market approval.

Efficient Sequence Pattern Mining Technique for the Removal of Ambiguity in the Interval Patterns Mining (인터벌 패턴 마이닝에서 모호성 제거를 위한 효율적인 순차 패턴 마이닝 기법)

  • Kim, Hwan;Choi, Pilsun;Kim, Daein;Hwang, Buhyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.565-570
    • /
    • 2013
  • Previous researches on mining sequential patterns mainly focused on discovering patterns from the point-based event. Interval events with a time interval occur in the real world that have the start and end point. Existing interval pattern mining methods that discover relationships among interval events based on the Allen operators have some problems. These are that interval patterns having three or more interval events can be interpreted as several meanings. In this paper, we propose the I_TPrefixSpan algorithm, which is an efficient sequence pattern mining technique for removing ambiguity in the Interval Patterns Mining. The proposed algorithm generates event sequences that have no ambiguity. Therefore, the size of generated candidate set can be minimized by searching sequential pattern mining entries that exist only in the event sequence. The performance evaluation shows that the proposed method is more efficient than existing methods.

Correlation Analysis of Event Logs for System Fault Detection (시스템 결함 분석을 위한 이벤트 로그 연관성에 관한 연구)

  • Park, Ju-Won;Kim, Eunhye;Yeom, Jaekeun;Kim, Sungho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.129-137
    • /
    • 2016
  • To identify the cause of the error and maintain the health of system, an administrator usually analyzes event log data since it contains useful information to infer the cause of the error. However, because today's systems are huge and complex, it is almost impossible for administrators to manually analyze event log files to identify the cause of an error. In particular, as OpenStack, which is being widely used as cloud management system, operates with various service modules being linked to multiple servers, it is hard to access each node and analyze event log messages for each service module in the case of an error. For this, in this paper, we propose a novel message-based log analysis method that enables the administrator to find the cause of an error quickly. Specifically, the proposed method 1) consolidates event log data generated from system level and application service level, 2) clusters the consolidated data based on messages, and 3) analyzes interrelations among message groups in order to promptly identify the cause of a system error. This study has great significance in the following three aspects. First, the root cause of the error can be identified by collecting event logs of both system level and application service level and analyzing interrelations among the logs. Second, administrators do not need to classify messages for training since unsupervised learning of event log messages is applied. Third, using Dynamic Time Warping, an algorithm for measuring similarity of dynamic patterns over time increases accuracy of analysis on patterns generated from distributed system in which time synchronization is not exactly consistent.

Development of an Event Stream Processing System for the Vehicle Telematics Environment

  • Kim, Jong-Ik;Kwon, Oh-Cheon;Kim, Hyun-Suk
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.463-465
    • /
    • 2009
  • In this letter, we present an event stream processing system that can evaluate a pattern query for a data sequence with predicates. We propose a pattern query language and develop a pattern query processing system. In our system, we propose novel techniques for run-time aggregation and negation processing and apply our system to stream data generated from vehicles to monitor unusual driving patterns.

Discovering Redo-Activities and Performers' Involvements from XES-Formatted Workflow Process Enactment Event Logs

  • Pham, Dinh-Lam;Ahn, Hyun;Kim, Kwanghoon Pio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4108-4122
    • /
    • 2019
  • Workflow process mining is becoming a more and more valuable activity in workflow-supported enterprises, and through which it is possible to achieve the high levels of qualitative business goals in terms of improving the effectiveness and efficiency of the workflow-supported information systems, increasing their operational performances, reducing their completion times with minimizing redundancy times, and saving their managerial costs. One of the critical challenges in the workflow process mining activity is to devise a reasonable approach to discover and recognize the bottleneck points of workflow process models from their enactment event histories. We have intuitively realized the fact that the iterative process pattern of redo-activities ought to have the high possibility of becoming a bottleneck point of a workflow process model. Hence, we, in this paper, propose an algorithmic approach and its implementation to discover the redo-activities and their performers' involvements patterns from workflow process enactment event logs. Additionally, we carry out a series of experimental analyses by applying the implemented algorithm to four datasets of workflow process enactment event logs released from the BPI Challenges. Finally, those discovered redo-activities and their performers' involvements patterns are visualized in a graphical form of information control nets as well as a tabular form of the involvement percentages, respectively.

