• Title/Summary/Keyword: software weakness

Search Result 115, Processing Time 0.021 seconds

Investigation of the range of motion of the shoulder joint in subjects with rotator cuff arthropathy while performing daily activities

  • Karimi, Mohammad Taghi;Khademi, Sahar
    • Clinics in Shoulder and Elbow
    • /
    • v.24 no.2
    • /
    • pp.88-92
    • /
    • 2021
  • Background: Patients who have rotator cuff arthropathy experience a limited range of motion (ROM) of the shoulder joint and experience problems in performing their daily activities; however, no evidence is available to suggest the exact ROM of the shoulder joint in this population. Therefore, this study sought to determine the degree of motion of the shoulder joint in three planes during different activities. Methods: Five subjects with rotator cuff injuries participated in this study. The motion of the shoulder joints on both the involved and normal sides was assessed by a motion analysis system while performing forward abduction (task 1), flexion (task 2), and forward flexion (task 3). The OpenSIM software program was used to determine the ROM of the shoulder joints on both sides. The difference between the ranges of motion was determined using a two-sample t-test. Results: The ROMs of the shoulder joint in task 1 were 93.5°±16.5°, 72.1°±2.6°, and 103.9°±25.7° for flexion, abduction, and rotation, respectively, on the normal side and 28°±19.8°, 31°±31.56°, and 48°±33.5° on the involved side (p<0.05). There was no significant difference between the flexion/extension and rotation movements of the shoulder joint when performing task 1. However, the difference between flexion and rotation movements of the shoulder joints for the second task was significant (p>0.05). Conclusions: Those with rotator cuff arthropathy have functional limitations due to muscle weakness and paralysis, especially during the vertical reaching task. However, although these individuals have decreased ROM for transverse reaching tasks, the reduction was not significant.

Weighted Window Assisted User History Based Recommendation System (가중 윈도우를 통한 사용자 이력 기반 추천 시스템)

  • Hwang, Sungmin;Sokasane, Rajashree;Tri, Hiep Tuan Nguyen;Kim, Kyungbaek
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.6
    • /
    • pp.253-260
    • /
    • 2015
  • When we buy items in online stores, it is common to face recommended items that meet our interest. These recommendation system help users not only to find out related items, but also find new things that may interest users. Recommendation system has been widely studied and various models has been suggested such as, collaborative filtering and content-based filtering. Though collaborative filtering shows good performance for predicting users preference, there are some conditions where collaborative filtering cannot be applied. Sparsity in user data causes problems in comparing users. Systems which are newly starting or companies having small number of users are also hard to apply collaborative filtering. Content-based filtering should be used to support this conditions, but content-based filtering has some drawbacks and weakness which are tendency of recommending similar items, and keeping history of a user makes recommendation simple and not able to follow up users preference changes. To overcome this drawbacks and limitations, we suggest weighted window assisted user history based recommendation system, which captures user's purchase patterns and applies them to window weight adjustment. The system is capable of following current preference of a user, removing useless recommendation and suggesting items which cannot be simply found by users. To examine the performance under user and data sparsity environment, we applied data from start-up trading company. Through the experiments, we evaluate the operation of the proposed recommendation system.

Design of Optical System for LED Lamp using MR16 (MR16용 LED 램프 조명설계)

  • Kim, Jun-Hyun;Moon, Byung-Kwon;Ryu, In-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4725-4732
    • /
    • 2012
  • This paper studies MR16 that can strengthen the strength and make up for the weakness of MR16 by replacing halogen light source using multifaceted Reflector(MR16) with LED light source. To achieve this, developed MR16 for LED applying optical system that four aspheric lens is one sheet. Optical system is designed by optics software and lighting performance of the designed data is predicted lighting simulation program. Also, heatsink's heat radiation analysis program to predict the thermal performance. Finally, optical prototype system based on simulation analysis data is manufactured and the results comparing performance of the developed system and the designed data are follows: Radiation angle was around $50^{\circ}{\sim}60^{\circ}$ in results of simulation analysis and the test of the prototype system. Also, temperature measurement result indicates that the thermal equilibrium is realized after one minute and thirty seconds and heat is generated up $60^{\circ}C$ in all of simulation analysis and the test of the prototype system. Finally, simulation analysis result on light disturbance curve of MR16 is similar to that of performance of the prototype system.

