• Title/Summary/Keyword: Distribution Information

Search Result 11,985, Processing Time 0.039 seconds

Analysis on the Survivor's Pension Payment with Logistic Regression Model (로지스틱 회귀모형을 이용한 유족연금 수급 분석)

  • Kim, Mi-Jung;Kim, Jin-Hyung
    • The Korean Journal of Applied Statistics
    • /
    • v.21 no.2
    • /
    • pp.183-200
    • /
    • 2008
  • Research for efficient management of the National Pension has been emphasized as the current society trends toward aging and low birth rate. In this article, we suggest a statistical model for effective classification and prediction of the reserve for the survivor's pension in Korea. Logistic regression model is incorporated; correct classification rate, and distribution of the posterior probability for the reserve of survivor's pension are investigated and compared with the results from the general logistic models. Assessment of predictive model is also done with lift graph, ROC curve and K-S statistic. We suggest strategies for reducing financial risks in managing and planning the pension as an application of the suggested model.

An Efficient Caching Strategy in Data Broadcasting (데이터 방송 환경에서의 효율적인 캐슁 정책)

  • Kim, Su-Yeon;Choe, Yang-Hui
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1476-1484
    • /
    • 1999
  • TV 방송 분야에서 다양한 정보와 상호 작용성을 제공하기 위해서 최근 기존 방송 내용인 A/V 스트림 외 부가정보 방송이 시도되고 있다. 데이타 방송에 대한 기존 연구는 대부분 고정된 내용의 데이타를 방송하는 환경을 가정하고 있어서 그 결과가 방송 내용의 변화가 많은 환경에 부적합하다. 본 논문에서는 데이타에 대한 접근이 반복되지 않을 가능성이 높고 사용자 접근 확률을 예상하기 어려운 상황에서 응답 시간을 개선하는 방안으로 수신 데이타를 무조건 캐쉬에 반입하고 교체가 필요한 경우 다음 방송 시각이 가장 가까운 페이지를 축출하는 사용자 단말 시스템에서의 캐슁 정책을 제안하였다. 제안된 캐쉬 관리 정책은 평균적인 캐쉬 접근 실패 비용을 줄임으로써 사용자 응답 시간을 개선하며, 서로 다른 스케줄링 기법을 사용하는 다양한 방송 제공자가 공존하는 환경에서 보편적으로 효과를 가져올 수 있다.Abstract Recently, many television broadcasters have tried to disseminate digital multimedia data in addition to the traditional content (audio-visual stream). The broadcast data need to be cached by a client system, to provide a reasonable response time for a user request. Previous studies assumed the dissemination of a fixed set of items, and the results are not suitable when broadcast items are frequently changed. In this paper, we propose a novel cache management scheme that chooses the replacement victim based on the remaining time to the next broadcast instance. The proposed scheme reduces response time, where it is hard to predict the probability distribution of user accesses. The caching policy we present here significantly reduces expected response time by minimizing expected cache miss penalty, and can be applied without difficulty to different scheduling algorithms.

Evaluation of Sewage Pollution by Coprostanol in the Sediments from Jinhae Bay, Korea (퇴적물내 Coprostanol을 이용한 진해만의 도시하수오염 평가)

  • CHOI Minkyu;MOON Hyo-Bang;KIM Sang-Soo;PARK Jong-Soo
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.38 no.2
    • /
    • pp.118-128
    • /
    • 2005
  • Surface sediment samples from 31 stations in Jinhae Bay were analyzed to evaluate the pollution by sewage from the spatial distribution of the fecal sterol, coprostanol. The sums of eight sterols (coprostanol, epicholestanol, epicoprostanol, cholesterol, cholestanol, brassicasterol, stigmasterol and $\beta$-sitosterol) were in the range of $2,703-27,154{\cal}ng/{\cal}g$ dry weight. The concentrations of the coprostanol in the sediments, which is a good tracer of sewage-derived organic contamination, were in the range of $76-3,964{\cal}ng/{\cal}g$ dry weight. The levels of coprostanol were much higher (almost one order of magnitude) at stations close to the big cities such as Masan and Jinhae. However, those levels were comparable to or lower than those previously reported in other foreign locations. Some ratios of coprostanol to other sterols and multivariate analysis could provide us with the information on the origin of the sterols being from sewage, plankton, and/or benthos. Those showed sewage dominance at the stations near the cities Masan and Jinhae, plankton dominance at the center of Jinhae Bay and mainly marine fauna origin at the mouth of Jinhae Bay. These results suggest that the contents of sterols and some ratios of these components are quite powerful tracer for the detection of the origin of the organic contaminants in the coastal environments.

