• Title/Summary/Keyword: usage scenario

Search Result 116, Processing Time 0.021 seconds

An Ensemble Approach for Cyber Bullying Text messages and Images

  • Zarapala Sunitha Bai;Sreelatha Malempati
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.59-66
    • /
    • 2023
  • Text mining (TM) is most widely used to find patterns from various text documents. Cyber-bullying is the term that is used to abuse a person online or offline platform. Nowadays cyber-bullying becomes more dangerous to people who are using social networking sites (SNS). Cyber-bullying is of many types such as text messaging, morphed images, morphed videos, etc. It is a very difficult task to prevent this type of abuse of the person in online SNS. Finding accurate text mining patterns gives better results in detecting cyber-bullying on any platform. Cyber-bullying is developed with the online SNS to send defamatory statements or orally bully other persons or by using the online platform to abuse in front of SNS users. Deep Learning (DL) is one of the significant domains which are used to extract and learn the quality features dynamically from the low-level text inclusions. In this scenario, Convolutional neural networks (CNN) are used for training the text data, images, and videos. CNN is a very powerful approach to training on these types of data and achieved better text classification. In this paper, an Ensemble model is introduced with the integration of Term Frequency (TF)-Inverse document frequency (IDF) and Deep Neural Network (DNN) with advanced feature-extracting techniques to classify the bullying text, images, and videos. The proposed approach also focused on reducing the training time and memory usage which helps the classification improvement.

Evaluating the Airtightness of Medium- and Low-Intermediate-Level Radioactive Waste Packaging Container through Finite Element Analysis (유한요소 해석을 통한 중·저준위 방사성폐기물 포장용기의 밀폐성 평가)

  • Jeong In Lee;Sang Wook Park;Dong-Yul Kim;Chang Young Choi;Yong Jae Cho;Dae Cheol Ko;Jin Seok Jang
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.29 no.3
    • /
    • pp.203-209
    • /
    • 2023
  • The increasing saturation challenges in storage facilities for Low- and Intermediate-Level Radioactive Waste call for a more efficient storage approach. Consequently, we have developed a square-structured container that features a storage capacity approximately 20% greater than that of conventional drum-type containers. Considering the need to contain various radioactive wastes from nuclear power usage securely until they no longer pose a threat to human health or the environment, this study focuses on evaluating the sealing efficacy of the newly designed rectangular container using finite element analysis. Since radioactive waste containers typically do not experience external forces except under special circumstances, our analysis simulated the impact of an external force, assuming a fall scenario. After fastening the bolts, we examined the vertical stress distribution on the container by applying the calculated external force. The analysis confirms the container's stable seal.

Design and Implement A Hybrid WebRTC Signalling Mechanism for Unidirectional & Bi-directional Video Conferencing

  • Naktal Edan;Ali Al-Sherbaz;Scott Turner
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.186-194
    • /
    • 2024
  • WebRTC (Web Real-Time Communication) is a technology that enables browser-to-browser communication. Therefore, a signalling mechanism must be negotiated to create a connection between peers. The main aim of this paper is to create and implement a WebRTC hybrid signalling mechanism named (WebNSM) for video conferencing based on the Socket.io (API) mechanism. WebNSM was designed over different topologies such as simplex, star and mesh. Therefore it offers several communications at the same time such as one-to-one (unidirectional/bidirectional), one-to-many (unidirectional) and many-to-many (bi-directional) without any downloading or installation. In this paper, WebRTC video conferencing was accomplished via LAN and WAN networks, including the evaluation of resources in WebRTC like bandwidth consumption, CPU performance, memory usage, Quality of Experience (QoE) and maximum links and RTPs calculation. This paper presents a novel signalling mechanism among different users, devices and networks to offer video conferencing using various topologies at the same time, as well as other typical features such as using the same server, determining room initiator, keeping the communication active even if the initiator or another peer leaves, etc. This scenario highlights the limitations of CPU performance, bandwidth consumption and the use of different topologies for WebRTC video conferencing.

