• Title/Summary/Keyword: computing model

Search Result 3,371, Processing Time 0.044 seconds

A Study on the Document Topic Extraction System Based on Big Data (빅데이터 기반 문서 토픽 추출 시스템 연구)

  • Hwang, Seung-Yeon;An, Yoon-Bin;Shin, Dong-Jin;Oh, Jae-Kon;Moon, Jin Yong;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.207-214
    • /
    • 2020
  • Nowadays, the use of smart phones and various electronic devices is increasing, the Internet and SNS are activated, and we live in the flood of information. The amount of information has grown exponentially, making it difficult to look at a lot of information, and more and more people want to see only key keywords in a document, and the importance of research to extract topics that are the core of information is increasing. In addition, it is also an important issue to extract the topic and compare it with the past to infer the current trend. Topic modeling techniques can be used to extract topics from a large volume of documents, and these extracted topics can be used in various fields such as trend prediction and data analysis. In this paper, we inquire the topic of the three-year papers of 2016, 2017, and 2018 in the field of computing using the LDA algorithm, one of Probabilistic Topic Model Techniques, in order to analyze the rapidly changing trends and keep pace with the times. Then we analyze trends and flows of research.

A Method of Estimating Conservative Potential Amount of Groundwater (보수적 지하수 개발가능량 산정 방안)

  • Chung, Il-Moon;Kim, Nam Won;Lee, Jeongwoo;Lee, Jeong Eun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.6
    • /
    • pp.1797-1806
    • /
    • 2014
  • By far, groundwater management has been conducted by 'safe yield' policy based on the estimation of annual average of groundwater recharge throughout the world. However, as groundwater recharge show spatiotemporal variation, dynamic analysis must be carried out to evaluate the sustainable groundwater resources. In this study, an integrated surface-groundwater model, SWAT-MODFLOW was used to compute the spatial distribution of groundwater recharge in Gyungju region. Frequency analysis is adopted to evaluate the existing values of potential amount of groundwater development which is made by the 10 year drought frequency rainfall multiplied by recharge coefficient. The conservative methods for estimating recharge rates of 10 year drought frequency in subbains are newly suggested and compared with the existing values of potential amount of groundwater development. This process will promote the limitations for existing precesses used for computing potential amount of groundwater development.

Precise Measurement Method and Error Analysis with Roughness Variables for Estimation of Scattering Coefficients (지표면 산란 계수 예측을 위한 정확한 지표면 거칠기 변수 측정 방법 및 오차 분석)

  • Kweon, Soon-Koo;Hwang, Ji-Hwan;Oh, Yisok;Hong, Sungwook
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.1
    • /
    • pp.91-97
    • /
    • 2013
  • The input parameters of scattering models for computing the backscattering coefficients of earth terrains are mainly soil moisture and surface roughness. The backscattering coefficients of soil surfaces are more sensitive to surface roughness than soil moisture. In this study, we propose a precise measurement method for roughness parameters and analyze measurement errors. We measured surface roughness using a pin-board profiler(1 m, 0.5 cm interval) and a laser profiler(1 m, 0.25 cm interval). The measurement differences between two profilers in an average sense are 0.097 cm for root-mean-square (RMS) height and 1.828 cm for correlation length. The analysis of the correlation functions and relative errors shows that the laser measurements are more stable than the pin-board measurements. The differences of the calculated backscattering coefficients using a surface scattering model between pin-board and laser profiler measurements are less than 1 dB.

A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini (악의적 지니 프록시로부터 비밀 정보 보호를 위한 암호학적 모델)

  • Yang Jong-Phil;Rhee Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.27-34
    • /
    • 2006
  • In the near future, people will wish to access many kinds of heterogeneous networks to use their services anytime and anywhere. Owing to the heterogeneity of networks, there must be many kinds of protocols to guarantee secure services. The mobile device can depend in a middleware for accessing services in the heterogeneous networks and the middleware helps the mobile device to communicate with services without blowing concrete protocols. If a secure channel is necessary, the middleware may access a private key in the mobile device to perform a security protocol. In this paper, we focus on the security of a private key in the mobile device against malicious middlewares. To do so, we introduce two models for a user to protect his/her private key against malicious middlewares by generating authentication data(e.g., digital signatures) without keeping the private key in the mobile device.

A Study on the Shortest Path Algorithm With Direction of the Postal Route Optimization System (방향성을 고려한 우편 경로 최적화 시스템의 최단 경로 생성 알고리즘 연구)

  • Nam, Sang-U;Park, Mun-Seong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.491-498
    • /
    • 1997
  • Geographic Infprmation System(GIS)is being apply to extended from specified ppkication to general purpose deu to the omprovement of computing power.As one part of postal Integarated Information Servies, Postalroute Optimication system(PROS) is comprsed of the composed of the shortest pathe genrator for providing fast and shortest route of postal delivery, the ischronal area generator, the boudary relacation generator, GIS engine, road map, and rdelational database , etc.This paper is related to creation algorithm of the shortest path generation (SPAWD;Shortest Path Algorithm With Direction)from PEOS model.To differ from the exsting shortest path generating methods, this paper suggests SPAWD alforithm for searching destinations of fast time between start and destination points with dirdstion.It comapares and analyzes the new algorithm with existion algorithms, and suggests directions of future studies.

