• Title/Summary/Keyword: 데이터 구성요소

Search Result 1,555, Processing Time 0.037 seconds

A Control Method for designing Object Interactions in 3D Game (3차원 게임에서 객체들의 상호 작용을 디자인하기 위한 제어 기법)

  • 김기현;김상욱
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.322-331
    • /
    • 2003
  • As the complexity of a 3D game is increased by various factors of the game scenario, it has a problem for controlling the interrelation of the game objects. Therefore, a game system has a necessity of the coordination of the responses of the game objects. Also, it is necessary to control the behaviors of animations of the game objects in terms of the game scenario. To produce realistic game simulations, a system has to include a structure for designing the interactions among the game objects. This paper presents a method that designs the dynamic control mechanism for the interaction of the game objects in the game scenario. For the method, we suggest a game agent system as a framework that is based on intelligent agents who can make decisions using specific rules. Game agent systems are used in order to manage environment data, to simulate the game objects, to control interactions among game objects, and to support visual authoring interface that ran define a various interrelations of the game objects. These techniques can process the autonomy level of the game objects and the associated collision avoidance method, etc. Also, it is possible to make the coherent decision-making ability of the game objects about a change of the scene. In this paper, the rule-based behavior control was designed to guide the simulation of the game objects. The rules are pre-defined by the user using visual interface for designing their interaction. The Agent State Decision Network, which is composed of the visual elements, is able to pass the information and infers the current state of the game objects. All of such methods can monitor and check a variation of motion state between game objects in real time. Finally, we present a validation of the control method together with a simple case-study example. In this paper, we design and implement the supervised classification systems for high resolution satellite images. The systems support various interfaces and statistical data of training samples so that we can select the most effective training data. In addition, the efficient extension of new classification algorithms and satellite image formats are applied easily through the modularized systems. The classifiers are considered the characteristics of spectral bands from the selected training data. They provide various supervised classification algorithms which include Parallelepiped, Minimum distance, Mahalanobis distance, Maximum likelihood and Fuzzy theory. We used IKONOS images for the input and verified the systems for the classification of high resolution satellite images.

Evaluation of Incident Detection Algorithms focused on APID, DES, DELOS and McMaster (돌발상황 검지알고리즘의 실증적 평가 (APID, DES, DELOS, McMaster를 중심으로))

  • Nam, Doo-Hee;Baek, Seung-Kirl;Kim, Sang-Gu
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.7 s.78
    • /
    • pp.119-129
    • /
    • 2004
  • This paper is designed to report the results of development and validation procedures in relation to the Freeway Incident Management System (FIMS) prototype development as part of Intelligent Transportation Systems Research and Development program. The central core of the FIMS is an integration of the component parts and the modular, but the integrated system for freeway management. The whole approach has been component-orientated, with a secondary emphasis being placed on the traffic characteristics at the sites. The first action taken during the development process was the selection of the required data for each components within the existing infrastructure of Korean freeway system. After through review and analysis of vehicle detection data, the pilot site led to the utilization of different technologies in relation to the specific needs and character of the implementation. This meant that the existing system was tested in a different configuration at different sections of freeway, thereby increasing the validity and scope of the overall findings. The incident detection module has been performed according to predefined system validation specifications. The system validation specifications have identified two component data collection and analysis patterns which were outlined in the validation specifications; the on-line and off-line testing procedural frameworks. The off-line testing was achieved using asynchronous analysis, commonly in conjunction with simulation of device input data to take full advantage of the opportunity to test and calibrate the incident detection algorithms focused on APID, DES, DELOS and McMaster. The simulation was done with the use of synchronous analysis, thereby providing a means for testing the incident detection module.

