32 research outputs found

    Ontology-based Fuzzy Markup Language Agent for Student and Robot Co-Learning

    Full text link
    An intelligent robot agent based on domain ontology, machine learning mechanism, and Fuzzy Markup Language (FML) for students and robot co-learning is presented in this paper. The machine-human co-learning model is established to help various students learn the mathematical concepts based on their learning ability and performance. Meanwhile, the robot acts as a teacher's assistant to co-learn with children in the class. The FML-based knowledge base and rule base are embedded in the robot so that the teachers can get feedback from the robot on whether students make progress or not. Next, we inferred students' learning performance based on learning content's difficulty and students' ability, concentration level, as well as teamwork sprit in the class. Experimental results show that learning with the robot is helpful for disadvantaged and below-basic children. Moreover, the accuracy of the intelligent FML-based agent for student learning is increased after machine learning mechanism.Comment: This paper is submitted to IEEE WCCI 2018 Conference for revie

    Zoledronic Acid Preserves Bone Structure and Increases Survival but Does Not Limit Tumour Incidence in a Prostate Cancer Bone Metastasis Model

    Get PDF
    Background The bisphosphonate, zoledronic acid (ZOL), can inhibit osteoclasts leading to decreased osteoclastogenesis and osteoclast activity in bone. Here, we used a mixed osteolytic/osteoblastic murine model of bone-metastatic prostate cancer, RM1(BM), to determine how inhibiting osteolysis with ZOL affects the ability of these cells to establish metastases in bone, the integrity of the tumour-bearing bones and the survival of the tumour-bearing mice. Methods The model involves intracardiac injection for arterial dissemination of the RM1(BM) cells in C57BL/6 mice. ZOL treatment was given via subcutaneous injections on days 0, 4, 8 and 12, at 20 and 100 µg/kg doses. Bone integrity was assessed by micro-computed tomography and histology with comparison to untreated mice. The osteoclast and osteoblast activity was determined by measuring serum tartrate-resistant acid phosphatase 5b (TRAP 5b) and osteocalcin, respectively. Mice were euthanased according to predetermined criteria and survival was assessed using Kaplan Meier plots. Findings Micro-CT and histological analysis showed that treatment of mice with ZOL from the day of intracardiac injection of RM1(BM) cells inhibited tumour-induced bone lysis, maintained bone volume and reduced the calcification of tumour-induced endochondral osteoid material. ZOL treatment also led to a decreased serum osteocalcin and TRAP 5b levels. Additionally, treated mice showed increased survival compared to vehicle treated controls. However, ZOL treatment did not inhibit the cells ability to metastasise to bone as the number of bone-metastases was similar in both treated and untreated mice. Conclusions ZOL treatment provided significant benefits for maintaining the integrity of tumour-bearing bones and increased the survival of tumour bearing mice, though it did not prevent establishment of bone-metastases in this model. From the mechanistic view, these observations confirm that tumour-induced bone lysis is not a requirement for establishment of these bone tumours

    Acute-on-chronic kidney injury at hospital discharge is associated with long-term dialysis and mortality

    Get PDF
    Existing chronic kidney disease (CKD) is among the most potent predictors of postoperative acute kidney injury (AKI). Here we quantified this risk in a multicenter, observational study of 9425 patients who survived to hospital discharge after major surgery. CKD was defined as a baseline estimated glomerular filtration rate <45ml/min per 1.73m2. AKI was stratified according to the maximum simplified RIFLE classification at hospitalization and unresolved AKI defined as a persistent increase in serum creatinine of more than half above the baseline or the need for dialysis at discharge. A Cox proportional hazard model showed that patients with AKI-on-CKD during hospitalization had significantly worse long-term survival over a median follow-up of 4.8 years (hazard ratio, 3.3) than patients with AKI but without CKD. The incidence of long-term dialysis was 22.4 and 0.17 per 100 person-years among patients with and without existing CKD, respectively. The adjusted hazard ratio for long-term dialysis in patients with AKI-on-CKD was 19.8 compared to patients who developed AKI without existing CKD. Furthermore, AKI-on-CKD but without kidney recovery at discharge had a worse outcome (hazard ratios of 4.6 and 213, respectively) for mortality and long-term dialysis as compared to patients without CKD or AKI. Thus, in a large cohort of postoperative patients who developed AKI, those with existing CKD were at higher risk for long-term mortality and dialysis after hospital discharge than those without. These outcomes were significantly worse in those with unresolved AKI at discharge

