• Title/Summary/Keyword: discrete group

Search Result 244, Processing Time 0.024 seconds

EEG and ERP based Degree of Internet Game Addiction Analysis (EEG 및 ERP를 이용한 인터넷 게임 과몰입 분석)

  • Lee, Jae-Yoon;Kang, Hang-Bong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.11
    • /
    • pp.1325-1334
    • /
    • 2014
  • Recently game addiction of young people has become a social issue. Therefore, many studies, mostly surveys, have been conducted to diagnose game addiction. In this paper, we suggest how to distinguish levels of addiction based on EEG. To this end, we first classify four groups by the degrees of addiction to internet games (High-risk group, Vigilance group, Normal group, Good-user group) using CSG (Comprehensive Scale for Assessing Game Behavior) and then measure their Event Related Potential(ERP) in the Go/NoGo Task. Specifically, we measure the signals of P300, N400 and N200 from the channels of the NoGo stimulus and Go stimulus. In addition, we extract distinct features from the discrete wavelet transform of the EEG signal and use these features to distinguish the degrees of addiction to internet games. The experiments in this study show that High-risk and Vigilance group exhibit lower Go-N200 amplitude of Fz channel than Normal and Good-user groups. In Go-P300 and NoGo-P300 of Fz channel, High-risk and Vigilance groups exhibit higher amplitude than Normal and Good-user group. In Go-N400 and NoGo-N400 of Pz channel, High-risk and Vigilance group exhibit lower amplitude than Normal and Good-user group. The test after the learning study of the extracted characteristics of each frequency band from the EEG signal showed 85% classification accuracy.

Calculation of Electronic State of MnO2 Oxide Electode Having Ni Additive (Ni이 첨가된 $MnO_2$ 산화물전극의 전자상태 계산)

  • Lee, Dong-Yoon;Kim, Bong-Seo;Song, Jae-Sung
    • Proceedings of the KIEE Conference
    • /
    • 2002.07c
    • /
    • pp.1515-1517
    • /
    • 2002
  • $MnO_2$ is used for the oxide electrode of electrochemical equipments because of its good electric conductivity and low oxygen overpotential. The effect of additives on the properties of $MnO_2$ has been investigated to enhance the electric conductivity and the stability in an acid solution. In this research, the effect of Ni addition on ${\beta}-MnO_2$ was studied by the theoretical quantum chemical method. The calculation was carried out by the discrete variation $X{\alpha}$ method, which is a sort of the first principle method and use Hatre-Fock-Slater approximation. The electron energy level, the density of state, the bond overlap population, the charge density distribution and the net ionic transfer between cations and anions were calculated and discussed. The used cluster model was $(Mn_{10}NiO_{44})^{-44}$.

  • PDF

Biodiversity of Bacterial lipase genes

  • Kim, Hyung-Kwoun
    • Proceedings of the Korean Society for Applied Microbiology Conference
    • /
    • 2001.06a
    • /
    • pp.163-164
    • /
    • 2001
  • A number of bacterial species produce extracellular lipases. Among them, many lipase genes have been cloned and sequenced. A comparison of primary sequences revealed only very limited sequence homology among them. Based on the sequence homologies and molecular sizes (Mr), bacterial lipases were classified into four discrete groups. From soil samples taken around Taejon, five different lipase-producing bacteria were isolated; Proteus vulgaris K80, Bacillus stearothermophilus Ll, B. pumilus B26, Staphylococcus haemolyticus L62, S. aureus B56. Nucleotide sequence analysis showed that Staphylococcus lipase genes (L62 and B56) composed of pre-pro-mature parts, Bacillus lipase genes (Ll and B26) pre-mature parts, and Proteus lipase gene (K80) mature part only. In addition, the molecular sizes of their mature parts were quite different from 19,000 to 45,000. Finally, they had very little homology (less than 20%) in their amino acid sequences. Judging from the above results, lipase K80 belonged to bacterial lipase Group I, lipase L1 and lipase B26 Group III, and lipase L62 and lipase B56 Group IV. This diversity in their primary structures was also reflected in their enzymatic properties; temperature effects, pH effects, substrate specificity, detergent effects, and so on.