Sapflux Measurement Database Using Granier's Heat Dissipation Method and Heat Pulse Method (수액류 측정 데이터베이스: 그래니어(Granier) 센서 열손실탐침법(Heat Dissipation Method)과 열파동법(Heat Pulse Method)을 이용한 수액류 측정)

  • Lee, Minsu;Park, Juhan;Cho, Sungsik;Moon, Minkyu;Ryu, Daun;Lee, Hoontaek;Lee, Hojin;Kim, Sookyung;Kim, Taekyung;Byeon, Siyeon;Jeon, Jihyun;Bhusal, Narayan;Kim, Hyun Seok
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.22 no.4
    • /
    • pp.327-339
    • /
    • 2020
  • Transpiration is the movement of water into the atmosphere through leaf stomata of plant, and it accounts for more than half of evapotranspiration from the land surface. The measurements of transpiration could be conducted in various ways including eddy covariance and water balance method etc. However, the transpiration measurements of individual trees are necessary to quantify and compare the water use of each species and individual component within stands. For the measurement of the transpiration by individual tree, the thermometric methods such as heat dissipation and heat pulse methods are widely used. However, it is difficult and labor consuming to maintain the transpiration measurements of individual trees in a wide range area and especially for long-term experiment. Therefore, the sharing of sapflow data through database should be useful to promote the studies on transpiration and water balance for large spatial scale. In this paper, we present sap flow database, which have Granier type sap flux data from 18 Korean pine (Pinus koraiensis) since 2011 and 16 (Quercus aliena) since 2013 in Mt.Taehwa Seoul National University forest and 18 needle fir (Abies holophylla), seven (Quercus serrata), three (Carpinus laxiflora and C. cordata each since 2013 in Gwangneung. In addition, the database includes the sapling transpiration of nine species (Prunus sargentii, Larix kaempferii, Quercus accutisima, Pinus densiflora, Fraxinus rhynchophylla, Chamecypans obtuse, P. koraiensis, Betulla platyphylla, A. holophylla, Pinus thunbergii), which were measured using heat pulse method since 2018. We believe this is the first database to share the sapflux data in Rep. of Korea, and we wish our database to be used by other researchers and contribute a variety of researches in this field.

Study on Evaluation of Carbon Emission and Sequestration in Pear Orchard (배 재배지 단위의 탄소 배출량 및 흡수량 평가 연구)

  • Suh, Sanguk;Choi, Eunjung;Jeong, Hyuncheol;Lee, Jongsik;Kim, Gunyeob;Sho, Kyuho;Lee, Jaeseok
    • Korean Journal of Environmental Biology
    • /
    • v.34 no.4
    • /
    • pp.257-263
    • /
    • 2016
  • Objective of this study was to evaluate the carbon budget on 40 years old pear orchard at Naju. For carbon budget assessment, we measured the soil respiration, net ecosystem productivity of herbs, pear biomass and net ecosystem exchange. In 2015, pear orchard released about $25.6ton\;CO_2\;ha^{-1}$ by soil respiration. And $27.9ton\;CO_2\;ha^{-1}$ was sequestrated by biomass growth. Also about $12.6ton\;CO_2\;ha^{-1}$ was stored at pruning branches and about $5.2ton\;CO_2\;ha^{-1}$ for photosynthesis of herbs. As a result, 25.6 ton of $CO_2$ per ha is annually released to atmosphere. At the same time about 45.7 ton of $CO_2$ was sequestrated from atmosphere. When it sum up the amount of $CO_2$ release and sequestration, approximately $20.1ton\;CO_2\;ha^{-1}$ was sequestrated by pear orchard in 2015, and it showed no significant differences with net ecosystem exchanges ($17.8ton\;CO_2\;ha^{-1}\;yr^{-1}$) by eddy covariance method with the same period. Continuous research using various techniques will help the understanding of $CO_2$ dynamics in agroecosystem and it can be able to present a new methodology for assessment of carbon budget in woody crop field. Futhermore, it is expected that the this study can be used as the basic data to be recognized as a carbon sink.

Relationship of Carbohydrate and Fat Intake with Metabolic Syndrome in Korean Women: The Korea National Health and Nutrition Examination Survey (2007-2016) (한국 여성의 탄수화물/지질 섭취가 대사증후군에 미치는 영향: 국민건강영양조사(2007-2016)를 중심으로)

