• Title/Summary/Keyword: system-identification methods

Search Result 939, Processing Time 0.031 seconds

Reviews in Infrared Spectroscopy and Computational Chemistry to Reveal Rhizospheric Interactions among Organic Acids, Oxyanions and Metal oxides: Fundamental Principles and Spectrum Processing (유기산, 산화음이온 및 금속 산화물 간의 근권 내 상호작용 연구를 위한 계산화학과 적외선 분광학에 관한 총설: 기본적인 원리와 스펙트럼 처리)

  • Han, Junho;Ro, Hee-Myong
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.39 no.7
    • /
    • pp.426-439
    • /
    • 2017
  • This review summarizes advantage and limitation in infrared spectroscopy and computational chemistry to understand rhizospheric interaction among organic acids, oxyanions and metal oxides. Since organic acids and metal oxides determine dynamics of oxyanions in the soil environment, knowledge of fundamental mechanisms is a prerequisite for understanding the interactions at soil-water interface. Attenuated total reflectance-fourier transform infrared spectroscopy (ATR-FTIR) is a powerful tool to measure the interfacial reactions. However, the ATR-FTIR measurements are abstruse, because the optical characteristics for measurements are variable depending on the experimental setup. In addition, spectral overlapping is a primary obstacle to the analysis of the interfacial reaction; thus, it is essential to detect and to deconvolute bands for signal interpretation. In this review, we expained the fundamental principle for spectrum processing, and four band identification methods, such as derivative spectroscopy, two-dimension correlation spectroscopy, multivariate curve resolution, and computational chemistry with example of aqueous phosphate speciation. As a result, spectrum processing and computational chemistry improved interpretation and spectral deconvolution of overlapped spectra in relatively simple systems, but it was still unsatisfactory for the problems in more complexed system like nature. Nevertheless, we believed that our challenge would contribute practically to develop adequate analytical procedure, signal processing and protocols that could help to improve interpretation and to understand the interfacial interactions of oxyanions in natural systems.

Building Knowledge Graph of the Korea Administrative District for Interlinking Public Open Data (공공데이터의 의미적 연계를 위한 행정구역 지식 그래프 구축)

  • Kim, Haklae
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.12
    • /
    • pp.1-10
    • /
    • 2017
  • Open data has received a lot of attention from around the world. The Korean government is also making efforts to open government data. However, despite the quantitative increase in public data, the lack of data is still pointed out. This paper proposes a method to improve data sharing and utilization by semantically linking public data. First, we propose a knowledge model for expressing administrative districts and their semantic relationships in Korea. An administrative district is an administrative unit that divides the territory of a nation, which is a unit of politics, according to the purpose of the state administration. The knowledge model of the administrative district defines the structure of the administrative district system and the relationship between administrative units based on the Local Autonomy Act. Second, a knowledge graph of the administrative districts is introduced. As a reference information to link public open data at a semantic level, some characteristics of a knowledge graph of administrative districts and methods for linking heterogeneous public open data and improving data quality are addressed. Finally, some use cases are addressed for interlinking between the knowledge graph of the administrative districts and public open data. In particular, national administrative organisations are interlinked with the knowledge graph, and it demonstrates how the knowledge graph can be utilised for improving data identification and data quality.

Proposal of Security Orchestration Service Model based on Cyber Security Framework (사이버보안 프레임워크 기반의 보안 오케스트레이션 서비스 모델 제안)

  • Lee, Se-Ho;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.618-628
    • /
    • 2020
  • The purpose of this paper is to propose a new security orchestration service model by combining various security solutions that have been introduced and operated individually as a basis for cyber security framework. At present, in order to respond to various and intelligent cyber attacks, various single security devices and SIEM and AI solutions that integrate and manage them have been built. In addition, a cyber security framework and a security control center were opened for systematic prevention and response. However, due to the document-oriented cybersecurity framework and limited security personnel, the reality is that it is difficult to escape from the control form of fragmentary infringement response of important detection events of TMS / IPS. To improve these problems, based on the model of this paper, select the targets to be protected through work characteristics and vulnerable asset identification, and then collect logs with SIEM. Based on asset information, we established proactive methods and three detection strategies through threat information. AI and SIEM are used to quickly determine whether an attack has occurred, and an automatic blocking function is linked to the firewall and IPS. In addition, through the automatic learning of TMS / IPS detection events through machine learning supervised learning, we improved the efficiency of control work and established a threat hunting work system centered on big data analysis through machine learning unsupervised learning results.

