• Title/Summary/Keyword: Evolve

Search Result 709, Processing Time 0.026 seconds

A Study of Economic Indicator Prediction Model using Dimensions Decrease Techniques and HMM (차원감소기법과 은닉마아코프모델을 이용한 경기지표 예측 모델 연구)

  • Jeon, Jin-Ho;Kim, Min-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.305-311
    • /
    • 2013
  • The size of the market as the economy continues to evolve, in order to make the right decisions to accurately predict the economic problems the market has emerged as an important issues. To express the modern economic system, the largest of the various economic indicators, pillars stock indicators analysis and decision-making with a proper understanding of the problem for the application of the model is suitable for time-series data concealment HMM. Based on this time series model and the calculation of the time and cost savings dimension decrease techniques for the estimation and prediction of the model was applied to the problem was to verify the validity. As a result, the model predictions in both the short term rather than long-term predictions of the model estimates the optimal predictive value similar pattern very similar to both the actual data and was able to confirm that.

Theo Jansen's Autonomous Mechanical Life and Leg Mechanism (테오얀센의 자율적 기계 생명체와 다리 메커니즘)

  • Kim, Tae-Eun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.23-29
    • /
    • 2020
  • Since the movements of a machine are driven by a certain principle, there is a fundamental principle that governs the movement of the machine, no matter how complex and diverse it may be. Autonomous movements are a way to avoid repetition, to approach more humane and more natural factors. That's all the more so when it comes to original movements, not cloning. So now, the dynamics of the machine are more multi-sensory by human participation. It is challenging the potential to be expressed and is gradually expanding its sphere of expression in the boundaries of fact and cloning. Theo Jansen's works have changed from period to period to adapt to different circumstances, indicating that his decades-long work has continued to evolve from early to present. The evolution's focus, among other things, can be seen as having the same source of circular motion and horizontal reciprocating motion, which are repeated from the principle of organic coupling between the parts that make up the object.

Human Y Chromosome: Structure, Function and Evolution (인간 Y 염색체: 구조, 기능 그리고 진화)

  • 홍경원;허재원;김희수
    • Journal of Life Science
    • /
    • v.13 no.6
    • /
    • pp.958-969
    • /
    • 2003
  • The human Y chromosome is strictly paternally inherited and does not X-Y crossing over during male meiosis in most of its length. Although this region came to be known as the non-recombining region Y (NRY), it was renamed as male-specific region Y (MSY) due to abundant recombination. The MSY is a mosaic of heterochromatic sequences and three classes of euchromatic sequences: X-transposed, X-degenerated and ampliconic. The X-transposed sequences exhibit 99% identity to the X chromosomal sequences. The X-degenerate sequences are remnants of ancient autosomes from which the modem X and Y chromosomes evolved. Eight palindromes of the ampliconic comprise one-quarter of the euchromatic DNA of the male-specific region of the human Y chromosome. They contain many testis-specific genes and typically exhibit 99.97% intra-palindromic (arm-to-arm) sequence identity. The arms of these palindromes must have subsequently engaged in gene conversion, driving the pair arms to evolve it concert. Averages of approximately 600 nucleotides per newborn male have undergone Y-Y gene conversion, which has had an important role in the evolution of multi-copy testis gene families in the MSY.

Adaptive Intrusion Detection Algorithm based on Learning Algorithm (학습 알고리즘 기반의 적응형 침입 탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.1
    • /
    • pp.75-81
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn`t make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.

Development strategy for an information exchange subsystem as a part of Construction Project Lifecycle Management System(CPLMS) (건설 프로젝트 생애주기 관리를 위한 정보교환 서브시스템 개발방안)

  • You, Seok-Joon
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.77-82
    • /
    • 2007
  • This paper discusses on implementation methods for providing data exchange capability of the Construction Project Lifecycle Management System (CPLM). Because most information media currently used in the construction industry are computer files, the system must be capable of handling various file types; however, The goals of PLM cannot be achieved if the contents of the files are communicated freely, which can only be achieved using a standardized information model that has comprehensive coverage of all information produced within the projects (i.e., a BlM). Several methods of adopting the model are investigated here, and a transitional implementation method for K-IFC is suggested, in which a file-based exchange backed by the BlM can evolve into object-level transactions of the BIM with not only advanced data integrity and security, but also improved communications between the project participants.

