• Title/Summary/Keyword: Recognizing Essential Information

Search Result 49, Processing Time 0.024 seconds

Fundamentals of Ecotoxicity Evaluation Methods using Domestic Aquatic Organisms in Korea : (I) Fish (국내 생물종을 이용한 생태독성평가 기반연구 : (I) 어류)

  • Nam, Sun-Hwa;Yang, Chang-Yong;An, Youn-Joo;Lee, Jae-Kwan
    • Korean Journal of Ecology and Environment
    • /
    • v.40 no.2
    • /
    • pp.173-183
    • /
    • 2007
  • The Ministry of Environment plans to introduce the Whole Effluent Toxicity (WET) system in Korea. The WET test is well established in developed countries with recognizing of the limitations of physicochemical analysis method and potential risk of chemicals in water medium. Therefore, it is essential to build the ecotoxicity infrastructure for the induction of WET test. In this study, we extensively collected the domestic and foreign toxicity test methods which employ native test species to Korea. And we suggested that the domestic ecotoxicity test methods with domestic test species in Korea through extracting the range of test conditions. Five domestic fish species selected were Carassiu auratus (Crucian carp), Cyprinus carpio(Common carp), Gasterosteus aculeatus (Three spine stickleback), Misgurnus anguillicaudatus (Oriental weather fish) and Oryzias latipes (Japanese medaka), The toxicity test methods with native test species to Korea were collected from the standard methods (OECD, U.S. EPA, ASTM), government reports, SCI papers and domestic papers. We collected the 32 test methods, and suggested the suitable aquatic toxicity test methods for fish. It is expected that this study could prove a useful information to establish the ecotoxicity test methods with domestic aquatic organisms in Korea henceforth.

A Design on Face Recognition System Based on pRBFNNs by Obtaining Real Time Image (실시간 이미지 획득을 통한 pRBFNNs 기반 얼굴인식 시스템 설계)

  • Oh, Sung-Kwun;Seok, Jin-Wook;Kim, Ki-Sang;Kim, Hyun-Ki
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.12
    • /
    • pp.1150-1158
    • /
    • 2010
  • In this study, the Polynomial-based Radial Basis Function Neural Networks is proposed as one of the recognition part of overall face recognition system that consists of two parts such as the preprocessing part and recognition part. The design methodology and procedure of the proposed pRBFNNs are presented to obtain the solution to high-dimensional pattern recognition problem. First, in preprocessing part, we use a CCD camera to obtain a picture frame in real-time. By using histogram equalization method, we can partially enhance the distorted image influenced by natural as well as artificial illumination. We use an AdaBoost algorithm proposed by Viola and Jones, which is exploited for the detection of facial image area between face and non-facial image area. As the feature extraction algorithm, PCA method is used. In this study, the PCA method, which is a feature extraction algorithm, is used to carry out the dimension reduction of facial image area formed by high-dimensional information. Secondly, we use pRBFNNs to identify the ID by recognizing unique pattern of each person. The proposed pRBFNNs architecture consists of three functional modules such as the condition part, the conclusion part, and the inference part as fuzzy rules formed in 'If-then' format. In the condition part of fuzzy rules, input space is partitioned with Fuzzy C-Means clustering. In the conclusion part of rules, the connection weight of pRBFNNs is represented as three kinds of polynomials such as constant, linear, and quadratic. Coefficients of connection weight identified with back-propagation using gradient descent method. The output of pRBFNNs model is obtained by fuzzy inference method in the inference part of fuzzy rules. The essential design parameters (including learning rate, momentum coefficient and fuzzification coefficient) of the networks are optimized by means of the Particle Swarm Optimization. The proposed pRBFNNs are applied to real-time face recognition system and then demonstrated from the viewpoint of output performance and recognition rate.

