• Title/Summary/Keyword: sub network

Search Result 1,495, Processing Time 0.027 seconds

중학생의 SNS 상향비교가 우울에 미치는 영향: 자기비하의 매개 효과와 인지적 유연성의 조절된 매개효과 (Effect of Upward Social Comparison in SNS on Depression among Middle School Students: The Mediating Effect of Self-Deprecation and the Moderated Mediating Effect of Cognitive Flexibility)

  • 이세영;박주희
    • Human Ecology Research
    • /
    • 제59권3호
    • /
    • pp.353-367
    • /
    • 2021
  • The purpose of this study was to examine the mediating effect of middle school students'self-deprecation in the relationship between upward social comparison in social network service (SNS) and depression and the moderated mediating effect of cognitive flexibility. The participants were 288 middle school students, in the first to third grades from four middle schools located in Seoul, Gyeong-gi, and Jeonnam. The date were analyzed with descriptive statistics, Pearson's correlation coefficients and the Process Macro Model 4, 1, and 14. The results of this study are as follows. First, an upward comparison in SNS has a significant positive influence on students'depression, and students' self-deprecation of students mediated the relation between two. Second, the level of control, which is a sub-factor of cognitive flexibility, moderated the mediating effect of self-deprecation. That is, if students are more likely to perceive difficult situations as controllable, upward social comparison in SNS mediated by self-deprecation has smaller effect on depression. Based on these results, we suggest practical interventions to reduce depression among middle school students by decreasing upward social comparison in SNS and self-deprecation. In addition, helping students perceive difficult situations as controllable could be another effective way of reducing depression among those students who have a high level of self-deprecation in upward social comparison in SNS.

COVID-19 폐 CT 이미지 인식 (COVID-19 Lung CT Image Recognition)

  • 수징제;김강철
    • 한국전자통신학회논문지
    • /
    • 제17권3호
    • /
    • pp.529-536
    • /
    • 2022
  • 지난 2년 동안 중증급성호흡기증후군 코로나바이러스-2(SARS-CoV-2)는 점점 더 많은 사람들에게 영향을 미치고 있다. 본 논문에서는 COVID-19 폐 CT 이미지를 분할하고 분류하기 위해서 서브코딩블록(SCB), 확장공간파라미드풀링(ASSP)와 어텐션게이트(AG)로 구성된 혼합 모드 특징 추출 방식의 새로운 U-Net 컨볼루션 신경망을 제안한다. 그리고 제안된 모델과 비교하기 위하여 FCN, U-Net, U-Net-SCB 모델을 설계한다. 제안된 U-Net-MMFE 는 COVID-19 CT 스캔 디지털 이미지 데이터에 대하여 atrous rate가 12이고, Adam 최적화 알고리즘을 사용할 때 다른 분할 모델에 비하여 94.79%의 우수한 주사위 분할 점수를 얻었다.

저궤도 위성 원격측정데이터 신호 수신을 위한 S-대역 위상배열안테나 시스템 연구 (A Study on S-Band Phased Array Antenna System for Receiving LEO Satellite Telemetry Signals)

  • 이동효;서정원;이명신;정대원;이동국;표성민
    • 전기전자학회논문지
    • /
    • 제26권2호
    • /
    • pp.211-218
    • /
    • 2022
  • 본 논문에서는 저궤도 위성 원격측정데이터 신호 수신을 위한 S-대역 위상배열안테나를 제안하였다. 제안된 안테나는 16개의 부배열 조립체, 16개의 능동회로모듈, 수직 급전회로망 및 제어/전원반으로 구성되며 고각 방향으로 빔틸트가 수행된다. 개발된 안테나는 고각 축과 위성 궤적을 일치시키고 개구 중심을 위성 궤적 상의 최대 고각을 바라보도록 하여 정밀한 위성 추적을 수행하였다. 저궤도 위성의 궤적은 위성점 계산을 통하여 정확하게 산출하였다. 위성 추적 시험은 최대 고각을 기준으로 ±30° 범위에서 수행되였다. 위성 추적 시험 결과 최대 고각에서의 S/N비는 16.5 dB이고 Eb/No는 13.3 dB를 얻었다. 수행된 위성 추적 결과는 사전 시스템 분석 결과와 잘 일치함을 확인하였다.

