• Title/Summary/Keyword: Learning-based approach

Search Result 1,980, Processing Time 0.03 seconds

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.

A Study on the Relation between Matteo Ricci and Daesoon Thought: A Phenomenological Interpretation of Ricci in Daesoon Thought (마테오 리치와 대순사상의 관계성에 대한 연구 - 대순사상의 기독교 종장에 대한 종교현상학적 해석 -)

  • Ahn, Shin
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.36
    • /
    • pp.117-152
    • /
    • 2020
  • In Daesoon Thought, Matteo Ricci is regarded highly as a Jongjang, 'religious leader,' (of Christianity). This paper deals with the life and philosophical/theological thought of Matteo Ricci as homo-religiosus from the perspective of phenomenology of religion. Examining his historical background and biographical sketch, I will analyze Ricci's understanding of God, humanity, and salvation and re-evaluate his relationship with Daesoon Thought. Matteo Ricci, born in Italy, became a Jesuit missionary to China and transmitted various products of western civilization. Accepting the pro-cultural approach of Jesuit mission, he applied it to Chinese culture and language by learning the Chinese language and regarding Chinese people as his friends. This was a sympathetic way to transmit Western religion and culture while on Chinese soil. He suggested eight reasons to look towards the future of China with optimism and taught Chinese people his Christian message through his indirect means of understanding and persuasion. In China, Jesuit missionaries called the Christian God 'Tianzhu (Cheonju in Sino-Korean),' meaning Lord of Heaven. Ricci identified the Confucian notion of 'Shangdi (Sangje in Sino-Korean),' meaning Supreme Emperor (or God) with Tianzhu. While translating Confucian scriptures, he found the common ground between Confucianism and Christianity to be the monotheism of ancient Confucianism. He criticized the concepts of God in Buddhism and Daoism, and justified the Christian doctrine of God by way of a Confucian understanding of deity. Ricci's understanding of humanity was based on his Christian faith in creation, and he criticized the Buddhist concept of transmigration. He proposed Christian ethics and doctrine of salvation by using discourse on the afterlife and in particular, the concepts of heaven and hell. Concerning the relationship between Daesoon Thought and Ricci, the following aspects should be examined: 1.) Ricci's contribution to the cultural exchanges between East and West, 2.) his peaceful approach to his mission based on dialogue and persuasion, 3.) the various activities conducted by Ricci as a Christian leader, and 4.) his belief in miraculous healings. His influence on Korea will likewise be explored. Ricci's ultimate aim was to communicate with Asian people and unify East and West under a singular worldview by emphasizing the similarities between the Christian and Confucian concepts of God.

Exploring Changes in Science PCK Characteristics through a Family Resemblance Approach (가족유사성 접근을 통한 과학 PCK 변화 탐색)

  • Kwak, Youngsun
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.15 no.2
    • /
    • pp.235-248
    • /
    • 2022
  • With the changes in the future educational environment, such as the rapid decline of the school-age population and the expansion of students' choice of curriculum, changes are also required in PCK, the expertise of science teachers. In other words, the categories constituting the existing 'consensus-PCK' and the characteristics of 'science PCK' are not fixed, so more categories and characteristics can be added. The purpose of this study is to explore the potential area of science PCK required to cope with changes in the future educational environment in the form of 'Family Resemblance Science PCK (Family Resemblance-PCK, hereafter)' through Wittgenstein's family resemblance approach. For this purpose, in-depth interviews were conducted with three focus groups. In the focus group in-depth interview, participants discussed how the science PCK required for science teachers in future schools in 2030-2045 will change due to changes in the future society and educational environment. Qualitative analysis was performed based on the in-depth interview, and semantic network analysis was performed on the in-depth interview text to analyze the characteristics of 'Family Resemblance-PCK' differentiated from the existing 'consensus-PCK'. In results, the characteristics of Family Resemblance-PCK, which are newly requested along with changes in role expectations of science teachers, were examined by PCK area. As a result of semantic network analysis of Family Resemblance-PCK, it was found that Family Resemblance-PCK expands its boundaries from the existing consensus-PCK, which is the starting point, and new PCK elements were added. Looking at the aspects of Family Resemblance-PCK, [AI-Convergence Knowledge-Contents-Digital], [Community-Network-Human Resources-Relationships], [Technology-Exploration-Virtual Reality-Research], [Self-Directed Learning-Collaboration-Community], etc., form a distinct network cluster, and it is expected that future science teacher expertise will be formed and strengthened around these PCK areas. Based on the research results, changes in the professionalism of science teachers in future schools and countermeasures were proposed as a conclusion.

