• Title/Summary/Keyword: New Normal

Search Result 3,344, Processing Time 0.036 seconds

GEO-KOMPSAT-2A AMI Best Detector Select Map Evaluation and Update (천리안위성2A호 기상탑재체 Best Detector Select 맵 평가 및 업데이트)

  • Jin, Kyoungwook;Lee, Sang-Cherl;Lee, Jung-Hyun
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.2
    • /
    • pp.359-365
    • /
    • 2021
  • GEO-KOMPSAT-2A (GK2A) AMI (Advanced Meteorological Imager) Best Detector Select (BDS) map is pre-determined and uploaded before the satellite launch. After the launch, there is some possibility of a detector performance change driven by an abrupt temperature variation and thus the status of BDS map needs to be evaluated and updated if necessary. To investigate performance of entire elements of the detectors, AMI BDS analyses were conducted based on a technical note provided from the AMI vendor (L3HARRIS). The concept of the BDS analysis is to investigate the stability of signals from detectors while they are staring at targets (deep space and internal calibration target). For this purpose, Long Time Series (LTS) and Output Voltage vs. Bias Voltage (V-V) methods are used. The LTS for 30 secs and the V-V for two secs are spanned respectively for looking at the targets to compute noise components of detectors. To get the necessary data sets, these activities were conducted during the In-Orbit Test (IOT) period since a normal operation of AMI is stopped and special mission plans are commanded. With collected data sets during the GK2A IOT, AMI BDS map was intensively examined. It was found that about 1% of entire detector elements, which were evaluated at the ground test, showed characteristic changes and those degraded elements are replaced by alternative best ones. The stripping effects on AMI raw images due to the BDS problem were clearly removed when the new BDS map was applied.

A Study of brain Atlases in Hippocampus Volume Measurement Using IBASPM (IBASPM을 이용한 해마체적 측정에서 뇌 Atlases에 대한 고찰)

  • Kim, Ju-ho;Lee, Ju-won;Kim, Seong-hu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.981-984
    • /
    • 2014
  • Volumetric measurement of hippocampus using IBASPM, the 20's normal adults 10 people's brain images were acquired in order to assess the changes according to the type of the Atlas. Images was obtained using MPRAGE of a 3-D gradient echo pulse sequence on Head matrix coil of 1.5T MRI system. The results of Paired t-test using obtained volume of hippocampus depending on the type of the Atlas, Atlas69-Altas84, Atlas69-Atlas116(p=0.729, 0.729) in the left hippocampus and Atlas69-Atlas84, Atlas69-Atlas116(p=0.219, 0.219) in right hippocampal formation were no significant differences but in the area except this, there was significant difference(p=0.000). The volume of the hippocampus using Atlas84 and Atlas116, represented the same value and there was no significant difference. In the image analysis using the overlay of atlas image and original image, Atlas71 could be found that the area of hippocampus did mismatch. In the case of atlas used in this study, because it has been developed by the westerners, there are differences between brain of asian. It would be needed to development of new Atlas for high accuracy measurement of the volume of hippocampus.

  • PDF

A Study on the Recognition and Needs Analysis of Community Residents to Reuse Closed Schools as Library (폐교 시설의 효과적인 도서관 활용을 위한 폐교 발생 지역 주민의 인식 및 요구 분석에 관한 연구)

  • Noh, Younghee;Ro, Ji-Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.2
    • /
    • pp.91-116
    • /
    • 2019
  • This study conducted a demand analysis for the operation and management of closed schools, the direction of future use of closed schools, and the utilization of closed schools, among local residents expected to play a key role in the successful use of closed libraries. According to the study, residents in areas where schools actually occur may actively consider the use of closed schools when they are lacking in the number of libraries in the region or when they hope to remodel their schools as libraries, given that they are positive about future use of closed schools and that remodeling them is more economical in terms of cost than building new libraries. The current awareness of the use and operation of closed schools remains at a normal level, so it is deemed necessary to improve the direction of the promotion, operation and recycling of closed schools in the order of promotion, operation and physical aspects by grouping obstacles to the operation and management of closed schools. In addition, the current status of cultural facilities and the demands of local residents are met in terms of the types of use of closed school facilities, and it means that closed schools can be used in a relatively easy-to-access location based on their location, while libraries can be used as a space for cultural facilities that are different from the existing public libraries, exhibition halls, and eco-friendly libraries.

