• Title/Summary/Keyword: Communication error

Search Result 3,789, Processing Time 0.061 seconds

Analyzing TripAdvisor application reviews to enable smart tourism : focusing on topic modeling (스마트 관광 활성화를 위한 트립어드바이저 애플리케이션 리뷰 분석 : 토픽 모델링을 중심으로)

  • YuNa Lee;MuMoungCho Han;SeonYeong Yu;MeeQi Siow;Mijin Noh;YangSok Kim
    • Smart Media Journal
    • /
    • v.12 no.8
    • /
    • pp.9-17
    • /
    • 2023
  • The development of information and communication technology and the improvement of the development and dissemination of smart devices have caused changes in the form of tourism, and the concept of smart tourism has since emerged. In this regard, researches related to smart tourism has been conducted in various fields such as policy implementation and surveys, but there is a lack of research on application reviews. This study collects Trip Advisor application review data in the Google Play Store to identify usage of the application and user satisfaction through Latent Dirichlet Allocation (LDA) topic modeling. The analysis results in four topics, two of which are positive and the other two are negative. We found that users were satisfied with the application's recommendation system, but were dissatisfied when the filters they set during search were not applied or that reviews were not published after updates of the application. We suggest more categories can be added to the application to provide users with different experiences. In addition, it is expected that user satisfaction can be improved by identifying problems within the application, including the filter function, and checking the application environment and resolving the error occurring during the application usage.

A 2×2 MIMO Spatial Multiplexing 5G Signal Reception in a 500 km/h High-Speed Vehicle using an Augmented Channel Matrix Generated by a Delay and Doppler Profiler

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.1-10
    • /
    • 2023
  • This paper proposes a method to extend Inter-Carrier Interference (ICI) canceling Orthogonal Frequency Division Multiplexing (OFDM) receivers for 5G mobile systems to spatial multiplexing 2×2 MIMO (Multiple Input Multiple Output) systems to support high-speed ground transportation services by linear motor cars traveling at 500 km/h. In Japan, linear-motor high-speed ground transportation service is scheduled to begin in 2027. To expand the coverage area of base stations, 5G mobile systems in high-speed moving trains will have multiple base station antennas transmitting the same downlink (DL) signal, forming an expanded cell size along the train rails. 5G terminals in a fast-moving train can cause the forward and backward antenna signals to be Doppler-shifted in opposite directions, so the receiver in the train may have trouble estimating the exact channel transfer function (CTF) for demodulation. A receiver in such high-speed train sees the transmission channel which is composed of multiple Doppler-shifted propagation paths. Then, a loss of sub-carrier orthogonality due to Doppler-spread channels causes ICI. The ICI Canceller is realized by the following three steps. First, using the Demodulation Reference Symbol (DMRS) pilot signals, it analyzes three parameters such as attenuation, relative delay, and Doppler-shift of each multi-path component. Secondly, based on the sets of three parameters, Channel Transfer Function (CTF) of sender sub-carrier number n to receiver sub-carrier number l is generated. In case of n≠l, the CTF corresponds to ICI factor. Thirdly, since ICI factor is obtained, by applying ICI reverse operation by Multi-Tap Equalizer, ICI canceling can be realized. ICI canceling performance has been simulated assuming severe channel condition such as 500 km/h, 8 path reverse Doppler Shift for QPSK, 16QAM, 64QAM and 256QAM modulations. In particular, 2×2MIMO QPSK and 16QAM modulation schemes, BER (Bit Error Rate) improvement was observed when the number of taps in the multi-tap equalizer was set to 31 or more taps, at a moving speed of 500 km/h and in an 8-pass reverse doppler shift environment.

PID-based Consensus and Formation Control of Second-order Multi-agent System with Heterogeneous State Information (이종 상태 정보를 고려한 이차 다개체 시스템의 PID 기반 일치 및 편대 제어)

  • Min-Jae Kang;Han-Ho Tack
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.103-111
    • /
    • 2023
  • Consensus, that aims to converge the states of agents to the same states through information exchanges between agents, has been widely studied to control the multi-agent systems. In real systems, the measurement variables of each agent may be different, the loss of information across communication may occur, and the different networks for each state may need to be constructed for safety. Moreover, the input saturation and the disturbances in the system may cause instability. Therefore, this paper studies the PID(Proportional-Integral-Derivative)-based consensus control to achieve the swarm behavior of the multi-agent systems considering the heterogeneous state information, the input saturations, and the disturbances. Specifically, we consider the multiple follower agents and the single leader agent modeled by the second-order systems, and investigate the conditions to achieve the consensus based on the stability of the error system. It is confirmed that the proposed algorithm can achieve the consensus if only the connectivity of the position graph is guaranteed. Moreover, by extending the consensus algorithm, we study the formation control problem for the multi-agent systems. Finally, the validity of the proposed algorithm was verified through the simulations.