  • Lee, Jaesang;Kim, Yookyung;Shin, Woo-Kyoung
    • Journal of Korean Home Economics Education Association
    • /
    • v.35 no.1
    • /
    • pp.1-14
    • /
    • 2023
  • The objective of the study was to examine the associations of dietary carbohydrate and fat intake with the prevalence of metabolic syndrome in Korean women. A cross-sectional study was employed based on data from the Korea National Health and Nutrition Examination (2007-2016). A total of 22,850 women aged 19 to 69 years were studied after excluding responses from pregnant or lactating women and those with missing metabolic values. Dietary intake data were collected with a 24-hour recall method. Dietary carbohydrate and fat intakes were divided into quintiles. After controlling for confounding variables, a multivariable logistic regression and general linear model were used. The findings indicated that HDL cholesterol levels were lower (p for trend<0.01), while triglyceride levels (p for trend=0.04), waist circumference (p for trend<0.01), and systolic blood pressure (p for trend<0.01) were higher among participants in the highest quintile of carbohydrate intake compared to those in the lowest quintile. Participants in the highest quintile of fat intake had lower waist circumference (p for trend=0.02), triglyceride level (p for trend<0.01), and systolic blood pressure (p for trend<0.01), while higher HDL cholesterol level (p for trend<0.01) compared to those in the lowest fat intake quintile. Metabolic syndrome was more likely to be present in the highest quintile of carbohydrates intake than in the lowest quintile (5th quintile vs. 1st quintile, OR: 1.32; 95% CI: 1.11 to 1.57). However, metabolic syndrome was less likely to be present in the highest quintile of fat intake than in the lowest quintile (5th quintile vs. 1st quintile, OR: 0.73; 95% CI: 0.61 to 0.86). This study revealed that high dietary carbohydrate intake and low dietary fat intake were associated with metabolic syndrome in Korean women.

A Study of Anomaly Detection for ICT Infrastructure using Conditional Multimodal Autoencoder (ICT 인프라 이상탐지를 위한 조건부 멀티모달 오토인코더에 관한 연구)

  • Shin, Byungjin;Lee, Jonghoon;Han, Sangjin;Park, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.57-73
    • /
    • 2021
  • Maintenance and prevention of failure through anomaly detection of ICT infrastructure is becoming important. System monitoring data is multidimensional time series data. When we deal with multidimensional time series data, we have difficulty in considering both characteristics of multidimensional data and characteristics of time series data. When dealing with multidimensional data, correlation between variables should be considered. Existing methods such as probability and linear base, distance base, etc. are degraded due to limitations called the curse of dimensions. In addition, time series data is preprocessed by applying sliding window technique and time series decomposition for self-correlation analysis. These techniques are the cause of increasing the dimension of data, so it is necessary to supplement them. The anomaly detection field is an old research field, and statistical methods and regression analysis were used in the early days. Currently, there are active studies to apply machine learning and artificial neural network technology to this field. Statistically based methods are difficult to apply when data is non-homogeneous, and do not detect local outliers well. The regression analysis method compares the predictive value and the actual value after learning the regression formula based on the parametric statistics and it detects abnormality. Anomaly detection using regression analysis has the disadvantage that the performance is lowered when the model is not solid and the noise or outliers of the data are included. There is a restriction that learning data with noise or outliers should be used. The autoencoder using artificial neural networks is learned to output as similar as possible to input data. It has many advantages compared to existing probability and linear model, cluster analysis, and map learning. It can be applied to data that does not satisfy probability distribution or linear assumption. In addition, it is possible to learn non-mapping without label data for teaching. However, there is a limitation of local outlier identification of multidimensional data in anomaly detection, and there is a problem that the dimension of data is greatly increased due to the characteristics of time series data. In this study, we propose a CMAE (Conditional Multimodal Autoencoder) that enhances the performance of anomaly detection by considering local outliers and time series characteristics. First, we applied Multimodal Autoencoder (MAE) to improve the limitations of local outlier identification of multidimensional data. Multimodals are commonly used to learn different types of inputs, such as voice and image. The different modal shares the bottleneck effect of Autoencoder and it learns correlation. In addition, CAE (Conditional Autoencoder) was used to learn the characteristics of time series data effectively without increasing the dimension of data. In general, conditional input mainly uses category variables, but in this study, time was used as a condition to learn periodicity. The CMAE model proposed in this paper was verified by comparing with the Unimodal Autoencoder (UAE) and Multi-modal Autoencoder (MAE). The restoration performance of Autoencoder for 41 variables was confirmed in the proposed model and the comparison model. The restoration performance is different by variables, and the restoration is normally well operated because the loss value is small for Memory, Disk, and Network modals in all three Autoencoder models. The process modal did not show a significant difference in all three models, and the CPU modal showed excellent performance in CMAE. ROC curve was prepared for the evaluation of anomaly detection performance in the proposed model and the comparison model, and AUC, accuracy, precision, recall, and F1-score were compared. In all indicators, the performance was shown in the order of CMAE, MAE, and AE. Especially, the reproduction rate was 0.9828 for CMAE, which can be confirmed to detect almost most of the abnormalities. The accuracy of the model was also improved and 87.12%, and the F1-score was 0.8883, which is considered to be suitable for anomaly detection. In practical aspect, the proposed model has an additional advantage in addition to performance improvement. The use of techniques such as time series decomposition and sliding windows has the disadvantage of managing unnecessary procedures; and their dimensional increase can cause a decrease in the computational speed in inference.The proposed model has characteristics that are easy to apply to practical tasks such as inference speed and model management.

