• Title/Summary/Keyword: The Next generation

Search Result 5,280, Processing Time 0.039 seconds

Handover Functional Architecture for Next Generation Wireless Networks (차세대 무선 네트워크를 위한 핸드오버 기능 구조 제안)

  • Baek, Joo-Young;Kim, Dong-Wook;Kim, Hyun-Jin;Choi, Yoon-Hee;Kim, Duk-Jin;Kim, Woo-Jae;Suh, Young-Joo;Kang, Suk-Yang;Kim, Kyung-Suk;Shin, Kyung-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.268-273
    • /
    • 2006
  • 차세대 무선 네트워크 (4G)는 새로운 무선 접속 기술의 개발과 함께 많은 연구가 필요한 분야이다. 그 중에서 특히 단말의 끊김없는 이동성을 제공해 주기 위한 핸드오버 기술이 가장 중요하다고 할 수 있다. 차세대 무선 네트워크는 새로운 무선 접속 기술과 함께 기존의 무선랜이나 이동통신망 등과 같이 사용될 것으로 예상되며, 네트워크 계층에서의 이동성 지원을 위하여 Mobile IPv6를 사용할 것으로 예상되는 네트워크이다. 이러한 네트워크에서 끊김없는 이동성을 제공해 주기 위해서는 현재까지 연구된 핸드오버 기능 및 구조에 대한 연구와 함께 보다 다양해진 네트워크 환경과 QoS 등을 고려한 종합적인 핸드오버 기능에 대한 연구가 필요하다. 본 논문에서는 차세대 무선 네트워크에서 단말의 끊김없는 핸드오버를 제공해 주기 위하여 필요한 기능들을 도출하고, 이들간의 유기적인 연관관계를 정의하여 다양한 네트워크 환경과 사용자의 우선순위, 어플리케이션의 QoS 요구 조건 등을 고려한 종합적인 핸드오버 기능 구조를 제안하고자 한다. 제안하는 핸드오버 구조는 Monitoring, Triggering, Handover의 세 가지 module로 나뉘어져 있으며, 각각은 필요에 따라 sub-module로 다시 세분화된다. 제안하는 핸드오버 구조의 가장 큰 특징은 핸드오버를 유발시킬 수 있는 여러 가지 요소를 종합적으로 고려하며 이들간의 수평적인 비교가 아닌 다단계 비교를 수행하여 보다 정확한 triggering이 가능하도록 한다. 또한 단말의 QoS 요구 사항을 보장하고 네트워크의 혼잡도(congestion) 및 부하 조절 (load balancing)을 위한 기능을 핸드오버 기능에 추가하여 효율적인 네트워크의 자원 사용이 가능하도록 설계하였다.서버로 분산처리하게 함으로써 성능에 대한 신뢰성을 향상 시킬 수 있는 Load Balancing System을 제안한다.할 때 가장 효과적인 라우팅 프로토콜이라고 할 수 있다.iRNA 상의 의존관계를 분석할 수 있었다.수안보 등 지역에서 나타난다 이러한 이상대 주변에는 대개 온천이 발달되어 있었거나 새로 개발되어 있는 곳이다. 온천에 이용하고 있는 시추공의 자료는 배제하였으나 온천이응으로 직접적으로 영향을 받지 않은 시추공의 자료는 사용하였다 이러한 온천 주변 지역이라 하더라도 실제는 온천의 pumping 으로 인한 대류현상으로 주변 일대의 온도를 올려놓았기 때문에 비교적 높은 지열류량 값을 보인다. 한편 한반도 남동부 일대는 이번 추가된 자료에 의해 새로운 지열류량 분포 변화가 나타났다 강원 북부 오색온천지역 부근에서 높은 지열류량 분포를 보이며 또한 우리나라 대단층 중의 하나인 양산단층과 같은 방향으로 발달한 밀양단층, 모량단층, 동래단층 등 주변부로 NNE-SSW 방향의 지열류량 이상대가 발달한다. 이것으로 볼 때 지열류량은 지질구조와 무관하지 않음을 파악할 수 있다. 특히 이러한 단층대 주변은 지열수의 순환이 깊은 심도까지 가능하므로 이러한 대류현상으로 지표부근까지 높은 지온 전달이 되어 나타나는 것으로 판단된다.의 안정된 방사성표지효율을 보였다. $^{99m}Tc$-transferrin을 이용한 감염영상을 성공적으로 얻을 수 있었으며, $^{67}Ga$-citrate 영상과 비교하여 더 빠른 시간 안에 우수한 영상을 얻을 수 있었다. 그러므로 $^{99m}Tc$-transierrin이 감염 병소의 영상진단에 사용될 수 있을 것으로 기대된다.리를 정량화 하였다. 특히 선

  • PDF

Development of a complex failure prediction system using Hierarchical Attention Network (Hierarchical Attention Network를 이용한 복합 장애 발생 예측 시스템 개발)

