• Title/Summary/Keyword: Collecting location

Search Result 149, Processing Time 0.03 seconds

Rating and Comments Mining Using TF-IDF and SO-PMI for Improved Priority Ratings

  • Kim, Jinah;Moon, Nammee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5321-5334
    • /
    • 2019
  • Data mining technology is frequently used in identifying the intention of users over a variety of information contexts. Since relevant terms are mainly hidden in text data, it is necessary to extract them. Quantification is required in order to interpret user preference in association with other structured data. This paper proposes rating and comments mining to identify user priority and obtain improved ratings. Structured data (location and rating) and unstructured data (comments) are collected and priority is derived by analyzing statistics and employing TF-IDF. In addition, the improved ratings are generated by applying priority categories based on materialized ratings through Sentiment-Oriented Point-wise Mutual Information (SO-PMI)-based emotion analysis. In this paper, an experiment was carried out by collecting ratings and comments on "place" and by applying them. We confirmed that the proposed mining method is 1.2 times better than the conventional methods that do not reflect priorities and that the performance is improved to almost 2 times when the number to be predicted is small.

Development of Geographical Information System for the Realtime Environmental Radioactivity Monitoring (환경방사능 데이터 분석을 위한 실시간 환경 감시차량 관제 시스템 구축)

  • Shon, HoWoong;Kim, InHyun;Lee, Yun;Kim, YoungWoo
    • Journal of the Korean Geophysical Society
    • /
    • v.7 no.1
    • /
    • pp.61-72
    • /
    • 2004
  • In this project, under the server-client environment, GIS for the radiological emergency and control system of the vehicles for the environmental radioactivity monitoring was complete. This system is able to display environmental radioactivity data and vehicle's locations through wireless network on real time. Furthermore, it supports not only static analysis function with the collected data regarding nuclear type, collecting time period and vehicle's location but also a documents printing out function.

  • PDF

Preparation of Ultrafine $SnO_2$ Powders by Spray-ICP Technique

  • Kim, Jung-Hwan;Kim, Young-Do;Shin, Kun-Chul;Park, Jong-Hyun
    • Proceedings of the Korea Association of Crystal Growth Conference
    • /
    • 1998.06a
    • /
    • pp.65-70
    • /
    • 1998
  • The Spray-ICP technique uses the ICP(Inductively Coupled Plasma) of ultra-high temperature which is produced by r.f power. The ICP is well-kwown as a clean heat source for the preparation of pure ceramic particles because the ICP is a electrodeless-thermal plasma without contamination. In this study,{{{{ { SnO}_{2 } }}}} particles were sythesized from metal salt solution by Spray-ICP technique. The effects of concentration of solution, collecting location of powders were investicated. The prepared {{{{ { SnO}_{2 } }}}} particles from each concentration of solution had same crystalline phase(tetragonal {{{{ { SnO}_{2 } }}}}) a nd the mean size decreased in proportion to the increase of solution concentration. Each {{{{ { SnO}_{2 } }}}} p owders collector in reactor and electrostatic collector had same crystalline phase and morphologies. The mean size of {{{{ { SnO}_{2 } }}}} p articles prepared by Spray-ICP technique was below 30nm.

  • PDF

A Mathematical model to estimate the wind power using three parameter Weibull distribution

  • Seshaiah, C.V.;Sukkiramathi, K.
    • Wind and Structures
    • /
    • v.22 no.4
    • /
    • pp.393-408
    • /
    • 2016
  • Weibull distribution is a suitable distribution to use in modeling the life time data. It has been found to be a exact fit for the empirical distribution of the wind speed measurement samples. In brief this paper consist of important properties and characters of Weibull distribution. Also we discuss the application of Weibull distribution to wind speed measurements and derive an expression for the probability distribution of the power produced by a wind turbine at a fixed location, so that the modeling problem reduces to collecting data to estimate the three parameters of the Weibull distribution using Maximum likelihood Method.

Optimum Detector Location for Collecting Traffic Information using Microscopic Traffic Simulator for Interrupted Flow (미시 교통류 모형을 이용한 단속류 교통정보 수집용 검지기의 최적 위치 결정)

