• Title/Summary/Keyword: Problem-finding

Search Result 1,671, Processing Time 0.028 seconds

Insufficient Sleep and Visuospatial Memory Decline during Adolescence (청소년기 수면 부족과 시공간 기억력 저하)

  • Lee, Chang Woo;Jeon, Sehyun;Cho, Seong-Jin;Kim, Seog Ju
    • Sleep Medicine and Psychophysiology
    • /
    • v.26 no.1
    • /
    • pp.16-22
    • /
    • 2019
  • Objectives: The objective of this study was to investigate the correlation between insufficient sleep and visuospatial memory in adolescents using a computerized neurocognitive function test. Methods: A total of 103 high school students (26 males and 77 females; mean age $17.11{\pm}8.50years$) without a serious psychiatric problem was recruited. All subjects were requested to complete a self-report questionnaire about weekday total sleep time and weekend total sleep time. The epworth sleepiness scale (ESS) and the beck depression inventory (BDI) were administered to measure daytime sleepiness and symptoms of depression. Seven subsets of the Cambridge Neuropsychological test automated battery were examined to assess visuospatial memory. Results: After controlling for age, sex, ESS, and BDI, longer weekend total sleep time was correlated with poor performance on delayed matching to sample (r = -0.312, p = 0.002) and immediate recall on pattern recognition memory (r = -0.225, p = 0.025). Increased weekend catch-up sleep time was correlated with poor performance of delayed matching to sample (r = -0.236, p = 0.018), immediate recall on pattern recognition memory (r = -0.220, p = 0.029), and delayed recall on pattern recognition memory (r = -0.211, p = 0.036) after controlling for age, sex, ESS, and BDI. Conclusion: This study showed that increased weekend catch-up sleep time reflecting insufficient weekday sleep were associated with poor performance in delayed recall tasks of visual memory. This finding suggests that insufficient sleep during adolescence might produce a decline of visuospatial memory.

The social role of record information management for Sewol ferry disaster (세월호 참사에 관한 기록정보관리 분야의 사회적 역할)

  • Kim, Jin Sung
    • The Korean Journal of Archival Studies
    • /
    • no.44
    • /
    • pp.199-215
    • /
    • 2015
  • This study suggest the social role of record information management for Sewol ferry disaster on sea near Jindo-gun at April 16, 2014. Social each part and the discrete member be going to carry out the social role for the disaster so that record information management part may be gather, operate, provide related record informations. Record informations is ways to reflect, to supplement about something and means to effect it. They naturally generated though automatic managed, it need to purposeful activity. From finding to lack, to remedy a problem, Korean society and record information management part shall be reinforcing directions and competency of the solution with various angles. Practical union and assistance of record information management part for Sewol ferry disaster, at first it be a help to recognize officially evidence for the accident. Secondary it producing and using better than current state of the area's record information part. Finally it may be actively comprise and implement our competency and emotion.

Current Concept of Biomimicry - Ecological Approach for Sustainable Development - (생태모방의 현재적 개념 - 지속가능한 발전을 위한 생태적 접근 -)

  • Bae, Haejin;Park, Eun Jin;Lee, Eunok
    • Korean Journal of Environment and Ecology
    • /
    • v.33 no.1
    • /
    • pp.116-123
    • /
    • 2019
  • This study focused on defining concepts such as biology push (biology-based biomimicry) and technology pull (technology problem-based biomimicry) in the multidisciplinary field of ecological imitation and analyzing the status of related research and technology at the domestic and international levels. From an ecological point of view, biomimicry is defined as ecological mimicry in which ideas obtained through classification and investigation of principles of biology and ecology are applied to the concepts of engineering and technology. We also defined the biology push as the ecological imitation based on biological characteristics starting from an ecological viewpoint and technology pull as the ecological imitation based on technical problems starting from technical needs. Although biomimicry studies often focus on the technology development by finding stable and eco-friendly source materials from biological and ecological characteristics, we wanted to emphasize the unlimited potential of research of biomimicry that can begin with an idea based on biological and ecological characteristics. This study presents the need to develop the research and technology further based on the biological and ecological viewpoints that can contribute to future sustainable development.