  • Park, Youngchan;An, Sangjun;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.127-148
    • /
    • 2020
  • The data center is a physical environment facility for accommodating computer systems and related components, and is an essential foundation technology for next-generation core industries such as big data, smart factories, wearables, and smart homes. In particular, with the growth of cloud computing, the proportional expansion of the data center infrastructure is inevitable. Monitoring the health of these data center facilities is a way to maintain and manage the system and prevent failure. If a failure occurs in some elements of the facility, it may affect not only the relevant equipment but also other connected equipment, and may cause enormous damage. In particular, IT facilities are irregular due to interdependence and it is difficult to know the cause. In the previous study predicting failure in data center, failure was predicted by looking at a single server as a single state without assuming that the devices were mixed. Therefore, in this study, data center failures were classified into failures occurring inside the server (Outage A) and failures occurring outside the server (Outage B), and focused on analyzing complex failures occurring within the server. Server external failures include power, cooling, user errors, etc. Since such failures can be prevented in the early stages of data center facility construction, various solutions are being developed. On the other hand, the cause of the failure occurring in the server is difficult to determine, and adequate prevention has not yet been achieved. In particular, this is the reason why server failures do not occur singularly, cause other server failures, or receive something that causes failures from other servers. In other words, while the existing studies assumed that it was a single server that did not affect the servers and analyzed the failure, in this study, the failure occurred on the assumption that it had an effect between servers. In order to define the complex failure situation in the data center, failure history data for each equipment existing in the data center was used. There are four major failures considered in this study: Network Node Down, Server Down, Windows Activation Services Down, and Database Management System Service Down. The failures that occur for each device are sorted in chronological order, and when a failure occurs in a specific equipment, if a failure occurs in a specific equipment within 5 minutes from the time of occurrence, it is defined that the failure occurs simultaneously. After configuring the sequence for the devices that have failed at the same time, 5 devices that frequently occur simultaneously within the configured sequence were selected, and the case where the selected devices failed at the same time was confirmed through visualization. Since the server resource information collected for failure analysis is in units of time series and has flow, we used Long Short-term Memory (LSTM), a deep learning algorithm that can predict the next state through the previous state. In addition, unlike a single server, the Hierarchical Attention Network deep learning model structure was used in consideration of the fact that the level of multiple failures for each server is different. This algorithm is a method of increasing the prediction accuracy by giving weight to the server as the impact on the failure increases. The study began with defining the type of failure and selecting the analysis target. In the first experiment, the same collected data was assumed as a single server state and a multiple server state, and compared and analyzed. The second experiment improved the prediction accuracy in the case of a complex server by optimizing each server threshold. In the first experiment, which assumed each of a single server and multiple servers, in the case of a single server, it was predicted that three of the five servers did not have a failure even though the actual failure occurred. However, assuming multiple servers, all five servers were predicted to have failed. As a result of the experiment, the hypothesis that there is an effect between servers is proven. As a result of this study, it was confirmed that the prediction performance was superior when the multiple servers were assumed than when the single server was assumed. In particular, applying the Hierarchical Attention Network algorithm, assuming that the effects of each server will be different, played a role in improving the analysis effect. In addition, by applying a different threshold for each server, the prediction accuracy could be improved. This study showed that failures that are difficult to determine the cause can be predicted through historical data, and a model that can predict failures occurring in servers in data centers is presented. It is expected that the occurrence of disability can be prevented in advance using the results of this study.

Epidemiological Studies of Clonorchiasis - II. Current Status and Natural Transition of the Endemicity of Clonorchis sinensis in Goyang Gun, a Low Endemic Area in Korea (간흡충증(肝吸虫症) 역학(疫學) - II. 저도유행지(低度流行地) 고양지방(高陽地方)에 있어서의 간흡충감염(肝吸虫感染)의 현황(現況)과 자연추이(自然推移))