  • PDF

Role of Attentional Focus in Balance Training: Effects on Ankle Kinematics in Patients with Chronic Ankle Instability during Walking - A Double-Blinded Randomized Control Trial

  • Hyun Sik Chang;Hyung Gyu Jeon;Tae Kyu Kang;Kyeongtak Song;Sae Yong Lee
    • Korean Journal of Applied Biomechanics
    • /
    • v.33 no.2
    • /
    • pp.62-72
    • /
    • 2023
  • Objective: Although balance training has been used as an effective ankle injury rehabilitation program to restore neuromuscular deficits in patients with chronic ankle instability, it is not effectively used in terms of motor learning. Attentional focusing can be an effective method for improving ankle kinematics to prevent recurrent ankle injuries. This study aimed to 1) evaluate the effects of attentional focus, including internal and external focus, and 2) determine a more effective focusing method for patients with chronic ankle instability to learn balance tasks. Method: Twenty-four patients with chronic ankle instability were randomly assigned to three groups (external focus, internal focus, and no feedback) and underwent four weeks of progressive balance training. The three-dimensional ankle kinematics of each patient were measured before and after training as the main outcomes. Ensemble curve analysis, discrete point analysis, and post hoc pairwise comparisons were performed to identify interactions between groups and time. Results: The results showed that (1) the external focus group was more dorsiflexed and everted than the internal focus group; (2) the external focus group was more dorsiflexed than the no feedback group; and (3) the no feedback group was more dorsiflexed than the internal focus group. Conclusion: Because dorsiflexion and eversion are ankle motions that oppose the mechanism of lateral ankle sprain, using the external focus method during balance training may be more effective in modifying these motions, thereby reducing the risk of ankle sprain.

Solving design optimization problems via hunting search algorithm with Levy flights

  • Dogan, Erkan
    • Structural Engineering and Mechanics
    • /
    • v.52 no.2
    • /
    • pp.351-368
    • /
    • 2014
  • This study presents a hunting search based optimum design algorithm for engineering optimization problems. Hunting search algorithm is an optimum design method inspired by group hunting of animals such as wolves, lions, and dolphins. Each of these hunters employs hunting in a different way. However, they are common in that all of them search for a prey in a group. Hunters encircle the prey and the ring of siege is tightened gradually until it is caught. Hunting search algorithm is employed for the automation of optimum design process, during which the design variables are selected for the minimum objective function value controlled by the design restrictions. Three different examples, namely welded beam, cellular beam and moment resisting steel frame are selected as numerical design problems and solved for the optimum solution. Each example differs in the following ways: Unlike welded beam design problem having continuous design variables, steel frame and cellular beam design problems include discrete design variables. Moreover, while the cellular beam is designed under the provisions of BS 5960, LRFD-AISC (Load and Resistant Factor Design-American Institute of Steel Construction) is considered for the formulation of moment resisting steel frame. Levy Flights is adapted to the simple hunting search algorithm for better search. For comparison, same design examples are also solved by using some other well-known search methods in the literature. Results reveal that hunting search shows good performance in finding optimum solutions for each design problem.

Secure Broadcasting Using Multiple Antennas

  • Ekrem, Ersen;Ulukus, Sennur
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.411-432
    • /
    • 2010
  • We consider three different secure broadcasting scenarios: i) Broadcast channels with common and confidential messages (BCC), ii) multi-receiver wiretap channels with public and confidential messages, and iii) compound wiretap channels. The BCC is a broadcast channel with two users, where in addition to the common message sent to both users, a private message, which needs to be kept hidden as much as possible from the other user, is sent to each user. In this model, each user treats the other user as an eavesdropper. The multi-receiver wiretap channel is a broadcast channel with two legitimate users and an external eavesdropper, where the transmitter sends a pair of public and confidential messages to each legitimate user. Although there is no secrecy concern about the public messages, the confidential messages need to be kept perfectly secret from the eavesdropper. The compound wiretap channel is a compound broadcast channel with a group of legitimate users and a group of eavesdroppers. In this model, the transmitter sends a common confidential message to the legitimate users, and this confidential message needs to be kept perfectly secret from all eavesdroppers. In this paper, we provide a survey of the existing information-theoretic results for these three forms of secure broadcasting problems, with a closer look at the Gaussian multiple-input multiple-output (MIMO) channel models. We also present the existing results for the more general discrete memoryless channel models, as they are often the first step in obtaining the capacity results for the corresponding Gaussian MIMO channel models.

