• Title/Summary/Keyword: 패턴 지도 방안

Search Result 375, Processing Time 0.024 seconds

Deep Learning-based Person Analysis in Oriental Painting for Supporting Famous Painting Habruta (명화 하브루타 지원을 위한 딥러닝 기반 동양화 인물 분석)

  • Moon, Hyeyoung;Kim, Namgyu
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.105-116
    • /
    • 2021
  • Habruta is a question-based learning that talks, discusses, and argues in pairs. In particular, the famous painting Habruta is being implemented for the purpose of enhancing the appreciation ability of paintings and enriching the expressive power through questions and answers about the famous paintings. In this study, in order to support the famous painting Habruta for oriental paintings, we propose a method of automatically generating questions from the gender perspective of oriental painting characters using the current deep learning technology. Specifically, in this study, based on the pre-trained model, VGG16, we propose a model that can effectively analyze the features of Asian paintings by performing fine-tuning. In addition, we classify the types of questions into three types: fact, imagination, and applied questions used in the famous Habruta, and subdivide each question according to the character to derive a total of 9 question patterns. In order to verify the feasibilityof the proposed methodology, we conducted an experiment that analyzed 300 characters of actual oriental paintings. As a result of the experiment, we confirmed that the gender classification model according to our methodology shows higher accuracy than the existing model.

An Essay on Constructing an Official Concept of Broadcasting Contents (방송콘텐츠 개념의 제도적 정립을 위한 시론)

  • Cho, Byeong-Han
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.477-492
    • /
    • 2021
  • The purpose of this paper is to examine the problems caused by the lack of institutional establishment of broadcasting contents' concept, to present the categories and significance of broadcast contents concepts, and to promote discussions on defining broadcasting contents concepts. As the pattern of enjoying contents becomes fragmented, broadcasting contents such as dramas, entertainment, and documentaries are enjoyed in various ways through N-screens, beyond the distribution structure of the traditional broadcasting industry. But, the concept of broadcasting contents is subordinate to(or even absent from) the distribution structure of the broadcasting industry. This paper seeks to correct this problem by proposing a new definition of broadcasting contents. First of all, as a result of looking at the need to define the concept of broadcasting contents in various ways in principle, legal, and industrial aspects, broadcasting contents needed to be defined as a new concept independent of broadcasting media. Based on this, the existing discussions on the concept and type of broadcasting contents were reviewed to confirm the direction for establishing broadcasting contents concepts, and to define broadcasting contents into higher categories (liberal arts, entertainment), and lower categories ('documentaries, current affairs, education', 'dramas, animation, music, variety, sports').

Effective Design of Pixel-type Frequency Selective Surfaces using an Improved Binary Particle Swarm Optimization Algorithm (개선된 이진 입자 군집 최적화 알고리즘을 적용한 픽셀 형태 주파수 선택적 표면의 효율적인 설계방안 연구)

  • Yang, Dae-Do;Park, Chan-Sun;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.4
    • /
    • pp.261-269
    • /
    • 2019
  • This study investigates a method of designing pixel-type frequency selective surfaces(FSS) with flexibility while considering factors, such as polarization and incident angle. Among the various methods used to solve the discrete space problem when designing a pixel-type FSS, the binary particle swarm optimization(BPSO) algorithm is one of the most applicable techniques to determine the periodic structure pattern of an FSS. Therefore, a method of efficiently designing FSS with roll-off band pass characteristics using an improved BPSO algorithm is proposed. To solve the convergence problem in the fitness function design to induce particles in the desired solution, FSS with desired roll-off wave characteristics can be easily obtained by applying a fitness function using "slope" as an input parameter.

A Convergence Study on the Relationship between Cereal Intake Level and Food and Nutrients Intake of Chinese Middle-aged Women (중국 중년여성의 곡류 섭취수준과 식품 및 영양소 관련성에 대한 융합연구)

  • Park, Pil-Sook;Zhao, Han-Qing;Park, Mi-Yeon
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • This is a convergence study to investigate the relationship between cereal intake level and food and nutrient intake in 218 Chinese middle aged women aged 40 to 65 years. Data were analyzed by ${\chi}^2$ test, ANOVA, correlation analysis and Jonckheere-Terpstra trend test using SPSS 22.0 program. The results of the study were as follows. The higher the level of cereal intake in the subjects, the lower were the rate of breakfast fasting (p for trend=0.000), overeating (p for trend=0.019), and eating out (p for trend=0.003). The intake of root and tuber crops(p for trend=0.008), meat(p for trend=0.043), pulses(p for trend=0.020), and light colored vegetables(p for trend=0.015) per 1,000 kcal of energy increased when the level of cereal intake was 6 to 9 units. Therefore, it is necessary to discuss and study for continuous education and improvement through the feedback so that the middle-aged women can take the cereal appropriately.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

Educational Method of Algorithm based on Creative Computing Outputs (창의적 컴퓨팅 산출물 기반 알고리즘 교육 방법)