A fragment-Driven Workflow Modeling Methodology (Fragment-Driven 워크플로우 모델링 방법론)

  • Moon Ki-Dong;Kim Hyung-Mok;Kim Kwang-Hoon;Paik Su-Ki
    • Journal of Internet Computing and Services
    • /
    • v.6 no.2
    • /
    • pp.141-152
    • /
    • 2005
  • Many organizations have been recognizing the necessity of workflow automation technologies according to the rapid expansion of business process oriented applications, such as enterprise resource pianning, customer relationship management, electronic approval management, and so on, Thus, they have started adopting workflow management systems as an essential technological solution for their workflow processes, However, we need some technological extensions and improvements on them in order to accommodate a new type of workflow processes, which is called cross-organizational global workflow processes that require a certain level of collaborations between the organizations engaged in the global workflow processes, Fragment-driven workflow modeling methodology is a Bottom-Up methodology composing a global workflow by defining each organization's own activities, which is called a fragment through a realtime cooperative system. The approach is able to not only simplify the modeling work but also keep each organization's independence in modeling a global workflow, In this paper, we describe the fragment-driven workflow modeling methodology and realize the methodology through the implementation of a cooperative swimlane workflow modeling system.

  • PDF

Semantic Segmentation of Clouds Using Multi-Branch Neural Architecture Search (멀티 브랜치 네트워크 구조 탐색을 사용한 구름 영역 분할)

  • Chi Yoon Jeong;Kyeong Deok Moon;Mooseop Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.2
    • /
    • pp.143-156
    • /
    • 2023
  • To precisely and reliably analyze the contents of the satellite imagery, recognizing the clouds which are the obstacle to gathering the useful information is essential. In recent times, deep learning yielded satisfactory results in various tasks, so many studies using deep neural networks have been conducted to improve the performance of cloud detection. However, existing methods for cloud detection have the limitation on increasing the performance due to the adopting the network models for semantic image segmentation without modification. To tackle this problem, we introduced the multi-branch neural architecture search to find optimal network structure for cloud detection. Additionally, the proposed method adopts the soft intersection over union (IoU) as loss function to mitigate the disagreement between the loss function and the evaluation metric and uses the various data augmentation methods. The experiments are conducted using the cloud detection dataset acquired by Arirang-3/3A satellite imagery. The experimental results showed that the proposed network which are searched network architecture using cloud dataset is 4% higher than the existing network model which are searched network structure using urban street scenes with regard to the IoU. Also, the experimental results showed that the soft IoU exhibits the best performance on cloud detection among the various loss functions. When comparing the proposed method with the state-of-the-art (SOTA) models in the field of semantic segmentation, the proposed method showed better performance than the SOTA models with regard to the mean IoU and overall accuracy.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

Study of the Introduction on the Aviation Safety Data Protection System (항공안전데이터 보호제도 도입 방안 연구)

  • Kim, Eun-jung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.1
    • /
    • pp.81-120
    • /
    • 2018
  • To promote the aviation safety reporting system that is operated to enhance aviation safety and to utilize related information, it should first be preceded by standards for non-punishment and data protection. It is because the purpose of collection and analysis of aviation safety related data through the aviation safety reporting system is to prevent recurrence of accidents by investigating their causes through collection and analysis of diverse types of information related to aviation safety. Both mandatory and voluntary reporting systems are in operation for aviation safety under the current Aviation Safety Act. It is said that they were introduced to survey causes for accidents and to prevent recurrences. In fact, however, it is hard to expect active implementation of the reporting system for aviation safety unless the reporters are firstly exempted from punishment. Therefore, the system should be improved so that it can satisfy its purpose and the purposes of data collection concerning aviation safety through examination of the purposes of the reporting system. One of the matters that needs to be considered to promote the reporting system should be the scope of aviation safety hindrances presupposed under the current institution. The voluntary aviation safety reporting system differs from the systems of ICAO or the key advanced countries, including the USA and the UK as it limits the target accidents subject to reporting to minor aviation safety hindrances only. That being said, improvements should be made by requiring mandatory reporting of aviation safety hindrances based on their severity while recognizing a greater variety of aviation safety concerns like international standards. Safety actions and sharing of information based on collection and analysis of diverse data related to aviation safety will greatly contribute to enhance aviation safety as the purposes of the reporting system are to explore causes for accidents and to prevent their recurrences. What is most important in this regard is strict data protection and non-punishment principles; compliance with them should be secured. We can hardly expect the successful operation of the system unless the reporter is exempted from punishment and the relevant data is protected as promotion of voluntary reporting is an essential factor for enhancing the safety culture. Otherwise, the current system may induce hiding of relevant facts or data to evade punishment. It is true that the regulation for enhancing safety tends to have limitations or blind spots; nevertheless, it should still be enforced strictly and completely. Technological progresses and mistakes of operators appear in different forms based on individual cases. The consequential damages may amount to a truly severe level. Therefore, we have studied and suggested to the methods of activiation and amendments on the aviation safety reporting system, which is referred for one of the proactive safety management systems. The proposed improvement of the reporting system and introduction of non-punishment for collection of aviation safety data for deploying a preemptive prevention system would serve as the backbone for enhancing aviation safety in Korea.

