• Title/Summary/Keyword: 모델 이해

Search Result 2,808, Processing Time 0.035 seconds

Development of a Site Suitability Evaluation Model For Arctic-Circle Energy Resource Construction (북극권 에너지 자원개발 활동을 위한 입지 적합도 평가 모델 개발)

  • Sewon Kim;Hyun-Jun Choi;Byungyun Yang;YoungSeok Kim
    • Journal of the Korean Geosynthetics Society
    • /
    • v.22 no.3
    • /
    • pp.105-117
    • /
    • 2023
  • The recent global energy supply crisis has led to increased uncertainty in international energy markets. These market changes lead to a rise in global energy prices and development is expanding to the extreme cold regions (Arctic Circle) where undeveloped energy resources are abundantly stored. Arctic Circle has a special business environment such as natural environment, laws, institutions and culture, research on location evaluation of development areas is necessary in advance. In this study, the spatial information of Alberta, Canada, where non-traditional energy resource development activities have recently been active, was collected and analyzed. In addition, an optimal location evaluation model for resource development was developed using construction environment spatial information data and the reliability is verified by comparing and analyzing the existing resource development areas.

A Study of PLC Simulation for Automobile Panel AS/RS (자동차 패널 자동창고 시스템의 PLC 시뮬레이션 적용 연구)

  • Ko, Min-Suk;Koo, Lock-Jo;Kwak, Jong-Geun;Hong, Sang-Hyun;Wang, Gi-Nam;Park, Sang-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.1-11
    • /
    • 2009
  • This paper illustrates a case study of PLC logic simulation in a car manufacturing system. It was developed to simulate and verify PLC control program for automobile panel AS/RS. Because car models become varied, the complexity of supply problem is increasing in the car manufacturing system. To cope with this problem, companies use the AS (automated storage) and RS (retrieval system) but it has logical complexity. Industrial automated process uses PLC code to control the AS/RS, however control information and control codes (PLC code) are difficult to understand. This paper suggests a PLC simulation environment, using 3D models and PLC code with realistic data. Data used in this simulation is based on realistic 3D model and I/O model, using actual size and PLC signals, respectively. The environment is similar to a real factory; users can verify and test the PLC code using this simulation before the implementation of AS/RS. Proposed simulation environment can be used for test run of AS/RS to reduce implementation time and cost.

Performance Analysis of Low Earth Orbit Satellite Communication Systems Under Multi-path Fading Environments (다중경로 페이딩 환경하에서의 저궤도 위성통신시스템 성능 분석)

  • Hae-uk Lee;Young-bin Ryu;Hyuk-jun Oh
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.4
    • /
    • pp.410-416
    • /
    • 2023
  • Unlike geostationary satellite communication systems, low-earth orbit(LEO) satellite communication systems move at relatively high speeds, and the angle with the ground device is not fixed and varies over a wide range. The propagation channel condition between satellites and ground nodes cannot be assumed line of sight(LOS) anymore. This paper analyzes the low-orbit multi-path fading satellite channel model that can occur in LEO satellite communication systems and Doppler frequency transition caused by high-speed maneuvering of LEO satellites and presents effective equalization techniques for OFDM and SC-FDE transmission methods suitable for multi-path frequency selective fading satellite channel models. In addition, this paper compares and analyzes the performance of OFDM and SC-FDE transmission methods in multipath fading LEO satellite channel environment using the proposed equalization techniques through simulations. Simulation results showed that SC-FDE outpeformed OFDM.

Document Classification Methodology Using Autoencoder-based Keywords Embedding

  • Seobin Yoon;Namgyu Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.9
    • /
    • pp.35-46
    • /
    • 2023
  • In this study, we propose a Dual Approach methodology to enhance the accuracy of document classifiers by utilizing both contextual and keyword information. Firstly, contextual information is extracted using Google's BERT, a pre-trained language model known for its outstanding performance in various natural language understanding tasks. Specifically, we employ KoBERT, a pre-trained model on the Korean corpus, to extract contextual information in the form of the CLS token. Secondly, keyword information is generated for each document by encoding the set of keywords into a single vector using an Autoencoder. We applied the proposed approach to 40,130 documents related to healthcare and medicine from the National R&D Projects database of the National Science and Technology Information Service (NTIS). The experimental results demonstrate that the proposed methodology outperforms existing methods that rely solely on document or word information in terms of accuracy for document classification.

