• Title/Summary/Keyword: Rule Importance

Search Result 214, Processing Time 0.021 seconds

The Method of Deriving Japanese Keyword Using Dependence (의존관계에 기초한 일본어 키워드 추출방법)

  • Lee, Tae-Hun;Jung, Kyu-Cheol;Park, Ki-Hong
    • The KIPS Transactions:PartB
    • /
    • v.10B no.1
    • /
    • pp.41-46
    • /
    • 2003
  • This thesis composes separated words in text for extracting keywords from Japanese, proposes extracting indexing keywords which consist of a compound noun using words and sentences information with the rules in the sentences. It constructs generative rules of compound nouns to be based In dependence as a result of analysing character of keywords in the text not the same way as before. To hold other extracting keywords and the content of sentence, and suggest how to decide importance concerned some restriction and repetition of words about generative rules. To verify the validity of keywords extracting, we have used titles and abstracts from Japanese thesis 65 files about natural language and/or voice processing, and obtain 63% in outputting one in the top rank.

A Study on Quality Assurance of Embedded Software Source Codes for Weapon Systems by Improving the Reliability Test Process (신뢰성 시험 프로세스 개선을 통한 무기체계 내장형 소프트웨어 소스코드 품질확보에 관한 연구)

  • Kwon, Kyeong Yong;Joo, Joon Seok;Kim, Tae Sik;Oh, Jin Woo;Baek, Ji Hyun
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.860-867
    • /
    • 2015
  • In the defense field, weapon systems are increasing in importance, as well as the weight of the weapon system embedded software development as an advanced technology. As the development of a network-centric warfare has become important to secure the reliability and quality of embedded software in modern weapons systems in battlefield situations. Also, embedded software problems are transferred to the production stage in the development phase and the problem gives rise to an enormous loss at the national level. Furthermore, development companies have not systematically constructed a software reliability test. This study suggests that approaches about a qualityverification- system establishment of embedded software, based on a variety of source code reliability test verification case analysis.

Vibration behavior of trapezoidal sandwich plate with functionally graded-porous core and graphene platelet-reinforced layers

  • Liang, Di;Wu, Qiong;Lu, Xuemei;Tahouneh, Vahid
    • Steel and Composite Structures
    • /
    • v.36 no.1
    • /
    • pp.47-62
    • /
    • 2020
  • In this study, free vibration behavior of trapezoidal sandwich plates with porous core and two graphene platelets (GPLs) reinforced nanocomposite outer layers are presented. The distribution of pores and GPLs are supposed to be functionally graded (FG) along the thickness of core and nanocomposite layers, respectively. The effective Young's modulus of the GPL-reinforced (GPLR) nanocomposite layers is determined using the modified Halpin-Tsai micromechanics model, while the Poisson's ratio and density are computed by the rule of mixtures. The FSDT plate theory is utilized to establish governing partial differential equations and boundary conditions (B.C.s) for trapezoidal plate. The governing equations together with related B.C.s are discretized using a mapping- generalized differential quadrature (GDQ) method in the spatial domain. Then natural frequencies of the trapezoidal sandwich plates are obtained by GDQ method. Validity of current study is evaluated by comparing its numerical results with those available in the literature. A special attention is drawn to the role of GPLs weight fraction, GPLs patterns of two faces through the thickness, porosity coefficient and distribution of porosity on natural frequencies characteristics. New results show the importance of this permeates on vibrational characteristics of porous/GPLR nanocomposite plates. Finally, the influences of B.C.s and dimension as well as the plate geometry such as face to core thickness ratio on the vibration behaviors of the trapezoidal plates are discussed.