Monitoring of Pesticide Residues Concerned in Stream Water (전국 하천수 중 잔류우려 농약 실태조사)

  • Hwang, In-Seong;Oh, Yee-Jin;Kwon, Hye-Young;Ro, Jin-Ho;Kim, Dan-Bi;Moon, Byeong-Chul;Oh, Min-Seok;Noh, Hyun-Ho;Park, Sang-Won;Choi, Geun-Hyoung;Ryu, Song-Hee;Kim, Byung-Seok;Oh, Kyeong-Seok;Lim, Chi-Hwan;Lee, Hyo-Sub
    • Korean Journal of Environmental Agriculture
    • /
    • v.38 no.3
    • /
    • pp.173-184
    • /
    • 2019
  • BACKGROUND: This study was carried out to investigate pesticide residues from fifty streams in Korea. Water samples were collected at two times. Thee first sampling was performed from april to may, which was the season for start of pesticide application and the second sampling event was from august to september, which was a period for spraying pesticides multiple times. METHODS AND RESULTS: The 136 pesticide residues were analyzed by LC-MS/MS and GC/ECD. As a result, eleven of the pesticide residues were detected at the first sampling. Twenty eight of the pesticide residues were detected at the second sampling. Seven pesticides were frequently detected from more than 10 water samples. Ecological risk assessment (ERA) was carried out by using residual and toxicological data. Four scenarios were applied for the ERA. Scenario 1 and 2 were performed using LC50 values and mean and maximum concentrations. Scenarios 3 and 4 were conducted by NOEC values and mean and maximum concentrations. CONCLUSION: Frequently detected pesticide residues tended to coincide with the period of preventing pathogen and pest at paddy rice. As a result of ERA, five pesticides (butachlor, carbendazim, carbofuran, chlorantranilprole, and oxadiazon) were assessed to be risks at scenario 4. However, only oxadiazon was assessed to be a risk at scenario 3 for the first sampling. Oxadiazon was not assessed to be a risk at the second sampling. It seems to be temporary phenomenon at the first sampling, because usage of herbicides such as oxadiazon increased from April to march for preventing weeds at paddy fields. However, this study suggested that five pesticides which were assessed to be risks need to be monitored continuously for the residues.

Differential Effects of Recovery Efforts on Products Attitudes (제품태도에 대한 회복노력의 차별적 효과)

  • Kim, Cheon-GIl;Choi, Jung-Mi
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.1
    • /
    • pp.33-58
    • /
    • 2008
  • Previous research has presupposed that the evaluation of consumer who received any recovery after experiencing product failure should be better than the evaluation of consumer who did not receive any recovery. The major purposes of this article are to examine impacts of product defect failures rather than service failures, and to explore effects of recovery on postrecovery product attitudes. First, this article deals with the occurrence of severe and unsevere failure and corresponding service recovery toward tangible products rather than intangible services. Contrary to intangible services, purchase and usage are separable for tangible products. This difference makes it clear that executing an recovery strategy toward tangible products is not plausible right after consumers find out product failures. The consumers may think about backgrounds and causes for the unpleasant events during the time gap between product failure and recovery. The deliberation may dilutes positive effects of recovery efforts. The recovery strategies which are provided to consumers experiencing product failures can be classified into three types. A recovery strategy can be implemented to provide consumers with a new product replacing the old defective product, a complimentary product for free, a discount at the time of the failure incident, or a coupon that can be used on the next visit. This strategy is defined as "a rewarding effort." Meanwhile a product failure may arise in exchange for its benefit. Then the product provider can suggest a detail explanation that the defect is hard to escape since it relates highly to the specific advantage to the product. The strategy may be called as "a strengthening effort." Another possible strategy is to recover negative attitude toward own brand by giving prominence to the disadvantages of a competing brand rather than the advantages of its own brand. The strategy is reflected as "a weakening effort." This paper emphasizes that, in order to confirm its effectiveness, a recovery strategy should be compared to being nothing done in response to the product failure. So the three types of recovery efforts is discussed in comparison to the situation involving no recovery effort. The strengthening strategy is to claim high relatedness of the product failure with another advantage, and expects the two-sidedness to ease consumers' complaints. The weakening strategy is to emphasize non-aversiveness of product failure, even if consumers choose another competitive brand. The two strategies can be effective in restoring to the original state, by providing plausible motives to accept the condition of product failure or by informing consumers of non-responsibility in the failure case. However the two may be less effective strategies than the rewarding strategy, since it tries to take care of the rehabilitation needs of consumers. Especially, the relative effect between the strengthening effort and the weakening effort may differ in terms of the severity of the product failure. A consumer who realizes a highly severe failure is likely to attach importance to the property which caused the failure. This implies that the strengthening effort would be less effective under the condition of high product severity. Meanwhile, the failing property is not diagnostic information in the condition of low failure severity. Consumers would not pay attention to non-diagnostic information, and with which they are not likely to change their attitudes. This implies that the strengthening effort would be more effective under the condition of low product severity. A 2 (product failure severity: high or low) X 4 (recovery strategies: rewarding, strengthening, weakening, or doing nothing) between-subjects design was employed. The particular levels of product failure severity and the types of recovery strategies were determined after a series of expert interviews. The dependent variable was product attitude after the recovery effort was provided. Subjects were 284 consumers who had an experience of cosmetics. Subjects were first given a product failure scenario and were asked to rate the comprehensibility of the failure scenario, the probability of raising complaints against the failure, and the subjective severity of the failure. After a recovery scenario was presented, its comprehensibility and overall evaluation were measured. The subjects assigned to the condition of no recovery effort were exposed to a short news article on the cosmetic industry. Next, subjects answered filler questions: 42 items of the need for cognitive closure and 16 items of need-to-evaluate. In the succeeding page a subject's product attitude was measured on an five-item, six-point scale, and a subject's repurchase intention on an three-item, six-point scale. After demographic variables of age and sex were asked, ten items of the subject's objective knowledge was checked. The results showed that the subjects formed more favorable evaluations after receiving rewarding efforts than after receiving either strengthening or weakening efforts. This is consistent with Hoffman, Kelley, and Rotalsky (1995) in that a tangible service recovery could be more effective that intangible efforts. Strengthening and weakening efforts also were effective compared to no recovery effort. So we found that generally any recovery increased products attitudes. The results hint us that a recovery strategy such as strengthening or weakening efforts, although it does not contain a specific reward, may have an effect on consumers experiencing severe unsatisfaction and strong complaint. Meanwhile, strengthening and weakening efforts were not expected to increase product attitudes under the condition of low severity of product failure. We can conclude that only a physical recovery effort may be recognized favorably as a firm's willingness to recover its fault by consumers experiencing low involvements. Results of the present experiment are explained in terms of the attribution theory. This article has a limitation that it utilized fictitious scenarios. Future research deserves to test a realistic effect of recovery for actual consumers. Recovery involves a direct, firsthand experience of ex-users. Recovery does not apply to non-users. The experience of receiving recovery efforts can be relatively more salient and accessible for the ex-users than for non-users. A recovery effort might be more likely to improve product attitude for the ex-users than for non-users. Also the present experiment did not include consumers who did not have an experience of the products and who did not perceive the occurrence of product failure. For the non-users and the ignorant consumers, the recovery efforts might lead to decreased product attitude and purchase intention. This is because the recovery trials may give an opportunity for them to notice the product failure.

