• Title/Summary/Keyword: High availability

Search Result 1,369, Processing Time 0.036 seconds

Twitter Issue Tracking System by Topic Modeling Techniques (토픽 모델링을 이용한 트위터 이슈 트래킹 시스템)

  • Bae, Jung-Hwan;Han, Nam-Gi;Song, Min
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.109-122
    • /
    • 2014
  • People are nowadays creating a tremendous amount of data on Social Network Service (SNS). In particular, the incorporation of SNS into mobile devices has resulted in massive amounts of data generation, thereby greatly influencing society. This is an unmatched phenomenon in history, and now we live in the Age of Big Data. SNS Data is defined as a condition of Big Data where the amount of data (volume), data input and output speeds (velocity), and the variety of data types (variety) are satisfied. If someone intends to discover the trend of an issue in SNS Big Data, this information can be used as a new important source for the creation of new values because this information covers the whole of society. In this study, a Twitter Issue Tracking System (TITS) is designed and established to meet the needs of analyzing SNS Big Data. TITS extracts issues from Twitter texts and visualizes them on the web. The proposed system provides the following four functions: (1) Provide the topic keyword set that corresponds to daily ranking; (2) Visualize the daily time series graph of a topic for the duration of a month; (3) Provide the importance of a topic through a treemap based on the score system and frequency; (4) Visualize the daily time-series graph of keywords by searching the keyword; The present study analyzes the Big Data generated by SNS in real time. SNS Big Data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. In addition, such analysis requires the latest big data technology to process rapidly a large amount of real-time data, such as the Hadoop distributed system or NoSQL, which is an alternative to relational database. We built TITS based on Hadoop to optimize the processing of big data because Hadoop is designed to scale up from single node computing to thousands of machines. Furthermore, we use MongoDB, which is classified as a NoSQL database. In addition, MongoDB is an open source platform, document-oriented database that provides high performance, high availability, and automatic scaling. Unlike existing relational database, there are no schema or tables with MongoDB, and its most important goal is that of data accessibility and data processing performance. In the Age of Big Data, the visualization of Big Data is more attractive to the Big Data community because it helps analysts to examine such data easily and clearly. Therefore, TITS uses the d3.js library as a visualization tool. This library is designed for the purpose of creating Data Driven Documents that bind document object model (DOM) and any data; the interaction between data is easy and useful for managing real-time data stream with smooth animation. In addition, TITS uses a bootstrap made of pre-configured plug-in style sheets and JavaScript libraries to build a web system. The TITS Graphical User Interface (GUI) is designed using these libraries, and it is capable of detecting issues on Twitter in an easy and intuitive manner. The proposed work demonstrates the superiority of our issue detection techniques by matching detected issues with corresponding online news articles. The contributions of the present study are threefold. First, we suggest an alternative approach to real-time big data analysis, which has become an extremely important issue. Second, we apply a topic modeling technique that is used in various research areas, including Library and Information Science (LIS). Based on this, we can confirm the utility of storytelling and time series analysis. Third, we develop a web-based system, and make the system available for the real-time discovery of topics. The present study conducted experiments with nearly 150 million tweets in Korea during March 2013.

Protein Fractionation of Whole Crop Silages, and Effect of Borate-phosphate Buffer Extraction on In vitro Fermentation Characteristics, Gas Production and Degradation (사료작물 사일리지의 단백질 분획 및 Borate-phosphate Buffer 추출이 In vitro 발효성상, Gas 발생 그리고 분해율에 미치는 효과)

