• Title/Summary/Keyword: network value

Search Result 3,087, Processing Time 0.039 seconds

Implemented of non-destructive intelligent fruit Brix(sugar content) automatic measurement system (비파괴 지능형 과일 당도 자동 측정 시스템 구현)

  • Lee, Duk-Kyu;Eom, Jinseob
    • Journal of Sensor Science and Technology
    • /
    • v.29 no.6
    • /
    • pp.433-439
    • /
    • 2020
  • Recently, the need for IoT-based intelligent systems is increasing in various fields. In this study, we implemented the system that automatically measures the sugar content of fruits without damage to fruit's marketability using near-infrared radiation and machine learning. The spectrums were measured several times by passing a broadband near-infrared light through a fruit, and the average value for them was used as the input raw data of the machine-learned DNN(Deep Neural Network). Using this system, he sugar content value of fruits could be predicted within 5 s, and the prediction accuracy was about 93.86%. The proposed non-destructive sugar content measurement system can predict a relatively accurate sugar content value within a short period of time, so it is considered to have sufficient potential for practical use.

A Study of the Performance on EJB Entity Bean with Value Object (Value Object를 이용한 EJB 엔티티빈의 성능에 관한 연구)

  • 최은희;이남용
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.403-405
    • /
    • 2001
  • In an EJB 1.1 specification, every method call made to the Enterprise Java Bean, is potentially remote call. Such remote invocations use the network layer regardless of the proximity of the client to the bean, creating a network overhead. Especially. because entity bean is more notable performance fail by remote call than session bean, frequency of use on Session Bean in work-site operations is much more than Entity Bean. We focus on how to improve the performance on the entity bean with Value Object, which is one of J2EE patterns suggested by Sun Microsystems. We presents related design-issues fur performance testing, the testing results compared with original entity bean and our findings.

  • PDF

Possibility of Inclusive Adaptation of The ABA Intervention at School

  • Saigh, Budor H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.83-88
    • /
    • 2022
  • Applied Behaviour Analysis (ABA) is the applied science where strategies are derived from the principles of behaviour and are applied to improve meaningful social behaviours [3]. This study investigates the possible inclusive value of the use ABA in schools in Saudi Arabia. Interviews were conducted with two ABA therapists and a support teacher in order to address this possibility. From the research findings, it emerged how ABA is one of the cognitive-behavioural intervention models and therefore, can be generalised to other disorders or diagnoses and the applied behavioural analysis does have an inclusive value as it structures individualized activities for the increase of both personal and social skills and these activities allow the subject to work on his or her skills, which are, however, absolutely preparatory to the inclusion of the subject in the classroom context.

Strategic Business Values of the Blockchain Technology Market to Assist Professionals: Deployment Perspective

  • Waleed Rashideh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.210-226
    • /
    • 2023
  • It is difficult to transform a blockchain initiative from the feasibility stage to the fully commercialized the technology's products or services, especially considering the significant investment required and the lack of studies on the benefits and barriers from deployment perspective. Whereas some organizations have come up with their own solutions to moving beyond the feasibility stage, commercial applications do not yet exist and few organizations are willing to invest beyond the prototype phase and fill in the gap between the expected and actual business value of these types of projects. This study aims to develop a blockchain model using a survey to gather qualitative data on experts' opinions on the deployment of blockchain technology. Our model will measure how business professionals could take advantage of blockchain's disruptive technology to develop business opportunities. This study's contribution is to show blockchain technology's potential strategic business value. The findings from this exploration include the prospective for delivering comprehensions to businesses for different creating investment choices on the embracing of the blockchain technology.

A Study on the semantic network system of the line of flow appearing on the residential space of super high-rise apartments (초고층아파트 주거공간에 나타난 동선의 의미적 네트워크 체계에 관한 연구)

