• Title/Summary/Keyword: problem analysis

Search Result 16,367, Processing Time 0.038 seconds

Multivariate process control procedure using a decision tree learning technique (의사결정나무를 이용한 다변량 공정관리 절차)

  • Jung, Kwang Young;Lee, Jaeheon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.3
    • /
    • pp.639-652
    • /
    • 2015
  • In today's manufacturing environment, the process data can be easily measured and transferred to a computer for analysis in a real-time mode. As a result, it is possible to monitor several correlated quality variables simultaneously. Various multivariate statistical process control (MSPC) procedures have been presented to detect an out-of-control event. Although the classical MSPC procedures give the out-of-control signal, it is difficult to determine which variable has caused the signal. In order to solve this problem, data mining and machine learning techniques can be considered. In this paper, we applied the technique of decision tree learning to the MSPC, and we did simulation for MSPC procedures to monitor the bivariate normal process means. The results of simulation show that the overall performance of the MSPC procedure using decision tree learning technique is similar for several values of correlation coefficient, and the accurate classification rates for out-of-control are different depending on the values of correlation coefficient and the shift magnitude. The introduced procedure has the advantage that it provides the information about assignable causes, which can be required by practitioners.

A Statistical Analysis of the General Anesthesia for Dental Treatment to Children with Developmental Disability (장애 환자의 소아치과 치료 시 전신마취에 대한 통계적 고찰)

  • Choi, Young-Kyoo;Lee, Sung-Min;Kim, Dong-Ok
    • Journal of The Korean Dental Society of Anesthesiology
    • /
    • v.2 no.2 s.3
    • /
    • pp.101-106
    • /
    • 2002
  • Background: The management of the behavior of handicapped children when providing required dental care is often a problem, whether in the dental office or in a hospital setting. Because of the high incidence of poor cooperation, many of these patients are scheduled for dental care under general anesthesia with preoperative medical assessment. The purpose of this study was to carry out a clinico-statistical survey on dental treatment for handicapped children under general anesthesia. Methods: After approval from the institutional review board, the medical records of 64 handicapped children between 1997 and 2002 were reviewed to determine the patient profiles, anesthesia management, and complications. The charts of these patients, who underwent dental examination, scaling and prophylaxis, and restoration and extraction of teeth under general anesthesia, were reviewed. Results: The mean age was 12.8 years old, and males (53%) predominated females (47%). Twenty-four patients had mental retardation, twelve had autism, six had cerebral palsy, 4 had behavior disorder, others had heart disease, convulsive disorder, etc. Sixty-two had intravenous thiopental with neuromuscular blocker, 2 had intravenous ketamine induction. Nasotracheal intubation was uneventful in 55 patients, nine had orotracheal intubation because of difficult visualization of the larynx. Twenty-one patients experienced postoperative complications in the recovery room, including epistaxis, nasal obstruction, vomiting, airway obstruction, respiratory depression. Conclusions: General anesthesia is a very effective way of completing the dental treatments for disabled children. We emphasize the need to train anesthesiologists in the care of disabled patients.

  • PDF

A Basic Data Research on Advantage Studying of Junior College for Graduation Students of Technical High School in Department of Electricity (공업고등학교 전기관련과의 수학교육 보완에 관한 연구)

  • Lee, Sang-Seock;Shin, Yong-Cheol;Kim, Min-Huei;Park, Chan-Gyu;Lee, Jae-Yong;Cho, Sea-Ho;Song, Tae-Beom;Bae, Byung-Ho;Lee, Jong-Woo;Jeong, Ahn-Sik;Choi, Sung-Ha;Shin, Dong-Soo;Yoon, Sang-Gil
    • Proceedings of the KIEE Conference
    • /
    • 2004.07e
    • /
    • pp.3-9
    • /
    • 2004
  • This research is that concern in mathematics education of Technical high school Department of Electricity in the 7th educational curriculum. Indicated problem of mathematics education of Technical high school Department of Electricity at 7th educational curriculum as that compare mathematics subject contents with difference of Technical high school mathematics education in the 6th and the 7th educational curriculum. And examine major subject contents, analyzed contents of mathematics that must supplement and mathematics which use in major subject. Established contents of electricity mathematics education that need to major learning to satisfy target of technical high school technical education that is presented in the 7th training courses with this analysis

  • PDF

Analysis of the Electromagnetic Scattering by Conducting Strip Gratings with 2 Dielectric Layers On a Grounded Plane (접지평면위에 2개의 유전체층을 가지는 저항띠 격자구조에서의 전자파산란 해석)

  • 윤의중
    • The Journal of Information Technology
    • /
    • v.4 no.3
    • /
    • pp.77-86
    • /
    • 2001
  • In this paper, Electromagnetic scattering problem by a resistive strip grating with 2 dielectric layers on a ground plane according as resistivity of resistive strip, relative permittivity and thickness of dielectric layers, and incident angles of a electric wave is analyzed by applying the PMM (Point Matching Method) known as a numerical procedure. The scattered electromagnetic fields are expanded in a series of floquet mode functions. The boundary conditions are applied to obtain the unknown field coefficients and the resistive boundary condition is used for the relationship between the tangential electric field and the electric current density on the strip. According as the relative permittivity and the thickness of layers are increased, the values of the geometrically normalized reflected power have a high value and the values of strip width are moved toward a high value going from left to right. When the resistivity of this paper has a value of zero, the numerical results of the geometrically normalized reflected power show in good agreement with those by the PMM of existing paper. Then, the most energys of the sharp variation point in minimum values of the geometrically normalized reflected power are scattered in direction of the other angles except incident angle.

