• 제목/요약/키워드: Unknown Data Association

검색결과 125건 처리시간 0.03초

공공데이터와 SNS 기반 교육 프로그램 개발 (Education Program Development Based on the Public Data and SNS)

  • 이윤경;이종석
    • 정보교육학회논문지
    • /
    • 제18권4호
    • /
    • pp.633-644
    • /
    • 2014
  • 본 논문에서는 공공데이터의 활용과 SNS의 소통 기능을 중점적으로 활용하여 PC와 모바일 웹에서 사용할 수 있도록 교육 프로그램을 구현하였다. 프로그램의 특징은 친구와 문제를 주고받으며 짧은 글을 함께 전송하여 풀어보는 방식이다. 각각 방명록으로 소통의 공간을 마련하였고, 공지사항, 질문게시판, 자유게시판, 자료실을 두어 소통의 기능을 확대하고, 친구 찾기 및 추천 공간을 마련해 아는 사람 외에 프로그램을 이용하는 다른 사용자와 함께 학습할 수 있도록 설계하였다. 구현된 프로그램으로 초등학생과 고등학생에게 학습과 교우관계에 미치는 영향에 대해 설문을 통해 조사하고 반응을 분석하였다. 이러한 조사를 바탕으로 교육프로그램의 활용방안을 제시하였다.

Effects of ILFs on DRAM algorithm in SURR model uncertainty evaluation caused by interpolated rainfall using different methods

  • Nguyen, Thi Duyen;Nguyen, Duc Hai;Bae, Deg-Hyo
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2022년도 학술발표회
    • /
    • pp.137-137
    • /
    • 2022
  • Evaluating interpolated rainfall uncertainty of hydrological models caused by different interpolation methods for basins where can not fully collect rainfall data are necessary. In this study, the adaptive MCMC method under effects of ILFs was used to analyze the interpolated rainfall uncertainty of the SURR model for Gunnam basin, Korea. Three events were used to calibrate and one event was used to validate the posterior distributions of unknown parameters. In this work, the performance of four ILFs on uncertainty of interpolated rainfall was assessed. The indicators of p_factor (percentage of observed streamflow included in the uncertainty interval) and r_factor (the average width of the uncertainty interval) were used to evaluate the uncertainty of the simulated streamflow. The results showed that the uncertainty bounds illustrated the slight differences from various ILFs. The study confirmed the importance of the likelihood function selection in the application the adaptive Bayesian MCMC method to the uncertainty assessment of the SURR model caused by interpolated rainfall.

  • PDF

네트워크 공격 분석을 위한 마이닝 프로토타입 시스템 구현 (An Implementation of Mining Prototype System for Network Attack Analysis)

  • 김은희;신문선;류근호
    • 정보처리학회논문지C
    • /
    • 제11C권4호
    • /
    • pp.455-462
    • /
    • 2004
  • 네트워크 공격은 인터넷의 발달과 함께 유형도 다양하고 새로워지고 있다. 기존의 침입탐지 시스템들은 알려진 공격의 시그네처를 기반으로 탐지하기 때문에 알려지지 않거나 변형된 공격을 탐지하고, 대응하기 위해서는 많은 노력과 비용이 필요하다. 본 논문에서는 네트워크 프로토콜 속성 분석을 통해 알려지지 않거나 변형된 네트워크 공격을 예측할 수 있는 마이닝 프로토타입 시스템을 설계 하고 구현 하였다. 네트워크 프로토콜 속성을 분석하기 위해서 연관규칙과 빈발에피소드 기법을 사용하였으며, 수집된 네트워크 프로토콜은 TCP, UDP, ICMP와 통합된 형태의 스키마로 저장한다. 본 실험을 통해서 각 프로토콜별로 발생 가능한 네트워크 공격 유형을 예측할 수 있는 규칙들을 생성한다. 마이닝 프로토타입은 침입탐지 시스템에서 새로운 공격에 대응하기 위한 보조적인 .도구로서 유용하게 사용될 수 있다.

