• Title/Summary/Keyword: Internet activity

Search Result 651, Processing Time 0.022 seconds

The Anti-Inflammatory and Anti-Oxidant Activity of Ethanol Extract from Red Rose Petals

  • Kim, Hyun-Kyoung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.139-148
    • /
    • 2020
  • Red rose petals are usually disposed but they are an abundant source of phenolics and traditionally used as food supplement and as herbal medicine. Of the Various phenolics, they are known to have anticancer, antioxidant, and anti-inflammatory properties. In this study, we investigated the anti-inflammatory effects of red rose ethanolic extracts (GRP) on lipopolysaccharide (LPS)-activated RAW 264.7 cells. The results demonstrated that pretreatment of GRP (500㎍/mL) significantly reduced NO production by suppressing iNOS protein expression in LPS-stimulated cells. Anti-inflammatory effects by red rose petals were observed in the following. Red rose petals inhibited the translocation of NF-κB from the cytosol to the nucleus via the suppression of IκB-α phosphorylation and also inhibited LPS-stimulated NF-κB transcriptional activity. These findings suggest that red rose petals exert anti-inflammatory actions and help to elucidate the mechanisms underlying the potential therapeutic values of red rose petals. Therefore, red rose petals could be regarded as a potential source of natural anti-inflammatory agents.

Design of Programming Learning Process using Hybrid Programming Environment for Computing Education

  • Kwon, Dai-Young;Yoon, Il-Kyu;Lee, Won-Gyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1799-1813
    • /
    • 2011
  • Many researches indicate that programming learning could help improve problem solving skills through algorithmic thinking. But in general, programming learning has been focused on programming language features and it also gave a heavy cognitive load to learners. Therefore, this paper proposes a programming activity process to improve novice programming learners' algorithmic thinking efficiently. An experiment was performed to measure the effectiveness of the proposed programming activity process. After the experiment, the learners' perception on programming was shown to be changed, to effective activity in improving problem solving.

Chaotic Phenomena in Addiction Model for Digital Leisure

  • Bae, Youngchul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.291-297
    • /
    • 2013
  • Chaotic dynamics have been studied by many researchers in the fields of biology, physics, and engineering. Interest in chaos is also expanding to the social sciences such as politics, economics, and others, including the prediction of societal events. The concept of leisure has developed from a passive concept correlated with relaxation, entertainment, and ideology formation into a positive concept that assumes a more active role. As information and communications technology develops, digital leisure activity is expected to continue spreading. This expansion of digital leisure function correctly, as well as. Traditional leisure activity functions correctly more, whereas digital leisure activity is predicted to function incorrectly more often. In this paper, we propose a mathematical addiction model of digital leisure that deals with its dysfunctions such as addiction to digital leisure, including computer games, internet search, internet chatting, and social media. Herein, to solve addiction to digital leisure, we propose a model derived from a nicotine addiction.

UML diagram-driven test scenarios generation based on the temporal graph grammar

  • Shi, Zhan;Zeng, Xiaoqin;Zhang, Tingting;Han, Lei;Qian, Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2476-2495
    • /
    • 2021
  • Model-based software architecture verification and test scenarios generation are becoming more and more important in the software industry. Based on the existing temporal graph grammar, this paper proposes a new formalization method of the context-sensitive graph grammar for aiming at UML activity diagrams, which is called the UML Activity Graph Grammar, or UAGG. In the UAGG, there are new definitions and parsing algorithms. The proposed mechanisms are able to not only check the structural correctness of the UML activity diagram but also automatically generate the test scenario according to user constraints. Finally, a case study is discussed to illustrate how the UAGG and its algorithms work.

Development of a Machine-Learning based Human Activity Recognition System including Eastern-Asian Specific Activities

  • Jeong, Seungmin;Choi, Cheolwoo;Oh, Dongik
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.127-135
    • /
    • 2020
  • The purpose of this study is to develop a human activity recognition (HAR) system, which distinguishes 13 activities, including five activities commonly dealt with in conventional HAR researches and eight activities from the Eastern-Asian culture. The eight special activities include floor-sitting/standing, chair-sitting/standing, floor-lying/up, and bed-lying/up. We used a 3-axis accelerometer sensor on the wrist for data collection and designed a machine learning model for the activity classification. Data clustering through preprocessing and feature extraction/reduction is performed. We then tested six machine learning algorithms for recognition accuracy comparison. As a result, we have achieved an average accuracy of 99.7% for the 13 activities. This result is far better than the average accuracy of current HAR researches based on a smartwatch (89.4%). The superiority of the HAR system developed in this study is proven because we have achieved 98.7% accuracy with publically available 'pamap2' dataset of 12 activities, whose conventionally met the best accuracy is 96.6%.

