• Title/Summary/Keyword: Computer Model

Search Result 14,736, Processing Time 0.043 seconds

Estimation Method of Predicted Time Series Data Based on Absolute Maximum Value (최대 절대값 기반 시계열 데이터 예측 모델 평가 기법)

  • Shin, Ki-Hoon;Kim, Chul;Nam, Sang-Hun;Park, Sung-Jae;Yoo, Sung-Soo
    • Journal of Energy Engineering
    • /
    • v.27 no.4
    • /
    • pp.103-110
    • /
    • 2018
  • In this paper, we introduce evaluation method of time series prediction model with new approach of Mean Absolute Percentage Error(hereafter MAPE) and Symmetric Mean Absolute Percentage Error(hereafter sMAPE). There are some problems using MAPE and sMAPE. First MAPE can't evaluate Zero observation of dataset. Moreover, when the observed value is very close to zero it evaluate heavier than other methods. Finally it evaluate different measure even same error between observations and predicted values. And sMAPE does different evaluations are made depending on whether the same error value is over-predicted or under-predicted. And it has different measurement according to the each sign, even if error is the same distance. These problems were solved by Maximum Mean Absolute Percentage Error(hereafter mMAPE). we used the absolute maximum of observed value as denominator instead of the observed value in MAPE, when the value is less than 1, removed denominator then solved the problem that the zero value is not defined. and were able to prevent heavier measurement problem. Also, if the absolute maximum of observed value is greater than 1, the evaluation values of mMAPE were compared with those of the other evaluations. With Beijing PM2.5 temperature data and our simulation data, we compared the evaluation values of mMAPE with other evaluations. And we proved that mMAPE can solve the problems that we mentioned.

Quality Improvement Method on Grammatical Errors of Information System Audit Report (정보시스템 감리보고서의 문법적 오류에 대한 품질 향상 방안)

  • Lee, Don Hee;Lee, Gwan Hyung;Moon, Jin Yong;Kim, Jeong Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.211-219
    • /
    • 2019
  • Accomplishing information system, techniques, methodology have been studied continuously and give much help to auditors who are using them. Additionally audit report which is the conclusion of accomplishing ISA(information system audit), has law of a basis and phase with ITA/EA Law(Electronic Government Law). This paper is for better quality of ISA report. But it has more errors about sentence and Grammatical structures. In this paper, to achieve quality improvement objectives, it is necessary to recognize the importance of an audit report by investigating on objectives, functionality, structures and usability of a report firstly, and a legal basis, the presence of report next. Several types of audit reports were chosen and the reports errors were divided into several categories and analyzed. After grasping reasons of those errors, the methods for fixing those errors and check-lists model was provided. And based on that foundation, the effectiveness validation about real audit reports was performed. The necessity for efforts to improve the quality of audit reports was emphasized and further research subject(AI Automatic tool) of this paper conclusion. We also expect this paper to be useful for the organization to improve on ISA in the future.

De-identifying Unstructured Medical Text and Attribute-based Utility Measurement (의료 비정형 텍스트 비식별화 및 속성기반 유용도 측정 기법)

  • Ro, Gun;Chun, Jonghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.121-137
    • /
    • 2019
  • De-identification is a method by which the remaining information can not be referred to a specific individual by removing the personal information from the data set. As a result, de-identification can lower the exposure risk of personal information that may occur in the process of collecting, processing, storing and distributing information. Although there have been many studies in de-identification algorithms, protection models, and etc., most of them are limited to structured data, and there are relatively few considerations on de-identification of unstructured data. Especially, in the medical field where the unstructured text is frequently used, many people simply remove all personally identifiable information in order to lower the exposure risk of personal information, while admitting the fact that the data utility is lowered accordingly. This study proposes a new method to perform de-identification by applying the k-anonymity protection model targeting unstructured text in the medical field in which de-identification is mandatory because privacy protection issues are more critical in comparison to other fields. Also, the goal of this study is to propose a new utility metric so that people can comprehend de-identified data set utility intuitively. Therefore, if the result of this research is applied to various industrial fields where unstructured text is used, we expect that we can increase the utility of the unstructured text which contains personal information.

