• Title/Summary/Keyword: Number of users

Search Result 3,027, Processing Time 0.038 seconds

Mobile Camera-Based Positioning Method by Applying Landmark Corner Extraction (랜드마크 코너 추출을 적용한 모바일 카메라 기반 위치결정 기법)

  • Yoo Jin Lee;Wansang Yoon;Sooahm Rhee
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.6_1
    • /
    • pp.1309-1320
    • /
    • 2023
  • The technological development and popularization of mobile devices have developed so that users can check their location anywhere and use the Internet. However, in the case of indoors, the Internet can be used smoothly, but the global positioning system (GPS) function is difficult to use. There is an increasing need to provide real-time location information in shaded areas where GPS is not received, such as department stores, museums, conference halls, schools, and tunnels, which are indoor public places. Accordingly, research on the recent indoor positioning technology based on light detection and ranging (LiDAR) equipment is increasing to build a landmark database. Focusing on the accessibility of building a landmark database, this study attempted to develop a technique for estimating the user's location by using a single image taken of a landmark based on a mobile device and the landmark database information constructed in advance. First, a landmark database was constructed. In order to estimate the user's location only with the mobile image photographing the landmark, it is essential to detect the landmark from the mobile image, and to acquire the ground coordinates of the points with fixed characteristics from the detected landmark. In the second step, by applying the bag of words (BoW) image search technology, the landmark photographed by the mobile image among the landmark database was searched up to a similar 4th place. In the third step, one of the four candidate landmarks searched through the scale invariant feature transform (SIFT) feature point extraction technique and Homography random sample consensus(RANSAC) was selected, and at this time, filtering was performed once more based on the number of matching points through threshold setting. In the fourth step, the landmark image was projected onto the mobile image through the Homography matrix between the corresponding landmark and the mobile image to detect the area of the landmark and the corner. Finally, the user's location was estimated through the location estimation technique. As a result of analyzing the performance of the technology, the landmark search performance was measured to be about 86%. As a result of comparing the location estimation result with the user's actual ground coordinate, it was confirmed that it had a horizontal location accuracy of about 0.56 m, and it was confirmed that the user's location could be estimated with a mobile image by constructing a landmark database without separate expensive equipment.

Potential Effects of Gaming Disorder Classification on Gamers' Attitude and Gaming Intention (게임이용장애 질병분류가 게임이용자의 태도와 게임의향에 미치는 효과)

  • Kim, Suk Hwan;Han, Sang Hoon;Kim, Bora;Kang, Hyoung Goo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.4
    • /
    • pp.277-301
    • /
    • 2020
  • This study surveyed 503 adults to examine the effect of gaming disorder classification, recently announced by World Health Organization(WHO), when it is applied to Korean game market. Considering the difference in respondents' background knowledge on gaming disorder, half of the respondents were randomly assigned to read an informative news article describing WHO's decision and its expected effect on domestic game industry. Based on previous literature of gaming disorder, we categorized respondents into a normal-use group and a potentially problematic-use group. As a result of analyses, it was found that the gaming disorder classification would yield overall reduction of game-related consumption in terms of gaming time(24%), game cost(28%), the number of games(22%), etc. The potentially problematic group showed higher willingness to pay for gaming than the normal group did, even if the game cost presumably increases due to the gaming disorder classification. A similar outcome was observed in those with high stress levels. This implies that the policy to solve game addiction problems may ironically lead to unexpected cost increases to the target group of the policy. Hence, problematic groups, especially, highly stressful people and the people with the lack of self-control, need to be considered when the gaming disorder classification policy is established. Furthermore, the informative news article had the preventive effect on the attitude and the intention of the people with moderate or high self-control capacity, but not to the people with gaming-additive tendencies, Again, this finding confirms the necessity of the tweezers policy to refine target groups by their characteristics and prepare for differentiated policies. When the gaming disorder classification is simply adopted with no consideration of domestic circumstances, irreversible loss could affect Korean game users, game industries, and related companies. This calls for urgent cooperation between academia, government, and industry to set up appropriate measures to deal with the gaming disorder classification.

Introduction on the Products and the Quality Management Plans for GOCI-II (천리안 해양위성 2호 산출물 및 품질관리 계획)

  • Lee, Sun-Ju;Lee, Kyeong-Sang;Han, Tae Hyun;Moon, Jeong-Eon;Bae, Sujung;Choi, Jong-kuk
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_2
    • /
    • pp.1245-1257
    • /
    • 2021
  • GOCI-II, succeeding the mission of GOCI, was launched in February 2020 and has been in regular operation since October 2020. Korea Institute of Ocean Science and Technology (KIOST) processes and produces in real time Level-1B and 26 Level-2 outputs, which then are provided by Korea Hydrographic and Oceanographic Agency (KHOA). We introduced current status of regular GOCI-II operation and showed future improvement. Basic GOCI-II products including chlorophyll-a, total suspended materials, and colored dissolved organic matter concentration, are induced by OC4 and YOC algorithms, which were described in detail. For the full disk (FD), imaging schedule was established considering solar zenith angle and sun glint during the in-orbital test, but improved by further considering satellite zenith angle. The number of slots satisfying the condition 'Best Ocean' significantly increased from 15 to 78. GOCI-II calibration requirements were presented based on that by European Space Agency (ESA) and candidate fixed locations for calibrating local observation area were. The quality management of FD uses research ships and overseas bases of KIOST, but it is necessary to establish an international calibration/validation network. These results are expected to enhance the understanding of users for output processing and help establish detailed plans for future quality management tasks.