A New Viewpoint Drowned Repetitive Cycle of Flow vs Float Regulating History of Pansory and Floating Possibility of Lost Pansori in Age of Image Media (판소리사를 잠류·부상의 반복 싸이클로 보는 새로운 관점과 영상매체 시대 재매개화를 통한 실전판소리의 부상 가능성 - 실전판소리 <옹고집전>과 영화 <광해>를 통해)

  • Kwon, Do-Kyung
    • Cross-Cultural Studies
    • /
    • v.42
    • /
    • pp.165-203
    • /
    • 2016
  • This study attempted to reconsider the existing viewpoint on the history of Pansori transmission and suggested a new viewpoint on lostPansori transmission. Untill now, lost seven songs have been criticized for failure in Pansory's transmission history because it ceased to satirize negativity of abnormal character without creating a bearer of new value goals in the new age this paper resulted in another conclusion which extends Pansori history's process to modern times in the point of succession and duration of Pansori esthetics. Currently the above reason creats a problem ofcomplete nonmention that confront Pansori's twelve songs which does not apply to lost seven songs. If the evaluation standard of literary history used for lost seven songs is applied to inherited five songs, The inherited five songs also failed in the esthetic cultural history of present times. To resolve this issue, this study suggested a new viewpoint to replace the existing viewpoint that label Pansori's history as a historical structure consisting of success of inherited five songs and failure of lost seven songs repetitive replacement cycle of float and flow. This study provided constructive on lost Pansory of premodern times and presented entire Pansori as a flowing state. This paper futher identified the stages of decline the lost seven songs since the 20thcentury but sets the stage or finding a new qualitative possibility. This new theory was suggested through extant aspects of the movie that was a reproduction of in the present media age.

Recharge Potential Assessment of Artificial Recharge System for Agricultural Drought Adaptation (농업가뭄대응을 위한 인공함양 시스템의 함양능력 평가)

  • Lee, Jae Young;Kim, Gyoo Bum
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.61-72
    • /
    • 2021
  • There is an increasing need for water supply plan using sustainable groundwater to resolve water shortage problem caused by drought due to climate change and artificial aquifer recharge has recently emerged as an alternative. This study deals with recharge potential assessment for artificial recharge system and quantitative assessment for securing stable water and efficient agricultural water supply adapt to drought finding optimal operating condition by numerical modeling to reflect recharge scenarios considering climate condition, target water intake, injection rate, and injection duration. In order to assess recharge potential of injection well, numerical simulation was performed to predict groundwater level changes in injection and observation well respect to injection scenarios (Case 1~4) for a given total injection rate (10,000 m3). The results indicate that groundwater levels for each case are maintained for 25~42 days and optimal injection rate is 50 m3/day for Case 3 resulted in groundwater level rise less than 1 m below surface. The results also show that influential area of groundwater level rise due to injection was estimated at 113.5 m and groundwater storage and elapsed time were respectively increased by 6 times and 4 times after installation of low permeable barrier. The proposed assessment method can be contributed to sustainable agricultural water supply and stable water security for drought adaptation.

Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin (VMProtect의 역공학 방해 기능 분석 및 Pin을 이용한 우회 방안)

  • Park, Seongwoo;Park, Yongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.297-304
    • /
    • 2021
  • Commercial obfuscation tools (protectors) aim to create difficulties in analyzing the operation process of software by applying obfuscation techniques and Anti-reversing techniques that delay and interrupt the analysis of programs in software reverse engineering process. In particular, in case of virtualization detection and anti-debugging functions, the analysis tool exits the normal execution flow and terminates the program. In this paper, we analyze Anti-reversing techniques of executables with Debugger Detection and Viralization Tools Detection options through VMProtect 3.5.0, one of the commercial obfuscation tools (protector), and address bypass methods using Pin. In addition, we predicted the location of the applied obfuscation technique by finding out a specific program termination routine through API analysis since there is a problem that the program is terminated by the Anti-VM technology and the Anti-DBI technology and drew up the algorithm flowchart for bypassing the Anti-reversing techniques. Considering compatibility problems and changes in techniques from differences in versions of the software used in experiment, it was confirmed that the bypass was successful by writing the pin automation bypass code in the latest version of the software (VMProtect, Windows, Pin) and conducting the experiment. By improving the proposed analysis method, it is possible to analyze the Anti-reversing method of the obfuscation tool for which the method is not presented so far and find a bypass method.

A Study on the Method of Evaluating Optical-system Performance and an Athermal Structure through Thermal Analysis of the Korsch Telescope (Korsch 망원경의 열분석을 통한 광학계 성능 평가 방법 및 비열화 구조 연구)

  • Kim, Kyu-Ho;Park, Seong-Woo;Park, Seung-Han;Lee, Kyoung-Mook;Jung, Mee-Suk
    • Korean Journal of Optics and Photonics
    • /
    • v.32 no.6
    • /
    • pp.266-275
    • /
    • 2021
  • In this paper, a method for evaluating optical-system performance and an athermal structure through thermal analysis of the Korsch telescope was studied. In the case of an optical system having a complex asymmetrical structure, there is a limit to implementing the satellite structure by applying the coefficient of thermal expansion (CTE) in the optical-design software, so it is difficult to evaluate the performance of the optical system against temperature changes. To solve this problem, using mechanical design software all length changes were implemented in all structures that affect the optical system according to temperature, and the value of the change in distance between optical components due to temperature change was organized. Also, the values of changes in shape and thickness of the optical components against temperature changes are organized in the optical-design software. All changes derived from both software packages were applied in the optical software to evaluate the performance of the optical system. As a result, it was found that the MTF for a spatial resolution of 71.4 cycles/mm was maintained at more than 25% in the range from 9 ℃ to 33 ℃. In addition, the performance of the optical system applying the improved structure was evaluated, by finding the structure that had the most influence on the optical system's performance change, and deriving an athermal structure to reduce the effect. As a result, it was found that the MTF for a resolution of 71.4 cycles/mm was maintained at over 67% in the range from 9 ℃ to 33 ℃.

