• Title/Summary/Keyword: Cell-ID

Search Result 154, Processing Time 0.025 seconds

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

Studies on the Seedling Production of Long Shanny, Stichaeus grigoriewi Herzenstein 1. Natural Spawning in Indoor Tanks and Embryonic Development (장갱이, Stichaeus grigorjewi Herzenstein의 종묘생산에 관한 연구 1. 실내에서의 자연산란과 난발생)

  • Lee Jung-Uie;Jo Jae-Yoon
    • Journal of Aquaculture
    • /
    • v.8 no.3
    • /
    • pp.195-207
    • /
    • 1995
  • In order to study the embryonic development and hatching of wild long shanny, Stichaeus grigorjewi, were caught with the gill nets in the East Sea of Korea, and stocked at indoor tanks to induce natural spawning in February 25, 1994 and February 16 to 24, 1995. They were already matured when stocked, and average body length (50.66 cm) and body weight (1,192.74 g) of 57 females and average body length (48.62 cm) and body weight (612.58g) of 43 males were recorded. Before stocking, they were inserted with identification tags(ID tags) in the dorsal muscle, and spawning was traced by the portable reader (Destron/lDl Ltd.) Forty females among 57 spawned successfully in the average of 4 days after stocking. Females spawned almost all eggs contained in the ovaries at one time in the form of an egg mass and averaging 227,200 eggs Per egg mass. The egg mass was oval in shape, translucent milky in color, 20.32cm long axis and 14.57cm short axis in size, and 803.7g in weight. Male parents guarded their egg masses and circulated water with the tail part of the body. Fertilized egg was spherical in shape, and their average diameter was 1.54 mm. Each egg had a containing single oil globule, and it's average diameter was 0.37 mm. The average water temperature was $13.2^{\circ}C$ and incubation times after fertilization were 5 hours 25 minutes up to 2-cell stage, 13 hours up to morula stage, and 66 hours 35 minutes up to embryo formation stage. Hatching rate was approximately 10 percent in 368 hours 50 minutes after fertilization, and approxionateoly 90 percent of eggs were hatched in 425 hours 30 minutes after fertilization.

  • PDF

In Vitro Properties and Biodistribution of Tc-99m and Re-188 Labeled Monoclonal Antibody CEA79.4 (Re-188과 Tc-99m 표지 단일클론항체 CEA79.4의 생체외 특성과 생체내 분포)

  • Hong, Mee-Kyoung;Jeong, Jae-Min;Yeo, Jeong-Seok;Kim, Kyung-Min;Chang, Young-Soo;Lee, Yong-Jin;Lee, Dong-Soo;Chung, June-Key;Lee, Myung-Chul;Lee, Seung-Jin
    • The Korean Journal of Nuclear Medicine
    • /
    • v.32 no.6
    • /
    • pp.516-524
    • /
    • 1998
  • Purpose: Radiolabeled CEA79.4 antibody has a possibility to be used in radioimmunoscintigraphy or radioimmunotherapy of cancer. We investigated the in vitro properties and biodistribution of CEA79.4 antibody labeled with Re-188 or Tc-99m. Materials and Methods: CEA79.4 was reduced by 2-mercaptoethanol to produce-SH residue, and was labeled with Re-188 or Tc-99m. For direct labeling of Tc-99m, methylene-diphosphonate was used as transchelating agent. CEA79.4 in 50 mM Acetate Buffered Saline (ABS, pH 5.3) was labeled with Re-188, using stannous tartrate as reducing agent. In order to measure immunoreactivity and the affinity constant of radiolabeled antibody, cell binding assay and Scatchard analysis using human colon cancer cells SNU-C4, were performed. Biodistribution study of labeled CEA79.4 was carried out at 1, 14 and 24 hr in ICR mice. Results: Labeling efficiencies of Tc-99m and Re-188 labeled antibodies were $92.4{\pm}5.9%$ and $84.7{\pm}4.6%$, respectively, In vitro stability of Tc-99m-CEA79.4 in human serum was higher than Re-188-CEA79.4. Immunoreactivity and affinity constant of Tc-99m-CEA79.4 were 59.2% and $6.59{\times}10^9\;M^{-1}$, respectively, while those of Re-188-CEA79.4 were 41.6% and $4.2{\times}10^9\;M^{-1}$, respectively. After 24 hr of administrations of Re-188 and Tc-99m labeled antibody, the remaining antibodies in blood were 6.32 and 9.35% ID/g respectively. The biodistribution of each labeled antibody in other organs was similar because they did not accumulate in non-targeted organs. Conclusion: In vitro properties and biodistribution of Re-188-CEA79.4 were similar to those of Tc-99m-CEA79.4. It appears that Re-188-CEA79.4 can be used as a suitable agent for radioimmunotheraphy.

  • PDF