Adaptive Anomaly Movement Detection Approach Based On Access Log Analysis (접근 기록 분석 기반 적응형 이상 이동 탐지 방법론)

  • Kim, Nam-eui;Shin, Dong-cheon
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.45-51
    • /
    • 2018
  • As data utilization and importance becomes important, data-related accidents and damages are gradually increasing. Especially, insider threats are the most harmful threats. And these insider threats are difficult to detect by traditional security systems, so rule-based abnormal behavior detection method has been widely used. However, it has a lack of adapting flexibly to changes in new attacks and new environments. Therefore, in this paper, we propose an adaptive anomaly movement detection framework based on a statistical Markov model to detect insider threats in advance. This is designed to minimize false positive rate and false negative rate by adopting environment factors that directly influence the behavior, and learning data based on statistical Markov model. In the experimentation, the framework shows good performance with a high F2-score of 0.92 and suspicious behavior detection, which seen as a normal behavior usually. It is also extendable to detect various types of suspicious activities by applying multiple modeling algorithms based on statistical learning and environment factors.

  • PDF

Network Analysis between Uncertainty Words based on Word2Vec and WordNet (Word2Vec과 WordNet 기반 불확실성 단어 간의 네트워크 분석에 관한 연구)

  • Heo, Go Eun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.3
    • /
    • pp.247-271
    • /
    • 2019
  • Uncertainty in scientific knowledge means an uncertain state where propositions are neither true or false at present. The existing studies have analyzed the propositions written in the academic literature, and have conducted the performance evaluation based on the rule based and machine learning based approaches by using the corpus. Although they recognized that the importance of word construction, there are insufficient attempts to expand the word by analyzing the meaning of uncertainty words. On the other hand, studies for analyzing the structure of networks by using bibliometrics and text mining techniques are widely used as methods for understanding intellectual structure and relationship in various disciplines. Therefore, in this study, semantic relations were analyzed by applying Word2Vec to existing uncertainty words. In addition, WordNet, which is an English vocabulary database and thesaurus, was applied to perform a network analysis based on hypernyms, hyponyms, and synonyms relations linked to uncertainty words. The semantic and lexical relationships of uncertainty words were structurally identified. As a result, we identified the possibility of automatically expanding uncertainty words.

Guideline on Acceptance Test and Commissioning of High-Precision External Radiation Therapy Equipment

  • Kim, Juhye;Shin, Dong Oh;Choi, Sang Hyoun;Min, Soonki;Kwon, Nahye;Jung, Unjung;Kim, Dong Wook
    • Progress in Medical Physics
    • /
    • v.29 no.4
    • /
    • pp.123-136
    • /
    • 2018
  • The complex dose distribution and dose transfer characteristics of intensity-modulated radiotherapy increase the importance of precise beam data measurement and review in the acceptance inspection and preparation stages. In this study, we propose a process map for the introduction and installation of high-precision radiotherapy devices and present items and guidelines for risk management at the acceptance test procedure (ATP) and commissioning stages. Based on the ATP of the Varian and Elekta linear accelerators, the ATP items were checked step by step and compared with the quality assurance (QA) test items of the AAPM TG-142 described for the medical accelerator QA. Based on the commissioning procedure, dose quality control protocol, and mechanical quality control protocol presented at international conferences, step-by-step check items and commissioning guidelines were derived. The risk management items at each stage were (1) 21 ionization chamber performance test items and 9 electrometer, cable, and connector inspection items related to the dosimetry system; (2) 34 mechanical and dose-checking items during ATP, 22 multileaf collimator (MLC) items, and 36 imaging system items; and (3) 28 items in the measurement preparation stage and 32 items in the measurement stage after commissioning. Because the items presented in these guidelines are limited in terms of special treatment, items and practitioners can be modified to reflect the clinical needs of the institution. During the system installation, it is recommended that at least two clinically qualified medical physicists (CQMP) perform a double check in compliance with the two-person rule. We expect that this result will be useful as a radiation safety management tool that can prevent radiation accidents at each stage during the introduction of radiotherapy and the system installation process.