A study on the establishment of Korean-Chinese language education service platform using AR/VR technology (AR/VR 기술을 활용한 한-중 어학교육 서비스 플랫폼 구축방안 연구)

  • Chun, Keung;Yoo, Gab Sang
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.23-30
    • /
    • 2019
  • The development of content for language education using AR/VR technology is a necessary task to be pursued in line with commercialization of 5G. Research on service platform for systematic management and service is currently being carried out by global companies competitively, The unique language education service model for unique areas of culture has the right to pursue R & D jointly with Korea and China. In this study, we applied the developed "Korean language education service platform for Chinese people based on e-learning" to improve the acceptance of AR/VR contents and applied AR/VR technology to video-based language education contents. And to present a new paradigm of language education. Contents development is to develop AR-based vocabulary learning services, develop experiential learning contents for VR-based step-by-step situations, and gradually develop contents to enable beginner / intermediate / advanced language education services. The service platform enables management of learning management and learning contents, and complies with metadata attributes to complete a platform capable of accommodating large capacity AR/VR contents. In the future, systematic research will be carried out in order to develop as a portal for educational services through development of various contents using mixed reality technology.

A Novel Reference Model for Cloud Manufacturing CPS Platform Based on oneM2M Standard (제조 클라우드 CPS를 위한 oneM2M 기반의 플랫폼 참조 모델)

  • Yun, Seongjin;Kim, Hanjin;Shin, Hyeonyeop;Chin, Hoe Seung;Kim, Won-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.2
    • /
    • pp.41-56
    • /
    • 2019
  • Cloud manufacturing is a new concept of manufacturing process that works like a single factory with connected multiple factories. The cloud manufacturing system is a kind of large-scale CPS that produces products through the collaboration of distributed manufacturing facilities based on technologies such as cloud computing, IoT, and virtualization. It utilizes diverse and distributed facilities based on centralized information systems, which allows flexible composition user-centric and service-oriented large-scale systems. However, the cloud manufacturing system is composed of a large number of highly heterogeneous subsystems. It has difficulties in interconnection, data exchange, information processing, and system verification for system construction. In this paper, we derive the user requirements of various aspects of the cloud manufacturing system, such as functional, human, trustworthiness, timing, data and composition, based on the CPS Framework, which is the analysis methodology for CPS. Next, by analyzing the user requirements we define the system requirements including scalability, composability, interactivity, dependability, timing, interoperability and intelligence. We map the defined CPS system requirements to the requirements of oneM2M, which is the platform standard for IoT, so that the support of the system requirements at the level of the IoT platform is verified through Mobius, which is the implementation of oneM2M standard. Analyzing the verification result, finally, we propose a large-scale cloud manufacturing platform based on oneM2M that can meet the cloud manufacturing requirements to support the overall features of the Cloud Manufacturing CPS with dependability.

A Noise-Tolerant Hierarchical Image Classification System based on Autoencoder Models (오토인코더 기반의 잡음에 강인한 계층적 이미지 분류 시스템)

  • Lee, Jong-kwan
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.23-30
    • /
    • 2021
  • This paper proposes a noise-tolerant image classification system using multiple autoencoders. The development of deep learning technology has dramatically improved the performance of image classifiers. However, if the images are contaminated by noise, the performance degrades rapidly. Noise added to the image is inevitably generated in the process of obtaining and transmitting the image. Therefore, in order to use the classifier in a real environment, we have to deal with the noise. On the other hand, the autoencoder is an artificial neural network model that is trained to have similar input and output values. If the input data is similar to the training data, the error between the input data and output data of the autoencoder will be small. However, if the input data is not similar to the training data, the error will be large. The proposed system uses the relationship between the input data and the output data of the autoencoder, and it has two phases to classify the images. In the first phase, the classes with the highest likelihood of classification are selected and subject to the procedure again in the second phase. For the performance analysis of the proposed system, classification accuracy was tested on a Gaussian noise-contaminated MNIST dataset. As a result of the experiment, it was confirmed that the proposed system in the noisy environment has higher accuracy than the CNN-based classification technique.

The Influence of Organizational Communication Recognized by Irregular Workers on Job Satisfaction and Organizational Commitment (비정규직이 인식한 조직커뮤니케이션이 직무만족과 조직몰입에 미치는 영향)

  • Choi, Jae Won;Lee, Seok Kee;Chun, Sungyong
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.101-111
    • /
    • 2021
  • Irregular workers, which have recently caused various socio-economic issues and conflicts, generally have low loyalty to the organization and job satisfaction due to anxiety about employment. As a way to improve this, this study attempted to analyze the effect of organizational communication satisfaction of irregular workers on job satisfaction and organizational commitment. Among the 7th Human Capital Companies panel survey data, irregular workers survey data were collected and analyzed using the structural equation model analysis. The results were as follows: First, it was analyzed that organizational communication recognized by irregular workers had a positive(+) effect on job satisfaction and organizational commitment. Second, it was analyzed that job satisfaction had a positive(+) effect on organizational commitment. Third, it was analyzed that job satisfaction plays a mediating role in the relationship between communication satisfaction and organizational commitment. This study is significant in that it expanded the research subject to irregular workers from the existing service industry-oriented research, and that it included more diverse industries. The results of this study suggest that mission and vision sharing and communication activation system are needed to improve organizational effectiveness of irregular workers.

