• Title/Summary/Keyword: Time-to-Detect

Search Result 3,769, Processing Time 0.033 seconds

Designing an Intelligent Advertising Business Model in Seoul's Metro Network (서울지하철의 지능형 광고 비즈니스모델 설계)

  • Musyoka, Kavoya Job;Lim, Gyoo Gun
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.1-31
    • /
    • 2017
  • Modern businesses are adopting new technologies to serve their markets better as well as to improve efficiency and productivity. The advertising industry has continuously experienced disruptions from the traditional channels (radio, television and print media) to new complex ones including internet, social media and mobile-based advertising. This case study focuses on proposing intelligent advertising business model in Seoul's metro network. Seoul has one of the world's busiest metro network and transports a huge number of travelers on a daily basis. The high number of travelers coupled with a well-planned metro network creates a platform where marketers can initiate engagement and interact with both customers and potential customers. In the current advertising model, advertising is on illuminated and framed posters in the stations and in-car, non-illuminated posters, and digital screens that show scheduled arrivals and departures of metros. Some stations have digital screens that show adverts but they do not have location capability. Most of the current advertising media have one key limitation: space. For posters whether illuminated or not, one space can host only one advert at a time. Empirical literatures show that there is room for improving this advertising model and eliminate the space limitation by replacing the poster adverts with digital advertising platform. This new model will not only be digital, but will also provide intelligent advertising platform that is driven by data. The digital platform will incorporate location sensing, e-commerce, and mobile platform to create new value to all stakeholders. Travel cards used in the metro will be registered and the card scanners will have a capability to capture traveler's data when travelers tap their cards. This data once analyzed will make it possible to identify different customer groups. Advertisers and marketers will then be able to target specific customer groups, customize adverts based on the targeted consumer group, and offer a wide variety of advertising formats. Format includes video, cinemagraphs, moving pictures, and animation. Different advert formats create different emotions in the customer's mind and the goal should be to use format or combination of formats that arouse the expected emotion and lead to an engagement. Combination of different formats will be more effective and this can only work in a digital platform. Adverts will be location based, ensuring that adverts will show more frequently when the metro is near the premises of an advertiser. The advertising platform will automatically detect the next station and screens inside the metro will prioritize adverts in the station where the metro will be stopping. In the mobile platform, customers who opt to receive notifications will receive them when they approach the business premises of advertiser. The mobile platform will have indoor navigation for the underground shopping malls that will allow customers to search for facilities within the mall, products they may want to buy as well as deals going on in the underground mall. To create an end-to-end solution, the mobile solution will have a capability to allow customers purchase products through their phones, get coupons for deals, and review products and shops where they have bought a product. The indoor navigation will host intelligent mobile-based advertisement and a recommendation system. The indoor navigation will have adverts such that when a customer is searching for information, the recommendation system shows adverts that are near the place traveler is searching or in the direction that the traveler is moving. These adverts will be linked to the e-commerce platform such that if a customer clicks on an advert, it leads them to the product description page. The whole system will have multi-language as well as text-to-speech capability such that both locals and tourists have no language barrier. The implications of implementing this model are varied including support for small and medium businesses operating in the underground malls, improved customer experience, new job opportunities, additional revenue to business model operator, and flexibility in advertising. The new value created will benefit all the stakeholders.