Methodology for Identifying Issues of User Reviews from the Perspective of Evaluation Criteria: Focus on a Hotel Information Site (사용자 리뷰의 평가기준 별 이슈 식별 방법론: 호텔 리뷰 사이트를 중심으로)

  • Byun, Sungho;Lee, Donghoon;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.23-43
    • /
    • 2016
  • As a result of the growth of Internet data and the rapid development of Internet technology, "big data" analysis has gained prominence as a major approach for evaluating and mining enormous data for various purposes. Especially, in recent years, people tend to share their experiences related to their leisure activities while also reviewing others' inputs concerning their activities. Therefore, by referring to others' leisure activity-related experiences, they are able to gather information that might guarantee them better leisure activities in the future. This phenomenon has appeared throughout many aspects of leisure activities such as movies, traveling, accommodation, and dining. Apart from blogs and social networking sites, many other websites provide a wealth of information related to leisure activities. Most of these websites provide information of each product in various formats depending on different purposes and perspectives. Generally, most of the websites provide the average ratings and detailed reviews of users who actually used products/services, and these ratings and reviews can actually support the decision of potential customers in purchasing the same products/services. However, the existing websites offering information on leisure activities only provide the rating and review based on one stage of a set of evaluation criteria. Therefore, to identify the main issue for each evaluation criterion as well as the characteristics of specific elements comprising each criterion, users have to read a large number of reviews. In particular, as most of the users search for the characteristics of the detailed elements for one or more specific evaluation criteria based on their priorities, they must spend a great deal of time and effort to obtain the desired information by reading more reviews and understanding the contents of such reviews. Although some websites break down the evaluation criteria and direct the user to input their reviews according to different levels of criteria, there exist excessive amounts of input sections that make the whole process inconvenient for the users. Further, problems may arise if a user does not follow the instructions for the input sections or fill in the wrong input sections. Finally, treating the evaluation criteria breakdown as a realistic alternative is difficult, because identifying all the detailed criteria for each evaluation criterion is a challenging task. For example, if a review about a certain hotel has been written, people tend to only write one-stage reviews for various components such as accessibility, rooms, services, or food. These might be the reviews for most frequently asked questions, such as distance between the nearest subway station or condition of the bathroom, but they still lack detailed information for these questions. In addition, in case a breakdown of the evaluation criteria was provided along with various input sections, the user might only fill in the evaluation criterion for accessibility or fill in the wrong information such as information regarding rooms in the evaluation criteria for accessibility. Thus, the reliability of the segmented review will be greatly reduced. In this study, we propose an approach to overcome the limitations of the existing leisure activity information websites, namely, (1) the reliability of reviews for each evaluation criteria and (2) the difficulty of identifying the detailed contents that make up the evaluation criteria. In our proposed methodology, we first identify the review content and construct the lexicon for each evaluation criterion by using the terms that are frequently used for each criterion. Next, the sentences in the review documents containing the terms in the constructed lexicon are decomposed into review units, which are then reconstructed by using the evaluation criteria. Finally, the issues of the constructed review units by evaluation criteria are derived and the summary results are provided. Apart from the derived issues, the review units are also provided. Therefore, this approach aims to help users save on time and effort, because they will only be reading the relevant information they need for each evaluation criterion rather than go through the entire text of review. Our proposed methodology is based on the topic modeling, which is being actively used in text analysis. The review is decomposed into sentence units rather than considering the whole review as a document unit. After being decomposed into individual review units, the review units are reorganized according to each evaluation criterion and then used in the subsequent analysis. This work largely differs from the existing topic modeling-based studies. In this paper, we collected 423 reviews from hotel information websites and decomposed these reviews into 4,860 review units. We then reorganized the review units according to six different evaluation criteria. By applying these review units in our methodology, the analysis results can be introduced, and the utility of proposed methodology can be demonstrated.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Present State and Solutions for Archival Arrangement and Description of National Archives & Records Service of Korea (국가기록원의 기록물 정리기술의 현황과 개선방안)