Power Saving Scheme by Distinguishing Traffic Patterns for Event-Driven IoT Applications

  • Luan, Shenji;Bao, Jianrong;Liu, Chao;Li, Jie;Zhu, Deqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1123-1140
    • /
    • 2019
  • Many Internet of Things (IoT) applications involving bursty traffic have emerged recently with event detection. A power management scheme qualified for uplink bursty traffic (PM-UBT) is proposed by distinguishing between bursty and general uplink traffic patterns in the IEEE 802.11 standard to balance energy consumption and uplink latency, especially for stations with limited power and constrained buffer size. The proposed PM-UBT allows a station to transmit an uplink bursty frame immediately regardless of the state. Only when the sleep timer expires can the station send uplink general traffic and receive all downlink frames from the access point. The optimization problem (OP) for PM-UBT is power consumption minimization under a constrained buffer size at the station. This OP can be solved effectively by the bisection method, which demonstrates a performance similar to that of exhaustive search but with less computational complexity. Simulation results show that when the frame arrival rate in a station is between 5 and 100 frame/second, PM-UBT can save approximately 5 mW to 30 mW of power compared with an existing power management scheme. Therefore, the proposed power management strategy can be used efficiently for delay-intolerant uplink traffic in event-driven IoT applications, such as health status monitoring and environmental surveillance.

Named Entity and Event Annotation Tool for Cultural Heritage Information Corpus Construction (문화유산정보 말뭉치 구축을 위한 개체명 및 이벤트 부착 도구)

  • Choi, Ji-Ye;Kim, Myung-Keun;Park, So-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.29-38
    • /
    • 2012
  • In this paper, we propose a named entity and event annotation tool for cultural heritage information corpus construction. Focusing on time, location, person, and event suitable for cultural heritage information management, the annotator writes the named entities and events with the proposed tool. In order to easily annotate the named entities and the events, the proposed tool automatically annotates the location information such as the line number or the word number, and shows the corresponding string, formatted as both bold and italic, in the raw text. For the purpose of reducing the costs of the manual annotation, the proposed tool utilizes the patterns to automatically recognize the named entities. Considering the very little training corpus, the proposed tool extracts simple rule patterns. To avoid error propagation, the proposed patterns are extracted from the raw text without any additional process. Experimental results show that the proposed tool reduces more than half of the manual annotation costs.

Analyzing and Forecating of Event Visitation :Applicaton of Bass'Model of Diffusion Process (배스의 확산모형을 이용한 이벤트 방문수요 상측에 관한 연구)

  • 엄서호
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.26 no.1
    • /
    • pp.51-58
    • /
    • 1998
  • The opening of an event in a given geographical area may be defined as an innovation. Visitors to the event adopt the innovation; therefore, their visitation patterns since the opening can be regarded as a diffusion process. Bass' model of diffusion process was applied to analyzing weekly visitation of Kwang-ju Viennale. Parameters of the Bass' model were estimated by regression analysis, and then reviewed in terms of applicability. Actual estimation of event visitation was implemented by calculation of the three parameters of the model based on the actual data. After comparing estimated value with actual value, it was concluded that Bass' model is applicable to estimating event visitation as far as it is the only prediction method available at this point.

  • PDF

The Bending Strength and Acoustic Emissions Properties of Sloped Finger-Jointed Rhus Verniciflua (옻나무 경사핑거접합재의 휨강도와 AE 특성)

  • 변희섭;김사익
    • Journal of the Korea Furniture Society
    • /
    • v.10 no.2
    • /
    • pp.73-78
    • /
    • 1999
  • This paper describes the relationship between the bending strength properties of sloped finger-jointed woods and the acoustic emissions(AEs) generated during the test. Rhus verniciflua pieces were cut in sloped-finger types and glued with three kinds of adhesives(polyvinyl acetate, polyvinyl-acryl acetate and oilic urethane resin). The slope ratios of finger joints were 0, 1.0, 1.5, and 2.0. The AE cumulative event count and cumulative count were measured during the bending test. The results were as follows: The lower the bending strength(load) was, the generation time of AE event count got and the higher the increasing rate of AE event count became in the sloped finger-jointed specimens bonded with polyvinyl acetate, polyvinyl-acryl acetate oilic urethane resin adhesives. Therefore, the slope from load-AE cumulative event count was very steep. The patterns of AE event count and count were very similar. The relationship between the MOR and the AE parameter from load and AE cumulatve event count in the early stage of the sloped finger-jointed specimens bonded with polyvinyl acetate, polyvinyl-acryl and oilic urethane resin adhesives was much greater than that between the MOE and the MOR. Therefore, the AE signals obtained during bending test are useful for estimating the strength of sloped finger-jointed Rhus verniciflua specimens.

  • PDF

A Rate Control Scheme Considering Congestion Patterns in Wireless Sensor Networks (무선 센서 네트워크에서 혼잡 패턴을 고려한 전송률 조절 기법)

  • Kang, Kyung-Hyun;Chung, Kwang-Sue
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1229-1233
    • /
    • 2010
  • In event-driven wireless sensor networks, network congestion occurs when event data, which have higher transmission rates than periodic sensing data, arc forwarded to bottleneck links. As the congestion continues, congestion collapse is triggered, so most of packets from source nodes are failed to transmit to a sink node. Rate control schemes can be a solution for preventing the congestion collapse problem. In this paper, a rate control scheme that each node controls child node's data rate based on congestion patterns is proposed. Experiments show that the proposed scheme effectively controls network congestion and successfully transmits more event data packets to a sink node than existing rate control schemes.