• Title/Summary/Keyword: system identification

Search Result 5,859, Processing Time 0.035 seconds

Generation of a Specific Marker to Discriminate Bacillus anthracis from Other Bacteria of the Bacillus cereus Group

  • Kim, Hyoung-Tai;Seo, Gwi-Moon;Jung, Kyoung-Hwa;Kim, Seong-Joo;Kim, Jee-Cheon;Oh, Kwang-Geun;Koo, Bon-Sung;Chai, Young-Gyu
    • Journal of Microbiology and Biotechnology
    • /
    • v.17 no.5
    • /
    • pp.806-811
    • /
    • 2007
  • Bacillus anthracis is a soil pathogen capable of causing anthrax that is closely related to several environmental species, including B. cereus, B. mycoides, and B. thuringiensis. DNA homology studies showed that B. anthracis, B. cereus, B. mycoides, and B. thuringiensis are closely related, with a high sequence homology. To establish a method to specifically detect B. anthracis in situations such as environmental contamination, we initially performed RAPD-PCR with a 10-mer random primer and confirmed the presence of specific PCR bands only in B. anthracis species. One region specific for B. anthracis was cloned and sequenced, and an internal primer set was designed to amplify a 241-bp DNA fragment within the sequenced region. The PCR system involving these specific primer sets has practical applications. Using lyses methods to prepare the samples for PCR, it was possible to quickly amplify the 241-bp DNA segment from samples containing only a few bacteria. Thus, the PCR detection method developed in this study is expected to facilitate the monitoring of environmental B. anthracis contamination.

A Study on Data Recording and Play Method between Tactical Situations to Ensure Data Integrity with Data Link Processor Based on Multiple Data Links (다중데이터링크 기반에서 데이터링크 처리기와의 데이터 무결성 보장을 위한 전술상황전시기 간 데이터 기록 및 재생 방법 연구)

  • Lee, Hyunju;Jung, Eunmi;Lee, Sungwoo;Yeom, Jaegeol;Kim, Sangjun;Park, Jihyeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.13-25
    • /
    • 2017
  • Recently, the high performance of tactical situation display console and tactical data links are used to integrate the operational situations in accordance with information age and NCW (Network Centric Warfare). The tendency to maximize the efficiency of task execution has been developed by sharing information and the state of the battle quickly through complex and diverse information exchange. Tactical data link is a communication system that shares the platform with core components of weapons systems and battlefield situation between the command and control systems to perform a Network Centric Warfare and provides a wide range of tactical data required for decision-making and implementation.It provides the tactical information such as tactical information such as operational information, the identification of the peer, and the target location in real time or near real time in the battlefield situation, and it is operated for the exchange of mass tactical information between the intellectuals by providing common situation recognition and cooperation with joint operations. In this study, still image management, audio file management, tactical screen recording and playback using the storage and playback, NITF (National Imagery Transmission Format) message received from the displayer integrates the tactical situation in three dimensions according to multiple data link operation to suggest ways to ensure data integrity between the data link processor during the entire operation time.

Pre-Processing of Query Logs in Web Usage Mining

  • Abdullah, Norhaiza Ya;Husin, Husna Sarirah;Ramadhani, Herny;Nadarajan, Shanmuga Vivekanada
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.1
    • /
    • pp.82-86
    • /
    • 2012
  • In For the past few years, query log data has been collected to find user's behavior in using the site. Many researches have studied on the usage of query logs to extract user's preference, recommend personalization, improve caching and pre-fetching of Web objects, build better adaptive user interfaces, and also to improve Web search for a search engine application. A query log contain data such as the client's IP address, time and date of request, the resources or page requested, status of request HTTP method used and the type of browser and operating system. A query log can offer valuable insight into web site usage. A proper compilation and interpretation of query log can provide a baseline of statistics that indicate the usage levels of website and can be used as tool to assist decision making in management activities. In this paper we want to discuss on the tasks performed of query logs in pre-processing of web usage mining. We will use query logs from an online newspaper company. The query logs will undergo pre-processing stage, in which the clickstream data is cleaned and partitioned into a set of user interactions which will represent the activities of each user during their visits to the site. The query logs will undergo essential task in pre-processing which are data cleaning and user identification.

