• Title/Summary/Keyword: 지식

Search Result 19,762, Processing Time 0.046 seconds

A Method for Spelling Error Correction in Korean Using a Hangul Edit Distance Algorithm (한글 편집거리 알고리즘을 이용한 한국어 철자오류 교정방법)

  • Bak, Seung Hyeon;Lee, Eun Ji;Kim, Pan Koo
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.16-21
    • /
    • 2017
  • Long time has passed since computers which used to be a means of research were commercialized and available for the general public. People used writing instruments to write before computer was commercialized. However, today a growing number of them are using computers to write instead. Computerized word processing helps write faster and reduces fatigue of hands than writing instruments, making it better fit to making long texts. However, word processing programs are more likely to cause spelling errors by the mistake of users. Spelling errors distort the shape of words, making it easy for the writer to find and correct directly, but those caused due to users' lack of knowledge or those hard to find may make it almost impossible to produce a document free of spelling errors. However, spelling errors in important documents such as theses or business proposals may lead to falling reliability. Consequently, it is necessary to conduct research on high-level spelling error correction programs for the general public. This study was designed to produce a system to correct sentence-level spelling errors to normal words with Korean alphabet similarity algorithm. On the basis of findings reported in related literatures that corrected words are significantly similar to misspelled words in form, spelling errors were extracted from a corpus. Extracted corrected words were replaced with misspelled ones to correct spelling errors with spelling error detection algorithm.

The hybrid of artificial neural networks and case-based reasoning for intelligent diagnosis system (인공 신경경망과 사례기반추론을 혼합한 지능형 진단 시스템)

  • Lee, Gil-Jae;Kim, Chang-Joo;Ahn, Byung-Ryul;Kim, Moon-Hyun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.1
    • /
    • pp.45-52
    • /
    • 2008
  • As the recent development of the IT services, there is a urgent need of effective diagnosis system to present appropriate solution for the complicated problems of breakdown control, a cause analysis of breakdown and others. So we propose an intelligent diagnosis system that integrates the case-based reasoning and the artificial neural network to improve the system performance and to achieve optimal diagnosis. The case-based reasoning is a reasoning method that resolves the problems presented in current time through the past cases (experience). And it enables to make efficient reasoning by means of less complicated knowledge acquisition process, especially in the domain where it is difficult to extract formal rules. However, reasoning by using the case-based reasoning alone in diagnosis problem domain causes a problem of suggesting multiple causes on a given symptom. Since the suggested multiple causes of given symptom has the same weight, the unnecessary causes are also examined as well. In order to resolve such problems, the back-propagation learning algorithm of the artificial neural network is used to train the pairs of the causes and associated symptoms and find out the cause with the highest weight for occurrence to make more clarified and reliable diagnosis.

A Visual Programming Environment on Tablet PCs to Control Industrial Robots (산업용 로봇 제어를 위한 태블릿 PC 기반의 비주얼 프로그래밍 연구)

  • Park, Eun Ji;Seo, Kyeong Eun;Park, Tae Gon;Sun, Duk Han;Cho, Hyeonjoong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.2
    • /
    • pp.107-116
    • /
    • 2016
  • Industrial robots have been usually controlled using text-based programming languages provided by each manufacturer with its button-based TP(Teaching Pendent) terminal. Unfortunately, when we consider that people who manipulate TPs in manufacturing sites are mostly unskilled with no background knowledge about computer programming, these text-based programming languages using button-based interaction on manufacturing sites are too difficult for them to learn and use. In order to overcome the weaknesses of the text-based programming language, we propose a visual programming language that can be easily used on gesture-enabled devices. Especially, in our visual programming environment, each command is represented as a block and robots are controlled by stacking those blocks using drag-and-drop gestures, which is easily learnable even by beginners. In this paper, we utilize a widely-spread device, Tablet PC as the gesture-enabled TP. Considering that Tablet PC has limited display space in contrast to PC environments, we designed different kinds of sets of command blocks and conducted user tests. Based on the experiment results, we propose an effective set of command blocks for Tablet PC environment.

