• Title/Summary/Keyword: Classification of Scheme

Search Result 839, Processing Time 0.028 seconds

Taxonomy of plant virus and role of the ICTV database

  • Ryu, Ki-Hyun
    • Proceedings of the Korean Society of Plant Pathology Conference
    • /
    • 2003.10a
    • /
    • pp.28-28
    • /
    • 2003
  • The International Committee for Taxonomy of Viruses (ICTV), which was formed over 30 years ago, aims to develop a single, universal taxonomic scheme for all viruses or, in other words, "the classification of viruses and the assignment of names to taxa". Plant Virus taxonomy is in charge of Plant Virus Subcommittee, a substructure of the ICTV. The ICTV has been most successfully pursuing that aim and its mammoth 'Seventh Report' records details of the names it has collated and approved, and of the classification, it has devised. The current 7th ICTV report published in 2000 contains plant viruses of 951 species in 79 genera in 17 families, though 24 of the 79 genera are floating genera, that is, they are not included in any established families. Proposed name of new or existing viruses are vote for the accepted taxonomic proposals by ICTV Executive Committee meeting. The approved results have been published as the ICTV reports providing standard names and taxa of viruses all over the world. A number of new plant viruses have been identified or reclassified in the genus or species level, and new genera and families have been proposed.(중략)

  • PDF

A Study of Promotion of Public Policy Information Services: Focusing on a Model of a Specialized Educational Policy Information Center (정책정보서비스의 활성화 방안 연구 - 교육정책정보전문센터의 모형 제시를 중심으로 -)

  • Lee, Myeong-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.3
    • /
    • pp.139-160
    • /
    • 2013
  • Ten Web sites from educational policy authorities, educational research institutions, professional educational, and national libraries that provide educational policy information services are investigated using content analysis method. They are analyzed using various types of information sources, classification schemes, and functions of information retrieval. Standardization of classification scheme of educational policy information, standardization of meta data items, improvement of retrieval systems, provision of personalized information services to educational policy authorities, operation of specialized policy information centers, and cooperation among professional institutions are suggested. A model of a specialized educational policy information center is proposed.

Cavitation Condition Monitoring of Butterfly Valve Using Support Vector Machine (SVM을 이용한 버터플라이 밸브의 캐비테이션 상태감시)

  • 황원우;고명환;양보석
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.14 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • Butterfly valves are popularly used in service in the industrial and water works pipeline systems with large diameter because of its lightweight, simple structure and the rapidity of its manipulation. Sometimes cavitation can occur. resulting in noise, vibration and rapid deterioration of the valve trim, and do not allow further operation. Thus, the monitoring of cavitation is of economic interest and is very importance in industry. This paper proposes a condition monitoring scheme using statistical feature evaluation and support vector machine (SVM) to detect the cavitation conditions of butterfly valve which used as a flow control valve at the pumping stations. The stationary features of vibration signals are extracted from statistical moments. The SVMs are trained, and then classify normal and cavitation conditions of control valves. The SVMs with the reorganized feature vectors can distinguish the class of the untrained and untested data. The classification validity of this method is examined by various signals that are acquired from butterfly valves in the pumping stations and compared the classification success rate with those of self-organizing feature map neural network.

An Analysis of Theory Use in the Library and information Science Research (문헌정보연구의 이론 활용성 분석)

  • 정동열;김성진
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.165-198
    • /
    • 2003
  • This study analyzed authors' use of theory in 654 articles that appeared in two core library and information science journals during last three decades. In order to analyze degree of theory use of LIS, such as, publication productivity, growth and distribution of theory in subfields. name and origin of theory, usability of each theory, subfields and journals, and so on, content analysis of LIS theories was performed through conceptual and empirical study. For the purpose of this study, we suggested a couple of new analytical methods, so called, ‘Subfield Classification Scheme’ within LIS, and ‘5 Degrees of Theory Use’ model for the first time.

Localization and size estimation for breaks in nuclear power plants

  • Lin, Ting-Han;Chen, Ching;Wu, Shun-Chi;Wang, Te-Chuan;Ferng, Yuh-Ming
    • Nuclear Engineering and Technology
    • /
    • v.54 no.1
    • /
    • pp.193-206
    • /
    • 2022
  • Several algorithms for nuclear power plant (NPP) break event detection, isolation, localization, and size estimation are proposed. A break event can be promptly detected and isolated after its occurrence by simultaneously monitoring changes in the sensing readings and by employing an interquartile range-based isolation scheme. By considering the multi-sensor data block of a break to be rank-one, it can be located as the position whose lead field vector is most orthogonal to the noise subspace of that data block using the Multiple Signal Classification (MUSIC) algorithm. Owing to the flexibility of deep neural networks in selecting the best regression model for the available data, we can estimate the break size using multiple-sensor recordings of the break regardless of the sensor types. The efficacy of the proposed algorithms was evaluated using the data generated by Maanshan NPP simulator. The experimental results demonstrated that the MUSIC method could distinguish two near breaks. However, if the two breaks were close and of small sizes, the MUSIC method might wrongly locate them. The break sizes estimated by the proposed deep learning model were close to their actual values, but relative errors of more than 8% were seen while estimating small breaks' sizes.

