• Title/Summary/Keyword: Sub network

Search Result 1,505, Processing Time 0.034 seconds

Effect of Upward Social Comparison in SNS on Depression among Middle School Students: The Mediating Effect of Self-Deprecation and the Moderated Mediating Effect of Cognitive Flexibility (중학생의 SNS 상향비교가 우울에 미치는 영향: 자기비하의 매개 효과와 인지적 유연성의 조절된 매개효과)

  • Lee, Se Young;Park, Ju Hee
    • Human Ecology Research
    • /
    • v.59 no.3
    • /
    • pp.353-367
    • /
    • 2021
  • The purpose of this study was to examine the mediating effect of middle school students'self-deprecation in the relationship between upward social comparison in social network service (SNS) and depression and the moderated mediating effect of cognitive flexibility. The participants were 288 middle school students, in the first to third grades from four middle schools located in Seoul, Gyeong-gi, and Jeonnam. The date were analyzed with descriptive statistics, Pearson's correlation coefficients and the Process Macro Model 4, 1, and 14. The results of this study are as follows. First, an upward comparison in SNS has a significant positive influence on students'depression, and students' self-deprecation of students mediated the relation between two. Second, the level of control, which is a sub-factor of cognitive flexibility, moderated the mediating effect of self-deprecation. That is, if students are more likely to perceive difficult situations as controllable, upward social comparison in SNS mediated by self-deprecation has smaller effect on depression. Based on these results, we suggest practical interventions to reduce depression among middle school students by decreasing upward social comparison in SNS and self-deprecation. In addition, helping students perceive difficult situations as controllable could be another effective way of reducing depression among those students who have a high level of self-deprecation in upward social comparison in SNS.

COVID-19 Lung CT Image Recognition (COVID-19 폐 CT 이미지 인식)

  • Su, Jingjie;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.3
    • /
    • pp.529-536
    • /
    • 2022
  • In the past two years, Severe Acute Respiratory Syndrome Coronavirus-2(SARS-CoV-2) has been hitting more and more to people. This paper proposes a novel U-Net Convolutional Neural Network to classify and segment COVID-19 lung CT images, which contains Sub Coding Block (SCB), Atrous Spatial Pyramid Pooling(ASPP) and Attention Gate(AG). Three different models such as FCN, U-Net and U-Net-SCB are designed to compare the proposed model and the best optimizer and atrous rate are chosen for the proposed model. The simulation results show that the proposed U-Net-MMFE has the best Dice segmentation coefficient of 94.79% for the COVID-19 CT scan digital image dataset compared with other segmentation models when atrous rate is 12 and the optimizer is Adam.

A Study on S-Band Phased Array Antenna System for Receiving LEO Satellite Telemetry Signals (저궤도 위성 원격측정데이터 신호 수신을 위한 S-대역 위상배열안테나 시스템 연구)

  • Lee, Dong-Hyo;Seo, Jung-Won;Lee, Myoung-Sin;Chung, Daewon;Lee, Dongkook;Pyo, Seongmin
    • Journal of IKEEE
    • /
    • v.26 no.2
    • /
    • pp.211-218
    • /
    • 2022
  • This paper presents a S-band phased array antenna system for receiving LEO satellite telemetry signals. The proposed antenna, which is performed to be beam-tiled along the elevation direction, consists of 16 sub-array assemblies, 16 active circuit modules, a perpendicular feed network and a control/power unit. In order to precisely track an LEO satellite, the developed antenna is placed with its elevation axis along the projected trajectory of the satellite on the earth. The center of antenna aperture is facing to the maximum elevation angle in the LEO trajectory. The beam-tilted angles for tracking LEO satellite are obtained by calculating accurately satellite points. Satellite tracking measurements are carried out in the range of ±30° with the respect to the maximum elevation angle. The S/N ratio of 16.5 dB and the Eb/No of 13.3 dB at the maximum elevation angle are obtained from the measurements. The measured result agrees well with the pre-analyzed system margin.