  • Kim, D.C.;Lee, O.Y.;Lee, J.S.;Ahn, J.S.;Chang, Y.M.;Son, S.C.;See, S.H.
    • Journal of agricultural medicine and community health
    • /
    • v.8 no.1
    • /
    • pp.66-80
    • /
    • 1983
  • As a part of the epidemiological studies of clonorchiasis in Korea, this study was conducted to evaluate the current endemicity and the natural transition of the Clonorchis infection in Goyang Gun a low endemic area in recent years, prior to the introduction of praziquantel which will eventually influence to the status of the prevalence. The data obtained in this study in 1983 were evaluated for natural transition of the infection in comparison with those obtained 16 years ago in 1967 by the author (Kim, 1974). The areas of investigation, villages and schools surveyed, methods and techniques used in this study were the same as in 1967, except for the contents of the questionnaire for raw freshwater fish consumption by the local inhabitants. 1) The current prevalence rate of Clonorchis infection among the inhabitants was 7.5% on the average out of a total of 479 persons examined. The prevalence rate was 9.0% in the riverside area and 4.2% in the inland area. Among the schoolchildren, the prevalence rate was 1.1% out of a total of 1 319 examined. By area, it was 1.4% in the riverside area and 0.7% in the inland area. By sex, the prevalence rate was 13.3% in the male and 1.3% in the female in the inhabitants and no difference was seen in the schoolchildren. 2) In the natural transition of the infection, the prevalence rate in the inhabitants has decreased from 22.5% in 1967 to 7.5% in 1983, and in the schoolchildren, from 9.5% in 1967 to 1.1% in 1983. The reduction rate was higher in the riverside area than in the inland area. 3) In the prevalence rate by age, 1.2% was seen in the 10-14 age group and gradually increased to 8.1% in the 30-39 age group and reached peak 18.1% in the 40-49 age group. By sex, in the male, the prevalence rates have increased to 31.9% and 33.3% in the 40-49 and 50-59 age groups, respectively and decreased thereafter. In the female, the prevalence rate less than 5% was seen only in between the 10-14 and 30-39 age groups. 4) In the natural transition of the prevalence rate by age, sharp decrease was seen in the male from around 50% in 1967 between 15-19 and 30-39 age groups. The generation over 40s showed less decrease. In the female, the prevalence rate has decreased from 13% in 1967 to 5% in 1983 in the middle age groups and dropped to 0% in the rest of the age groups. 5) The intensity of the infection among clonorchiasis cases by mean EPmg (number of eggs per mg feces) value was 1.4. In the inhabitants, the value was 2.0 in the riverside area and 0.4 in the inland area. While in the schoolchildren, the value was 0.2 in both riverside and inland areas. 6) In the transition of the intensity of the infection, EPmg among the inhabitants has decreased from 3.9 in 1967 to 2.0 in 1983 in the riverside area, and from 2.9 to 0.4 in the inland area. In the schoolchildren, the reduction was similar in both riverside and inland areas resulting from 1.0-1.1 in 1967 to 0.2 in 1983. 7) In the intensity of the infection by age, EPmg 3.4 was peak at the 40-49 age group and 0.2-1.0 was seen in the rest of the age groups. The mean value was 1.5 in the male and 0.6 in the female. 8) In the natural transition of the intensity of the infection, the EPmg has decreased from 2.7 in 1967 to 1.4 in 1983. By age, reduction was seen in all of the age groups, particularly in the young and the old age groups of 50s and over, except in the 40-49 age group in which reverse phenomenon was seen. By sex, it has decreased from 3.5 in 1967 to 1.5 in 1983 in the male and from 1.0 to 0.6 in the female. 9) In the distribution of the clonorchiasis cases by the range of EPmg value, 70.3% of the cases were placed in the range of 0.1-0.9 as the most and 16.2% in 1.0-4.9 as the next. With such figures, those included in the range less than 0.9 as light infection were 78.4% and under 5.0-9.9 up to moderate infection 99.3% of the cases were covered. The cases were distributed up to 20.0-39.9 in the male and to 1.0-4.9 in the female. 10) In the transition of the distribution of the clonorchiasis cases by EPmg, the highest intensity reached up to 60.0-79.9 in 1967 and to 20.0-39.9 in 1983. In the range of light infection, under 0.1-0.9, the distribution in rate was 64.5% in 1967 and 78.4% in 1983. Up to the range of moderate infection, under 5.0-9.9, 91.7% in 1967 and 97.3% in 1983 were seen respectively. 11) In a survey for raw freshwater fish consumption among the local inhabitants,78.3 of the clonorchiasis cases interviewed admitted their experience of the raw consumption. However, those who practised in the past two years were 34.8% 55.6% of those who have such experience in the past professed that they did not practise raw freshwater fish consumption in the past two years. 12) The major cause of the reduction of the raw freshwater fish consumption among the inhabitants were the wide spread water pollution in the locality. The most common reason professed for stopping raw freshwater fish consumption among the inhabitants was the risk of the fluke infection. 13) In animal survey, 3.1% of dogs were found infected with Clonorchis, decreasing from 21.6% in 1967. 14) The distribution of the first intermediate host, Parafossarulus manchouricus has greatly diminished in this locality and found only in two localized ponds. No Clonorchis infection was found from the snails examined. 15) The second intermediate freshwater fish host has been further limited by extended water pollution. No susceptible fish host could be examined. 16) In conclusion, the endemicity of Clonorchis infection in Croyang Gun, low endemic area, has significantly decreased during the past 16 years. The major cause of the regressive transition of the infection was the water pollution of the freshwater system of this locality. This has upset the ecosystems of the intermediate host of Clonorchis sinensis in many areas of waterbodies and further discouraged to a significant extent the local inhabitants from raw freshwater fish consumption.

  • PDF

A Study on the Consideration of the Locations of Gyeongju Oksan Gugok and Landscape Interpretation - Focusing on the Arbor of Lee, Jung-Eom's "Oksan Gugok" - (경주 옥산구곡(玉山九曲)의 위치비정과 경관해석 연구 - 이정엄의 「옥산구곡가」를 중심으로 -)

  • Peng, Hong-Xu;Kang, Tai-Ho
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.3
    • /
    • pp.26-36
    • /
    • 2018
  • This study aims to examine the characteristics of landscape through the analysis of location and the landscape of Gugok while also conducting the empirical study through the literature review, field study, and digital analysis of the Okgung Gugok. Oksan Gugok is a set of songs set in Ogsan Creek(玉山川)or Jagyese Creek(紫溪川, 紫玉山), which flows in front of the Oksan Memorial Hall(李彦迪), which is dedicated to the Lee Eong-jeok (李彦迪). We first ascertained the location and configuration of Oksan Gogok. Second, we confirmed the accurate location of Oksan Gogok by utilizing the digital topographic map of Oksan Gogok which was submitted by Google Earth Pro and Geographic Information Center as well as the length of the longitude of the gravel measured by the Trimble Juno SB GPS. Through the study of the literature and the field investigation, The results of the study are as follows. First, Yi Eonjeok was not a direct composer of Oksan Gugok, nor did he produce "Oksan Gugokha(Music)". Lee Ia-sung(李野淳), the ninth Youngest Son of Tweo-Kye, Hwang Lee, visited the "Oksan Gugokha" in the spring of 1823(Sunjo 23), which was the 270th years after the reign of Yi Eonjeok. At this time, receiving the proposal of Ian Sung, Lee Jung-eom(李鼎儼), Lee Jung-gi(李鼎基), and Lee Jung-byeong(李鼎秉), the descendants of Ian Sung set up a song and created Oksan Gugok Music. And the Essay of Oksan Travel Companions writted by Lee Jung-gi turns out being a crucial data to describe the situation when setting up the Ok-San Gugok. Second, In the majority of cases, Gogok Forest is a forest managed by a Confucian Scholar, not run by ordinary people. The creation of "Oksan Bugok Music" can be regarded as an expression of pride that the descendants of Yi Eonjeok and Lee Hwang, and next generation of several Confucian scholars had inherited traditional Neo-Confucian. Third, Lee Jung-eom's "Oksan Donghaengki" contains a detailed description of the "Oksan Gugokha" process and the process of creating a song. Fourth, We examined the location of one to nine Oksan songs again. In particular, eight songs and nine songs were located at irregular intervals, and eight songs were identified as $36^{\circ}01^{\prime}08.60^{{\prime}{\prime}}N$, $129^{\circ}09^{\prime}31.20^{{\prime}{\prime}}E$. Referring to the ancient kingdom of Taojam, the nine-stringed Sainam was unbiased as a lower rock where the two valleys of the East West congregate. The location was estimated at $36^{\circ}01^{\prime}19.79^{{\prime}{\prime}}N$, $129^{\circ}09^{\prime}30.26^{{\prime}{\prime}}E$. Fifth, The landscape elements and landscapes presented in Lee Jung-eom's "Oksan Gugokha" were divided into form, semantic and climatic elements. As a result, Lee Jung-eom's Cho Young-gwan was able to see the ideal of mountain water and the feeling of being idle in nature as well as the sense of freedom. Sixth, After examining the appearance of the elements and the frequency of the appearance of the landscape, 'water' and 'mountain' were the absolute factors that emphasized the original curved environment at the mouth of Lee Jung-eom. Therefore, there was gugokga can gauge the fresh ideas(神仙思想)and retreat ever(隱居思想). This inherent harmony between the landscape as well as through the mulah any ideas that one with nature and meditation, Confucian tube.