Fuzzy One Class Support Vector Machine (퍼지 원 클래스 서포트 벡터 머신)

  • Kim, Ki-Joo;Choi, Young-Sik
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.159-170
    • /
    • 2005
  • OC-SVM(One Class Support Vector Machine) avoids solving a full density estimation problem, and instead focuses on a simpler task, estimating quantiles of a data distribution, i.e. its support. OC-SVM seeks to estimate regions where most of data resides and represents the regions as a function of the support vectors, Although OC-SVM is powerful method for data description, it is difficult to incorporate human subjective importance into its estimation process, In order to integrate the importance of each point into the OC-SVM process, we propose a fuzzy version of OC-SVM. In FOC-SVM (Fuzzy One-Class Support Vector Machine), we do not equally treat data points and instead weight data points according to the importance measure of the corresponding objects. That is, we scale the kernel feature vector according to the importance measure of the object so that a kernel feature vector of a less important object should contribute less to the detection process of OC-SVM. We demonstrate the performance of our algorithm on several synthesized data sets, Experimental results showed the promising results.

  • PDF

A Study on Health Behaviors and Medication Compliances of Hypertensive Patients in a Rural Area (일 농촌지역 고혈압 환자들의 건강행태와 약물복용 이행도에 관한 연구)

  • Kim, Keum-Ee
    • Research in Community and Public Health Nursing
    • /
    • v.13 no.1
    • /
    • pp.49-56
    • /
    • 2002
  • This study was performed to identify the health behaviors and medication compliances of hypertensive patients in a rural area, from May 1 to July 31. 2001. The subjects were 100 hypertensive patients who were registered at the Health Center in Goeje City. The data was collected by face-to-face interviews with a 25-item questionnaire on health behaviors, and analyzed by the Chi-square test on each variable. The results were as follows: Approximately 76% of the subjects were currently taking drug medication. In the comparison of health behavior rates between male and female, there were statistically significant differences in smoking (p< .000), alcohol(p< .003), low salt diet(p< .014), and the health behavior rates of female were higher than those of male. In the comparison of socioeconomic factors by medication compliance, there was statistically significant difference in sex(p< .001), and the medication compliance rate of female was higher than that of male. In the comparison of subjects' perception by medication compliance, there were statistically significant differences in seriousness of hypertension (p< .001) and medication period for hypertension care (p< .004), The medication compliance rate of the group of subjects who took the threat on their hypertension seriously was higher than that of the group who didn't, and the medication compliance rate of the group who knew that they should take medication for the rest of their life was higher than that of the group who didn't. These results suggest that community health education programs and distribution of information must be emphasized in order to increase medication and to encourage behavior changes for promoting health.

  • PDF

Design of RFID Packaging for Construction Materials (건축자재용 RFID 패키징 설계)

  • Shin, Jae-Hui;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.923-931
    • /
    • 2013
  • RFID (Radio Frequency Identification), which is a kind of the electronic tag, is a wireless access device using the radio frequency for recognizing the ID information. It has a variety of application such as the bus card, gate access card, distribution industry, and management of construction materials. The performance and size of RFID depend on the penetrability, recognition ratio, memory size, multi tag recognition, external pollution dust, and exterior impact, and RFID requires the packaging to protect itself considered above factors. Recently, RFID is diversely employed to effectively manage construction materials and the RFID packaging, which is robust to the external impact, is required to attach RFID on construction materials. In this paper, we propose the construction material RFID packaging designed to be robust for the external impact and to be practicable for change of the broken RFID. For the change of RFID, we separate the cast and body of the packaging. Also, we present the detail drawing for the proposed construction material RFID packaging and implement the performance evaluation of the packaging manufactured using 3D printer.