A Design for Realtime Monitoring System and Data Analysis Verification TA to Improve the Manufacturing Process Using HW-SW Integrated Framework (HW-SW 통합 프레임워크를 활용한 제조공정 개선을 위한 실시간 모니터링 시스템과 데이터 분석검증 TA설계)

  • Kim, Jae Chun;Jin, Seon A;Park, Young Hee;Noh, Seong Yeo;Lee, Hyun Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.357-370
    • /
    • 2015
  • Massive data occurred in a manufacturing place is able to fulfill very important roll to improve the manufacturing process. Domestic manufacturing business has been making an multilateral effort to react the change of manufacturing circumstance, but it undergoes many difficulties due to technical weakness. Coatings is a type of paint. It protect products by forming a film layer on the products and assigns various properties to those. The research of coatings is one of the fields studied actively in the polymer industry. The importance of the coatings in various industries is more increased. However, the industry still performs a mixing process in dependence on operator's experiences. In this paper, we propose a design for realtime monitoring system and data analysis verification TA to improve the manufacturing process using HW-SW integrated framework. Analysis results from the proposed framework are able to improve the coatings formulation process by collecting more quantitative reference data for work and providing it to work place. In particular, the framework may reduce the deterioration and loss cost which are caused by absence of a standard data as a accurate formulation criteria. It also may suggest a counterplan regarding errors which can be occurred in the future by deriving a standard calibration equation from the analysis using R and Design of Experiments about an error data generated in the mixing step.

FAST : A Log Buffer Scheme with Fully Associative Sector Translation for Efficient FTL in Flash Memory (FAST :플래시 메모리 FTL을 위한 완전연관섹터변환에 기반한 로그 버퍼 기법)

  • Park Dong-Joo;Choi Won-Kyung;Lee Sang-Won
    • The KIPS Transactions:PartA
    • /
    • v.12A no.3 s.93
    • /
    • pp.205-214
    • /
    • 2005
  • Flash memory is at high speed used as storage of personal information utilities, ubiquitous computing environments, mobile phones, electronic goods, etc. This is because flash memory has the characteristics of low electronic power, non-volatile storage, high performance, physical stability, portability, and so on. However, differently from hard disks, it has a weak point that overwrites on already written block of flash memory is impossible to be done. In order to make an overwrite possible, an erase operation on the written block should be performed before the overwrite, which lowers the performance of flash memory highly. In order to solve this problem the flash memory controller maintains a system software module called the flash translation layer(FTL). Of many proposed FTL schemes, the log block buffer scheme is best known so far. This scheme uses a small number of log blocks of flash memory as a write buffer, which reduces the number of erase operations by overwrites, leading to good performance. However, this scheme shows a weakness of low page usability of log blocks. In this paper, we propose an enhanced log block buffer scheme, FAST(Full Associative Sector Translation), which improves the page usability of each log block by fully associating sectors to be written by overwrites to the entire log blocks. We also show that our FAST scheme outperforms the log block buffer scheme.

The image format research which is suitable in animation work (애니메이션 작업에 사용되는 이미지 포맷 연구)

  • Kwon, Dong-Hyun
    • Cartoon and Animation Studies
    • /
    • s.14
    • /
    • pp.37-51
    • /
    • 2008
  • The computer has become an indispensable tool for animation works. However if you don't understand the characteristics of the computer and its software, you might not have the result satisfying your efforts. The incorrect understanding of image format sometimes causes it. Habitually image formats are selected usually for most of works but there is a distinct difference among those image formats while the efficient usages of them are different from each other. For your more efficient work therefore, you need to identify the characteristics of various kinds of image format used mostly for animation works. First I took a look at the theories of the lossy compression and lossless compression, which are two types of data compression widely used in the whole parts of computer world and the difference between bitmap method and vector method, which are respectably different in terms of the way of expressing images and finally the 24 bit true color and 8 bits alpha channel. Based on those characteristics, I have analyzed the functional difference among image formats used between various types of animation works such as 2D, 3D, composing and editing and also the benefits and weakness of them. Additionally I've proved it is wrong that the JPEG files consume a small space in computer work. In conclusion, I suggest the TIF format as the most efficient format for whatever it is editing, composing, 3D and 2D in considering capacity, function and image quality and also I'd like to recommend PSD format which has compatibility and excellent function, since the Adobe educational programs are used a lot for the school education. I hope this treatise to contribute to your right choice of image format in school education and practical works.