마스터 노드 네트워크를 사용한 블록체인 익명 투표 모델 (Anonymous Blockchain Voting Model using the Master Node Network)

  • 조재한;이이섭;최창훈
    • 한국산학기술학회논문지
    • /
    • 제22권5호
    • /
    • pp.394-402
    • /
    • 2021
  • 전자 투표 시스템은 90년대 중반부터 세계 많은 국가들에서 널리 활용되고 있다. 최근에는 유권자들에게 신뢰성, 공정성, 그리고 투명성을 제공하기 위해 기존의 전자 투표 시스템에 블록체인을 적용하는 연구가 진행되어 왔다. 이 방식은 분산형 시민 참여를 촉진하는 기술로 유용성이 높다. 그러나 기존의 블록체인을 이용한 전자 투표 시스템들이 익명성을 충분하게 제공하지 못하고 있다. 익명성 부족은 분산형 시민 참여에서 많이 요구되는 중소규모의 투표의 경우에 중요한 제약 조건으로 작용하고 있다. 본 연구에서는 대시코인의 마스터 노드의 개념을 응용하여 블록체인을 사용한 투표시스템에 익명성을 제공하는 모델을 제안하였다. 먼저 블록체인에서의 송금과 투표 시스템의 요구사항에 대한 차이점들을 정의하였다. 블록체인 즉 탈중앙화 개발 환경에서 익명성을 제공하기 위한 병행적이고 자율적인 모델과 알고리즘을 제안하였다. 또한 제안된 모델에 대한 보안성과 운영 환경에 대한 논의를 기술하였다.

GaN/Si 기반 60nm 공정을 이용한 고출력 W대역 전력증폭기 (High Power W-band Power Amplifier using GaN/Si-based 60nm process)

  • 황지혜;김기진;김완식;한재섭;김민기;강봉모;김기철;최증원;박주만
    • 한국인터넷방송통신학회논문지
    • /
    • 제22권4호
    • /
    • pp.67-72
    • /
    • 2022
  • 본 논문에서는 60 nm GaN/Si HEMT 공정을 사용하여 전력증폭기(Power Amplifier)의 설계를 제시하였다. 고주파 설계를 위하여 맞춤형 트랜지스터 모델을 구성하였다. Output stage는 저손실 설계를 위해 마이크로스트립 라인을 사용하여 회로를 구성하였다. 또한 RC 네트워크로 구성된 Bias Feeding Line과 Input bypass 회로의 AC Ground(ACGND) 회로를 각각 적용하여 DC 소스에 연결된 노드의 최소임피던스가 RF회로에 영향을 미치지 않도록 하였다. 이득과 출력을 고려하여 3단의 구조로 설계되었다. 설계된 전력증폭기의 최종 사이즈는 3900 ㎛ × 2300 ㎛ 이다. 중심 주파수에서 설계된 결과는 12 V의 공급 전압에서 15.9 dB의 소 신호 이득, 29.9 dBm의 포화 출력(Psat), 24.2 %의 PAE를 달성하였다.

Enhancing Recommender Systems by Fusing Diverse Information Sources through Data Transformation and Feature Selection

  • Thi-Linh Ho;Anh-Cuong Le;Dinh-Hong Vu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권5호
    • /
    • pp.1413-1432
    • /
    • 2023
  • Recommender systems aim to recommend items to users by taking into account their probable interests. This study focuses on creating a model that utilizes multiple sources of information about users and items by employing a multimodality approach. The study addresses the task of how to gather information from different sources (modalities) and transform them into a uniform format, resulting in a multi-modal feature description for users and items. This work also aims to transform and represent the features extracted from different modalities so that the information is in a compatible format for integration and contains important, useful information for the prediction model. To achieve this goal, we propose a novel multi-modal recommendation model, which involves extracting latent features of users and items from a utility matrix using matrix factorization techniques. Various transformation techniques are utilized to extract features from other sources of information such as user reviews, item descriptions, and item categories. We also proposed the use of Principal Component Analysis (PCA) and Feature Selection techniques to reduce the data dimension and extract important features as well as remove noisy features to increase the accuracy of the model. We conducted several different experimental models based on different subsets of modalities on the MovieLens and Amazon sub-category datasets. According to the experimental results, the proposed model significantly enhances the accuracy of recommendations when compared to SVD, which is acknowledged as one of the most effective models for recommender systems. Specifically, the proposed model reduces the RMSE by a range of 4.8% to 21.43% and increases the Precision by a range of 2.07% to 26.49% for the Amazon datasets. Similarly, for the MovieLens dataset, the proposed model reduces the RMSE by 45.61% and increases the Precision by 14.06%. Additionally, the experimental results on both datasets demonstrate that combining information from multiple modalities in the proposed model leads to superior outcomes compared to relying on a single type of information.