  • Shinekhuu, Judder;Jin, Guang-Lin;Ji, Byung-Ju;Li, Xiangzi;Oh, Young-Kyoon;Hong, Seong-Ku;Song, Man-Kang
    • Journal of Animal Science and Technology
    • /
    • v.51 no.5
    • /
    • pp.369-378
    • /
    • 2009
  • Protein fractionation was evaluated from whole crop silages of rye (RS), wheat (WS), triticale (TS), oat (OS), barley (BS), and rice straw silage (RSS), and in vitro trial was carried out to examine the effect of silage and extraction of soluble protein on fermentation characteristics, total gas production and degradation. Soluble protein of silages was extracted with borate-phosphate buffer, and fermentation characteristics, gas production and degradation of silages were estimated by incubating anaerobically the mixed solution of strained rumen fluid and artificial saliva (1:1, v/v) containing dried and ground silages placed in nylon bag at $39^{\circ}C$ up to 48h. Soluble protein (SP) content was lowest for RSS as 2.11% in total CP compared to those for other silages. Highest A fraction (NPN) was observed from RS (74.33% of total CP) while those from TS and RSS were relatively low (48%). B2 fraction was relatively higher for RS, RSS and WS than for TS and BS. $B_3$ fraction was lowest in WS among silages. C fraction (27.07) in RSS was higher than in other silages (1.40~9.93%). pH in incubation solution was increased (P<0.01~P<0.001) for extracted silages up to 12h but decreased (P<0.01) at 48h for non-extracted ones. Contents of ammonia-N (P<0.001) and total VFA (P<0.01~P<0.001) were higher for non-extracted silages than for extracted ones. Acetate proportion was increased (P<0.001) in buffer extracted silages while those of propionate and butyrate were decreased (P<0.001) up to 24h incubation. Increased (P<0.001) total gas production was obtained from non-extracted silages up to 12h while gas production was increased (P<0.01) in extracted ones thereafter. In vitro degradation of dry matter and CP was increased (P<0.001) in non-extracted silages but that of neutral detergent fiber was increased (P<0.001) in extracted ones without difference among silages. Difference in mean values of degradability for each silage prior to- and post extraction with borate buffer, however, was not found among silages. It may be concluded that high NPN content of silages may reduce the protein availability in silages and borate buffer soluble components in silages can stimulate the early stage of fermentation.

Culture Conditions of Aspergillus oryzae in Dried Food-Waste and the Effects of Feeding the AO Ferments on Nutrients Availability in Chickens (건조한 남은 음식물을 이용한 Aspergillus oryzae균주 배양조건과 그 배양물 급여가 닭의 영양소 이용률에 미치는 영향)

  • Hwangbo J.;Hong E. C.;Lee B. S.;Bae H. D.;Kim W.;Nho W. G.;Kim J. H.;Kim I. H.
    • Korean Journal of Poultry Science
    • /
    • v.32 no.4
    • /
    • pp.291-300
    • /
    • 2005
  • Two experiments were carried out to assess the appropriate incubation conditions namely; duration, moisture content and the ideal microbial inoculant for fermented dried food waste(EW) offered to broilers. The nutrient utilization of birds fed the FW diets at varying dietary inclusion rates was also compared with a control diet. In Experiment 1, different moisture contents(MC) of 30, 40, 50 and $60\%$ respectively were predetermined to establish the ideal duration of incubation and the microbial inoculant. A 1mL Aspergillus oryzae(AO) $(1.33\times10^5\;CFU/mL)$ was used as the seed inoculant in FW. This results indicated that the ideal MC for incubation was $40\~50\%$ while the normal incubation time was > 72 hours. Consequently, AO seeds at 0.25, 0.50, 0.75 and 1.00mL were inoculated in FW to determine its effect on AO count. The comparative AO count of FW incubated for 12 and 96 hours, respectively showed no significant differences among varying inoculant dosage rates. The FW inoculated with lower AO seeds at 0.10, 0.05 and 0.01mL were likewise incubated for 72 and 96 hours, respectively and no changes in AO count was detected(p<0.05). The above findings indicated that the incubation requirements for FW should be $%40\~50\%$ for 72 hours with an AO seed incoulant dosage rate of 0.10mL. Consequently, in Experiment II, after determining the appropriate processing condition for the FW, 20 five-week old male Hubbard strain were used in a digestibility experiment. The birds were divided into 4 groups with 5 pens(1 bird per pen). The dietary treatments were; Treatment 1 : Control(Basal diet), Treatment 2 : $60\%$ Basal+4$40\%$ FW, Treatment 3 : $60\%$ $Basal+20\%\;FW+20\%$ AFW(Aspergillus oryzae inoculate dried food-waste diet) and Treatment 4: $60\%$ Basal+$40\%$ Am. Digestibility of treatment 2 was lowed on common nutrients and amino acids compared with control(p<0.05) and on crude fat and phosphorus compared with AFW treatments(T3, T4)(plt;0.05). Digestibility of treatment 3 and 4 increased on crude fiber and crude ash compared treatment 2 (p<0.05). Digestibility of control was high on agrinine, leucine, and phenylalnine of essential amino acids compared with treatment 3 and 4(p<0.05), and diestibility of treatment 3 and 4 was improved on arginine, lysine, and threonine of essential amino acids. Finally, despite comparable nutrient utilization among treatments, birds fed the dietary treatment containing AO tended to superior nutrient digestion to those fed the $60\%$ Basa1+$40\%$ FW.

