• Title/Summary/Keyword: Smart society

Search Result 9,657, Processing Time 0.036 seconds

Keyword Filtering about Disaster and the Method of Detecting Area in Detecting Real-Time Event Using Twitter (트위터를 활용한 실시간 이벤트 탐지에서의 재난 키워드 필터링과 지명 검출 기법)

  • Ha, Hyunsoo;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.7
    • /
    • pp.345-350
    • /
    • 2016
  • This research suggests the keyword filtering about disaster and the method of detecting area in real-time event detecting system by analyzing contents of twitter. The diffusion of smart-mobile has lead to a fast spread of SNS and nowadays, various researches based on studying SNS are being processed. Among SNS, the twitter has a characteristic of fast diffusion since it is written in 140 words of short paragraph. Therefore, the tweets that are written by twitter users are able to perform a role of sensor. By using these features the research has been constructed which detects the events that have been occurred. However, people became reluctant to open their information of location because it is reported that private information leakage are increasing. Also, problems associated with accuracy are occurred in process of analyzing the tweet contents that do not follow the spelling rule. Therefore, additional designing keyword filtering and the method of area detection on detecting real-time event process were required in order to develop the accuracy. This research suggests the method of keyword filtering about disaster and two methods of detecting area. One is the method of removing area noise which removes the noise that occurred in the local name words. And the other one is the method of determinating the area which confirms local name words by using landmarks. By applying the method of keyword filtering about disaster and two methods of detecting area, the accuracy has improved. It has improved 49% to 78% by using the method of removing area noise and the other accuracy has improved 49% to 89% by using the method of determinating the area.

Characterization of the Immune Regulation Function of Fibroblastic Reticular Cells Originating from Lymph Node Stroma (림프절 스트로마 유래 fibroblastic reticular cell의 면역조절 기능에 대한 특성 규명)

  • Lee, Jong-Hwan
    • Journal of Life Science
    • /
    • v.26 no.7
    • /
    • pp.789-795
    • /
    • 2016
  • A lymph node (LN) is one of the secondary lymphoid organs. An LN consists of a complicated 3 dimensional frame structure and several stromal cells. Fibroblastic reticular cells (FRC) are distributed in the T zone for interaction with T cells. FRC secrete homing chemokines such as CCL19 and CCL21. Moreover, FRC play a pivotal role in the production of extracellular matrix (ECM) into LN for ECM reorganization against pathogen infections. However, not much is known about the involvement of the immune reaction of FRC. The present report is for the characterization of FRC on immune response. For this, FRC were positioned in several infected situations such as co-culture with macrophage, lipopolysaccharide (LPS), and TNFα stimulation. When a co-culture between FRC and macrophage was performed, a morphological change in FRC was observed, and empty space between FRCs was created by this change. The soluble ICAM-1 protein level was up-regulated by co-culturing with Raw264.7 and the treatment of the ROCK inhibitor Y27632. The activity of matrix metalloproteinase (MMP) was up-regulated by LPS onto FRC. Furthermore, the inflammatory cytokine TNFα regulated the expression of ECM in FRC by a gene chip assay. Collectively, it suggests that FRC are involved in immune reactions.

Block Replacement Scheme based on Reuse Interval for Hybrid SSD System (Hybrid SSD 시스템을 위한 재사용 간격 기반 블록 교체 기법)

  • Yoo, Sanghyun;Kim, Kyung Tae;Youn, Hee Yong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.19-27
    • /
    • 2015
  • Due to the advantages of fast read/write operation and low power consumption, SSD(Solid State Drive) is now widely adopted as storage device of smart phone, laptop computer, server, etc. However, the shortcomings of SSD such as limited number of write operations and asymmetric read/write operation lead to the problem of shortened life span of SSD. Therefore, the block replacement policy of SSD used as cache for HDD is very important. The existing solutions for improving the lifespan of SSD including the LARC scheme typically employ the LRU algorithm to manage the SSD blocks, which may increase the miss rate in SSD due to the replacement of frequently used block instead of rarely used block. In this paper we propose a novel block replacement scheme which considers the block reuse interval to effectively handle various data read/write patterns. The proposed scheme replaces the block in SSD based on the recency decided by reuse interval and age along with hit ratio. Computer simulation using workload trace files reveals that the proposed scheme consistently improves the performance and lifespan of SSD by increasing the hit ratio and decreasing the number of write operations compared to the existing schemes including LARC.

