3,885 research outputs found

    Clustering of Nodes in Layered-Tree Topology for Wireless Sensor Networks

    Get PDF
    Wireless sensor network is composed of a large number of sensor nodes of limited energy resource. The node clustering approach can improve the scalability and lifetime of wireless sensor network. In this paper we propose a novel node clustering protocol based on layered-tree topology for self-organizing distributed wireless sensor networks. It decides optimal number of clusters by employing a new approach for setting threshold value, including the probability of optimum number of cluster-heads and residual energy of the nodes. We also introduce a new scheme for layered-tree construction in each cluster. As a result, the proposed scheme can significantly improve the energy efficiency of the network and increase its lifetime. Computer simulation shows that the proposed scheme effectively reduces and balances the energy consumption of the nodes, and thus significantly extends the network lifetime compared to the existing schemes

    AI Machine Vision based Oven White Paper Color Classification and Label Position Real-time Monitoring System to Check Direction

    Get PDF
    We develop a vision system for batch inspection by oven white paper model color by manufacturing a machine vision system for the oven manufacturing automation process. In the vision system, white paper object detection (spring), color clustering, and histogram extraction are performed. In addition, for the automated process of home appliances, we intend to develop an automatic mold combination detection algorithm that inspects the label position and direction (angle/coordinate) using deep learning

    Consumer Orientations of Second-Hand Shoppers by Store Type: A Profile Analysis

    Get PDF
    Second-hand clothing has long been associated with the used, worn-out, tainted and even odorous, but now consumers believe that used products have quality comparable to new clothes and even some perceive used clothing to be of superior quality than their unworn counterparts. This study examines whether consumer orientations differ among frequent shoppers of three second-hand clothing stores (consignment stores, online stores, and thrift stores). The data were collected via MTurk and consisted of 600 consumers in the US who had purchased second-hand clothing for themselves in the past 12 months. A profile analysis showed that the profiles of consumer groups in supercenters were not parallel. A subsequent ANOVA test showed that the three consumer groups exhibited significant differences in ecological consciousness, dematerialism, nostalgia proneness, and fashion-consciousness. On the contrary, the three groups did not show differences in their consumer orientations in frugality and style-consciousness

    Domain Adaptive Transfer Attack (DATA)-based Segmentation Networks for Building Extraction from Aerial Images

    Full text link
    Semantic segmentation models based on convolutional neural networks (CNNs) have gained much attention in relation to remote sensing and have achieved remarkable performance for the extraction of buildings from high-resolution aerial images. However, the issue of limited generalization for unseen images remains. When there is a domain gap between the training and test datasets, CNN-based segmentation models trained by a training dataset fail to segment buildings for the test dataset. In this paper, we propose segmentation networks based on a domain adaptive transfer attack (DATA) scheme for building extraction from aerial images. The proposed system combines the domain transfer and adversarial attack concepts. Based on the DATA scheme, the distribution of the input images can be shifted to that of the target images while turning images into adversarial examples against a target network. Defending adversarial examples adapted to the target domain can overcome the performance degradation due to the domain gap and increase the robustness of the segmentation model. Cross-dataset experiments and the ablation study are conducted for the three different datasets: the Inria aerial image labeling dataset, the Massachusetts building dataset, and the WHU East Asia dataset. Compared to the performance of the segmentation network without the DATA scheme, the proposed method shows improvements in the overall IoU. Moreover, it is verified that the proposed method outperforms even when compared to feature adaptation (FA) and output space adaptation (OSA).Comment: 11pages, 12 figure

    Momentum-kick model application to high multiplicity pp collisions at s=13TeV\sqrt{s}=13\,\mathrm{TeV} at the LHC

    Full text link
    In this study, the momentum-kick model is used to understand the ridge behaviours in dihadron Δη\Delta\eta--Δφ\Delta\varphi correlations recently reported by the LHC in high-multiplicity proton-proton (pp) collisions. The kick stand model is based on a momentum kick by leading jets to partons in the medium close to the leading jets. The medium where partons move freely is assumed in the model regardless of collision systems. This helps us apply the method to small systems like pp collisions in a simple way. Also, the momentum transfer is purely kinematic and this provides us a strong way to approach the ridge behaviour analytically. There are already several results with this approach in high-energy heavy-ion collisions from the STAR and PHENIX at RHIC and from the CMS at LHC. The momentum-kick model is extended to the recent ridge results in high-multiplicity pp collisions with the ATLAS and CMS at LHC. The medium property in high-multiplicity pp collisions is diagnosed with the result of the model.Comment: 10 pages, 2 tables and 3 figure