  • 오기도
    • Proceedings of the KOR-KST Conference
    • /
    • 1998.10a
    • /
    • pp.226-235
    • /
    • 1998
  • 본 논문에서는 추종 모형을 이용한 미시 교통류 시뮬레이션 모형을 개발하고, 이 모형을 통한 시뮬레이션을 통하여 단속류에서 검지기의 설치 위치에 따른 검지 특성을 알아보고, 교통정보 수집용의 검지기의최적 위치에 대해 평가하였다. 검지기로부터 발생하는 교통량, 점유율, 속도 자료중 링크의 통행시간을 가장 잘 반영하는 것은 점유율에 의한 검지기의최적위치는 정지선으로부터 150∼250m이다. 점유율 다음으로 통행시간을 잘 반영하는 자료는 지점속도로서 점유율보다는 상관관계가 낮지만, 양호한 설명력을 가지는 것으로 보인다. 교통량 자료는 상관관계가 낮으며, 교통량에 의한 위치 선정은 각 모의 실험 결과에서 일관적이지 않아 적절한 설명변수가 아니라고 판단하였다. 모든 경우에서, 정지선이나 링크 최상류에 위치한 검지기로부터의 자료는 통행시간과 독립적이므로 이러한 검지기는 교통정보 수집용을 사용할 수 없으며, 일반적인 검지기의최적 위치는 정상상태의 교통류 뿐만 아니라 대기행렬내에 존재하여 매우 혼잡한 상태를 경험할 수 있는 위치라고 할수 있다.

  • PDF

Node Matching of Road Network Data by Comparing Link Shape (링크 형상 비교를 이용한 도로 네트워크 데이터의 노드 매칭)

  • Bang, Yoon-Sik;Lee, Jae-Bin;Huh, Yong;Yu, Ki-Yun
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2009.04a
    • /
    • pp.23-25
    • /
    • 2009
  • Nowadays, owing to the development of techniques for collecting geographic information, an increasing need is thus appearing: integrating heterogeneous databases. This paper proposes an algorithm for finding matching relationship between two node sets in road network data. We found the corresponding node pair using link shape linked with them as well as their location. The accuracy of matching was grown by this process. Result then can be used to reflect the topological information in performing link matching.

  • PDF

A Study on the Role of Fire Fighting and Rescue Squad in terms of Fire Investigation (화재조사 측면에서의 화재진압 및 구조대원의 역할에 대한 연구)

  • Lee, Seung-Hun;Lee, Chang-U
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2012.04a
    • /
    • pp.461-470
    • /
    • 2012
  • Fire scene is mostly destroyed by the flames but fire fighter's fire suppression and rescue activities also destroys a substantail portion. Structures and furnitures which has already become weaken can be easily damaged. Or when structures built up by moving to another location, it's very hard to restore the original state. Also if it is restored, the object has no evidence that it has existed. In all scenes, the scene can't be preserved when quick extinguishment, rescue activities and preventation of fire spread is needed. On this paper, it reviewed the notes about the possibility of field damage by fire suppression and rescue squad's activities. Also it has reviewed the notes how to minimize the field damage by putting out fires and rescue activities by observing the precautions. The reviewed information will help to make guidelines for preserving the scene. By this, it is expected to make a field study exactly by collecting more valid evidence.

  • PDF

Implementation of information sharing on a Hazard Map Creation Support System in a Traditional Local Town

  • Kozaki, Shun;Okazaki, Yasuhisa;Wakuya, Hiroshi;Mishima, Nobuo;Hayashida, Yukuo;Min, Byung-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2016.05a
    • /
    • pp.237-238
    • /
    • 2016
  • This paper describes Web-based information sharing mechanism in our hazard map creation support system. This system aims at collecting the unique information received from residents and raising resident's consciousness to disasters by recording hazardous locations where residents feel danger in case of disasters. We have implemented a mechanism to share and integrate data of each terminal through a Web server. We expect that this information sharing effects scalability and usefulness of our system by utilizing collected local hazard information of each district.

  • PDF

Obstacle Avoidance of an Autonomous Mobile Robot Using Image Processing (영상 처리를 통한 자율 이동로봇의 장애물 회피)

  • Lee, Kyu-Yun;Kim, Joo-Woong;Lim, Joong-Kyu;Eom, Ki-Hwan
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.943-944
    • /
    • 2006
  • In this paper, we implemented the autonomous mobile robot which can recognize and avoid obstacles, then move to its destination using a camera and ultrasonic sensors. The mobile robot can avoid both stationary obstacles with a camera and moving obstacles with ultrasonic sensors. It can find the self-location with the map-based system, that is, it attempts to localize by collecting sensor data, then updating some belief about its position with respect to a map of the environment.

  • PDF

Big Data Key Challenges

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.340-350
    • /
    • 2022
  • The big data term refers to the great volume of data and complicated data structure with difficulties in collecting, storing, processing, and analyzing these data. Big data analytics refers to the operation of disclosing hidden patterns through big data. This information and data set cloud to be useful and provide advanced services. However, analyzing and processing this information could cause revealing and disclosing some sensitive and personal information when the information is contained in applications that are correlated to users such as location-based services, but concerns are diminished if the applications are correlated to general information such as scientific results. In this work, a survey has been done over security and privacy challenges and approaches in big data. The challenges included here are in each of the following areas: privacy, access control, encryption, and authentication in big data. Likewise, the approaches presented here are privacy-preserving approaches in big data, access control approaches in big data, encryption approaches in big data, and authentication approaches in big data.