Study on implementation of Secure HTML5 Local Storage (안전한 HTML5 로컬스토리지 구현에 대한 연구)

  • Myeong, Hee-Won;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.83-93
    • /
    • 2012
  • HTML5 has developed not to have browser dependancy considering interoperability as same as maintaining compatability with lower versions of HTML. HTML5, the newest web standardization is on going of being structured. Along with the smart phone boom, HTML5 is spotlighted because it can be applied to cross platforms in mobile web environments. Specially the local Storage that has been listed in new features in HTML5 supports offline function for web application that enables web application to be run even when the mobile is not connected to 3G or wifi. With Local storage, development of server-independent web application can be possible. However Local storage stores plaintext data in it without applying any security measure and this makes the plaintext data dangerous to security threats that are already exist in other client side storages like Cookie. In the paper we propose secure Local storage methods to offer a safe way to store and retrieve data in Local storage guaranteeing its performance. Suggested functions in this paper follow localStorage standard API and use a module that provide cryptographic function. We also prove the efficiency of suggested secure Local storage based on its performance evaluation with implementation.

Fall Detection for Mobile Phone based on Movement Pattern (스마트 폰을 사용한 움직임 패턴 기반 넘어짐 감지)

  • Vo, Viet;Hoang, Thang Minh;Lee, Chang-Moo;Choi, Deok-Jai
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.23-31
    • /
    • 2012
  • Nowadays, recognizing human activities is an important subject; it is exploited widely and applied to many fields in real-life, especially in health care and context aware application. Research achievements are mainly focused on activities of daily living which are useful for suggesting advises to health care applications. Falling event is one of the biggest risks to the health and well-being of the elderly especially in independent living because falling accidents may be caused from heart attack. Recognizing this activity still remains in difficult research area. Many systems equipped wearable sensors have been proposed but they are not useful if users forget to wear the clothes or lack ability to adapt themselves to mobile systems without specific wearable sensors. In this paper, we develop a novel method based on analyzing the change of acceleration, orientation when the fall occurs and measure their similarity to featured fall patterns. In this study, we recruit five volunteers in our experiment including various fall categories. The results are effective for recognizing fall activity. Our system is implemented on G1 smart phone which are already plugged accelerometer and orientation sensors. The popular phone is used to get data from accelerometer and results showthe feasibility of our method and significant contribution to fall detection.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

Investigation on the Consumption of Caffeinated beverages by High School Students in Gyeonggi-do (경기도내 고등학생의 카페인 함유 음료 섭취 실태 조사)

  • Do, Young-Sook;Kang, Suk-Ho;Kim, Han-Teak;Yoon, Mi-Hye;Choi, Jeong-Bun
    • Journal of Food Hygiene and Safety
    • /
    • v.29 no.2
    • /
    • pp.105-116
    • /
    • 2014
  • Surveys on the consumption of caffeinated beverages by high school students (n=886) were performed. Of the students, 97.0% consumed a variety of caffeinated beverages, including carbonated drinks (90.0%), processed milk and cocoa (79.0%), coffee (63.0), teas (52.1), energy drinks (16.4%) and nourishment drinks (15.5%). The frequency of intake per student was 8.2 times per week. Caffeine intake through the caffeinated beverages was 41.53 mg/day, which was accounted for by coffee (51.5%), carbonated drinks (19.6%), processed milk and cocoa (11.5%), teas (11.4%), energy drinks (5.0%) and nourishment drinks (1.1%). Students with high levels of stress, those who consumed snacks twice a day, and those who used a computer (or smart phone) for more than 3 hours per day showed significantly higher caffeine intake. The groups with high caffeine intake experienced heart palpitations, insomnia and pollakiuria. Students indicated that they consumed the caffeinated beverages for the taste (57.9%), waking up (18.0%), thirst (13.2%), etc. (10.9%). They tended to consume drinks with a high content of caffeine to sleep less. In addition, they rarely checked the label, and showed a lack of awareness of the caffeine contents in the beverages, which calls for education.