A study on Classification of Insider threat using Markov Chain Model

  • Kim, Dong-Wook;Hong, Sung-Sam;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1887-1898
    • /
    • 2018
  • In this paper, a method to classify insider threat activity is introduced. The internal threats help detecting anomalous activity in the procedure performed by the user in an organization. When an anomalous value deviating from the overall behavior is displayed, we consider it as an inside threat for classification as an inside intimidator. To solve the situation, Markov Chain Model is employed. The Markov Chain Model shows the next state value through an arbitrary variable affected by the previous event. Similarly, the current activity can also be predicted based on the previous activity for the insider threat activity. A method was studied where the change items for such state are defined by a transition probability, and classified as detection of anomaly of the inside threat through values for a probability variable. We use the properties of the Markov chains to list the behavior of the user over time and to classify which state they belong to. Sequential data sets were generated according to the influence of n occurrences of Markov attribute and classified by machine learning algorithm. In the experiment, only 15% of the Cert: insider threat dataset was applied, and the result was 97% accuracy except for NaiveBayes. As a result of our research, it was confirmed that the Markov Chain Model can classify insider threats and can be fully utilized for user behavior classification.

Activity-based key-frame detection and video summarization in a wide-area surveillance system (광범위한 지역 감시시스템에서의 행동기반 키프레임 검출 및 비디오 요약)

  • Kwon, Hye-Young;Lee, Kyoung-Mi
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.169-178
    • /
    • 2008
  • In this paper, we propose a video summarization system which is based on activity in video acquired by multiple non-overlapping cameras for wide-area surveillance. The proposed system separates persons by time-independent background removal and detects activities of the segmented persons by their motions. In this paper, we extract eleven activities based on whose direction the persons move to and consider a key-frame as a frame which contains a meaningful activity. The proposed system summarizes based on activity-based key-frames and controls an amount of summarization according to an amount of activities. Thus the system can summarize videos by camera, time, and activity.

  • PDF

A Genetic Algorithm-based Classifier Ensemble Optimization for Activity Recognition in Smart Homes

  • Fatima, Iram;Fahim, Muhammad;Lee, Young-Koo;Lee, Sungyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2853-2873
    • /
    • 2013
  • Over the last few years, one of the most common purposes of smart homes is to provide human centric services in the domain of u-healthcare by analyzing inhabitants' daily living. Currently, the major challenges in activity recognition include the reliability of prediction of each classifier as they differ according to smart homes characteristics. Smart homes indicate variation in terms of performed activities, deployed sensors, environment settings, and inhabitants' characteristics. It is not possible that one classifier always performs better than all the other classifiers for every possible situation. This observation has motivated towards combining multiple classifiers to take advantage of their complementary performance for high accuracy. Therefore, in this paper, a method for activity recognition is proposed by optimizing the output of multiple classifiers with Genetic Algorithm (GA). Our proposed method combines the measurement level output of different classifiers for each activity class to make up the ensemble. For the evaluation of the proposed method, experiments are performed on three real datasets from CASAS smart home. The results show that our method systematically outperforms single classifier and traditional multiclass models. The significant improvement is achieved from 0.82 to 0.90 in the F-measures of recognized activities as compare to existing methods.

Development of energy expenditure measurement device based on voice and body activity (음성과 활동량을 이용한 에너지 소모량 측정기기 개발)

  • Im, Jae Joong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.303-309
    • /
    • 2012
  • Energy expenditure values were estimated based on the voice signals and body activities. Voice signals and body activities were obtained using PVDF contact vibration sensor and 3-axis accelerometer, respectively. Vibration caused by voices, activity signals, and actual energy consumption were acquired using data acquisition system and gas analyzer. With the use of power values from the voice signals and weight as independent variables, R-square of 0.918 appeared to show the highest value. For activity outputs, use of signal vector magnitude, body mass index, height, and age as independent variables revealed to provide the highest correlation with actual energy expenditure. Estimation of energy expenditure based on voice and activity provides more accurate results than based on activity only.

Human Activity Recognition in Smart Homes Based on a Difference of Convex Programming Problem

  • Ghasemi, Vahid;Pouyan, Ali A.;Sharifi, Mohsen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.321-344
    • /
    • 2017
  • Smart homes are the new generation of homes where pervasive computing is employed to make the lives of the residents more convenient. Human activity recognition (HAR) is a fundamental task in these environments. Since critical decisions will be made based on HAR results, accurate recognition of human activities with low uncertainty is of crucial importance. In this paper, a novel HAR method based on a difference of convex programming (DCP) problem is represented, which manages to handle uncertainty. For this purpose, given an input sensor data stream, a primary belief in each activity is calculated for the sensor events. Since the primary beliefs are calculated based on some abstractions, they naturally bear an amount of uncertainty. To mitigate the effect of the uncertainty, a DCP problem is defined and solved to yield secondary beliefs. In this procedure, the uncertainty stemming from a sensor event is alleviated by its neighboring sensor events in the input stream. The final activity inference is based on the secondary beliefs. The proposed method is evaluated using a well-known and publicly available dataset. It is compared to four HAR schemes, which are based on temporal probabilistic graphical models, and a convex optimization-based HAR procedure, as benchmarks. The proposed method outperforms the benchmarks, having an acceptable accuracy of 82.61%, and an average F-measure of 82.3%.