A Study on the Various Attributes of E-Sport Influencing Flow and Identification (e-스포츠의 다양한 속성이 유동(flow)과 동일시에 미치는 영향에 관한 연구)

  • Suh, Mun-Shik;Ahn, Jin-Woo;Kim, Eun-Young;Um, Seong-Won
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.1
    • /
    • pp.59-80
    • /
    • 2008
  • Recently, e-sports are growing with potentiality as a new industry with conspicuous profit model. But studies that dealing with e-sports are not enough. Hence, proposes of this paper are both to establish basic model that is for the design of e-sport marketing strategy and to contribute toward future studies which are related to e-sports. Recently, the researches to explain sports-sponsorship through the identification theory have been discovered. Many researches say that somewhat proper identification is a requirement for most sponsors to improve the their images which is essential to sponsorship activity. Consequently, the research for sponsorship associated with identification in the e-sports, not in the physical sports is the core sector of this study. We extracted the variables from online's major characteristics and existing sport sponsorship researches. First, because e-sports mean the tournaments or leagues in the use of online game, the main event of the game is likely to call it online game. Online media's attributes are distinguished from those of offline. Especially, interactivity, anonymity, and expandibility as a e-sport game attributes are able to be mentioned. So, these inherent online attributes are examined on the relationship with flow. Second, in physical sports games, Fisher(1998) revealed that team similarity and team attractivity were positively related to team identification. Wann(1996) said that the result of former game influenced the evaluation of the next game, then in turn has an effect on the identification of team supporters. Considering these results in the e-sports side, e-sports gamer' attractivity, similarity, and match result seem to be important precedent variables of the identification with a gamer. So, these e-sport gamer attributes are examined on the relationship with both flow and identification with a gamer. Csikszentmihalyi(1988) defined the term flow as feeling status for him to be making current positive experience optimally. Hoffman and Novak(1996) also said that if a user experienced the flow he would visit a website without any reward. Therefore flow might be positively associated with user's identification with a gamer. And, Swanson(2003) disclosed that team identification influenced the positive results of sponsorship, which included attitude toward sponsors, sponsor patronage, and satisfaction with sponsors. That is, identification with a gamer expect to be connected with corporation identification significantly. According to the above, we can design the following research model. All variables used in this study(interactivity, anonymity, expandibility, attractivity, similarity, match result, flow, identification with a gamer, and identification with a sponsor) definitely were defined operationally underlying precedent researches. Sample collection was carried out to the person who has an experience to have enjoyed e-sports during June 2006. Much portion of samples is men because much more men than women enjoy e-sports in general. Two-step approach was used to test the hypotheses. First, confirmatory factor analysis was committed to guarantee the validity and reliability of variables. The results showed that all variables had not only intensive and discriminant validity, but also reliability. Then, research model was examined with fully structural equation using LISREL 8.3 version. The fitness of the suggested model mostly was at the acceptable level. Shortly speaking about the results, first of all, in e-sports game attributes, only interactivity which is called a basic feature in online situation affected flow positively. Secondly, in e-sports gamer's attributes, similarity with a gamer and match result influenced flow positively, but there was no significant effect in the relationship between the attractivity of a gamer and flow. And as expected, similarity had an effect on identification with a gamer significantly. But unexpectedly attractivity and match result did not influence identification with a gamer significantly. Just the same as the fact verified in the many precedent researches, flow greatly influenced identification with a gamer, and identification with a gamer continually had an influence on the identification with a sponsor significantly. There are some implications in these results. If the sponsor of e-sports supports the pro-game player who absolutely should have the superior ability to others and is similar to the user enjoying e-sports, many amateur gamers will feel much of the flow and identification with a pro-gamer, and then after all, feel the identification with a sponsor. Such identification with a sponsor leads people enjoying e-sports to have purchasing intention for products produced by the sponsor and to make a positive word-of-mouth for those products or the sponsor. For the future studies, we recommend a few ideas. Based on the results of this study, it is necessary to find new variables relating to the e-sports, which is not mentioned in this study. For this work to be possible, qualitative research seems to be needed to consider the inherent e-sport attributes. Finally, to generalize the results related to e-sports, a wide range of generations not a specific generation should be researched.

