• Title/Summary/Keyword: metric spaces

Search Result 469, Processing Time 0.029 seconds

Detecting Abnormal Human Movements Based on Variational Autoencoder

  • Doi Thi Lan;Seokhoon Yoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.94-102
    • /
    • 2023
  • Anomaly detection in human movements can improve safety in indoor workplaces. In this paper, we design a framework for detecting anomalous trajectories of humans in indoor spaces based on a variational autoencoder (VAE) with Bi-LSTM layers. First, the VAE is trained to capture the latent representation of normal trajectories. Then the abnormality of a new trajectory is checked using the trained VAE. In this step, the anomaly score of the trajectory is determined using the trajectory reconstruction error through the VAE. If the anomaly score exceeds a threshold, the trajectory is detected as an anomaly. To select the anomaly threshold, a new metric called D-score is proposed, which measures the difference between recall and precision. The anomaly threshold is selected according to the minimum value of the D-score on the validation set. The MIT Badge dataset, which is a real trajectory dataset of workers in indoor space, is used to evaluate the proposed framework. The experiment results show that our framework effectively identifies abnormal trajectories with 81.22% in terms of the F1-score.

On ϑ-quasi-Geraghty Contractive Mappings and Application to Perturbed Volterra and Hypergeometric Operators

  • Olalekan Taofeek Wahab
    • Kyungpook Mathematical Journal
    • /
    • v.63 no.1
    • /
    • pp.45-60
    • /
    • 2023
  • In this paper we suggest an enhanced Geraghty-type contractive mapping for examining the existence properties of classical nonlinear operators with or without prior degenerates. The nonlinear operators are proved to exist with the imposition of the Geraghty-type condition in a non-empty closed subset of complete metric spaces. To showcase some efficacies of the Geraghty-type condition, convergent rate and stability are deduced. The results are used to study some asymptotic properties of perturbed integral and hypergeometric operators. The results also extend and generalize some existing Geraghty-type conditions.

An Approach to the BIM-enabled Assessment of Building Circulation using Quantitative Data and its Weight (동선관련 정성적 요구사항 평가를 위한 가중치를 적용한 BIM기반 정량데이터 활용방안에 관한 연구)

  • Shin, Jaeyoung;Lee, Jin-Kook
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.335-343
    • /
    • 2015
  • This paper describes a quantitative approach to the BIM-enabled assessment of building circulation by using quantitative data and applying its weight. Assessment of building circulation plays an important role before construction stage because of related requirements regulated by design guide, building codes, etc. and design decision making as well. In this paper, Qualitative issue is mainly dealt with that are usually excluded from rule checking objects due to their implicit definition such as 'comfortable circulation'. A weighting framework is suggested using weighted data of circulation properties such as 1) metric distance, 2) number of passing spaces, 3) number of turning spaces, 4) window area of passing space, etc.

A Competition-based Algorithm for Routing Discovery and Repair in Large-scale VANET

  • Wu, Cheng;Wang, Lujie;Wang, Yiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5729-5744
    • /
    • 2017
  • Vehicular Ad Hoc Networks (VANET) in the large-scale road section usually have typical characteristics of large number of vehicles and unevenly distribution over geographic spaces. These two inherent characteristics lead to the unsatisfactory performance of VANETs. This poor performance is mainly due to fragile communication link and low dissemination efficiency. We propose a novel routing mechanism to address the issue in the paper, which includes a competition-based routing discovery with priority metrics and a local routing repair strategy. In the routing discovery stage, the algorithm uses adaptive scheme to select a stable route by the priorities of routing metrics, which are the length of each hop, as well as the residual lifetime of each link. Comparisons of different ratios over link length and link stability further show outstanding improvements. In the routing repair process, upstream and downstream nodes also compete for the right to establish repair process and to remain as a member of the active route after repair. Our simulation results confirm the improved performance of the proposed algorithm.

Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks

  • Youn, Seongwook;Cho, Hyun-chong
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.1307-1313
    • /
    • 2017
  • Sensor networks are composed of provide low powered, inexpensive distributed devices which can be deployed over enormous physical spaces. Coordination between sensor devices is required to achieve a common communication. In low cost, low power and short-range wireless environment, sensor networks cope with significant resource constraints. Security is one of main issues in wireless sensor networks because of potential adversaries. Several security protocols and models have been implemented for communication on computing devices but deployment these models and protocols into the sensor networks is not easy because of the resource constraints mentioned. Memory intensive encryption algorithms as well as high volume of packet transmission cannot be applied to sensor devices due to its low computational speed and memory. Deployment of sensor networks without security mechanism makes sensor nodes vulnerable to potential attacks. Therefore, attackers compromise the network to accept malicious sensor nodes as legitimate nodes. This paper provides the different security models as a metric, which can then be used to make pertinent security decisions for securing wireless sensor network communication.

