• Title/Summary/Keyword: software library

Search Result 501, Processing Time 0.035 seconds

Comparison of Differences in Subcortical between Men and Women in their Seventies (70대의 성별에 따른 피질하부 차이 비교)

  • Ahn, Beyung-Ju;Park, Hye-Mi;Kim, Joo-Yeon;Lee, Jeong-hwan
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.5
    • /
    • pp.585-595
    • /
    • 2020
  • Magnetic resonance imaging(MRI) has become an important technique for examining changes in human brain structure with neurological disorders. Brain development is a very complex process, and is affected by neurogenesiss and genetic programs. As age increases, structures of the brain change, which can contribute to the formation of brain diseases. Among the various factors, Gender is one of the greatest influential factors that affect the development of a healthy brain. The images were analyzed through various programs found in FSL such as SIENAX, FIRST, and Vertex analysis. Our results show that significant gender-related differences in subcortical areas were observed at the particular age group. The magnitude of these differences between gender and volume varied depending on the area investigated. In this study, we used more advanced 3T MRI for the structural analysis of subcortical structures between each gender. In addition, Vertex Analysis was used to visualize the volumetric differences in subcortical structures between each gender. This study is limited to groups in their 70s, therefore, further studies are needed for wider age groups.

Artificial Intelligence to forecast new nurse turnover rates in hospital (인공지능을 이용한 신규간호사 이직률 예측)

  • Choi, Ju-Hee;Park, Hye-Kyung;Park, Ji-Eun;Lee, Chang-Min;Choi, Byung-Gwan
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.431-440
    • /
    • 2018
  • In this study, authors predicted probability of resignation of newly employed nurses using TensorFlow, an open source software library for numerical computation and machine learning developed by Google, and suggested strategic human resources management plan. Data of 1,018 nurses who resigned between 2010 and 2017 in single university hospital were collected. After the order of data were randomly shuffled, 80% of total data were used for machine leaning and the remaining data were used for testing purpose. We utilized multiple neural network with one input layer, one output layer and 3 hidden layers. The machine-learning algorithm correctly predicted for 88.7% of resignation of nursing staff with in one year of employment and 79.8% of that within 3 years of employment. Most of resigned nurses were in their late 20s and 30s. Leading causes of resignation were marriage, childbirth, childcare and personal affairs. However, the most common cause of resignation of nursing staff with in one year of employment were maladaptation to the work and problems in interpersonal relationship.

Ciphering Scheme and Hardware Implementation for MPEG-based Image/Video Security (DCT-기반 영상/비디오 보안을 위한 암호화 기법 및 하드웨어 구현)

  • Park Sung-Ho;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.2 s.302
    • /
    • pp.27-36
    • /
    • 2005
  • This thesis proposed an effective encryption method for the DCT-based image/video contents and made it possible to operate in a high speed by implementing it as an optimized hardware. By considering the increase in the amount of the calculation in the image/video compression, reconstruction and encryption, an partial encryption was performed, in which only the important information (DC and DPCM coefficients) were selected as the data to be encrypted. As the result, the encryption cost decreased when all the original image was encrypted. As the encryption algorithm one of the multi-mode AES, DES, or SEED can be used. The proposed encryption method was implemented in software to be experimented with TM-5 for about 1,000 test images. From the result, it was verified that to induce the original image from the encrypted one is not possible. At that situation, the decrease in compression ratio was only $1.6\%$. The hardware encryption system implemented in Verilog-HDL was synthesized to find the gate-level circuit in the SynopsysTM design compiler with the Hynix $0.25{\mu}m$ CMOS Phantom-cell library. Timing simulation was performed by Verilog-XL from CadenceTM, which resulted in the stable operation in the frequency above 100MHz. Accordingly, the proposed encryption method and the implemented hardware are expected to be effectively used as a good solution for the end-to-end security which is considered as one of the important problems.

Genetic Variants of CYP2D6 Gene and Cancer Risk: A HuGE Systematic Review and Meta-analysis

  • Zhou, Li-Ping;Luan, Hong;Dong, Xi-Hua;Jin, Guo-Jiang;Man, Dong-Liang;Shang, Hong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.7
    • /
    • pp.3165-3172
    • /
    • 2012
  • Objective: Genetic polymorphisms in metabolic enzymes are associated with numerous cancers. A large number of single nucleotide polymorphisms (SNPs) in the CYP2D6 gene have been reported to associate with cancer susceptibility. However, the results are controversial. The aim of this Human Genome Epidemiology (HuGE) review and meta-analysis was to summarize the evidence for associations. Methods: Studies focusing on the relationship between CYP2D6 gene polymorphisms and susceptibility to cancer were selected from the Pubmed, Cochrane library, Embase, Web of Science, Springerlink, CNKI and CBM databases. Data were extracted by two independent reviewers and the meta-analysis was performed with Review Manager Version 5.1.6 and STATA Version 12.0 software. Odds ratios (ORs) with 95% confidence intervals (95%CIs) were calculated. Results: According to the inclusion criteria, forty-three studies with a total of 7,009 cancer cases and 9,646 healthy controls, were included in the meta-analysis. The results showed that there was a positive association between heterozygote (GC) of rs1135840 and cancer risk (OR=1.92, 95%CI: 1.14-3.21, P=0.01). In addition, we found that homozygote (CC) of rs1135840 might be a protective factor for cancer (OR=0.58, 95%CI: 0.34-0.97, P=0.04). Similarly, the G allele and G carrier (AG + GG) of rs16947 and heterozygote (A/del) of rs35742686 had negative associations with cancer risk (OR=0.69, 95%CI: 0.48-0.99, P=0.04; OR=0.60, 95%CI: 0.38-0.94, P=0.03; OR=0.50, 95%CI: 0.26-0.95, P=0.03; respectively). Conclusion: This meta-analysis suggests that CYP2D6 gene polymorphisms are involved in the pathogenesis of various cancers. The heterozygote (GC) of rs1135840 in CYP2D6 gene might increase the risk while the homozygote (CC) of rs1135840, G allele and G carrier (AG + GG) of rs16947 and heterozygote (A/del) of rs35742686 might be protective factors.