Modern Paper Quality Control

  • Olavi Komppa
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2000.06a
    • /
    • pp.16-23
    • /
    • 2000
  • The increasing functional needs of top-quality printing papers and packaging paperboards, and especially the rapid developments in electronic printing processes and various computer printers during past few years, set new targets and requirements for modern paper quality. Most of these paper grades of today have relatively high filler content, are moderately or heavily calendered , and have many coating layers for the best appearance and performance. In practice, this means that many of the traditional quality assurance methods, mostly designed to measure papers made of pure. native pulp only, can not reliably (or at all) be used to analyze or rank the quality of modern papers. Hence, introduction of new measurement techniques is necessary to assure and further develop the paper quality today and in the future. Paper formation , i.e. small scale (millimeter scale) variation of basis weight, is the most important quality parameter of paper-making due to its influence on practically all the other quality properties of paper. The ideal paper would be completely uniform so that the basis weight of each small point (area) measured would be the same. In practice, of course, this is not possible because there always exists relatively large local variations in paper. However, these small scale basis weight variations are the major reason for many other quality problems, including calender blacking uneven coating result, uneven printing result, etc. The traditionally used visual inspection or optical measurement of the paper does not give us a reliable understanding of the material variations in the paper because in modern paper making process the optical behavior of paper is strongly affected by using e.g. fillers, dye or coating colors. Futhermore, the opacity (optical density) of the paper is changed at different process stages like wet pressing and calendering. The greatest advantage of using beta transmission method to measure paper formation is that it can be very reliably calibrated to measure true basis weight variation of all kinds of paper and board, independently on sample basis weight or paper grade. This gives us the possibility to measure, compare and judge papers made of different raw materials, different color, or even to measure heavily calendered, coated or printed papers. Scientific research of paper physics has shown that the orientation of the top layer (paper surface) fibers of the sheet paly the key role in paper curling and cockling , causing the typical practical problems (paper jam) with modern fax and copy machines, electronic printing , etc. On the other hand, the fiber orientation at the surface and middle layer of the sheet controls the bending stiffness of paperboard . Therefore, a reliable measurement of paper surface fiber orientation gives us a magnificent tool to investigate and predict paper curling and coclking tendency, and provides the necessary information to finetune, the manufacturing process for optimum quality. many papers, especially heavily calendered and coated grades, do resist liquid and gas penetration very much, bing beyond the measurement range of the traditional instruments or resulting invonveniently long measuring time per sample . The increased surface hardness and use of filler minerals and mechanical pulp make a reliable, nonleaking sample contact to the measurement head a challenge of its own. Paper surface coating causes, as expected, a layer which has completely different permeability characteristics compared to the other layer of the sheet. The latest developments in sensor technologies have made it possible to reliably measure gas flow in well controlled conditions, allowing us to investigate the gas penetration of open structures, such as cigarette paper, tissue or sack paper, and in the low permeability range analyze even fully greaseproof papers, silicon papers, heavily coated papers and boards or even detect defects in barrier coatings ! Even nitrogen or helium may be used as the gas, giving us completely new possibilities to rank the products or to find correlation to critical process or converting parameters. All the modern paper machines include many on-line measuring instruments which are used to give the necessary information for automatic process control systems. hence, the reliability of this information obtained from different sensors is vital for good optimizing and process stability. If any of these on-line sensors do not operate perfectly ass planned (having even small measurement error or malfunction ), the process control will set the machine to operate away from the optimum , resulting loss of profit or eventual problems in quality or runnability. To assure optimum operation of the paper machines, a novel quality assurance policy for the on-line measurements has been developed, including control procedures utilizing traceable, accredited standards for the best reliability and performance.

A Study on Termite Monitoring Method Using Magnetic Sensors and IoT(Internet of Things) (자력센서와 IoT(사물인터넷)를 활용한 흰개미 모니터링 방법 연구)

