• Title/Summary/Keyword: Physical File

Search Result 152, Processing Time 0.032 seconds

Deep Learning Frameworks for Cervical Mobilization Based on Website Images

  • Choi, Wansuk;Heo, Seoyoon
    • Journal of International Academy of Physical Therapy Research
    • /
    • v.12 no.1
    • /
    • pp.2261-2266
    • /
    • 2021
  • Background: Deep learning related research works on website medical images have been actively conducted in the field of health care, however, articles related to the musculoskeletal system have been introduced insufficiently, deep learning-based studies on classifying orthopedic manual therapy images would also just be entered. Objectives: To create a deep learning model that categorizes cervical mobilization images and establish a web application to find out its clinical utility. Design: Research and development. Methods: Three types of cervical mobilization images (central posteroanterior (CPA) mobilization, unilateral posteroanterior (UPA) mobilization, and anteroposterior (AP) mobilization) were obtained using functions of 'Download All Images' and a web crawler. Unnecessary images were filtered from 'Auslogics Duplicate File Finder' to obtain the final 144 data (CPA=62, UPA=46, AP=36). Training classified into 3 classes was conducted in Teachable Machine. The next procedures, the trained model source was uploaded to the web application cloud integrated development environment (https://ide.goorm.io/) and the frame was built. The trained model was tested in three environments: Teachable Machine File Upload (TMFU), Teachable Machine Webcam (TMW), and Web Service webcam (WSW). Results: In three environments (TMFU, TMW, WSW), the accuracy of CPA mobilization images was 81-96%. The accuracy of the UPA mobilization image was 43~94%, and the accuracy deviation was greater than that of CPA. The accuracy of the AP mobilization image was 65-75%, and the deviation was not large compared to the other groups. In the three environments, the average accuracy of CPA was 92%, and the accuracy of UPA and AP was similar up to 70%. Conclusion: This study suggests that training of images of orthopedic manual therapy using machine learning open software is possible, and that web applications made using this training model can be used clinically.

Development of Korean Male Body Model for Computational Dosimetry

  • Lee, Ae-Kyoung;Choi, Woo-Young;Chung, Min-Suk;Choi, Hyung-Do;Choi, Jae-Ick
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.107-110
    • /
    • 2006
  • The dimensions of the human body vary by age, sex, and race. The internal structure and outer dimensions of a body exposed to an electromagnetic field is important for accurate dosimetry. The average physical size of Korean adult males between the ages 18 to 24 was investigated, and a male volunteer was selected whose physical condition is within the physical standards, ${\pm}5%$. Magnetic resonance images and partially computerized tomography images of the volunteer were acquired. The intervals between the transverse images were 1 mm for the head and 3 mm for the rest of the body. About 30 different tissues were manually classified by an anatomist on the raw images, and the segmented images were implemented in the form of a text file appropriate for numerical formulation.

  • PDF

A Study of Transmission Structure for IP-based Digital Broadcast Systems (IP 기반 디지털 방송 시스템을 위한 전송 구조 연구)

  • Seo, Hyung-Yoon;Bae, Byungjun;Lim, Hyoungsoo;Huh, Jun-hwan;Kim, Jong-Deok
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.6
    • /
    • pp.430-435
    • /
    • 2015
  • IP-based, next generation digital broadcast systems transmit DASH segment files. Designed by the DASH system, DASH segment files provide variable quality of contents, while the size of DASH segment files varies even if the file has the same quality. Delays and inefficient use of resources are major challenges in the transmission of variable size DASH segment files in broadcasting systems. Traditional broadcasting transmission systems are designed according to characteristics of physical layer of broadcast, and thus, delay and inefficient resources use is difficult to find. Yet, transmission content quantities continue to rise in the next-generation broadcasting systems (e.g. FHD, UHD (4k, 8k)) with variability of the segments file size as well. Resources for next-generation broadcast are more abundant than traditional broadcast with recent development, but continue to be limited and fixed. Resource delay and inefficiency are important but has not been extensively studied. We propose a transmission structure solution to analyze the delay and efficiency of the resource as each DASH segment file is transmitted, and have further performed simulation studies.

The Windows Physical Memory Dump Explorer for Live Forensics (라이브 포렌식을 위한 윈도우즈 물리 메모리 분석 도구)

  • Han, Ji-Sung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.71-82
    • /
    • 2011
  • Live data in physical memory can be acquired by live forensics but not by harddisk file-system analysis. Therefore, in case of forensic investigation, live forensics is widely used these days. But, existing live forensic methods, that use command line tools in live system, have many weaknesses; for instance, it is not easy to re-analyze and results can be modified by malicious code. For these reasons, in this paper we explain the Windows kernel architecture and how to analyze physical memory dump files to complement weaknesses of traditional live forensics. And then, we design and implement the Physical Memory Dump Explorer, and prove the effectiveness of our tool through test results.