A Study on Polynomial Neural Networks for Stabilized Deep Networks Structure (안정화된 딥 네트워크 구조를 위한 다항식 신경회로망의 연구)

  • Jeon, Pil-Han;Kim, Eun-Hu;Oh, Sung-Kwun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1772-1781
    • /
    • 2017
  • In this study, the design methodology for alleviating the overfitting problem of Polynomial Neural Networks(PNN) is realized with the aid of two kinds techniques such as L2 regularization and Sum of Squared Coefficients (SSC). The PNN is widely used as a kind of mathematical modeling methods such as the identification of linear system by input/output data and the regression analysis modeling method for prediction problem. PNN is an algorithm that obtains preferred network structure by generating consecutive layers as well as nodes by using a multivariate polynomial subexpression. It has much fewer nodes and more flexible adaptability than existing neural network algorithms. However, such algorithms lead to overfitting problems due to noise sensitivity as well as excessive trainning while generation of successive network layers. To alleviate such overfitting problem and also effectively design its ensuing deep network structure, two techniques are introduced. That is we use the two techniques of both SSC(Sum of Squared Coefficients) and $L_2$ regularization for consecutive generation of each layer's nodes as well as each layer in order to construct the deep PNN structure. The technique of $L_2$ regularization is used for the minimum coefficient estimation by adding penalty term to cost function. $L_2$ regularization is a kind of representative methods of reducing the influence of noise by flattening the solution space and also lessening coefficient size. The technique for the SSC is implemented for the minimization of Sum of Squared Coefficients of polynomial instead of using the square of errors. In the sequel, the overfitting problem of the deep PNN structure is stabilized by the proposed method. This study leads to the possibility of deep network structure design as well as big data processing and also the superiority of the network performance through experiments is shown.

Mobile Device and Virtual Storage-Based Approach to Automatically and Pervasively Acquire Knowledge in Dialogues (모바일 기기와 가상 스토리지 기술을 적용한 자동적 및 편재적 음성형 지식 획득)

  • Yoo, Kee-Dong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.1-17
    • /
    • 2012
  • The Smartphone, one of essential mobile devices widely used recently, can be very effectively applied to capture knowledge on the spot by jointly applying the pervasive functionality of cloud computing. The process of knowledge capturing can be also effectively automated if the topic of knowledge is automatically identified. Therefore, this paper suggests an interdisciplinary approach to automatically acquire knowledge on the spot by combining technologies of text mining-based topic identification and cloud computing-based Smartphone. The Smartphone is used not only as the recorder to record knowledge possessor's dialogue which plays the role of the knowledge source, but also as the sensor to collect knowledge possessor's context data which characterize specific situations surrounding him or her. The support vector machine, one of well-known outperforming text mining algorithms, is applied to extract the topic of knowledge. By relating the topic and context data, a business rule can be formulated, and by aggregating the rule, the topic, context data, and the dictated dialogue, a set of knowledge is automatically acquired.

Establishment for Efficiency Air-To-Ground Air Operation Model in Link-16 (Link-16 기반의 효율적인 공대지 항공작전 모델 설계)

  • Lee, Hyeong-Heon;Jang, Hyeong-Jun;Kim, Yeong-Gu;Lim, Jae-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.861-868
    • /
    • 2010
  • As CAS, X-ATK, and INT models considered as the most typical Air-to-Ground operation models in ROKAF are mainly designed as the voice-centered system between aircraft and ground control facilities, it is critical to newly develop the Link-16 based model for the ROK-US combined operation between F-15K, AWACS, M-SAM, and KDX-III equipped with Link-16. Former studies had been limited to the CAS operation, and they had mainly focused on reducing the voice transmission time to exchange the information between each mission step with maintaining existing operation steps. Therefore, this paper makes up the weak point in former studies, thereby designing new Air-to-Ground operation model for CAS, X-ATK, INT mission using Enterprise Architecture OV6c, which enables both aircraft and ground control facilities or between aircraft to obtain the real-time information on the location, identification, armament and the real-time image data through the broadcasting function. Based on the analysis of new operation model, we come to a conclusion that by simultaneously exchanging the information on mission between nodes concerned through the broadcasting function of Link-16. It is possible to cut down superfluous steps among the mission steps, and to reduce the mission time. It is clear that it gives rise to improve the battle efficiency and the decision-making tempo as well as the battlefield situational awareness.