  • Go, Hyeongsun;Choe, Byunghak
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.1
    • /
    • pp.206-219
    • /
    • 2021
  • The warming of the climate is increasing the damage caused by termites to wooden buildings, cultural properties and houses. A group removal system can be installed around the building to detect and remove termite damage; however, if the site is not visited regularly, every one to two months, you cannot observe whether termites have spread within, and it is difficult to take prompt effective action. In addition, since the system is installed and operated in an exposed state for a long period of time, it may be ineffective or damaged, resulting in a loss of function. Furthermore if the system is installed near a cultural site, it may affect the aesthetic environment of the site. In this study, we created a detection system that uses wood, cellulose, magnets, and magnetic sensors to determine whether termites have entered the area. The data was then transferred to a low power LoRa Network which displayed the results without the necessity of visiting the site. The wood was made in the shape of a pile, and holes were made from the top to the bottom to make it easier for termites to enter and produce a cellulose sample. The cellulose sample was made in a cylindrical shape with a magnet wrapped in cellulose and inserted into the top of a hole in the wood. Then, the upper part of the wood pile was covered with a stopper to prevent foreign matter from entering. It also served to block external factors such as light and rainfall, and to create an environment where termites could add cellulose samples. When the cellulose was added by the termites, a space was created around the magnet, causing the magnet to either fall or tilt. The magnetic sensor inside the stopper was fixed on the top of the cellulose sample and measured the change in the distance between the magnet and the sensor according to the movement of the magnet. In outdoor experiments, 11 cellulose samples were inserted into the wood detection system and the termite inflow was confirmed through the movement of the magnet without visiting the site within 5 to 17 days. When making further improvements to the function and operation of the system it in the future, it is possible to confirm that termites have invaded without visiting the site. Then it is also possible to reduce damage and fruiting due to product exposure, and which would improve the condition and appearance of cultural properties.

Role of Immune Response to Type II Collagen in the Pathogenesis of Rheumatoid Arthritis (류마티스 관절염 병인에서 제2형 콜라겐에 대한 면역반응의 역할)

  • Jung, Young Ok;Hong, Seung-Jae;Kim, Ho-Youn
    • IMMUNE NETWORK
    • /
    • v.3 no.1
    • /
    • pp.1-7
    • /
    • 2003
  • Type II collagen (CII), major component of hyaline cartilage, has been considered as an auto-antigen in rheumatoid arthritis (RA). However, the clinical and biological significances with regard to the CII autoimmunity need to be clarified in human RA. The presence of antibodies to CII has been identified in sera, synovial fluid, and cartilage of patients with RA. In our study, the increased titer of IgG anti-CII in sera was well correlated with C-reactive protein, suggesting that this antibody may reflect the inflammatory status of RA. The titer of anti-CII antibodies (anti-CII Abs) tended to be higher in early stages of diseases. In our extending study, among 997 patients with RA, 269 (27.0%) were positive for circulatory IgG antibody to CII, those levels were fluctuated over time. It is hard to assess the significant amount of T cell responses to CII and CII (255~274) in RA. By using a sensitive method of antigen specific mixed lymphocyte culture, we can detect the presence of CII-reactive T cells in peripheral blood mononuclear cells of RA patients. Sixty seven (46.9%) of 143 patients showed positive CII reactive T cell responses to CII or CII (255~274). The frequencies of CII reactive T cells were more prominent in inflamed synovial fluid (SF) than in peripheral blood. These T cells could be clonally expanded after consecutive stimulation of CII with feeding of autologous irradiated antigen presenting cells (APC). Moreover, the production of Th1-related cytokine, such as IFN-${\gamma}$, was strongly up-regulated by CII reactive T cells. These data suggest that T cells responding to CII, which are probably presenting the IFN-${\gamma}$ producing cells, may play an important role in the perpetuation of inflammatory process in RA. To evaluate the effector function of CII reactive T cells, we investigated the effect of CII reactive T cells and fibroblasts-like synoviocytes (FLS) interaction on the production of pro-inflammatory cytokines. When the CII reactive T cells were co-cultured with FLS, the production of IL-15 and TNF-${\alpha}$ from FLS were significantly increased (2 to 3 fold increase) and this increase was clearly presented in accord to the expansion of CII reactive T cells. In addition, the production of IFN-${\gamma}$ and IL-17, T cell derived cytokines, were also increased by the co-incubation of CII reactive T cells with FLS. We also examined the impact of CII reactive T cells on chemokines production. When FLS were co-cultured with CII stimulated T cells, the production of IL-8, MCP-1, and MIP-1${\alpha}$ were significantly enhanced. The increased production of these chemokines was strongly correlated with increase the frequency of CII reactive T cells. Conclusively, immune response to CII was frequently found in RA. Activated T cells in response to CII contributed to increase the production of proinflammatory cytokines and chemokines, which were critical for inflammatory responses in RA. The interaction of CII-reactive T cells with FLS further augmented this phenomenon. Taken together, our recent studies have suggested that autoimmunity to CII could play a crucial role not only in the initiation but amplification/perpetuation of inflammatory process in human RA.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.

