• Title/Summary/Keyword: 가중치 모델

Search Result 945, Processing Time 0.026 seconds

A Study on Factors and Measurement Methodology on Workers' Work Competence Levels for Sustainable Management in ICT Organization (ICT조직의 지속가능경영을 위한 직무전문성 측정요인과 방법)

  • Yoon, Jang Ho;Kim, Kui Won;Lee, Soo Hyun;Kim, Jae Yun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.5
    • /
    • pp.27-43
    • /
    • 2015
  • Ever more so than any other times, today's corporations today face an ultimate issue of acquiring highest work expertise for their employees. However, most of current academic researches try to focus on what factors comprise an expertise while they fail to tackle the very issue of detailed numerical measurement of the expertise factors recommended improvement paths, and goals for each measured expertise level. Hence, this study suggests more objective and highly reliable identification of work competence measurement factors and the correlation among the identified factors. For details, it tries to propose a methodology of expertise measurement by developing into the definition of experts and expertise, reestablishment of expertise factors, determination of reference points of the expertise factors, and weighting of the factors. This measurement methodology finds that it itself has significant correlation with existing work competency level measurement and test tools. Therefore it is identified to justify its effectiveness. Finally, this study proposes an action point of establishing a national expertise architecture and its frameworks for various societies in general.

  • PDF

Shot Boundary Detection of Video Data Based on Fuzzy Inference (퍼지 추론에 의한 비디오 데이터의 샷 경계 추출)

  • Jang, Seok-Woo
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.611-618
    • /
    • 2003
  • In this paper, we describe a fuzzy inference approach for detecting and classifying shot transitions in video sequences. Our approach basically extends FAM (Fuzzy Associative Memory) to detect and classify shot transitions, including cuts, fades and dissolves. We consider a set of feature values that characterize differences between two consecutive frames as input fuzzy sets, and the types of shot transitions as output fuzzy sets. The inference system proposed in this paper is mainly composed of a learning phase and an inferring phase. In the learning phase, the system initializes its basic structure by determining fuzzy membership functions and constructs fuzzy rules. In the inferring phase, the system conducts actual inference using the constructed fuzzy rules. In order to verify the performance of the proposed shot transition detection method experiments have been carried out with a video database that includes news, movies, advertisements, documentaries and music videos.

A Parametric Image Enhancement Technique for Contrast-Enhanced Ultrasonography (조영증강 의료 초음파 진단에서 파라미터 영상의 개선 기법)

  • Kim, Ho Joon;Gwak, Seong Hoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.6
    • /
    • pp.231-236
    • /
    • 2014
  • The transit time of contrast agents and the parameters of time-intensity curves in ultrasonography are important factors to diagnose various diseases of a digestive organ. We have implemented an automatic parametric imaging method to overcome the difficulty of the diagnosis by naked eyes. However, the micro-bubble noise and the respiratory motions may degrade the reliability of the parameter images. In this paper, we introduce an optimization technique based on MRF(Markov Random Field) model to enhance the quality of the parameter images, and present an image tracking algorithm to compensate the image distortion by respiratory motions. A method to extract the respiration periods from the ultrasound image sequence has been developed. We have implemented the ROI(Region of Interest) tracking algorithm using the dynamic weights and a momentum factor based on these periods. An energy function is defined for the Gibbs sampler of the image enhancement method. Through the experiments using the data to diagnose liver lesions, we have shown that the proposed method improves the quality of the parametric images.

Real-time Worker Safety Management System Using Deep Learning-based Video Analysis Algorithm (딥러닝 기반 영상 분석 알고리즘을 이용한 실시간 작업자 안전관리 시스템 개발)

  • Jeon, So Yeon;Park, Jong Hwa;Youn, Sang Byung;Kim, Young Soo;Lee, Yong Sung;Jeon, Ji Hye
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.25-30
    • /
    • 2020
  • The purpose of this paper is to implement a deep learning-based real-time video analysis algorithm that monitors safety of workers in industrial facilities. The worker's clothes were divided into six classes according to whether workers are wearing a helmet, safety vest, and safety belt, and a total of 5,307 images were used as learning data. The experiment was performed by comparing the mAP when weight was applied according to the number of learning iterations for 645 images, using YOLO v4. It was confirmed that the mAP was the highest with 60.13% when the number of learning iterations was 6,000, and the AP with the most test sets was the highest. In the future, we plan to improve accuracy and speed by optimizing datasets and object detection model.

