• Title/Summary/Keyword: 규칙 정의

Search Result 1,079, Processing Time 0.028 seconds

Mild Cognitive Impairment Prediction Model of Elderly in Korea Using Restricted Boltzmann Machine (제한된 볼츠만 기계학습 알고리즘을 이용한 우리나라 지역사회 노인의 경도인지장애 예측모형)

  • Byeon, Haewon
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.248-253
    • /
    • 2019
  • Early diagnosis of mild cognitive impairment (MCI) can reduce the incidence of dementia. This study developed the MCI prediction model for the elderly in Korea. The subjects of this study were 3,240 elderly (1,502 men, 1,738 women) aged 65 and over who participated in the Korean Longitudinal Survey of Aging (KLoSA) in 2012. Outcome variables were defined as MCI prevalence. Explanatory variables were age, marital status, education level, income level, smoking, drinking, regular exercise more than once a week, average participation time of social activities, subjective health, hypertension, diabetes Respectively. The prediction model was developed using Restricted Boltzmann Machine (RBM) neural network. As a result, age, sex, final education, subjective health, marital status, income level, smoking, drinking, regular exercise were significant predictors of MCI prediction model of rural elderly people in Korea using RBM neural network. Based on these results, it is required to develop a customized dementia prevention program considering the characteristics of high risk group of MCI.

Medical Image Encryption based on C-MLCA and 1D CAT (C-MLCA와 1차원 CAT를 이용한 의료 영상 암호화)

  • Jeong, Hyun-Soo;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.439-446
    • /
    • 2019
  • In this paper, we propose a encryption method using C-MLCA and 1D CAT to secure medical image for efficiently. First, we generate a state transition matrix using a Wolfram rule and create a sequence of maximum length. By operating the complemented vector, it converts an existing sequence to a more complex sequence. Then, we multiply the two sequences by rows and columns to generate C-MLCA basis images of the original image size and go through a XOR operation. Finally, we will get the encrypted image to operate the 1D CAT basis function created by setting the gateway values and the image which is calculated by transform coefficients. By comparing the encrypted image with the original image, we evaluate to analyze the histogram and PSNR. Also, by analyzing NPCR and key space, we confirmed that the proposed encryption method has a high level of stability and security.

A Design of Constructing Diagram Repository for UML Diagram Tools (UML 다이어그램 도구를 위한 다이어그램 정보의 구축과 설계)

  • Kim, Yun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.244-251
    • /
    • 2020
  • This paper presents a design of the Meta-Class Repository (MCR) which maintain syntactically analyzed and structured meta-class information from UML diagrams, and then proposes 'meta-class,' also known as super-class, to construct structured information analyzed syntactically. The MCR is a collection of these meta-classes which contains the information extracted from diagrams. This paper also presents a design of the Code Generation Engine (CGE) which roles generating codes corresponding classes from UML diagrams based on the MCR maintaining a collection of meta-classes which is syntactically-analyzed and constructed in previous process. The logics of CGE are designed to generate codes collaborated with MCR and CGE with integration. The logics of CGE mechanism is presented with the form of finite state machine to present the algorithms of code generation formally and have the advantages of simplicity and easiness in development.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.

User Behavior Analysis for Online Game Bot Detection (온라인 게임 봇 탐지를 위한 사용자 행위 분석)

  • Kang, Ah-Reum;Woo, Ji-young;Park, Ju-yong;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.225-238
    • /
    • 2012
  • Among the various security threats in online games, the use of game bots is the most serious problem. In this paper, we propose a framework for user behavior analysis for bot detection in online games. Specifically, we focus on party play that reflects the social activities of gamers: In a Massively Multi-user Online Role Playing Game (MMORPG), party play log includes a distinguished information that can classify game users under normal-user and abnormal-user. That is because the bot users' main activities target on the acquisition of cyber assets. Through a statistical analysis of user behaviors in game activity logs, we establish the threshold levels of the activities that allow us to identify game bots. Also, we build a knowledge base of detection rules based on this statistical analysis. We apply these rule reasoner to the sixth most popular online game in the world. As a result, we can detect game bot users with a high accuracy rate of 95.92%.

Design and Implementation of Reinforcement Learning Agent Using PPO Algorithim for Match 3 Gameplay (매치 3 게임 플레이를 위한 PPO 알고리즘을 이용한 강화학습 에이전트의 설계 및 구현)

  • Park, Dae-Geun;Lee, Wan-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.1-6
    • /
    • 2021
  • Most of the match-3 puzzle games supports automatic play using the MCTS algorithm. However, implementing reinforcement learning agents is not an easy job because it requires both the knowledge of machine learning and the way of complex interactions within the development environment. This study proposes a method in which we can easily design reinforcement learning agents and implement game play agents by applying PPO(Proximal Policy Optimization) algorithms. And we could identify the performance was increased about 44% than the conventional method. The tools we used are the Unity 3D game engine and Unity ML SDK. The experimental result shows that agents became to learn game rules and make better strategic decisions as experiments go on. On average, the puzzle gameplay agents implemented in this study played puzzle games better than normal people. It is expected that the designed agent could be used to speed up the game level design process.

A Design on The Zone Master Platform based on IIoT communication for Smart Factory Digital Twin (스마트 팩토리 디지털 트윈(Digital Twin)을 위한 IIoT 통신 기반 ZMP(Zone Master Platform) 설계)

  • Park, Seon-Hui;Bae, Jong-Hwan
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.81-87
    • /
    • 2020
  • This paper creates a standard node for acquiring sensor data from various industrial sensors (IoT/non-IoT) for the establishment of Smart Factory Digital Twin, and provides inter-compatible data by linking zones by group/process to secure data stability and to ensure the digital twin (Digital Twin) of Smart Factory. The process of the Zone Master platform contains interface specifications to define sensor objects and how sensor interactions between independent systems are performed and carries out individual policies for unique data exchange rules. The interface for execution control of the Zone Master Platform processor provides system management, declaration management for public-subscribe, object management for registering and communicating status information of sensor objects, ownership management for property ownership sharing, time management for data synchronization, and data distribution management for Route information on data exchange.

