• Title/Summary/Keyword: Attention Point

Search Result 983, Processing Time 0.031 seconds

Discovery of Urban Area and Spatial Distribution of City Population using Geo-located Tweet Data (위치기반 트윗 데이터를 이용한 도심권 추정과 인구의 공간분포 분석)

  • Kim, Tae Kyu;Lee, Jin Kyu;Cho, Jae Hee
    • Journal of Information Technology Services
    • /
    • v.18 no.1
    • /
    • pp.131-140
    • /
    • 2019
  • This study compares and analyzes the spatial distribution of people in two cities using location information in twitter data. The target cities were selected as Paris, a traditional tourist city, and Dubai, a tourist city that has recently attracted attention. The data was collected over 123 days in 2016 and 125 days in 2018. We compared the spatial distribution of two cities according to the two periods and residence status. In this study, we have found a hot place using a spatial statistical model called dart-shaped space division and estimated the urban area by reflecting the distribution of tweet population. And we visualized it as a CDF (cumulative distribution function) curve so that the distance between all the tweets' occurrence points and the city center point can be compared for different cities.

Hybrid Model Based Intruder Detection System to Prevent Users from Cyber Attacks

  • Singh, Devendra Kumar;Shrivastava, Manish
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.272-276
    • /
    • 2021
  • Presently, Online / Offline Users are facing cyber attacks every day. These cyber attacks affect user's performance, resources and various daily activities. Due to this critical situation, attention must be given to prevent such users through cyber attacks. The objective of this research paper is to improve the IDS systems by using machine learning approach to develop a hybrid model which controls the cyber attacks. This Hybrid model uses the available KDD 1999 intrusion detection dataset. In first step, Hybrid Model performs feature optimization by reducing the unimportant features of the dataset through decision tree, support vector machine, genetic algorithm, particle swarm optimization and principal component analysis techniques. In second step, Hybrid Model will find out the minimum number of features to point out accurate detection of cyber attacks. This hybrid model was developed by using machine learning algorithms like PSO, GA and ELM, which trained the system with available data to perform the predictions. The Hybrid Model had an accuracy of 99.94%, which states that it may be highly useful to prevent the users from cyber attacks.

Tooth hypersensitivity associated with paresthesia after inferior alveolar nerve injury: case report and related neurophysiology

  • You, Tae Min
    • Journal of Dental Anesthesia and Pain Medicine
    • /
    • v.21 no.2
    • /
    • pp.173-178
    • /
    • 2021
  • Inferior alveolar nerve (IAN) injury is usually caused by stretching or crushing of the neurovascular structures and postoperative intra-alveolar hematoma or edema after dental procedures. This results in paresthesia in the ipsilateral chin, lip (vermilion border, skin, and mucosa), and labial or buccal alveolar mucosa of the mandibular anterior teeth. However, there are no reports of sensory alterations in the teeth, especially tooth hypersensitivity, after IAN injury. I report a case in which paresthesia of the lower lip and hypersensitivity of the lower anterior teeth occurred simultaneously after the removal of the third molar that was located close to the IAN. In addition, I discuss the reasons for the different sensory changes between the tooth and chin (skin) after nerve injury from a neurophysiological point of view. Since the dental pulp and periodontal apparatus are highly innervated by the inferior alveolar sensory neurons, it seems necessary to pay attention to the changes in tooth sensitivity if IAN injury occurs during dental procedures.

Shape Memory Alloy Microactuators (형상기억합금을 이용한 초소형 액츄에이터)

  • Kim, Byung-Wook;Kim, Kwang-Soo;Cho, Dong-Il
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.9
    • /
    • pp.54-61
    • /
    • 1996
  • Because of its high energy density, the use of shape memory alloys(SMA) in designing microactuatiors is gaining much attention in recent years. Shape memory alloys can undergo a shape change at a low temperature with a small applied deformation force, and retain this deformation until they are heated, at which point they return to the original shape. This is called the shape memory effect(SME), and a plethora of alloys show this effect. Among them, TiNi-based alloys have relatively high electrical resistivity, which to develope helical-shape memory springs. These springs are used to develop fast protatonist/antagonist configuration actuators. The developed actuator has an actuation speed of 1 mm per 15 .approx. 20 ms and a minimum operating period of 2 sec.

  • PDF

A study on the chatter vibration of two degree of freedom systems (2자유도 채터진동의 특성에 관한 연구)

  • Kim, Jeong-Suk;Kang, Myeong-Chang;Kim, Byeong-Ryoung
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.10 no.4
    • /
    • pp.216-226
    • /
    • 1993
  • Three dimensional cutting is considered as an equivalent orthogonal cutting through the plane containing both the cutting velocity vector and the chip flow velocity vector in dynamic cutting process. An analytical expression of dynamic cutting force is obtained from the cutting parameters determined by the static cutting. Particular attention is paid to the energy supplied to the vibratory system of cutting tool with two degree of freedom. In this approach, the phase lag of the horizontal vibration of the tool behind the vertical vibration and the direction angle of the fluctuating cutting force is considered in point of stability limits. Chatter vibration can be effectively suppressed by relatively increasing the spring constant and the damping coefficient of the cutting system in the vertical cutting force direction. A good agreement is found between the stability limits predicted by theoretical value and experimental results.