A Grounded theory Approach on the Experience of Sexual Abuse Victims (성폭력 피해여성의 경험에 관한 연구)

  • Kim, Kyung-Hee;Nam, Sun-Young;Chee, Soon-Ju;Kwon, Hye-Jin;Chung, Yeon-Kang
    • Journal of the Korean Society of School Health
    • /
    • v.9 no.1
    • /
    • pp.77-98
    • /
    • 1996
  • This studies designed to work out a theoretical framework on the experience of sexual abuse from the perspective of grounded theory in an effort to provide more practical and efficient nursing intervention for female victims. The subcategories identified were "sexual abuse", "threatening", "absent mindness", "embarrassment", "horripilation", "dizziness", "wondrousness", "filthiness", "sexual curiosity", "violence level", "victim's age", "neighbors response", "victims personality", "common experience", "sexual abuse information", "family relations", "level of familiarity", "hiding", "suppression", "self-torture", "self-protection", "avoidance", "asking aid", "withdrawal", "hatred", "confusion", "dodging, "remmant", and "pursuing". The 29 subcategories given above were further integrated into 16 categories such as "victimizedness", "being astounded", "filthiness", "degree", "developmental stage", "response pattern", "personality", "rarity", "information availability", "family support", "cover-up", "escaping", "informing", "negative internalization", and "positive pursuit of change". The core categories linked to all the other categories turned out to be "being taken aback" and "filthiness" incorporating the relevant subcategories. A total of 23 theoretical hypothesis emerged in the process of analyzing data. 1. the grater sexual curiosity, the weaker the senses of being taken aback and filthiness. 2. The weaker sexual curiosity, the stronger the senses of being taken aback and filthiness. 3. The stronger the level of violence, The more violent the senses of being taken aback and filthiness. 4. The lower the level of violence, the weaker the senses of being taken aback and filthiness. 5. The younger the victims, the stronger the senses of being taken aback and filthiness. 6. The older the victims, The weaker the senses of being taken aback and filthiness. 7. 'Escaping' will transpire regardless of the given circumstances. 8. The weaker the senses of being taken aback and filthiness, the more probable 'informing' and 'escaping' transpire. 9. The stronger the senses of being taken aback and filthiness, the more probable 'informing' and 'escaping' transpire. 10. The more protective the response from 'informing' and 'escaping' transpire around, the more likely the response to being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 11. The more repelling the response from around, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 12. The more open minded the personality of the subject, the more likely the response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 13. The more closed the personality of tile subject, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 14. The more frequent the experience of sexual abuse, the more likely the response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 15. The less frequent the experience of sexual abuse, the more lilely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 16. The more available information concerning sexual abuses, the more likely response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping. 17. The less available information concerning sexual abuses, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 18. The more cohesive the family of the subject, the more likely the response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 19. The less cohesive the family of the subject, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping'. 20. The less familiar the subject is with the abuser, the more likely the response to 'being taken aback' and 'filthiness' will be 'informing' and 'escaping'. 21. The less familiar the subject is with the abuser, the more likely the response to 'being taken aback' and 'filthiness' will be 'covering-up' and 'escaping. 22. The more likely the response to 'being taken aback' and 'filthiness' is 'informing and 'escaping', the more positive changes the subject will pursue. 23. The more likely the response to 'being taken aback' and 'filthiness' is 'covering-up' and 'escaping', the more negative changes the subject will pursue. The following four hypotheses were conformed in the process of data analysis. 1) In case the level of violence is strong but 'being taken aback' and 'filthiness' in weak because of strong sexual curiosity and also if information concerning sexual abuse is not readily available and the frequency is low, negative internationalization marked by 'covering-up' and 'escaping' will take place despite the fact the subject is open-minded, the family is cohesive and the abuser is unfamiliar. 2) In case the level of violence is weak but 'being taken aback' and 'filthiness' is weak combined with weak sexual curiosity and also if information concerning sexual abuse is readily available and the response from around is protective and the frequency is high, the subject will pursue positive changes to 'being taken aback' and 'filthiness', further aided by the fact that the subject is open-minded, the family is cohesive and the abuser is unfamiliar. 3) In case the level of violence is strong and 'being taken abuse' and 'filthiness' is strong because of weak sexual curiosity and also if information concerning sexual abuse is reading available and the response from around is readily available and the response from around is protective and the frequency is low, the subject will persue positive changes marked by 'informing' and 'escaping' despite the fact that the family cohesion is weak and the abuser is familiar. 4) In case the level of violence is strong and 'being taken aback' and 'filthiness' is strong because of weak sexual curiosity and also if information concerning sexual abuse is not readily available and the response from around is respelling and the frequency is low negative internalization like 'covering-up' and 'escaping' will take place, further aggravated by the fact that the subject's personality is closed, family cohesion is weak, and subject is familiar. On the basis of the above finding, it is recommended that nursing intervention should focus on promoting the milieu conductive to the victims pursuing positive changes along with the adequate aids from protection facilities as well as from the people around them.