Facebook Spam Post Filtering based on Instagram-based Transfer Learning and Meta Information of Posts (인스타그램 기반의 전이학습과 게시글 메타 정보를 활용한 페이스북 스팸 게시글 판별)

  • Kim, Junhong;Seo, Deokseong;Kim, Haedong;Kang, Pilsung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.43 no.3
    • /
    • pp.192-202
    • /
    • 2017
  • This study develops a text spam filtering system for Facebook based on two variable categories: keywords learned from Instagram and meta-information of Facebook posts. Since there is no explicit labels for spam/ham posts, we utilize hash tags in Instagram to train classification models. In addition, the filtering accuracy is enhanced by considering meta-information of Facebook posts. To verify the proposed filtering system, we conduct an empirical experiment based on a total of 1,795,067 and 761,861 Facebook and Instagram documents, respectively. Employing random forest as a base classification algorithm, experimental result shows that the proposed filtering system yield 99% and 98% in terms of filtering accuracy and F1-measure, respectively. We expect that the proposed filtering scheme can be applied other web services suffering from massive spam posts but no explicit spam labels are available.

(A Study on Improvement for Defense Specifications/Standards System) (국방 표준/규격 체계 개선방안 연구)

  • Park, Jae-Yong;Choi, Seok-Cheol
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.1
    • /
    • pp.105-121
    • /
    • 2009
  • Recently, the level of science and technology in our country has reached the level of the advanced countries. However, the level of standards/specifications was insufficient for support. In this study, after a review of the international atmosphere on defense specifications/standards and an investigation of the domestic present situation, three different perspectives of improvement scheme for the defense specifications/standard system are presented. First, in the defense standard classification system perspective, specifications, standards and handbook were defined based on their characteristic and properties. Second, in the perspective concerning the establishment procedure of defense standards/specifications, the bottom-up approach was suggested. Finally, in the perspective of the 'defense standards/specifications instructions', a reinforced drawing number system and other factors to overcome the current limitations are provided.

A Study on Graphical Determination of RQD variation in 3-D Space and Its Application into Field Survey Data (RQD의 3차원분포 도시화와 변화특성에 관한 연구 및 현장적용 검토)

  • 최시영;박형동
    • Tunnel and Underground Space
    • /
    • v.11 no.4
    • /
    • pp.311-318
    • /
    • 2001
  • RQD is used to evaluate the degree of fracture in the rock mass and is also used as input into rock mass classification scheme, such as RMR and Q-system. However there are some drawbacks of the RQD caused by anisotropy and calculation length. Thus it is important to understand the variation of RQD in 3-D space in order to evaluate the properties of rock mass. The main purpose of this study is to reveal the distribution of RQD in the equal-angle stereo net, to investigate the effects of scanline length and joint frequency and to inquire the effect on the selection of rock mass strength parameters in the numerical analysis. Analysis has been extended to field joint survey data using same method. The results can be applied to contribute for more accurate interpretation of the results of engineering geological survey for better design and construction work.

  • PDF

A Robust and Device-Free Daily Activities Recognition System using Wi-Fi Signals

  • Ding, Enjie;Zhang, Yue;Xin, Yun;Zhang, Lei;Huo, Yu;Liu, Yafeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2377-2397
    • /
    • 2020
  • Human activity recognition is widely used in smart homes, health care and indoor monitor. Traditional approaches all need hardware installation or wearable sensors, which incurs additional costs and imposes many restrictions on usage. Therefore, this paper presents a novel device-free activities recognition system based on the advanced wireless technologies. The fine-grained information channel state information (CSI) in the wireless channel is employed as the indicator of human activities. To improve accuracy, both amplitude and phase information of CSI are extracted and shaped into feature vectors for activities recognition. In addition, we discuss the classification accuracy of different features and select the most stable features for feature matrix. Our experimental evaluation in two laboratories of different size demonstrates that the proposed scheme can achieve an average accuracy over 95% and 90% in different scenarios.

An Implementation and Evaluation of Junk Mail Filtering System to use the FQDN Check and personalized Quarantine Process (FQDN과 개인화 격리 처리를 이용한 정크메일 차단 시스템의 구현 및 평가)

  • Kim, Sung-Chan;Jun, Moon-Seog;Choun, Jun-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.3-13
    • /
    • 2006
  • Internet mail has become a common communication method to send and receive an amount of data due to the tremendous high speed Internet service increment. But in other respect, the risk and damage of Junk mail is growing rapidly and nowadays Junk mail delivery problem is becoming more serious, because this is used for an attack or propagation scheme of malicious code. It's a most dangerous dominant cause for computer system accident. This paper shows the Junk mail characteristic which is based on the analysis of mail log in reality and then shows the implementation of the FQDN (Fully Qualified Domain Name) check and Personalized classification system and evaluates its performance.