Continuance Use Intention of Voice Commerce Using the Value-attitude-behavior Model (가치-태도-행동 모델에 기반한 음성 쇼핑 지속이용의도에 관한 연구)

  • Kim, Hyo-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.491-502
    • /
    • 2022
  • Voice technology allows consumers to make purchases through smart devices, and the interest in voice-driven conversational commerce has significantly expanded. In this study, we explored the continuance use intention of voice commerce, and the adoption of a value-attitude-behavior model. An online survey was conducted on 360 individuals who used an artificial intelligence assistant device in a voice commerce environment. We used Amos 23.0 and SPSS 25.0 for descriptive, confirmatory, and structural equation modeling analyses. These results indicated that functional value was the highest influencing variable on satisfaction of voice commerce, while social, emotional, and epistemic values significantly influenced it as well. Additionally, satisfaction of voice commerce significantly influenced the continuance use intention of voice commerce. These findings could help us understand the characteristics of voice commerce users and the diversity value in voice commerce environment.

A Case Study of Lesson Design Based on Mathematical Modeling of Pre-Service Mathematics Teachers (중등 예비교사들의 수학적 모델링 기반 수업 설계 사례연구)

  • Choi, Heesun
    • Communications of Mathematical Education
    • /
    • v.36 no.1
    • /
    • pp.59-72
    • /
    • 2022
  • The purpose of this study is to understand the characteristics of the mathematical modeling tasks and lesson designs developed by pre-service teachers based on the inherent awareness of mathematical modeling, considering the importance of creating a task to perform mathematical modeling activity and designing a lesson. As a result, the mathematical modeling tasks developed by pre-service teachers mainly presents an appropriate amount of information using real life contexts for the purpose of learning using concepts, and it showed a tendency to develop to the level of cognitive demand that required procedures with connections to understanding, meaning, or concepts. And most of the developed modeling task-based lessons showed a tendency to design warm-up activity, model-eliciting activity, and model-exploration activity. This result is due to the lack of experience of pre-service teachers in creating mathematical modeling tasks. Therefore, it is necessary to continuously provide opportunities for pre-service teachers to learn concepts or create mathematical modeling tasks intended for exploration according to various mathematical contents, thereby actively cultivating their ability to create modeling tasks in the course of training pre-service teachers. Furthermore, it is necessary to strengthen the expertise in mathematical modeling teaching and learning by providing opportunities to actually perform the mathematical modeling-based classes designed by pre-service teachers and to experience the process of reflecting on the lessons.

Deep Learning-based Target Masking Scheme for Understanding Meaning of Newly Coined Words (신조어의 의미 학습을 위한 딥러닝 기반 표적 마스킹 기법)

  • Nam, Gun-Min;Seo, Sumin;Kwahk, Kee-Young;Kim, Namgyu
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.391-394
    • /
    • 2021
  • 최근 딥러닝(Deep Learning)을 활용하여 텍스트로 표현된 단어나 문장의 의미를 파악하기 위한 다양한 연구가 활발하게 수행되고 있다. 하지만, 딥러닝을 통해 특정 도메인에서 사용되는 언어를 이해하기 위해서는 해당 도메인의 충분한 데이터에 대해 오랜 시간 학습이 수행되어야 한다는 어려움이 있다. 이러한 어려움을 극복하고자, 최근에는 방대한 양의 데이터에 대한 학습 결과인 사전 학습 언어 모델(Pre-trained Language Model)을 다른 도메인의 학습에 적용하는 방법이 딥러닝 연구에서 많이 사용되고 있다. 이들 접근법은 사전 학습을 통해 단어의 일반적인 의미를 학습하고, 이후에 단어가 특정 도메인에서 갖는 의미를 파악하기 위해 추가적인 학습을 진행한다. 추가 학습에는 일반적으로 대표적인 사전 학습 언어 모델인 BERT의 MLM(Masked Language Model)이 다시 사용되며, 마스크(Mask) 되지 않은 단어들의 의미로부터 마스크 된 단어의 의미를 추론하는 형태로 학습이 이루어진다. 따라서 사전 학습을 통해 의미가 파악되어 있는 단어들이 마스크 되지 않고, 신조어와 같이 의미가 알려져 있지 않은 단어들이 마스크 되는 비율이 높을수록 단어 의미의 학습이 정확하게 이루어지게 된다. 하지만 기존의 MLM은 무작위로 마스크 대상 단어를 선정하므로, 사전 학습을 통해 의미가 파악된 단어와 사전 학습에 포함되지 않아 의미 파악이 이루어지지 않은 신조어가 별도의 구분 없이 마스크에 포함된다. 따라서 본 연구에서는 사전 학습에 포함되지 않았던 신조어에 대해서만 집중적으로 마스킹(Masking)을 수행하는 방안을 제시한다. 이를 통해 신조어의 의미 학습이 더욱 정확하게 이루어질 수 있고, 궁극적으로 이러한 학습 결과를 활용한 후속 분석의 품질도 향상시킬 수 있을 것으로 기대한다. 영화 정보 제공 사이트인 N사로부터 영화 댓글 12만 건을 수집하여 실험을 수행한 결과, 제안하는 신조어 표적 마스킹(NTM: Newly Coined Words Target Masking)이 기존의 무작위 마스킹에 비해 감성 분석의 정확도 측면에서 우수한 성능을 보임을 확인하였다.