  • PDF

Overview of Utilization of Four-wheel Tractor in Korea(I) -Ownership and Annual Use by Different Farm Groups- (농용(農用)트랙터 이용(利用)에 관(關)한 조사연구(調査硏究)(I) -경영형태별(經營形態別) 농작업이용실태분석(農作業利用實態分析)-)

  • Park, Ho Seok;Kim, Kyong Su;Lee, Yong Kook;Han, Sung Kum
    • Journal of Biosystems Engineering
    • /
    • v.6 no.2
    • /
    • pp.20-32
    • /
    • 1982
  • This survey was conducted to investigate the present status of farm tractor utilization for obtaining a basic reference to the establishment of the government's agricultural mechanization strategies. Thirty two counties from the eight provinces except Jeju were covered in this study. From these selected areas, 433 sample farms having farm tractor were taken to obtain the general informations by the enquete, and 93 sample farms among them to investigate the status of daily tractor use in the year of 1980. The analyzed results are summarized as follows: 1. Farm tractors owned by the rice-oriented farms holds 71.5 percent of the total number of tractors the livestock-oriented farms 17.0 percent, and the orchard-oriented farms 7.0 percent. Among the farm tractors 64.3 percent was a large size (46ps) and 35.7 percent a small size(19~23ps). 2. Most of the tractors surveyed were equipped with the essential attachments such as plow and rotavator. About 18 percent of the tractor owners had no trailer, which seemed too high considering the large percentage of tractor use for transportation. The availability of other attachments was very low except a grader on the rice-oriented farms and a hay harvester and a front loader on the livestock-oriented farms. 3. The average size of farm was 3.9 hectare for the rice-oriented farms, 13.9 hectare for the livestock-oriented farms and 7.4 hectare for the orchard-oriented farms. It was obious that the average farm size of was too small compared to the theoretical machine capacity of the tractors. 4. About 70 percent of the tractor operators were in the age of twenties and thirties. About 90 percent of them had an educational level of middle school graduate or above even though their technical level was very low. 5. Any particular problem in tractor use was not found in this survey. From the farmer's preference for purchasing a new tractor, however, it is estimated the demand on a 20-30ps tractor will be more increased. 6. The average annual use of tractor was of about 100 days or 400 hours. It appeared that the rice-oriented farms used most with 412.4 hours per year, and followed by the livestock-oriented farms with 403.6 hours, the orchard oriented farms with 377.7 hours. 7. Among the total hours of tractor use, 47.3 percent was for transportation, and 41.6 percent was for plowing and rotary tillage. The largest portion of the annual tractor use was taken by transportation on the livestock-oriented farms, by land preperation on the rice-oriented farms, and by loading and chemical spraying on the orchard-oriented farms. 8. The hours of tractor use had a peak in May. The hours of use for own farm was remarkably different among the different farm oriented, but there was no considerable difference between the too different sizes of tractor. 9. The hours of tractor use decreased as the age of the operator or the educational level increased. The reason might be that the operators who had a high educational level or were older had a tendency of disliking custom works. 10. The average custom use of tractor was 171.3 hours per year, and the ratio of custom work was 63.7 percent on the rice-oriented farms, 31.7 percent on the livestock-oriented farms and 22.4 percent on the orchard-oriented farms. Among the custom works, the most popular one was the grader leveling. 11. The charge on custom work was about 40,000 Won per hectare for plowing and rotary tillage, and it was the most expensive in the southeastern region, and next followed by the southwestern region. 12. The average plowing capacity of the small tractor was 7.8 hours per hectare in the paddy field, and that of the large tractors was 4.3 hours per hectare. The average rotary-tilling capacities of the small and the large tractors were 6.5 and 4.3 hours per hectare, in the paddy field respectively.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Transfer Learning using Multiple ConvNet Layers Activation Features with Principal Component Analysis for Image Classification (전이학습 기반 다중 컨볼류션 신경망 레이어의 활성화 특징과 주성분 분석을 이용한 이미지 분류 방법)

