• Title/Summary/Keyword: Software Types

Search Result 1,382, Processing Time 0.027 seconds

A Study on the Types of Social Capital Perception of Residents Participating in Rural Area Development Projects -Focused on Woolcock's Social Capital Theory- (농촌지역개발사업 참여주민의 사회적 자본 인식유형 연구 -Woolcock의 사회적 자본 이론을 중심으로-)

  • Jun, Mi Ri
    • Journal of Agricultural Extension & Community Development
    • /
    • v.29 no.1
    • /
    • pp.1-18
    • /
    • 2022
  • The government is in the process of pursuing various resident-driven rural development projects for rural development. Accordingly, the government is promoting various software projects to enhance social capital in order to effectively involve residents in rural development projects. However, residents' participation in rural development projects is still passive, while passive residents' involvement creates various problems such as conflicts among residents in the process of project implementation and poor operation after project implementation. This study is intended to be a basis for inducing voluntary community participation in rural development projects by disclosing the intention of residents to participate in the community's internal solidarity with social capital and connection with external communities. According to the analysis of 195 rural residents, three groups were divided according to the level of social capital awareness. While individualist groups with low integration and social capital were 25.1%, they were more integrated, but the average family-oriented group was 42.5%, and social-development groups with high integration and linked social capital were 32.3%. This study is meaningful in that it revealed that the social capital of the resident community is an important factor in both the internal solidarity (integrity) and the external community connection (connectivity) in the rural area development project.

Comparative proteomic analysis of Celastrus hindsii Benth. phenotypes reveals an intraspecific variation

  • Nguyen, Van Huy;Pham, Thanh Loan;Ha, Thi Tam Tien;Hoang, Thi Le Thu
    • Journal of Plant Biotechnology
    • /
    • v.47 no.4
    • /
    • pp.273-282
    • /
    • 2020
  • In Vietnam, Celastrus hindsii Benth, a medicinal plant rich in secondary metabolites, has been used to alleviate distress caused by ulcers, tumors, and inflammation for generations. The occurrence of two phenotypes, Broad Leaf (BL) and Narrow Leaf (NL), has raised questions about the selection of appropriate varieties for conservation and crop improvement to enhance medicinal properties. This study examined molecular differences in C. hindsii by comparing protein profiles between the NL and BL types using 2D-PAGE and MS. Peptide sequences and proteins were identified by matching MS data against the MSPnr100 databases and verified using the MultiIdent tool on ExPASy and the Blast2GO software. Our results revealed notable variations in protein abundance between the NL and BL proteomes. Selected proteins were confidently identified from 12 protein spots, thereby highlighting the molecular variation between NL and BL proteomes. Upregulated proteins in BL were found to be associated with flavonoid and amino acid biosynthesis as well as nuclease metabolism, which probably attributed to the intraspecific variations. Several bioactive proteins identified in this study can have applications in cancer therapeutics. Therefore, the BL phenotype characterized by healthier external morphological features has higher levels of bioactive compounds and could be better suited for medicinal use.

FPGA application for wireless monitoring in power plant

  • Kumar, Adesh;Bansal, Kamal;Kumar, Deepak;Devrari, Aakanksha;Kumar, Roushan;Mani, Prashant
    • Nuclear Engineering and Technology
    • /
    • v.53 no.4
    • /
    • pp.1167-1175
    • /
    • 2021
  • The process of automation and monitoring in industrial control system involves the use of many types of sensors. A programmable logic controller plays an important role in the automation of the different processes in the power plant system. The major control units are boiler for temperature and pressure, turbine for speed of motor, generator for voltage, conveyer belt for fuel. The power plant units are controlled using microcontrollers and PLCs, but FPGA can be the feasible solution. The paper focused on the design and simulation of hardware chip to monitor boiler, turbine, generator and conveyer belt. The hardware chip of the plant is designed in Xilinx Vivado Simulator 17.4 software using VHDL programming. The methodology includes VHDL code design, simulation, verification and testing on Virtex-5 FPGA hardware. The system has four independent buzzers used to indicate the status of the boiler, generator, turbine motor and conveyer belt in on/off conditions respectively. The GSM is used to display corresponding message on the mobile to know the status of the device in on/off condition. The system is very much helpful for the industries working on plant automation with FPGA hardware integration.