Designing and Fabricating of the High-visibility Smart Safety Clothing (고시인성 스마트 안전의류의 설계 및 제작)

  • Park, Soon-Ja;Kim, Sun-Woong
    • Science of Emotion and Sensibility
    • /
    • v.23 no.4
    • /
    • pp.105-116
    • /
    • 2020
  • The purpose of this study is to progress the limitations and disadvantages of existing safety clothing by applying high technology to current safety clothing that is produced and distributed only with fluorescent fabrics and retroreflective materials. Therefore, the industrial suspender-type safety belt and engineering technology are introduced, designed, and fabricated to help save a life in an emergency. First, the suspender-type safety belt to be developed is designed to emit light by LED attached to the film, and the body of the belt-wearer is recognized from a distance through retroreflection from the flashing LED. It aims to support people's safety by preventing accidents during roadside work, rescue activities, and sports activities at night. Second, with the development of advanced devices when the user is in an unconscious state due to distress or falls into an unconscious state due to distress or accident, the tilt sensor of the control unit attached to the belt automatically detects the angle of the human body and generates light and sound. It is intended to further enhance the utilization by mounting a sensing and signaling device that generates a distress signal and shaping it in the form of a belt attached to a vest that can be easily detached from the outside of the garment. When the wearer falls due to an accident, the tilt sensor of this belt detects the angle change and then the controller generates a high-frequency sound and repeated LED blinking signals at the same time. In the case of conventional safety vests, it is almost impossible to detect that the person is wearing a vest when there is no ambient light, but in case of the safety belts in this study, the sound and light signals of the safety belt enable us to find the wearer within 100 meters even when there is no ambient light.

Enzyme Linked Immunosorbent Assay for the Detection of Antibody to Avian Infectious Bronchitis Virus (효소면역법에 의한 닭 전염성 기관지염 바이러스 항체검사)

  • 송현제;최정옥
    • Korean Journal of Poultry Science
    • /
    • v.18 no.3
    • /
    • pp.183-196
    • /
    • 1991
  • In order to establish ELISA method to detect antibody against IBV various factors involved were examined. Antigen was prepared from Massachusetts type IBV which is known to be one of serotypes distributed most widely. The virus was grown in embryonated SPF chicken eggs. Allantoic fluid harvested was processed to ultracentrifugation and sucrose density gradient centrifugation to produce a purified antigen The antisera selected from the field samples based on hemagglutination inhibition test were used as the standard positive and negative sera for this study and the results obtained were summarized as follows. 1 , It was found that ELISA test was satisfactory when the purified antigen was coated on the plate in the amount of about 40ng protein per well. In case of the phospholipase treated hemagglutinating antigen it gave satisfactory results when the each well wns coated with 1.2 to 2.5 hemagglutinating unit which was equivalent to 40 to 90ng of protein. 2. There was no significant difference in the ratio of optical density of positive to that of negative serum whether the coated antigen was held for 1 hour at 37$^{\circ}C$ or it was held overnight at 4$^{\circ}C$. The coated antigen could be kept in dried state without change of antigenecity for at least one month of experimental period at 4$^{\circ}C$. 3. There was a big variation in the optical density and P/N values depending on the maker of the plates and on the plate of the same maker. 4. It was found that background optical density was negligible when serum was diluted more than 1:50 and serum dilution of 1:100 appeared to be appropriate as a routine test dilution to screen the antibody. 5. Optical density was fairly constant 15 minutes afterward from the time substrate was treated and during the 4 hours after stopper was treated. 6. There was a low correlation(r=0.42) between ELISA and HI test. However, when 74serum samples were tested for the IBV antibody, 98.7% were found to be positive by both tests in which titers of 2$^{6}$ or more by HI test and P/N values of 1.4 or more by ELISA were considered to be positive, 7 Day-old IBV vaccinated chickens shows a similar antibody decay and rising pattern until 8 weeks of age by the two tests, ELISA and HI.

