• Title/Summary/Keyword: 공간영역

Search Result 3,879, Processing Time 0.031 seconds

The Rated Self: Credit Rating and the Outsoursing of Human Judgment (평가된 자아: 신용평가와 도덕적, 경제적 가치 평가의 외주화)

  • Yi, Doogab
    • Journal of Science and Technology Studies
    • /
    • v.19 no.1
    • /
    • pp.91-135
    • /
    • 2019
  • As we live a life increasingly mediated by computers, we often outsource our critical judgments to artificial intelligence(AI)-based algorithms. Most of us have become quite dependent upon algorithms: computers are now recommending what we see, what we buy, and who we befriend with. What happens to our lives and identities when we use statistical models, algorithms, AI, to make a decision for us? This paper is a preliminary attempt to chronicle a historical trajectory of judging people's economic and moral worth, namely the history of credit-rating within the context of the history of capitalism. More importantly this paper will critically review the history of credit-rating from its earlier conception to the age of big data and algorithmic evaluation, in order to ask questions about what the political implications of outsourcing our judgments to computer models and artificial intelligence would be. Some of the questions I would like to ask in this paper are: by whom and for what purposes is the computer and artificial intelligence encroached into the area of judging people's economic and moral worth? In what ways does the evolution of capitalism constitute a new mode of judging people's financial and personal identity, namely the rated self? What happens in our self-conception and identity when we are increasingly classified, evaluated, and judged by computer models and artificial intelligence? This paper ends with a brief discussion on the political implications of the outsourcing of human judgment to artificial intelligence, and some of the analytic frameworks for further political actions.

Analysis on characteristics of Gifted and Talented Student Through LAT(Learning Ability Test) (학습능력검사를 통한 과학영재교육 대상자의 특성에 관한 분석)

  • Seo, Seong-Won;Kim, Geun-Ho;Kim, Eui-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.108-111
    • /
    • 2014
  • In this paper, we tried to identify implications of selecting gifted of information science & followed educational system via analyzing each of student's characteristics in each subjects they study within Science Education Institute for the Gifted. A study of the existing institutions do not have experience of the gifted students based on assessment through observation of the 1-year science, mathematics and information science education in the List of attribute analysis. Learners of Information Science became with analysis that Attitude Category was superior in mathematics to the subject of science and Problem Solving Category regardless of the subjects showed similar. As to, Attitude Category, Problem Solving Category and Mathematics Cognition Category was analyzed to be closed and we could confirm through the qualitative observation record. On this, the researcher concluded that the mathematics could know the effect fitness by a learner rather than the subject of science as to an attitude and problem resolution area.

  • PDF

Electrical Impedance Tomography for Material Profile Reconstruction of Concrete Structures (콘크리트 구조의 재료 물성 재구성을 위한 전기 임피던스 단층촬영 기법)

  • Jung, Bong-Gu;Kim, Boyoung;Kang, Jun Won;Hwang, Jin-Ha
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.4
    • /
    • pp.249-256
    • /
    • 2019
  • This paper presents an optimization framework of electrical impedance tomography for characterizing electrical conductivity profiles of concrete structures in two dimensions. The framework utilizes a partial-differential-equation(PDE)-constrained optimization approach that can obtain the spatial distribution of electrical conductivity using measured electrical potentials from several electrodes located on the boundary of the concrete domain. The forward problem is formulated based on a complete electrode model(CEM) for the electrical potential of a medium due to current input. The CEM consists of a Laplace equation for electrical potential and boundary conditions to represent the current inputs to the electrodes on the surface. To validate the forward solution, electrical potential calculated by the finite element method is compared with that obtained using TCAD software. The PDE-constrained optimization approach seeks the optimal values of electrical conductivity on the domain of investigation while minimizing the Lagrangian function. The Lagrangian consists of least-squares objective functional and regularization terms augmented by the weak imposition of the governing equation and boundary conditions via Lagrange multipliers. Enforcing the stationarity of the Lagrangian leads to the Karush-Kuhn-Tucker condition to obtain an optimal solution for electrical conductivity within the target medium. Numerical inversion results are reported showing the reconstruction of the electrical conductivity profile of a concrete specimen in two dimensions.