Risk of Breast Cancer and Total Malignancies in Rheumatoid Arthritis Patients Undergoing TNF-α Antagonist Therapy: a Meta-analysis of Randomized Control Trials

  • Liu, Yang;Fan, Wei;Chen, Hao;Yu, Ming-Xia
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.8
    • /
    • pp.3403-3410
    • /
    • 2014
  • Context: Interest exits in whether TNF-alpha antagonists increase the risk of breast cancer and total malignancies in patients with rheumatoid arthritis (RA). Objectives: To analyze the risk of malignancies, especially breast cancer, in patients with RA enrolled in randomized control trials (RCTs). Methods: A systematic literature search for RCTs from 1 January 1998 to 1 July 2013 from online databases, such as PubMed, WILEY, EMBASE, ISI web of knowledge and Cochrane Library was conducted. Studies included RCTs that compared the safety of at least one dose of the five TNF-${\alpha}$ antagonists with placebo or methotrexate (MTX) (or TNF-${\alpha}$ antagonists plus MTX vs placebo plus MTX) in RA patients for more than 24 weeks and imported all the references into document management software EndNote${\times}6$. Two independent reviewers selected studies and extracted the data about study design, patients' characteristics and the type, number of all malignancies. Results: 28 RCTs from 34 records with 11,741 patients were analyzed. Of the total, 97 developed at least one malignancy during the double-blind trials, and breast cancer was observed in 17 patients (17.5% of total malignancies). However, there was no statistically significant increased risk observed in either the per protocol (PP) model (OR 0.65, 95%CI [0.22, 1.93]) or the modified intention to treat (mITT) model (OR 0.75, 95%CI [0.25, 2.21]). There were also no significant trend for increased risk of total malignancies on anti-TNF-${\alpha}$ therapy administered at approved doses in either model (OR, 1.06, 95%CI [0.64, 1.75], and OR, 1.30, 95%CI [0.80, 2.14], respectively). As to the two models, modified intention to treat model analysis led to higher estimation than per protocol model analysis. Conclusions: This study did not find a significantly increased risk of breast cancer and total malignancies in adults RA patients treated with TNF-${\alpha}$ antagonists at approved doses. However, it cannot be ignored that more patients developed malignancies with TNF-${\alpha}$ antagonists therapy compared with patients with placebo or MTX, in spite of the lack of statistical significance, so that more strict clinical trials and long-term follow-up are needed, and both mITT and PP analyses should be used in such safety analyses.

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.

Effect of luteal phase support with vaginal progesterone on pregnancy outcomes in natural frozen embryo transfer cycles: A meta-analysis

  • Seol, Aeran;Shim, Yoo Jin;Kim, Sung Woo;Kim, Seul Ki;Lee, Jung Ryeol;Jee, Byung Chul;Suh, Chang Suk;Kim, Seok Hyun
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.47 no.2
    • /
    • pp.147-152
    • /
    • 2020
  • Objective: The purpose of this study was to determine the effect of vaginal progesterone for luteal phase support (LPS) on the clinical pregnancy rate (CPR) in natural frozen embryo transfer (FET) cycles via a meta-analysis. Methods: We performed a meta-analysis of randomized controlled trials (RCTs) and retrospective studies that met our selection criteria. Four online databases (PubMed, Embase, Medline, and the Cochrane Library) were searched between January 2017 and May 2017. Studies were selected according to predefined inclusion criteria and meta-analyzed using R software version 2.14.2. The main outcome measure was CPR. Results: A total of 18 studies were reviewed and assessed for eligibility. One RCT (n = 435) and three retrospective studies (n = 3,033) met the selection criteria. In a meta-analysis of the selected studies, we found no significant difference in the CPR (odds ratio [OR], 0.96; 95% confidence interval [CI], 0.60-1.55) between the vaginal progesterone and control groups. An analysis of the two retrospective cohort studies that reported the live birth rate (LBR) following FET showed a significantly higher LBR in the vaginal progesterone group (OR, 1.72; 95% CI, 1.21-2.46). A subgroup meta-analysis of FET conducted 5 days after injection of human chorionic gonadotropin showed no significant differences between the two groups with regard to the CPR (OR, 1.18; 95% CI, 0.90-1.55) or miscarriage rate (OR, 0.73; 95% CI, 0.36-1.47). Conclusion: The results of this meta-analysis of the currently available literature suggest that LPS with vaginal progesterone in natural FET cycles does not improve the CPR.