Anonymous Blockchain Voting Model using the Master Node Network (마스터 노드 네트워크를 사용한 블록체인 익명 투표 모델)

  • Cho, Jae-Han;Lee, Lee-Sub;Choi, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • Electronic voting systems have been widely used in many countries around the world since the mid-1990s. In recent years, studies have applied blockchain to existing electronic voting systems in order to provide reliability, fairness, and transparency for voters. This approach is highly useful as a technology that promotes decentralized citizen participation. However, the existing electronic voting systems using blockchain have not sufficiently considered anonymity. Lack of anonymity acts as an important constraint in cases of small- and medium-sized voting, which is often required in decentralized citizen participation. In this study, we propose a model that provides anonymity to a voting system using blockchain by applying the concept of the master node in Dash cryptocurrency. First, we define the differences in the requirements of the transfer and voting systems in blockchain. We propose a parallel and autonomous model and algorithm to provide anonymity in the blockchain-that is, a decentralized development environment. In addition, a discussion of security and the environment for the proposed model is described.

High Power W-band Power Amplifier using GaN/Si-based 60nm process (GaN/Si 기반 60nm 공정을 이용한 고출력 W대역 전력증폭기)

  • Hwang, Ji-Hye;Kim, Ki-Jin;Kim, Wan-Sik;Han, Jae-Sub;Kim, Min-Gi;Kang, Bong-Mo;Kim, Ki-chul;Choi, Jeung-Won;Park, Ju-man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.67-72
    • /
    • 2022
  • This study presents the design of power amplifier (PA) in 60 nm GaN/Si HEMT technology. A customized transistor model enables the designing circuits operating at W-band. The all matching network of the PA was composed of equivalent transformer circuit to reduce matching loss. And then, equivalent transformer is several advantages without any additional inductive devices so that a wideband power characteristic can be achieved. The designed die area is 3900 ㎛ × 2300 ㎛. The designed results at center frequency achieved the small signal gain of 15.9 dB, the saturated output power (Psat) of 29.9 dBm, and the power added efficiency (PAE) of 24.2% at the supply voltage of 12 V.

Enhancing Recommender Systems by Fusing Diverse Information Sources through Data Transformation and Feature Selection

  • Thi-Linh Ho;Anh-Cuong Le;Dinh-Hong Vu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1413-1432
    • /
    • 2023
  • Recommender systems aim to recommend items to users by taking into account their probable interests. This study focuses on creating a model that utilizes multiple sources of information about users and items by employing a multimodality approach. The study addresses the task of how to gather information from different sources (modalities) and transform them into a uniform format, resulting in a multi-modal feature description for users and items. This work also aims to transform and represent the features extracted from different modalities so that the information is in a compatible format for integration and contains important, useful information for the prediction model. To achieve this goal, we propose a novel multi-modal recommendation model, which involves extracting latent features of users and items from a utility matrix using matrix factorization techniques. Various transformation techniques are utilized to extract features from other sources of information such as user reviews, item descriptions, and item categories. We also proposed the use of Principal Component Analysis (PCA) and Feature Selection techniques to reduce the data dimension and extract important features as well as remove noisy features to increase the accuracy of the model. We conducted several different experimental models based on different subsets of modalities on the MovieLens and Amazon sub-category datasets. According to the experimental results, the proposed model significantly enhances the accuracy of recommendations when compared to SVD, which is acknowledged as one of the most effective models for recommender systems. Specifically, the proposed model reduces the RMSE by a range of 4.8% to 21.43% and increases the Precision by a range of 2.07% to 26.49% for the Amazon datasets. Similarly, for the MovieLens dataset, the proposed model reduces the RMSE by 45.61% and increases the Precision by 14.06%. Additionally, the experimental results on both datasets demonstrate that combining information from multiple modalities in the proposed model leads to superior outcomes compared to relying on a single type of information.