건축디자인과정에서 문제해결의 특성에 관한 연구 (A study on the characteristic of problem solving process in the architectural design process)

  • 김용일;한재수
    • 한국디지털건축인테리어학회논문집
    • /
    • 제11권3호
    • /
    • pp.53-59
    • /
    • 2011
  • In creative design, it is necessary to understand the characteristic of architectural design. In the world of design problem, a distinction can be made between those that are well-defined and those that are ill-defined. Well-defined problems are those for which the ends or goal, are already prescribed and apparent, their solution requires the provision of appropriate means. For ill-defined problems, on the other hand, both the ends and the means of solution are unknown at the outset of the problem solving exercise, at least in their entirety. Most of design problems is ill-defined, which is unknown at the beginning of the problem solving exercise. In order to solve the design problem, Designers take advantage of the search methods of problem space, such as global-search-methods(depth-first-methods, breath-first-methods), local-search-methods(generate and test, heuristics, hill-climbing, reasoning) and visual thinking, which is represented through sketching. Sketching is a real part of design reasoning and it does so through a special kind of visual imagery. Also in the design problem solving it have been an important means of problem exploration and solution generation. By sketching, they represent images held in the mind as well as makes graphic images which help generate mental images of entity that is being designed. The search methods of problem space and a visual thinking have been crucially considered in the architectural design. The purpose of this paper is to explore the property of design by means of the pre-existed-experiment data and literature research. The findings will help design the architectural design for more creative results.

Bayesian Inference on Variance Components Using Gibbs Sampling with Various Priors

  • Lee, C.;Wang, C.D.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • 제14권8호
    • /
    • pp.1051-1056
    • /
    • 2001
  • Data for teat number for Landrace (L), Yorkshire (Y), crossbred of Landrace and Yorkshire (LY), and crossbred of Landrace, Yorkshire and Chinese indigenous Min Pig (LYM) were analyzed using Gibbs sampling. In Bayesian inference, flat priors and some informative priors were used to examine their influence on posterior estimates. The posterior mean estimates of heritabilities with flat priors were $0.661{\pm}0.035$ for L, $0.540{\pm}0.072$ for Y, $0.789{\pm}0.074$ for LY, and $0.577{\pm}0.058$ for LYM, and they did not differ (p>0.05) from their corresponding estimates of REML. When inverse Gamma densities for variance components were used as priors with the shape parameter of 4, the posterior estimates were still corresponding (p>0.05) to REML estimates and mean estimates using Gibbs sampling with flat priors. However, when the inverse Gamma densities with the shape parameter of 10 were utilized, some posterior estimates differed (p<0.10) from REML estimates and/or from other Gibbs mean estimates. The use of moderate degree of belief was influential to the posterior estimates, especially for Y and for LY where data sizes were small. When the data size is small, REML estimates of variance components have unknown distributions. On the other hand, Bayesian approach gives exact posterior densities of variance components. However, when the data size is small and prior knowledge is lacked, researchers should be careful with even moderate priors.

HLA and Disease Associations in Koreans

  • Ahn, Stephen;Choi, Hee-Back;Kim, Tai-Gyu
    • IMMUNE NETWORK
    • /
    • 제11권6호
    • /
    • pp.324-335
    • /
    • 2011
  • The human leukocyte antigen (HLA), the major histocompatibility complex (MHC) in humans has been known to reside on chromosome 6 and encodes cell-surface antigen-presenting proteins and many other proteins related to immune system function. The HLA is highly polymorphic and the most genetically variable coding loci in humans. In addition to a critical role in transplantation medicine, HLA and disease associations have been widely studied across the populations worldwide and are found to be important in prediction of disease susceptibility, resistance and of evolutionary maintenance of genetic diversity. Because recently developed molecular based HLA typing has several advantages like improved specimen stability and increased resolution of HLA types, the association between HLA alleles and a given disease could be more accurately quantified. Here, in this review, we have collected HLA association data on some autoimmune diseases, infectious diseases, cancers, drug responsiveness and other diseases with unknown etiology in Koreans and attempt to summarize some remarkable HLA alleles related with specific diseases.

A hidden Markov model for long term drought forecasting in South Korea

  • Chen, Si;Shin, Ji-Yae;Kim, Tae-Woong
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2015년도 학술발표회
    • /
    • pp.225-225
    • /
    • 2015
  • Drought events usually evolve slowly in time and their impacts generally span a long period of time. This indicates that the sequence of drought is not completely random. The Hidden Markov Model (HMM) is a probabilistic model used to represent dependences between invisible hidden states which finally result in observations. Drought characteristics are dependent on the underlying generating mechanism, which can be well modelled by the HMM. This study employed a HMM with Gaussian emissions to fit the Standardized Precipitation Index (SPI) series and make multi-step prediction to check the drought characteristics in the future. To estimate the parameters of the HMM, we employed a Bayesian model computed via Markov Chain Monte Carlo (MCMC). Since the true number of hidden states is unknown, we fit the model with varying number of hidden states and used reversible jump to allow for transdimensional moves between models with different numbers of states. We applied the HMM to several stations SPI data in South Korea. The monthly SPI data from January 1973 to December 2012 was divided into two parts, the first 30-year SPI data (January 1973 to December 2002) was used for model calibration and the last 10-year SPI data (January 2003 to December 2012) for model validation. All the SPI data was preprocessed through the wavelet denoising and applied as the visible output in the HMM. Different lead time (T= 1, 3, 6, 12 months) forecasting performances were compared with conventional forecasting techniques (e.g., ANN and ARMA). Based on statistical evaluation performance, the HMM exhibited significant preferable results compared to conventional models with much larger forecasting skill score (about 0.3-0.6) and lower Root Mean Square Error (RMSE) values (about 0.5-0.9).

