• Title/Summary/Keyword: Behavior detection

Search Result 935, Processing Time 0.026 seconds

Synthesis and Oxidation Behavior of Pd-Ir@CeO2 Core-shell Nanoparticles for Hydrogen Gas Sensor

  • Gi-Seung Shin;Dong-Seog Kim;Tuong Van Tran;Geun-Jae Oh;Seok-Yong Hong;Ho-Geun Song;Yeon-Tae Yu
    • Journal of Sensor Science and Technology
    • /
    • v.33 no.5
    • /
    • pp.288-297
    • /
    • 2024
  • Currently, numerous studies are being conducted on metal oxide semiconductor (MOS) gas sensors for hydrogen detection, using Palladium (Pd) and Pd-based alloy nanoparticles (NPs) owing to their hydrogen absorption ability. Furthermore, several studies have reported that Pd-Iridium (Ir) alloys possess high hydrogen absorption capabilities in their bulk state. However, Ir growth is limited to above 2 nm and it does not mix extensively with other metals. Furthermore, as the hydrogen absorption capacity decreases with the reduction in particle size, it is necessary to synthesize nanoparticles of an appropriate size. Therefore, the synthesis of Pd-Ir alloy NPs larger than 10 nm is challenging. In this study, we report the synthesis of Pd-Ir NPs with an average diameter of 19 nm using a hydrothermal technique for the first time and fabricated Pd-Ir alloy NPs through calcination at 500℃ in Ar and air. To confirm alloy formation and oxidation behavior, X-ray diffraction (XRD) and X-ray photoelectron spectroscopy (XPS) were performed. In addition, we synthesized Pd-Ir@CeO2 core-shell nanoparticles (CSNPs) as hydrogen gas-sensing materials. The Pd-Ir core was partially oxidized during heat treatment at 500℃ in air, and Pd-Ir@CeO2 CSNPs were finally changed into Pd-Ir(alloy)/PdO-IrO2@CeO2 CSNPs, which exhibited higher sensitivity and selectivity toward H2 gas compared to totally oxidized PdO-IrO2@CeO2 CSNPs and pure CeO2 NPs. The enhanced gas-sensing performance was attributed to the hydrogen absorption effect of the Pd-Ir(alloy) NPs.

Mammography Screening Uptake among Female Health Care Workers in Primary Health Care Centers in Palestine - Motivators and Barriers

  • Nazzal, Zaher;Sholi, Hisham;Sholi, Suha;Sholi, Mohammad;Lahaseh, Rawya
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.5
    • /
    • pp.2549-2554
    • /
    • 2016
  • Background: Early detection remains the cornerstone of breast cancer control in terms of outcome and survival. Thus far the only breast cancer screening method proven effective is mammography. The awareness of female health care workers (HCW) about breast cancer prevention is of vital importance, as their beliefs and behavior may have a major impact on other women. This study was designed to assess mammography screening uptake among female healthcare workers at primary healthcare centers, and to identify the primary motivators and barriers that affect uptake results. Materials and Methods: A cross sectional study design was used to assess mammography screening by 299 female healthcare workers who completed a self-administered questionnaire that assessed demographics, screening uptake, motivators and barriers. Results: The mean age was 46 years (within age of risk). The majority (95.1%) demonstrated adequate knowledge about breast cancer and mammography screening and 50% of the participants reported having at least one mammogram; however only 21% of them had regularly scheduled mammograms. The most frequent reported motivator was the perceived benefit that early detection of breast cancer is important for its management (89.6%), followed by the belief that mammography can detect breast cancer before its symptoms appear (84.4%). On the other hand, the most frequent barrier reported was being busy (46.7%), followed by the lack of perceived susceptibility (41.5%). Conclusions: Mammography screening was found to be sub-optimal in a population of HCW's with 50 % stating that they received a mammogram at least once, and a minority reported regular screening. There is a pressing need for educational programs aimed at removing the barriers that limit compliance with recommendations for mammography screening, and to emphasize the importance of early detection in breast cancer treatment. Ensuring the availability and accessibility of screening services, particularly for healthcare workers within their work settings are other important factors that would improve the acceptance and compliance for mammography screening programs.

