• Title/Summary/Keyword: 과학치안

Search Result 20, Processing Time 0.024 seconds

Study on Colored Rice -I. Characteristics of Dohoku color rice mutants derived by Gamma-ray Mutagenesis (유색미에 관한 연구 -I. 감마선 처리에 의해 유래된 Dohoku 유색미 돌연변이체의 주요 특성)

  • Lee, Hee-Bong;Choi, Hyun-Gu;Kim, Dong-Uk;Kim, Jun-Pyo;Jung, Jae-Youn;Jung, Jong-Tae
    • Korean Journal of Agricultural Science
    • /
    • v.29 no.2
    • /
    • pp.5-9
    • /
    • 2002
  • Culm length of Dohoku mutant 1(DM 1) and mutant 2(DM 2) were shorter than Dohuko parent and Heukjinjubyo check, while days to heading were delayed seven to 20 days Panicle length of these were similar to check and number of panicle per plant of DM 2 was highly appeared than check. Spikelets per plant of the selected lines were lower than check, and glume color of these were varied from brown to dark purple and awn length was also varied according to line used. Anthocyanin content of each mutant line as measured by 530nm were lower than that of check in that OD 2.23 and OD 2.26 for DM 1 and DM 2, respectively, and 2.59 for check.

  • PDF

Does Artificial Intelligence Algorithm Discriminate Certain Groups of Humans? (인공지능 알고리즘은 사람을 차별하는가?)

  • Oh, Yoehan;Hong, Sungook
    • Journal of Science and Technology Studies
    • /
    • v.18 no.3
    • /
    • pp.153-216
    • /
    • 2018
  • The contemporary practices of Big-Data based automated decision making algorithms are widely deployed not just because we expect algorithmic decision making might distribute social resources in a more efficient way but also because we hope algorithms might make fairer decisions than the ones humans make with their prejudice, bias, and arbitrary judgment. However, there are increasingly more claims that algorithmic decision making does not do justice to those who are affected by the outcome. These unfair examples bring about new important questions such as how decision making was translated into processes and which factors should be considered to constitute to fair decision making. This paper attempts to delve into a bunch of research which addressed three areas of algorithmic application: criminal justice, law enforcement, and national security. By doing so, it will address some questions about whether artificial intelligence algorithm discriminates certain groups of humans and what are the criteria of a fair decision making process. Prior to the review, factors in each stage of data mining that could, either deliberately or unintentionally, lead to discriminatory results will be discussed. This paper will conclude with implications of this theoretical and practical analysis for the contemporary Korean society.

A Study on Sea Water and Ocean Current in the Sea Adjacent to Korea Peninsula 1. Physical Processes Influencing the Surface Distributions of Chlorophyll and Nutrient in the Southern Sea of Korea in Summer (한반도 근해의 해류와 해수특성 1. 여름철 한국 남해 표층수중 클로로필과 영양염의 농도분포에 영향을 주는 물리적 과정)

  • YANG HaH-Soeb;KIM Seung-Soo
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.23 no.6
    • /
    • pp.417-424
    • /
    • 1990
  • Effect of physical processes on the surface distributions of chlorophyll-a and nutrients was investigated in the southern sea of Korea during summer season. The northwestern area of Cheju Island had higher concentrations of the chlorophyll-a and nutrients than its southeastern area. A nutrient-rich patch was observed in the western area of Cheju Island and the northern area of $34^{\circ}N$ respectively. It seems that the patch in the western area of Cheju Island is formed by horizontal extension of the low-saline Coastal Water of China Contiental(CWCC), while the patch in the northern area of $34^{\circ}N$ by vertical mixing. Also, the high chlorophyll-a in the vicinity of Cheju Island appears to be ascribed to sufficient supply of nutrient from bottom water by coastal upwelling.

  • PDF

An Efficient Algorithm for Mining Interactive Communication Sequence Patterns (대화형 통신 순서열 패턴의 마이닝을 위한 효율적인 알고리즘)

  • Haam, Deok-Min;Song, Ji-Hwan;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.169-179
    • /
    • 2009
  • Communication log data consist of communication events such as sending and receiving e-mail or instance message and visiting web sites, etc. Many countries including USA and EU enforce the retention of these data on the communication service providers for the purpose of investigating or detecting criminals through the Internet. Because size of the retained data is very large, the efficient method for extracting valuable information from the data is needed for Law Enforcement Authorities to use the retained data. This paper defines the Interactive Communication Sequence Patterns(ICSPs) that is the important information when each communication event in communication log data consists of sender, receiver, and timestamp of this event. We also define a Mining(FDICSP) problem to discover such patterns and propose a method called Fast Discovering Interactive Communication Sequence Pattern(FDICSP) to solve this problem. FDICSP focuses on the characteristics of ICS to reduce the search space when it finds longer sequences by using shorter sequences. Thus, FDICSP can find Interactive Communication Sequence Patterns efficiently.

A Study on the Classification Guidelines of Modern Culture Heritages in Building and Facilities (근대 건축 및 시설물 문화유산 분류방안 연구)

  • Lee, Jeong-Soo;Yang, Seung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6333-6344
    • /
    • 2015
  • This study focused on the classification systems of modern architecture and facilities reviewing the characteristics of domestic and foreign cultural heritage classification systems. The results are as follows : (1) It is necessary new classification system for recent emerging architectures and facilities which contains new functions, and reflecting new scope of cultural heritage, in example cultural landscape. (2) Reviewing the related spheres which can produce future cultural heritages such as KDC, Industrial Classification and foreign trends on the cultural heritages, we classified 6 main categories ; Politics & Diplomatics, Industry & Economy, Society & Life, Culture & Art, Technology & Science, Military & Public Safety. (3) Under the main category, we divided sub- and subject-category according usages of objects for reflecting the registered appreciations.

