• Title/Summary/Keyword: Individual code

Search Result 292, Processing Time 0.029 seconds

Development of IoT Searching System Missing Children by utilizing Open Source Hardware (오픈소스 하드웨어를 이용한 IoT 미아찾기 시스템)

  • Heo, Seong-Mu;Kim, Cha-Jong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.277-280
    • /
    • 2016
  • Currently, systems for finding missing children are composed of using communication between a QR code and RFID chip, as the use of a smartphone. However, the current systems for finding missing children have limitations in that children can only be found if there are people in the surrounding area; there is an economic burden on parents required to purchase a smartphone for their children; along with difficulties in finding the missing children without the assistance of those in the surrounding area in critical situations such as a kidnapping, due to the limited duration of the battery life. In order to solve such problems, approaches need to be made from two perspectives: having someone in the surrounding area; and absence of anyone in the surrounding area. This thesis is centered on the development of a IoT (Internet of Things) system for finding missing children that combines two methods, namely, the method of finding missing children without a guardian in the surrounding area -within the limited space in which AP is installed by using a beacon and open source hardware being highlighted as the IoT technology - and the method of finding missing children with the smartphone application in which each individual becomes the Access Point (AP). The Main purpose is to provide accurate information of missing children's location for the 2situations and it is found that the accuracy of smartphones APP is 97.7% and security device AP is 91.1%.

  • PDF

Radiological Impact on Decommissioning Workers of Operating Multi-unit NPP (다수호기 원전 운영에 따른 원전 해체 작업자에 대한 방사선학적 영향)

  • Lee, Eun-hee;Kim, Chang-Lak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.17 no.1
    • /
    • pp.107-120
    • /
    • 2019
  • The decommissioning of one nuclear power plant in a multi-unit nuclear power plant (multi-unit NPP) site may pose radiation exposure risk to decommissioning workers. Thus, it is essentially required to evaluate the exposure dose of decommissioning workers of operating multi-unit NPPs nearby. The ENDOS program is a dose evaluation code developed by the Korea Atomic Energy Research Institute (KAERI). As two sub-programs of ENDOS, ENDOS-ATM to anticipate atmospheric transport and ENDOS-G to calculate exposure dose by gaseous radioactive effluents are used in this study. As a result, the annual maximum individual dose for decommissioning workers is estimated to be $2.31{\times}10^{-3}mSv{\cdot}y^{-1}$, which is insignificant compared with the effective dose limit of $1mSv{\cdot}y^{-1}$ for the public. Although it is revealed that the exposure dose of operating multi-unit NPPs does not result in a significant impact on decommissioning workers, closer examination of the effect of additional exposure due to actual demolition work is required. The calculation method of this study is expected to be utilized in the future for planned decommissioning projects in Korea. Because domestic NPPs are located in multi-unit sites, similar situations may occur.

Hi, KIA! Classifying Emotional States from Wake-up Words Using Machine Learning (Hi, KIA! 기계 학습을 이용한 기동어 기반 감성 분류)

  • Kim, Taesu;Kim, Yeongwoo;Kim, Keunhyeong;Kim, Chul Min;Jun, Hyung Seok;Suk, Hyeon-Jeong
    • Science of Emotion and Sensibility
    • /
    • v.24 no.1
    • /
    • pp.91-104
    • /
    • 2021
  • This study explored users' emotional states identified from the wake-up words -"Hi, KIA!"- using a machine learning algorithm considering the user interface of passenger cars' voice. We targeted four emotional states, namely, excited, angry, desperate, and neutral, and created a total of 12 emotional scenarios in the context of car driving. Nine college students participated and recorded sentences as guided in the visualized scenario. The wake-up words were extracted from whole sentences, resulting in two data sets. We used the soundgen package and svmRadial method of caret package in open source-based R code to collect acoustic features of the recorded voices and performed machine learning-based analysis to determine the predictability of the modeled algorithm. We compared the accuracy of wake-up words (60.19%: 22%~81%) with that of whole sentences (41.51%) for all nine participants in relation to the four emotional categories. Accuracy and sensitivity performance of individual differences were noticeable, while the selected features were relatively constant. This study provides empirical evidence regarding the potential application of the wake-up words in the practice of emotion-driven user experience in communication between users and the artificial intelligence system.