  • PDF

The Marriage Stewardship and the Role and Status of Social Development Network in Singapore (결혼 책임주의와 싱가포르 Social Development Network의 역할과 위상)

  • Kim, Myung-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.143-149
    • /
    • 2018
  • This paper focuses on how Singapore has adopted the 'Marriage Promotion Policy' for resolving the low birthrate and how it has been using the Social Development Network (SDN) to cope with the problem of low fertility. Social Development Network is an organization that shows Singapore's national stewardship to marriage, and has developed from the beginning to the social phenomenon of increasing number of highly educated women and decreasing fertility. The predecessor of Social Development Network is 'Social Development Unit' (SDU), absorbed the 'Social Development Service' (SDS) that was launched later, and reborn as Social Development Network in 2009. At its inception, Social Development Network has been recruiting and organizing its own memberships without the help of commercial marriage agencies, and since 2006 has been dedicated to delegating dating and matchmaking services to private companies and supporting projects. The purpose of this paper using literature analysis is to analyze the status and role of Social Development Network from the theoretical point of view of marital stewardship to the present, and to suggest meaningful implications for Korea which has the same social experience.

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

A Study on the User Experience of Food Waste at Home (가정에서의 음식물류 폐기물 처리에 대한 사용자 경험 연구)

  • Jeon, Eun-Ha;Yang, Sung-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.79-87
    • /
    • 2020
  • The environmental problems caused by food waste have been a steady social issue, and the severity of the problem emerged as the 2013 London Convention banned the marine emissions of waste water. The government implemented measures related to food waste, but prior studies showed that it lacked continuity and lacked strategies for each area of occurrence, and emphasized that citizens' participation is important to implement effective reduction policies. Therefore, this study proposed a food waste disposal machine through user experience analysis as a way to induce civic participation. To this end, the design development direction was outlined in this study after the pre-research and user survey stages through FGI and user journey maps. Based on this, the proposed treatment machine facilitates the frequent discharge of waste and simplifies the process of food waste in the home. In addition, the moment of direct contact between the user and waste is only the point at which the waste is released to the handler, thereby minimizing the negative experience the user has experienced.

Game Theoretic Analysis for RFID Reader Collision (RFID 리더 주파수 간섭에 대한 게임 이론 관점에서의 해석)

  • Lee, Dong-Yul;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.36-47
    • /
    • 2009
  • There exists RFID reader-to reader frequency which can not recognize tag in dense reader nude because the interference causes low SIR. To solve this frequency, the many algorithms based on TDM have been proposed. But the most of existing algorithms not obtain the optimal time allocation but propose heuristic scheduling algorithm. In this paper, we apply game theory which deals with interest between players of game to RFID reader-to reader interference and analyze the time allocation problem of reader based on TDM in terms of cooperative game which the players bind agreements using Nash Bargaining Solution(NBS) and non-cooperative game which the players do not bind agreements using Nash Equilibrium(NE). The applied results show that in dense reader mode, NBS of cooperative game is superior to NE of non-cooperative game and present optimal time allocation in dense reader mode.

Sharing Error Allowances for the Analysis of Approximation Schemes (근사접근법 분석을 위한 오차허용치의 분배방법)

  • Kim, Joon-Mo;Goo, Eun-Hee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.1-7
    • /
    • 2009
  • When constructing various mobile networks including sensor networks, the problem of finding the layout or graph to interconnect the terminals or nodes of the network may come up. Providing a common scheme that can be applied to the kind of problems, and formulating the bounds of the run time and the result of the algorithm from the scheme, one may evaluate precisely the plan of constructing analogous network systems. This paper, dealing with EMST(Euclidean Minimum Spanning Tree) that represents such problems, provides the scheme for constructing EMST by parallel processing over distributed environments, and the ground for determining the maximum difference of the layout or the graph produced from the scheme: the difference from EMST. In addition, it provides the upper bound of the run time of the algorithm from the scheme.

Power Allocation and Performance Analysis for the Secondary User under Primary Outage Constraint in Cognitive Relay Network (Cognitive Relay 네트워크에서 일차 사용자의 Outage 제약 조건 하에서의 이차 사용자의 파워 할당 기법 및 성능 분석)

  • Kim, Hyung-Jong;Hong, Dae-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.8
    • /
    • pp.46-51
    • /
    • 2012
  • In this paper, we investigate the power allocation for cognitive relay networks. Cognitive relay networks offer not only increasing spectral efficiency by spectrum sharing but also extending the coverage through the use of relays. For spectrum sharing, conventional works have assumed that secondary users know perfect channel information between the secondary and primary users. However, this channel information may be outdated at the secondary user because of the time-varying properties or feedback latency from the primary user. This causes the violation for interference constraint, and the secondary user cannot share the spectrum of the primary after all. To overcome this problem, we propose the power allocation scheme for the secondary user under the allowable primary user's outage probability constraint. Since the proposed power allocation scheme does not use the instantaneous channel information, the secondary users have lower feedback burden. In addition, the proposed scheme is also robust to the outdated channel environment.