RFID System with Localization Function Based on Zigbee RSSI (Zigbee RSSI 기반의 위치추정 기능을 탑재한 RFID 시스템)

  • Kim, Tae-Yun;Hwang, Suk-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.12
    • /
    • pp.1201-1208
    • /
    • 2016
  • Radio Frequency Identification (RFID) technology has a significant attraction throughout various industry sites, along with the development of wireless communication technologies. The typical applications of RFID include medical, logistics, and distribution, and, specially, it is effectively applied to non-contact environments, because it employs radio waves. Although, recently, construction cases of the RFID management systems for the inventory management of the construction materials have been increased, the related researches and experiments for the reused materials are not actively performed. In this paper, we propose the RFID system with the localization function for effectively managing the reuse of the construction materials, adding to the conventional inventory management system. The proposed system consists of a RFID reader unit and a receiver unit, and the location information of the material with the attached RFID tag is obtained by estimating the position of a RFID reader. The distance value for estimating the reader position is calculated using the Received Signal Strength Indicator (RSSI) value of Zigbee, and the performance evaluation of the proposed system is performed in the indoor space of $5m{\times}5m$.

Characteristics of Storm Runoff and Analysis of Its Correlation with Forest Properties (산림특성에 따른 강우유출수 유출특성 및 상관관계 분석)

  • Chung, WooJin;Chang, SoonWoong
    • Journal of Environmental Science International
    • /
    • v.25 no.7
    • /
    • pp.1007-1016
    • /
    • 2016
  • Environmental policy implementation has been strengthened to protect the source waters in Korea and to improve their water quality. Increasing of non-point source caused water quality problem continuously. Research on runoff from forests, which occupy over 65% of the land in korea, is insufficient, and studies on the characteristics and influences of storm runoff are necessary. In this study, we chose to compare the effects of land use in the form of two types of forest distribution and then gathered data on storm characteristics and runoff properties during rainfall events in these areas. Furthermore, the significance and influences of the discharges were analyzed through correlation analysis, and multilateral runoff characteristics were examined by deducing a formula through $COD_{Mn}$ and TOC regression analysis. At two forest points, for which the basin areas differed from each other, flow changed according to storm quantity and intensity. The peak discharge at point A, where the basin area was big, was high, whereas water-quality fundamental items (BOD, $COD_{Mn}$, and SS) and TOC density were high at point B where the slope and storm intensity were high. Effects of dissolved organic matter were determined through correlation analysis, and the regression formulas for $COD_{Mn}$ and TOC were deduced by regression analysis. It is expected that the data from this study could be useful as basic information in establishing forest management measures.

Fuzzy Relevance-Based Clustering for Routing Performance Enhancement in Wireless Ad-Hoc Networks (무선 애드 혹 네트워크상에서 라우팅 성능 향상을 위한 퍼지 적합도 기반 클러스터링)

  • Lee, Chong-Deuk
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.495-503
    • /
    • 2010
  • The clustering is an important mechanism thai provides information for mobile nodes efficiently and improves the processing capacity for routing and the allocation of bandwidth. This paper proposes a clustering scheme based on the fuzzy relevance degree to solve problems such as node distribution found in the dynamic property due to mobility and flat structure and to enhance the routing performance. The proposed scheme uses the fuzzy relevance degree, ${\alpha}$, to select the cluster head for clustering in FSV (Fuzzy State Viewing) structure. The fuzzy relevance ${\alpha}$ plays the role in CH selection that processes the clustering in FSV. The proposed clustering scheme is used to solve problems found in existing 1-hop and 2-hop clustering schemes. NS-2 simulator is used to verify the performance of the proposed scheme by simulation. In the simulation the proposed scheme is compared with schemes such as Lowest-ID, MOBIC, and SCA. The simulation result showed that the proposed scheme has better performance than the other existing compared schemes.

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF