• Title/Summary/Keyword: Factor Graph

Search Result 167, Processing Time 0.027 seconds

An Analysis on the Morphological Relationship of Hair Styles with Changes in Necklines and Collars: From 16th Century to 19th Century

  • Kim, Hyoju;Bae, Soojeong
    • Journal of Fashion Business
    • /
    • v.18 no.3
    • /
    • pp.117-133
    • /
    • 2014
  • This thesis aims to investigate the morphologic relationship among the neckline, collar, and hair style, in which the width and height were measured by selecting the representative costumes from 16th to 19th centuries. The pieces of 170 pictures selected by fashion experts were cut in the same condition, with the part of the end of shoulder, head, and chest all placed on the equal level. The products were directly measured by a team of 3 specialists for verification of this study, of which results were calculated into average. The values of output were categorized into the unit of decade and finally into a graph of variation, in which the trend and relationship were evaluated according to the width and height. In 16th century, the width and height of the neckline were inversely proportional to those of hair style, while those of collar were proportional to those of hair style. In 17th century, the width and height of the hair style were proportional to those of neckline and collar. In 18th century, those of the neckline were inversely proportional to the hair style, with no collar found. In 19th century, the width of the neckline and collar were proportional to that of the hair style, while the height of the neckline and collar were inversely proportional to that of the hair style. The analysis of the morphologic relationship among neckline, collar, and hair style resulting from this study revealed that the change of the hair style took place corresponding to those of neckline and collar. Generally, the width of the hair style was found to be more resistant to change, compared to those of neckline and collar that were more susceptible. The height of the neckline was more resistant to change, compared to those of the hair style and collar presenting their frequently fluctuating height. Conclusively, the factor of height rather than that of width showed more dominant proportions, because the various forms of the collar and hair style evolved in terms of the height rather that width, relative to that of the neckline.

UX evaluation of MyData-based financial asset management app - Focusing on Data Visualization (마이데이터 기반 금융 자산관리 앱 사용성 평가 - 데이터 시각화를 중심으로 -)

  • Kim, Eun Young;Han, Soo Jin
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.223-233
    • /
    • 2021
  • MyData industry became possible with the revision of the three data-related bills on August 2020, and from February 2021, each individual can make MyData financial service through the app provided by MyData providers. In this study, in order to understand the user experience trend of MyData-based financial asset management apps in the user-centered financial service era, the usability evaluation of 11 apps from 8 MyData providers was conducted for 300 adults, then average value comparison, radial graph analysis, and heatmap analysis were conducted. In app design preference, asset list type was the most preferred type, followed by asset comparison·list type. As for the expected perception of the future benefits that can be enjoyed through My Data, 'diversification of convenient services' was the highest at 45.3%, and as a negative factor felt by users, personal information-related factors were the highest at 71.4%. The results of this study can be used as basic data for the development and improvement of user interfaces for MyData platforms.

Bridge Inspection and condition assessment using Unmanned Aerial Vehicles (UAVs): Major challenges and solutions from a practical perspective

  • Jung, Hyung-Jo;Lee, Jin-Hwan;Yoon, Sungsik;Kim, In-Ho
    • Smart Structures and Systems
    • /
    • v.24 no.5
    • /
    • pp.669-681
    • /
    • 2019
  • Bridge collapses may deliver a huge impact on our society in a very negative way. Out of many reasons why bridges collapse, poor maintenance is becoming a main contributing factor to many recent collapses. Furthermore, the aging of bridges is able to make the situation much worse. In order to prevent this unwanted event, it is indispensable to conduct continuous bridge monitoring and timely maintenance. Visual inspection is the most widely used method, but it is heavily dependent on the experience of the inspectors. It is also time-consuming, labor-intensive, costly, disruptive, and even unsafe for the inspectors. In order to address its limitations, in recent years increasing interests have been paid to the use of unmanned aerial vehicles (UAVs), which is expected to make the inspection process safer, faster and more cost-effective. In addition, it can cover the area where it is too hard to reach by inspectors. However, this strategy is still in a primitive stage because there are many things to be addressed for real implementation. In this paper, a typical procedure of bridge inspection using UAVs consisting of three phases (i.e., pre-inspection, inspection, and post-inspection phases) and the detailed tasks by phase are described. Also, three major challenges, which are related to a UAV's flight, image data acquisition, and damage identification, respectively, are identified from a practical perspective (e.g., localization of a UAV under the bridge, high-quality image capture, etc.) and their possible solutions are discussed by examining recently developed or currently developing techniques such as the graph-based localization algorithm, and the image quality assessment and enhancement strategy. In particular, deep learning based algorithms such as R-CNN and Mask R-CNN for classifying, localizing and quantifying several damage types (e.g., cracks, corrosion, spalling, efflorescence, etc.) in an automatic manner are discussed. This strategy is based on a huge amount of image data obtained from unmanned inspection equipment consisting of the UAV and imaging devices (vision and IR cameras).

Prediction of Fabric Drape Using Artificial Neural Networks (인공신경망을 이용한 드레이프성 예측)

  • Lee, Somin;Yu, Dongjoo;Shin, Bona;Youn, Seonyoung;Shim, Myounghee;Yun, Changsang
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.45 no.6
    • /
    • pp.978-985
    • /
    • 2021
  • This study aims to propose a prediction model for the drape coefficient using artificial neural networks and to analyze the nonlinear relationship between the drape properties and physical properties of fabrics. The study validates the significance of each factor affecting the fabric drape through multiple linear regression analysis with a sample size of 573. The analysis constructs a model with an adjusted R2 of 77.6%. Seven main factors affect the drape coefficient: Grammage, extruded length values for warp and weft (mwarp, mweft), coefficients of quadratic terms in the tensile-force quadratic graph in the warp, weft, and bias directions (cwarp, cweft, cbias), and force required for 1% tension in the warp direction (fwarp). Finally, an artificial neural network was created using seven selected factors. The performance was examined by increasing the number of hidden neurons, and the most suitable number of hidden neurons was found to be 8. The mean squared error was .052, and the correlation coefficient was .863, confirming a satisfactory model. The developed artificial neural network model can be used for engineering and high-quality clothing design. It is expected to provide essential data for clothing appearance, such as the fabric drape.

Protective effect of Capsosiphon fulvescens on oxidative stress-stimulated neurodegenerative dysfunction of PC12 cells and zebrafish larva models

  • Laxmi Sen Thakuri;Jung Eun Kim;Jin Yeong Choi;Dong Young Rhyu
    • Fisheries and Aquatic Sciences
    • /
    • v.26 no.1
    • /
    • pp.24-34
    • /
    • 2023
  • Reactive oxygen species (ROS) at high concentrations induce oxidative stress, an imbalanced redox state that is a prevalent cause of neurodegenerative disorders. This study aimed to investigate the protective effect of Capsosiphon fulvescens (CF) extract on oxidative stress-induced impairment of cognitive function in models of neurodegenerative diseases. CF was extracted with subcritical water and several solvents and H2O2 (0.25 mM) or aluminum chloride (AlCl3; 25 µM) as an inducer of ROS was treated in PC12 neuronal cells and zebrafish larvae. All statistical analyses were performed using one-way analysis of variance and Dunnett's test using GraphPad Prism. H2O2 and AlCl3 were found to significantly induce ROS production in PC12 neuronal cells and zebrafish larvae. In addition, they strongly affected intracellular Ca2+ levels, antioxidant enzyme activity, brain-derived neurotrophic factor (BDNF) and tropomyosin receptor kinase B (TrkB) signaling, acetylcholinesterase (AChE) activity, and hallmarks of Alzheimer's disease. However, treatment of H2O2-induced PC12 cells or AlCl3-induced zebrafish larvae with CF subcritical water extract at 90℃ and CF water extract effectively regulated excessive ROS production, intracellular Ca2+ levels, and mRNA expression of superoxide dismutase, glutathione peroxide, glycogen synthase kinase-3 beta, β-amyloid, tau, AChE, BDNF, and TrkB. Our study suggested that CF extracts can be a potential source of nutraceuticals that can improve the impairment of cognitive function and synaptic plasticity by regulating ROS generation in neurodegenerative diseases.

An Edge Enabled Region-oriented DAG-based Distributed Ledger System for Secure V2X Communication

  • S. Thangam;S. Sibi Chakkaravarthy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2253-2280
    • /
    • 2024
  • In the upcoming era of transportation, a groundbreaking technology, known as vehicle-to-everything (V2X) communication, is poised to redefine our driving experience and revolutionize traffic management. Real-time and secure communication plays a pivotal role in V2X networks, with the decision-making process being a key factor in establishing communication and determining malicious nodes. The proposed framework utilizes a directed acyclic graph (DAG) to facilitate real-time processing and expedite decision-making. This innovative approach ensures seamless connectivity among vehicles, the surrounding infrastructure, and various entities. To enhance communication efficiency, the entire roadside unit (RSU) region can be subdivided into various sub-regions, allowing RSUs to monitor and govern each sub-region. This strategic approach significantly reduces transaction approval time, thereby improving real-time communication. The framework incorporates a consensus mechanism to ensure robust security, even in the presence of malicious nodes. Recognizing the dynamic nature of V2X networks, the addition and removal of nodes are aligned. Communication latency is minimized through the deployment of computational resources near the data source and leveraging edge computing. This feature provides invaluable recommendations during critical situations that demand swift decision-making. The proposed architecture is further validated using the "veins" simulation tool. Simulation results demonstrate a remarkable success rate exceeding 95%, coupled with a significantly reduced consensus time compared to prevailing methodologies. This comprehensive approach not only addresses the evolving requirements of secure V2X communication but also substantiates practical success through simulation, laying the foundation for a transformative era in transportation.

A Study for Strategy of On-line Shopping Mall: Based on Customer Purchasing and Re-purchasing Pattern (시스템 다이내믹스 기법을 활용한 온라인 쇼핑몰의 전략에 관한 연구 : 소비자의 구매 및 재구매 행동을 중심으로)

  • Lee, Sang-Gun;Min, Suk-Ki;Kang, Min-Cheol
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.91-121
    • /
    • 2008
  • Electronic commerce, commonly known as e-commerce or eCommerce, has become a major business trend in these days. The amount of trade conducted electronically has grown extraordinarily by developing the Internet technology. Most electronic commerce has being conducted between businesses to customers; therefore, the researches with respect to e-commerce are to find customer's needs, behaviors through statistical methods. However, the statistical researches, mostly based on a questionnaire, are the static researches, They can tell us the dynamic relationships between initial purchasing and repurchasing. Therefore, this study proposes dynamic research model for analyzing the cause of initial purchasing and repurchasing. This paper is based on the System-Dynamic theory, using the powerful simulation model with some restriction, The restrictions are based on the theory TAM(Technology Acceptance Model), PAM, and TPB(Theory of Planned Behavior). This article investigates not only the customer's purchasing and repurchasing behavior by passing of time but also the interactive effects to one another. This research model has six scenarios and three steps for analyzing customer behaviors. The first step is the research of purchasing situations. The second step is the research of repurchasing situations. Finally, the third step is to study the relationship between initial purchasing and repurchasing. The purpose of six scenarios is to find the customer's purchasing patterns according to the environmental changes. We set six variables in these scenarios by (1) changing the number of products; (2) changing the number of contents in on-line shopping malls; (3) having multimedia files or not in the shopping mall web sites; (4) grading on-line communities; (5) changing the qualities of products; (6) changing the customer's degree of confidence on products. First three variables are applied to study customer's purchasing behavior, and the other variables are applied to repurchasing behavior study. Through the simulation study, this paper presents some inter-relational result about customer purchasing behaviors, For example, Active community actions are not the increasing factor of purchasing but the increasing factor of word of mouth effect, Additionally. The higher products' quality, the more word of mouth effects increase. The number of products and contents on the web sites have same influence on people's buying behaviors. All simulation methods in this paper is not only display the result of each scenario but also find how to affect each other. Hence, electronic commerce firm can make more realistic marketing strategy about consumer behavior through this dynamic simulation research. Moreover, dynamic analysis method can predict the results which help the decision of marketing strategy by using the time-line graph. Consequently, this dynamic simulation analysis could be a useful research model to make firm's competitive advantage. However, this simulation model needs more further study. With respect to reality, this simulation model has some limitations. There are some missing factors which affect customer's buying behaviors in this model. The first missing factor is the customer's degree of recognition of brands. The second factor is the degree of customer satisfaction. The third factor is the power of word of mouth in the specific region. Generally, word of mouth affects significantly on a region's culture, even people's buying behaviors. The last missing factor is the user interface environment in the internet or other on-line shopping tools. In order to get more realistic result, these factors might be essential matters to make better research in the future studies.

A New Approach to the Parameter Calibration of Two-Fluid Model (Two-Fluid 모형 파라미터 정산의 새로운 접근방안)

  • Kwon, Yeong-Beom;Lee, Jaehyeon;Kim, Sunho;Lee, Chungwon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.1
    • /
    • pp.63-71
    • /
    • 2019
  • The two-fluid model proposed by Herman and Prigogine is useful for analyzing macroscopic traffic flow in a network. The two-fluid model is used for analyzing a network through the relationship between the ratio of stopped vehicles and the average moving speed of the network, and the two-fluid model has also been applied in the urban transportation network where many signalized or unsignalized intersections existed. In general, the average travel speed and moving speed of a network decrease, and the ratio of stopped vehicles and low speed vehicles in network increase as the traffic demand increases. This study proposed the two-fluid model considering congested and uncongested traffic situations. The critical velocity and the weight factor for congested situation are calibrated by minimizing the root mean square error (RMSE). The critical speed of the Seoul network was about 34 kph, and the weight factor of the congestion on the network was about 0.61. In the proposed model, $R^2$ increased from 0.78 to 0.99 when compared to the existing model, suggesting that the proposed model can be applied in evaluating network performances or traffic signal operations.

Evaluation of Data-based Expansion Joint-gap for Digital Maintenance (디지털 유지관리를 위한 데이터 기반 교량 신축이음 유간 평가 )

  • Jongho Park;Yooseong Shin
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.28 no.2
    • /
    • pp.1-8
    • /
    • 2024
  • The expansion joint is installed to offset the expansion of the superstructure and must ensure sufficient gap during its service life. In detailed guideline of safety inspection and precise safety diagnosis for bridge, damage due to lack or excessive gap is specified, but there are insufficient standards for determining the abnormal behavior of superstructures. In this study, a data-based maintenance was proposed by continuously monitoring the expansion-gap data of the same expansion joint. A total of 2,756 data were collected from 689 expansion joint, taking into account the effects of season. We have developed a method to evaluate changes in the expansion joint-gap that can analyze the thermal movement through four or more data at the same location, and classified the factors that affect the superstructure behavior and analyze the influence of each factor through deep learning and explainable artificial intelligence(AI). Abnormal behavior of the superstructure was classified into narrowing and functional failure through the expansion joint-gap evaluation graph. The influence factor analysis using deep learning and explainable AI is considered to be reliable because the results can be explained by the existing expansion gap calculation formula and bridge design.

Improved Social Network Analysis Method in SNS (SNS에서의 개선된 소셜 네트워크 분석 방법)

  • Sohn, Jong-Soo;Cho, Soo-Whan;Kwon, Kyung-Lag;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.117-127
    • /
    • 2012
  • Due to the recent expansion of the Web 2.0 -based services, along with the widespread of smartphones, online social network services are being popularized among users. Online social network services are the online community services which enable users to communicate each other, share information and expand human relationships. In the social network services, each relation between users is represented by a graph consisting of nodes and links. As the users of online social network services are increasing rapidly, the SNS are actively utilized in enterprise marketing, analysis of social phenomenon and so on. Social Network Analysis (SNA) is the systematic way to analyze social relationships among the members of the social network using the network theory. In general social network theory consists of nodes and arcs, and it is often depicted in a social network diagram. In a social network diagram, nodes represent individual actors within the network and arcs represent relationships between the nodes. With SNA, we can measure relationships among the people such as degree of intimacy, intensity of connection and classification of the groups. Ever since Social Networking Services (SNS) have drawn increasing attention from millions of users, numerous researches have made to analyze their user relationships and messages. There are typical representative SNA methods: degree centrality, betweenness centrality and closeness centrality. In the degree of centrality analysis, the shortest path between nodes is not considered. However, it is used as a crucial factor in betweenness centrality, closeness centrality and other SNA methods. In previous researches in SNA, the computation time was not too expensive since the size of social network was small. Unfortunately, most SNA methods require significant time to process relevant data, and it makes difficult to apply the ever increasing SNS data in social network studies. For instance, if the number of nodes in online social network is n, the maximum number of link in social network is n(n-1)/2. It means that it is too expensive to analyze the social network, for example, if the number of nodes is 10,000 the number of links is 49,995,000. Therefore, we propose a heuristic-based method for finding the shortest path among users in the SNS user graph. Through the shortest path finding method, we will show how efficient our proposed approach may be by conducting betweenness centrality analysis and closeness centrality analysis, both of which are widely used in social network studies. Moreover, we devised an enhanced method with addition of best-first-search method and preprocessing step for the reduction of computation time and rapid search of the shortest paths in a huge size of online social network. Best-first-search method finds the shortest path heuristically, which generalizes human experiences. As large number of links is shared by only a few nodes in online social networks, most nods have relatively few connections. As a result, a node with multiple connections functions as a hub node. When searching for a particular node, looking for users with numerous links instead of searching all users indiscriminately has a better chance of finding the desired node more quickly. In this paper, we employ the degree of user node vn as heuristic evaluation function in a graph G = (N, E), where N is a set of vertices, and E is a set of links between two different nodes. As the heuristic evaluation function is used, the worst case could happen when the target node is situated in the bottom of skewed tree. In order to remove such a target node, the preprocessing step is conducted. Next, we find the shortest path between two nodes in social network efficiently and then analyze the social network. For the verification of the proposed method, we crawled 160,000 people from online and then constructed social network. Then we compared with previous methods, which are best-first-search and breath-first-search, in time for searching and analyzing. The suggested method takes 240 seconds to search nodes where breath-first-search based method takes 1,781 seconds (7.4 times faster). Moreover, for social network analysis, the suggested method is 6.8 times and 1.8 times faster than betweenness centrality analysis and closeness centrality analysis, respectively. The proposed method in this paper shows the possibility to analyze a large size of social network with the better performance in time. As a result, our method would improve the efficiency of social network analysis, making it particularly useful in studying social trends or phenomena.