The data transmission of the of u-ID sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-ID센서네트워크 구성에서의 데이터 전송)

  • 김영길;박지훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.45-48
    • /
    • 2004
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. this paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server

  • PDF

An Identify of Two Step Stagger Signals Using the Second Deviation of Pulse Train (펄스열의 2차 차분을 이용한 2단 stagger 신호 식별)

  • Lim, Joong-Soo;Hong, Kyung-Ho;Lee, Duk-Yung;Shin, Dong-Hoon;Kim, Yong-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.7
    • /
    • pp.1536-1541
    • /
    • 2009
  • In this paper, we present a novel pulse train identification method for two step stagger pulse train. Generally radar uses a fixed pulse train, and it is easy for electronic warfare system to measure the pulse repeat interval(PRI) and identify the radar. But it is very difficult to measure the PRI of stagger pulse radar because the pulse interval is periodically changed. We suggest a novel method to measure the PRI and identify the radars using the second deviation of pulse train. This method is faster comparing with Histogram method. We have a good PRI measurement results for 2 step stagger signals.

AUTOMATIC PRECISION CORRECTION OF SATELLITE IMAGES

  • Im, Yong-Jo;Kim, Tae-Jung
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.40-44
    • /
    • 2002
  • Precision correction is the process of geometrically aligning images to a reference coordinate system using GCPs(Ground Control Points). Many applications of remote sensing data, such as change detection, mapping and environmental monitoring, rely on the accuracy of precision correction. However it is a very time consuming and laborious process. It requires GCP collection, the identification of image points and their corresponding reference coordinates. At typical satellite ground stations, GCP collection requires most of man-powers in processing satellite images. A method of automatic registration of satellite images is demanding. In this paper, we propose a new algorithm for automatic precision correction by GCP chips and RANSAC(Random Sample Consensus). The algorithm is divided into two major steps. The first one is the automated generation of ground control points. An automated stereo matching based on normalized cross correlation will be used. We have improved the accuracy of stereo matching by determining the size and shape of match windows according to incidence angle and scene orientation from ancillary data. The second one is the robust estimation of mapping function from control points. We used the RANSAC algorithm for this step and effectively removed the outliers of matching results. We carried out experiments with SPOT images over three test sites which were taken at different time and look-angle with each other. Left image was used to select UP chipsets and right image to match against GCP chipsets and perform automatic registration. In result, we could show that our approach of automated matching and robust estimation worked well for automated registration.

  • PDF

A Study on Consciousness & Value of Sexuality of Elementary School Children (초등학교 학생들의 성 의식 및 가치관에 관한 연구)

  • Lee, Hae-Yun;Park, Young-Soo
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.2 no.1
    • /
    • pp.53-65
    • /
    • 2001
  • The purposes of this study were to collect basic data on education of Sexuality(Health education) of consciousness & value of sexuality of elementary school children. 584,6th grade students in elementary school in Yong-In city were analysed and the results are as follow; 1. Knowledges of sexuality for children was at a average level, especially "physical change of puberty" and "sexual violence" were well recognized but "the physical characteristics of male & female" and "physiological phenomena of men" were less recognized. Attitudes of sexuality were positive for "relationship with partners" and "expression of mind". Practices of sexuality were at a low rate in the case of "shaking hands with partner" and "experience of sexual behavior". The Value of sexuality was at a high rates in the case of "the role of sex", "equality" & "self-identification", therefore students need good education of sexuality from childhood 2. Sexuality education of students increased knowledges of sexuality as a consciousness. There was no relationship between attitudes and pratices of sexuality. Educated children valued sexuality move highly than uneducated children. This result shows that education is needed with regard to both the knowledge and value of sexuality in a planned system. We need some program to provide more information on sexual attitudes and practices. 3. There was a high correlation between the consciousness of sexuality and value placed on it. As sexual awareness increases amongst students codes of morality develop Positive sexual attitudes served as good role models for sex. In particular positive sexual attitudes have a big effect on sexual values. In addition, as sexual awareness and attitude increase amongst students the role of sexual development. The elementary school phase sexual values are developed and determined. It is therefore an important phase.

  • PDF