    Strangeness-driven Exploration in Multi-Agent Reinforcement Learning

    Full text link
    Efficient exploration strategy is one of essential issues in cooperative multi-agent reinforcement learning (MARL) algorithms requiring complex coordination. In this study, we introduce a new exploration method with the strangeness that can be easily incorporated into any centralized training and decentralized execution (CTDE)-based MARL algorithms. The strangeness refers to the degree of unfamiliarity of the observations that an agent visits. In order to give the observation strangeness a global perspective, it is also augmented with the the degree of unfamiliarity of the visited entire state. The exploration bonus is obtained from the strangeness and the proposed exploration method is not much affected by stochastic transitions commonly observed in MARL tasks. To prevent a high exploration bonus from making the MARL training insensitive to extrinsic rewards, we also propose a separate action-value function trained by both extrinsic reward and exploration bonus, on which a behavioral policy to generate transitions is designed based. It makes the CTDE-based MARL algorithms more stable when they are used with an exploration method. Through a comparative evaluation in didactic examples and the StarCraft Multi-Agent Challenge, we show that the proposed exploration method achieves significant performance improvement in the CTDE-based MARL algorithms.Comment: 9 pages, 7 figure

    Future development strategies for KODISA journals: overview of 2016 and strategic plans for the future

    Get PDF
    Purpose – With the rise of the fourth industrial revolution, it has converged with the existing industrial revolution to give shape to increased accessibility of knowledge and information. As a result, it has become easier for scholars to actively pursue and compile research in various fields. This current study aims to focus and assess the current standing of KODISA: the Journal of Distribution Science (JDS), International Journal of Industrial Distribution & Business (IJIDB), the East Asian Journal of Business Management (EAJBM), the Journal of Asian Finance, Economics and Business (JAFEB) in a rapidly evolving era. Novel strategies for creating the future vision of KODISA 2020 will also be examined. Research design, data, and methodology – The current research will analyze published journals of KODISA in order to offer a vision for the KODISA 2020 future. In part 1, this paper will observe the current address of the KODISA journal and its overview of past achievements. Next, part 2 will discuss the activities that will be needed for journals of KODISA, JDS, IJIDB, EAJBM, JAFEB to branch out internationally and significant journals will be statistically analyzed in part 3. The last part 4 will offer strategies for the continued growth of KODISA and visions for KODISA 2020. Results – Among the KODISA publications, IJIDB was second, JDS was 23rd (in economic publications of 54 journals), and EAJBM was 22nd (out of 79 publications in management field journals). This shows the high quality of the KODISA publication journals. According to 2016 publication analysis, JDS, IJIDB, etc. each had 157 publications, 15 publications, 16 publications, and 28 publications. In the case of JDS, it showed an increase of 14% compared to last year. Additionally, JAFEB showed a significant increase of 68%. This shows that compared to other journals, it had a higher rate of paper submission. IJIDB and EAJBM did not show any significant increases. In JDS, it showed many studies related to the distribution, management of distribution, and consumer behavior. In order to increase the status of the KODISA journal to a SCI status, many more international conferences will open to increase its international recognition levels. Second, the systematic functions of the journal will be developed further to increase its stability. Third, future graduate schools will open to foster future potential leaders in this field and build a platform for innovators and leaders. Conclusions – In KODISA, JDS was first published in 1999, and has been registered in SCOPUS February 2017. Other sister publications within the KODISA are preparing for SCOPUS registration as well. KODISA journals will prepare to be an innovative journal for 2020 and the future beyond

    Deep Learning-based Synthetic High-Resolution In-Depth Imaging Using an Attachable Dual-element Endoscopic Ultrasound Probe