Middle School Students' Observational Features during Geological Field Trip (야외 지질 답사에서 중학생들의 암석 관찰 특성)

  • Kang, Hyeonji;Shin, Donghee
    • Journal of the Korean earth science society
    • /
    • v.42 no.5
    • /
    • pp.571-587
    • /
    • 2021
  • This study aims to investigate the problem recognition and clue capture processes of the observation stage in a geological field trip using abductive inquiry. To this end, eight outdoor geological programs were developed in the order of diagnostic evaluation, outdoor geological fieldwork, and review. Six middle-school students participated in these programs The geological field trip was conducted twice, followed by data provision, observation, rule generation, hypothesis generation, and final hypothesis presentation. Outdoor geological fieldwork recordings and student activity sheets were collected and analyzed qualitatively. From these data, three aspects of student observations emerged during the geological fieldwork: The characteristics of each pattern were subdivided into the geological importance of the clues, attention, type of clues, observation characteristics (attention factor), clue utilization, and clue deletion. Here, by combining these results, we propose educational applications that correspond to each aspect.

Standard Items for National R&D Reports (국가R&D보고서 기재항목에 관한 연구)

  • Lee, Kangsan-Dajeong;Hwang, Hyekyong
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.4
    • /
    • pp.211-230
    • /
    • 2020
  • The purpose of this study is to contribute to improving the efficiency of managing the database of the reports arising from the results of National R&D projects. To that end, the reports submitted by 49 agencies under the Ministry of Science and ICT were collected, and samples were selected for each institution. The samples and form of the final report and summary of the Enforcement Rule of the Framework Act on Science and Technology were compared, and the components and items to be entered were established. The final report's unique items were derived from the analysis of the state of connection with the National R&D information standard. The items to be entered are classified into major and optional according to their importance, and the location of the entry to be entered is suggested. If standardization of the elements and items is advanced as planned, it is expected to automate metadata extraction and improve the quality of report metadata when building a database.

Evaluations for Fraud in L/C Transactions, and Counter-Measures

  • Lee, Jae-Sung
    • Journal of Korea Trade
    • /
    • v.24 no.7
    • /
    • pp.73-92
    • /
    • 2020
  • Purpose - The letter of credit has been playing a major role to diminish overall risks which exist among concerned parties even though there are differences such as language, culture, law, and distance. This paper reviews essence of the letter of credit and its transaction principles, as well as overall practical questions based on the L/C transaction principle. It also investigates the risk of fraud occurrences in L/C transactions and the importance of fraud prevention and preventive measures in international L/C transactions, including the Fraud Rule, which is a major topic to consider in business transactions. Design/methodology - It is considered that an importing country's concerned parties and an exporting country's concerned parties face different situations. This study employs the existing framework to identify liability, responsibility, and obligation for all concerned parties across countries. Using a quite direct measurement of principles in the letter of credit, such as principle of independence, principle of abstraction, and principle of strictness and coincidence, we studied these differences. Findings - Our main findings can be summarized as follow. The paper enhances the efficiency of the L/C payment method to provide fraud generated from L/C transactions, presentation of a theoretical framework about fraud and fraud prevention, which international trading companies should acknowledge in a material way based on fraud risk resulting from taking advantage of L/C transaction principles. Originality/value - Existing studies focus on fraud accidents in L/C transactions by taking bad advantage of the characteristics of the letter of credit without suggesting risks of fraud. This paper attempts to evaluate and provide preventive measures as a solution for fraud and risky international business in a letter of credit transaction. This area of trade studies is underexplored, both empirically and theoretically, although the issue has long been important to Korean and world community foreign trade.

Probability Estimation Method for Imputing Missing Values in Data Expansion Technique (데이터 확장 기법에서 손실값을 대치하는 확률 추정 방법)

  • Lee, Jong Chan
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.11
    • /
    • pp.91-97
    • /
    • 2021
  • This paper uses a data extension technique originally designed for the rule refinement problem to handling incomplete data. This technique is characterized in that each event can have a weight indicating importance, and each variable can be expressed as a probability value. Since the key problem in this paper is to find the probability that is closest to the missing value and replace the missing value with the probability, three different algorithms are used to find the probability for the missing value and then store it in this data structure format. And, after learning to classify each information area with the SVM classification algorithm for evaluation of each probability structure, it compares with the original information and measures how much they match each other. The three algorithms for the imputation probability of the missing value use the same data structure, but have different characteristics in the approach method, so it is expected that it can be used for various purposes depending on the application field.