Automated Schedulability-Aware Mapping of Real-Time Object-Oriented Models to Multi-Threaded Implementations (실시간 객체 모델의 다중 스레드 구현으로의 스케줄링을 고려한 자동화된 변환)

  • Hong, Sung-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.174-182
    • /
    • 2002
  • The object-oriented design methods and their CASE tools are widely used in practice by many real-time software developers. However, object-oriented CASE tools require an additional step of identifying tasks from a given design model. Unfortunately, it is difficult to automate this step for a couple of reasons: (1) there are inherent discrepancies between objects and tasks; and (2) it is hard to derive tasks while maximizing real-time schedulability since this problem makes a non-trivial optimization problem. As a result, in practical object-oriented CASE tools, task identification is usually performed in an ad-hoc manner using hints provided by human designers. In this paper, we present a systematic, schedulability-aware approach that can help mapping real-time object-oriented models to multi-threaded implementations. In our approach, a task contains a group of mutually exclusive transactions that may possess different periods and deadline. For this new task model, we provide a new schedulability analysis algorithm. We also show how the run-time system is implemented and how executable code is generated in our frame work. We have performed a case study. It shows the difficulty of task derivation problem and the utility of the automated synthesis of implementations as well as the Inappropriateness of the single-threaded implementations.

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

Online Document Mining Approach to Predicting Crowdfunding Success (온라인 문서 마이닝 접근법을 활용한 크라우드펀딩의 성공여부 예측 방법)

  • Nam, Suhyeon;Jin, Yoonsun;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.45-66
    • /
    • 2018
  • Crowdfunding has become more popular than angel funding for fundraising by venture companies. Identification of success factors may be useful for fundraisers and investors to make decisions related to crowdfunding projects and predict a priori whether they will be successful or not. Recent studies have suggested several numeric factors, such as project goals and the number of associated SNS, studying how these affect the success of crowdfunding campaigns. However, prediction of the success of crowdfunding campaigns via non-numeric and unstructured data is not yet possible, especially through analysis of structural characteristics of documents introducing projects in need of funding. Analysis of these documents is promising because they are open and inexpensive to obtain. We propose a novel method to predict the success of a crowdfunding project based on the introductory text. To test the performance of the proposed method, in our study, texts related to 1,980 actual crowdfunding projects were collected and empirically analyzed. From the text data set, the following details about the projects were collected: category, number of replies, funding goal, fundraising method, reward, number of SNS followers, number of images and videos, and miscellaneous numeric data. These factors were identified as significant input features to be used in classification algorithms. The results suggest that the proposed method outperforms other recently proposed, non-text-based methods in terms of accuracy, F-score, and elapsed time.

Comparison of landmark position between conventional cephalometric radiography and CT scans projected to midsagittal plane (3차원 CT자료에서 선정된 계측점을 정중시상면으로 투사한 영상과 두부계측방사선사진상의 계측정의 위치 비교)

  • Park, Jae-Woo;Kim, Nam-Kug;Chang, Young-Il
    • The korean journal of orthodontics
    • /
    • v.38 no.6
    • /
    • pp.427-436
    • /
    • 2008
  • Objective: The purpose of this study is to compare landmark position between cephalometric radiography and midsagittal plane projected images from 3 dimensional (3D) CT. Methods: Cephalometric radiographs and CT scans were taken from 20 patients for treatment of mandibular prognathism. After selection of land-marks, CT images were projected to the midsagittal plane and magnified to 110% according to the magnifying power of radiographs. These 2 images were superimposed with frontal and occipital bone. Common coordinate system was established on the base of FH plane. The coordinate value of each landmark was compared by paired t test and mean and standard deviation of difference was calculated. Results: The difference was from $-0.14{\pm}0.65$ to $-2.12{\pm}2.89\;mm$ in X axis, from $0.34{\pm}0.78$ to $-2.36{\pm}2.55\;mm$ ($6.79{\pm}3.04\;mm$) in Y axis. There was no significant difference only 9 in X axis, and 7 in Y axis out of 20 landmarks. This might be caused by error from the difference of head positioning, by masking the subtle end structures, identification error from the superimposition and error from the different definition.