  • Yoon, Jae-Eun;Kim, Joo-Hee
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.3 s.62
    • /
    • pp.58-65
    • /
    • 2007
  • The residential space of super high-rise buildings, having a form of a huge three-dimensional vertical city, affect the residents psychologically and qualitatively according to the line of flow. Because of these affects, the system of the line of flows is a very important factor. In this study, we recognize the super high-rise apartment's line of flow as a semantic network system based on case studies. And we also understand the mutual relationship by analyzing each space to recognize what effect it does on the residential environment. Furthermore, to bring up a better semantic network system for super high-rise apartment's line of flows is our goal. According to the case studies, the semantic network of the line of flow consists of 3 parts: the functional network, economical network and unit network. The functional network is composed of the 'need' and 'has', while the economical network includes variable walls that can be changed following the user's taste and eccentric positioned living rooms that protect personal privacy. Therefore the economical network started to appear while the personal value changed according to the improvement of the social condition. Finally, the unit network is a network that effects each unit that has ambiguous boundaries due to the appropriate arrangement between transitional spaces. And the unit network is based on the functional network.

Method of Developing the Regional Ecological Network for Local Government using the National Ecological Network and the Environmental Conservation Value Assessment Map (광역생태축과 국토환경성평가지도를 활용한 지자체 광역생태네트워크 구축 방안)

  • Kim, Geunhan;Kong, Seok-Jun;Kim, Min-Kyeong;Lee, Moung-Jin;Song, Jiyoon;Jeon, Seong-Woo
    • Journal of Environmental Policy
    • /
    • v.13 no.3
    • /
    • pp.3-19
    • /
    • 2014
  • Large-scale unband development resulted from the rapid economic growth in the Republic of Korea has brought about the habitat destruction for the native animals and plants living in forest and farmland. In order to resolve this problem, it is necessary to consider the natural ecosystem as an organism and to preserve the natural ecosystem by managing ecologically significant habitat consistently. Especially, the local governments should be able to establish regional ecologic networks in consideration of the ecological connectivity and the environmental and ecological excellence, and to reflect them into the local development plans. In regard to this, the methods of the regional ecological network establishment was presented, making use of the results including the national ecological network which assessed the ecological connectivity of the nation and the environmental and ecological assessment results of the Environmental Conservation Value Assessment Map which was designed to analyze and assess the national environmental and ecological values quantitatively. Making use of the case of Gyeongsangnam-do; the results presented that the existing national ecological network in the core region has expanded from $2,986km^2$ to $4,049km^2$ and the existing national ecological network in the buffer region has expanded from $2,940km^2$ to $3,006km^2$. Referring to the regional ecological network in the process of the local development plans could contribute to the increase in biodiversity and the integrated local environmental management including the ecosystem preservation.

  • PDF

Bounds on the Overflow Probability in Jackson Networks

  • Lee Jiyeon
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2000.11a
    • /
    • pp.109-113
    • /
    • 2000
  • We consider the probability that the total population of a Jackson network exceeds a given large value. By using the relation to the stationary distribution, we derive upper and lower bounds on this probability. These bounds imply the stronger logarithmic limit than that in Glasserman and Kou(1995) when several nodes have the same maximal load.

  • PDF

혼합조립라인에 있어서 투입순서결정을 위한 신경망 모형

  • 김만수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.04a
    • /
    • pp.737-740
    • /
    • 1996
  • This paper suggests a boltzman machine neural network model to determine model input sequences in line balancing process of mixed model assembly line. We first present a proper energy function, next determine the value of parameters using simulation process.

  • PDF

The Effects of Information Transfer of Personal Information Security Breaches (개인정보 유출의 정보전이 효과)

  • Park, Sang-Soo;Lee, Hyun-Chul
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.193-224
    • /
    • 2018
  • Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.

Development of a Neural Network for Optimization and Its Application to Assembly Line Balancing

  • Hong, Dae-Sun;Ahn, Byoung-Jae;Shin, Joong-Ho;Chung, Won-Jee
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.587-591
    • /
    • 2003
  • This study develops a neural network for solving optimization problems. Hopfield network has been used for such problems, but it frequently gives abnormal solutions or non-optimal solutions. Moreover, it takes much time for solving a solution. To overcome such disadvantages, this study adopts a neural network whose output nodes change with a small value at every evolution, and the proposed neural network is applied to solve ALB (Assembly Line Balancing) problems . Given a precedence diagram and a required number of workstations, an ALB problem is solved while achieving even distribution of workload among workstations. Here, the workload variance is used as the index of workload deviation, and is reflected to an energy function. The simulation results show that the proposed neural network yields good results for solving ALB problems with high success rate and fast execution time.

  • PDF