• Title/Summary/Keyword: Programming method

Search Result 2,564, Processing Time 0.027 seconds

Development of Automated Region of Interest for the Evaluation of Renal Scintigraphy : Study on the Inter-operator Variability (신장 핵의학 영상의 정량적 분석을 위한 관심영역 자동설정 기능 개발 및 사용자별 분석결과의 변화도 감소효과 분석)

  • 이형구;송주영;서태석;최보영;신경섭
    • Progress in Medical Physics
    • /
    • v.12 no.1
    • /
    • pp.41-50
    • /
    • 2001
  • The quantification analysis of renal scintigraphy is strongly affected by the location, shape and size of region of interest(ROI). When ROIs are drawn manually, these ROIs are not reproducible due to the operators' subjective point of view, and may lead to inconsistent results even if the same data were analyzed. In this study, the effect of the ROI variation on the analysis of renal scintigraphy when the ROIs are drawn manually was investigated, and in order to obtain more consistent results, methods for automated ROI definition were developed and the results from the application of the developed methods were analyzed. Relative renal function, glomerular filtration rate and mean transit time were selected as clinical parameters for the analysis of the effect of ROI and the analysis tools were designed with the programming language of IDL5.2. To obtain renal scintigraphy, $^{99m}$Tc-DTPA was injected to the 11 adults of normal condition and to study the inter-operator variability, 9 researchers executed the analyses. The calculation of threshold using the gradient value of pixels and border tracing technique were used to define renal ROI and then the background ROI and aorta ROI were defined automatically considering anatomical information and pixel value. The automatic methods to define renal ROI were classified to 4 groups according to the exclusion of operator's subjectiveness. These automatic methods reduced the inter-operator variability remarkably in comparison with manual method and proved the effective tool to obtain reasonable and consistent results in analyzing the renal scintigraphy quantitatively.

  • PDF

PIRS : Personalized Information Retrieval System using Adaptive User Profiling and Real-time Filtering for Search Results (적응형 사용자 프로파일기법과 검색 결과에 대한 실시간 필터링을 이용한 개인화 정보검색 시스템)

  • Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.21-41
    • /
    • 2010
  • This paper proposes a system that can serve users with appropriate search results through real time filtering, and implemented adaptive user profiling based personalized information retrieval system(PIRS) using users' implicit feedbacks in order to deal with the problem of existing search systems such as Google or MSN that does not satisfy various user' personal search needs. One of the reasons that existing search systems hard to satisfy various user' personal needs is that it is not easy to recognize users' search intentions because of the uncertainty of search intentions. The uncertainty of search intentions means that users may want to different search results using the same query. For example, when a user inputs "java" query, the user may want to be retrieved "java" results as a computer programming language, a coffee of java, or a island of Indonesia. In other words, this uncertainty is due to ambiguity of search queries. Moreover, if the number of the used words for a query is fewer, this uncertainty will be more increased. Real-time filtering for search results returns only those results that belong to user-selected domain for a given query. Although it looks similar to a general directory search, it is different in that the search is executed for all web documents rather than sites, and each document in the search results is classified into the given domain in real time. By applying information filtering using real time directory classifying technology for search results to personalization, the number of delivering results to users is effectively decreased, and the satisfaction for the results is improved. In this paper, a user preference profile has a hierarchical structure, and consists of domains, used queries, and selected documents. Because the hierarchy structure of user preference profile can apply the context when users perfomed search, the structure is able to deal with the uncertainty of user intentions, when search is carried out, the intention may differ according to the context such as time or place for the same query. Furthermore, this structure is able to more effectively track web documents search behaviors of a user for each domain, and timely recognize the changes of user intentions. An IP address of each device was used to identify each user, and the user preference profile is continuously updated based on the observed user behaviors for search results. Also, we measured user satisfaction for search results by observing the user behaviors for the selected search result. Our proposed system automatically recognizes user preferences by using implicit feedbacks from users such as staying time on the selected search result and the exit condition from the page, and dynamically updates their preferences. Whenever search is performed by a user, our system finds the user preference profile for the given IP address, and if the file is not exist then a new user preference profile is created in the server, otherwise the file is updated with the transmitted information. If the file is not exist in the server, the system provides Google' results to users, and the reflection value is increased/decreased whenever user search. We carried out some experiments to evaluate the performance of adaptive user preference profile technique and real time filtering, and the results are satisfactory. According to our experimental results, participants are satisfied with average 4.7 documents in the top 10 search list by using adaptive user preference profile technique with real time filtering, and this result shows that our method outperforms Google's by 23.2%.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

The Reserch on Actual Condition of Crime of Arson Which Occurs in Korea and Its Countermeasures (방화범죄의 실태와 그 대책 - 관심도와 동기의 다양화에 대한 대응 -)