Detection of Mycobacterium Tuberculosis by In Situ Hybridization (조직내교잡법을 이용한 결핵균의 검출)

  • Park, Chang-Soo;Kim, Young-Chul;Lee, Jee-Shin;Jung, Jong-Jae;Kim, Doo-Hong;Kim, Jin
    • Tuberculosis and Respiratory Diseases
    • /
    • v.48 no.5
    • /
    • pp.699-708
    • /
    • 2000
  • Background : A presumptive histopathologic diagnosis of tuberculosis is commonly based on the finding of acid-fast bacilli upon microscopic examination of a diagnostic specimens. Although this traditional histochemical staining method is satisfactory, it is time-consuming and not species-specific. For more specific assessment, in situ hybridization assay with oligonucleotide probes is introduced. Methods : The human surgical specimens were obtained from tuberculosis patients, and experimental specimens were made by injecting cultured M. tuberculosis organisms into fresh rat liver. Oligonucleotide probes complementary to ribosomal RNA portion were synthesized and labeled with multiple biotin molecules. For a rapid detection, all procedures were carried out using manual capillary action technology on the Microprobe staining system. Results : The in situ hybridization assay produced a positive reaction in experimental specimens (80-90% sensitivity) after pepsin-HCl pre-treatment for a good permeabilization of probes, but reliable result was not obtained from human surgical specimens. Conclusion : It is, therefore, suggested that biotin-labeled oligonucleotide probes have considerable potential for identification and in situ detection of M. tuberculosis but, there are some barriers to overcome for the diagnostic use of this method.

  • PDF

Book Genre Visualization based on Genre Identification Algorithm (장르 판별 알고리즘을 이용한 책 장르 시각화)

  • Kim, Hyo-Young;Park, Jin-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.5
    • /
    • pp.52-61
    • /
    • 2012
  • Text visualization is one of sectors in data visualization. This study is on methods to visually represent text's contents, structure, and form aspects based on various analytic techniques about wide range of text data. In this study -as a text visualization study-, 1) a method to find out the characteristics of a book's genre using words in the text of the book was looked into, 2) elements of visualization of a book's genre based on verification through an experiment were drew, and 3) the ways to intuitionally and efficiently visualize this were explained. According to visualization suggested by this study, first, actual genre of a book can be understood based on words used in the book. Second, with which genre is closed to the book can be found out with one glance through images of visualization. Moreover, the characteristics of complicated genres included in a book can be understood. Furthermore, the level of closeness (similarity) of a genre -which is found to be a representative genre using the number of dots, curvature of a curve, and brightness in the image- can be assumed. Finally, the outcome of this study can be used for a variety of fields including book customizing service such as a book recommendation system that provides images of personal preference books or genres through application of books favored by individual customers.

Screening for Lynch Syndrome in Young Colorectal Cancer Patients from Saudi Arabia Using Microsatellite Instability as the Initial Test

  • Alqahtani, Masood;Grieu, Fabienne;Carrello, Amerigo;Amanuel, Benhur;Mashour, Miral;Alattas, Rabab;Al-Saleh, Khalid;Alsheikh, Abdulmalik;Alqahtani, Sarah;Iacopetta, Barry
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.4
    • /
    • pp.1917-1923
    • /
    • 2016
  • Background: Lynch Syndrome (LS) is a familial cancer condition caused by germline mutations in DNA mismatch repair genes. Individuals with LS have a greatly increased risk of developing colorectal cancer (CRC) and it is therefore important to identify mutation carriers so they can undergo regular surveillance. Tumor DNA from LS patients characteristically shows microsatellite instability (MSI). Our aim here was to screen young CRC patients for MSI as a first step in the identification of unrecognized cases of LS in the Saudi population. Materials and Methods: Archival tumor tissue was obtained from 284 CRC patients treated at 4 institutes in Dammam and Riyadh between 2006 and 2015 and aged less than 60 years at diagnosis. MSI screening was performed using the BAT-26 microsatellite marker and positive cases confirmed using the pentaplex MSI analysis system. Positive cases were screened for BRAF mutations to exclude sporadic CRC and were evaluated for loss of expression of 4 DNA mismatch repair proteins using immunohistochemistry. Results: MSI was found in 33/284 (11.6%) cases, of which only one showed a BRAF mutation. Saudi MSI cases showed similar instability in the BAT-26 and BAT-25 markers to Australian MSI cases, but significantly lower frequencies of instability in 3 other microsatellite markers. Conclusions: MSI screening of young Saudi CRC patients reveals that approximately 1 in 9 are candidates for LS. Patients with MSI are strongly recommended to undergo genetic counselling and germline mutation testing for LS. Other affected family members can then be identified and offered regular surveillance for early detection of LS-associated cancers.