  • Hur, Kyeong
    • Journal of Practical Engineering Education
    • /
    • v.10 no.1
    • /
    • pp.49-56
    • /
    • 2018
  • Various types of SW education are being operated by universities for non-major undergraduates. And most of them focus on educating computational thinking. Following this computing education, there is a need for an educational method that implements and evaluates creative computing outcomes for each student. In this paper, we propose a method to realize SW education based on creative computing artifacts. To do this, we propose an educational method for students to implement digital logic circuit devices creatively and design SW algorithms that implement the functions of their devices. The proposed training method teaches a simple LED logic circuit using an Arduino board as an example. Students creatively design and implement two pairs of two input logic circuit devices, and design algorithms that represent patterns of implemented devices in various forms. And they design the functional extension and extended algorithm using the input device. By applying the proposed method, non-major students can gain the concept and necessity of algorithm design through creative computing artifacts.

A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information (개인정보 유출 방지를 위한 SRI(Security Risk Indicator) 기반 모니터링 시스템 개발)

  • Park, Sung-Ju;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.637-644
    • /
    • 2012
  • In our current information focused society, information is regarded as a core asset and the leakage of customers' information has emerged as a critical issue, especially in financial companies. It is very likely that the technology that safeguards which is currently in commercial use is not focused at an enterprise level but is fragmented by function or by only guards portions of a customer's personal information. Therefore, It is necessary to study the systems which monitor the indicators of access at an enterprise level in order to preemptively prevent the compromise of such data. This study takes an enterprise perspective on such systems for a financial company. I will focus on examination of the methods of implementation of the monitoring system, the application of pattern analysis and examination of Security Risk Indicators (SRI). A trial of the monitoring system provided security managers and related departments with proper screening capabilities of information. Therefore, it is possible to establish a systemic counter-plans based on detectable patterns.

Marketing Strengthening Strategy for Building Model House through Non-face-to-face Video Content Services (비대면 콘텐츠 서비스를 통한 건축 모델하우스 마케팅 강화 전략)

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1288-1293
    • /
    • 2020
  • As fears of infection with the Corona 19 virus increase, an untact mood is also blowing in the real estate market. Changes in life style are bringing about changes in the way of life and patterns of consumption. In the real estate marketing market, such changes are inevitable. In particular, marketing using a real estate model house has the characteristics of marketing that is closely related to the denseness that many people visit in an enclosed space. These characteristics include all three features (airtight, dense, close), characteristics mentioned in the COVID-19 prevention rules. Therefore, in this study, we will look at ways to reinforce model house customer marketing in line with the untact (non-face-to-face) trend and to avoid the above three features, characteristics in the model house customer marketing process, and show the implementation results to avoid features. Through this, we propose a safe and expandable real estate marketing strategy through the avoidance of the three features of corona 19.

Design of customized product recommendation model on correlation analysis when using electronic commerce (전자상거래 이용시 연관성 분석을 통한 맞춤형 상품추천 모델 설계)

  • Yang, MingFei;Park, Kiyong;Choi, Sang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.203-216
    • /
    • 2022
  • In the recent business environment, purchase patterns are changing around the influence of COVID-19 and the online market. This study analyzed cluster and correlation analysis based on purchase and product information. The cluster analysis of new methods was attempted by creating customer, product, and cross-bonding clusters. The cross-bonding cluster analysis was performed based on the results of each cluster analysis. As a result of the correlation analysis, it was analyzed that more association rules were derived from a cross-bonding cluster, and the overlap rate was less. The cross-bonding cluster was found to be highly efficient. The cross-bonding cluster is the most suitable model for recommending products according to customer needs. The cross-bonding cluster model can save time and provide useful information to consumers. It is expected to bring positive effects such as increasing sales for the company.

An Enhancement Method of Document Restoration Capability using Encryption and DnCNN (암호화와 DnCNN을 활용한 문서 복원능력 향상에 관한 연구)

  • Jang, Hyun-Hee;Ha, Sung-Jae;Cho, Gi-Hwan
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.79-84
    • /
    • 2022
  • This paper presents an enhancement method of document restoration capability which is robust for security, loss, and contamination, It is based on two methods, that is, encryption and DnCNN(DeNoise Convolution Neural Network). In order to implement this encryption method, a mathematical model is applied as a spatial frequency transfer function used in optics of 2D image information. Then a method is proposed with optical interference patterns as encryption using spatial frequency transfer functions and using mathematical variables of spatial frequency transfer functions as ciphers. In addition, by applying the DnCNN method which is bsed on deep learning technique, the restoration capability is enhanced by removing noise. With an experimental evaluation, with 65% information loss, by applying Pre-Training DnCNN Deep Learning, the peak signal-to-noise ratio (PSNR) shows 11% or more superior in compared to that of the spatial frequency transfer function only. In addition, it is confirmed that the characteristic of CC(Correlation Coefficient) is enhanced by 16% or more.