A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information (RGB-D 정보를 이용한 2차원 키포인트 탐지 기반 3차원 인간 자세 추정 방법)

  • Park, Seohee;Ji, Myunggeun;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.41-51
    • /
    • 2018
  • Recently, in the field of video surveillance, deep learning based learning method is applied to intelligent video surveillance system, and various events such as crime, fire, and abnormal phenomenon can be robustly detected. However, since occlusion occurs due to the loss of 3d information generated by projecting the 3d real-world in 2d image, it is need to consider the occlusion problem in order to accurately detect the object and to estimate the pose. Therefore, in this paper, we detect moving objects by solving the occlusion problem of object detection process by adding depth information to existing RGB information. Then, using the convolution neural network in the detected region, the positions of the 14 keypoints of the human joint region can be predicted. Finally, in order to solve the self-occlusion problem occurring in the pose estimation process, the method for 3d human pose estimation is described by extending the range of estimation to the 3d space using the predicted result of 2d keypoint and the deep neural network. In the future, the result of 2d and 3d pose estimation of this research can be used as easy data for future human behavior recognition and contribute to the development of industrial technology.

Frequent Origin-Destination Sequence Pattern Analysis from Taxi Trajectories (택시 기종점 빈번 순차 패턴 분석)

  • Lee, Tae Young;Jeon, Seung Bae;Jeong, Myeong Hun;Choi, Yun Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.39 no.3
    • /
    • pp.461-467
    • /
    • 2019
  • Advances in location-aware and IoT (Internet of Things) technology increase the rapid generation of massive movement data. Knowledge discovery from massive movement data helps us to understand the urban flow and traffic management. This paper proposes a method to analyze frequent origin-destination sequence patterns from irregular spatiotemporal taxi pick-up locations. The proposed method starts by conducting cluster analysis and then run a frequent sequence pattern analysis based on identified clusters as a base unit. The experimental data is Seoul taxi trajectory data between 7 a.m. and 9 a.m. during one week. The experimental results present that significant frequent sequence patterns occur within Gangnam. The significant frequent sequence patterns of different regions are identified between Gangnam and Seoul City Hall area. Further, this study uses administrative boundaries as a base unit. The results based on administrative boundaries fails to detect the frequent sequence patterns between different regions. The proposed method can be applied to decrease not only taxis' empty-loaded rate, but also improve urban flow management.

An Approach to Conceal Hangul Secret Message using Modified Pixel Value Decomposition (수정된 화소 값 분해를 사용하여 한글 비밀 메시지를 숨기는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.4
    • /
    • pp.269-274
    • /
    • 2021
  • In secret communication, steganography is the sending and receiving of secret messages without being recognized by a third party. In the spatial domain method bitwise information is inserted into the virtual bit plane of the decomposed pixel values of the image. That is, the bitwise secret message is sequentially inserted into the least significant bit(LSB) of the image, which is a cover medium. In terms of application, the LSB is simple, but has a drawback that can be easily detected by a third party. If the upper bit plane is used to increase security, the image quality may deteriorate. In this paper, I present a method for concealing Hangul secret messages in image steganography based on the lo-th bit plane and the decomposition of modified pixel intensity values. After decomposing the Hangeul message to be hidden into choseong, jungseong and jongseong, then a shuffling process is applied to increase confidentiality and robustness. PSNR was used to confirm the efficiency of the proposed method. It was confirmed that the proposed technique has a smaller effect in terms of image quality than the method applying BCD and Fibonacci when inserting a secret message in the upper bit plane. When compared with the reference value, it was confirmed that the PSNR value of the proposed method was appropriate.