A Study on the Spatial Characteristics of Golf Courses (골프코스의 공간적 특성에 관한 연구)

  • Kim, Chung-Ho
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.36 no.4
    • /
    • pp.15-26
    • /
    • 2008
  • The purpose of this study is to attempt to interpret golf courses as event-generating spaces with consideration given to the time factor. Through a golf game, a variety of events such as the tee shot, second shot, putt, and hole out are generated. These events have been connected to a series of events after hole out such as birdie, par, bogey and so on. The series of events do not always occur in the same way. They reveal unexpected changes over time. These unexpected changes cause changes in the spatial characteristics and offer unforgettable memories for golfers. Gilles Deleuze mentioned the spatial characteristics as striated space and smooth space. Striated space can be defined as sedentary space. It is distant vision-optical space that has dimensional, metric and centered characteristics, whereas smooth space is defined as nomadic, close vision-haptic space that has directional and acentered characteristics. This study focused on the analysis of spatial characteristics according to striated space and smooth space. Golf courses generally show the characteristics of striated space before beginning the game. As soon as the game begins, however, the golf courses are converted into an event-generating space. The characteristics of striated space are transformed into smooth space, a nomadic space that amplifies the dynamic, changeable, de-scaled and non-metric system. Through the whole game, this transformation is dramatically repeated. On the other hand, the golfer, the subject of the game, senses the phenomenological experience in the process of orientation, center, definition, and domestication.

Improvement of System for Grain Drying, Storing , and Processing in Rural Area (농촌의 주곡 건조.저장.가공 작업체계 개선확립)

  • 서상용;이승규;김용환
    • Journal of Biosystems Engineering
    • /
    • v.3 no.1
    • /
    • pp.33-46
    • /
    • 1978
  • To get the goal of self-supply of food grain, improvement of post-harvest grain operations in rural area is under consideration as an important task of agriculture in Korea. This is study is focused on elimination of losses and deteriorations of grain and reduction of labour requirements and funds for post-harvest grain operations. The purpose of this study are presentation of basic data referring to conventional post-harvest grain operations in rural area and suggestion of improving methods for the operations, and also finding out reasonable operating processes of the operations. The result of this study are follows; 1. Grain drying in-the-filed which is performed before threshing has major factors of grain loss during drying, and so should be restrained as possible. Combine harvesting system is recommended among other king of mechanized harvesting systems for restraining in-the-field drying and securing available labors for drying. 2. It is predicted that mechanical grain drying could be prevalent when combine harvesting is taken place. Recommended grain drier for pre-combine harvesting system and for combine harvesting system is batch-type drier and circulating -type drier, respectively. 3. As existing farm storages for grain have insufficient spaces and offer poor conditions for grain storing , it is greatly needed to build up new storage which store only grains. And it is concluded that storing grain in community common storages in desirable. 4. Power supplying system for milling machinery in local milling plants, that a large capacity prime mover supplies power to 4 to 6 kinds of milling machinery simultaeously, should be converted to a system of several small capacity prime movers supplying power to each machiner y for the purpose of reducing extra consumption of energy. 5. Governmental grain, of which Korean farms produced, should be milled and stored in the local milling plant successively for the purpose of reducing transportation fee and stroing facilities. 6. Furture post-havest grain operations-drying, storing and milling should be periormed successively in he community common plant. And average optimum processing capacity of the plant is estimated about 300 metric ton of grain every year.

  • PDF

An Intelligent CCTV-Based Emergency Detection System for Rooftop Access Control Problems (옥상 출입 통제 문제 해결을 위한 지능형 CCTV 기반 비상 상황 감지 시스템 제안)

  • Yeeun Kang;Soyoung Ham;Seungchae Joa;Hani Lee;Seongmin Kim;Hakkyong Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.59-68
    • /
    • 2024
  • With advancements in artificial intelligence technology, intelligent CCTV systems are being deployed across various environments, such as river bridges and construction sites. However, a conflict arises regarding the opening and closing of rooftop access points due to concerns over potential accidents and crime incidents and their role as emergency evacuation spaces. While the relevant law typically mandates the constant opening of designated rooftop access points, closures are often tacitly permitted in practice for security reasons, with a lack of appropriate legal measures. In this context, this study proposes a detection system utilizing intelligent CCTV to respond to emergencies that may occur on rooftops. We develop a system based on the YOLOv5 object detection model to detect assault and suicide attempts by jumping, introducing a new metric to assess them. Experimental results demonstrate that the proposed system rapidly detects assault and suicide attempts with high accuracy. Additionally, through a legal analysis of rooftop access point management, deficiencies in the legal framework regarding rooftop access and CCTV installation are identified, and improvement measures are proposed. With technological and legal improvements, we believe that crime and accident incidents in rooftop environments will decrease.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.