• Title/Summary/Keyword: R&E network

Search Result 268, Processing Time 0.025 seconds

Transition of Service Paradigm from Service Recovery to Proactive Service (사후 서비스에서 선제적 서비스로 서비스 패러다임의 전환)

  • Rhee, Hyunjung;Kim, Hyangmi;Rhee, Chang Seop
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.396-405
    • /
    • 2020
  • In this study, we used the big data of Voice of Customer (VOC) related to high-speed Internet products to look at the causes of perceived quality and the possibility of proactive service. In order to verify the possibility of proactive service, we collected VOC data from 13 facilities and equipment of a mobile communication service company, and then conducted 𝒙2 test to verify that there was a statistically significant difference between the actual VOC observation values and expected values. We found statistical evidence that proactive service is possible through real-time monitoring for the six disability alarms among the 13 facilities and equipment, which are FTTH-R Equipment ON/OFF, FTTH-EV Line Error Detection, Port Faulty, FTTH-R Line Error Detection, Network Loop Detection, and Abnormal Limiting Traffic. Companies are able to adopt the proactive service to improve their market share and to reduce customer service costs. The results of this study are expected to contribute to the actual application of industry in that it has diagnosed the possibility of proactive service in the telecommunication service sector and further suggested suggestions on how to provide effective proactive service.

Mitochondrial Cytochrome b Sequence Variations and Population Structure of Siberian Chipmunk (Tamias sibiricus) in Northeastern Asia and Population Substructure in South Korea

  • Lee, Mu-Yeong;Lissovsky, Andrey A.;Park, Sun-Kyung;Obolenskaya, Ekaterina V.;Dokuchaev, Nikolay E.;Zhang, Ya-Ping;Yu, Li;Kim, Young-Jun;Voloshina, Inna;Myslenkov, Alexander;Choi, Tae-Young;Min, Mi-Sook;Lee, Hang
    • Molecules and Cells
    • /
    • v.26 no.6
    • /
    • pp.566-575
    • /
    • 2008
  • Twenty-five chipmunk species occur in the world, of which only the Siberian chipmunk, Tamias sibiricus, inhabits Asia. To investigate mitochondrial cytochrome b sequence variations and population structure of the Siberian chipmunk in northeastern Asia, we examined mitochondrial cytochrome b sequences (1140 bp) from 3 countries. Analyses of 41 individuals from South Korea and 33 individuals from Russia and northeast China resulted in 37 haplotypes and 27 haplotypes, respectively. There were no shared haplotypes between South Korea and Russia - northeast China. Phylogenetic trees and network analysis showed 2 major maternal lineages for haplotypes, referred to as the S and R lineages. Haplotype grouping in each cluster was nearly coincident with its geographic affinity. In particular, 3 distinct groups were found that mostly clustered in the northern, central and southern parts of South Korea. Nucleotide diversity of the S lineage was twice that of lineage R. The divergence between S and R lineages was estimated to be 2.98-0.98 Myr. During the ice age, there may have been at least 2 refuges in South Korea and Russia - northeast China. The sequence variation between the S and R lineages was 11.3% (K2P), which is indicative of specific recognition in rodents. These results suggest that T. sibiricus from South Korea could be considered a separate species. However, additional information, such as details of distribution, nuclear genes data or morphology, is required to strengthen this hypothesis.

Influence of the Adjuvants and Genetic Background on the Asthma Model Using Recombinant Der f 2 in Mice

  • Chang, Yoon-Seok;Kim, Yoon-Keun;Jeon, Seong Gyu;Kim, Sae-Hoon;Kim, Sun-Sin;Park, Heung-Woo;Min, Kyung-Up;Kim, You-Young;Cho, Sang-Heon
    • IMMUNE NETWORK
    • /
    • v.13 no.6
    • /
    • pp.295-300
    • /
    • 2013
  • Der f 2 is the group 2 major allergen of a house dust mite (Dermatophagoides farinae) and its function has been recently suggested. To determine the optimal condition of sensitization to recombinant Der f 2 (rDer f 2) in murine model of asthma, we compared the effectiveness with different adjuvants in BALB/c and C57BL/6 mice. Mice from both strains sensitized with rDer f 2 by intraperitoneal injection or subcutaneous injection on days 1 and 14. The dosage was $20{\mu}g$. Freund's adjuvants with pertussis toxin (FP) or alum alone were used as adjuvants. On days 28, 29, and 30, mice were challenged intranasally with 0.1% rDer f 2. We evaluated airway hyperresponsivenss, eosinophil proportion in lung lavage, airway inflammation, and serum allergen specific antibody responses. Naive mice were used as controls. Airway hyperresponsiveness was increased in C57BL/6 with FP, and BALB/c with alum (PC200: $13.5{\pm}6.3$, $13.2{\pm}6.7$ vs. >50 mg/ml, p<0.05). The eosinophil proportion was increased in all groups; C57BL/6 with FP, BALB/c with FP, C57BL/6 with alum, BALB/c with alum ($24.8{\pm}3.6$, $20.3{\pm}10.3$, $11.0{\pm}6.9$, $5.7{\pm}2.8$, vs. $0.0{\pm}0.0$%, p<0.05). The serum allergen specific IgE levels were increased in C57BL/6 with FP or alum (OD: $0.8{\pm}1.4$, $1.1{\pm}0.8$, vs. $0.0{\pm}0.0$). C57BL/6 mice were better responders to rDer f 2 and as for adjuvants, Freund's adjuvant with pertussis toxin was better.