  • PDF

소매바이어의 관점에서 본 갈등해결을 위한 교섭전략

  • 한동철;한장희;성희승
    • 한국유통학회지:유통연구
    • /
    • 제2권2호
    • /
    • pp.27-44
    • /
    • 1997
  • In channels of distribution, buyers and vendors are often in conflict. In order 새 resolve conflicts, they usually use three types of strategies: problem solving, compromise and aggressive. Previous studies have focused on the choice of these three strategies. Nevertheless, it is unknown whether the strategies chosen in the early stage are maintained or changed over time. This articles main focus in on testing how the strategies are being affected by conflict resolution processed. Based on the literature review, six hypotheses are formulated. Data obtained from sixty-eight buyers of four different department stores are analyzed. Three hypotheses are fully accepted, two are partially accepted and one is rejected. Problem solving strategy and compromise strategy are either maintained or changed, but aggressive strategy is maintained, not changed. Since the nature of this study is exploratory, more empirical research is urgently needed.

  • PDF

침입탐지시스템의 경보데이터 분석을 위한 데이터 마이닝 프레임워크 (An Alert Data Mining Framework for Intrusion Detection System)

  • 신문선
    • 한국산학기술학회논문지
    • /
    • 제12권1호
    • /
    • pp.459-466
    • /
    • 2011
  • 이 논문에서는 침입 탐지시스템의 체계적인 경보데이터관리 및 경보데이터 상관관계 분석을 위하여 데이터 마이닝 기법을 적용한 경보 데이터 마이닝 프레임워크를 제안한다. 적용된 마이닝 기법은 속성기반 연관규칙, 속성기반 빈발에피소드, 오경보 분류, 그리고 순서기반 클러스터링이다. 이들 구성요소들은 각각 대량의 경보 데이터들로부터 알려지지 않은 패턴을 탐사하여 공격시나리오를 유추하거나, 공격 순서를 예측하는 것이 가능하며, 데이터의 그룹화를 통해 고수준의 의미를 추출할 수 있게 해준다. 실험 및 평가를 위하여 제안된 경보데이터 마이닝 프레임워크의 프로토타입을 구축하였으며 프레임워크의 기능을 검증하였다. 이 논문에서 제안한 경보 데이터 마이닝 프레임워크는 기존의 경보데이터 상관관계분석에서는 해결하지 못했던 통합적인 경보 상관관계 분석 기능을 수행할 뿐만 아니라 대량의 경보데이터에 대한 필터링을 수행하는 장점을 가진다. 또한 추출된 규칙 및 공격시나리오는 침입탐지시스템의 실시간 대응에 활용될 수 있다.

Analysis of a Security Survey for Smartphones

  • Nam, Sang-Zo
    • International Journal of Contents
    • /
    • 제11권3호
    • /
    • pp.14-23
    • /
    • 2015
  • This paper presents the findings of a study in which students at a four-year university were surveyed in an effort to analyze and verify the differences in perceived security awareness, security-related activities, and security damage experiences when using smartphones, based on demographic variables such as gender, academic year, and college major. Moreover, the perceived security awareness items and security-related activities were tested to verify whether they affect the students' security damage experience. Based on survey data obtained from 592 participants, the findings indicate that demographic differences exist for some of the survey question items. The majority of the male students replied "affirmative" to some of the questions related to perceived security awareness and "enthusiastic" to questions about security-related activities. Some academic year differences exist in the responses to perceived security awareness and security-related activities. On the whole, freshmen had the lowest level of security awareness. Security alert seems to be very high in sophomores, but it decreases as the students become older. While the difference in perceived security awareness based on college major was not significant, the difference in some security-related activities based on that variable was significant. No significant difference was found in some items such as storing private information in smartphones and frequency of implementation of security applications based on the college major variable. However, differences among the college majors were verified in clicking hyperlinks in unknown SMS messages and in the number of security applications in smartphones. No differences were found in security damage experiences based on gender, academic year, and college major. Security awareness items had no impact on the experience of security damage in smartphones. However, some security activities, such as storing resident registration numbers in a smartphone, clicking hyperlinks in unknown SMS messages, the number of security apps in a smartphone, and the frequency of implementation of security apps did have an impact on security damage.