• Title/Summary/Keyword: discrete-system

Search Result 2,487, Processing Time 0.025 seconds

The Effects of Sentiment and Readability on Useful Votes for Customer Reviews with Count Type Review Usefulness Index (온라인 리뷰의 감성과 독해 용이성이 리뷰 유용성에 미치는 영향: 가산형 리뷰 유용성 정보 활용)

  • Cruz, Ruth Angelie;Lee, Hong Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.43-61
    • /
    • 2016
  • Customer reviews help potential customers make purchasing decisions. However, the prevalence of reviews on websites push the customer to sift through them and change the focus from a mere search to identifying which of the available reviews are valuable and useful for the purchasing decision at hand. To identify useful reviews, websites have developed different mechanisms to give customers options when evaluating existing reviews. Websites allow users to rate the usefulness of a customer review as helpful or not. Amazon.com uses a ratio-type helpfulness, while Yelp.com uses a count-type usefulness index. This usefulness index provides helpful reviews to future potential purchasers. This study investigated the effects of sentiment and readability on useful votes for customer reviews. Similar studies on the relationship between sentiment and readability have focused on the ratio-type usefulness index utilized by websites such as Amazon.com. In this study, Yelp.com's count-type usefulness index for restaurant reviews was used to investigate the relationship between sentiment/readability and usefulness votes. Yelp.com's online customer reviews for stores in the beverage and food categories were used for the analysis. In total, 170,294 reviews containing information on a store's reputation and popularity were used. The control variables were the review length, store reputation, and popularity; the independent variables were the sentiment and readability, while the dependent variable was the number of helpful votes. The review rating is the moderating variable for the review sentiment and readability. The length is the number of characters in a review. The popularity is the number of reviews for a store, and the reputation is the general average rating of all reviews for a store. The readability of a review was calculated with the Coleman-Liau index. The sentiment is a positivity score for the review as calculated by SentiWordNet. The review rating is a preference score selected from 1 to 5 (stars) by the review author. The dependent variable (i.e., usefulness votes) used in this study is a count variable. Therefore, the Poisson regression model, which is commonly used to account for the discrete and nonnegative nature of count data, was applied in the analyses. The increase in helpful votes was assumed to follow a Poisson distribution. Because the Poisson model assumes an equal mean and variance and the data were over-dispersed, a negative binomial distribution model that allows for over-dispersion of the count variable was used for the estimation. Zero-inflated negative binomial regression was used to model count variables with excessive zeros and over-dispersed count outcome variables. With this model, the excess zeros were assumed to be generated through a separate process from the count values and therefore should be modeled as independently as possible. The results showed that positive sentiment had a negative effect on gaining useful votes for positive reviews but no significant effect on negative reviews. Poor readability had a negative effect on gaining useful votes and was not moderated by the review star ratings. These findings yield considerable managerial implications. The results are helpful for online websites when analyzing their review guidelines and identifying useful reviews for their business. Based on this study, positive reviews are not necessarily helpful; therefore, restaurants should consider which type of positive review is helpful for their business. Second, this study is beneficial for businesses and website designers in creating review mechanisms to know which type of reviews to highlight on their websites and which type of reviews can be beneficial to the business. Moreover, this study highlights the review systems employed by websites to allow their customers to post rating reviews.