k-Fragility Maximization Problem to Attack Robust Terrorist Networks

  • Thornton, Jabre L.;Kim, Donghyun;Kwon, Sung-Sik;Li, Deying;Tokuta, Alade O.
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.33-38
    • /
    • 2014
  • This paper investigates the shaping operation problem introduced by Callahan et al., namely the k-fragility maximization problem (k-FMP), whose goal is to find a subset of personals within a terrorist group such that the regeneration capability of the residual group without the personals is minimized. To improve the impact of the shaping operation, the degree centrality of the residual graph needs to be maximized. In this paper, we propose a new greedy algorithm for k-FMP. We discover some interesting discrete properties and use this to design a more thorough greedy algorithm for k-FMP. Our simulation result shows that the proposed algorithm outperforms Callahan et al.'s algorithm in terms of maximizing degree centrality. While our algorithm incurs higher running time (factor of k), given that the applications of the problem is expected to allow sufficient amount of time for thorough computation and k is expected to be much smaller than the size of input graph in reality, our algorithm has a better merit in practice.

Neutron Shielding Analysis for a Spent Fuel Container Using XSDRN, ONEDANT and MCNP Codes (XSDRN, ONEDANT및 MCNP에 의한 사용후 핵연료 용기의 중성자 차폐 해석)

  • Kim, Kyo-Youn;Lee, Tae-Young;Ha, Chung-Woo;Kim, Jong-Kyung
    • Journal of Radiation Protection and Research
    • /
    • v.14 no.1
    • /
    • pp.46-55
    • /
    • 1989
  • Neutron shielding for a spent fuel container was analized using the Monte Carlo code MCNP coupled with discrete ordinates codes, XSDRN and ONEDANT. The ORIGEN-S code was used to determine the fixed neutron source, and the spectral source information for MCNP were obtained from a 10 group XSDRN calculation and a 27 group ONEDANT calculation. When the depleted uranium shield was used, the results from ONEDANT and XSDRN calculations agreed with the MCNP results within 10% and 20%, respectively. Depleted uranium appears more effective than lead or steel as a neutron shield.

  • PDF

Advanced Image Coding based on spacial domain prediction (공간 영역 예측에 의한 정지 영상 부호화)

  • Cho, Sang-Gyu;Moon, Joon;Hwang, Jae-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.425-428
    • /
    • 2005
  • This paper is made up Advanced Image Coding(AIC) that combines algorithms from next generation image coding standard, H.264/MPEG-4 Part 10 advanced video coding(AVC) and still image compression standard, JPEG(Joint Photographic Experts Group). AIC combines intra frame block prediction from H.264 with a JPEG style discrete cosine transform and quantization, followed by Context-based Adaptive Binary Arithmetic Coding(CABAC) as used in H.264. In this paper, we analyzes the efficiency of the AIC algorithm and JPEG and JPEG-2000, and it presents of result.

  • PDF

Interactive analysis of a building fame resting on pile foundation

  • Chore, H.S.
    • Coupled systems mechanics
    • /
    • v.3 no.4
    • /
    • pp.367-384
    • /
    • 2014
  • The study deals with the physical modeling of a typical single storeyed building frame resting on pile foundation and embedded in cohesive soil mass using the finite element based software SAP-IV. Two groups of piles comprising two and three piles, with series and parallel arrangement thereof, are considered. The slab provided at top and bottom of the frame along with the pile cap is idealized as four noded and two dimensional thin shell elements. The beams and columns of the frame, and piles are modeled using two noded one dimensional beam-column element. The soil is modeled using closely spaced discrete linear springs. A parametric study is carried out to investigate the effect of various parameters of the pile foundation, such as spacing in a group and number of piles in a group, on the response of superstructure. The response considered includes the displacement at the top of the frame and bending moment in columns. The soil-structure interaction effect is found to increase the displacement in the range of 38 -133% and to increase the absolute maximum positive and negative moments in the column in the range of 2-12% and 2-11%. The effect of the soil- structure interaction is observed to be significant for the type of foundation and soil considered in this study. The results obtained are compared further with those of Chore et al. (2010), wherein different idealizations were used for modeling the superstructure frame and sub-structure elements (foundation). While fair agreement is observed in the results in either study, the trend of the results obtained in both studies is also same.