• Title/Summary/Keyword: information analysis framework

Search Result 1,805, Processing Time 0.036 seconds

Efficient Emotional Relaxation Framework with Anisotropic Features Based Dijkstra Algorithm

  • Kim, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.79-86
    • /
    • 2020
  • In this paper, we propose an efficient emotional relaxation framework using Dijkstra algorithm based on anisotropic features. Emotional relaxation is as important as emotional analysis. This is a framework that can automatically alleviate the person's depression or loneliness. This is very important for HCI (Human-Computer Interaction). In this paper, 1) Emotion value changing from facial expression is calculated using Microsoft's Emotion API, 2) Using these differences in emotion values, we recognize abnormal feelings such as depression or loneliness. 3) Finally, emotional mesh based matching process considering the emotional histogram and anisotropic characteristics is proposed, which suggests emotional relaxation to the user. In this paper, we propose a system which can recognize the change of emotion easily by using face image and train personal emotion by emotion relaxation.

TREATING UNCERTAINTIES IN A NUCLEAR SEISMIC PROBABILISTIC RISK ASSESSMENT BY MEANS OF THE DEMPSTER-SHAFER THEORY OF EVIDENCE

  • Lo, Chung-Kung;Pedroni, N.;Zio, E.
    • Nuclear Engineering and Technology
    • /
    • v.46 no.1
    • /
    • pp.11-26
    • /
    • 2014
  • The analyses carried out within the Seismic Probabilistic Risk Assessments (SPRAs) of Nuclear Power Plants (NPPs) are affected by significant aleatory and epistemic uncertainties. These uncertainties have to be represented and quantified coherently with the data, information and knowledge available, to provide reasonable assurance that related decisions can be taken robustly and with confidence. The amount of data, information and knowledge available for seismic risk assessment is typically limited, so that the analysis must strongly rely on expert judgments. In this paper, a Dempster-Shafer Theory (DST) framework for handling uncertainties in NPP SPRAs is proposed and applied to an example case study. The main contributions of this paper are two: (i) applying the complete DST framework to SPRA models, showing how to build the Dempster-Shafer structures of the uncertainty parameters based on industry generic data, and (ii) embedding Bayesian updating based on plant specific data into the framework. The results of the application to a case study show that the approach is feasible and effective in (i) describing and jointly propagating aleatory and epistemic uncertainties in SPRA models and (ii) providing 'conservative' bounds on the safety quantities of interest (i.e. Core Damage Frequency, CDF) that reflect the (limited) state of knowledge of the experts about the system of interest.

Classifying Musical Form by Melodic Similarity Analysis (선율간 유사도 분석에 의한 악곡 양식 판별)

  • Seo, Jung-Bum;Bae, Jae-Hak
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.683-686
    • /
    • 2005
  • 주어진 악곡의 성격을 파악하거나 악곡속의 주요정보를 추출하기 위해서는 해당 악곡의 양식파악이 선행되어야 한다. 이에 본 논문에서는 선율간 유사도 분석을 통하여 악곡의 양식을 판별하는 방안을 모색하였다. 선율간의 유사도를 분석하기 위한 방법으로 Hofmann-Engl 의 Conceptual Framework을 사용하였다.

  • PDF

A Conjoint Analysis of Online Information Privacy Concerns: A case in Korea (온라인 프라이버시 침해 우려에 관한 컨조인트 분석 : 한국에서의 사례)

  • Choi, Mi-Young;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.45-65
    • /
    • 2008
  • The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.

Virtual Assembly Analysis Tool and Architecture for e-Design and Realization Environment

  • Kim, K.Y.;Nnaji, Bart-O.;Kim, D.W.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.9 no.1
    • /
    • pp.62-76
    • /
    • 2004
  • Many customers are no longer satisfied with mass-produced goods. They are demanding customization and rapid delivery of innovative products. Many companies are now realizing that the best way to reduce life cycle costs is to evolve a more effective product development paradigm using Internet and web based technologies. Yet there remains a gap between current market demands and product development paradigms. The existing CAD systems require that product developers possess all the design analysis tools in-house making it impractical to employ all the needed and newest tools. Hence, this paper addresses how assembly operation analysis can be embedded transparently and remotely into a service-oriented collaborative assembly design environment. A new assembly operation analysis framework is introduced and a relevant architecture and tools are developed to realize the framework. Instead of the current sequential process for verifying and validating an assembly design, a new Virtual Assembly Analysis (VAA) method is introduced in the paper to predict the various effects of joining during actual collaborative design. As a case study, arc welding and riveting processes are investigated. New service-oriented VAA architecture and its VAA components are proposed and implemented on prototype mechanical assemblies.