  • PDF

QoS Based AAL2/ATM Multiplexing Schemes in the UTRAN Iub Interface (UTRAN Iub 인터폐이스에서 QoS 기반의 AAL2/ATM 다중화 전송방안)

  • 정창용;정조운;황호영;성단근;정수성;방만원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6A
    • /
    • pp.386-396
    • /
    • 2003
  • Recently, mobile communication systems have supported various services including internet from voice centric service as they evolve toward 3G. To accommodate the increasing number of users, an AAL2 multiplexing scheme is introduced in the UTRAN tub interface for link efficiency. However, limited radio resources and different requirements of various services make it difficult to guarantee the QoS requirements at radio access networks. The conventional AAL2/ATM multiplexing systems focused on the multiplexing efficiency of voice anddata services and QoS issues of real time and non real time services. In this paper, we classfy various services according to QoS requirements and propose AAL2/ATM multiplexing schemes using statistical multiplexing and scheduling with a rather simple structure to guarantee the given requirements. Simulation results show that the proposed schemes perform better than the conventional schemes to guarantee QoS requirements of various services.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

An Analysis of Cluster Life Cycle on the Dynamic Evolution of the Seoul Digital Industrial Complex in Korea (서울디지털산업단지의 진화와 역동성 - 클러스터 생애주기 분석을 중심으로 -)

  • Koo, Yang-Mi
    • Journal of the Korean association of regional geographers
    • /
    • v.18 no.3
    • /
    • pp.283-297
    • /
    • 2012
  • This study aims to analyze an evolutionary path and the dynamics of the Seoul Digital Industrial Complex in Korea based on the analysis of cluster life cycles. From the mid 1960s to the late 1990s, the life cycles and their characteristics of the Seoul Digital Industrial Complex (Guro Industrial Park) are examined as emergence-growth-sustainment-decline focused on the number of firms and employees. After the late 1990s, the number of firms and employees increases rapidly and the active actors of the growth and restructuring are transformed to the technology-intensive SMEs and knowledge-based service firms. Knowledge industry centers (apartment-type factories) help evolve into the life cycle of transformation as knowledge-based clusters after the mid 2000s.

  • PDF

An Environmental Impact Assessment System for Microscale Winds Based on a Computational Fluid Dynamics Model (전산유체역학모형에 근거한 미기상 바람환경 영향평가 시스템)

  • Kim, Kyu Rang;Koo, Hae Jung;Kwon, Tae Heon;Choi, Young-Jean
    • Journal of Environmental Impact Assessment
    • /
    • v.20 no.3
    • /
    • pp.337-348
    • /
    • 2011
  • Urban environmental problem became one of major issues during its urbanization processes. Environmental impacts are assessed during recent urban planning and development. Though the environmental impact assessment considers meteorological impact as a minor component, changes in wind environment during development can largely affect the distribution pattern of air temperature, humidity, and pollutants. Impact assessment of local wind is, therefore, a major element for impact assessment prior to any other meteorological impact assessment. Computational Fluid Dynamics (CFD) models are utilized in various fields such as in wind field assessment during a construction of a new building and in post analysis of a fire event over a mountain. CFD models require specially formatted input data and produce specific output files, which can be analyzed using special programs. CFD's huge requirement in computing power is another hurdle in practical use. In this study, a CFD model and related software processors were automated and integrated as a microscale wind environmental impact assessment system. A supercomputer system was used to reduce the running hours of the model. Input data processor ingests development plans in CAD or GIS formatted files and produces input data files for the CFD model. Output data processor produces various analytical graphs upon user requests. The system was used in assessing the impacts of a new building near an observatory on wind fields and showed the changes by the construction visually and quantitatively. The microscale wind assessment system will evolve, of course, incorporating new improvement of the models and processors. Nevertheless the framework suggested here can be utilized as a basic system for the assessment.

The Educational Significance of the Method of Teaching Natural and Fractional Numbers by Measurement of Quantity (양의 측정을 통한 자연수와 분수 지도의 교수학적 의의)

  • 강흥규;고정화
    • School Mathematics
    • /
    • v.5 no.3
    • /
    • pp.385-399
    • /
    • 2003
  • In our present elementary mathematics curriculum, natural numbers are taught by using the a method of one-to-one correspondence or counting operation which are not related to measurement, and fractional numbers are taught by using a method which is partially related to measurement. The most serious limitation of these teaching methods is that natural numbers and fractional numbers are separated. To overcome this limitation, Dewey and Davydov insisted that the natural number and the fractional number should be taught by measurement of quantity. In this article, we suggested a method of teaching the natural number and the fractional number by measurement of quantity based on the claims of Dewey and Davydov, and compare it with our current method. In conclusion, we drew some educational implications of teaching the natural number and the fractional number by measurement of quantity as follows. First, the concepts of the natural number and the fractional number evolve from measurement of quantity. Second, the process of transition from the natural number to the fractional number became to continuous. Third, the natural number, the fractional number, and their lower categories are closely related.

  • PDF