Development of Graph based Deep Learning methods for Enhancing the Semantic Integrity of Spaces in BIM Models (BIM 모델 내 공간의 시멘틱 무결성 검증을 위한 그래프 기반 딥러닝 모델 구축에 관한 연구)

  • Lee, Wonbok;Kim, Sihyun;Yu, Youngsu;Koo, Bonsang
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.3
    • /
    • pp.45-55
    • /
    • 2022
  • BIM models allow building spaces to be instantiated and recognized as unique objects independently of model elements. These instantiated spaces provide the required semantics that can be leveraged for building code checking, energy analysis, and evacuation route analysis. However, theses spaces or rooms need to be designated manually, which in practice, lead to errors and omissions. Thus, most BIM models today does not guarantee the semantic integrity of space designations, limiting their potential applicability. Recent studies have explored ways to automate space allocation in BIM models using artificial intelligence algorithms, but they are limited in their scope and relatively low classification accuracy. This study explored the use of Graph Convolutional Networks, an algorithm exclusively tailored for graph data structures. The goal was to utilize not only geometry information but also the semantic relational data between spaces and elements in the BIM model. Results of the study confirmed that the accuracy was improved by about 8% compared to algorithms that only used geometric distinctions of the individual spaces.

The Relationship between Transgressive Behaviors of Humanity and Moral Anger in Korean Culture ('사람됨' 준거 위반과 도덕적 정서로서의 화(火)의 관계 분석)

  • Kibum Kim ;Hyojin Im
    • Korean Journal of Culture and Social Issue
    • /
    • v.11 no.3
    • /
    • pp.1-21
    • /
    • 2005
  • Many researches have argued the most important dimension of perception or evaluation of person is morality and competence in Korean culture. This study was to investigate the cultural characteristics of the criteria of personhood. Two studies were conducted to investigate the criteria used to evaluate person by qualitative approach and the differences of evaluation of wrongdoer who violates interpersonal norm or individual autonomy by experimental method. In addition, anger as emotional response to wrongdoer is conceptualized in terms of moral and self-conscious emotion. Expression of anger is less an outpouring of emotion and more a culturally regulated and normative mode of managing and putting into practice our society's system of rights and obligations - its moral code. According to results of qualitative data by interview and focus group interview, the most important criteria used to evaluate personhood was interpersonal concern, esp, expectation and norm. The results of experiment revealed that violation of interpersonal norm domain evoked angrier towards violator than autonomy domain. The subjects ascribed more blame and responsibility to interpersonal norm violator than autonomy keeper. Also function of behavior inhibition of anger was higher in interpersonal norm domain than autonomy domain.

Comparison of Standard and Lend Limit Test of Various Institutes on Lead Limit of Synthetic and Natural Food Additives (합성 및 천연 식품첨가물의 납함량에 대한 여러 기관의 규격기준 및 납시험법 비교)

  • Shin Dong-Hwa;Kim Yong-Suk;Jeong Do-Yeong;Lee Young-Hwan;Bang Jeong-Ho;Om Ae-Son;Shin Jae-Wook;Lee Tal-Soo;Jang Young-Mi;Hong Ki-Hyoung;Park Sung-Kwan;Park Sung-Kug;Kwon Yong-Kwan
    • Journal of Food Hygiene and Safety
    • /
    • v.21 no.2
    • /
    • pp.82-91
    • /
    • 2006
  • Standard and lead limit test in general test method of Korea, Japan, Joint FAO/WHO Expert Committee of Food Additives (JECFA), USA, and EU on synthetic and natural food additives were compared. There were found that the general test methods in 'Korea Food Additives Code' were different from standards of various institutes on lead limit test. For the lead limit test of food additives, Korea used dithizone method, Japan used atomic absorption spectrophotometry, and USA used dithizone method, flame atomic absorption spectrophotometric method, atomic absorption spectrophotometric graphite furnace method, and APDC extraction method. In addition, JECFA and EU used dithizone method and atomic absorption spectrophotometric method. The dithizone methods of Korea, USA, and JECFA were nearly identical. In the case of USA, JECFA, and EU, the analytical methods for lead limit test were shown in individual monograph. Lead limit test against 13 synthetic, such as magnesium stearate and L-cystine, and 12 natural, such as gua gum and diatomaceous earth, food additives distributed in Korea were performed by the analytical method of each institute. Although all institutes use various methods for analysis of lead, contents of lead in food additives tested fell into the standard of each institute.

