• Title/Summary/Keyword: Research Information Systems

Search Result 12,224, Processing Time 0.037 seconds

Prediction of KOSPI using Data Editing Techniques and Case-based Reasoning (자료편집기법과 사례기반추론을 이용한 한국종합주가지수 예측)

  • Kim, Kyoung-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.287-295
    • /
    • 2007
  • This paper proposes a novel data editing techniques with genetic algorithm (GA) in case-based reasoning (CBR) for the prediction of Korea Stock Price Index (KOSPI). CBR has been widely used in various areas because of its convenience and strength in compelax problem solving. Nonetheless, compared to other machine teaming techniques, CBR has been criticized because of its low prediction accuracy. Generally, in order to obtain successful results from CBR, effective retrieval of useful prior cases for the given problem is essential. However. designing a good matching and retrieval mechanism for CBR system is still a controversial research issue. In this paper, the GA optimizes simultaneously feature weights and a selection task for relevant instances for achieving good matching and retrieval in a CBR system. This study applies the proposed model to stock market analysis. Experimental results show that the GA approach is a promising method for data editing in CBR.

  • PDF

A Study on the Law2Vec Model for Searching Related Law (연관법령 검색을 위한 워드 임베딩 기반 Law2Vec 모형 연구)

  • Kim, Nari;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1419-1425
    • /
    • 2017
  • The ultimate goal of legal knowledge search is to obtain optimal legal information based on laws and precedent. Text mining research is actively being undertaken to meet the needs of efficient retrieval from large scale data. A typical method is to use a word embedding algorithm based on Neural Net. This paper demonstrates how to search relevant information, applying Korean law information to word embedding. First, we extracts reference laws from precedents in order and takes reference laws as input of Law2Vec. The model learns a law by predicting its surrounding context law. The algorithm then moves over each law in the corpus and repeats the training step. After the training finished, we could infer the relationship between the laws via the embedding method. The search performance was evaluated based on precision and the recall rate which are computed from how closely the results are associated to the search terms. The test result proved that what this paper proposes is much more useful compared to existing systems utilizing only keyword search when it comes to extracting related laws.

Improving Accuracy and Completeness in the Collaborative Staging System for Stomach Cancer in South Korea

  • Lim, Hyun-Sook;Won, Young-Joo;Boo, Yoo-Kyung
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.21
    • /
    • pp.9529-9534
    • /
    • 2014
  • Background: Cancer staging enables planning for the best treatments, evaluation of prognosis, and predictions for survival. The Collaborative Stage (CS) system makes it possible to significantly reduce the proportion of patients labeled at an "unknown" stage as well as discrepancies among different staging systems. This study aims to analyze the factors that influence the accuracy and validity of CS data. Materials and Methods: Data were randomly selected (233 cases) from stomach cancer cases enrolled for CS survey at the Korea Central Cancer Registry. Two questionnaires were used to assess CS values for each case and to review the cancer registration environment for each hospital. Data were analyzed in terms of the relationships between the time spent for acquisition and registration of CS information, environments relating to cancer registration in the hospitals, and document sources of CS information for each item. Results: The time for extracting and registering data was found to be shorter when the hospitals had prior experience gained from participating in a CS pilot study and when they were equipped with full-time cancer registrars. Evaluation of the CS information according to medical record sources found that the percentage of items missing for Site Specific Factor (SSF) was 30% higher than for other CS variables. Errors in CS coding were found in variables such as "CS Extension," "CS Lymph Nodes," "CS Metastasis at Diagnosis," and "SSF25 Involvement of Cardia and Distance from Esophagogastric Junction (EGJ)." Conclusions: To build CS system data that are reliable for cancer registration and clinical research, the following components are required: 1) training programs for medical records administrators; 2) supporting materials to promote active participation; and 3) format development to improve registration validity.

Coastal and Marine Environment Monitoring System using Flooding Routing Protocol (플러딩 라우팅 프로토콜을 이용한 연안.해양 환경모니터링 시스템)

  • Yoo, Jae-Ho;Lee, Seung-Chul;Kim, Jong-Jin;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.180-183
    • /
    • 2011
  • Recently, environmental problems have been deteriorating rapidly. Therefore, there is an urgent need to establish policies and research in the conservation of the global environment. Many researchers are studied in environment systems to prevent and reduce pollution of water, air and soil actively. In this paper, several parameters such as temperature, humidity, illumination, barometric pressure, dew point, water quality data, and air conditions are collected and transmitted thorough wireless sensor network. The field server is located in the coastal and marine area so that any abrupt changes can be detected quickly. In addition, WSN based flooding routing protocol for efficient data transmission is designed to support and monitor information of climate and marin factors.