Effect of Vanadium Addition on the Cavitation Erosion Resistance of Fe-Cr-Ni-Si-C Hardfacing Alloy (Fe-Cr-Ni-Si-C계 경면처리 합금의 Cavitation Erosion 저항성에 미치는 Vanadium 첨가의 영향)

  • 김경오;김준기;장세기;김선진;강성군
    • Proceedings of the Korean Institute of Surface Engineering Conference
    • /
    • 1998.11a
    • /
    • pp.72-72
    • /
    • 1998
  • 원자력발전소 1차계통내 밸브의 경면처리(hardfa따1잉에 사용되는 재료는 $90~343^{\circ}C$의 고온과 높은 접촉응력 그리고 급격한 압력변화가 일어나는 환경에서 사용되기 때문에 내마모성과 내식성 그리고 cavitation erosion 저항성이 우수한 Co계 Stellite 합금이 현재 사용되어진다. 그러나 Co가 원력발전소 1차계통의 방사선장을 형성하는 주요 원소로 알려지면서 S Stellite 합금을 대체할 수 있는 Fe계 경면처리용 합금을 개발하려는 연구가 진행되고 있다. 현재 Fe계 경면처리용 합금의 개발은 적절환 팝금원소를 첨가하여 적충결함에너지를 낮춤 으로써 전위의 교차슬립을 억제하여 표면을 경화시키고, 소성변형을 억제하여 마모저항성을 향상시키려는 방법으로 연구가 진행되고 있다. 본 연구에서는 Fe-Cr-Ni-Si-C 합금에 Fe계 합금의 적충결함에너지를 감소시키는 것으로 알려진 vanadium을 0, 1, 2wt%첨가하여 첨가량의 변화가 cavitation erosion 저항성에 미치 는 영향을 조사하였다. Cavitation erosion 실험은 초음파를 이용하여 미세한 기포를 발생시키는 vibratory type으로 A ASTM G-32 규격에 따라 제작된 실험장치를 이용하여 $25{\pm}2^{\circ}C$의 온도의 증류수 속에 잠긴 상태에서 실시하였다. 시면은 지름 16mm, 두게 7mm의 버턴형태로 vanadium 첨가량을 변화시킨 조성을 아크 용융 방법을 이용하여 제작하였으며 hom끝단부에 부착하여 cavitation e erosion 저항성 살험을 하였다. 시편의 cavitation erosion 실험시간에 따른 무게감소량을 측 정하였으며 cavitation erosion 시킨 시편의 표면을 SEM으로 관찰하였다.겨지는 열전달 매체액 과 신규 부식억제제가 적용된 시스템 등 객관적으로 확인된 부식억제제 시스랩에 대 하여 다양한 평가 방법을 동원 비교분석하고자 하였다. 실험은 KSM 2142에 의한 무게감량법, 분극곡선 측정에 의한 $E_P$(공식개시전위), $E_R$(재부동태화전위) 측정, 시간에 따른 자연전위 변화 측정 빛 이때의 부식속도(선형분극법), 인위적인 피막 파괴 전,후 의 전위 변화 및 부식속도 측정법에 의한 국부부식 발달 저지능 등을 평가하여 각 실험결과를 비교분석하여 보았다. 수록 민감하여 304 의 IGSCC 와 매우 유사한 거동을 보인다. 본 강연에서는 304 와 600 의 고온 물에서 일어나는 IGSCC 민감도에 미치는 환경, 예민화처리, 합금원소의 영향을 고찰하고 이에 대한 최근의 연구 동향과 방식 방법을 다룬다.다.의 목적과 지식)보다 미학적 경험에 주는 영향이 큰 것으로 나타났으며, 모든 사람들에게 비슷한 미학적 경험을 발생시키는 것 이 밝혀졌다. 다시 말하면 모든 사람들은 그들의 문화적인 국적과 사회적 인 직업의 차이, 목적의 차이, 또한 환경의 의미의 차이에 상관없이 아름다 운 경관(High-beauty landscape)을 주거지나 나들이 장소로서 선호했으며, 아름답다고 평가했다. 반면에, 사람들이 갖고 있는 문화의 차이, 직업의 차 이, 목적의 차이, 그리고 환경의 의미의 차이에 따라 경관의 미학적 평가가 달라진 것으로 나타났다.corner$적 의도에 의한 경관구성의 일면을 확인할수 있지만 엄밀히 생각하여 보면 이러한 예의 경우도 최락의 총체적인 외형은 마찬가지로 $\ulcorner$순응$\lrcorner$의 범위를 벗어나지 않는다. 그렇기 때문에도 $\ulcorner$

  • PDF

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

A Methodology for Translation of Operating System Calls in Legacy Real-time Software to Ada (Legacy 실시간 소프트웨어의 운영체제 호출을 Ada로 번역하기 위한 방법론)