A Study on Classification of Variant Malware Family Based on ResNet-Variational AutoEncoder (ResNet-Variational AutoEncoder기반 변종 악성코드 패밀리 분류 연구)

  • Lee, Young-jeon;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • Traditionally, most malicious codes have been analyzed using feature information extracted by domain experts. However, this feature-based analysis method depends on the analyst's capabilities and has limitations in detecting variant malicious codes that have modified existing malicious codes. In this study, we propose a ResNet-Variational AutoEncder-based variant malware classification method that can classify a family of variant malware without domain expert intervention. The Variational AutoEncoder network has the characteristics of creating new data within a normal distribution and understanding the characteristics of the data well in the learning process of training data provided as input values. In this study, important features of malicious code could be extracted by extracting latent variables in the learning process of Variational AutoEncoder. In addition, transfer learning was performed to better learn the characteristics of the training data and increase the efficiency of learning. The learning parameters of the ResNet-152 model pre-trained with the ImageNet Dataset were transferred to the learning parameters of the Encoder Network. The ResNet-Variational AutoEncoder that performed transfer learning showed higher performance than the existing Variational AutoEncoder and provided learning efficiency. Meanwhile, an ensemble model, Stacking Classifier, was used as a method for classifying variant malicious codes. As a result of learning the Stacking Classifier based on the characteristic data of the variant malware extracted by the Encoder Network of the ResNet-VAE model, an accuracy of 98.66% and an F1-Score of 98.68 were obtained.

The Study on the Effect of the Middle-aged Women's Upper lips musculo-cutaneous by SUKI® program (SUKI 중재에 의한 중년 여성의 윗입술근피에 미치는 연구)

  • Lee, Su-Bum;Hong, Seong-Gyun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.194-200
    • /
    • 2021
  • The aim of this study was proceed for 6weeks to determine the effect of middle-aged women's upper lips ms by SUKI programs. A total of 20 subjects were tested, and the SUKI arbitration programs of Pattern T1, Pattern T2, Pattern T3, Pattern T4 were adopted three times a week in six weeks. The results were as this. It showed a significant difference in the EG, although some of the intra-group comparisons of the upper lip ms. Therefore, SUKI programs have been shown to help improve the elasticity of the upper lip ms(p<.05). In this study, the SUKI program was used based on the fact that although limited, the elasticity of the upper lip ms, located in the facial part of a middle-aged woman, causes various wrinkles around her mouth, making them lose confidence in their appearance. This also suggests that normal facial ms can affect the appearance of the female middle-aged woman, and it was intended to suggest some ways to manage the appearance by proper management of facial muscle according to the life cycle of the female middle-aged woman. In conclusion, we hope that in the future, various experiments will be used as new research data on how to prevent women's facial skin beauty and wrinkles and help improve elasticity of facial muscles around the mouth.