Digital painting: Image transfonnation, simulation, heterologie and transfonnation (현대회화에서의 형태와 물질 -Digital Transfiguration에 관한 연구-)

  • Jeong, Suk-Yeong
    • Journal of Science of Art and Design
    • /
    • v.10
    • /
    • pp.161-181
    • /
    • 2006
  • The words which appeared in my theoretical study and work are image transformation to digital painting, simulation, heterologie and transfiguration, etc. Firstly, let's look into 'digital era' or 'new media era'. Nowadays, the image world including painting within the rapid social and cultural change, which is called as digital era, is having the dramatic change. Together with the development of scientific technology, large number of events which was deemed to be impossible is happening as real in image world Moreover, these changes in image world is greatly influencing to our life. The word which compresses this change of image world and shows is 'digital'. Digit, which means fingers in Latin, indicates separately changing signal, and to be more narrow, it indicates the continual signal of '0' and ' 1' in computer. The opposite word is 'analogue'. As analogue is the word meaning 'infer' or 'similarity', it indicates the signal or form which continuously changes along the series of time when it is compared to digital. Instead of analogue, digital is embossed as a major ruler along the whole area of our current culture. In whole culture and art area, and in whole generalscience, digital is appearing as it has the modernism and importance. The prefix, 'digital', e.g. digital media, digital culture, digital design, digital philosophy, etc, is treated as the synonym of modernism and something new. This advent of digital results the innovative change to the image world, creates the new beauty experience which we could not experience before, and forecasts the formation of advanced art and expansion of creative area. Various intellectual activities using computer is developing the whole world with making the infrastructure. Computer in painting work immediately accomplishes the idea of painters, takes part in simulation work, contingency such as abrupt reversal, extraction, twisting, shaking, obscureness, overlapping, etc, and timing to stimulate the creativity of painters, and provides digital formative language which enables new visual experience to the audience. When the change of digital era, the image appeared in my work is shown in 'transfiguration' like drawing. The word, 'transfiguration' does not indicate the completed and fixed real substance but indicate endlessly moving and floating shape. Thus, this concept is opposite to the substantial consideration, so that various concepts which is able to replace this in accordance with the similar cases are also exist such as change, deterioration, mutation, deformity of appearance and morphing which is frequently used in computer as a technical word. These concepts are not clearly classified, and variably and complicatedly related. Transfiguration basically means the denial of "objectivity' and '(continual) stagnation' or deviation from those. This phenomenon is appeared through the all art schools of art ever since the realism is denied in the 19th century. It is called as 'deformation' in case of expressionism, futurism, cubism, etc, in the beginning of the century, which its former indication is mostly preserved within the process of structural deviation and which has the realistic limit which should be preserved. On the contrary, dramatic transfiguration which has been showing in the modern era through surrealism is different in the point that dramatic transfiguration tends to show the deterioration and deviation rather than the preservation of indicated object. From this point, transfiguration coming out from morphing using computer deteriorates and hides the reality and furthermore, it replaces the 'reality'. Moreover, transfiguration is closely approached to the world of fake or 'imaginary' simulation world of Baudrillard. According to Baudrillard, the image hides and deteriorates the reality, and furthermore, expresses 'not existing' to 'imaginary' under the name of transfiguration. Certain reality, that is, image which is absent from the reality is created and overflowed, so that it finally replaces the reality. This is simulation as it is said by Baudrillard. In turn, Georges Bataille discusses about the image which is produced by digital technology in terms of heterologie. Image of heterologie is the visual signal which is established with the media. Image of media is to have the continuous characteristics of produce, extinction, and transformation, and its clear boundary between images becomes meaningless. The meaning of composition, excess, violation, etc of digital image is explained to heterological study or heteologie suggested as important meaning of Georges Bataille who is a heretic philosopher. As the form and image of mutation shows the shape in accordance with mechanical production, heterologie is introduced as very low materialism (or bas materialisme), in this theory. Heterologie as low materialism which is gradually changing is developing as a different concept and analysis because of the change of time in the late 20s century beside high or low meaning. Including my image, all images non-standardizes and transforms the code. However, reappearance and non-standardization of this code does not seem to be simple. The problem of transformation caused by transfiguration which appears in my digital drawing painting, simulation, heterologie, etc, are the continual problems. Moreover, the subject such as existence of human being, distance from the real life, politics and social problems are being extended to actual research and various expressing work. Especially, individual image world is established by digital painting transfiguration technique, and its change and review start to have the durability. The consciousness of observers who look at the image is changing the subject. Together with theoretical research, researchers are to establish the first step to approach to various image change of digital era painting through transfiguration technique using our realistic and historical image.

  • PDF

A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm (개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증)

  • Kim Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.17-31
    • /
    • 2006
  • In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.