    Full text link
    Endoscopic ultrasound (EUS) imaging has a trade-off between resolution and penetration depth. By considering the in-vivo characteristics of human organs, it is necessary to provide clinicians with appropriate hardware specifications for precise diagnosis. Recently, super-resolution (SR) ultrasound imaging studies, including the SR task in deep learning fields, have been reported for enhancing ultrasound images. However, most of those studies did not consider ultrasound imaging natures, but rather they were conventional SR techniques based on downsampling of ultrasound images. In this study, we propose a novel deep learning-based high-resolution in-depth imaging probe capable of offering low- and high-frequency ultrasound image pairs. We developed an attachable dual-element EUS probe with customized low- and high-frequency ultrasound transducers under small hardware constraints. We also designed a special geared structure to enable the same image plane. The proposed system was evaluated with a wire phantom and a tissue-mimicking phantom. After the evaluation, 442 ultrasound image pairs from the tissue-mimicking phantom were acquired. We then applied several deep learning models to obtain synthetic high-resolution in-depth images, thus demonstrating the feasibility of our approach for clinical unmet needs. Furthermore, we quantitatively and qualitatively analyzed the results to find a suitable deep-learning model for our task. The obtained results demonstrate that our proposed dual-element EUS probe with an image-to-image translation network has the potential to provide synthetic high-frequency ultrasound images deep inside tissues.Comment: 10 pages, 9 figure

    Cases of ethical violation in research publications: through editorial decision making process

    Get PDF
    Purpose – To improve and strengthen existing publication and research ethics, KODISA has identified and presented various cases which have violated publication and research ethics and principles in recent years. The editorial office of KODISA has been providing and continues to provide advice and feedback on publication ethics to researchers during peer review and editorial decision making process. Providing advice and feedback on publication ethics will ensure researchers to have an opportunity to correct their mistakes or make appropriate decisions and avoid any violations in research ethics. The purpose of this paper is to identify different cases of ethical violation in research and inform and educate researchers to avoid any violations in publication and research ethics. Furthermore, this article will demonstrate how KODISA journals identify and penalize ethical violations and strengthens its publication ethics and practices. Research design, data and methodology – This paper examines different types of ethical violation in publication and research ethics. The paper identifies and analyzes all ethical violations in research and combines them into five general categories. Those five general types of ethical violations are thoroughly examined and discussed. Results – Ethical violations of research occur in various forms at regular intervals; in other words, unethical researchers tend to commit different types of ethical violations repeatedly at same time. The five categories of ethical violation in research are as follows: (1) Arbitrary changes or additions in author(s) happen frequently in thesis/dissertation related publications. (2) Self plagiarism, submitting same work or mixture of previous works with or without using proper citations, also occurs frequently, but the most common type of plagiarism is changing the statistical results and using them to present as the results of the empirical analysis; (3) Translation plagiarism, another ethical violation in publication, is difficult to detect but occurs frequently; (4) Fabrication of data or statistical analysis also occurs frequently. KODISA requires authors to submit the results of the empirical analysis of the paper (the output of the statistical program) to prevent this type of ethical violation; (5) Mashup or aggregator plagiarism, submitting a mix of several different works with or without proper citations without alterations, is very difficult to detect, and KODISA journals consider this type of plagiarism as the worst ethical violation. Conclusions – There are some individual cases of ethical violation in research and publication that could not be included in the five categories presented throughout the paper. KODISA and its editorial office should continue to develop, revise, and strengthen their publication ethics, to learn and share different ways to detect any ethical violations in research and publication, to train and educate its editorial members and researchers, and to analyze and share different cases of ethical violations with the scholarly community

    Isomorphic Strategy for Processor Allocation in k-Ary n-Cube Systems

    Get PDF
    Due to its topological generality and flexibility, the k-ary n-cube architecture has been actively researched for various applications. However, the processor allocation problem has not been adequately addressed for the k-ary n-cube architecture, even though it has been studied extensively for hypercubes and meshes. The earlier k-ary n-cube allocation schemes based on conventional slice partitioning suffer from internal fragmentation of processors. In contrast, algorithms based on job-based partitioning alleviate the fragmentation problem but require higher time complexity. This paper proposes a new allocation scheme based on isomorphic partitioning, where the processor space is partitioned into higher dimensional isomorphic subcubes. The proposed scheme minimizes the fragmentation problem and is general in the sense that any size request can be supported and the host architecture need not be isomorphic. Extensive simulation study reveals that the proposed scheme significantly outperforms earlier schemes in terms of mean response time for practical size k-ary and n-cube architectures. The simulation results also show that reduction of external fragmentation is more substantial than internal fragmentation with the proposed scheme
    corecore