  • PDF

Development of 3D Viewer for Tree Cavity using Pulse Ultrasound (펄스 초음파를 이용한 수목 공동부 3D 구현 프로그램 제작)

  • Son, Jungmin;Kang, Sunghoon;Moon, Jongwook;Yoon, Seokkyu;Park, Jikoon
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.2
    • /
    • pp.265-271
    • /
    • 2021
  • The pattern of the tree's internal swelling depends on many causes. Since it is difficult to detect these various causes of swelling with a general method, if the state of swelling for a long time cannot be confirmed, serious damage to the trees may occur due to enlargement of the swelling area. In the method of acquiring a tree tomography image, an impulse passing through the tree is generated by tapping the sensor with a rubber mallet, and the moving speed is recorded. In this paper, to measure cracks, cavities, and swelling due to physical damage, we developed a 3D viewer that can know the internal state of a tree using a tree cross-section image acquired from Arbotom to determine the degree of swelling inside the tree. Based on this, we tried to present data that can be referred to when surgical operation of trees is required. In order to acquire a tomographic image of a tree, 6 sensors were attached to the three Yangpala and Maple trees, and a 1 m-long tree was measured using the Arbotom program, and a 3D image was implemented through the 3D Viewer created using MATLAB. In addition to simply acquiring images, the cross-sectional length and volume of the tree were measured. In the actually produced 3D Viewer, the length of the part where the swelling of the maple tree occurred was 33.12 cm, and the swelling of the yangpala tree was measured as 21.41 cm. The volume of the maple tree was measured to be 78.832 ㎤. As a result of comparing the cross-sectional image of the Arbotom and the 3D image, the same result as the real aspect of the tree was obtained, so it can be judged that the reliability of the manufactured software is also secured, and data to be applied to the surgical tree operation through the created Viewer is provided. It is believed that the damage will be minimized.

Research on ITB Contract Terms Classification Model for Risk Management in EPC Projects: Deep Learning-Based PLM Ensemble Techniques (EPC 프로젝트의 위험 관리를 위한 ITB 문서 조항 분류 모델 연구: 딥러닝 기반 PLM 앙상블 기법 활용)

  • Hyunsang Lee;Wonseok Lee;Bogeun Jo;Heejun Lee;Sangjin Oh;Sangwoo You;Maru Nam;Hyunsik Lee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.11
    • /
    • pp.471-480
    • /
    • 2023
  • The Korean construction order volume in South Korea grew significantly from 91.3 trillion won in public orders in 2013 to a total of 212 trillion won in 2021, particularly in the private sector. As the size of the domestic and overseas markets grew, the scale and complexity of EPC (Engineering, Procurement, Construction) projects increased, and risk management of project management and ITB (Invitation to Bid) documents became a critical issue. The time granted to actual construction companies in the bidding process following the EPC project award is not only limited, but also extremely challenging to review all the risk terms in the ITB document due to manpower and cost issues. Previous research attempted to categorize the risk terms in EPC contract documents and detect them based on AI, but there were limitations to practical use due to problems related to data, such as the limit of labeled data utilization and class imbalance. Therefore, this study aims to develop an AI model that can categorize the contract terms based on the FIDIC Yellow 2017(Federation Internationale Des Ingenieurs-Conseils Contract terms) standard in detail, rather than defining and classifying risk terms like previous research. A multi-text classification function is necessary because the contract terms that need to be reviewed in detail may vary depending on the scale and type of the project. To enhance the performance of the multi-text classification model, we developed the ELECTRA PLM (Pre-trained Language Model) capable of efficiently learning the context of text data from the pre-training stage, and conducted a four-step experiment to validate the performance of the model. As a result, the ensemble version of the self-developed ITB-ELECTRA model and Legal-BERT achieved the best performance with a weighted average F1-Score of 76% in the classification of 57 contract terms.