• Title/Summary/Keyword: Opinion Detection

Search Result 45, Processing Time 0.026 seconds

Estimation for Failure Rate of Railway Power Facility and Determination of Maintenance Priority Order using Fuzzy Theory and Expert System (퍼지이론과 전문가 시스템을 이용한 철도 전력 설비의 고장률 평가와 유지보수 우선순위의 결정)

  • Lee, Yun-Seong;Kwon, Ki-Ryang;Kim, Jin-O;Kim, Hyung-Chul
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.495-504
    • /
    • 2009
  • As the Reliability Centered Maintenance(RCM) is being studied, maintenance tasks can be performed effectively through the Risk Priority Number(RPN) evaluation about the components in the system. The RPN is usually calculated through arithmetical operations of three values, Severity, Occurrence, and Detection for each facility. This RPN provides information that includes risk level of the facility and the priority order of maintenance tasks for facility. However, if there is no sufficient historical failure data, it is difficult to calculate the RPN. In this case, historical failure data from other sources can be used and apply this data to korean railway system. In this paper, it is proposed that a new methodology to model the failure rate as a fuzzy membership function. This method is based on failure data from other sources by means of the fuzzy theory and the expert opinion system. And considering assessment tendency of each expert, distortions that happened when the failure rate of facilities is estimated were minimized. This results determine Occurrence values of facilities. Taking advantage of this result., the RPN can be calculated with Severity and Detection of facilities by using the fuzzy operation. The proposed method is applied the rail-way power substation.

  • PDF

Election Prediction on Basis of Sentimental Analysis in 3rd World Countries

  • Bilal, Hafiz Syed Muhammad;Razzaq, Muhammad Asif;Lee, Sungyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.928-931
    • /
    • 2014
  • The detection of human behavior from social media revolutionized health, business, criminal and political prediction. Significance of it, in incentive transformation of public opinion had already proven for developed countries in improving democratic process of elections. In $3^{rd}$ World countries, voters poll votes for personal interests being unaware of party manifesto or national interest. These issues can be addressed by social media, resulting as ongoing process of improvement for presently adopted electoral procedures. On the optimistic side, people of such countries applied social media to garner support and campaign for political parties in General Elections. Political leaders, parties, and people empowered themselves with social media, in disseminating party's agenda and advocacy of party's ideology on social media without much campaigning cost. To study effectiveness of social media inferred from individual's political behavior, large scale analysis, sentiment detection & tweet classification was done in order to classify, predict and forecast election results. The experimental results depicts that social media content can be used as an effective indicator for capturing political behaviors of different parties positive, negative and neutral behavior of the party followers as well as party campaign impact can be predicted from the analysis.

Target Extraction Based on HITS Graph for Opinion Bias Detection in Twitter (트윗 문서에서 의견 바이어스 탐지를 위한 HITS 그래프 기반 핵심 자질 추출)

  • Kwon, A-Rong;Lee, Kyung-Soon
    • Annual Conference on Human and Language Technology
    • /
    • 2012.10a
    • /
    • pp.58-61
    • /
    • 2012
  • 본 논문에서는 트위터 사용자들의 의견을 바이어스 탐지 하기 위해, 핵심 자질 추출 방법으로 HITS 그래프를 이용한 방법을 제안한다. 제안하는 핵심 자질 추출 방법은 사람이 직접 추출하지 못하는 자질도 추출할 수 있는 장점을 보였다. 제안한 핵심 자질 추출이 바이어스 탐지에 유효함을 검증하기 위해 4개의 토픽에 대해 평가 했을 때 제안 모델이 기존 모델보다 우수한 성능을 보였다.

  • PDF

Damage Assessment of RC Bridge Using Neural-Fuzzy System (퍼지신경망을 이용한 철근콘크리트 교량의 손상도 평가)

  • Seong, Young-Joon;Kim, Ki- Bong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.3 no.4
    • /
    • pp.129-137
    • /
    • 1999
  • Assessment of structural damage is a complex subject imbued with uncertainty and vagueness. This complexity arises from the use of subjective opinion and imprecise numerical data. Recently several active researches have been performed using new methods such as neural network approach or on-line damage detection. In this paper, Damage assessment (diagnosis) of the concrete bridges is studied by a new approach utilizing a neural fuzzy system that combined a neural network and a fuzzy logic. By applying this system to actual in-service bridges, it has been verified that the neural fuzzy method is effective for the bridge diagnosis.