사이버 전장인식을 위한 작전상태 요소 식별 및 통합 시계열 분석 연구 (A Study on Operational Element Identification and Integrated Time Series Analysis for Cyber Battlefield Recognition)

  • 김선영;권구형;이현진;이재연;고장혁;오행록
    • 융합보안논문지
    • /
    • 제22권4호
    • /
    • pp.65-73
    • /
    • 2022
  • 사이버 작전은 가상의 사이버 전장 환경에서 수행되기 때문에, 지휘관이 사이버작전의 의사결정을 효과적으로 지원하기 위해서는 사이버 환경의 현황을 일관된 형태로 평가하고 가시화할 수 있는 평가지표를 정의하고 이를 측정할 수 있는 기술의 개발이 요구된다. 본 논문에서는 사이버 전장에서 수집할 수 있는 다양한 평가지표를 정의하고 이를 정규화하는 방법과 사이버 현황을 일관된 형태로 평가할 수 있는 기술을 제안한다. 제안하는 사이버 전장 상태 요소들의 통합 시계열 분석 및 도시 기술은 최상위에 정규화된 평가지표가 있으며, 해당 지표는 사이버 자산 관련 지표, 평가 대상망 관련 지표, 사이버 위협 관련 지표로 구성되는 각각의 지표들은 6개의 하위 지표를 가진다. 해당 지표들은 지휘관의 관심 영역에 따라 가중치를 부여하여 활용될 수 있고, 사이버 전장의 전체적인 현황을 파악할 수 있어 사이버 작전을 수행하는데 필요한 상황인식에 활용될 수 있을 것으로 예상된다.

Deep Learning-based Rheometer Quality Inspection Model Using Temporal and Spatial Characteristics

  • Jaehyun Park;Yonghun Jang;Bok-Dong Lee;Myung-Sub Lee
    • 한국컴퓨터정보학회논문지
    • /
    • 제28권11호
    • /
    • pp.43-52
    • /
    • 2023
  • 고무생산업체에서 생산된 고무는 레오미터 측정을 통해 품질 적합성 검사가 이루어진 후, 자동차 부품을 위한 2차 가공으로 이어진다. 그러나 레오미터 검사는 인간에 의해 진행되고 있으며, 숙련된 작업자에게 매우 의존적이라는 단점이 존재한다. 이러한 문제점을 해결하기 위해 본 논문에서는 딥러닝 기반 레오미터 품질 검사 시스템을 제안한다. 제안된 시스템은 레오미터의 시간적, 공간적 특성을 활용하기 위해 LSTM과 CNN을 조합하였고, 각 고무의 배합재료를 보조(Auxiliary) 데이터 입력으로 사용해 하나의 모델에서 다양한 고무 제품의 품질 적합성 검사가 가능하도록 구현하였다. 제안된 기법은 30,000개의 데이터셋으로 그 성능을 학습 및 검사하였으며, 평균 f1-점수를 0.9942 달성하여 그 우수성을 증명하였다.

Unraveling the Web of Health Misinformation: Exploring the Characteristics, Emotions, and Motivations of Misinformation During the COVID-19 Pandemic

  • Vinit Yadav;Yukti Dhadwal;Rubal Kanozia;Shri Ram Pandey;Ashok Kumar
    • Asian Journal for Public Opinion Research
    • /
    • 제12권1호
    • /
    • pp.53-74
    • /
    • 2024
  • The proliferation of health misinformation gained momentum amidst the outbreak of the novel coronavirus disease 2019 (COVID-19). People stuck in their homes, without work pressure, regardless of health concerns towards personal, family, or peer groups, consistently demanded information. People became engaged with misinformation while attempting to find health information content. This study used the content analysis method and analyzed 1,154 misinformation stories from four prominent signatories of the International Fact-Checking Network during the pandemic. The study finds the five main categories of misinformation related to the COVID-19 pandemic. These are 1) the severity of the virus, 2) cure, prevention, and treatment, 3) myths and rumors about vaccines, 4) health authorities' guidelines, and 5) personal and social impacts. Various sub-categories supported the content characteristics of these categories. The study also analyzed the emotional valence of health misinformation. It was found that misinformation containing negative sentiments got higher engagement during the pandemic. Positive and neutral sentiment misinformation has less reach. Surprise, fear, and anger/aggressive emotions highly affected people during the pandemic; in general, people and social media users warning people to safeguard themselves from COVID-19 and creating a confusing state were found as the primary motivation behind the propagation of misinformation. The present study offers valuable perspectives on the mechanisms underlying the spread of health-related misinformation amidst the COVID-19 outbreak. It highlights the significance of discerning the accuracy of information and the feelings it conveys in minimizing the adverse effects on the well-being of public health.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.