The Effect of Auricular Acupuncture for Obesity: A Systematic Review and Meta-analysis (비만치료에 대한 이침요법의 효과에 대한 고찰: 체계적 문헌고찰 및 메타분석)

  • Park, Seohyun;An, Sunjoo;Choi, Sunghwan;Kang, Shinwoo;Keum, Dongho
    • Journal of Korean Medicine for Obesity Research
    • /
    • v.20 no.1
    • /
    • pp.52-68
    • /
    • 2020
  • Objectives: The purpose of this study is to investigate the weight loss effects of auricular acupuncture in obese patients. Methods: Six databases (Research Information Sharing Service [RISS], Korean studies Information Service System [KISS], Oriental Medicine Advanced Searching Integrated System [OASIS], PubMed, The Cochrane Library, China National Knowledge Infrastructure [CNKI]) were searched up to May 20, 2020. Eight eligible randomized controlled trials were included the present study. The quality of included studies was assessed by the Cochrane risk of bias tool and a meta-analysis was performed by Review Manager software. A meta-analysis was conducted using a random-effects model and a subgroup analysis was performed to detect the sources of heterogeneity, identify the selection of acupuncture methods and explore its contributions to the weight loss effects. Results: Among 8 trials, 5 trials used auricular acupuncture and 2 trials used auricular acupressure, 1 trial used both types of intervention. Most commonly selected acupoints were Shenmen (TF4) and stomach (CO4). Treatment duration was six to twelve weeks, and total treatment session was six to twelve. Compared to the control groups, auricular acupuncture significantly decreased body weight, body mass index (BMI), high density lipoprotein-cholesterol (HDL) and ghrelin. For the selection of acupuncture methods, both methods performed similarly in most outcome except waist circumference (WC), body fat percentage (BFP), and triglycerides (TG). Conclusions: We found that auricular acupuncture can be effective for weight loss and controlling appetite. However, the findings should be interpreted with caution due to heterogeneity. So further vigorous and well-designed studies should be conducted to strengthen the evidence of the use of auricular acupuncture for obesity.

Similarity checking between XML tags through expanding synonym vector (유사어 벡터 확장을 통한 XML태그의 유사성 검사)

  • Lee, Jung-Won;Lee, Hye-Soo;Lee, Ki-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.9
    • /
    • pp.676-683
    • /
    • 2002
  • The success of XML(eXtensible Markup Language) is primarily based on its flexibility : everybody can define the structure of XML documents that represent information in the form he or she desires. XML is so flexible that XML documents cannot be automatically provided with an underlying semantics. Different tag sets, different names for elements or attributes, or different document structures in general mislead the task of classifying and clustering XML documents precisely. In this paper, we design and implement a system that allows checking the semantic-based similarity between XML tags. First, this system extracts the underlying semantics of tags and then expands the synonym set of tags using an WordNet thesaurus and user-defined word library which supports the abbreviation forms and compound words for XML tags. Seconds, considering the relative importance of XML tags in the XML documents, we extend a conventional vector space model which is the most generally used for document model in Information Retrieval field. Using this method, we have been able to check the similarity between XML tags which are represented different tags.

Abstraction Mechanism of Low-Level Video Features for Automatic Retrieval of Explosion Scenes (폭발장면 자동 검출을 위한 저급 수준 비디오 특징의 추상화)

  • Lee, Sang-Hyeok;Nang, Jong-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.5
    • /
    • pp.389-401
    • /
    • 2001
  • This paper proposes an abstraction mechanism of the low-level digital video features for the automatic retrievals of the explosion scenes from the digital video library. In the proposed abstraction mechanism, the regional dominant colors of the key frame and the motion energy of the shot are defined as the primary abstractions of the shot for the explosion scene retrievals. It is because an explosion shot usually consists of the frames with a yellow-tone pixel and the objects in the shot are moved rapidly. The regional dominant colors of shot are selected by dividing its key frame image into several regions and extracting their regional dominant colors, and the motion energy of the shot is defined as the edge image differences between key frame and its neighboring frame. The edge image of the key frame makes the retrieval of the explosion scene more precisely, because the flames usually veils all other objects in the shot so that the edge image of the key frame comes to be simple enough in the explosion shot. The proposed automatic retrieval algorithm declares an explosion scene if it has a shot with a yellow regional dominant color and its motion energy is several times higher than the average motion energy of the shots in that scene. The edge image of the key frame is also used to filter out the false detection. Upon the extensive exporimental results, we could argue that the recall and precision of the proposed abstraction and detecting algorithm are about 0.8, and also found that they are not sensitive to the thresholds. This abstraction mechanism could be used to summarize the long action videos, and extract a high level semantic information from digital video archive.

  • PDF