  • Yoon, Ju-Bom
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.4 no.2
    • /
    • pp.118-162
    • /
    • 2004
  • Archival description in archives has an important role in document control and reference service. Archives has made an effort to do archival description. But we have some differences and problems about a theory and practical processes comparing with advanced countries. The serious difference in a theory is that a function classification, maintenance of an original order, arrangement of multi-level description are not reflected in practical process. they are arranged in shelves after they are arranged by registration order in a unit of a volume like an arrangement of book. In addition, there are problems in history of agency change or control of index. So these can cause inconvenience for users. For improving, in this study we introduced the meaning and importance of arrangement of description, the situation and problem of arrangement of description in The National Archives, and a description guideline in other foreign countries. The next is an example for ISAD(G). This paper has chapter 8, the chapter 1 is introduction, the chapter 2 is the meaning and importance of arrangement of description, excluding the chapter 8 is conclusion we can say like this from the chapter 3 to the chapter 7. In the chapter 3, we explain GOVT we are using now and description element category in situation and problem of arrangement of description in Archives. In the chapter 4, this is about guideline from Archives in U.S.A, England and Australia. 1. Lifecycle Date Requirement Guide from NARA is introduced and of the description field, the way of the description about just one title element is introduced. 2. This is about the guideline of the description from Public Record Office. That name is National Archives Cataloguing Guidelines Introduction. We are saying "PROCAT" from this guideline and the seven procedure of description. 3. This is about Commomon Record Series from National Archives of Australia. we studied Registration & description procedures for CRS system. In the chapter 5, This is about the example which applied ISAD to. Archives introduce description of documents produced from Appeals Commission in the Ministry of Government Administration. In the chapter 6, 7. These are about the problems we pointed after using ISAD, naming for the document at procedure section in every institution, the lack of description fields category, the sort or classification of the kind or form, the reference or identified number, the absence description rule about the details, function classification, multi-level description, input format, arrangement of book shelf, authority control. The plan for improving are that problems. The best way for arrangement and description in Archives is to examine the standard, guideline, manual from archives in the advanced countries. So we suggested we need many research and study about this in the academic field.

Using a Learning Progression to Characterize Korean Secondary Students' Knowledge and Submicroscopic Representations of the Particle Nature of Matter (Learning Progression을 적용한 중·고등학생의 '물질의 입자성'에 관한 지식과 미시적 표상에 대한 특성 분석)

  • Shin, Namsoo;Koh, Eun Jung;Choi, Chui Im;Jeong, Dae Hong
    • Journal of The Korean Association For Science Education
    • /
    • v.34 no.5
    • /
    • pp.437-447
    • /
    • 2014
  • Learning progressions (LP), which describe how students may develop more sophisticated understanding over a defined period of time, can inform the design of instructional materials and assessment by providing a coherent, systematic measure of what can be regarded as "level appropriate." We developed LPs for the nature of matter for grades K-16. In order to empirically test Korean students, we revised one of the constructs and associated assessment items based on Korean National Science Standards. The assessment was administered to 124 Korean secondary students to measure their knowledge and submicroscopic representations, and to assign them to a level of learning progression for the particle nature of matter. We characterized the level of students' understanding and models of the particle nature of matter, and described how students interpret various representations of atoms and molecules to explain scientific phenomena. The results revealed that students have difficulties in understanding the relationship between the macroscopic and molecular levels of phenomena, even in high school science. Their difficulties may be attributed to a limited understanding of scientific modeling, a lack of understanding of the models used to represent the particle nature of matter, or limited understanding of the structure of matter. This work will inform assessment and curriculum materials development related to the fundamental relationship between macroscopic, observed phenomena and the behavior of atoms and molecules, and can be used to create individualized learning environments. In addition, the results contribute to scientific research literature on learning progressions on the nature of matter.