  • PDF

Tendency Analysis of Water Quality in the Yeongsan River Watershed using Mann-Kendall Test (Mann-Kendall 검정기법을 이용한 영산강 수질의 경향분석)

  • Kang, Ji Eun;Park, Sung Chun;Park, Su Ho;Lee, Woo Bum
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.442-442
    • /
    • 2021
  • 하천과 호수 등 공공수역에서 측정되는 수질자료는 수자원 및 수생태계의 실태를 파악하기 위한 가장 중요한 요소이며, 측정망 운영으로 장기간 측정된 방대한 수질자료를 이용하여 신뢰성 있는 장기 경향 추세를 분석하는 것 또한 매우 중요하다. 장기간 생산된 수질자료에 대한 통계적 경향분석을 실시함으로써 정량적으로 수질자료를 분석할 수 있는데 우선 일정한 장소에서 동일한 측정기법을 통해 비교적 장기간 동안 일정간격으로 측정된 수질자료가 필요하다. 우리나라의 수질자료는 1990년도 이후부터 잘 축적되어 왔으므로 비로소 시간에 따른 수질변화 경향을 파악하는 것이 용이해졌다. 이러한 수질경향 분석을 통하여 수체 내부에서 일어나는 여러 가지 수질 변화 과정을 이해하고 적절한 수질관리 대책을 마련할 수도 있다. 본 연구에서는 수질자료의 경향을 분석하기 위하여 비모수적 통계기법의 수질 경향을 분석하는데 많이 활용되는 맨-켄달 검정기법(Mann-Kendall Test)과 LOWESS(LOcally WEighted Scatter polt Smoother) 경향분석법을 적용하였다. 맨-켄달 검정기법은 선형 경향을 기본 가정으로하기 때문에 대상 기간 동안 경향성이 변할 경우에는 이를 적절히 반영할 수 없는 단점이 있으나 LOWESS 경향분석법은 이를 보완하기 위하여 특정회귀모델을 가정하지 않고 이동 직선에 대한 수질자료 점들을 통해 회귀모델을 적합 시키는 방법으로 기간 내 변화하는 경향성을 파악 할 수 있는 대상지점은 영산강본류 중심으로 지류지천을 포함하여 18개 지점에 대하여 분석하였으며, p-value값은 0.05를 기준으로 미만일 경우 경향성이 있고, 이상일 경우 경향성이 없는 것으로 분류하였으며, Trend는 경향성이 있다고 판단될 경우 S값이 양수이면 증가하는 경향으로, S값이 음수이면 감소하는 경향으로 판단하였다. 경향분석을 통해 영산강 18개 지점을 분석한 결과 영산강 상류와 중류, 지류에 대한 전체적인 경향을 판단할 수 있었다.

  • PDF

Three Steps Polyalphabetic Substitution Cipher Practice Model using Vigenere Table for Encryption (Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델)

  • Nguyen Huu Hoa;Dang Quach Gia Binh;Do Yeong Kim;Young Namgoong;Si Choon Noh
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.33-39
    • /
    • 2022
  • Recently, cyberattacks on infrastructure have been continuously occurring with the starting of neutralizing the user authentication function of information systems. Accordingly, the vulnerabilities of system are increasing day by day, such as the increase in the vulnerabilities of the encryption system. In this paper, an alternative technique for the symmetric key algorithm has been developed in order to build the encryption algorithm that is not easy for beginners to understand and apply. Vigenere Cipher is a method of encrypting alphabetic text and it uses a simple form of polyalphabetic substitution. The encryption application system proposed in this study uses the simple form of polyalphabetic substitution method to present an application model that integrates the three steps of encryption table creation, encryption and decryption as a framework. The encryption of the original text is done using the Vigenère square or Vigenère table. When applying to the automatic generation of secret keys on the information system this model is expected that integrated authentication work, and analysis will be possible on target system. ubstitution alphabets[3].

Enhancement of Security Monitoring & Control System in Zero Trust Security Models (제로트러스트 보안 모델에서 보안관제 시스템 강화 연구)

  • Wonhyung Park
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2022
  • Recently, the concept of zero trust has been introduced, and it is necessary to strengthen the security elements required for the next-generation security control system. Also, the security paradigm in the era of the 4th industrial revolution is changing. Cloud computing and the cybersecurity problems caused by the dramatic changes in the work environment due to the corona 19 virus continue to occur. And at the same time, new cyber attack techniques are becoming more intelligent and advanced, so a future security control system is needed to strengthen security. Based on the core concept of doubting and trusting everything, Zero Trust Security increases security by monitoring all communications and allowing strict authentication and minimal access rights for access requesters. In this paper, we propose a security enhancement plan in the security control field through a zero trust security model that can understand the problems of the existing security control system and solve them.