A study on macro detection using information of touch events in Android mobile game environment (안드로이드 모바일 게임 환경에서의 터치 이벤트 정보를 이용한 매크로 탐지 기법 연구)

  • Kim, Jeong-hyeon;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1123-1129
    • /
    • 2015
  • Macro(automatic hunting) of mobile game is a program that touch the screen by defined rules like a game bot in PC online games, and it is used by make various ways like android application or windows application program. This gives honest users deprivation and make to lose their interest. Finally they would leave the game and gradually game life would be shorten. Although many studies to prevent these problems in PC online game are conducted, applying mobile game to PC's way is difficult because mobile games are limited to use the network and device performance is different with PC. In this paper, we propose a framework for macro detection by using the touch event information. A touch event on the mobile game is a necessary control command to the game. Because macro touches the screen with the same pattern, there is a difference between normal user's behavior and macro's operation. In mobile games that casual games are mostly, Touch event is the best difference that identify normal user against macro for a short period of time. As a result of detecting macros used in real mobile game by using the proposed framework it showed 100% accuracy and 0% false positive rate.

An Implementation of System for Detecting and Filtering Malicious URLs (악성 URL 탐지 및 필터링 시스템 구현)

  • Chang, Hye-Young;Kim, Min-Jae;Kim, Dong-Jin;Lee, Jin-Young;Kim, Hong-Kun;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.405-414
    • /
    • 2010
  • According to the statistics of SecurityFocus in 2008, client-side attacks through the Microsoft Internet Explorer have increased by more than 50%. In this paper, we have implemented a behavior-based malicious web page detection system and a blacklist-based malicious web page filtering system. To do this, we first efficiently collected the target URLs by constructing a crawling system. The malicious URL detection system, run on a specific server, visits and renders actively the collected web pages under virtual machine environment. To detect whether each web page is malicious or not, the system state changes of the virtual machine are checked after rendering the page. If abnormal state changes are detected, we conclude the rendered web page is malicious, and insert it into the blacklist of malicious web pages. The malicious URL filtering system, run on the web client machine, filters malicious web pages based on the blacklist when a user visits web sites. We have enhanced system performance by automatically handling message boxes at the time of ULR analysis on the detection system. Experimental results show that the game sites contain up to three times more malicious pages than the other sites, and many attacks incur a file creation and a registry key modification.

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

Simulation and Analysis of Response Plans against Chemical and Biological Hazards (화학 생물 위험 대응 시뮬레이션 및 분석)

  • Han, Sangwoo;Seo, Jiyun;Shim, Woosup
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.2
    • /
    • pp.49-64
    • /
    • 2021
  • M&S techniques are widely used as scientific means to systematically develop response plans to chemical and biological (CB) hazards. However, while the theoretical area of hazard dispersion modeling has achieved remarkable practical results, the operational analysis area to simulate CB hazard response plans is still in an early stage. This paper presents a model to simulate CB hazard response plans such as detection, protection, and decontamination. First, we present a possible way to display high-fidelity hazard dispersion in a combat simulation model, taking into account weather and terrain conditions. We then develop an improved vulnerability model of the combat simulation model, in order to simulate CB damage of combat simulation entities based on other casualty prediction techniques. In addition, we implement tactical behavior task models that simulate CB hazard response plans such as detection, reconnaissance, protection, and decontamination. Finally, we explore its feasibility by analyzing contamination detection effects by distributed CB detectors and decontamination effects according to the size of the {contaminated, decontamination} unit. We expect that the proposed model will be partially utilized in disaster prevention and simulation training area as well as analysis of combat effectiveness analysis of CB protection system and its operational concepts in the military area.

Detection of video editing points using facial keypoints (얼굴 특징점을 활용한 영상 편집점 탐지)

  • Joshep Na;Jinho Kim;Jonghyuk Park
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.15-30
    • /
    • 2023
  • Recently, various services using artificial intelligence(AI) are emerging in the media field as well However, most of the video editing, which involves finding an editing point and attaching the video, is carried out in a passive manner, requiring a lot of time and human resources. Therefore, this study proposes a methodology that can detect the edit points of video according to whether person in video are spoken by using Video Swin Transformer. First, facial keypoints are detected through face alignment. To this end, the proposed structure first detects facial keypoints through face alignment. Through this process, the temporal and spatial changes of the face are reflected from the input video data. And, through the Video Swin Transformer-based model proposed in this study, the behavior of the person in the video is classified. Specifically, after combining the feature map generated through Video Swin Transformer from video data and the facial keypoints detected through Face Alignment, utterance is classified through convolution layers. In conclusion, the performance of the image editing point detection model using facial keypoints proposed in this paper improved from 87.46% to 89.17% compared to the model without facial keypoints.