A Study on Operational Element Identification and Integrated Time Series Analysis for Cyber Battlefield Recognition (사이버 전장인식을 위한 작전상태 요소 식별 및 통합 시계열 분석 연구)

  • Son-yong Kim;Koo-hyung Kwon;Hyun-jin Lee;Jae-yeon Lee;Jang-hyuk Kauh;Haeng-rok Oh
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.65-73
    • /
    • 2022
  • Since cyber operations are performed in a virtual cyber battlefield, the measurement indicators that can evaluate and visualize the current state of the cyber environment in a consistent form are required for the commander to effectively support the decision-making of cyber operations. In this paper, we propose a method to define various evaluation indicators that can be collected on the cyber battlefield, normalized them, and evaluate the cyber status in a consistent form. The proposed cyber battlefield status element consists of cyber asset-related indicators, target network-related indicators, and cyber threat-related indicators. Each indicator has 6 sub-indicators and can be used by assigning weights according to the commander's interests. The overall status of the cyber battlefield can be easily recognized because the measured indicators are visualized in time series on a single screen. Therefore, the proposed method can be used for the situational awareness required to effectively conduct cyber warfare.

Deep Learning-based Rheometer Quality Inspection Model Using Temporal and Spatial Characteristics

  • Jaehyun Park;Yonghun Jang;Bok-Dong Lee;Myung-Sub Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.43-52
    • /
    • 2023
  • Rubber produced by rubber companies is subjected to quality suitability inspection through rheometer test, followed by secondary processing for automobile parts. However, rheometer test is being conducted by humans and has the disadvantage of being very dependent on experts. In order to solve this problem, this paper proposes a deep learning-based rheometer quality inspection system. The proposed system combines LSTM(Long Short-Term Memory) and CNN(Convolutional Neural Network) to take advantage of temporal and spatial characteristics from the rheometer. Next, combination materials of each rubber was used as an auxiliary input to enable quality conformity inspection of various rubber products in one model. The proposed method examined its performance with 30,000 validation datasets. As a result, an F1-score of 0.9940 was achieved on average, and its excellence was proved.

Unraveling the Web of Health Misinformation: Exploring the Characteristics, Emotions, and Motivations of Misinformation During the COVID-19 Pandemic

  • Vinit Yadav;Yukti Dhadwal;Rubal Kanozia;Shri Ram Pandey;Ashok Kumar
    • Asian Journal for Public Opinion Research
    • /
    • v.12 no.1
    • /
    • pp.53-74
    • /
    • 2024
  • The proliferation of health misinformation gained momentum amidst the outbreak of the novel coronavirus disease 2019 (COVID-19). People stuck in their homes, without work pressure, regardless of health concerns towards personal, family, or peer groups, consistently demanded information. People became engaged with misinformation while attempting to find health information content. This study used the content analysis method and analyzed 1,154 misinformation stories from four prominent signatories of the International Fact-Checking Network during the pandemic. The study finds the five main categories of misinformation related to the COVID-19 pandemic. These are 1) the severity of the virus, 2) cure, prevention, and treatment, 3) myths and rumors about vaccines, 4) health authorities' guidelines, and 5) personal and social impacts. Various sub-categories supported the content characteristics of these categories. The study also analyzed the emotional valence of health misinformation. It was found that misinformation containing negative sentiments got higher engagement during the pandemic. Positive and neutral sentiment misinformation has less reach. Surprise, fear, and anger/aggressive emotions highly affected people during the pandemic; in general, people and social media users warning people to safeguard themselves from COVID-19 and creating a confusing state were found as the primary motivation behind the propagation of misinformation. The present study offers valuable perspectives on the mechanisms underlying the spread of health-related misinformation amidst the COVID-19 outbreak. It highlights the significance of discerning the accuracy of information and the feelings it conveys in minimizing the adverse effects on the well-being of public health.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.