Strategic Issues in Managing Complexity in NPD Projects (신제품개발 과정의 복잡성에 대한 주요 연구과제)

  • Kim, Jongbae
    • Asia Marketing Journal
    • /
    • v.7 no.3
    • /
    • pp.53-76
    • /
    • 2005
  • With rapid technological and market change, new product development (NPD) complexity is a significant issue that organizations continually face in their development projects. There are numerous factors, which cause development projects to become increasingly costly & complex. A product is more likely to be successfully developed and marketed when the complexity inherent in NPD projects is clearly understood and carefully managed. Based upon the previous studies, this study examines the nature and importance of complexity in developing new products and then identifies several issues in managing complexity. Issues considered include: definition of complexity : consequences of complexity; and methods for managing complexity in NPD projects. To achieve high performance in managing complexity in development projects, these issues need to be addressed, for example: A. Complexity inherent in NPD projects is multi-faceted and multidimensional. What factors need to be considered in defining and/or measuring complexity in a development project? For example, is it sufficient if complexity is defined only from a technological perspective, or is it more desirable to consider the entire array of complexity sources which NPD teams with different functions (e.g., marketing, R&D, manufacturing, etc.) face in the development process? Moreover, is it sufficient if complexity is measured only once during a development project, or is it more effective and useful to trace complexity changes over the entire development life cycle? B. Complexity inherent in a project can have negative as well as positive influences on NPD performance. Thus, which complexity impacts are usually considered negative and which are positive? Project complexity also can affect the entire organization. Any complexity could be better assessed in broader and longer perspective. What are some ways in which the long-term impact of complexity on an organization can be assessed and managed? C. Based upon previous studies, several approaches for managing complexity are derived. What are the weaknesses & strengths of each approach? Is there a desirable hierarchy or order among these approaches when more than one approach is used? Are there differences in the outcomes according to industry and product types (incremental or radical)? Answers to these and other questions can help organizations effectively manage the complexity inherent in most development projects. Complexity is worthy of additional attention from researchers and practitioners alike. Large-scale empirical investigations, jointly conducted by researchers and practitioners, will help gain useful insights into understanding and managing complexity. Those organizations that can accurately identify, assess, and manage the complexity inherent in projects are likely to gain important competitive advantages.

  • PDF

Utilizing Visual Information for Non-contact Predicting Method of Friction Coefficient (마찰계수의 비접촉 추정을 위한 영상정보 활용방법)

  • Kim, Doo-Gyu;Kim, Ja-Young;Lee, Ji-Hong;Choi, Dong-Geol;Kweon, In-So
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.4
    • /
    • pp.28-34
    • /
    • 2010
  • In this paper, we proposed an algorithm for utilizing visual information for non-contact predicting method of friction coefficient. Coefficient of friction is very important in driving on road and traversing over obstacle. Our algorithm is based on terrain classification for visual image. The proposed method, non-contacting approach, has advantage over other methods that extract material characteristic of road by sensors contacting road surface. This method is composed of learning group(experiment, grouping material) and predicting friction coefficient group(Bayesian classification prediction function). Every group include previous work of vision. Advantage of our algorithm before entering such terrain can be very useful for avoiding slippery areas. We make experiment on measurement of friction coefficient of terrain. This result is utilized real friction coefficient as prediction method. We show error between real friction coefficient and predicted friction coefficient for performance evaluation of our algorithm.

RBM-based distributed representation of language (RBM을 이용한 언어의 분산 표상화)

  • You, Heejo;Nam, Kichun;Nam, Hosung
    • Korean Journal of Cognitive Science
    • /
    • v.28 no.2
    • /
    • pp.111-131
    • /
    • 2017
  • The connectionist model is one approach to studying language processing from a computational perspective. And building a representation in the connectionist model study is just as important as making the structure of the model in that it determines the level of learning and performance of the model. The connectionist model has been constructed in two different ways: localist representation and distributed representation. However, the localist representation used in the previous studies had limitations in that the unit of the output layer having a rare target activation value is inactivated, and the past distributed representation has the limitation of difficulty in confirming the result by the opacity of the displayed information. This has been a limitation of the overall connection model study. In this paper, we present a new method to induce distributed representation with local representation using abstraction of information, which is a feature of restricted Boltzmann machine, with respect to the limitation of such representation of the past. As a result, our proposed method effectively solves the problem of conventional representation by using the method of information compression and inverse transformation of distributed representation into local representation.