Study on Basic Elements for Smart Content through the Market Status-quo (스마트콘텐츠 현황분석을 통한 기본요소 추출)

  • Kim, Gyoung Sun;Park, Joo Young;Kim, Yi Yeon
    • Korea Science and Art Forum
    • /
    • v.21
    • /
    • pp.31-43
    • /
    • 2015
  • Information and Communications Technology (ICT) is one of the technologies which represent the core value of the creative economy. It has served as a vehicle connecting the existing industry and corporate infrastructure, developing existing products and services and creating new products and services. In addition to the ICT, new devices including big data, mobile gadgets and wearable products are gaining a great attention sending an expectation for a new market-pioneering. Further, Internet of Things (IoT) is helping solidify the ICT-based social development connecting human-to-human, human-to-things and things-to-things. This means that the manufacturing-based hardware development needs to be achieved simultaneously with software development through convergence. The essential element the convergence between hardware and software is OS, for which world's leading companies such as Google and Apple have launched an intense development recognizing the importance of software. Against this backdrop, the status-quo of the software market has been examined for the study of the present report (Korea Evaluation Institute of Industrial Technology: Professional Design Technology Development Project). As a result, the software platform-based Google's android and Apple's iOS are dominant in the global market and late comers are trying to enter the market through various pathways by releasing web-based OS and similar OS to provide a new paradigm to the market. The present study is aimed at finding the way to utilize a smart content by which anyone can be a developer based on OS responding to such as social change, newly defining a smart content to be universally utilized and analyzing the market to deal with a rapid market change. The study method, scope and details are as follows: Literature investigation, Analysis on the app market according to a smart classification system, Trend analysis on the current content market, Identification of five common trends through comparison among the universal definition of smart content, the status-quo of application represented in the app market and content market situation. In conclusion, the smart content market is independent but is expected to develop in the form of a single organic body being connected each other. Therefore, the further classification system and development focus should be made in a way to see the area from multiple perspectives including a social point of view in terms of the existing technology, culture, business and consumers.

Three-dimensional Model Generation for Active Shape Model Algorithm (능동모양모델 알고리듬을 위한 삼차원 모델생성 기법)

  • Lim, Seong-Jae;Jeong, Yong-Yeon;Ho, Yo-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.6 s.312
    • /
    • pp.28-35
    • /
    • 2006
  • Statistical models of shape variability based on active shape models (ASMs) have been successfully utilized to perform segmentation and recognition tasks in two-dimensional (2D) images. Three-dimensional (3D) model-based approaches are more promising than 2D approaches since they can bring in more realistic shape constraints for recognizing and delineating the object boundary. For 3D model-based approaches, however, building the 3D shape model from a training set of segmented instances of an object is a major challenge and currently it remains an open problem in building the 3D shape model, one essential step is to generate a point distribution model (PDM). Corresponding landmarks must be selected in all1 training shapes for generating PDM, and manual determination of landmark correspondences is very time-consuming, tedious, and error-prone. In this paper, we propose a novel automatic method for generating 3D statistical shape models. Given a set of training 3D shapes, we generate a 3D model by 1) building the mean shape fro]n the distance transform of the training shapes, 2) utilizing a tetrahedron method for automatically selecting landmarks on the mean shape, and 3) subsequently propagating these landmarks to each training shape via a distance labeling method. In this paper, we investigate the accuracy and compactness of the 3D model for the human liver built from 50 segmented individual CT data sets. The proposed method is very general without such assumptions and can be applied to other data sets.