  • PDF

A Design of TDMA/TDD MAC Protocol for Full-Duplex Multi-User Voice Communication Systems Based on Sensor Network (센서 네트워크 기반의 다수 사용자간 Full-Duplex 음성 통신 시스템을 위한 TDMA/TDD MAC 프로토콜 설계)

  • Kim, Jisoo;Lee, Jae Hyoung;Cho, Sung Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.239-246
    • /
    • 2013
  • The IEEE 802.15.4 offers standard about PHY and MAC layer and features low power, low bandwidth, and low speed data communication. Because of this reason, IEEE 802.15.4 is only within a limited range such as sensor detection and home network; nevertheless, the research about transmission multimedia data like voice packet through wireless sensor networks is conducted widely. In this paper, we proposed the group communication system based on the sensor network. TDMA/TDD MAC based on the IEEE 802.15.4 PHY for voice communication on the sensor network is designed by improvement existing peer-to-peer voice communication on the sensor network and hardware is implemented for group communication. To measure the quality of designed system, mean opinion score (MOS) is obtained from the experiment and verified by using sine wave method. As a result of an experiment, we expect that a many cases of application solution can be developed using presented system.

Exploratory study on the Spam Detection of the Online Social Network based on Graph Properties (그래프 속성을 이용한 온라인 소셜 네트워크 스팸 탐지 동향 분석)

  • Jeong, Sihyun;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.567-575
    • /
    • 2020
  • As online social networks are used as a critical medium for modern people's information sharing and relationship, their users are increasing rapidly every year. This not only increases usage but also surpasses the existing media in terms of information credibility. Therefore, emerging marketing strategies are deliberately attacking social networks. As a result, public opinion, which should be formed naturally, is artificially formed by online attacks, and many people trust it. Therefore, many studies have been conducted to detect agents attacking online social networks. In this paper, we analyze the trends of researches attempting to detect such online social network attackers, focusing on researches using social network graph characteristics. While the existing content-based techniques may represent classification errors due to privacy infringement and changes in attack strategies, the graph-based method proposes a more robust detection method using attacker patterns.

Salient Region Detection Algorithm for Music Video Browsing (뮤직비디오 브라우징을 위한 중요 구간 검출 알고리즘)

  • Kim, Hyoung-Gook;Shin, Dong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.2
    • /
    • pp.112-118
    • /
    • 2009
  • This paper proposes a rapid detection algorithm of a salient region for music video browsing system, which can be applied to mobile device and digital video recorder (DVR). The input music video is decomposed into the music and video tracks. For the music track, the music highlight including musical chorus is detected based on structure analysis using energy-based peak position detection. Using the emotional models generated by SVM-AdaBoost learning algorithm, the music signal of the music videos is classified into one of the predefined emotional classes of the music automatically. For the video track, the face scene including the singer or actor/actress is detected based on a boosted cascade of simple features. Finally, the salient region is generated based on the alignment of boundaries of the music highlight and the visual face scene. First, the users select their favorite music videos from various music videos in the mobile devices or DVR with the information of a music video's emotion and thereafter they can browse the salient region with a length of 30-seconds using the proposed algorithm quickly. A mean opinion score (MOS) test with a database of 200 music videos is conducted to compare the detected salient region with the predefined manual part. The MOS test results show that the detected salient region using the proposed method performed much better than the predefined manual part without audiovisual processing.