Correlation Analysis between Key Word Search Frequencies Related to Food Safety Issue and Foodborne Illness Outbreaks (식중독 사고 발생과 식품 안전 관련 검색어 빈도와의 상관성 분석 연구)

  • Lee, Heeyoung;Jo, Heekoung;Kim, Kyungmi;Youn, Hyewon;Yoon, Yohan
    • Journal of Food Hygiene and Safety
    • /
    • v.32 no.2
    • /
    • pp.96-100
    • /
    • 2017
  • Through the increasing use of internet and smart device, consumers can search the information what they want to find. The information has been accumulated and become into a big data. Analyzing the big data regarding key words associated with foods and foodborne pathogens could be a method for predicting foodborne illness outbreaks, especially in school food services. Therefore, the objective of this study was to elucidate the correlations between key words associated with foods and food safety issues. Frequencies of the key words for foodborne pathogens and food safety issues were searched using an internet portal site from January 1, 2012 to December 31, 2014. In addition, foodborne outbreak data were collected from Ministry of Food and Drug Safety for the same period of time. There was correlation between the time having maximum key word frequencies of foods and foodborne pathogens, and the time for foodborne illness outbreak occurred. In addition, the search frequencies for foods and foodborne pathogens were generally increased right after foodborne outbreaks occurred. However, in some cases foodborne outbreaks occurred after the search frequencies for certain seasonal foods increased These results could be useful in food safety management for reducing foodborne illness and in food safety communication.

Geographical Name Denoising by Machine Learning of Event Detection Based on Twitter (트위터 기반 이벤트 탐지에서의 기계학습을 통한 지명 노이즈제거)

  • Woo, Seungmin;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.10
    • /
    • pp.447-454
    • /
    • 2015
  • This paper proposes geographical name denoising by machine learning of event detection based on twitter. Recently, the increasing number of smart phone users are leading the growing user of SNS. Especially, the functions of short message (less than 140 words) and follow service make twitter has the power of conveying and diffusing the information more quickly. These characteristics and mobile optimised feature make twitter has fast information conveying speed, which can play a role of conveying disasters or events. Related research used the individuals of twitter user as the sensor of event detection to detect events that occur in reality. This research employed geographical name as the keyword by using the characteristic that an event occurs in a specific place. However, it ignored the denoising of relationship between geographical name and homograph, it became an important factor to lower the accuracy of event detection. In this paper, we used removing and forecasting, these two method to applied denoising technique. First after processing the filtering step by using noise related database building, we have determined the existence of geographical name by using the Naive Bayesian classification. Finally by using the experimental data, we earned the probability value of machine learning. On the basis of forecast technique which is proposed in this paper, the reliability of the need for denoising technique has turned out to be 89.6%.

Changes in Consumption Life and Consumer Education in the Fourth Industrial Revolution (제4차 산업혁명 시대의 소비생활 변화와 소비자교육)

  • Jung, Joowon
    • Journal of Korean Home Economics Education Association
    • /
    • v.29 no.3
    • /
    • pp.89-104
    • /
    • 2017
  • Considering the advent of the Fourth Industrial Revolution, this study examines the changes and influences of intelligent information technology and the role of consumer education in the context of consumption life. The purpose of this study is to provide a theoretical foundation to effectively respond to the future consumption society as an independent consumer by enhancing the understanding of the Fourth Industrial Revolution in terms of consumption life. First, in terms of changes in the consumption paradigm in the Fourth Industrial Revolution, production and consumption are converged by being shared through a comprehensive connection platform in real time. Regarding the meaning of consumption, mental experience is being emphasized; moreover, usage and sharing, rather than ownership, are being highlighted. In terms of major changes in consumption life, the emergence of a more convenient smart consumption life and the possibility of personalized consumption optimized for individual demand are anticipated. Moreover, sustainable eco-friendly consumption is expected to increase further, and rapidly changing consumption trends will experience accelerated progress in consumer-centered changes. Next, the predicted problems in consumption life in the Fourth Industrial Revolution include unequal consumption due to intelligent information technology power center and the use and management of personal information data. Furthermore, ethical concerns related to the introduction of new technologies will become prominent, eventually resulting in issues concerning consumption satisfaction. To effectively respond to these new paradigm changes, consumer education should be value-centered. Ethical aspects of consumption should be considered, and consumption life should include trust and mutual cooperation. Furthermore, consumer education should facilitate creative convergence.