  • PDF

Studies on Biology and Control of the Mulberry Small Weevil, Baris deplanata ROELOFS (Coleoptera: Curculionidae) (뽕나무애바구미의 생태 및 방제에 관한 연구)

  • 백현준;백운하
    • Journal of Sericultural and Entomological Science
    • /
    • v.18 no.2
    • /
    • pp.65-78
    • /
    • 1976
  • The mulberry small weevil, Baris deplanata ROELOFS, has highly infested mulberry trees in Korea. As the damage caused by the mulberry small weevil in mulberry fields has been increased over the country since 1969, the authors has carried out a series of biological and controlling studies on the pest from 1971 to 1972. The results obtained are summarized as follows. 1. The adult weevil is elongate oval in shape with black in color and the probocis is long as usual in curculionidae. The size of adult female is 3.30${\pm}$0.04mm in length, 1.47${\pm}$0.04mm in width, and the length of proboscis is 1.25${\pm}$0.014mm, while adult male is 3.28${\pm}$0.06mm in length, 1.40${\pm}$0.04mm in width, and the length of proboscis is 1.30${\pm}$0.02mm. The antenna is geniculate consisting of 12 segments. The terminal sternite of the abdomen has a pointed tip in male but not in female. 2. The egg is long oval in shape, milky white in color, 0.51${\pm}$0.05mm in length and 0.32${\pm}$0.02mm in width. 3. The mature larva is cylindrical and light yellowow in color except the head of dark brown, and legless, 3.88${\pm}$0.06mm in length, 1.40${\pm}$0.02mm width, each segment bearing many wrinkless and short setae. 4. The pupa is long oval, milky white and exarate, 3.53${\pm}$0.09 in length, 1.40${\pm}$0.03mm in width. 5. Majority of the species has one generation through a year and overwinters as adult in xylem of withered branch and come out again from late April to early May in next year. But some of the female oviposit in the same year and the offsprings overwinter as larva (0.4%) or pupa (0.1%) 6. The eggs are mostly laid under the cork layer of withered branch and the number of eggs deposited by an adult female is 73.44${\pm}$8.74, the average egg-laying period is 33.88${\pm}$6.04 days. The incubation period is 11.69${\pm}$0.39 days, the larval period 45.04${\pm}$1.63 and the pupal period 11.05${\pm}$0.49 days. The period of adult's activity is 46.7${\pm}$5.90 days. 7. The larvae feed on the cambium under the bark and adults feed on the winter bud, the latent bud, the leaf stalk and the base of newly shoot. 8. An active period of adults was observed during the period of 4 months from April to July. However, the peak of adult-density occurred in the early May (in the fields of spring-prunning) and early to middle June(in the fields of summer-prunning). 9. There is a positive correlation between the density of larvae and diameter and length of the branches. 10. The pattern of distributions of the adult of mulberry small weevil is negative binomial distribution. 11. The chalcid fly was disclosed to be a natural enemy which was parasite on the larvae of mulberry small weevil and its parasitic ratio was 11.9%. 12. Phosvel D, Malix D, Salithion EC, DDVP EC, and Phosvel EC were effective for the control of adults and Satchukoto-S EC, and Salithio EC were effective for the control of larvae.

  • PDF

A Deep Learning Based Approach to Recognizing Accompanying Status of Smartphone Users Using Multimodal Data (스마트폰 다종 데이터를 활용한 딥러닝 기반의 사용자 동행 상태 인식)

  • Kim, Kilho;Choi, Sangwoo;Chae, Moon-jung;Park, Heewoong;Lee, Jaehong;Park, Jonghun
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.163-177
    • /
    • 2019
  • As smartphones are getting widely used, human activity recognition (HAR) tasks for recognizing personal activities of smartphone users with multimodal data have been actively studied recently. The research area is expanding from the recognition of the simple body movement of an individual user to the recognition of low-level behavior and high-level behavior. However, HAR tasks for recognizing interaction behavior with other people, such as whether the user is accompanying or communicating with someone else, have gotten less attention so far. And previous research for recognizing interaction behavior has usually depended on audio, Bluetooth, and Wi-Fi sensors, which are vulnerable to privacy issues and require much time to collect enough data. Whereas physical sensors including accelerometer, magnetic field and gyroscope sensors are less vulnerable to privacy issues and can collect a large amount of data within a short time. In this paper, a method for detecting accompanying status based on deep learning model by only using multimodal physical sensor data, such as an accelerometer, magnetic field and gyroscope, was proposed. The accompanying status was defined as a redefinition of a part of the user interaction behavior, including whether the user is accompanying with an acquaintance at a close distance and the user is actively communicating with the acquaintance. A framework based on convolutional neural networks (CNN) and long short-term memory (LSTM) recurrent networks for classifying accompanying and conversation was proposed. First, a data preprocessing method which consists of time synchronization of multimodal data from different physical sensors, data normalization and sequence data generation was introduced. We applied the nearest interpolation to synchronize the time of collected data from different sensors. Normalization was performed for each x, y, z axis value of the sensor data, and the sequence data was generated according to the sliding window method. Then, the sequence data became the input for CNN, where feature maps representing local dependencies of the original sequence are extracted. The CNN consisted of 3 convolutional layers and did not have a pooling layer to maintain the temporal information of the sequence data. Next, LSTM recurrent networks received the feature maps, learned long-term dependencies from them and extracted features. The LSTM recurrent networks consisted of two layers, each with 128 cells. Finally, the extracted features were used for classification by softmax classifier. The loss function of the model was cross entropy function and the weights of the model were randomly initialized on a normal distribution with an average of 0 and a standard deviation of 0.1. The model was trained using adaptive moment estimation (ADAM) optimization algorithm and the mini batch size was set to 128. We applied dropout to input values of the LSTM recurrent networks to prevent overfitting. The initial learning rate was set to 0.001, and it decreased exponentially by 0.99 at the end of each epoch training. An Android smartphone application was developed and released to collect data. We collected smartphone data for a total of 18 subjects. Using the data, the model classified accompanying and conversation by 98.74% and 98.83% accuracy each. Both the F1 score and accuracy of the model were higher than the F1 score and accuracy of the majority vote classifier, support vector machine, and deep recurrent neural network. In the future research, we will focus on more rigorous multimodal sensor data synchronization methods that minimize the time stamp differences. In addition, we will further study transfer learning method that enables transfer of trained models tailored to the training data to the evaluation data that follows a different distribution. It is expected that a model capable of exhibiting robust recognition performance against changes in data that is not considered in the model learning stage will be obtained.