Development of KBIMS Architectural and Structural Element Library and IFC Property Name Conversion Methodology (KBIMS 건축 및 구조 부재 라이브러리 및 IFC 속성명 변환 방법 개발)

  • Kim, Seonwoo;Kim, Sunjung;Kim, Honghyun;Bae, Kiwoo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.6
    • /
    • pp.505-514
    • /
    • 2020
  • This research introduces the method of developing Korea BIM standard (KBIMS) architectural and structural element library and the methodology of converting KBIMS IFC property names with special characters. Diverse BIM tools are utilizing in project, however BIM library researches lack diversity on BIM tool selection. This research described the method to generate twelve categories and seven hundred and ninety-three elements library containing geometrical and numerical data in CATIA V6. KBIMS has its special property data naming systems which was the challenge inputting to ENOVIA IFC database. Three mapping methods for special naming characters had been developed and the ASCII code method was applied. In addition, the convertor prototype had been developed for searching and replacing the ASCII codes into the original KBIMS IFC property names. The methodology was verified by exporting 2,443 entities without data loss in the sample model conversion test. This research would provide a wider choice of BIM tool selection for applying KBIMS. Furthermore, the research would help on the reduction of data interoperability issues in projects. The developed library would be open to the public, however the continuous update and maintenance would be necessary.

A Study on Minimization of Harbor Oscillations by Infragravity Waves Using Permeable Breakwater (투과제를 이용한 중력외파의 항내 수면진동 저감 방법에 대한 연구)

  • Kwak, Moon Su;Jeong, Weon Mu
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.32 no.6
    • /
    • pp.434-445
    • /
    • 2020
  • In this study, the minimization of harbor oscillation using permeable breakwater was applied to the actual harbor and investigated an effect of minimization by computer simulation in order to take into account the water quality problems and measures of harbor oscillation by infragravity waves at the same time. The study site is Mukho harbor located at East coast of Korea that harbor oscillation has been occurred frequently. The infragravity waves obtained by analyzing the observed field data for five years focused on the distribution between wave periods of 40 s and 70 s and wave heights in less than 0.1 m was 94% of analyzing data. The target wave periods was 68.0 s. The most effective method of minimization of harbor oscillation by infragravity waves was to install a detached permeable breakwater with transmission coefficient of 0.3 on the outside harbor and replace some area of the vertical wall in the harbor with wave energy dissipating structure to achieve a reflectivity of 0.9 or less. The amplitude reduction rate of this method shown in 27.4%. And the effect of the difference in transmission coefficient of permeable breakwater on the reduction rate of the amplitude was not significant.

A Study on Analysis and Development of Education Program in Information Security Major (대학의 정보보호 관련학과 교육과정분석과 모델개발에 관한 연구)

  • 양정모;이옥연;이형우;하재철;유승재;이민섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.17-26
    • /
    • 2003
  • Recently, as the internet is widespread rapidly among the public, people can use a variety of useful information services through the internet. Accordingly, the protection of information supplied by computer networks 5 has become a matter of primary concern on the whole world. To accede to the realistic demands, it has been worked out some countermeasures to cultivate the experts in information security by the government and many educational facilities. Already the government authority has carried out the each kinds of concerning projects under the framed a policy, Five-Year Development Plan for Information Security Technology. Also, many domestic universities perceives such an international trend, and so they frame their plans to train for the experts in this field, including to found a department with respect to the information security. They are ready to execute their tangible works, such as establishment of educational goal, development of teaching materials, planning curriculum, construction of laboratories and ensuring instructors. Moreover, such universities lead to their students who want to be information security experts to get the fundamental knowledge to lay the foundation for acquiring the information security technology in their bachelor course. In this note, we survey and analyze the curricula of newly-established or member-extended departments with respect to information security fields of some leading universities in the inside and outside of the country, and in conclusion, we propose the effective model of curriculum and educational goal to train the students for the information security experts.