Betweenness Centrality-based Evacuation Vulnerability Analysis for Subway Stations: Case Study on Gwanggyo Central Station (매개 중심성 기반 지하철 역사 재난 대피 취약성 분석: 광교중앙역 사례연구)

  • Jeong, Ji Won;Ahn, Seungjun;Yoo, Min-Taek
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.3
    • /
    • pp.407-416
    • /
    • 2024
  • Over the past 20 years, there has been a rapid increase in the number and size of subway stations and underground structures worldwide, and the importance of safety for subway users has also continuously grown. Subway stations, due to their structural characteristics, have limited visibility and escape routes in disaster situations, posing a high risk of human casualties and economic losses. Therefore, an analysis of disaster vulnerabilities is essential not only for existing subway systems but also for deep underground facilities like GTX. This paper presents a case study applying a betweenness centrality-based disaster vulnerability analysis framework to the case of Gwanggyo Central Station. The analysis of Gwanggyo Central Station's base model and various disaster scenarios revealed that the betweenness centrality distribution is symmetrical, following the symmetrical spatial structure of the station, with high centrality concentrated in the central areas of basement levels one and two. These areas exhibited values more than 220% above the average, indicating a high likelihood of bottleneck phenomena during evacuation in disaster situations. To mitigate this vulnerability, scenarios were proposed to distribute evacuation flows concentrated in the central areas, enhancing the usability of peripheral areas as evacuation routes by connecting staircases continuously. This modification, when considered, showed a decrease in centrality concentration, confirming that the proposed addition of evacuation paths could effectively contribute to dispersing the flow of evacuation in Gwanggyo Central Station. This case study demonstrates the effectiveness of the proposed framework for assessing evacuation vulnerability in enhancing subway station user safety and can be effectively applied in disaster response and management plans for major underground facilities.

Current State and the Future Tasks of Home Visit Nursing Care in South Korea (우리나라 가정방문간호의 현황과 향후 과제)

  • Park, Eunok
    • Journal of agricultural medicine and community health
    • /
    • v.44 no.1
    • /
    • pp.28-38
    • /
    • 2019
  • Objectives: We searched and reviewed the literature including the laws or acts, statistics, guidelines, papers and conference proceedings related to home visit nursing care in South Korea. Method: We searched and reviewed the literature including the laws or acts, statistics, guidelines, papers and conference proceedings related to home visit nursing care in Korea. Results: There are three types of home care nursing in Korea. Public health center provides home visit nursing to vulnerable population by registered nurses for free, based on community health act in public health center. As of 2017, 1,261,208 people were enrolled in the visiting health program of public health center. Health behavior and disease management has been improved and showed having cost-benefit effect among the enrolled people in visiting health program. Visiting nursing care in long-term care services is provided by registered nurses or nurse aid, based on long-term care act. The cost is paid as the unit price according to service time. 1,095,764 older people used long-term care services in 2017, only 0.2% of total cost used for home visiting nursing. Even though the number of user of home visiting nursing, it was reported that users spent less medical cost and hospitalized shorter. Hospital-based home care nursing is provided to patients and their families under the prescription of a doctor by family nurse specialists who are employed by medical institute based on medical law. Four hundred sixty family nurse specialists worked for hospital-based home care nursing and hospital-based home care services accounted for 0.038% of total medical expenses in 2017. Conclusion: Even though home visit nursing care services are different in aspect of legal basis, personnel, running institutes, and cost basis, home visit nursing care showed cost-benefit effect and good health outcomes. In order to advance home visit nursing care, the integrated home visiting care, improvement of working condition, and revision of legal basis should be considered.

