期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Feasibility of Estimating Patient-Specific Dose Verification Results Directly from Linear Accelerator Log Files in Volumetric Modulated Arc Therapy
1
作者 Kengo Kosaka Masao Tanooka +7 位作者 Hiroshi Doi Hiroyuki Inoue Kazuo Tarutani Hitomi Suzuki Yasuhiro Takada Masayuki Fujiwara Norihiko Kamikonya Shozo Hirota 《International Journal of Medical Physics, Clinical Engineering and Radiation Oncology》 2016年第4期317-328,共12页
The feasibility of estimating patient-specific dose verification results directly from linear accelerator (linac) log files has been investigated for prostate cancer patients who undergo volumetric modulated arc thera... The feasibility of estimating patient-specific dose verification results directly from linear accelerator (linac) log files has been investigated for prostate cancer patients who undergo volumetric modulated arc therapy (VMAT). Twenty-six patients who underwent VMAT in our facility were consecutively selected. VMAT plans were created using Monaco treatment planning system and were transferred to an Elekta linac. During the beam delivery, dynamic machine parameters such as positions of the multi-leaf collimator and the gantry were recorded in the log files;subsequently, root mean square (rms) values of control errors, speeds and accelerations of the above machine parameters were calculated for each delivery. Dose verification was performed for all the plans using a cylindrical phantom with diodes placed in a spiral array. The gamma index pass rates were evaluated under 3%/3 mm and 2%/2 mm criteria with a dose threshold of 10%. Subsequently, the correlation coefficients between the gamma index pass rates and each of the above rms values were calculated. Under the 2%/2 mm criteria, significant negative correlations were found between the gamma index pass rates and the rms gantry angle errors (r = 0.64, p < 0.001) as well as the pass rates and the rms gantry accelerations (r = 0.68, p < 0.001). On the other hand, the rms values of the other dynamic machine parameters did not significantly correlate with the gamma index pass rates. We suggest that the VMAT quality assurance (QA) results can be directly estimated from the log file thereby providing potential to simplify patient-specific prostate VMAT QA procedure. 展开更多
关键词 RADIOTHERAPY VMAT log File Patient Specific QA Correlation Gamma Index
下载PDF
Conceptualizing Mining of Firm's Web Log Files 被引量:1
2
作者 Ruangsak TRAKUNPHUTTHIRAK Yen CHEUNG Vincent C.S.LEE 《Journal of Systems Science and Information》 CSCD 2017年第6期489-510,共22页
In this era of a data-driven society, useful data(Big Data) is often unintentionally ignored due to lack of convenient tools and expensive software. For example, web log files can be used to identify explicit informat... In this era of a data-driven society, useful data(Big Data) is often unintentionally ignored due to lack of convenient tools and expensive software. For example, web log files can be used to identify explicit information of browsing patterns when users access web sites. Some hidden information,however, cannot be directly derived from the log files. We may need external resources to discover more knowledge from browsing patterns. The purpose of this study is to investigate the application of web usage mining based on web log files. The outcome of this study sets further directions of this investigation on what and how implicit information embedded in log files can be efficiently and effectively extracted. Further work involves combining the use of social media data to improve business decision quality. 展开更多
关键词 web usage mining web log files Big Data machine learning business intelligence
原文传递
A novel clustering and supervising users' profiles method
3
作者 ZhuMingfu ZhangHongbin SongFangyun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期456-459,共4页
To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution... To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution of users' interests, and directly to instruct the constructing process of web pages indexing for advanced performance. 展开更多
关键词 cluster tree group/CT tree SESSION log data files
下载PDF
Machine Learning-Based Alarms Classification and Correlation in an SDH/WDM Optical Network to Improve Network Maintenance
4
作者 Deussom Djomadji Eric Michel Takembo Ntahkie Clovis +2 位作者 Tchapga Tchito Christian Arabo Mamadou Michael Ekonde Sone 《Journal of Computer and Communications》 2023年第2期122-141,共20页
The evolution of telecommunications has allowed the development of broadband services based mainly on fiber optic backbone networks. The operation and maintenance of these optical networks is made possible by using su... The evolution of telecommunications has allowed the development of broadband services based mainly on fiber optic backbone networks. The operation and maintenance of these optical networks is made possible by using supervision platforms that generate alarms that can be archived in the form of log files. But analyzing the alarms in the log files is a laborious and difficult task for the engineers who need a degree of expertise. Identifying failures and their root cause can be time consuming and impact the quality of service, network availability and service level agreements signed between the operator and its customers. Therefore, it is more than important to study the different possibilities of alarms classification and to use machine learning algorithms for alarms correlation in order to quickly determine the root causes of problems faster. We conducted a research case study on one of the operators in Cameroon who held an optical backbone based on SDH and WDM technologies with data collected from 2016-03-28 to “2022-09-01” with 7201 rows and 18. In this paper, we will classify alarms according to different criteria and use 02 unsupervised learning algorithms namely the K-Means algorithm and the DBSCAN to establish correlations between alarms in order to identify root causes of problems and reduce the time to troubleshoot. To achieve this objective, log files were exploited in order to obtain the root causes of the alarms, and then K-Means algorithm and the DBSCAN were used firstly to evaluate their performance and their capability to identify the root cause of alarms in optical network. 展开更多
关键词 Optical Network ALARMS log files Root Cause Analysis Machine Learning
下载PDF
An E-Business Event Stream Mechanism for Improving User Tracing Processes
5
作者 Ayman Mohamed Mostafa Saleh N.Almuayqil Wael Said 《Computers, Materials & Continua》 SCIE EI 2021年第10期767-784,共18页
With the rapid development in business transactions,especially in recent years,it has become necessary to develop different mechanisms to trace business user records in web server log in an efficient way.Online busine... With the rapid development in business transactions,especially in recent years,it has become necessary to develop different mechanisms to trace business user records in web server log in an efficient way.Online business transactions have increased,especially when the user or customer cannot obtain the required service.For example,with the spread of the epidemic Coronavirus(COVID-19)throughout the world,there is a dire need to rely more on online business processes.In order to improve the efficiency and performance of E-business structure,a web server log must be well utilized to have the ability to trace and record infinite user transactions.This paper proposes an event stream mechanism based on formula patterns to enhance business processes and record all user activities in a structured log file.Each user activity is recorded with a set of tracing parameters that can predict the behavior of the user in business operations.The experimental results are conducted by applying clustering-based classification algorithms on two different datasets;namely,Online Shoppers Purchasing Intention and Instacart Market Basket Analysis.The clustering process is used to group related objects into the same cluster,then the classification process measures the predicted classes of clustered objects.The experimental results record provable accuracy in predicting user preferences on both datasets. 展开更多
关键词 Business transactions event stream log file tracing parameters clustering-based classification
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部