Review on Rock-Mechanical Models and Numerical Analyses for the Evaluation on Mechanical Stability of Rockmass as a Natural Barriar (천연방벽 장기 안정성 평가를 위한 암반역학적 모델 고찰 및 수치해석 검토)

  • Myung Kyu Song;Tae Young Ko;Sean S. W., Lee;Kunchai Lee;Byungchan Kim;Jaehoon Jung;Yongjin Shin
    • Tunnel and Underground Space
    • /
    • v.33 no.6
    • /
    • pp.445-471
    • /
    • 2023
  • Long-term safety over millennia is the top priority consideration in the construction of disposal sites. However, ensuring the mechanical stability of deep geological repositories for spent fuel, a.k.a. radwaste, disposal during construction and operation is also crucial for safe operation of the repository. Imposing restrictions or limitations on tunnel support and lining materials such as shotcrete, concrete, grouting, which might compromise the sealing performance of backfill and buffer materials which are essential elements for the long-term safety of disposal sites, presents a highly challenging task for rock engineers and tunnelling experts. In this study, as part of an extensive exploration to aid in the proper selection of disposal sites, the anticipation of constructing a deep geological repository at a depth of 500 meters in an unknown state has been carried out. Through a review of 2D and 3D numerical analyses, the study aimed to explore the range of properties that ensure stability. Preliminary findings identified the potential range of rock properties that secure the stability of central and disposal tunnels, while the stability of the vertical tunnel network was confirmed through 3D analysis, outlining fundamental rock conditions necessary for the construction of disposal sites.

An Intelligent Decision Support System for Selecting Promising Technologies for R&D based on Time-series Patent Analysis (R&D 기술 선정을 위한 시계열 특허 분석 기반 지능형 의사결정지원시스템)

  • Lee, Choongseok;Lee, Suk Joo;Choi, Byounggu
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.79-96
    • /
    • 2012
  • As the pace of competition dramatically accelerates and the complexity of change grows, a variety of research have been conducted to improve firms' short-term performance and to enhance firms' long-term survival. In particular, researchers and practitioners have paid their attention to identify promising technologies that lead competitive advantage to a firm. Discovery of promising technology depends on how a firm evaluates the value of technologies, thus many evaluating methods have been proposed. Experts' opinion based approaches have been widely accepted to predict the value of technologies. Whereas this approach provides in-depth analysis and ensures validity of analysis results, it is usually cost-and time-ineffective and is limited to qualitative evaluation. Considerable studies attempt to forecast the value of technology by using patent information to overcome the limitation of experts' opinion based approach. Patent based technology evaluation has served as a valuable assessment approach of the technological forecasting because it contains a full and practical description of technology with uniform structure. Furthermore, it provides information that is not divulged in any other sources. Although patent information based approach has contributed to our understanding of prediction of promising technologies, it has some limitations because prediction has been made based on the past patent information, and the interpretations of patent analyses are not consistent. In order to fill this gap, this study proposes a technology forecasting methodology by integrating patent information approach and artificial intelligence method. The methodology consists of three modules : evaluation of technologies promising, implementation of technologies value prediction model, and recommendation of promising technologies. In the first module, technologies promising is evaluated from three different and complementary dimensions; impact, fusion, and diffusion perspectives. The impact of technologies refers to their influence on future technologies development and improvement, and is also clearly associated with their monetary value. The fusion of technologies denotes the extent to which a technology fuses different technologies, and represents the breadth of search underlying the technology. The fusion of technologies can be calculated based on technology or patent, thus this study measures two types of fusion index; fusion index per technology and fusion index per patent. Finally, the diffusion of technologies denotes their degree of applicability across scientific and technological fields. In the same vein, diffusion index per technology and diffusion index per patent are considered respectively. In the second module, technologies value prediction model is implemented using artificial intelligence method. This studies use the values of five indexes (i.e., impact index, fusion index per technology, fusion index per patent, diffusion index per technology and diffusion index per patent) at different time (e.g., t-n, t-n-1, t-n-2, ${\cdots}$) as input variables. The out variables are values of five indexes at time t, which is used for learning. The learning method adopted in this study is backpropagation algorithm. In the third module, this study recommends final promising technologies based on analytic hierarchy process. AHP provides relative importance of each index, leading to final promising index for technology. Applicability of the proposed methodology is tested by using U.S. patents in international patent class G06F (i.e., electronic digital data processing) from 2000 to 2008. The results show that mean absolute error value for prediction produced by the proposed methodology is lower than the value produced by multiple regression analysis in cases of fusion indexes. However, mean absolute error value of the proposed methodology is slightly higher than the value of multiple regression analysis. These unexpected results may be explained, in part, by small number of patents. Since this study only uses patent data in class G06F, number of sample patent data is relatively small, leading to incomplete learning to satisfy complex artificial intelligence structure. In addition, fusion index per technology and impact index are found to be important criteria to predict promising technology. This study attempts to extend the existing knowledge by proposing a new methodology for prediction technology value by integrating patent information analysis and artificial intelligence network. It helps managers who want to technology develop planning and policy maker who want to implement technology policy by providing quantitative prediction methodology. In addition, this study could help other researchers by proving a deeper understanding of the complex technological forecasting field.