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

A Comparative Analysis of Keywords in Astronomical Journals and Concepts in Secondary School Astronomy Curriculum (최근 천문학 연구 키워드와 천체 분야 교육과정 내용 요소 비교 분석)

  • Shin, Hyeonjeong;Kwon, Woojin;Ga, Seok-Hyun
    • Journal of The Korean Association For Science Education
    • /
    • v.42 no.2
    • /
    • pp.289-309
    • /
    • 2022
  • In recent years, astronomy has been snowballing: including Higgs particle discovery, black hole imaging, extraterrestrial exploration, and deep space observation. Students are also largely interested in astronomy. The purpose of this study is to discover what needs to be improved in the current astronomy curriculum in light of recent scientists' researches and discoveries. We collected keywords from all papers published from 2011 to 2020 in four selected journals-ApJ, ApJL, A&A, and MNRAS- by R package to examine research trends. The curriculum contents were extracted by synthesizing the in-service teachers' coding results in the 2015 revised curriculum document of six subjects (Science, Integrated Science, Earth Science I, Earth Science II, Physics II, Convergence Science). The research results are as follows: first, keywords that appear steadily in astronomy are 'galaxies: formation, galaxy: active, star: formation, accretion, method: numerical.' Second, astronomy curriculum includes all areas except the 'High Energy Astrophysical Phenomena' area within the common science curriculum learned by all students. Third, it is necessary to review the placement of content elements by subject and grade and to consider introducing new concepts based on astronomy research keywords. This is an exploratory study to compare curriculum and the field of scientific research that forms the basis of the subject. We expect to provide implications for a future revision of the astronomy curriculum as a primary ground investigation.

Full mouth rehabilitation using various digital tools in a patient with collapsed bite due to severe attrition (심한 마모로 인하여 교합이 붕괴된 환자의 다양한 디지털 도구를 이용한 완전 구강회복증례)

  • Moon, Sooin;Lee, Younghoo;Hong, Seoung-Jin;Noh, Kwantae;Pae, Ahran;Kim, Hyeong-Seob;Kwon, Kung-Rock;Paek, Janghyun
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.4
    • /
    • pp.320-329
    • /
    • 2022
  • Physiological wear of occlusal surface is inevitable throughout the lifetime, and considered to be normal. Pathologic wear, however, may cause fatal damage to the occlusal surface and destroy esthetics and proper anterior guidance. In such cases, rehabilitation of occlusal wear should be followed by thorough evaluation and diagnosis. In this present case, severe occlusal wear was found in the labial surfaces of mandibular anterior teeth and palatal surfaces of maxillary anterior teeth. Occlusal vertical dimension was evaluated and decided to be regained due to insufficient amount of restorative space. After determining new occlusal vertical dimension, diagnostic wax-up is usually performed to continue prosthodontic treatment. In this case with collapsed occlusion and loss of occlusal vertical dimension, conventional diagnostic wax-up was replaced with various digital devices. Diagnostic wax-up was digitally performed in the software and provisional prosthesis was fabricated with digital tools. With verification with provisional prosthesis, the entire dentition was rehabilitated with newly set occlusal vertical dimension and proper anterior guidance.

A Study of VR Interaction for Non-contact Hair Styling (비대면 헤어 스타일링 재현을 위한 VR 인터렉션 연구)

  • Park, Sungjun;Yoo, Sangwook;Chin, Seongah
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.367-372
    • /
    • 2022
  • With the recent advent of the New Normal era, realistic technologies and non-contact technologies are receiving social attention. However, the hair styling field focuses on the direction of the hair itself, individual movements, and modeling, focusing on hair simulation. In order to create an improved practice environment and demand of the times, this study proposed a non-contact hair styling VR system. In the theoretical review, we studied the existing cases of hair cut research. Existing haircut-related research tend to be mainly focused on force-based feedback. Research on the interactive haircut work in the virtual environment as addressed in this paper has not been done yet. VR controllers capable of finger tracking the movements necessary for beauty enable selection, cutting, and rotation of beauty tools, and built a non-contact collaboration environment. As a result, we conducted two experiments for interactive hair cutting in VR. First, it is a haircut operation for synchronization using finger tracking and holding hook animation. We made position correction for accurate motion. Second, it is a real-time interactive cutting operation in a multi-user virtual collaboration environment. This made it possible for instructors and learners to communicate with each other through VR HMD built-in microphones and Photon Voice in non-contact situations.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.