A Study on the Application of Machine Learning in Literary Texts - Focusing on Rule Selection for Speaker Directive Analysis - (문학 텍스트의 머신러닝 활용방안 연구 - 화자 지시어 분석을 위한 규칙 선별을 중심으로 -)

  • Kwon, Kyoungah;Ko, Ilju;Lee, Insung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.313-323
    • /
    • 2021
  • The purpose of this study is to propose rules that can identify the speaker referred by the speaker directive in the text for the realization of a machine learning-based virtual character using a literary text. Through previous studies, we found that when applying literary texts to machine learning, the machine did not properly discriminate the speaker without any specific rules for the analysis of speaker directives such as other names, nicknames, pronouns, and so on. As a way to solve this problem, this study proposes 'nine rules for finding a speaker indicated by speaker directives (including pronouns)': location, distance, pronouns, preparatory subject/preparatory object, quotations, number of speakers, non-characters directives, word compound form, dispersion of speaker names. In order to utilize characters within a literary text as virtual ones, the learning text must be presented in a machine-comprehensible way. We expect that the rules suggested in this study will reduce trial and error that may occur when using literary texts for machine learning, and enable smooth learning to produce qualitatively excellent learning results.

Generalized K Path Searching in Seoul Metropolitan Railway Network Considering Entry-Exit Toll (진입-진출 요금을 반영한 수도권 도시철도망의 일반화 K-경로탐색)

  • Meeyoung Lee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.1-20
    • /
    • 2022
  • The basic way to charge vehicles for using road and public transport networks is the entry-exit toll system. This system works by reading Hi-Pass and public transportation cards of the vehicles using card readers. However, the problems of navigating a route in consideration of entry-exit toll systems include the non-additive costs of enumerating routes. This problem is known as an NP-complete task that enumerates all paths and derives the optimal path. So far, the solution to the entry-exit toll system charging has been proposed in the form of transforming the road network. However, unlike in the public transport network where the cards are generalized, this solution has not been found in situations where network expansion is required with a transfer, multi-modes and multiple card readers. Hence, this study introduced the Link Label for a public transportation network composed of card readers in which network expansion is bypassed in selecting the optimal path by enumerating the paths through a one-to-one k-path search. Since the method proposed in this study constructs a relatively small set of paths, finding the optimal path is not burdensome in terms of computing power. In addition, the ease of comparison of sensitivity between paths indicates the possibility of using this method as a generalized means of deriving an optimal path.

Intrusion Detection Method Using Unsupervised Learning-Based Embedding and Autoencoder (비지도 학습 기반의 임베딩과 오토인코더를 사용한 침입 탐지 방법)

  • Junwoo Lee;Kangseok Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.8
    • /
    • pp.355-364
    • /
    • 2023
  • As advanced cyber threats continue to increase in recent years, it is difficult to detect new types of cyber attacks with existing pattern or signature-based intrusion detection method. Therefore, research on anomaly detection methods using data learning-based artificial intelligence technology is increasing. In addition, supervised learning-based anomaly detection methods are difficult to use in real environments because they require sufficient labeled data for learning. Research on an unsupervised learning-based method that learns from normal data and detects an anomaly by finding a pattern in the data itself has been actively conducted. Therefore, this study aims to extract a latent vector that preserves useful sequence information from sequence log data and develop an anomaly detection learning model using the extracted latent vector. Word2Vec was used to create a dense vector representation corresponding to the characteristics of each sequence, and an unsupervised autoencoder was developed to extract latent vectors from sequence data expressed as dense vectors. The developed autoencoder model is a recurrent neural network GRU (Gated Recurrent Unit) based denoising autoencoder suitable for sequence data, a one-dimensional convolutional neural network-based autoencoder to solve the limited short-term memory problem that GRU can have, and an autoencoder combining GRU and one-dimensional convolution was used. The data used in the experiment is time-series-based NGIDS (Next Generation IDS Dataset) data, and as a result of the experiment, an autoencoder that combines GRU and one-dimensional convolution is better than a model using a GRU-based autoencoder or a one-dimensional convolution-based autoencoder. It was efficient in terms of learning time for extracting useful latent patterns from training data, and showed stable performance with smaller fluctuations in anomaly detection performance.