Performance of Passive UHF RFID System in Impulsive Noise Channel Based on Statistical Modeling (통계적 모델링 기반의 임펄스 잡음 채널에서 수동형 UHF RFID 시스템의 성능)

  • Jae-sung Roh
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.835-840
    • /
    • 2023
  • RFID(Radio Frequency Identification) systems are attracting attention as a key component of Internet of Things technology due to the cost and energy efficiency of application services. In order to use RFID technology in the IoT application service field, it is necessary to be able to store and manage various information for a long period of time as well as simple recognition between the reader and tag of the RFID system. And in order to read and write information to tags, a performance improvement technology that is strong and reliable in poor wireless channels is needed. In particular, in the UHF(Ultra High Frequency) RFID system, since multiple tags communicate passively in a crowded environment, it is essential to improve the recognition rate and transmission speed of individual tags. In this paper, Middleton's Class A impulsive noise model was selected to analyze the performance of the RFID system in an impulsive noise environment, and FM0 encoding and Miller encoding were applied to the tag to analyze the error rate performance of the RFID system. As a result of analyzing the performance of the RFID system in Middleton's Class A impulsive noise channel, it was found that the larger the Gaussian noise to impulsive noise power ratio and the impulsive noise index, the more similar the characteristics to the Gaussian noise channel.

Annotation-guided Code Partitioning Compiler for Homomorphic Encryption Program (지시문을 활용한 동형암호 프로그램 코드 분할 컴파일러)

  • Dongkwan Kim;Yongwoo Lee;Seonyoung Cheon;Heelim Choi;Jaeho Lee;Hoyun Youm;Hanjun Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.7
    • /
    • pp.291-298
    • /
    • 2024
  • Despite its wide application, cloud computing raises privacy leakage concerns because users should send their private data to the cloud. Homomorphic encryption (HE) can resolve the concerns by allowing cloud servers to compute on encrypted data without decryption. However, due to the huge computation overhead of HE, simply executing an entire cloud program with HE causes significant computation. Manually partitioning the program and applying HE only to the partitioned program for the cloud can reduce the computation overhead. However, the manual code partitioning and HE-transformation are time-consuming and error-prone. This work proposes a new homomorphic encryption enabled annotation-guided code partitioning compiler, called Heapa, for privacy preserving cloud computing. Heapa allows programmers to annotate a program about the code region for cloud computing. Then, Heapa analyzes the annotated program, makes a partition plan with a variable list that requires communication and encryption, and generates a homomorphic encryptionenabled partitioned programs. Moreover, Heapa provides not only two region-level partitioning annotations, but also two instruction-level annotations, thus enabling a fine-grained partitioning and achieving better performance. For six machine learning and deep learning applications, Heapa achieves a 3.61 times geomean performance speedup compared to the non-partitioned cloud computing scheme.

Improvement of the Result Related to Tumor Marker Test Through the OCS QC Program (OCS QC 프로그램을 통한 건진 센터 종양검사의 결과보고 개선)

  • Back, Song-Ran;Kim, Sung-Ho;Yoo, So-Yeon;Kim, Nyun-Ok;Moon, Hyoung-Ho;Yoo, Seon-Hee;Cho, Shee-Man
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.13 no.3
    • /
    • pp.185-188
    • /
    • 2009
  • Purpose: Standard of retests were discrepant and inconsistent due to inaccuracy and lack of standardization within normal range limit of tumor marker test. To enhance the standardization of retests set standard value below normal range and the Order Communication System Quality Control (OCS QC) program was put in place. This program enables managing the results within lower limit of normal range which were used for tumor marker test in Health Center. Materials and Methods: At present the tumor marker study for AFP, CEA, CA19-9, CA125, and PSA included outpatients in Asan Medical Center from February to March, 2009. The standard value was obtained by using the percentage of CV of Inter Assay according to the normal range of each tumor test. The results were confirmed by using the OCS QC program via formatted assessment of screening test such as test items, standard value and medical department. The number of out-of-range results within plus and minus 30 percents regarding the five primary items of tumor marker test was assessed. The next step was to obtain the number of AFP, CEA, and CA125 according to the ratio of comparison between prior and post test result, 60%, 50%, and 40% within normal range, respectively. In addition, set standard value below normal range. Results: The first screening test with percentage of sample number was resulted between 30%-40% and the second one was AFP 26.1%, CEA 18.9%, CA19-9 17.3%, CA125 18.7%, and PSA 21.0% obtained screening percentage of average 20 percents. The limited value of retest was AFP less than 5.0 and more than 10.0, CEA less than 1.0 and more than 3.0, CA19-9 less than 10.0 and more than 30.0, and PSA less than 1.0 and more than 2.0 to set and the number of retest was obtained by applying to the limited value of retest to screening percentage of average 20 percents For two months, the number of retest was AFP 0, CEA 15, CA19-9 3, CA125 2, and PSA 5. Conclusions: Through using the OCS QC program in establishing the standard of retest systemically, there appeared to be reduced discrepancy among the examiners and to be expected improvement in relation to the error of results.