  • PDF

Cumulative Risk Assessment of Organophosphorus Pesticides in the Diet (식품을 통한 유기인계농약류의 동시노출위해성평가)

  • 이효민;한지연;윤은경;김효미;황인균;최동미;이강봉;원경풍;송인상
    • Journal of Food Hygiene and Safety
    • /
    • v.16 no.1
    • /
    • pp.21-26
    • /
    • 2001
  • Risk assessment traditionally are conducted on individual chemicals; however, humans are exposed to multiple chemicals in daily life. The organophosphorus (OP) pesticides are considered in a single risk assessment because they act by a common mechanism of toxicity, and there is likely to be expose to multiple OP pesticides simultaneously or sequentially. The OP pesticides act by inhibiting the enzyme acetylcholinesterasc (AChE) and have available extensive database. AChE is widely distributed throughout the body, most importantly in the nervous system. Inhibition of AChE results in accumulation of acetylcholine in the nervous system that results in clinical signs of cholinergic toxicity, including increased salivation and lacrimation, nausea and vomiting, muscle fasciculation, lethargy and fatigue, among others. To conduct an exposure assessment for pesticides in the diet, we need to know the food consumption patterns of the populations, and the pesticide residue levels in the foods that are consumed. This study was conducted to identify cumulative dietary risk due to multiple OP pesticides that can be exposed through various foods. Total 22 food samples including cereals, vegetables and fruits were collected randomly two times from food markets in several sites (4 cities). The subjected foods were selected by regarding of highly consumed foods to general Korean people. The 12 OP pesticides including Acephate, Azinphos-methyl, Chlorpyrifos, and Diazinon were monitored. For the exposure assessment, general adult group of 60 kg body weight was regarded as target population and food consumption data suggested by Lee et al. (2000) were used as consumed value of individual food. Analyses of samples for OP pesticides have been carried out according to the multiclass multiresidue analysis method and acephate and methamidophos analysis method of Korea Food Code. In general the levels of OP pesticides found in the food samples were very low or not detected.

  • PDF

The Reinforcing Mechanism of Sustaining Participations in Open Source Software Developers: Based on Social Identity Theory and Organizational Citizenship Behavior Theory (오픈 소스 개발자들의 참여 의도 강화 기제 및 참여 지속 의도에 관한 연구: 사회 정체성 이론과 조직시민행동 이론에 기반하여)

  • Choi, Junghong;Choi, Joohee;Lee, Hye Sun;Hwangbo, Hwan;Lee, Inseong;Kim, Jinwoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.1-23
    • /
    • 2013
  • Open Source Software Development (OSSD) differentiates itself from traditional closed software development in that it reveals its source codes online and allows anyone to participate in projects. Even though its success was in doubt, many of the open collaborative working models produced successful results. Academia started to get interested in how developers are willing to participate even when there are no extrinsic rewards for their efforts. Many studies tried to explain developers' motivations, and the pursuit of ideology, reputation, and altruism are found to be the answers. Those studies, however, focused mostly on how the first contribution is made out of a certain motivation. Nowadays, OSSD reaches at its maturity and 70% of professional developers have used or utilized open source software or code in their works. As the proportion of people experiencing OSS, the accounts from previous studies are expected to be weakened. Also, extant literature fails to explain how the motivation of participating in OSS evolves over time and experiences. Given that changing over time or over experiences is the natural in the perception of motivation, studies in an attempt to understand how the motivation changes or evolves are in need. In this study, we aimed to explain how the perception about OSS from past usage or related experiences leads to the intention to sustain OSS participations. By doing so, we try to bridge the gap between previous studies and the actual phenomenon. We argued that perceived instrumentality about OSS learned from past experiences will first affect the formation of organizational identity towards general OSS community. And once the organizational identity is formed, it will affect the one's following behaviors related to OSS development, most likely to sustain the favoring stance toward OSS community. Our research distinguishes itself from previous one in that it divides the paths from organizational identity formed to the intention to sustain the voluntary helping behaviors, by altruistic and conforming intentions. Drawing on this structural model, we could explain how organizational identity engages in forming the sustaining intention from past experiences, and that the intention to help at individual level and organizational level works at different level in OSS community. We grounded our arguments on Social identity theory and Organizational Citizenship theory. We examined our assumption by constructing a structural equation model (SEM) and had 88 developers to answer our online surveys. The result is analyzed by PLS (partial least square) method. Consequently, all paths but one in our model are supported, the one which assumed the association between perceived instrumentality and altruistic intention. Our results provide directions in designing online collaborative platforms where open access collaboration is meant to occur. Theoretically, our study suggests that organizational citizenship behavior can occur from organizational identity, even in bottom-up organizational settings. More specifically, we also argue to consider both organizational level and individual level of motivation in inducing sustained participations within the platforms. Our result can be interpreted to indicate the importance of forming organizational identity in sustaining the participatory behaviors. It is because there was no direct association between perceived instrumentality from past experiences and altruistic behavior, but the perception of organizational identity bridges the two constructs. This means that people with no organizational identity can sustain their participations through conforming intention from only the perception of instrumentality, but it needs little more than that for the people to feel the intention to directly help someone in the community-first to form the self-identity as a member of the given community.