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2874-2890
    • /
    • 1997
  • This paper describes a methodology for translation of concurrent software expressed in operating system (OS) calls to Ada. Concurrency is expressed in some legacy software by OS calls that perform concurrent process/task control. Examples considered in this paper are calls in programs in C to Unix and calls in programs in CMS-2 to the Executive Service Routines of ATES or SDEX-20 other software re/reverse engineering research has focused on translating the OS calls in a legacy software to calls to another OS. In this approach, the understanding of software has required knowledge of the underlying OS, which is usually very complicated and informally documented. The research in this paper has focused on translating the OS calls in a legacy software into the equivalent protocols using the Ada facilities. In translation to Ada, these calls are represented by Ada equivalent code that follow the scheme of a message-based kernel oriented architecture. To facilitate translation, it utilizes templates placed in library for data structures, tasks, procedures, and messages. This methodology is a new approach to modeling OS in Ada in software re/reverse engineering. There is no need of knowledge of the underlying OS for software understanding in this approach, since the dependency on the OS in the legacy software is removed. It is portable and interoperable on Ada run-time environments. This approach can handle the OS calls in different legacy software systems.

  • PDF

The Role of Geography Education in Marine Education (해양 교육의 중요성과 지리 교육의 역할)

  • Yoon Ok-Kyong
    • Journal of the Korean Geographical Society
    • /
    • v.41 no.4 s.115
    • /
    • pp.491-506
    • /
    • 2006
  • In terms of the importance of ocean as a present and future resource and the Korean peninsular location, it is strongly urged to develop renewed recognition and educational programs on ocean, so as to respond properly to the newly emerging political changes surrounding the country. By setting up the purpose of marine education as engendering greater interests in and knowledge of ocean, this research suggests that the frame of marine education can be founded appropriately on four educational sub-categories: humanity education, territory education, economy education, and resources and environment education. At an operational scale, this paper particularly analyzed ocean- related contents in the 7th national curriculum in order to find substantial ways for strengthening marine education. The study simultaneously compared the result of content analysis with the curriculum of marine education in other countries, and founded that explicit ocean-related contents in the 7th curriculum were significantly limited. Yet, the study alternatively points out that it is possible to use a variety of teaching materials and apply them for writing textbooks or developing teaching-teaming curriculum. I provide some of the ways for strengthening marine education by using marine-related themes in the curriculum of geography education. Marine is not simply one of the key elements in the discipline of geography. But, more importantly, I suggest that geography is particularly useful in developing various and familiar themes such as swimming beach, fishing villages, ports, marine-bound industrial district and port cities into teaching materials.

자가 생성 지도 학습 알고리즘을 이용한 컨테이너 식별자 인식

  • Kim, Jae-Yong;Park, Chung-Sik;Kim, Gwang-Baek
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.500-506
    • /
    • 2005
  • 본 논문에서는 자가 생성 지도 학습 알고리즘을 이용한 운송 컨테이너 식별자 인식 시스템을 제안한다. 일반적으로 운송 컨테이너의 식별자들은 글자의 색이 검정색 또는 흰색으로 이루어져 있는 특정이 있다. 이러한 특성을 고려하여 원 컨테이너 영상에 대해 검은색과 흰색을 제외하고는 모든 부분을 잡음으로 처리하기 위해 퍼지 추론 방법을 이용하여 식별자 영역과 바탕영역을 구별한다. 식별자 영역으로 구분 된 영역은 그대로 두고, 바탕 영역으로 구분된 영역 은 전체 영상의 평균 픽셀 값으로 대체시킨다. 그리고 Sobel 마스크를 이용하여 에지를 검출하고, 추출된 에지를 이용하여 수직 블록과 수평 블록을 검출 하여 컨테이너의 식별자 영역을 추출하고 이진화한다. 이진화 된 식별자 영역에 대해 검정색의 빈도수를 이용하여 흰바탕과 민바탕을 구분하고 4 방향 윤곽선 추적 알고리즘을 적용하여 개별 식별자를 추출 한다. 개별 식별자 인식을 위해 자가 생성 지도 학습 알고리즘을 제안하여 개별 식별자 인식에 적용한다. 제안된 자가 생성 지도 학습 알고리즘은 입력층과 은닉층 사이의 구조를 ART-l을 개선하여 적용하고 은닉층과 출력층 사이에는 일반화된 델타 학습 방법과 Delta-bar-Delta 알고리즘을 적용하여 학습 및 인식 성능을 개선한다. 실제 80 개의 컨테이너 영상을 대상으로 실험한 결과, 제안된 식별자 추출 방법이 이전의 개별 추출 방법보다 추출률이 개선되었고 FCM 기반 자가 생성 지도 학습 알고리즘보다 제안된 자가 생성 지도 학습 알고리즘이 컨테이너 식별자의 학습 및 인식에 있어서 개선된 것을 확인하였다.색 문제를 해결하고자 하는 것이 연구의 목적이다. 정보추출은 사용자의 관심사에 적합한 문서들로부터 어떤 구체적인 사실이나 관계를 정확히 추출하는 작업을 가리킨다.앞으로 e-메일, 매신저, 전자결재, 지식관리시스템, 인터넷 방송 시스템의 기반 구조 역할을 할 수 있다. 현재 오픈웨어에 적용하기 위한 P2P 기반의 지능형 BPM(Business Process Management)에 관한 연구와 X인터넷 기술을 이용한 RIA (Rich Internet Application) 기반 웹인터페이스 연구를 진행하고 있다.태도와 유아의 창의성간에는 상관이 없는 것으로 나타났고, 일반 유아의 아버지 양육태도와 유아의 창의성간의 상관에서는 아버지 양육태도의 성취-비성취 요인에서와 창의성제목의 추상성요인에서 상관이 있는 것으로 나타났다. 따라서 창의성이 높은 아동의 아버지의 양육태도는 일반 유아의 아버지와 보다 더 애정적이며 자율성이 높지만 창의성이 높은 아동의 집단내에서 창의성에 특별한 영향을 더 미치는 아버지의 양육방식은 발견되지 않았다. 반면 일반 유아의 경우 아버지의 성취지향성이 낮을 때 자녀의 창의성을 향상시킬 수 있는 것으로 나타났다. 이상에서 자녀의 창의성을 향상시키는 중요한 양육차원은 애정성이나 비성취지향성으로 나타나고 있어 정서적인 측면의 지원인 것으로 밝혀졌다.징에서 나타나는 AD-SR맥락의 반성적 탐구가 자주 나타났다. 반성적 탐구 척도 두 그룹을 비교 했을 때 CON 상호작용의 특징이 낮게 나타나는 N그룹이 양적으로 그리고 내용적으로 더 의미 있는 반성적 탐구를 했다용을 지원하는 홈페이지를 만들어 자료