A Phenomenological Study for Hospitalized Elderly무s Powerlessness (병원에 입원한 노인의 무력감 현상 연구)

  • 최영희;김경은
    • Journal of Korean Academy of Nursing
    • /
    • v.26 no.1
    • /
    • pp.223-247
    • /
    • 1996
  • This study was done to provide information which would lead to nursing care of the elderly being more holistically through an understanding of the phenomena of powerlessness based on the lived experience of powerlessness by the elderly, the meaning the elderly give to such phenomena, and what essence of powerlessness is. The methodology used in this study was Max Van Manen's phenomenological method based on the philosophy of Merleu-Ponty and a concerted approach was realized through the 11 steps suggested in the Van Manen's method. Data collection was done from March 2, 1995 to December 30, 1995. The subjects for this study were four elderly persons who lived with their families and who were over 60 years of age. Data were collected about the lived experience of the elderly, this researcher's experience of powerlessness, the linguistic meaning of powerlessness, idioms of the word or a feeling of powerlessness, and descriptions of powerlessness in the elderly as they appeared in the literature, are works, and phenomenological literature. All data were used to provide insights into the phenomena of powerlessness. Data about the experience of powerlessness by the elderly were collected through open interviews, participation, and observation. In the analysis of the theme of this study, the aspects of the theme, powerlessness in the elderly were clarified, thereby abstracting and finding meaningful statements by the elderly about their feeling of powerlessness, and then those significant statements were expressed as linguistic transformations. The summarized findings from the study are as follows : 1. Five meanings of powerlessness in the elderly were defined. 〈weakness〉, 〈dependence〉, 〈frustration〉, 〈worthlessness〉 and 〈giving up〉. 2. 〈Weakness〉 means that the elderly experience, not only their aging but also, their becoming weak and the loss of physical function frequently caused by diseases. 〈Dependence〉 means that the elderly experience dependence without any influence from the surroundings and that elderly patients who are hospitalized lose their autonomy, follow entirely their doctor's prescriptions, use aid equipment and directions, and depend only on those things. 〈Frustration〉 means that the elderly experience the loss of their roles from the past, there by feeling that there is no work for them to do anymore and therefore feel unable to do anything. 〈Worthlessness〉 means that the elderly experience the feeling of losing their social roles from the past, having no financial ability, thereby being a burden to their children or the people around them, and therefore regarding themselves useless. 〈Giving up〉 means that the elderly experience the feeling of closeness to death in the final stage of their lifetime, lose hope to be healed from their disease, and recognize the incontrollability of their own body. 3. From a general view of the meaning of the theme the powerlessness in the elderly-the most essential meaning of the theme is the 〈sense of loss〉. For the elderly are experiencing a sense of loss in the situation of being elderly and therefore being often hospitalized. Brief definitions of the five phenomena could be 〈weakness〉 meaning the loss of physical strength, 〈dependence〉 the loss of mentality caused by disease and hospitalization, 〈frustration〉 and 〈worthlessness〉 the loss of social performance caused by the loss of social functions from the past, and lastly 〈giving up〉 the loss of the controllability of such situations of aging and suffering disease. In light of the discussion above, it is understandable that the hospitalized elderly experience powerlessness not only as it related to their diseases but also to their normal aging, and this related to other characteristics of being elderly means that the 〈sense of loss〉 is the very essence of their powerlessness. 4. While most cases are of the normal elderly experiencing powerlessness in relation to their social network, cases of elderly who are hospitalized are of those experiencing powerlessness in relation to the loss of their physical desire. 5. The findings discussed above can serve as guidelines for nurses who take care of the ill elderly who are hospitalized and that can provide cues to appropriate nursing service, recognizing that the subjective experience of the objective age of the elderly is so important. Nurses can provide highly qualitative nursing service, based on their deep understanding of the suffering of the elderly due to feelings of powerlessness.

  • PDF