Development of a Failure Mode and Effects Analysis Based Risk Assessment Tool for Information Security

  • Lai, Lotto Kim Hung;Chin, Kwai Sang
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.1
    • /
    • pp.87-100
    • /
    • 2014
  • Risk management is recognized as a significant element in Information Security Management while the failure mode and effects analysis (FMEA) is widely used in risk analysis in manufacturing industry. This paper aims to present the development work of the Information Security FMEA Circle (InfoSec FMEA Circle) which is used to support the risk management framework by modifying traditional FMEA methodologies. In order to demonstrate the "appropriateness" of the InfoSec FMEA Circle for the purposes of assessing information security, a case study at Hong Kong Science and Technology Parks Corporation (HKSTP) is employed. The "InfoSec FMEA Circle" is found to be an effective risk assessment methodology that has a significant contribution to providing a stepwise risk management implementation model for information security management.

Customer Service Evaluation based on Online Text Analytics: Sentiment Analysis and Structural Topic Modeling

  • Park, KyungBae;Ha, Sung Ho
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.327-353
    • /
    • 2017
  • Purpose Social media such as social network services, online forums, and customer reviews have produced a plethora amount of information online. Yet, the information deluge has created both opportunities and challenges at the same time. This research particularly focuses on the challenges in order to discover and track the service defects over time derived by mining publicly available online customer reviews. Design/methodology/approach Synthesizing the streams of research from text analytics, we apply two stages of methods of sentiment analysis and structural topic model incorporating meta-information buried in review texts into the topics. Findings As a result, our study reveals that the research framework effectively leverages textual information to detect, prioritize, and categorize service defects by considering the moving trend over time. Our approach also highlights several implications theoretically and practically of how methods in computational linguistics can offer enriched insights by leveraging the online medium.

Face recognition invariant to partial occlusions

  • Aisha, Azeem;Muhammad, Sharif;Hussain, Shah Jamal;Mudassar, Raza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2496-2511
    • /
    • 2014
  • Face recognition is considered a complex biometrics in the field of image processing mainly due to the constraints imposed by variation in the appearance of facial images. These variations in appearance are affected by differences in expressions and/or occlusions (sunglasses, scarf etc.). This paper discusses incremental Kernel Fisher Discriminate Analysis on sub-classes for dealing with partial occlusions and variant expressions. This framework focuses on the division of classes into fixed size sub-classes for effective feature extraction. For this purpose, it modifies the traditional Linear Discriminant Analysis into incremental approach in the kernel space. Experiments are performed on AR, ORL, Yale B and MIT-CBCL face databases. The results show a significant improvement in face recognition.

Simulation Modeling Methodology and Simulation Framework for a Construction of a Digital Shipyard (디지털 조선소 구축 및 활용을 위한 모델링 및 시뮬레이션 프레임워크 구축 방법론)

  • Woo, Jong-Hun;Oh, Dae-Kyun;Kwon, Young-Dae;Shin, Jong-Eye;Sur, Joo-No
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.42 no.4 s.142
    • /
    • pp.411-420
    • /
    • 2005
  • World leading company and research centers have invested much cost and effort into a PLM and digital manufacturing field to obtain their own competitiveness. We have been trying to apply a digital manufacturing, especially simulation to ship production process as a part of PLM implementation for a shipyard. A shipbuilding production system and processes have a complexity and a peculiarity different from other kinds of production systems. So, new analysis and modeling methodology is required to implement digital shipyard. which is a digital manufacturing system for a shipbuilding company. This paper suggests an analysis and simulation modeling methodologies for an implementation of a digital shipyard. New methodologies such as a database-merged simulation, a distributed simulation, a modular simulation with a model library and a 3-tire simulation framework are developed.

Design Framework for Next Generation Mobile Convergence Service Models (차세대 이동통신 컨버전스 서비스 모델 개발 프레임워크)

  • Shin, Dong-Chun;Kim, Jin-Bae;Park, Sei-Kwon;Ryu, Seung-Wan
    • Journal of Information Technology Services
    • /
    • v.9 no.4
    • /
    • pp.243-259
    • /
    • 2010
  • It is expected that the next generation mobile communication system will be a service-driven developed system capable to realize the human-centric mobile convergence services. and it is different from the technology-driven development approach of the second and the third generation mobile communication systems. As a preliminary research work on such service-driven system development approach for the next generation mobile communication system. we developed the scenario based service analysis process (2SAP) framework to derive core service technologies and functionalities. In this paper. we propose the next generation mobile convergence service business model creation methodology based on research results of the 2SAP framework. To achieve this goal, we first establish a service model contains several components such as infrastructures. operations. and provision of services that are indispensible for providing next generation mobile services. Then, the next generation mobile services and its corresponding business models can be created by adding service and value flows to the developed service model after defining necessary components of business model including actors, their relationships, and roles.