An Improved Search Space for QRM-MLD Signal Detection for Spatially Multiplexed MIMO Systems (공간다중화 MIMO 시스템의 QRM-MLD 신호검출을 위한 개선된 탐색공간)

  • Hur, Hoon;Woo, Hyun-Myung;Yang, Won-Young;Bahng, Seung-Jae;Park, Youn-Ok;Kim, Jae-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4A
    • /
    • pp.403-410
    • /
    • 2008
  • In this paper, we propose a variant of the QRM-MLD signal detection method that is used for spatially multiplexed multiple antenna system. The original QRM-MLD signal detection method combines the QR decomposition with the M-algorithm, thereby significantly reduces the prohibitive hardware complexity of the ML signal detection method, still achieving a near ML performance. When the number of transmitter antennas and/or constellation size are increased to achieve higher bit rate, however, its increased complexity makes the hardware implementation challenging. In an effort to overcome this drawback of the original QRM-MLD, a number of variants were proposed. A most strong variant among them, in our opinion, is the ranking method, in which the constellation points are ranked and computation is performed for only highly ranked constellation points, thereby reducing the required complexity. However, the variant using the ranking method experiences a significant performance degradation, when compared with the original QRM-MLD. In this paper, we point out the reasons of the performance degradation, and we propose a novel variant that overcomes the drawbacks. We perform a set of computer simulations to show that the proposed method achieves a near performance of the original QRM-MLD, while its computational complexity is near to that of the QRM-MLD with ranking method.

Efficacy of Primed In Situ Labelling in Determination of HER-2 Gene Amplification and CEN-17 Status in Breast Cancer Tissue

  • Salimi, Mahdieh;Mozdarani, Hossein;Majidzadeh-A, Keivan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.1
    • /
    • pp.329-337
    • /
    • 2012
  • Considerable attention has been given to the accuracy of HER-2 testing and the correlation between the results of different testing methods. This interest reflects the growing importance of HER-2 status in the management of patients with breast cancer. In this study the detection of HER-2 gene and centromere 17 status was evaluated using dual-colour primed in situ labelling (PRINS) in comparison with fluorescence in situ hybridization (FISH). These two methods were evaluated on a series of 27 formalin fixed paraffin embedded breast carcinoma tumours, previously tested for protein overexpression by HercepTest (grouped into Hercep 1+/0, 2+ and 3+). HER-2 gene amplification (ratio${\geq}2.2$) by PRINS was found in 3:3, 6:21 and 0:3 in IHC 3+, 2+ and 1+/0 cases, respectively. Comparing FISH and IHC (immunohistochemistry), showed the same results as for PRINS and IHC. Chromosome 17 aneusomy was found in 10 of 21 IHC 2+ cases (47.6%), of which 1 (10%) showed hypodisomy (chromosome 17 copy number per cell${\leq}1.75$), 7 (70%) showed low polysomy (chromosome 17 copy number per cell=2.26 - 3.75) and 2 (20%) showed high polysomy (chromosome 17 copy number per cell ${\geq}3.76$). The overall concordance of detection of HER-2 gene amplification by FISH and PRINS was 100% (27:27). Furthermore, both the level of HER-2 amplification and copy number of CEN17 analysis results correlated well between the two methods. In conclusion, PRINS is a reliable, reproducible technique and in our opinion can be used as an additional test to determine HER-2 status in breast tumours.

IDS Performance on MANET with Packet Aggregation Transmissions (패킷취합전송이 있는 MANET에서 IDS 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.695-701
    • /
    • 2014
  • Blackhole attacks having a unauthorized change of routing data will cause critical effects for transmission performance. The transmission performance will be improved to the a certain level by using or having IDS(Intrusion Detection System)/IPS(Intrusion Prevention System) as countermeasures to blackhole attacks. In this papar, the effects of IDS to ene-to-end performance of packet aggregation transmission are analyzed on MANET(Mobile Ad-hoc Network) with IDS under blackhole attacks. MANET simulator based on NS-2 is used to analyze performance parameters as MOS, connection ratio, delay and packet loss rate as standard performance parameters, an another performance factor which is suggested in this paper. VoIP(Voice over Internet Protocol) traffics, one of voice services, is used for performance analysis. A suggestion for IDS implementation on MANET with packet aggregations under blackhole is shown as one of results.