THE CURRENT STATUS OF BIOMEDICAL ENGINEERING IN THE USA

  • Webster, John G.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1992 no.05
    • /
    • pp.27-47
    • /
    • 1992
  • Engineers have developed new instruments that aid in diagnosis and therapy Ultrasonic imaging has provided a nondamaging method of imaging internal organs. A complex transducer emits ultrasonic waves at many angles and reconstructs a map of internal anatomy and also velocities of blood in vessels. Fast computed tomography permits reconstruction of the 3-dimensional anatomy and perfusion of the heart at 20-Hz rates. Positron emission tomography uses certain isotopes that produce positrons that react with electrons to simultaneously emit two gamma rays in opposite directions. It locates the region of origin by using a ring of discrete scintillation detectors, each in electronic coincidence with an opposing detector. In magnetic resonance imaging, the patient is placed in a very strong magnetic field. The precessing of the hydrogen atoms is perturbed by an interrogating field to yield two-dimensional images of soft tissue having exceptional clarity. As an alternative to radiology image processing, film archiving, and retrieval, picture archiving and communication systems (PACS) are being implemented. Images from computed radiography, magnetic resonance imaging (MRI), nuclear medicine, and ultrasound are digitized, transmitted, and stored in computers for retrieval at distributed work stations. In electrical impedance tomography, electrodes are placed around the thorax. 50-kHz current is injected between two electrodes and voltages are measured on all other electrodes. A computer processes the data to yield an image of the resistivity of a 2-dimensional slice of the thorax. During fetal monitoring, a corkscrew electrode is screwed into the fetal scalp to measure the fetal electrocardiogram. Correlations with uterine contractions yield information on the status of the fetus during delivery To measure cardiac output by thermodilution, cold saline is injected into the right atrium. A thermistor in the right pulmonary artery yields temperature measurements, from which we can calculate cardiac output. In impedance cardiography, we measure the changes in electrical impedance as the heart ejects blood into the arteries. Motion artifacts are large, so signal averaging is useful during monitoring. An intraarterial blood gas monitoring system permits monitoring in real time. Light is sent down optical fibers inserted into the radial artery, where it is absorbed by dyes, which reemit the light at a different wavelength. The emitted light travels up optical fibers where an external instrument determines O2, CO2, and pH. Therapeutic devices include the electrosurgical unit. A high-frequency electric arc is drawn between the knife and the tissue. The arc cuts and the heat coagulates, thus preventing blood loss. Hyperthermia has demonstrated antitumor effects in patients in whom all conventional modes of therapy have failed. Methods of raising tumor temperature include focused ultrasound, radio-frequency power through needles, or microwaves. When the heart stops pumping, we use the defibrillator to restore normal pumping. A brief, high-current pulse through the heart synchronizes all cardiac fibers to restore normal rhythm. When the cardiac rhythm is too slow, we implant the cardiac pacemaker. An electrode within the heart stimulates the cardiac muscle to contract at the normal rate. When the cardiac valves are narrowed or leak, we implant an artificial valve. Silicone rubber and Teflon are used for biocompatibility. Artificial hearts powered by pneumatic hoses have been implanted in humans. However, the quality of life gradually degrades, and death ensues. When kidney stones develop, lithotripsy is used. A spark creates a pressure wave, which is focused on the stone and fragments it. The pieces pass out normally. When kidneys fail, the blood is cleansed during hemodialysis. Urea passes through a porous membrane to a dialysate bath to lower its concentration in the blood. The blind are able to read by scanning the Optacon with their fingertips. A camera scans letters and converts them to an array of vibrating pins. The deaf are able to hear using a cochlear implant. A microphone detects sound and divides it into frequency bands. 22 electrodes within the cochlea stimulate the acoustic the acoustic nerve to provide sound patterns. For those who have lost muscle function in the limbs, researchers are implanting electrodes to stimulate the muscle. Sensors in the legs and arms feed back signals to a computer that coordinates the stimulators to provide limb motion. For those with high spinal cord injury, a puff and sip switch can control a computer and permit the disabled person operate the computer and communicate with the outside world.

  • PDF

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Improvements in the Marine Environmental Survey on Impact of Seawater Qualities and Ecosystems due to Marine Sand Mining (바다모래 채취 시 해수 수질 및 생태계 영향에 대한 해양환경조사 개선 방안)

  • Kim, Yeong-Tae;Kim, Gui-Young;Jeon, Kyeong-Am;Eom, Ki-Hyuk;Kim, In-Chul;Choi, Bo-Ram;Kim, Hee-Jung;Kim, Jin-Min
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.2
    • /
    • pp.143-156
    • /
    • 2014
  • We reviewed investigation status on turbidity plume in the statement of marine environmental survey(2008 to 2012) associated with marine sand extraction projects. The survey statement from seven marine sand extraction sites (extraction area of Southern EEZ, extraction area of Western EEZ, relocation zone in the Western EEZ, sea area under jurisdiction of Taean-gun, sea area under jurisdiction of Ansan City, and two discrete sea areas under jurisdiction of Ongjin-gun) in the nearshore and offshore of Korea showed that in situ observations were carried out for the dispersion and transport of suspended sediments on two areas (One is a extraction area in the EEZs, the other is an area of coastal sites). However, sampling station and range have not been selected considering physical, geographical factors (tide, wave, stratification, water depth, etc.) and weather conditions (wind direction and velocity, fetch, duration, etc). Especially turbidity plumes originating from three sources, which include suspended sediments in overflow(or overspill) discharged from spillways and reject chutes of dredging vessel, and resuspended sediments from draghead at the seabed, may be transported to a far greater distance outside the boundary of the extraction site and have undesirable impacts on the marine environment and ecosystem. We address that behaviour of environmental pollutants such as suspended solids, nutrients, and metals should be extensively monitored and diagnosed during the dispersion and transport of the plume. Finally we suggest the necessity to supplement the current system of the sea area utilization consultation and establish the combined guidelines on marine sand extraction to collect basic data, to monitor cumulative effects, and to minimize environmental damages incurred by the aftermath of sand extraction.