    A Study on Business Models and Promotion Strategies of the Mobile Application Service Industry

    No full text
    根據WEF公佈之全球資訊國力調查,2005年我國已是全球第七名,顯示出我國具備完善的資通訊基礎建設,人民對於數位化產品的接受度高,然而在這樣的基礎下,台灣數據服務的普及率卻不高,收入的比例遠低於日、韓等國,特別是行動應用服務的收入,更是乏善可陳,其中一個重要原因乃是,行動電話業者,在整個產業價值鍊中,佔盡資源上的優勢,語音收入的高獲利率,導致於加值應用服務推出的卻步,影響了整個行動應用服務產業的發展。 3G行動電話網路佈建的漸趨綿密,各種不同的無線寬頻技術亦漸趨成熟,經濟部工業局所推出之無線寬頻示範計畫及各地方政府大力建設的行動城市,佈建了大量的WiFi網路,再加上M-Taiwan計畫, WiMAX之建設,導至於行動寬頻接取的多元化,自由競爭市場的來臨,迫使產業價值鍊的重整,將對整體行動應用服務產業的發展帶來正面的效益。 我國資通訊產業在國際上扮演舉足輕重之角色,與資通訊產業息息相關的行動應用服務業是否可能複製此一經驗與模式,藉由國內市場為試鍊,成功的帶給人們真正需要的行動應用服務,建立具國際競爭實力之產業,並與現有產業強項 相結合,輸出海外市場,創造雙贏的局面。 整體而言,面對不確定的應用服務需求、變動的技術、以及蛻變中的營運模式,廠商如何在產品、市場範疇、與經營模式上進行策略選擇?而不同營運模式的關鍵資源如何掌握?這些議題均影響產業未來的發展。 本研究範圍包含整個行動應用服務產業,探討各種經營運式,並以鑽石模型為理論基礎,透過個案探討及深入訪談,分析我國行動應用服務產業的產業競爭力,及整體產業發展的策略建議。According to the latest Global Information Technology Report, release by the World Economic Forum(WEF), Taiwan ranked 7th worldwide in terms of the e-readiness perspective. Thanks to the solid ICT infrastructure, Taiwan citizens are ready for the digitalization age. However, because Taiwan mobile operators dominate the resources, and enjoy the profits from the fixed-line and mobile voice services, they are not motivated to promote more value-added applications, so the mobile data service is still not popular in Taiwan. With the emerging communication technology getting matured, Taiwan government formulated the national ICT project such as “Wireless Broadband Demonstration Project,” and “M-Taiwan Project,” in order to solve the so called “Last-mile” issue and promote the ICT related industries. For the years to come, there are challenges and opportunities ahead of us. How to utilize the Taiwan experience to lead the industry on products selections, business model, and market differentiation are key factors to keep Taiwan’s mobile application service industry competitive in the new millennium. This paper covers the Taiwan mobile application service industry with in-depth case study, through the analysis of the core competence of mobile service industry, and to propose the development strategy.第一章 緒論 1 第一節 緣起 1 第二節 研究目的 6 第三節 研究架構 7 第四節 預期研究貢獻 8 第二章 文獻探討 9 第一節 產業及企業經營之分析架構 9 第二節 行動寬頻網路技術趨勢探討 18 第三節 寬頻行動應用探討 28 第三章 國際寬頻行動應用服務個案探討 31 第一節 無線寬頻環境探討 31 第二節 現場新聞廣播個案探討 33 第三節 無線多媒體應用服務個案探討 35 第四節 無線主題樂園個案探討 37 第五節 日本行動應用市場探討 40 第四章 國內行動應用服務推動現況 45 第一節 國內行動電話基礎建設及資料服務現況 45 第二節 國內行動上網消費者行為分析 48 第三節 無線寬頻示範應用計畫推動探討 52 第四節 行動台灣應用推動計畫現況分析 56 第五章 商業模式與產業現況 59 第一節 產業價值鏈與經營模式 59 第二節 產業競爭力分析 66 第三節 產業推動策略建議 71 第六章 結論與建議 80 第一節 研究結論 80 第二節 研究限制 85 第三節 未來研究方向 86 參考文獻 8