Buffer Overflow Attack and Defense Techniques

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.207-212
    • /
    • 2021
  • A buffer overflow attack is carried out to subvert privileged program functions to gain control of the program and thus control the host. Buffer overflow attacks should be prevented by risk managers by eradicating and detecting them before the software is utilized. While calculating the size, correct variables should be chosen by risk managers in situations where fixed-length buffers are being used to avoid placing excess data that leads to the creation of an overflow. Metamorphism can also be used as it is capable of protecting data by attaining a reasonable resistance level [1]. In addition, risk management teams should ensure they access the latest updates for their application server products that support the internet infrastructure and the recent bug reports [2]. Scanners that can detect buffer overflows' flaws in their custom web applications and server products should be used by risk management teams to scan their websites. This paper presents an experiment of buffer overflow vulnerability and attack. The aims to study of a buffer overflow mechanism, types, and countermeasures. In addition, to comprehend the current detection plus prevention approaches that can be executed to prevent future attacks or mitigate the impacts of similar attacks.

Design and implementation of a SHM system for a heritage timber building

  • Yang, Qingshan;Wang, Juan;Kim, Sunjoong;Chen, Huihui;Spencer, Billie F. Jr.
    • Smart Structures and Systems
    • /
    • v.29 no.4
    • /
    • pp.561-576
    • /
    • 2022
  • Heritage timber structures represent the history and culture of a nation. These structures have been inherited from previous generations; however, they inevitably exhibit deterioration over time, potentially leading to structural deficiencies. Structural Health Monitoring (SHM) offers the potential to assess operational anomalies, deterioration, and damage through processing and analysis of data collected from transducers and sensors mounted on the structure. This paper reports on the design and implementation of a long-term SHM system on the Feiyun Wooden Pavilion in China, a three-story timber building built more than 500 years ago. The principles and features of the design and implementation of SHM systems for heritage timber buildings are systematically discussed. In total, 104 sensors of 6 different types are deployed on the structure to monitor the environmental effects and structural responses, including air temperature and humidity, wind speed and direction, structural temperatures, strain, inclination, and acceleration. In addition, integrated data acquisition and transmission subsystem using a newly developed software platform are implemented. Selected preliminary statistical and correlation analysis using one year of monitoring data are presented to demonstrate the condition assessment capability of the system based on the monitoring data.

Feature Analysis for Detecting Mobile Application Review Generated by AI-Based Language Model

  • Lee, Seung-Cheol;Jang, Yonghun;Park, Chang-Hyeon;Seo, Yeong-Seok
    • Journal of Information Processing Systems
    • /
    • v.18 no.5
    • /
    • pp.650-664
    • /
    • 2022
  • Mobile applications can be easily downloaded and installed via markets. However, malware and malicious applications containing unwanted advertisements exist in these application markets. Therefore, smartphone users install applications with reference to the application review to avoid such malicious applications. An application review typically comprises contents for evaluation; however, a false review with a specific purpose can be included. Such false reviews are known as fake reviews, and they can be generated using artificial intelligence (AI)-based text-generating models. Recently, AI-based text-generating models have been developed rapidly and demonstrate high-quality generated texts. Herein, we analyze the features of fake reviews generated from Generative Pre-Training-2 (GPT-2), an AI-based text-generating model and create a model to detect those fake reviews. First, we collect a real human-written application review from Kaggle. Subsequently, we identify features of the fake review using natural language processing and statistical analysis. Next, we generate fake review detection models using five types of machine-learning models trained using identified features. In terms of the performances of the fake review detection models, we achieved average F1-scores of 0.738, 0.723, and 0.730 for the fake review, real review, and overall classifications, respectively.

Radar rainfall estimation and accuracy verification according to rainfall types (강우유형에 따른 레이더 강우 추정 및 정확도 검증)