  • Byambajav, Batkhuu;Alikhanov, Jumabek;Fang, Yang;Ko, Seunghyun;Jo, Geun Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.205-225
    • /
    • 2018
  • Convolutional Neural Network (ConvNet) is one class of the powerful Deep Neural Network that can analyze and learn hierarchies of visual features. Originally, first neural network (Neocognitron) was introduced in the 80s. At that time, the neural network was not broadly used in both industry and academic field by cause of large-scale dataset shortage and low computational power. However, after a few decades later in 2012, Krizhevsky made a breakthrough on ILSVRC-12 visual recognition competition using Convolutional Neural Network. That breakthrough revived people interest in the neural network. The success of Convolutional Neural Network is achieved with two main factors. First of them is the emergence of advanced hardware (GPUs) for sufficient parallel computation. Second is the availability of large-scale datasets such as ImageNet (ILSVRC) dataset for training. Unfortunately, many new domains are bottlenecked by these factors. For most domains, it is difficult and requires lots of effort to gather large-scale dataset to train a ConvNet. Moreover, even if we have a large-scale dataset, training ConvNet from scratch is required expensive resource and time-consuming. These two obstacles can be solved by using transfer learning. Transfer learning is a method for transferring the knowledge from a source domain to new domain. There are two major Transfer learning cases. First one is ConvNet as fixed feature extractor, and the second one is Fine-tune the ConvNet on a new dataset. In the first case, using pre-trained ConvNet (such as on ImageNet) to compute feed-forward activations of the image into the ConvNet and extract activation features from specific layers. In the second case, replacing and retraining the ConvNet classifier on the new dataset, then fine-tune the weights of the pre-trained network with the backpropagation. In this paper, we focus on using multiple ConvNet layers as a fixed feature extractor only. However, applying features with high dimensional complexity that is directly extracted from multiple ConvNet layers is still a challenging problem. We observe that features extracted from multiple ConvNet layers address the different characteristics of the image which means better representation could be obtained by finding the optimal combination of multiple ConvNet layers. Based on that observation, we propose to employ multiple ConvNet layer representations for transfer learning instead of a single ConvNet layer representation. Overall, our primary pipeline has three steps. Firstly, images from target task are given as input to ConvNet, then that image will be feed-forwarded into pre-trained AlexNet, and the activation features from three fully connected convolutional layers are extracted. Secondly, activation features of three ConvNet layers are concatenated to obtain multiple ConvNet layers representation because it will gain more information about an image. When three fully connected layer features concatenated, the occurring image representation would have 9192 (4096+4096+1000) dimension features. However, features extracted from multiple ConvNet layers are redundant and noisy since they are extracted from the same ConvNet. Thus, a third step, we will use Principal Component Analysis (PCA) to select salient features before the training phase. When salient features are obtained, the classifier can classify image more accurately, and the performance of transfer learning can be improved. To evaluate proposed method, experiments are conducted in three standard datasets (Caltech-256, VOC07, and SUN397) to compare multiple ConvNet layer representations against single ConvNet layer representation by using PCA for feature selection and dimension reduction. Our experiments demonstrated the importance of feature selection for multiple ConvNet layer representation. Moreover, our proposed approach achieved 75.6% accuracy compared to 73.9% accuracy achieved by FC7 layer on the Caltech-256 dataset, 73.1% accuracy compared to 69.2% accuracy achieved by FC8 layer on the VOC07 dataset, 52.2% accuracy compared to 48.7% accuracy achieved by FC7 layer on the SUN397 dataset. We also showed that our proposed approach achieved superior performance, 2.8%, 2.1% and 3.1% accuracy improvement on Caltech-256, VOC07, and SUN397 dataset respectively compare to existing work.