A Time Series Graph based Convolutional Neural Network Model for Effective Input Variable Pattern Learning : Application to the Prediction of Stock Market (효과적인 입력변수 패턴 학습을 위한 시계열 그래프 기반 합성곱 신경망 모형: 주식시장 예측에의 응용)

  • Lee, Mo-Se;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.167-181
    • /
    • 2018
  • Over the past decade, deep learning has been in spotlight among various machine learning algorithms. In particular, CNN(Convolutional Neural Network), which is known as the effective solution for recognizing and classifying images or voices, has been popularly applied to classification and prediction problems. In this study, we investigate the way to apply CNN in business problem solving. Specifically, this study propose to apply CNN to stock market prediction, one of the most challenging tasks in the machine learning research. As mentioned, CNN has strength in interpreting images. Thus, the model proposed in this study adopts CNN as the binary classifier that predicts stock market direction (upward or downward) by using time series graphs as its inputs. That is, our proposal is to build a machine learning algorithm that mimics an experts called 'technical analysts' who examine the graph of past price movement, and predict future financial price movements. Our proposed model named 'CNN-FG(Convolutional Neural Network using Fluctuation Graph)' consists of five steps. In the first step, it divides the dataset into the intervals of 5 days. And then, it creates time series graphs for the divided dataset in step 2. The size of the image in which the graph is drawn is $40(pixels){\times}40(pixels)$, and the graph of each independent variable was drawn using different colors. In step 3, the model converts the images into the matrices. Each image is converted into the combination of three matrices in order to express the value of the color using R(red), G(green), and B(blue) scale. In the next step, it splits the dataset of the graph images into training and validation datasets. We used 80% of the total dataset as the training dataset, and the remaining 20% as the validation dataset. And then, CNN classifiers are trained using the images of training dataset in the final step. Regarding the parameters of CNN-FG, we adopted two convolution filters ($5{\times}5{\times}6$ and $5{\times}5{\times}9$) in the convolution layer. In the pooling layer, $2{\times}2$ max pooling filter was used. The numbers of the nodes in two hidden layers were set to, respectively, 900 and 32, and the number of the nodes in the output layer was set to 2(one is for the prediction of upward trend, and the other one is for downward trend). Activation functions for the convolution layer and the hidden layer were set to ReLU(Rectified Linear Unit), and one for the output layer set to Softmax function. To validate our model - CNN-FG, we applied it to the prediction of KOSPI200 for 2,026 days in eight years (from 2009 to 2016). To match the proportions of the two groups in the independent variable (i.e. tomorrow's stock market movement), we selected 1,950 samples by applying random sampling. Finally, we built the training dataset using 80% of the total dataset (1,560 samples), and the validation dataset using 20% (390 samples). The dependent variables of the experimental dataset included twelve technical indicators popularly been used in the previous studies. They include Stochastic %K, Stochastic %D, Momentum, ROC(rate of change), LW %R(Larry William's %R), A/D oscillator(accumulation/distribution oscillator), OSCP(price oscillator), CCI(commodity channel index), and so on. To confirm the superiority of CNN-FG, we compared its prediction accuracy with the ones of other classification models. Experimental results showed that CNN-FG outperforms LOGIT(logistic regression), ANN(artificial neural network), and SVM(support vector machine) with the statistical significance. These empirical results imply that converting time series business data into graphs and building CNN-based classification models using these graphs can be effective from the perspective of prediction accuracy. Thus, this paper sheds a light on how to apply deep learning techniques to the domain of business problem solving.