  • Gi Moon Yuk;Sang Min Jang;Kyoung Hun An
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.267-267
    • /
    • 2023
  • 최근 이상기상현상과 기후변화로 인하여 국지적인 집중호우의 빈도 및 규모가 증가하고 있으며, 이로 인한 돌발 홍수 피해가 증가하고 있다. 레이더는 넓은 영역에 대해 고해상도의 강우 정보를 제공할 수 있으므로 위험기상 감시 및 실황 예측 모형의 입력자료로써 활용도가 높다. 레이더 강우량은 대기 중 강수입자에 대한 레이더 반사도와 강우강도의 Z-R 관계식으로 추정되기 때문에 강우 추정 과정에 불확실성을 내포하고 있다. 특히, 우리나라의 여름철 한반도의 집중호우는 층운형 강우와 함께 대류형 강우가 동반되는 복합적인 강우시스템에서 자주 발생하지만, 레이더 강우는 일반적으로 단일 강우시스템에 대한 고정된 Z-R 관계식으로 추정하므로, 이러한 현상에 대해 과대 추정 혹은 과소 추정이 발생한다. 본 연구에서는 집중호우에 적합한 강우를 추정하기 위해 2021년 8월 21일부터 8월 25일까지 경남 호우사례를 대상으로 층운형, 대류형, 열대형의 Z-R관계식과 반사도 조건에 따라 층운형과 적운형을 구분하여 Z-R 관계식을 적용하여 레이더 강우량 자료를 산출하였으며, 지상강우자료를 이용하여 정확도를 평가하였다. 레이더 자료 처리를 위해 Radar Software Library (RSL)를 이용하여 수평으로 1km 해상도의 1.5km CAPPI (Constant Altitude Plan Position Indicator) 자료로 변환하였다. 레이더 강우 추정의 정확도를 평가하기 위해 레이더 지점으로부터 100 km 이내에 위치하고 있는 기상관서와 자동기상관측소의 강우관측 결과와 비교·분석하였다.

  • PDF

Smart Tourism Design: A Semiotic Affordances Approach

  • Chulmo Koo;Jaehyun Park;William C. Hunter
    • Journal of Smart Tourism
    • /
    • v.3 no.2
    • /
    • pp.15-21
    • /
    • 2023
  • This paper presents a conceptual approach to Smart Tourism Design based on semiotic affordances theory. This conceptual approach repositions smart tourism from a techno-centric perspective that frames a seamless connection between the device and its software, to a more human-centric perspective that favors the user's needs, desires as perceived through the senses. An updated Smart Tourism Design emphasizes the aesthetic dimension of smart tourism that presents the objects of the travel experience as destination specific rather than universal, through representations as digital artifacts. This theory is based on an empirical and objective understanding of representations and how they can be identified as useful in the digital augmentation of travel experiences. Using Peirce's sign systems and Gibson's theory of affordances, smart tourism can transcend a prefabricated device-oriented experience to a closer dynamic and direct interaction between the user and the travel destination. Researchers and developers can use semiotics as a structural approach to recognizing objects as sign-types, and they can use affordances to better identify the immediacy of digital artifacts and purpose-driven by users' spontaneous and immediate motives.

Microscopic Image-based Cancer Cell Viability-related Phenotype Extraction (현미경 영상 기반 암세포 생존력 관련 표현형 추출)

  • Misun Kang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.3
    • /
    • pp.176-181
    • /
    • 2023
  • During cancer treatment, the patient's response to drugs appears differently at the cellular level. In this paper, an image-based cell phenotypic feature quantification and key feature selection method are presented to predict the response of patient-derived cancer cells to a specific drug. In order to analyze the viability characteristics of cancer cells, high-definition microscope images in which cell nuclei are fluorescently stained are used, and individual-level cell analysis is performed. To this end, first, image stitching is performed for analysis of the same environment in units of the well plates, and uneven brightness due to the effects of illumination is adjusted based on the histogram. In order to automatically segment only the cell nucleus region, which is the region of interest, from the improved image, a superpixel-based segmentation technique is applied using the fluorescence expression level and morphological information. After extracting 242 types of features from the image through the segmented cell region information, only the features related to cell viability are selected through the ReliefF algorithm. The proposed method can be applied to cell image-based phenotypic screening to determine a patient's response to a drug.

Monte Carlo simulation and study of REE/PET composites with wide γ-ray protection

  • Tongyan Cui;Ruixin Chen;Shumin Bi;Rui Wang;Zhongjian Ma;Qingxiu Jia
    • Nuclear Engineering and Technology
    • /
    • v.55 no.8
    • /
    • pp.2919-2926
    • /
    • 2023
  • In this paper, rare earth element (REE)/polyester composites were designed with lanthanum oxide, gadolinium oxide, and lutetium oxide as ray shielding agents, and polyethylene terephthalate (PET) as the base. Monte Carlo simulation was carried out using FLUKA software. We found that the radiation protection performance of the composite is affected by the type and amount of REE; a higher amount of REE equated to a better radiation protection performance of the composite. When the thickness of the composite and total thickness of the REE is constant, the number of superimposed layers inside the composite does not affect its shielding performance. Compared with a single-type REE/PET composite, a mixed-type REE/PET composite has a wider range of γ-ray absorption and better radiation protection performance. When the mass ratio of PET to REE is 2:8 and different types of REE are mixed with equal mass, several 0.2 cm-thick mixed-type REE/PET composites can shield >70% of 60 and 80 KeV γ-rays.