  • PDF

A Study on the Effective Production of Game Weapons Using ZBrush

  • YunChao Yang;Xinyi Shan;Jeanhun Chung
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.2
    • /
    • pp.397-402
    • /
    • 2023
  • With the rapid adoption of 5G, the gaming industry has undergone significant innovation, with the quality of game content and player experience becoming the focal point of attention. ZBrush, as a professional digital sculpting software, plays a crucial role in the production of 3D game models. In this paper, we explore the application methods and techniques of ZBrush in game weapons production through specific case analyses. We provide a detailed analysis of two game weapon models, discussing the design and modeling process, lowto-high poly conversion, UV unwrapping and texture baking, material texture creation and optimization, and final rendering. By comparing the production process and analyzing the advantages and disadvantages of ZBrush, we establish a theoretical foundation for further design research and provide reference materials for game industry professionals, aiming to achieve higher quality and efficiency in 3D game model production.

Empowering Blockchain For Secure Data Storing in Industrial IoT

  • Firdaus, Muhammad;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.231-234
    • /
    • 2020
  • In the past few years, the industrial internet of things (IIoT) has received great attention in various industrial sectors which have potentially increased a high level of integrity, availability, and scalability. The increasing of IIoT is expected to create new smart industrial enterprises and build the next generation smart system. However existing IIoT systems rely on centralized servers that are vulnerable to a single point of failure and malicious attack, which exposes the data to security risks and storage. To address the above issues, blockchain is widely considered as a promising solution, which can build a secure and efficient environment for data storing, processing and sharing in IIoT. In this paper, we propose a decentralized, peer-to-peer platform for secure data storing in industrial IoT base on the ethereum blockchain. We exploit ethereum to ensure data security and reliability when smart devices store the data.

Multi-Modal Cross Attention for 3D Point Cloud Semantic Segmentation (3차원 포인트 클라우드의 의미적 분할을 위한 멀티-모달 교차 주의집중)

  • HyeLim Bae;Incheol Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.660-662
    • /
    • 2023
  • 3차원 포인트 클라우드의 의미적 분할은 환경을 구성하는 물체 단위로 포인트 클라우드를 분할하는 작업으로서, 환경의 3차원적 구성을 이해하고 환경과 상호작용에 필수적인 시각 지능을 요구한다. 본 논문에서는 포인트 클라우드에서 추출하는 3차원 기하학적 특징과 함께 멀티-뷰 영상에서 추출하는 2차원 시각적 특징들도 활용하는 새로운 3차원 포인트 클라우드 의미적 분할 모델 MFNet을 제안한다. 제안 모델은 서로 이질적인 2차원 시각적 특징과 3차원 기하학적 특징의 효과적인 융합을 위해, 새로운 중기 융합 전략과 멀티-모달 교차 주의집중을 이용한다. 본 논문에서는 ScanNetV2 벤치마크 데이터 집합을 이용한 다양한 실험들을 통해, 제안 모델 MFNet의 우수성을 입증한다.

Potentially-innovative options in designing suspension bridges with railway crossing

  • F. Casciati;S. Casciati
    • Smart Structures and Systems
    • /
    • v.32 no.5
    • /
    • pp.339-347
    • /
    • 2023
  • Both the first author and the company of the second author were involved, directly or indirectly, in the design stage of a permanent link between the bottom of the Italian peninsula and the nearby Sicily island. This ambitious project was left in stand-by from 2013 to 2023. The current political revival originates some thoughts on the updated desired performance of suspension bridges, without any immediate reference to that specific crossing. It is simply regarded as a starting point. After an update on recent worldwide realizations, the authors focus their attention on four basic aspects: the span length, the girder scheme, the foundation technology and the bridge runability. Eventually, structural control and monitoring aspects are discussed as potentially innovative options in designing suspension bridges with railway crossing.

Investigating the substance and acceptability of empirical arguments: The case of maximum-minimum theorem and intermediate value theorem in Korean textbooks

  • Hangil Kim
    • Research in Mathematical Education
    • /
    • v.27 no.1
    • /
    • pp.75-92
    • /
    • 2024
  • Mathematical argument has been given much attention in the research literature as a mediating construct between reasoning and proof. However, there have been relatively less efforts made in the research that examined the nature of empirical arguments represented in textbooks and how students perceive them as proofs. Cases of point include Intermediate Value Theorem [IVT] and Maximum-Minimum theorem [MMT] in grade 11 in Korea. In this study, using Toulmin's framework (1958), the author analyzed the substance of the empirical arguments provided for both MMT and IVT to draw comparisons between the nature of datum, claims, and warrants among empirical arguments offered in textbooks. Also, an online survey was administered to learn about how students view as proofs the empirical arguments provided for MMT and IVT. Results indicate that nearly half of students tended to accept the empirical arguments as proofs. Implications are discussed to suggest alternative approaches for teaching MMT and IVT.