Open Digital Textbook for Smart Education (스마트교육을 위한 오픈 디지털교과서)

  • Koo, Young-Il;Park, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.177-189
    • /
    • 2013
  • In Smart Education, the roles of digital textbook is very important as face-to-face media to learners. The standardization of digital textbook will promote the industrialization of digital textbook for contents providers and distributers as well as learner and instructors. In this study, the following three objectives-oriented digital textbooks are looking for ways to standardize. (1) digital textbooks should undertake the role of the media for blended learning which supports on-off classes, should be operating on common EPUB viewer without special dedicated viewer, should utilize the existing framework of the e-learning learning contents and learning management. The reason to consider the EPUB as the standard for digital textbooks is that digital textbooks don't need to specify antoher standard for the form of books, and can take advantage od industrial base with EPUB standards-rich content and distribution structure (2) digital textbooks should provide a low-cost open market service that are currently available as the standard open software (3) To provide appropriate learning feedback information to students, digital textbooks should provide a foundation which accumulates and manages all the learning activity information according to standard infrastructure for educational Big Data processing. In this study, the digital textbook in a smart education environment was referred to open digital textbook. The components of open digital textbooks service framework are (1) digital textbook terminals such as smart pad, smart TVs, smart phones, PC, etc., (2) digital textbooks platform to show and perform digital contents on digital textbook terminals, (3) learning contents repository, which exist on the cloud, maintains accredited learning, (4) App Store providing and distributing secondary learning contents and learning tools by learning contents developing companies, and (5) LMS as a learning support/management tool which on-site class teacher use for creating classroom instruction materials. In addition, locating all of the hardware and software implement a smart education service within the cloud must have take advantage of the cloud computing for efficient management and reducing expense. The open digital textbooks of smart education is consdered as providing e-book style interface of LMS to learners. In open digital textbooks, the representation of text, image, audio, video, equations, etc. is basic function. But painting, writing, problem solving, etc are beyond the capabilities of a simple e-book. The Communication of teacher-to-student, learner-to-learnert, tems-to-team is required by using the open digital textbook. To represent student demographics, portfolio information, and class information, the standard used in e-learning is desirable. To process learner tracking information about the activities of the learner for LMS(Learning Management System), open digital textbook must have the recording function and the commnincating function with LMS. DRM is a function for protecting various copyright. Currently DRMs of e-boook are controlled by the corresponding book viewer. If open digital textbook admitt DRM that is used in a variety of different DRM standards of various e-book viewer, the implementation of redundant features can be avoided. Security/privacy functions are required to protect information about the study or instruction from a third party UDL (Universal Design for Learning) is learning support function for those with disabilities have difficulty in learning courses. The open digital textbook, which is based on E-book standard EPUB 3.0, must (1) record the learning activity log information, and (2) communicate with the server to support the learning activity. While the recording function and the communication function, which is not determined on current standards, is implemented as a JavaScript and is utilized in the current EPUB 3.0 viewer, ths strategy of proposing such recording and communication functions as the next generation of e-book standard, or special standard (EPUB 3.0 for education) is needed. Future research in this study will implement open source program with the proposed open digital textbook standard and present a new educational services including Big Data analysis.

Subject-Balanced Intelligent Text Summarization Scheme (주제 균형 지능형 텍스트 요약 기법)