A Study on Transition of Rice Culture Practices During Chosun Dynasty Through Old References IX. Intergrated Discussion on Rice (주요(主要) 고농서(古農書)를 통(通)한 조선시대(朝鮮時代)의 도작기술(稻作技術) 전개(展開) 과정(過程) 연구(硏究) - IX. 도작기술(稻作技術)에 대(對)한 종합고찰(綜合考察))

  • Guh, J.O.;Lee, S.K.;Lee, E.W.;Lee, H.S.
    • Korean Journal of Weed Science
    • /
    • v.12 no.1
    • /
    • pp.70-79
    • /
    • 1992
  • From the beginning of the chosun dynasty, an agriculture-first policy was imposed by being written farming books, for instance, Nongsajiksul, matched with real conditions of local agriculture, which provided the grounds of new, intensive farming technologies. This farming book was the collection of good fanning technologies that were experienced in rural farm areas at that time. According to Nongsajiksul, rice culture systems were divided into "Musarmi"(Water-Seeded rice), /"Kunsarmi"(dry-seeded rice), /transplanted rice and mountainous rice (upland rice) culture. The characteristics of these rice cultures with high technologies were based of scientific weeding methods, improved fertilization, and cultivation works using cattle power and manpower tools systematically. Reclamation of coastal swampy and barren land was possible in virtue of fire cultivation farming(火耕) and a weeding tool called "Yoonmok"(輪木). Also, there was an improved hoe to do weeding works as well as thinning and heaping-up of soil at seeding stages of rice. Direct-seeded rice culture in flat paddy fields were expanded by constructing the irrigation reservoirs and ponds, and the valley paddy fields was reclaimed by constructing "Boh(洑)". These were possible due to weed control by irrigation waters, keeping soil fertility by inorganic fertilization during irrigation, and increased productivity of rice fields by supplying good physiological conditions for rice. Also, labor-saving culture of rice was feasible by transplanting but in national-wide, rice should not basically be transplanted because of the restriction of water use. Thus, direct-seeded rice in dry soils was established, in which rice was direct-seeded and grown in dry soils by seedling stages and was grown in flooded fields when rained, as in the book "Nongsajiksul". During the middle of the dynasty(AD 1495-1725), the excellent labor-saving farmings include check-rowing transplanting because of weeding efficiency and availability in rice("Hanjongrok"), and, nurserybed techniques (early transplanting of rice) were emphasized on the basis of rice transplanting ["Nongajibsung"]. The techniques for deep plowing with cattle powers and for putting more fertilizers were to improve the productivity of labor and land, The matters advanced in "Sanlimkyungje" more than in "Nongajibsung" were, development of "drybed of rice nursery stock", like "upland rice nursery" today, transplanting, establishment of "winter barly on drained paddy field, and improvement of labor and land-productivity in rice". This resulted in the community of large-scale farming by changing the pattern of small-farming into the production system of rice management. Woo-hayoung(1741-1812) in his book "Chonilrok" tried to reform from large-scale farmings into intensive farmings, of which as eminent view was to divide the land use into transplanting (paddy) and groove-seeding methods(dry field). Especially as insisted by Seo-yugo ("Sanlimkyungjeji"), the advantages of transplanting were curtailment of weeding labors, good growth of rice because of soil fertility of both nurserybed and paddy field, and newly active growth because rice plants were pulled out and replanted. Of course, there were reestimation of transplanting, limitation of two croppings a year, restriction of "paddy-upland alternation", and a ban for large-scale farming. At that period, Lee-jiyum had written on rice farming technologies in dry upland with consider of the land, water physiology of rice, and convenience for weeding, and it was a creative cropping system to secure the farm income most safely. As a integrated considerations, the followings must be introduced to practice the improved farming methods ; namely, improvement of farming tools, putting more fertilizers, introduction of cultural technologies more rational and efficient, management of labor power, improvement of cropping system to enhance use of irrigation water and land, introduction of new crops and new varieties.