  • Choi, Jong-Tae
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.371-408
    • /
    • 1997
  • This article is the reserch on actual condition of crime of arson which occurs in Korea and its countermeasures. The the presented problem in this article are that (1) we have generally very low rate concern about the crime of arson contrary to realistic problems of rapid increase of crime of arson (2) as such criminal motives became so diverse as to the economic or criminal purpose unlike characteristic and mental deficiency of old days, and to countermeasure these problems effectively it presentation the necessity of systemantic research. Based on analysis of reality of arson, the tendency of this arson in Korea in the ratio of increase is said to be higher than those in violence crime or general fire rate. and further its rate is far more greater than those of the U.S.A. and Japan. Arson is considered to be a method of using fire as crime and in case of presently residence to be the abject, it is a public offense crime which aqccompany fatality in human life. This is the well It now fact to all of us. And further in order to presentation to the crime of arson, strictness of criminal law (criminal law No, 164 and 169, and fire protection law No. 110 and 111) and classification of arsonist as felony are institutionary reinforced to punish with certainty of possibility, Therefore, as tendency of arson has been increased compared to other nations, it is necessary to supplement strategical policy to bring out overall concerns of the seriousness of risk and damage of arson, which have been resulted from the lack of understanding. In characteristics analysis of crime of arson, (1) It is now reveald that, in the past such crime rate appeared far more within the boundary of town or city areas in the past, presently increased rate of arsons in rural areas are far more than in the town or small city areas, thereby showing characteristics of crime of arson extending nation wide. (2) general timetable of arson shows that night more than day time rate, and reveald that is trait behavior in secrecy.(3) arsonists are usually arrested at site or by victim or report of third person(82,9%).Investigation activities or self surrenders rate only 11.2%. The time span of arrest is normally the same day of arson and at times it takes more than one year to arrest. This reveals its necessity to prepare for long period of time for arrest, (4) age rate of arson is in their thirties mostly as compared to homicide, robbery and adultery, and considerable numbers of arsons are in old age of over fifties. It reveals age rate is increased (5) Over half of the arsonists are below the junior high school (6) the rate of convicts by thier records is based on first offenders primarily and secondly more than 4 time convicts. This apparently shows necessity of effective correctional education policy for their social assimilation together with re-investigation of human education at the primary and secondary education system in thier life. The examples of motivation for arosnits, such as personal animosity, fury, monetary swindle, luscious purpose and other aims of destroying of proof, and other social resistance, violence including ways of threatening, beside the motives of individual defects, are diverse and arsonic suicide and specifically suicidal accompany together keenly manifested. When we take this fact with the criminal theory, it really reveals arsons of crime are increasing and its casualities are serious and a point as a way of suicide is the anomie theory of Durkheim and comensurate with the theory of that of Merton, Specifically in the arson of industrial complex, it is revealed that one with revolutionary motive or revolting motive would do the arsonic act. For the policy of prevention of arsons, professional research work in organizational cooperation for preventive activities is conducted in municipal or city wise functions in the name of Parson Taskforces and beside a variety of research institutes in federal government have been operating effectively to countermeasure in many fields of research. Franch and Sweden beside the U.S. set up a overall operation of fire prevention research funtions and have obtained very successful result. Japan also put their research likewise for countermeasure. In this research as a way of preventive fire policy, first, it is necessary to accomodate the legal preventitive activities for fire prevention in judicial side and as an administrative side, (1) precise statistic management of crime of arson (2) establishment of professional research functions or a corporate (3) improvement of system for cooperative structural team for investigation of fires and menpower organization of professional members. Secondly, social mentality in individual prospect, recognition of fires by arson and youth education of such effect, educational program for development and practical promotion. Thirdly, in view of environmental side, the ways of actual performance by programming with the establishment of cooperative advancement in local social function elements with administrative office, habitants, school facilities and newspapers measures (2) establishment of personal protection where weak menpowers are displayed in special fire prevention measures. These measures are presented for prevention of crime of arson. The control of crime and prevention shall be prepared as a means of self defence by the principle of self responsibility Specifically arsonists usually aims at the comparatively weak control of fire prevention is prevalent and it is therefore necessary to prepare individual facilities with their spontaneous management of fire prevention instead of public municipal funtures of local geverment. As Clifford L. Karchmer asserted instead of concerns about who would commit arson, what portion of area would be the target of the arson. It is effective to minister spontaveously the fire prevention measure in his facility with the consideration of characteristics of arson. On the other hand, it is necessary for the concerned personnel of local goverment and groups to distribute to the local society in timely manner for new information about the fire prevention, thus contribute to effective result of fire prevention result. In consideration of these factors, it is inevitable to never let coincide with the phemonemon of arsons in similar or mimic features as recognized that these could prevail just an epedemic as a strong imitational attitude. In processing of policy to encounter these problems, it is necessary to place priority of city policy to enhancement of overall concerns toward the definitive essense of crime of arson.

  • PDF