  • PDF

Implementation of Sluice Valve management systems using GPS and AR (GPS와 증강현실을 이용한 제수변 관리시스템 구현)

  • Kim, Hwa-Seon;Kim, Chang-Young;Lee, Imgeun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.151-156
    • /
    • 2017
  • In case of massive water leakage, it's crucial for field manager to quickly positioning the problematic valve and related ones. However, it's not easy for the system to find the corresponding valve and even if it's found, it can not respond quickly because it can't know the relevant information immediately. In this paper, we implement the system for identifying sluice valve positions using GPS and AR techniques. The proposed system is composed of hand held android device, remote database server and data acquisition device for DB creation. We utilize the android device's sensors including GPS, gyro, accelerometer, magnetic sensor. The system identifies the valve with matching between the position data from the remote database server, and current GPS locations of device. We use AR techniques to overlay the graphics pattern of valve positions and some additional informations on captured real scene. With this system, it will be fast and accurate for maintenance of sluice valve of municipal water system.

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

Case Study of Business Innovation of Agriculture Venture Firm through Strategic Alignment between Strategy and Infrastructure (전략과 인프라의 전략적 연계를 통한 농업벤처기업 경영혁신 사례 연구)

  • Park, Sang Hyeok;Han, Man Sun;Jeon, Hyoung Kwang
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.2
    • /
    • pp.35-43
    • /
    • 2014
  • Strategic link, to develop the business strategy and to build the infrastructure of the organization, is an important challenge to management activities of the company, it is a major study of management academia. Effective strategy and information systems influence the success of the organization. Strategic alignment model for analyzing linkage was introduced in this study. Strategic alignment model, is composed of business strategy, organization infrastructure, information technology strategy, and information technology infrastructure. We have studied that this models appear in some form in the field of actual companies. Our research subject is a agricultural venture in Chungnam province.

  • PDF

Development of a Web-based Geovisualization System using Google Earth and Spatial DBMS (구글어스와 공간데이터베이스를 이용한 웹기반 지리정보 표출시스템 개발)

  • Im, Woo-Hyuk;Lee, Yang-Won;Suh, Yong-Cheol
    • Spatial Information Research
    • /
    • v.18 no.4
    • /
    • pp.141-149
    • /
    • 2010
  • One of recent trends in Web-based GIS is the system development using FOSS (Free and Open Source Software). Open Source software is independent from the technologies of commercial software and can increase the reusability and extensibility of existing systems. In this study, we developed a Web-based GIS for interactive visualization of geographic information using Google Earth and spatial DBMS(database management system). Google Earth Plug-in and Google Earth API(application programming interface) were used to embed a geo-browser in the Web browser. In order to integrate the Google Earth with a spatial DBMS, we implemented a KML(Keyhole Markup Language) generator for transmitting server-side data according to user's query and converting the data to a variety of KML for geovisualization on the Web. Our prototype system was tested using time-series of LAI(leaf area index), forest map, and crop yield statistics. The demonstration included the geovisualization of raster and vector data in the form of an animated map and a 3-D choropleth map. We anticipate our KML generator and system framework will be extended to a more comprehensive geospatial analysis system on the Web.

A QoS Based Multiple Access Scheme for the Wireless ATM Services (무선 ATM 서비스를 위한 QoS 기준 다중 접속 방법)

  • Yae, Byung-Ho;Lee, Sung-Chang
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.6
    • /
    • pp.36-45
    • /
    • 1998
  • This paper discusses multiple access control aspects for a wireless extension of high-speed asynchronous transfer mode(ATM) networks. One challenging requirement is that mobile systems convey of diverse types of information including voice, computer data, facsimile, and video data that have different quality of service constraints. Basically, a centralized control scheme for a coordinated multiple access is required in order to efficiently accommodate multimedia traffic on wireless links. The proposed scheme dynamically scheduling the mobile terminal, which has data to transfer according to the service, types at base station. In this scheme, the scheduling algorithm is performed on the basis of traffic descriptors and QoS parameters, which required in the connection set up phase. As a consequence, the transmission scheduling is very flexible and can account for the different traffic rate and delay constraints that emerge from voice and data integration. The simulation result shows that the proposed scheme has better performance over other scheduling algorithms.

  • PDF

Stability Analysis of a Networked Control System with Multiple Packet Transmission (다중 패킷을 전송하는 네트워크 제어시스템의 안정성 분석)

  • Jung, Joon-Hong;Park, Ki-Heon;Lee, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.5
    • /
    • pp.18-29
    • /
    • 2007
  • The main objective of this paper is to propose a new stability analysis method for a networked control system with multiple packet transmission. The new scheduling method that can guarantee the maximum time delay and discrete switch state equation model which represent a network data loss is proposed. The equivalent model of a MIMO(multi-input multi-output) networked control system is derived from a state space model of linear time invariant interconnected systems in the form of asynchronous dynamical system. Using this model, this paper presents new stability theorems that can determine stability of the networked control system with regard to time delay, data loss, and the number of transmission packets. Simulation results verify the effectiveness of proposed stability analysis method.