How Do Firms' Innovation Behaviors Affect their Outputs in Korea? (기업의 혁신 활동이 기업성과에 미치는 영향)

  • Park, Jae-Min;Lee, Jung-Mann
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.339-350
    • /
    • 2011
  • This study empirically investigates applicable possibility of open technology innovation with which the government is concerned, by figuring out the relationship between firms' innovation behaviors and innovation outputs and their utilization of information network. Empirical methodology was employed as logit regression to explain firms' innovation behaviors and the data set includes more than 2500 firms in the manufacturing sectors. First, empirical findings showed that firms' innovation competencies and behaviors can be explained as the trend of patent application, sales and innovation outputs significantly. The patents of small and medium-sized businesses are inclined to be positive to information sources of university and government-supported research institute and the sales increased when they had labs to concentrate on R&D. On the other hand, the existence of labor union turn out to be negative to their sales. Second, the types of information network which firms utilize turned out to be connected with their innovation behaviors and purposes. Third, four types of innovation, i.e., product, process, organization, and marketing innovation was employed and innovation behaviors and outputs are well connected.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

A Nobel Video Quality Degradation Monitoring Schemes Over an IPTV Service with Packet Loss (IPTV 서비스에서 패킷손실에 의한 비디오품질 열화 모니터링 방법)

  • Kwon, Jae-Cheol;Oh, Seoung-Jun;Suh, Chang-Ryul;Chin, Young-Min
    • Journal of Broadcast Engineering
    • /
    • v.14 no.5
    • /
    • pp.573-588
    • /
    • 2009
  • In this paper, we propose a novel video quality degradation monitoring scheme titled VR-VQMS(Visual Rhythm based Video Quality Monitoring Scheme) over an IPTV service prone to packet losses during network transmission. Proposed scheme quantifies the amount of quality degradation due to packet losses, and can be classified into a RR(reduced-reference) based quality measurement scheme exploiting visual rhythm data of H.264-encoded video frames at a media server and reconstructed ones at an Set-top Box as feature information. Two scenarios, On-line and Off-line VR-VQMS, are proposed as the practical solutions. We define the NPSNR(Networked Peak-to-peak Signal-to-Noise Ratio) modified by the well-known PSNR as a new objective quality metric, and several additional objective and subjective metrics based on it to obtain the statistics on timing, duration, occurrence, and amount of quality degradation. Simulation results show that the proposed method closely approximates the results from 2D video frames and gives good estimation of subjective quality(i.e.,MOS(mean opinion score)) performed by 10 test observers. We expect that the proposed scheme can play a role as a practical solution to monitor the video quality experienced by individual customers in a commercial IPTV service, and be implemented as a small and light agent program running on a resource-limited set-top box.

Decay-Accelerating Factor Differentially Associates With Complement-Mediated Damage in Synovium After Meniscus Tear as Compared to Anterior Cruciate Ligament Injury

  • V. Michael Holers;Rachel M. Frank;Michael Zuscik;Carson Keeter;Robert I. Scheinman;Christopher Striebich;Dmitri Simberg;Michael R. Clay;Larry W. Moreland;Nirmal K. Banda
    • IMMUNE NETWORK
    • /
    • v.24 no.2
    • /
    • pp.17.1-17.16
    • /
    • 2024
  • We have reported that anterior cruciate ligament (ACL) injury leads to the differential dysregulation of the complement system in the synovium as compared to meniscus tear (MT) and proposed this as a mechanism for a greater post-injury prevalence of post traumatic osteoarthritis (PTOA). To explore additional roles of complement proteins and regulators, we determined the presence of decay-accelerating factor (DAF), C5b, and membrane attack complexes (MACs, C5b-9) in discarded surgical synovial tissue (DSST) collected during arthroscopic ACL reconstructive surgery, MT-related meniscectomy, osteoarthritis (OA)-related knee replacement surgery and normal controls. Multiplexed immunohistochemistry was used to detect and quantify complement proteins. To explore the involvement of body mass index (BMI), after these 2 injuries, we examined correlations among DAF, C5b, MAC and BMI. Using these approaches, we found that synovial cells after ACL injury expressed a significantly lower level of DAF as compared to MT (p<0.049). In contrast, C5b staining synovial cells were significantly higher after ACL injury (p<0.0009) and in OA DSST (p<0.039) compared to MT. Interestingly, there were significantly positive correlations between DAF & C5b (r=0.75, p<0.018) and DAF & C5b (r=0.64 p<0.022) after ACL injury and MT, respectively. The data support that DAF, which should normally dampen C5b deposition due to its regulatory activities on C3/C5 convertases, does not appear to exhibit that function in inflamed synovia following either ACL injury or MT. Ineffective DAF regulation may be an additional mechanism by which relatively uncontrolled complement activation damages tissue in these injury states.