  • Yun, Yeoil;Ko, Eunjung;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.141-166
    • /
    • 2019
  • Recently, channels like social media and SNS create enormous amount of data. In all kinds of data, portions of unstructured data which represented as text data has increased geometrically. But there are some difficulties to check all text data, so it is important to access those data rapidly and grasp key points of text. Due to needs of efficient understanding, many studies about text summarization for handling and using tremendous amounts of text data have been proposed. Especially, a lot of summarization methods using machine learning and artificial intelligence algorithms have been proposed lately to generate summary objectively and effectively which called "automatic summarization". However almost text summarization methods proposed up to date construct summary focused on frequency of contents in original documents. Those summaries have a limitation for contain small-weight subjects that mentioned less in original text. If summaries include contents with only major subject, bias occurs and it causes loss of information so that it is hard to ascertain every subject documents have. To avoid those bias, it is possible to summarize in point of balance between topics document have so all subject in document can be ascertained, but still unbalance of distribution between those subjects remains. To retain balance of subjects in summary, it is necessary to consider proportion of every subject documents originally have and also allocate the portion of subjects equally so that even sentences of minor subjects can be included in summary sufficiently. In this study, we propose "subject-balanced" text summarization method that procure balance between all subjects and minimize omission of low-frequency subjects. For subject-balanced summary, we use two concept of summary evaluation metrics "completeness" and "succinctness". Completeness is the feature that summary should include contents of original documents fully and succinctness means summary has minimum duplication with contents in itself. Proposed method has 3-phases for summarization. First phase is constructing subject term dictionaries. Topic modeling is used for calculating topic-term weight which indicates degrees that each terms are related to each topic. From derived weight, it is possible to figure out highly related terms for every topic and subjects of documents can be found from various topic composed similar meaning terms. And then, few terms are selected which represent subject well. In this method, it is called "seed terms". However, those terms are too small to explain each subject enough, so sufficient similar terms with seed terms are needed for well-constructed subject dictionary. Word2Vec is used for word expansion, finds similar terms with seed terms. Word vectors are created after Word2Vec modeling, and from those vectors, similarity between all terms can be derived by using cosine-similarity. Higher cosine similarity between two terms calculated, higher relationship between two terms defined. So terms that have high similarity values with seed terms for each subjects are selected and filtering those expanded terms subject dictionary is finally constructed. Next phase is allocating subjects to every sentences which original documents have. To grasp contents of all sentences first, frequency analysis is conducted with specific terms that subject dictionaries compose. TF-IDF weight of each subjects are calculated after frequency analysis, and it is possible to figure out how much sentences are explaining about each subjects. However, TF-IDF weight has limitation that the weight can be increased infinitely, so by normalizing TF-IDF weights for every subject sentences have, all values are changed to 0 to 1 values. Then allocating subject for every sentences with maximum TF-IDF weight between all subjects, sentence group are constructed for each subjects finally. Last phase is summary generation parts. Sen2Vec is used to figure out similarity between subject-sentences, and similarity matrix can be formed. By repetitive sentences selecting, it is possible to generate summary that include contents of original documents fully and minimize duplication in summary itself. For evaluation of proposed method, 50,000 reviews of TripAdvisor are used for constructing subject dictionaries and 23,087 reviews are used for generating summary. Also comparison between proposed method summary and frequency-based summary is performed and as a result, it is verified that summary from proposed method can retain balance of all subject more which documents originally have.

The Effect of Mutual Trust on Relational Performance in Supplier-Buyer Relationships for Business Services Transactions (재상업복무교역중적매매관계중상호신임대관계적효적영향(在商业服务交易中的买卖关系中相互信任对关系绩效的影响))