  • PDF

Development of Market Growth Pattern Map Based on Growth Model and Self-organizing Map Algorithm: Focusing on ICT products (자기조직화 지도를 활용한 성장모형 기반의 시장 성장패턴 지도 구축: ICT제품을 중심으로)

  • Park, Do-Hyung;Chung, Jaekwon;Chung, Yeo Jin;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.1-23
    • /
    • 2014
  • Market forecasting aims to estimate the sales volume of a product or service that is sold to consumers for a specific selling period. From the perspective of the enterprise, accurate market forecasting assists in determining the timing of new product introduction, product design, and establishing production plans and marketing strategies that enable a more efficient decision-making process. Moreover, accurate market forecasting enables governments to efficiently establish a national budget organization. This study aims to generate a market growth curve for ICT (information and communication technology) goods using past time series data; categorize products showing similar growth patterns; understand markets in the industry; and forecast the future outlook of such products. This study suggests the useful and meaningful process (or methodology) to identify the market growth pattern with quantitative growth model and data mining algorithm. The study employs the following methodology. At the first stage, past time series data are collected based on the target products or services of categorized industry. The data, such as the volume of sales and domestic consumption for a specific product or service, are collected from the relevant government ministry, the National Statistical Office, and other relevant government organizations. For collected data that may not be analyzed due to the lack of past data and the alteration of code names, data pre-processing work should be performed. At the second stage of this process, an optimal model for market forecasting should be selected. This model can be varied on the basis of the characteristics of each categorized industry. As this study is focused on the ICT industry, which has more frequent new technology appearances resulting in changes of the market structure, Logistic model, Gompertz model, and Bass model are selected. A hybrid model that combines different models can also be considered. The hybrid model considered for use in this study analyzes the size of the market potential through the Logistic and Gompertz models, and then the figures are used for the Bass model. The third stage of this process is to evaluate which model most accurately explains the data. In order to do this, the parameter should be estimated on the basis of the collected past time series data to generate the models' predictive value and calculate the root-mean squared error (RMSE). The model that shows the lowest average RMSE value for every product type is considered as the best model. At the fourth stage of this process, based on the estimated parameter value generated by the best model, a market growth pattern map is constructed with self-organizing map algorithm. A self-organizing map is learning with market pattern parameters for all products or services as input data, and the products or services are organized into an $N{\times}N$ map. The number of clusters increase from 2 to M, depending on the characteristics of the nodes on the map. The clusters are divided into zones, and the clusters with the ability to provide the most meaningful explanation are selected. Based on the final selection of clusters, the boundaries between the nodes are selected and, ultimately, the market growth pattern map is completed. The last step is to determine the final characteristics of the clusters as well as the market growth curve. The average of the market growth pattern parameters in the clusters is taken to be a representative figure. Using this figure, a growth curve is drawn for each cluster, and their characteristics are analyzed. Also, taking into consideration the product types in each cluster, their characteristics can be qualitatively generated. We expect that the process and system that this paper suggests can be used as a tool for forecasting demand in the ICT and other industries.

A Study on Industrial Potential of Artificial Intelligence through the Cases of Film and Artificial Intelligence Art (예술에서 살펴본 인공지능의 미래 산업화 가능성 - 영화와 인공지능 예술을 중심으로)

  • Kim, Hee-Young
    • Cartoon and Animation Studies
    • /
    • s.50
    • /
    • pp.423-452
    • /
    • 2018
  • The possibility of future industrialization of artificial intelligence was studied through aspects of artificial intelligence art and movie. The field of artificial intelligence is developing by imitating humans through past and present, so it can be inferred that it is important to grasp the future image presented in movie and artificial intelligence art. Human values are represented differently in artificial intelligence films and arts. Artificial intelligence film and art are concerned with the external and internal aspects of human values, respectively. The AI movie looks at similar external aspects in human and AI shape and function, but artificial intelligence art deals with human alienation and lack of communication due to artificial intelligence technology development. Artificial intelligence in movies is a direction to visualize the imagination for artificial intelligence technology, and artificial intelligence art is expressed in the way of making and implementing works using technology. The future of artificial intelligence, which we have shown in imagination in movies today, is being realized technologically. Artificial intelligence art reflects the problems of artificial intelligence technology that can be appeared through current technology, and human problems that may arise from artificial intelligence technology development. Movies and artificial intelligence art reflect the current problems, and through them we can see the future of artificial intelligence. The future of artificial intelligence in movies is an artificial intelligence service that provides human convenience, cyborg artificial intelligence industry, industry that uses exoskeleton robot and exoskeleton suit, and artificial intelligence secretary. If we look at the future of artificial intelligence through the artificial intelligence art in terms of the problems of artificial intelligence technology and the problem of human value, there are artificial intelligence to learn from trial and error or mistakes, self-expression and communication by lifelogging, recovery of miscommunications by a reflective thinking, and an expansion of the area of artificial intelligence artist through human uncertainty. The future industrialization potential of artificial intelligence as study through aspects of artificial intelligence art and movie is an industry that extends the five senses, an industry that improves the insufficient physical ability of the human, an industry that enhances the physical ability of the human being, and an industry that maintains psychological and mental well-being.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.