A Parametric Study on Optimal Earth-Moon Transfer Trajectory Design Using Mixed Impulsive and Continuous Thrust (혼합 추력 방식의 지구-달 최적 전이궤적 설계인자에 따른 비교연구)

  • Lee, Dae-Ro;No, Tae-Soo;Lee, Ji-Marn;Jeon, Gyeong-Eon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.11
    • /
    • pp.1021-1032
    • /
    • 2011
  • This paper presents the results of a parametric study for the design of optimal Earth-Moon transfer trajectory using mixed impulsive and continuous thrust. Various types of the optimal Earth-Moon transfer trajectories were designed by adjusting the relative weight between the impulsive and the continuous thrust, and flight time. Two very different transfer trajectories can be obtained by different combination of design parameters. Furthermore, it was found that all thus designed trajectories permit the ballistic capture by the Moon gravity. Finally, the required thrust profiles are presented and analyzed in detail.

Development of Tomographic Scan Method for Industrial Plants (산업공정반응기의 감마선 전산 단층촬영기술 개발)

  • Kim, Jong-Bum;Jung, Sung-Hee;Moon, Jin-Ho;Kwon, Taek-Yong;Cho, Gyu-Seong
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.30 no.1
    • /
    • pp.20-30
    • /
    • 2010
  • In this paper, a new tomographic scan method with fixed installed detectors and rotating source from gamma projector was presented to diagnose the industrial plants which were impossible to be examined by conventional tomographic systems. Weight matrix calculation method which was suitable for volumetric detector and statistical iterative reconstruction method were applied for reconstructing the simulation and experimental data. Monte Carlo simulations had been performed for two kinds of phantoms. Lab scale experiment with a same condition as one of phantoms, had been carried out. Simulation results showed that reconstruction from photopeak counting measurement gave the better results than from the gross counting measurement although photopeak counting measurement had large statistical errors. Experimental data showed the similar result as Monte Carlo simulation. Those results appeared to be promising for industrial tomographic applications, especially for petrochemical industries.

Effective Intrusion Detection using Evolutionary Neural Networks (진화신경망을 이용한 효과적 인 침입탐지)

  • Han Sang-Jun;Cho Sung-Bae
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.301-309
    • /
    • 2005
  • Learning program's behavior using machine learning techniques based on system call audit data is an effective intrusion detection method. Rule teaming, neural network, statistical technique, and hidden Markov model are representative methods for intrusion detection. Among them neural networks are known for its good performance in teaming system call sequences. In order to apply it to real world problems successfully, it is important to determine their structure. However, finding appropriate structure requires very long time because there are no formal solutions for determining the structure of networks. In this paper, a novel intrusion detection technique using evolutionary neural networks is proposed. Evolutionary neural networks have the advantage that superior neural networks can be obtained in shorter time than the conventional neural networks because it leams the structure and weights of neural network simultaneously Experimental results against 1999 DARPA IDEVAL data confirm that evolutionary neural networks are effective for intrusion detection.

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

Methods for Decision making model in Apartment development projects using on Analytic Hierarchy Process (AHP기법을 이용한 공동주택 개발 사업 의사결정 평가 모델 개발)

  • Kim, Man-Jang;Lee, Jae-Seob
    • Korean Journal of Construction Engineering and Management
    • /
    • v.9 no.5
    • /
    • pp.95-103
    • /
    • 2008
  • In recent years, there has been more reconstruction and redevelopment of apartments rather than efforts to consider alternative to extend the life time oh the apartments. It is essential to try to develop ways to adequately maintain and to use the apartment facilities efficiently in order to preserve earth environment and the limited resource. However, lacking research on the effects obtained through remodelling and maintenance have interfered with the vitalizing of the market. The objective of this study is to propose criterions and methods with which to evaluate adequacy of developing method. A survey was performed to investigate important evaluating methods in order to obtain advices that can smoothly progress improve apartment developing method. This study applied AHP(Analytical Hierarchy Process) methods for reasonable dependancy of developing in apartment. Through this study, the flow of apartment market is elevated to reaching the level in advanced nation.

A Vulnerability Analysis for Armored Fighting Vehicle based on SES/MB Framework using Importance of Component (구성 부품의 중요도를 활용한 SES/MB 프레임워크 기반 전차 취약성 분석)

  • Kim, Hun-Ki;Hwang, Hun-Gyu;Lee, Jang-Se
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.59-68
    • /
    • 2015
  • In this paper, we proposed a methodology of vulnerability analysis for armored fighting vehicle based on modeling and simulation. The SES/MB framework serves hierarchical representation of the structure for a complex systems and is easy to conduct modeling for the armored fighting vehicle which consists of various components. When the armored fighting vehicle is hit by the shots from threat, the vulnerability of the armored fighting vehicle is decreased by damaged or penetrated level of armors and components. The penetration is determined by the result of comparing a penetration energy through penetration analysis equation and defence ability of armor and components. And the defence ability is determined in accordance with type and defined property of normal component and armor component, all components have a weighted values for the degree of importance. We developed a simulation program for verification proposed methodology. Thus, the program analyzes vulnerability for armored fighting vehicle SES/MB framework using importance.