  • PDF

Prevention Methods of Cyber-crimes using the Private Security (민간경비를 활용한 사이버범죄 예방 방안)

  • Kim, Sang-Woon;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.141-151
    • /
    • 2013
  • With the spread of Personal Computers(PC) in the 1980's, many people started to deal businesses with PC. From late 1990's, the Internet age with PC have started and many people have showed keen interest in cyber-space and now they are utilizing it. Since 2000's the use of cyber-space have skyrocketed and it caused significant changes to humans' life. There was a huge prosperity to us but the new kind of crime, cyber-crime, was raised. Unlike past physical type of crimes, those cyber-crimes take place in the cyber-space and they have special features of non-facing, anonymity, specialty, technologic, repetition, continuation. Those cyber-crimes are continually growing since 2003 and in 2010 it almost doubled compared to 2003. General cyber-crimes like phishing-scam pornography circulation was most of them and notably perpetrators of them are younger generation. Recently cyber-crimes are showing the trend of advancing more and more and cyber-bullying, fraud like phishing scam are on the rise. The police are responding by making 'Cyber Terror Response Center', but it does not work effectively with the problems of breakup of prevention and investigation unit, procedure of investigation and the system itself. So, I suggest practical use of private security to remedy our police's weakness and to prevent cyber-crimes. Preventing solutions of cyber-crime with private security are physical defense of large-scale servers and vital computers, building of Back-up system to prevent vital data loss, and building of cyber-crime preventing system combining software and hardware.

A New Face Detection Method using Combined Features of Color and Edge under the illumination Variance (컬러와 에지정보를 결합한 조명변화에 강인한 얼굴영역 검출방법)

  • 지은미;윤호섭;이상호
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.11
    • /
    • pp.809-817
    • /
    • 2002
  • This paper describes a new face detection method that is a pre-processing algorithm for on-line face recognition. To complement the weakness of using only edge or rotor features from previous face detection method, we propose the two types of face detection method. The one is a combined method with edge and color features and the other is a center area color sampling method. To prevent connecting the people's face area and the background area, which have same colors, we propose a new adaptive edge detection algorithm firstly. The adaptive edge detection algorithm is robust to illumination variance so that it extracts lots of edges and breakouts edges steadily in border between background and face areas. Because of strong edge detection, face area appears one or multi regions. We can merge these isolated regions using color information and get the final face area as a MBR (Minimum Bounding Rectangle) form. If the size of final face area is under or upper threshold, color sampling method in center area from input image is used to detect new face area. To evaluate the proposed method, we have experimented with 2,100 face images. A high face detection rate of 96.3% has been obtained.

English Phoneme Recognition using Segmental-Feature HMM (분절 특징 HMM을 이용한 영어 음소 인식)

  • Yun, Young-Sun
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.3
    • /
    • pp.167-179
    • /
    • 2002
  • In this paper, we propose a new acoustic model for characterizing segmental features and an algorithm based upon a general framework of hidden Markov models (HMMs) in order to compensate the weakness of HMM assumptions. The segmental features are represented as a trajectory of observed vector sequences by a polynomial regression function because the single frame feature cannot represent the temporal dynamics of speech signals effectively. To apply the segmental features to pattern classification, we adopted segmental HMM(SHMM) which is known as the effective method to represent the trend of speech signals. SHMM separates observation probability of the given state into extra- and intra-segmental variations that show the long-term and short-term variabilities, respectively. To consider the segmental characteristics in acoustic model, we present segmental-feature HMM(SFHMM) by modifying the SHMM. The SFHMM therefore represents the external- and internal-variation as the observation probability of the trajectory in a given state and trajectory estimation error for the given segment, respectively. We conducted several experiments on the TIMIT database to establish the effectiveness of the proposed method and the characteristics of the segmental features. From the experimental results, we conclude that the proposed method is valuable, if its number of parameters is greater than that of conventional HMM, in the flexible and informative feature representation and the performance improvement.

Design and Analysis of Data File Protection based on the Stream Cipher (데이터파일의 보호를 위한 스트림 암호방식 설계와 해석)

  • 이경원;이중한;김정호;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • Recently, as the personal computers are supplied rapidly, they formed the nucleus of the computer system. But, because of the easiness that anyone uses them to go near easily, it is the fact that the security of personal computer is weakness. So, in the paper, 1 propose the technical method that minimizes the loss and leakage of important data. This paper implemented a crypto system for security of data file on personal computer and assistance storage medium. The way of encryption/decryption is applied by complexity method which mixed Diffie-Hellman key exchange protocol, a typical RC4(Rivest Cipher version 4) algorithm of stream cipher and a typical MD5(Message Digest version 5) of Hash Function. For valuation implemented crypto system, three criteria is presented, which are crypto complexity, processing time and pattern matching. And according to analysis the three criteria the crypto system is verified the security, efficiency and usefulness. The crypto system is programmed with Visual C++ language of Microsoft. And so, as this is software system, we shall have a technical security system at a minimum cost for all personal computer.

  • PDF