  • PDF

Comparisons of the Performance with Bayes Estimator and MLE for Control Charts Based on Geometric Distribution (기하분포에 기초한 관리도에서 베이즈추정량과 최대우도추정량 사용의 성능 비교)

  • Hong, Hwiju;Lee, Jaeheon
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.5
    • /
    • pp.907-920
    • /
    • 2015
  • Charts based on geometric distribution are effective to monitor the proportion of nonconforming items in high-quality processes where the in-control proportion nonconforming is low. The implementation of this chart is often based on the assumption that in-control proportion nonconforming is known or accurately estimated. However, accurate parameter estimation is very difficult and may require a larger sample size than that available in practice for high-quality process where the proportion of nonconforming items is very small. An inaccurate estimate of the parameter can result in estimated control limits that cause unreliability in the monitoring process. The maximum likelihood estimator (MLE) is often used to estimate in-control proportion nonconforming. In this paper, we recommend a Bayes estimator for the in-control proportion nonconforming to incorporate practitioner knowledge and avoid estimation issues when no nonconforming items are observed in the Phase I sample. The effects of parameter estimation on the geometric chart and the geometric CUSUM chart are considered when the MLE and the Bayes estimator are used. The results show that chart performance with estimated control limits based on the Bayes estimator is generally better than that based on the MLE.

A Study on the Competence of the Private Security Guards (민간경비원의 업무능력에 미치는 영향요인에 관한 연구)

  • Kim, Hak-Bum;Lee, Jae-Young
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.81-105
    • /
    • 2011
  • Lately, with the increase of the private security industry, individual quality improvement of the private security guards is rising. Especially, in accordance with competence of the private security guards, in the base of individual technical or knowledge, the confidence of own ability is essential for the improvement of the private security industry. In accordance with the private security guards, the study of their competence is rare. But through the study of teenagers or members of the public organization, we can know the influence of variables competence. The purpose of this study is to show how the self-esteem, need for Achievement, relation with co-worker and supervisor, and leadership effect on competence. Consequently this study will offer effective ways to develop the private security guards competence. We can show that self-esteem effects competence of the private security guards between the need for achievement and self-esteem which are adjusted as the individual characteristic. Namely, the higher the self-esteem of the private security guards is, the higher competence is. The study shows that the relation with co-worker and supervisor of the private security guards doesn't effect competence. Unlike the previous studies, this study proves that contingent reward has a positive effect on the Private Security Guards competence in the transactional leadership. That is, the higher the contingent reward of leader is, the higher the level of competence of the Private Security Guards is. Lastly, We can know individualized consideration effect the competence of the private security guards in the transformational leadership.

  • PDF