  • PDF

Liability of the Compensation for Damage Caused by the International Passenger's Carrier by Air in Montreal Convention (몬트리올조약에 있어 국제항공여객운송인의 손해배상책임)

  • Kim, Doo-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.9-39
    • /
    • 2003
  • The rule of the Warsaw Convention of 1929 are well known and still being all over the world. The Warsaw Convention is undoubtedly the most widely accepted private international air law treaty with some 140 countries. In the international legal system for air transportation, the Warsaw Convention has played a major role for more than half century, and has been revised many times in consideration of the rapid developments of air high technology, changes of social and economic circumstances, need for the protection of passengers. Some amendments became effective, but others are still not effective. As a result, the whole international legal system for air transportation is at past so complicated and tangled. However, the 'Warsaw system' consists of the Warsaw Convention of 1929 the Guadalajara Convention of 1961, a supplementary convention, and the following six protocols: (1) the Hague Protocol of 1955, (2) the Guatemala Protocol of 1971, (3) the Montreal Additional Protocols, No.1, (4) the Montreal Additional Protocol No.2, (5) the Montreal Additional Protocol No.3, and (6) the Montreal Additional Protocol No.4. of 1975. As a fundamental principle of the air carrier's liability in the international convention and protocols, for instance in the Warsaw Convention and the Hague Protocol, the principle of limited liability and a presumed fault system has been adopted. Subsequently, the Montreal Inter-carrier Agreement of 1966, the Guatemala City Protocol, the Montreal Additional Protocol No.3, and the Montreal Additional Protocol No. 4 of 1975 maintained the limited liability, but substituted the presumed liability system by an absolute liability, that is, strict liability system. The Warsaw System, which sets relatively low compensation limits for victims of aircraft accidents and regulates the limited liability for death and injury of air passengers, had become increasingly outdated. Japanese Airlines and Inter-carrier Agreement of International Air Transport Association in 1995 has been adopted the unlimited liability of air carrier in international flight. The IATA Inter-Carrier Agreement, in which airlines in international air transportation agree to waive the limit of damages, was long and hard in coming, but it was remarkable achievement given the political and economic realities of the world. IATA deserves enormous credit for bringing it about. The Warsaw System is controversial and questionable. In order to find rational solution to disputes between nations which adopted differing liability systems in international air transportation, we need to reform the liability of air carriers the 'Warsaw system' and fundamentally, to unify the liability system among the nations. The International Civil Aviation Organization(ICAO) will therefore reinforce its efforts to further promote a legal environment that adequately reflects the public interest and the needs of the parties involved. The ICAO Study Group met in April, 1998, together with the Drafting Committee. The time between the "Special Group on the Modernization and Consolidation of the 'Warsaw system'(SGMW)" and the Diplomatic Conference must be actively utilized to arrange for profound studies of the outstanding issues and for wide international consultations with a view to narrowing the scope of differences and preparing for a global international consensus. From 11 to 28 May 1999 the ICAO Headquarters at Montreal hosted a Diplomatic Conference convened to consider, with a view to adoption, a draft Convention intended to modernize and to integrate replace the instruments of the Warsaw system. The Council of ICAO convened this Conference under the Procedure for the Adoption of International Conventions. Some 525 participants from 121 Contracting States of ICAO attended, one non-contracting State, 11 observer delegations from international organizations, a total of 544 registered participants took part in the historic three-week conference which began on 10 May. The Conference was a success since it adopted a new Convention for the Unification of Certain Rules for International Carriage by Air. The 1999 Montreal Convention, created and signed by representatives of 52 countries at an international conference convened by ICAO at Montreal on May 28, 1999, came into effect on November 4, 2003. Representatives of 30 countries have now formally ratified the Convention under their respective national procedures and ratification of the United States, which was the 30th country to ratify, took place on September 5, 2003. Under Article 53.6 of the Montreal Convention, it enters into force on the 60th day following the deposit of the 30th instrument of ratification or acceptation. The United States' ratification was deposited with ICAO on September 5, 2003. The ICAO have succeeded in modernizing and consolidating a 70-year old system of international instruments of private international law into one legal instrument that will provide, for years to come, an adequate level of compensation for those involved in international aircraft accidents. An international diplomatic conference on air law by ICAO of 1999 succeeded in