  • PDF

A Desing and Implementation of an Integrated Environment for Sharing and Reusing OLE Objects (OLE 객체의 공유와 재활용을 위한 통합 환경 설계 및 구현)

  • Jang, Jung-Hyeok;Lee, Hyeon-Ho;Lee, Won-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.349-362
    • /
    • 1997
  • In order to make a meaningful multi-media object,it is usually necessary to apply a number of non-trival operations.If multi-media data can be encapsulated in a standaridized form and stored in a database,it is poss-ible to share and reuse multi-media data among users without repeating the same or similar operations. Based on the OLE component object model,this paper proposes the integrated computing enviroment for naive user to share and reuse of Ole objects.Various types of multi- media objects that are created by their appropriate OLE application programs can be aggreagated to form a multi-media document.In addition,the OLE objects can also be stored in database by a controlled manner.TheOLE object in a database can be retrieved by a visual query interface and reused to make a new document.This paper describes the common Platform to integrate various ment of OLE appfication programs,the separation process of an OLE object form a document,and the overall management of OLE object in a database.

  • PDF

Proportions of the aesthetic African-Caribbean face: idealized ratios, comparison with the golden proportion and perceptions of attractiveness

  • Mantelakis, Angelos;Iosifidis, Michalis;Al-Bitar, Zaid B.;Antoniadis, Vyron;Wertheim, David;Garagiola, Umberto;Naini, Farhad B.
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.40
    • /
    • pp.20.1-20.10
    • /
    • 2018
  • Background: In the absence of clear guidelines for facial aesthetic surgery, most surgeons rely on expert intuitive judgement when planning aesthetic and reconstructive surgery. One of the most famous theories regarding "ideal" facial proportions is that of the golden proportion. However, there are conflicting opinions as to whether it can be used to assess facial attractiveness. The aim of this investigation was to assess facial ratios of professional black models and to compare the ratios with the golden proportion. Methods: Forty photographs of male and female professional black models were collected. Observers were asked to assign a score from 1 to 10 (1 = not very attractive, 10 = very attractive). A total of 287 responses were analysed for grading behaviour according to various demographic factors by two groups of observers. The best graded photographs were compared with the least well-graded photographs to identify any differences in their facial ratios. The models' facial ratios were calculated and compared with the golden proportion. Results: Differences in grading behaviour were observed amongst the two assessment groups. Only one out of the 12 facial ratios was not significantly different from the golden proportion. Conclusions: Only one facial ratio was observed to be similar to the golden proportion in professional model facial photographs. No correlation was found between facial ratios in professional black models with the golden proportion. It is proposed that an individualistic treatment for each ratio is a rather better method to guide future practice.

An Empirical Study on Relationships among Contents Quality, Trust, and Intention to Use of e-Learning (e-러닝 컨텐츠 품질, 신뢰, 이용의도의 관계에 대한 실증 연구)

  • Lim, Se-Hun;Kim, Dae-Kil;Lee, Sang-Heon
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.267-279
    • /
    • 2011
  • A variety of Web Services are being existences based on the development of the Internet. Especially, e-Learning services in the Universities make the temporal and spatial constraints overcome, and e-Learning services have gained great popularity to the students who use because those provide various convenience and usefulness. e-Learning studies have been actively performed based on the spread of e-Learning in the various industries. A number of studies suggest the diffusion plan of e-Learning applying the Technology Acceptance Model studies. Those studies focused on the ease of use and usefulness of e-Learning. The explanation about educational contents perspectives, which is the key factor in e-Learning, is very weak. Therefore, this study suggested the strategy for spreading the e-Learning adoption through in terms of e-Learning educational contents and trust perspectives. This research results would provide the strategic implications to boost the e-Learning adoption in the various universities in terms of e-Learning educational contents and trust perspectives.

A Resource-Aware Mapping Algorithm for Coarse-Grained Reconfigurable Architecture Using List Scheduling (리스트 스케줄링을 통한 Coarse-Grained 재구성 구조의 맵핑 알고리즘 개발)

  • Kim, Hyun-Jin;Hong, Hye-Jeong;Kim, Hong-Sik;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.6
    • /
    • pp.58-64
    • /
    • 2009
  • For the success of the reconfigurable computing, the algorithm for mapping operations onto coarse-grained reconfigurable architecture is very important. This paper proposes a resource-aware mapping system for the coarse-grained reconfigurable architecture and its own underlying heuristic algorithm. The operation assignment and the routing path allocation are simultaneously performed with a cycle-accurate time-exclusive resource model. The proposed algorithm minimizes the communication resource usage and the global memory access with the list scheduling heuristic. The operation to be mapped are prioritized with general properties of data flow. The evaluations of the proposed algorithm show that the performance is significantly enhanced in several benchmark applications.

Seismic Response Control of Structures Using Decentralized Response-Dependent MR Dampers (분산제어식 응답의존형 MR 감쇠기를 이용한 구조물의 지진응답제어)

  • Youn, Kyung-Jo;Min, Kyung-Won;Lee, Sang-Hyun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.20 no.6
    • /
    • pp.761-767
    • /
    • 2007
  • In centralized control system, complicated control systems including sensors, power supply and dampers should be required to satisfy the target response of large-scale structures. The practical applications of the centralized control system, however, is very difficult due to high order finite element model of structures, uncertainty of models, and limitations of the excitation system. In this study, the decentralized response-dependent MR damper of which magnetic field is automatically modulated according to the displacement or velocity transferred to the damper without any sensing and computing systems. this decentralized response-dependent MR damper are investigated according to the ranges of relative magnitude between the control force of MR damper and the story shear force of structures by nonlinear time history analysis. Finally, its performance is compared with centralized LQR algorithm which is used in general centralized control theory for a three story building structure.