Traffic Flooding Attack Detection on SNMP MIB Using SVM (SVM을 이용한 SNMP MIB에서의 트래픽 폭주 공격 탐지)

  • Yu, Jae-Hak;Park, Jun-Sang;Lee, Han-Sung;Kim, Myung-Sup;Park, Dai-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.351-358
    • /
    • 2008
  • Recently, as network flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems(IDSs) focus on detail analysis of packet data, which results in late detection and a high system burden to cope with high-speed network environment. In this paper we propose a lightweight and fast detection mechanism for traffic flooding attacks. Firstly, we use SNMP MIB statistical data gathered from SNMP agents, instead of raw packet data from network links. Secondly, we use a machine learning approach based on a Support Vector Machine(SVM) for attack classification. Using MIB and SVM, we achieved fast detection with high accuracy, the minimization of the system burden, and extendibility for system deployment. The proposed mechanism is constructed in a hierarchical structure, which first distinguishes attack traffic from normal traffic and then determines the type of attacks in detail. Using MIB data sets collected from real experiments involving a DDoS attack, we validate the possibility of our approaches. It is shown that network attacks are detected with high efficiency, and classified with low false alarms.

Research of Evaluation Criteria for Educational Program of Human Resources Development (인재개발 교육프로그램의 평가준거 개발을 위한 기초연구)

  • Lee, Kyu-Nyo;Choi, Won-Sik;Park, Ki-Moon
    • 대한공업교육학회지
    • /
    • v.34 no.2
    • /
    • pp.179-204
    • /
    • 2009
  • As the concern with the educational training for human resources development in organizations grows, various programs are being offered in many places. Accordingly, the issue of securing the validity of the education and the importance of its assessment at the level of continuous quality management of the programs draw our attention. The purpose of this study is to offer the basic data of evaluation criteria for human resources development which knowledge-and-information saturated society requires, and also to draw out the greater area of human resources development educational program based on CIPP(Context, Input, Process, Product) model by Stufflebeam, an evaluation model concentrated on process, through literature and case study in and out of Korea. The result of the study is as follows. First, the evaluation areas drawn out by the greater sphere of context evaluation of human resources education program are needs analysis, goal setting, and organizational environment. Second, the evaluation areas drawn out by the greater sphere of input evaluation of human resources education program are educational program strategies, human resources, and physical resources. Third, the evaluation areas drawn out by the greater sphere of process evaluation of human resources education program are educational program management, teaching-learning strategies, and educational support environment. Fourth, the evaluation areas drawn out by the greater sphere of product evaluation of human resources education program are influence, effect, durability, and transference. The author supposes that these results will be able to become the basic materials for the systematic approach to educational programs through the analysis of evaluation criteria for and the greater sphere of educational program of human resources development.

Machine Learning Based Automated Source, Sink Categorization for Hybrid Approach of Privacy Leak Detection (머신러닝 기반의 자동화된 소스 싱크 분류 및 하이브리드 분석을 통한 개인정보 유출 탐지 방법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.657-667
    • /
    • 2020
  • The Android framework allows apps to take full advantage of personal information through granting single permission, and does not determine whether the data being leaked is actual personal information. To solve these problems, we propose a tool with static/dynamic analysis. The tool analyzes the Source and Sink used by the target app, to provide users with information on what personal information it used. To achieve this, we extracted the Source and Sink through Control Flow Graph and make sure that it leaks the user's privacy when there is a Source-to-Sink flow. We also used the sensitive permission information provided by Google to obtain information from the sensitive API corresponding to Source and Sink. Finally, our dynamic analysis tool runs the app and hooks information from each sensitive API. In the hooked data, we got information about whether user's personal information is leaked through this app, and delivered to user. In this process, an automated Source/Sink classification model was applied to collect latest Source/Sink information, and the we categorized latest release version of Android(9.0) with 88.5% accuracy. We evaluated our tool on 2,802 APKs, and found 850 APKs that leak personal information.

A study on instruction consulting in cyber university content quality management center (사이버대학 콘텐츠품질관리센터에서 이루어지는 수업컨설팅에 관한 연구)

  • Suh, Young-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.331-341
    • /
    • 2017
  • This study analyzed cases of teaching consulting in the cyber university field and activated it in a remote university in the right direction to contribute to the development of high quality contents. This study analyzed the instructional consulting data of the Center for Content Quality Management at A Cyber University in Chungnam area and interviewed researchers working at the center using the phenomenological approach based on the data. This study showed that the professors participating in instructional consulting had many problems, but they were relatively active in improving the quality of the lectures. They wanted to know the teaching methods in the unfamiliar environment of remote universities. In addition, the researchers had difficulty in delivering feedback to the instructor through the process of exploring images taken several times with the objective framework of lecture evaluation. To allow better communication, it was necessary to form rapport between the instructor and researcher. Unlike general universities, cyber universities have features and limitations in that they only take cameras in the classroom without learners and proceed with class consulting. Therefore, the teachers have a feeling of burden about shooting and recording, but they are less than general university teachers, and are more willing to engage in class consultation more actively. In this study, the results of the research was discussed and the proposal of cyber universities' instruction consulting and the effective plan is proposed.