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.

Exploring trends in U.N. Peacekeeping Activities in Korea through Topic Modeling and Social Network Analysis (토픽모델링과 사회연결망 분석을 통한 우리나라 유엔 평화유지활동 동향 탐색)

  • Donghyeon Jung;Chansong Kim;Kangmin Lee;Soeun Bae;Yeon Seo;Hyeonju Seol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.246-262
    • /
    • 2023
  • The purpose of this study is to identify the major peacekeeping activities that the Korean armed forces has performed from the past to the present. To do this, we collected 692 press releases from the National Defense Daily over the past 20 years and performed topic modeling and social network analysis. As a result of topic modeling analysis, 112 major keywords and 8 topics were derived, and as a result of examining the Korean armed forces's peacekeeping activities based on the topics, 6 major activities and 2 related matters were identified. The six major activities were 'Northeast Asian defense cooperation', 'multinational force activities', 'civil operations', 'defense diplomacy', 'ceasefire monitoring group', and 'pro-Korean activities', and 'general troop deployment' related to troop deployment in general. Next, social network analysis was performed to examine the relationship between keywords and major keywords related to topic decision, and the keywords 'overseas', 'dispatch', and 'high level' were derived as key words in the network. This study is meaningful in that it first examined the topic of the Korean armed forces's peacekeeping activities over the past 20 years by applying big data techniques based on the National Defense Daily, an unstructured document. In addition, it is expected that the derived topics can be used as a basis for exploring the direction of development of Korea's peacekeeping activities in the future.

A Study on the Estimation of the Stock Density and Biomass of Perinereis aibuhitensis at the Tidal Zone in Sosan, Korea (서산 연안간석지에서 두토막눈썹참갯지렁이(청충), Perinereis aibuhitensis의 분포밀도와 현존자원량의 추정)

  • KIM Chong-Kawn;ZHANG Chang-Ik
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.24 no.4
    • /
    • pp.229-236
    • /
    • 1991
  • A study on the estimation of the stock density and biomass of Perinereis aibuhitensis in the tidal zone in Sosan, Chungchongnam-do, Korea was carried out from June to July 1988. A preliminary survey was conducted to determine the distribution pattern of the species and the optimum sample size for setting up the sampling design. The stock densities of the species by stratum and by subarea were estimated using the stratified random sampling method, based upon the results of preliminary survey. The differences in density between strata as well as among subareas were tested to decide whether they can be combined together for estimating the overall stock biomass or not. The results of the survey showed that p. aibuhitensis were randomly distributed(Poisson distribution) and the number of quadrats which satisfies a reasonable level of precision was determined to be five by stratum. The densities between strata were not significantly different, while densities among subareas were different. Subarea C showed the highest density with the mean of $53.9g/m^2$ and followed by subarea B. The density of subarea A was the lowest with the mean of $18.2g/m^2$. The overall mean density from the study area was $32.4g/m^2$ with the coefficient of variance(CV) of $6.8\%$ The overall stock biomass was estimated to be 147.5mt in this area.

  • PDF

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Estimation and Methods Estimating Daily Food Consumption of Agrammus agrammus (노래미, Agrammus agrammus의 일간섭식량 추정법과 추정)

  • KIM Chong-Kwan;KANG Yong-Joo
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.25 no.4
    • /
    • pp.241-250
    • /
    • 1992
  • This study was covered the amount of food consumed per day as well as methods estimating the daily food consumption per fish of Agrammus agrammus in natural population to understand flow of food organisms among trophic levels in bio-community of the coastal waters, Shinsudo, Samchonpo. The estimating formulas were induced from the mathematical models that representing the diurnal fluctuation of the stomach fullness of the fish. The daily food consumption could be estimated by both feeding rates and gastric evacuation rates, but it was more reasonable method that based on gastric evacuation rates than feeding rates. The daily food consumption in wet weight per fish by gastric evacuation rates were 1.9856g/day, 3.4725g/day, 4.4418g/day, 5.8168g/day, and 7.2113g/day in the order of age groups from 0 to 4. The daily rations as percentage of body weight were $9.35\%,\;6.65\%,\;5.76\%,\;4.72\%\;and\;5.31\%$ in the order of ages. The daily food consumption was proportional to the body weight of fish, but the daily food consumption per specific body weight was reciprocal to the body weight. Annual food consumption in wet weight. per fish by gastric evacuation rates were 529.98g from the age of 0.25 to 1.0, 1,269.28g from the age of 1.0 to 2.0, 1,622.76g from the age of 2.0 to 3.0, 2,125.57g from the age of 3.0 to 4.0, 1,316.09g from the age of 4.0 to 4.5 The amount of food consumed per fish during 4.25 years, from the age of 0.25 to 4.5, was 6,863.68g in wet weight. the relationships between the daily food consumption(Dr) by gastric evacuation rates and the total length(L, cm) or the body weight(W, g) were as follows: $$Dr=0.036L^{1.702}$$ $$Dr=0.254W^{0.664}$$

  • PDF