Iterative Precision Geometric Correction for High-Resolution Satellite Images (고해상도 위성영상의 반복 정밀 기하보정)

  • Son, Jong-Hwan;Yoon, Wansang;Kim, Taejung;Rhee, Sooahm
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.3
    • /
    • pp.431-447
    • /
    • 2021
  • Recently, the use of high-resolution satellites is increasing in many areas. In order to supply useful satellite images stably, it is necessary to establish automatic precision geometric correction technic. Geometric correction is the process that corrected geometric errors of satellite imagery based on the GCP (Ground Control Point), which is correspondence point between accurate ground coordinates and image coordinates. Therefore, in the automatic geometric correction process, it is the key to acquire high-quality GCPs automatically. In this paper, we proposed iterative precision geometry correction method. we constructed an image pyramid and repeatedly performed GCP chip matching, outlier detection, and precision sensor modeling in each layer of the image pyramid. Through this method, we were able to acquire high-quality GCPs automatically. we then improved the performance of geometric correction of high-resolution satellite images. To analyze the performance of the proposed method, we used KOMPSAT-3 and 3A Level 1R 8 scenes. As a result of the experiment, the proposed method showed the geometric correction accuracy of 1.5 pixels on average and a maximum of 2 pixels.

A Study on the Structure of Soshaewon Landscape Garden Featuring Borrowed Scenery - Focusing on the Soshaewon Sisun and the Thirty Poems of Soshaewon - (차경(借景)을 통해 본 소쇄원 원림의 구조 - 「소쇄원시선(瀟灑園詩選)」과 「소쇄원30영」을 중심으로 -)

  • So, Hyun-Su
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.4
    • /
    • pp.59-69
    • /
    • 2011
  • In this study I examined the status of the borrowed scenery of Soshaewon and analyzed the structure of Byeolseo Gardenusing "Soshaewon Sisun(瀟灑園詩選)", which consists of a collection of poems written by people who visited Soshaewon during Joseon Dynasty with bibliographical explanations and "the Thirty Poems of Soshaewon", written by Yang, Gyeong Ji who was the fifth generation from Yang, San Bo. This study expanded the concept of borrowed scenery to include visual, synaesthetic, temporary and ideal features based on the theory of borrowed scenery in "Won Ya(園冶)", which emphasized the time feature and change, and explained that a landscape garden could be perfected by the presence of borrowed scenery beyond the previous borrowed landscape which was recognized through visual value. It would be correct to understand that the visitors to Soshaewon accomplished imaginary scenery(意境) through recreating Soshaewon into a space that stimulated poetic sentiment and aesthetic sensitivity by creating four types of borrowed scenery of a landscape garden composed of both real and fictitious scenery. At present the scope of Soshaewon tends to be limited to its inner garden covering the stream garden. However, in this study I took a new approach in defining the scope of Soshaewon, providing three types of Byeolseo Garden area ; more specifically, the expanded scope of Soshaewon covers the outer garden that secured the outlook of visual, temporary and synaesthetic objects for borrowed scenery and the right to use by purchasing more area by the descendants and the ideological garden that was composed of the ideal borrowed scenery created by the Confucian friends and colleagues who praised the Jeungamcheon Stream area and various famous mountains longing for the immortal world.

Ch'oe Han-gi's Reflection on Relationalities in Existence (최한기의 존재론적 관계성 성찰)

  • Rhee, Myung-Su
    • The Journal of Korean Philosophical History
    • /
    • no.59
    • /
    • pp.395-423
    • /
    • 2018
  • Since the middle of the 19th century, East Asia, especially Korea, was oppressed externally by the imperialism of Japan and others while internally long-lasting political convention like in-law government was driving the country into troubles at home and abroad. Witnessing such a situation and building up scholarly capability through reading over nearly all spheres, a Confucian philosopher, Ch'oe Han-gi (崔漢綺, 1803-1877), philosophized about the clue to the solution of such a choking phenomenon. Ch'oe believed that there was movement, ki (matter, material force, energy) of revolving transformation inherent in all things, people, or objects. Grasping even the principle and order of existence inherent in things from the viewpoint of ki, he tried to change the traditional theory on the law of existence of things that there existed an ontological reason lacking in motility, which was more dominant than anything existing in the universe and which ruled over the world. From this, he elucidated that the Way, an identity that rules over all affairs and things, was not simply one but diverse. This means, on one hand, that he tentatively accepted the relativity of things. On the other hand, he also taught us "oneness in all things" in which all including human beings exist in close connection to each other transcending the relativity or "agreement" in which they exist in harmony as one and "unity" in which they are united into one.

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.