  • Noh, Jeon-Pyo
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.4
    • /
    • pp.32-43
    • /
    • 2009
  • Trust has been studied extensively in psychology, economics, and sociology, and its importance has been emphasized not only in marketing, but also in business disciplines in general. Unlike past relationships between suppliers and buyers, which take considerable advantage of private networks and may involve unethical business practices, partnerships between suppliers and buyers are at the core of success for industrial marketing amid intense global competition in the 21st century. A high level of mutual cooperation occurs through an exchange relationship based on trust, which brings long-term benefits, competitive enhancements, and transaction cost reductions, among other benefits, for both buyers and suppliers. In spite of the important role of trust, existing studies in buy-supply situations overlook the role of trust and do not systematically analyze the effect of trust on relational performance. Consequently, an in-depth study that determines the relation of trust to the relational performance between buyers and suppliers of business services is absolutely needed. Business services in this study, which include those supporting the manufacturing industry, are drawing attention as the economic growth engine for the next generation. The Korean government has selected business services as a strategic area for the development of manufacturing sectors. Since the demands for opening business services markets are becoming fiercer, the competitiveness of the business service industry must be promoted now more than ever. The purpose of this study is to investigate the effect of the mutual trust between buyers and suppliers on relational performance. Specifically, this study proposed a theoretical model of trust-relational performance in the transactions of business services and empirically tested the hypotheses delineated from the framework. The study suggests strategic implications based on research findings. Empirical data were collected via multiple methods, including via telephone, mail, and in-person interviews. Sample companies were knowledge-based companies supplying and purchasing business services in Korea. The present study collected data on a dyadic basis. Each pair of sample companies includes a buying company and its corresponding supplying company. Mutual trust was traced for each pair of companies. This study proposes a model of trust-relational performance of buying-supplying for business services. The model consists of trust and its antecedents and consequences. The trust of buyers is classified into trust toward the supplying company and trust toward salespersons. Viewing trust both at the individual level and the organizational level is based on the research of Doney and Cannon (1997). Normally, buyers are the subject of trust, but this study supposes that suppliers are the subjects. Hence, it uniquely focused on the bilateral perspective of perceived risk. In other words, suppliers, like buyers, are the subject of trust since transactions are normally bilateral. From this point of view, suppliers' trust in buyers is as important as buyers' trust in suppliers. The suppliers' trust is influenced by the extent to which it trusts the buying companies and the buyers. This classification of trust using an individual level and an organization level is based on the suggestion of Doney and Cannon (1997). Trust affects the process of supplier selection, which works in a bilateral manner. Suppliers are actively involved in the supplier selection process, working very closely with buyers. In addition, the process is affected by the extent to which each party trusts its partners. The selection process consists of certain steps: recognition, information search, supplier selection, and performance evaluation. As a result of the process, both buyers and suppliers evaluate the performance and take corrective actions on the basis of such outcomes as tangible, intangible, and/or side effects. The measurement of trust used for the present study was developed on the basis of the studies of Mayer, Davis and Schoorman (1995) and Mayer and Davis (1999). Based on their recommendations, the three dimensions of trust used for the study include ability, benevolence, and integrity. The original questions were adjusted to the context of the transactions of business services. For example, a question such as "He/she has professional capabilities" has been changed to "The salesperson showed professional capabilities while we talked about our products." The measurement used for this study differs from those used in previous studies (Rotter 1967; Sullivan and Peterson 1982; Dwyer and Oh 1987). The measurements of the antecedents and consequences of trust used for this study were developed on the basis of Doney and Cannon (1997). The original questions were adjusted to the context of transactions in business services. In particular, questions were developed for both buyers and suppliers to address the following factors: reputation (integrity, customer care, good-will), market standing (company size, market share, positioning in the industry), willingness to customize (product, process, delivery), information sharing (proprietary information, private information), willingness to maintain relationships, perceived professionalism, authority empowerment, buyer-seller similarity, and contact frequency. As a consequential variable of trust, relational performance was measured. Relational performance is classified into tangible effects, intangible effects, and side effects. Tangible effects include financial performance; intangible effects include improvements in relations, network developing, and internal employee satisfaction; side effects include those not included either in the tangible or intangible effects. Three hundred fifty pairs of companies were contacted, and one hundred five pairs of companies responded. After deleting five company pairs because of incomplete responses, one hundred five pairs of companies were used for data analysis. The response ratio of the companies used for data analysis is 30% (105/350), which is above the average response ratio in industrial marketing research. As for the characteristics of the respondent companies, the majority of the companies operate service businesses for both buyers (85.4%) and suppliers (81.8%). The majority of buyers (76%) deal with consumer goods, while the majority of suppliers (70%) deal with industrial goods. This may imply that buyers process the incoming material, parts, and components to produce the finished consumer goods. As indicated by their report of the length of acquaintance with their partners, suppliers appear to have longer business relationships than do buyers. Hypothesis 1 tested the effects of buyer-supplier characteristics on trust. The salesperson's professionalism (t=2.070, p<0.05) and authority empowerment (t=2.328, p<0.05) positively affected buyers' trust toward suppliers. On the other hand, authority empowerment (t=2.192, p<0.05) positively affected supplier trust toward buyers. For both buyers and suppliers, the degree of authority empowerment plays a crucial role in the maintenance of their trust in each other. Hypothesis 2 tested the effects of buyerseller relational characteristics on trust. Buyers tend to trust suppliers, as suppliers make every effort to contact buyers (t=2.212, p<0.05). This tendency has also been shown to be much stronger for suppliers (t=2.591, p<0.01). On the other hand suppliers trust buyers because suppliers perceive buyers as being similar to themselves (t=2.702, p<0.01). This finding confirmed the results of Crosby, Evans, and Cowles (1990), which reported that suppliers and buyers build relationships through regular meetings, either for business or personal matters. Hypothesis 3 tested the effects of trust on perceived risk. It has been found that for both suppliers and buyers the lower is the trust, the higher is the perceived risk (t=-6.621, p<0.01 for buyers; t=-2.437, p<0.05). Interestingly, this tendency has been shown to be much stronger for buyers than for suppliers. One possible explanation for this higher level of perceived risk is that buyers normally perceive higher risks than do suppliers in transactions involving business services. For this reason, it is necessary for suppliers to implement risk reduction strategies for buyers. Hypothesis 4 tested the effects of trust on information searching. It has been found that for both suppliers and buyers, contrary to expectation, trust depends on their partner's reputation (t=2.929, p<0.01 for buyers; t=2.711, p<0.05 for suppliers). This finding shows that suppliers with good reputations tend to be trusted. Prior experience did not show any significant relationship with trust for either buyers or suppliers. Hypothesis 5 tested the effects of trust on supplier/buyer selection. Unlike buyers, suppliers tend to trust buyers when they think that previous transactions with buyers were important (t=2.913 p<0.01). However, this study did not show any significant relationship between source loyalty and the trust of buyers in suppliers. Hypothesis 6 tested the effects of trust on relational performances. For buyers and suppliers, financial performance reportedly improved when they trusted their partners (t=2.301, p<0.05 for buyers; t=3.692, p<0.01 for suppliers). It is interesting that this tendency was much stronger for suppliers than it was for buyers. Similarly, competitiveness was reported to improve when buyers and suppliers trusted their partners (t=3.563, p<0.01 for buyers; t=3.042, p<0.01 for suppliers). For suppliers, efficiency and productivity were reportedly improved when they trusted buyers (t=2.673, p<0.01). Other performance indices showed insignificant relationships with trust. The findings of this study have some strategic implications. First and most importantly, trust-based transactions are beneficial for both suppliers and buyers. As verified in the study, financial performance can be improved through efforts to build and maintain mutual trust. Similarly, competitiveness can be increased through the same kinds of effort. Second, trust-based transactions can facilitate the reduction of perceived risks inherent in the purchasing situation. This finding has implications for both suppliers and buyers. It is generally believed that buyers perceive higher risks in a highly involved purchasing situation. To reduce risks, previous studies have recommended that suppliers devise risk-reducing tactics. Moving beyond these recommendations, the present study uniquely focused on the bilateral perspective of perceived risk. In other words, suppliers are also susceptible to perceived risks, especially when they supply services that require very technical and sophisticated manipulations and maintenance. Consequently, buyers and suppliers must solve problems together in close collaboration. Hence, mutual trust plays a crucial role in the problem-solving process. Third, as found in this study, the more authority a salesperson has, the more he or she can be trusted. This finding is very important with regard to tactics. Building trust is a long-term assignment; however, when mutual trust has not been developed, suppliers can overcome the problems they encounter by empowering a salesperson with the authority to make certain decisions. This finding applies to suppliers as well.

  • PDF