    Impossible trinity: A guideline to shape telecommunication policy by mediating bandwidth supply

    No full text
    [[abstract]]Telecommunication policy researchers have long believed that expanding bandwidth supply and decreasing peering fee could facilitate economic activities and investment. However, the results are not always as expected. The staffs of Taiwan government hence developed an “impossible trinity” guideline to shape telecommunication policy by mediating bandwidth supply between ISPs/services. This guideline helps policy-making staff to boost certain industries/businesses or cooling other overheating ones in order to ensure economic growth and stability of the domestic market. This work explores and demonstrates how the staffs of Taiwan government apply impossible trinity to shape telecommunication policies during 2000∼2018. The contributions of this work are: (1) a hypothesis, called impossible trinity hypothesis, was made as an argument framework to harmonize the disputes between the ideas of net neutrality, fair ISP competition, and internet censorship in the TP making arena within government and market; (2) a macroeconomic TP making methodology to mediate the market development was designed; (3) the biological nature embedded in Taiwan TP making process was also discovered and differentiated in three forms, that are disruptive selection, directional selection, and convergent evolution

    A Spatiotemporal-Oriented Deep Ensemble Learning Model to Defend Link Flooding Attacks in IoT Network

    No full text
    [[abstract]](1) Background: Link flooding attacks (LFA) are a spatiotemporal attack pattern of distributed denial-of-service (DDoS) that arranges bots to send low-speed traffic to backbone links and paralyze servers in the target area. (2) Problem: The traditional methods to defend against LFA are heuristic and cannot reflect the changing characteristics of LFA over time; the AI-based methods only detect the presence of LFA without considering the spatiotemporal series attack pattern and defense suggestion. (3) Methods: This study designs a deep ensemble learning model (Stacking-based integrated Convolutional neural network-Long short term memory model, SCL) to defend against LFA: (a) combining continuous network status as an input to represent "continuous/combination attacking action" and to help CNN operation to extract features of spatiotemporal attack pattern; (b) applying LSTM to periodically review the current evolved LFA patterns and drop the obsolete ones to ensure decision accuracy and confidence; (c) stacking System Detector and LFA Mitigator module instead of only one module to couple with LFA detection and mediation at the same time. (4) Results: The simulation results show that the accuracy rate of SCL successfully blocking LFA is 92.95%, which is 60.81% higher than the traditional method. (5) Outcomes: This study demonstrates the potential and suggested development trait of deep ensemble learning on network security

    Understanding Aboriginal Tribe Wireless Broadband Construction Trajectories Through Actor-Network Theory Views

    No full text
    [[abstract]]A successful information and communications technology (ICT) construction project serves as a substantial reference for the promotion of related industries. However, in the past, only a few theoretical studies have been produced. Based on the network architecture of the actors, this case study attempts to explore the socio-technical interaction trajectory in Fuxing Township, Taoyuan County as an illustrative example for achieving a large-scale construction in Taiwan. The results showed that the successful promotion of network construction in rural areas hinges not merely on technology; rather, a complex network of heterogeneous actors, including people and non-human interactors involving the political process, is crucial in shaping the achievement. Mutual benefits and conflicts of interest should be considered when the government needs to invest in fundamental infrastructure and the private sector evaluates returns on investment. Digital and internet equity is also a worthwhile topic in discussions of how government should employ limited policy tools and budgets to achieve balanced local development. This empirical study was conducted through both qualitative and quantitative case analysis. The research therefore verified that the advantage of actor network theory lies in its comprehensive method of analysis, grounded theory for gaining insights from the views of a diverse group of actors, and use of the triple helix model of regional innovation to formulate an ecosystem to aid in the development of rural areas. Finally, we found that Actor-Network Theory (ANT) can be used as an important theoretical basis in the field of ICT construction research