Electrical response of tungsten diselenide to the adsorption of trinitrotoluene molecules (폭발물 감지 시스템 개발을 위한 TNT 분자 흡착에 대한 WSe2 소자의 전기적 반응 특성 평가)

  • Chan Hwi Kim;Suyeon Cho;Hyeongtae Kim;Won Joo Lee;Jun Hong Park
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.33 no.6
    • /
    • pp.255-260
    • /
    • 2023
  • As demanding the detection of explosive molecules, it is required to develop rapidly and precisely responsive sensors with ultra-high sensitivity. Since two-dimensional semiconductors have an atomically thin body nature where mobile carriers accumulate, the abrupt modulation carrier in the thin body channel can be expected. To investigate the effectiveness of WSe2 semiconductor materials as a detection material for TNT (Trinitrotoluene) explosives, WSe2 was synthesized using thermal chemical vapor deposition, and afterward, WSe2 FETs (Field Effect Transistors) were fabricated using standard photo-lithograph processes. Raman Spectrum and FT-IR (Fourier-transform infrared) spectroscopy reveal that the adsorption of TNT molecules induces the structural transition of WSe2 crystalline. The electrical properties before and after adsorption of TNT molecules on the WSe2 surface were compared; as -50 V was applied as the back gate bias, 0.02 μA was recorded in the bare state, and the drain current increased to 0.41 μA with a dropping 0.6% (w/v) TNT while maintaining the p-type behavior. Afterward, the electrical characteristics were additionally evaluated by comparing the carrier mobility, hysteresis, and on/off ratio. Consequently, the present report provides the milestone for developing ultra-sensitive sensors with rapid response and high precision.

STUDY ON THE RELATIONSHIP BETWEEN ONTOGENY OF SEROTONIN SYSTEM AND PSYCHOPATHOLOGY IN CONDUCT DISORDER (행동장애에 있어서 Serotonin계의 개체발생적인 과정과 정신병리와의 상호관계에 관한 연구)

  • Shin, Sun-Woong;Shin, Min-Sup;Hwang, Jun-Won;Kim, Boong-Nyun;Cho, Soo-Churl
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.14 no.1
    • /
    • pp.112-122
    • /
    • 2003
  • Objectives:Considerable data indicate that diminished serotonergic activity is related to aggressive behavior. In order to understand the biological etiology in conduct disorder, we studied the relationships of plasma serotonin and 5-HIAA levels in conduct disorders to measures of aggression, violation of rules and oppositional defiant behavior. Methods:Subjects were selected from inpatients and outpatients department of the Division of Child and Adolescent Psychiatry of Seoul National University Hospital. 41 conduct disorders(18 childhoodonset type, 23 adolescent-onset type) and 23 normal controls were included in this study. For the assessment of aggression, rule violation and oppositional behavior, parents completed the rating scale for conduct disorder and oppositional behavior based on the DSM-IV diagnostic criteria. Plasma serotonin and 5-HIAA levels were determined by HPLC with electrochemical detection. Results:1) Plasma 5-HT and 5-HIAA levels were not significantly different among childhood-onset conduct disorder, adolescent-onset conduct disorder and normal control subjects. 2) No significant correlations were found between plasma 5-HT levels and aggression or rule violation. 3) Plasma 5-HT levels showed significant positive correlations with oppositional behavior both in childhood-onset conduct disorder and adolescent-onset conduct disorder. 4) Age-related changes were not found in plasma 5-HT and 5-HIAA levles. Conclusion:Our findings do not support the hypothesis that dysregulation of serotonergic function may be associated with aggresson. Instead, our data suggest that serotonergic function is more closely related with oppositional behavior than aggression.

  • PDF

Enhancement in Selectivity of Nonenzymatic Glucose Sensors Based on Mesoporous Platinum by A.C. Impedance

  • Park, Se-Jin;Boo, Han-Kil
    • Journal of the Korean Electrochemical Society
    • /
    • v.11 no.3
    • /
    • pp.147-153
    • /
    • 2008
  • Improvement of the selectivity of nonenzymatic glucose based on mesoporous platinum ($H_1$-ePt) by using A.C. impedance is reported. The idea of the present work is based on the novel effect of the mesoporous electrode that the apparent exchange current due to glucose oxidation remarkably grows although the reaction kinetics on the surface is still sluggish. It is expected that the enlarged apparent exchange current on the mesoporous electrode can raise the sensitivity of admittance in A.C. impedance to glucose concentration. At a low frequency, A.C. impedance could become more powerful. The admittance at 0.01 Hz is even more sensitive to glucose than to ascorbic acid while amperometry exhibits the inverse order of sensitivity. This is the unique behavior that is neither observed by A.C. impedance on flat platinum electrode nor obtained by amperometry. The study shows how the combination of A.C. impedance and nano-structured surface can be applied to the detection of sluggish reaction such as electrochemical oxidation of glucose.