adopting a new regime for air carrier liability, replacing the Warsaw Convention and five other related legal instruments with a single convention that provided for unlimited liability in relation to passengers. Victims of international air accidents and their families will be better protected and compensated under the new Montreal Convention, which modernizes and consolidates a seventy-five year old system of international instruments of private international law into one legal instrument. A major feature of the new legal instrument is the concept of unlimited liability. Whereas the Warsaw Convention set a limit of 125,000 Gold Francs (approximately US$ 8,300) in case of death or injury to passengers, the Montreal Convention introduces a two-tier system. The first tier includes strict liability up to l00,000 Special Drawing Rights (SDR: approximately US$ 135,000), irrespective of a carrier's fault. The second tier is based on presumption of fault of a carrier and has no limit of liability. The 1999 Montreal Convention also includes the following main elements; 1. In cases of aircraft accidents, air carriers are called upon to provide advance payments, without delay, to assist entitled persons in meeting immediate economic needs; the amount of this initial payment will be subject to national law and will be deductable from the final settlement; 2. Air carriers must submit proof of insurance, thereby ensuring the availability of financial resources in cases of automatic payments or litigation; 3. The legal action for damages resulting from the death or injury of a passenger may be filed in the country where, at the time of the accident, the passenger had his or her principal and permanent residence, subject to certain conditions. The new Montreal Convention of 1999 included the 5th jurisdiction - the place of residence of the claimant. The acceptance of the 5th jurisdiction is a diplomatic victory for the US and it can be realistically expected that claimants' lawyers will use every opportunity to file the claim in the US jurisdiction - it brings advantages in the liberal system of discovery, much wider scope of compensable non-economic damages than anywhere else in the world and the jury system prone to very generous awards. 4. The facilitation in the recovery of damages without the need for lengthy litigation, and simplification and modernization of documentation related to passengers. In developing this new Montreal Convention, we were able to reach a delicate balance between the needs and interests of all partners in international civil aviation, States, the travelling public, air carriers and the transport industry. Unlike the Warsaw Convention, the threshold of l00,000 SDR specified by the Montreal Convention, as well as remaining liability limits in relation to air passengers and delay, are subject to periodic review and may be revised once every five years. The primary aim of unification of private law as well as the new Montreal Convention is not only to remove or to minimize the conflict of laws but also to avoid conflict of jurisdictions. In order to find a rational solution to disputes between nations which have adopted differing liability systems in international air transport, we need fundamentally to reform their countries's domestic air law based on the new Montreal Convention. It is a desirable and necessary for us to ratify rapidly the new Montreal Convention by the contracting states of lCAO including the Republic of Korea. According to the Korean and Japanese ideas, airlines should not only pay compensation to passengers immediately after the accident, but also the so-called 'condolence' money to the next of kin. Condolence money is a gift to help a dead person's spirit in the hereafter : it is given on account of the grief and sorrow suffered by the next of kin, and it has risen considerably over the years. The total amount of the Korean and Japanese claims in the case of death is calculated on the basis of the loss of earned income, funeral expenses and material demage (baggage etc.), plus condolence money. The economic and social change will be occurred continuously after conclusion of the new Montreal Convention. In addition, the real value of life and human right will be enhanced substantially. The amount of compensation for damage caused by aircraft accident has increased in dollar amount as well as in volume. All air carrier's liability should extend to loss of expectation of leisure activities, as well as to damage to property, and mental and physical injuries. When victims are not satisfied with the amount of the compensation for damage caused by aircraft accident for which an airline corporation is liable under the current liability system. I also would like to propose my opinion that it is reasonable and necessary for us to interpret broadly the meaning of the bodily injury on Article 17 of the new Montreal Convention so as to be included the mental injury and condolence. Furthermore, Korea and Japan has not existed the Air Transport Act regulated the civil liability of air carrier such as Air Transport Act (Luftverkehrsgestz) in Germany. It is necessary for us to enact "the Korean Air Transport Contract Act (provisional title)" in order to regulate the civil liability of air carrier including the protection of the victims and injured persons caused by aircraft accident.

  • PDF