Exploring the Temporal Relationship Between Traffic Information Web/Mobile Application Access and Actual Traffic Volume on Expressways (웹/모바일-어플리케이션 접속 지표와 TCS 교통량의 상관관계 연구)

  • RYU, Ingon;LEE, Jaeyoung;CHOI, Keechoo;KIM, Junghwa;AHN, Soonwook
    • Journal of Korean Society of Transportation
    • /
    • v.34 no.1
    • /
    • pp.1-14
    • /
    • 2016
  • In the recent years, the internet has become accessible without limitation of time and location to anyone with smartphones. It resulted in more convenient travel information access both on the pre-trip and en-route phase. The main objective of this study is to conduct a stationary test for traffic information web/mobile application access indexes from TCS (Toll Collection System); and analyzing the relationship between the web/mobile application access indexes and actual traffic volume on expressways, in order to analyze searching behavior of expressway related travel information. The key findings of this study are as follows: first, the results of ADF-test and PP-test confirm that the web/mobile application access indexes by time periods satisfy stationary conditions even without log or differential transformation. Second, the Pearson correlation test showed that there is a strong and positive correlation between the web/mobile application access indexes and expressway entry and exit traffic volume. In contrast, truck entry traffic volume from TCS has no significant correlation with the web/mobile application access indexes. Third, the time gap relationship between time-series variables (i.e., concurrent, leading and lagging) was analyzed by cross-correlation tests. The results indicated that the mobile application access leads web access, and the number of mobile application execution is concurrent with all web access indexes. Lastly, there was no web/mobile application access indexes leading expressway entry traffic volumes on expressways, and the highest correlation was observed between webpage view/visitor/new visitor/repeat visitor/application execution counts and expressway entry volume with a lag of one hour. It is expected that specific individual travel behavior can be predicted such as route conversion time and ratio if the data are subdivided by time periods and areas and utilizing traffic information users' location.

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF

Topic Modeling Insomnia Social Media Corpus using BERTopic and Building Automatic Deep Learning Classification Model (BERTopic을 활용한 불면증 소셜 데이터 토픽 모델링 및 불면증 경향 문헌 딥러닝 자동분류 모델 구축)

  • Ko, Young Soo;Lee, Soobin;Cha, Minjung;Kim, Seongdeok;Lee, Juhee;Han, Ji Yeong;Song, Min
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.2
    • /
    • pp.111-129
    • /
    • 2022
  • Insomnia is a chronic disease in modern society, with the number of new patients increasing by more than 20% in the last 5 years. Insomnia is a serious disease that requires diagnosis and treatment because the individual and social problems that occur when there is a lack of sleep are serious and the triggers of insomnia are complex. This study collected 5,699 data from 'insomnia', a community on 'Reddit', a social media that freely expresses opinions. Based on the International Classification of Sleep Disorders ICSD-3 standard and the guidelines with the help of experts, the insomnia corpus was constructed by tagging them as insomnia tendency documents and non-insomnia tendency documents. Five deep learning language models (BERT, RoBERTa, ALBERT, ELECTRA, XLNet) were trained using the constructed insomnia corpus as training data. As a result of performance evaluation, RoBERTa showed the highest performance with an accuracy of 81.33%. In order to in-depth analysis of insomnia social data, topic modeling was performed using the newly emerged BERTopic method by supplementing the weaknesses of LDA, which is widely used in the past. As a result of the analysis, 8 subject groups ('Negative emotions', 'Advice and help and gratitude', 'Insomnia-related diseases', 'Sleeping pills', 'Exercise and eating habits', 'Physical characteristics', 'Activity characteristics', 'Environmental characteristics') could be confirmed. Users expressed negative emotions and sought help and advice from the Reddit insomnia community. In addition, they mentioned diseases related to insomnia, shared discourse on the use of sleeping pills, and expressed interest in exercise and eating habits. As insomnia-related characteristics, we found physical characteristics such as breathing, pregnancy, and heart, active characteristics such as zombies, hypnic jerk, and groggy, and environmental characteristics such as sunlight, blankets, temperature, and naps.

Optimum Size Selection and Machinery Costs Analysis for Farm Machinery Systems - Programming for Personal Computer - (농기계(農機械) 투입모형(投入模型) 설정(設定) 및 기계이용(機械利用) 비용(費用) 분석연구(分析硏究) - PC용(用) 프로그램 개발(開發) -)

  • Lee, W.Y.;Kim, S.R.;Jung, D.H.;Chang, D.I.;Lee, D.H.;Kim, Y.H.
    • Journal of Biosystems Engineering
    • /
    • v.16 no.4
    • /
    • pp.384-398
    • /
    • 1991
  • A computer program was developed to select the optimum size of farm machine and analyze its operation costs according to various farming conditions. It was written in FORTRAN 77 and BASIC languages and can be run on any personal computer having Korean Standard Complete Type and Korean Language Code. The program was developed as a user-friendly type so that users can carry out easily the costs analysis for the whole farm work or respective operation in rice production, and for plowing, rotarying and pest controlling in upland. The program can analyze simultaneously three different machines in plowing & rotarying and two machines in transplanting, pest controlling and harvesting operations. The input data are the sizes of arable lands, possible working days and number of laborers during the opimum working period, and custom rates varying depending on regions and individual farming conditions. We can find out the results such as the selected optimum combination farm machines, the overs and shorts of working days relative to the planned working period, capacities of the machines, break-even points by custom rate, fixed costs for a month, and utilization costs in a hectare.

  • PDF

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.