A Study on the Revision Direction of Incoterms in Accordance with the Change of e-Trade Customs (전자무역관습의 변화에 따른 Incoterms 개정방향에 대한 연구)

  • Jung, Woo-Kyung;Kim, Tae-In
    • Korea Trade Review
    • /
    • v.43 no.5
    • /
    • pp.115-137
    • /
    • 2018
  • The ICC is amending international trade rules such as Incoterms to respond to periodically changing international trade environments. Moreover, a drafting group has been formed for developing the eighth amendment and the Incoterms. Due to the recent development of information and communication technology, interest in smart work is increasing globally. Smart work is a concept that enables works to be performed without time and space constraints, and the mobile office is a typical form of smart work. Smart work has brought significant changes to the way that workers perform their jobs, and it has considerable impacts on international trade transactions. This study examines the impact of the development of information and communication technology on electronic trade customs and analyzes the revision process of Incoterms for electronic document informatization. Also, we provide implications for the 8th amendment of Incoterms.

A Study of Pattern Defect Data Augmentation with Image Generation Model (이미지 생성 모델을 이용한 패턴 결함 데이터 증강에 대한 연구)

  • Byungjoon Kim;Yongduek Seo
    • Journal of the Korea Computer Graphics Society
    • /
    • v.29 no.3
    • /
    • pp.79-84
    • /
    • 2023
  • Image generation models have been applied in various fields to overcome data sparsity, time and cost issues. However, it has limitations in generating images from regular pattern images and detecting defects in such data. In this paper, we verified the feasibility of the image generation model to generate pattern images and applied it to data augmentation for defect detection of OLED panels. The data required to train an OLED defect detection model is difficult to obtain due to the high cost of OLED panels. Therefore, even if the data set is obtained, it is necessary to define and classify various defect types. This paper introduces an OLED panel defect data acquisition system that acquires a hypothetical data set and augments the data with an image generation model. In addition, the difficulty of generating pattern images in the diffusion model is identified and a possibility is proposed, and the limitations of data augmentation and defect detection data augmentation using the image generation model are improved.

A Study on the Improvement of Flood Season Considering Characteristics of Regional Climate Change (지역기후변화 특성을 고려한 홍수기 개선에 관한 연구)

  • Lee, Jae Hwang;Kim, Gi Joo;Kim, Young-Oh
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.190-190
    • /
    • 2022
  • 최근 30년 강수량은 20세기 초보다 124mm 증가하였으며, 지역별 변동성 역시 매우 크다. 또한 일 강수량 80mm 이상의 강한 강수의 증가가 뚜렷하고 약한 강수가 감소하는 양극화로 인하여 홍수기에 홍수피해가 증가하는 추세를 보인다. 하지만 홍수에 대비하는 기간인 홍수기는 1970년 이전에 제정된 후 개선된 적이 없어 기후변화를 반영하지 못하고 있으며, 전국적으로 동일한 홍수기를 적용하고 있기에 최근 강수량의 지역특성이 강한 점을 반영하지 못하고 있다. 따라서 본 연구는 20세기와 21세기 두 그룹의 통계특성을 비교하여 홍수기의 강수량 변화를 정량화하여 기후변화를 보이고 국내 18개의 다목적댐 유역에서의 강수량 변화를 통계기법을 통해 지역 특성을 확인하였다. 이후 장마와 태풍을 기준으로 한 기존의 홍수기와 extension, shift, 그리고 split 등의 방법을 적용하여 개선한 홍수기를 비교하였다. 모의 방법은 댐 운영 기본 규칙에 국내 다목적댐에 가장 많이 활용되는 일정률-일정량 방식의 Rigid ROM과 예측한 유입수문곡선의 정확도가 관건인 일정량 방식의 Technical ROM을 활용하여 방류량을 결정하였다. 홍수저감효과는 계획방류량을 기준으로 한 세 가지 지표(frequency, duration, magnitude)를 통한 비교와 하천의 계획홍수량과 댐의 200년 빈도 계획홍수량을 기준으로 한 K-water 방법을 활용하여 평가하였다. 본 연구의 결과로 20세기와 21세기 홍수기의 통계량을 비교했을 때 강수량의 평균값이 86.55mm가 증가한 것을 확인할 수 있었으며, 각 댐 유역별로 비교하였을 때도 1개의 댐을 제외한 94%의 댐에서 증가 추세를 확인하였다. 추가적으로 모평균 차이를 95% 신뢰구간으로 확인한 결과 80% 이상의 범위에서 증가추세를 확인하였다. 가설검정 결과인 p-value가 최소 0.038에서 최대 0.3의 값을 가져 지역별 강수 차이 또한 유의미한 통계적 차이를 파악하였다. 홍수저감효과의 경우 2020년의 시범 유역에 대해서 15일의 extension을 적용한 홍수기가 기존의 홍수기에 비해 평균적으로 frequency는 0.002%, duration은 1.85hr, magnitude는 26.96% 정도 저감됨을 확인하였으며, flood의 횟수도 6회정도 적음을 확인할 수 있었다. 본 연구의 결과를 바탕으로 향후 기후변화에 대응한 새로운 홍수기의 기준을 제안할 수 있을 것으로 기대한다.

  • PDF