Classifying Predominant Type and Examining Risk Factors for Recurrence of Child Maltreatment (아동학대사례의 잠재유형화와 유형별 재학대 위험요인)

  • Lee, Sang-Gyun;Lee, Bong Joo;Kim, Sewon;Kim, Hyun-Soo;Yoo, Joan P.;Jang, Hwa Jung;Chin, Meejung;Park, Ji-Myung
    • Korean Journal of Social Welfare Studies
    • /
    • v.48 no.3
    • /
    • pp.171-208
    • /
    • 2017
  • The purpose of this study is to classify the underlying and parsimonious types of child maltreatment and examine whether the effects of risk factors on child maltreatment recurrence differ by type of maltreatment. We utilized the multiyear national administrative data from the National Child Maltreatment Information System collected by Child Protection Agency in Korea. Of 26,921 child maltreatment victims reported and substantiated on or after January 1, 2012, 1,447 children who had recurrence of child maltreatment until December 31, 2015 were selected as maltreatment recurrence group and 4,580 children who had not experienced maltreatment since first substantiation were assigned as maltreatment non-recurrence group. Latent class analysis(LCA) and latent transition analysis(LTA) were used to group children with similar maltreatment subtypes into discrete classes of child maltreatment recurrence. Logistic regression is employed to examine the association between the child maltreatment predominant types and risk factors for recurrence. Results of LCA and LTA showed four latent classes representing predominant type of child maltreatment: 'physical abuse predominant type', 'emotional abuse predominant type', 'sexual abuse predominant type', and 'neglect type'. Significant differences in the effect of risk factors among latent classes were found in child's age and gender, perpetrator's gender, family poverty, biological parent as the perpetrator, domestic violence toward partner, perpetrator's alcoholic problem, insufficient parenting skills, and out-of-home care service, Based on these findings, results suggested how the typology can be used to guide decision about who to target in prevention and intervention programs, and which features of risk factors to target. Practice and policy implications as well as further research tasks were discussed in the lights of searching for useful and important strategies to prevent recurrence of child maltreatment.

Pilot-scale Applications of a Well-type Reactive Barrier using Autotrophic Sulfur-oxidizers for Nitrate Removal (독립영양 황탈질 미생물을 이용한 관정형 반응벽체의 현장적용성 연구)

  • Lee, Byung-Sun;Um, Jae-Yeon;Lee, Kyu-Yeon;Moon, Hee-Sun;Kim, Yang-Bin;Woo, Nam-C.;Lee, Jong-Min;Nam, Kyoung-Phile
    • Journal of Soil and Groundwater Environment
    • /
    • v.14 no.3
    • /
    • pp.40-46
    • /
    • 2009
  • The applicability of a well-type autotrophic sulfur-oxidizing reactive barrier (L $\times$ W $\times$ D = $3m\;{\times}\;4\;m\;{\times}\;2\;m$) as a long-term treatment option for nitrate removal in groundwater was evaluated. Pilot-scale (L $\times$ W $\times$ D = $8m\;{\times}\;4\;m\;{\times}\;2\;m$) flow-tank experiments were conducted to examine remedial efficacy of the well-type reactive barrier. A total of 80 kg sulfur granules as an electron donor and Thiobacillus denitrificans as an active bacterial species were prepared. Thiobacillus denitrificans was successfully colonized on the surface of the sulfur granules and the microflora transformed nitrate with removal efficiency of ~12% (0.07 mM) for 11 days, ~24% (1.3 mM) for 18 days, ~45% (2.4 mM) for 32 days, and ~52% (2.8 mM) for 60 days. Sulfur granules attached to Thiobacillus denitrificans were used to construct the well-type reactive barrier comprising three discrete barriers installed at 1-m interval downstream. Average initial nitrate concentrations were 181 mg/L for the first 28 days and 281 mg/L for the next 14 days. For the 181 mg/L (2.9 mM) plume, nitrate concentrations decreased by ~2% (0.06 mM), ~9% (0.27 mM), and ~15% (0.44 mM) after $1^{st}$, $2^{nd}$, and $3^{rd}$ barriers, respectively. For the 281 mg/L (4.5 mM) plume, nitrate concentrations decreased by ~1% (0.02 mM), ~6% (0.27 mM), and ~8% (0.37 mM) after $1^{st}$, $2^{nd}$, and $3^{rd}$ barriers, respectively. Nitrate plume was flowed through the flow-tank for 49 days by supplying $1.24\;m^3/d$ of nitrate solution. During nitrate treatment, flow velocity (0.44 m/d), pH (6.7 to 8.3), and DO (0.9~2.8 mg/L) showed little variations. Incomplete destruction of nitrate plume was attributed to the lack of retention time, rarely transverse dispersion, and inhibiting the activity of denitrification enzymes caused by relatively high DO concentrations. For field applications, it should be considered increments of retention time, modification of well placements, and intrinsic DO concentration.

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.