  • PDF

Use of Tenax® as a Simulant in the Migration Testing of Paper and Board, and Packaging Materials for Dry Foods and Foods Heated at Ultra-high Temperature (건조식품, 초고온가열식품 및 종이제 포장재의 이행 실험용 시뮬란트로서 Tenax®의 이용)

  • Kim, Hyeong Jun;Lee, Keun Taik
    • Journal of Food Hygiene and Safety
    • /
    • v.33 no.4
    • /
    • pp.229-239
    • /
    • 2018
  • Currently, in Korea, a dry food simulant has not been designated for the migration testing of paper and board, food contact materials (FCMs) being used in dry foods, and foods heated at ultra-high temperature. Considering the diverse usage of FCMs, in order to secure reliable and confident safety evaluation and to overcome the non-trade barrier tariff in worldwide trade, migration testing methods of what should be more clearly defined for securing and overcoming. This article delves into the available literature on the use of $Tenax^{(R)}$ as a simulant for dry foods as well as its suitability and limitations, and examines the feasibility of its introduction into Korean FCMs regulation. Most experimental studies using $Tenax^{(R)}$ showed overestimated migration values when used in real foods, which reflects the potential of $Tenax^{(R)}$ as a dry food simulant in a worst-case scenario. However, more studies are required to optimize migration testing using $Tenax^{(R)}$ by standardizing the solvent type and the extraction method for surrogates of various FCMs and foods, and to resolve the potential drawbacks in the use of $Tenax^{(R)}$.

Context Adaptive User Interface Generation in Ubiquitous Home Using Bayesian Network and Behavior Selection Network (베이지안 네트워크와 행동 선택 네트워크를 이용한 유비쿼터스 홈에서의 상황 적응적 인터페이스 생성)