    A 5G Spectrum Demanding Estimation Framework Considering Coalition Formation of Taiwan Telecommunication Operator

    No full text
    [[abstract]]With the mobile broadband spectrum allocation for 5G completed in 2020 around the world, the start of commercial operations for the 5G network is just around the corner. However, of the many issues discussed during the spectrum auction process, one core problem remained: Is enough spectrum allocated? Countries currently use the ITU-R M.2290 model without considering (1) the coalition formation of telecommunication operators in each country, (2) the minimum amount of spectrum required for individual telecommunications operators to survive, and (3) urban-rural differences in terms of spectrum requirement. These issues have made it difficult for regulatory authority to answer the question: How much spectrum is required for 4G/5G mobile services? This study proposes a 5G coalition-formation spectrum estimation framework based on ITU-R M.2290 model and using Taiwan as a case study. It is estimated that the basic spectrum requirement for mobile broadband services in urban areas falls within the range of 174-223 MHz, roughly 1.2-1.9 times that required for rural areas. The country’s basic mobile broadband needs should be met if an individual operator is allocated 220-330 MHz, and the six telecommunication operators in Taiwan will form three coalitions

    Channel-Quality Aware RFID Tag Identification Algorithm to Accommodate the Varying Channel Quality of IoT Environment

    No full text
    Radio Frequency Identification (RFID) technique is broadly adopted as the automated identification system for the Internet of Things (IoT). Many RFID anti-collision algorithms were proposed to accelerate the tag identification process. However, they misjudged some unreadable slots which were due to collision instead of the bad channel condition, causing low bandwidth usage. This study proposes the Channel-quality Aware Query Tree algorithm (CAQT) to improve the identification performance in an error-prone channel environment. CAQT has three novel features: (1) it estimates the channel quality continuously and statistically in the rapidly changing channel quality environment; (2) it asks the tag for retransmission or to split the collide tags based on the channel quality; (3) the number of the groups which it splits tags is based on the estimated number of tags collide in current slot. The simulation results show that CAQT uses less than 31% slots compared with the conventional algorithms. The simulation results also demonstrate that CAQT provides enhanced performance when the channel quality is varying especially in outdoor environment, for example, ticket checking for railway or subway system

    A MAP Overhead Aware Two-Dimensional OFDMA Burst Construction Algorithm

    No full text
    Conventional orthogonal frequency division multiple access (OFDMA) burst construction methods can only support limited numbers of connections due to the map overhead and corresponding limitations in the numbers of orthogonal resources blocks, which limits the capacity of current 4G and the following 5th generation (5G) networks. This study therefore provides a novel OFDMA burst construction algorithm and enhanced burst indexing aware algorithm (EHA), which try to maximize the throughput while considering the subchannel diversity and optimizing burst indexing issues. The EHA not only allocates the subchannels with the best channel quality for each burst, but also groups the bursts to alleviate the MAP overhead. Simulation results showed that the EHA yields two times the throughput that has been achieved using previous algorithms under a heavy load. Two contributions of the EHA are: (1) the overhead of burst indexing decreases because massive numbers of connections can be accommodated by one burst; and (2) the overall throughput increases due to that one connection with large data transferring requirements can be split and distributed into several bursts and placed on the subchannels with good channel quality to adopt better modulation coding scheme (MCS), if the saved bandwidth in this burst construction is more than the increased overhead of burst indexing
    corecore