Effectiveness of Physical Exercises for VDT Operators (VDT 작업자를 위한 운동의 효과에 관한 연구)

  • Lee, K.S.;Waikar, A.M.;Oh, Y.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.16 no.1
    • /
    • pp.67-81
    • /
    • 1990
  • Effectiveness of physical exercise in reducing work-related musculoskeletal stress was investigated. This was compared to the stress alleviation accomplished by using ergonomically designed work station. Tasks chosen for the study were data entry and file maintenance on the video display terminal (VDT). Three different measures, namely root-mean-square (RMS) values of electromyogram (EMG), subjective rating and task performance were used for the evaluation. Electromyograms were recorded from the neck, the left and right trapezius muscles in the shoulder region, and L2/L3 region of the back. Subjects rated discomfort levels for the same parts of their body. Task performance was measured by recording typing speed and errors. Each of the five subjects was tested for two days (8 hours/day) in two different work stations. These were the ergonomically designed adjustable work station and the fixed work station of traditional design with no adjustable features. Assigned physical exercises were performed for four minutes, every two hours during the breaks, by the subjects while working in the fixed work station. It was concluded that the physical exercise could be helpful in reducing musculoskeletal stress as effectively as the ergonomic design of the VDT work station.

  • PDF

Persistent Page Table and File System Journaling Scheme for NVM Storage (비휘발성 메모리 저장장치를 위한 영속적 페이지 테이블 및 파일시스템 저널링 기법)

  • Ahn, Jae-hyeong;Hyun, Choul-seung;Lee, Dong-hee
    • Journal of IKEEE
    • /
    • v.23 no.1
    • /
    • pp.80-90
    • /
    • 2019
  • Even though Non-Volatile Memory (NVM) is used for data storage, a page table should be built to access data in it. And this observation leads us to the Persistent Page Table (PPT) scheme that keeps the page table in NVM persistently. By the way, processors have different page table structures and really operational page table cannot be built without virtual and physical addresses of NVM. However, those addresses are determined dynamically when NVM storage is attached to the system. Thus, the PPT should have system-independent and also address-independent structure and really working system-dependent page table should be built from the PPT. Moreover, entries of PPT should be updated atomically and, in this paper, we describe the design of PPT that meets those requirements. And we investigate how file systems can decrease the journaling overhead with the swap operation, which is a new operation created by the PPT. We modified the Ext4 file system in Linux and experiments conducted with Filebench workloads show that the swap operation enhances file system performance up to 60%.

Relational 데이타 모형을 구현하는 씨스템 설계

  • 趙廷完;嚴基賢 = Um Ki Hyun
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.4 no.2
    • /
    • pp.34-44
    • /
    • 1986
  • A data base system for a minicomputer, designed on the basis of the concept of Relational model, is proposed in this thesis. It is a module of reentrant programs, which can serve multi-users concurrently and interactivelv. Relational calculus is chosen as a data sublanguage. The inverted-list file structure is used for the physical storage structuse with the technique of seperating data and their relationships, while data model records, which contain the information of the logical data organization and linkage to a physical structure, con struct the data model. The retrieval is performed mainly with these.

UAV Path Creation Tool for Wildfire Reconnaissance in CPS Environment (CPS환경에서 산불 정찰을 위한 무인기 비행경로 생성 도구)

  • Ji-Won Jeong;Chang-Hui Bae;EuTeum Choi;SeongJin Lee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.6
    • /
    • pp.327-333
    • /
    • 2023
  • Existing studies on the UAV (Unmanned Aerial Vehicle)-based CPS (Cyber Physical System) environment lack forest fire monitoring and forest fire reconnaissance using real-world UAVs. So, it is necessary to monitor forest fires early through CPS based on real-world UAVs with high reliability and resource management efficiency. In this paper presents an MFG (Misstion File Generater) that automatically generates a flight path of an UAV for forest fire monitoring in a CPS environment. MFG generates flight paths based on a hiking trail with a high fire probability due to a true story of an entrant. We have confirmed that the flight path generated by MFG can be applied to the UAV. Also, we have verified that the UAV flies according to the flight path generated by MFG in simulation, with a negligible error rate.

A Transformation Method of Polygon Data for Visualization of Height Map in SEDRIS (SEDRIS에서 높이맵의 가시화를 위한 폴리곤 데이터 변환 방법)

  • Son, Hyun-Seung;Kim, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.135-140
    • /
    • 2015
  • The Cyber-Physical Systems (CPS) complexly perform modeling and simulation (M&S) for the various embedded systems. In this case, due to use diverse formatted models, we suggest to apply with the SEDRIS to systematically manage the different formatted data on M&S. The SEDRIS can reduce time and cost with reusing and interoperating environment data developed in the specific domain. To do this, we should input the data transformed the height map for terrain representation in a simulator into raster data of SEDRIS for which interoperate between the existed simulator and the SEDRIS. To solve the problem, we propose the transformation method to transfer the polygon data from RAW file used in terrain representation. With the proposed method, we can provide two advantages. First, it can possibly express the environment data into SEDRIS. Second, we can see the terrain like an image file through a viewer. Therefore, even non-expert easily constructs the terrain environment data.

Hardware Crypto-Core Based Authentication System (하드웨어 암호코어 기반 인증 시스템)

  • Yoo, Sang-Guun;Park, Keun-Young;Kim, Tae-Jun;Kim, Ju-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.1
    • /
    • pp.121-132
    • /
    • 2009
  • Default password protection used in operating systems have had many advances, but when the attacker has physical access to the server or gets root(administrator) privileges, the attacker can steal the password information(e.g. shadow file in Unix-like systems or SAM file in Windows), and using brute force and dictionary attacks can manage to obtain users' passwords. It is really difficult to obligate users to use complex passwords, so it is really common to find weak accounts to exploit. In this paper, we present a secure authentication scheme based on digital signatures and secure key storage that solves this problem, and explain the possible implementations using Trusted Platform Module(TPM). We also make a performance analysis of hardware and software TPMs inside implementations.