  • Park, Han-Saem;Song, In-Jee;Cho, Sung-Bea
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.573-578
    • /
    • 2008
  • Recently, we should control various devices such as TV, audio, DVD player, video player, and set-top box simultaneously to manipulate home theater system. To execute the function the user want in this situation, user should know functions and positions of the buttons in several remote controllers. Normally, people feel difficult due to these realistic problems. Besides, the number of the devices that we can control shall increase, and people will confuse more if the ubiquitous home environment is realized. Therefore, user adaptive interface that provides the summarized functions is required. Moreover there can be a lot of mobile and stationary controller devices in ubiquitous computing environment, so user interface should be adaptive in selecting the functions that user wants and in adjusting the features of UI to fit in specific controller. To implement the user and controller adaptive interface, we modeled the ubiquitous home environment and used modeled context and device information. We have used Bayesian network to get the degree of necessity in each situation. Behavior selection network uses predicted user situation and the degree of necessity, and it selects necessary functions in current situation. Selected functions are used to construct adaptive interface for each controller using presentation template. For experiments, we have implemented ubiquitous home environment and generated controller usage log in this environment. We have confirmed the BN predicted user requirements effectively as evaluating the inferred results of controller necessity based on generated scenario. Finally, comparing the adaptive home UI with the fixed one to 14 subjects, we confirmed that the generated adaptive UI was more useful for general tasks than fixed UI.

  • PDF

User Centered Design and Development Strategies for Participatory Learning Media (사용자중심의 참여 미디어 교육시스템 프로토타입 개발 전략)

  • Ahn, Mi-Lee;Cho, Y.C.;Hwang, Y.J.;Cha, H.J.;Kim, H.J.
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.926-932
    • /
    • 2009
  • Recently many research reports on effective use of mobile devices for museums to provide information on displayed artifacts providing individualized learning space, collaborative learning, and discovery learning, Such devices have many possibilities to support learning as a participatory media and social network. Mobile devices are used, however, limited for its usability and lack in providing expected learning experiences. It offers one-way interaction and they are often limited in providing customized services for different patrons to experience learning and entertainment. In this research, we have adopted user centered design approach to identify the needs and possible usage of PDA system in the museum. Research methods include contextual observation and inquiry with symbolic interactionism for qualitative research and its epistemology. We have developed conceptual model with scenario and storyboard method, and developed vertical prototype with Flash.

  • PDF

MPEG-21 Terminal (MPEG-21 터미널)

  • 손유미;박성준;김문철;김종남;박근수
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.410-426
    • /
    • 2003
  • MPEG-21 defines a digital item as an atomic unit lot creation, delivery and consumption in order to provide an integrated multimedia framework in networked environments. It is expected that MPEG-21 standardization makes it Possible for users to universally access user's preferred contents in their own way they want. In order to achieve this goal, MPEG-21 has standardized the specifications for the Digital Item Declaration (DID). Digital Identification (DII), Rights Expression Language (REL), Right Data Dictionary (RDD) and Digital Item Adaptation (DIA), and is standardizing the specifications for the Digital Item Processing (DIP), Persistent Association Technology (PAT) and Intellectual Property Management and Protection (IPMP) tot transparent and secured usage of multimedia. In this paper, we design an MPEG-21 terminal architecture based one the MPEG-21 standard with DID, DIA and DIP, and implement with the MPEG-21 terminal. We make a video summarization service scenario in order to validate ow proposed MPEG-21 terminal for the feasibility to of DID, DIA and DIP. Then we present a series of experimental results that digital items are processed as a specific form after adaptation fit for the characteristics of MPEG-21 terminal and are consumed with interoperability based on a PC and a PDA platform. It is believed that this paper has n important significance in the sense that we, for the first time, implement an MPEG-21 terminal which allows for a video summarization service application in an interoperable way for digital item adaptation and processing nth experimental results.

Analyzing The Economic Impact of The Fire Risk Reduction at Regional Level in Goyang City (지역단위 화재 위험도 저감의 고양시 경제적 파급효과 분석)

  • Son, Minsu;Cho, Dongin;Park, Chang Keun;Ko, Hyun A;Jung, Seunghyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.685-693
    • /
    • 2021
  • This study examined the fire risk of the region in Goyang City using the spatial information data of buildings. The economic damage by industry was assessed according to the probability of fire risk. The study area was confined to Goyang-si, Gyeonggi-do, and the same fire risk reduction rate was applied to each region for the convenience of analysis. The possibility of fire was derived based on the buildings' density and usage in the area by National GIS building-integrated information standard data. The calculation of economic damage by industry in Goyang City due to the fire risk was calculated by combining the Goyang-si industry-related model produced by matching with 30 industrial categories in Input-Output Statistics of Korea Bank and 20 industrial categories in the Goyang-si business survey and the possibility of fire. The basic scenario of production impossibility during six months and business loss due to fire was established and analyzed based on the supply model. The analysis showed that Ilsan-dong-gu, Ilsan-seo-gu, and Deokyang-gu suffered the most economic damage. The "electricity, gas, steam, and water business" showed the greatest loss by industry.