• Title/Summary/Keyword: 공개영역

Search Result 186, Processing Time 0.027 seconds

The application of convolutional neural networks for automatic detection of underwater object in side scan sonar images (사이드 스캔 소나 영상에서 수중물체 자동 탐지를 위한 컨볼루션 신경망 기법 적용)

  • Kim, Jungmoon;Choi, Jee Woong;Kwon, Hyuckjong;Oh, Raegeun;Son, Su-Uk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.37 no.2
    • /
    • pp.118-128
    • /
    • 2018
  • In this paper, we have studied how to search an underwater object by learning the image generated by the side scan sonar in the convolution neural network. In the method of human side analysis of the side scan image or the image, the convolution neural network algorithm can enhance the efficiency of the analysis. The image data of the side scan sonar used in the experiment is the public data of NSWC (Naval Surface Warfare Center) and consists of four kinds of synthetic underwater objects. The convolutional neural network algorithm is based on Faster R-CNN (Region based Convolutional Neural Networks) learning based on region of interest and the details of the neural network are self-organized to fit the data we have. The results of the study were compared with a precision-recall curve, and we investigated the applicability of underwater object detection in convolution neural networks by examining the effect of change of region of interest assigned to sonar image data on detection performance.

The Analysis of the "Idol Nurture" Pattern of the PRODUCE 101 Program (<창조 101> 프로그램의 아이돌 양성 모식 분석)

  • Li, Duruo
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.5
    • /
    • pp.37-46
    • /
    • 2019
  • The PRODUCE 101 (Chinese version《创造101》) program is an "Idol Nurture" reality show bought by China's Tencent Video from the copyright of the Korean PRODUCE 101 program. The program's "Idol Nurture" pattern is concentrated in the four aspects of the "Semi-finished" training objects, the complementary nurturing goals, the key points of storytelling, and the extreme empowerment of training subjects. The "Idol Nurture" process is fully presented through the programming of the training processes inside entertainment companies, and the foregrounding of the back stages of the recording, trainees and entertainment companies. The "Idol Nurture" pattern of the program has attracted great attention and has been applauded by many because it better satisfies audiences' diversion utility, personal relation utility, and personal identity utility. This pattern of "Idol Nurture" program can provide insightful reference and valuable experience to the development of other reality talent shows.

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF

Girls Left Behind in Science Gifted Education?: Gender Differences in Science Affective Domains among Top 10% High Achievers in PISA 2006 (최우수 여고생은 과학영재교육의 소외 집단인가? : PISA 문항의 과학성취도 상위 10% 고등학생의 과학 정의적 영역의 성차 분석)

  • Seo, Hae-Ae
    • Journal of Gifted/Talented Education
    • /
    • v.21 no.1
    • /
    • pp.123-139
    • /
    • 2011
  • The research paid attention to the fact that top 10% high achievers of girls in high schools are not equally provided with opportunities for science gifted education in Korea. For this reason, the research examined gender differences in science achievement and science affective domain through employing PISA 2006 science achievement test and survey of science affective domains. The research subjects of 132 students as top 10% high achievers extracted from those 1,409 students who were nationwidely sampled and responded to the science achievement test and science affective domain survey in July 2008. The responses by 132 students of top 10% high achievers were analyzed. The findings revealed that there is no significant difference of science achievement and most items of science affective domain survey between girls and boys of top 10% population in high schools. Further, it was indicated that top 10% high achieving girls have interest, self-concept, self-efficacy, future job aspiration in science as high as boys. In conclusions, further attentions to provide more opportunities of science gifted education for girls are called for.

Comparison of the Curricula and the Textbooks Concerning the Proportion and Ratio Area between Korea and Singapore (비와 비율 영역에 대한 우리나라와 싱가포르 교육과정 및 교과서 비교 -TIMSS 평가목표와 공개문항을 중심으로)

  • Kim, Kyung-Hee;Paik, Hee-Su
    • School Mathematics
    • /
    • v.12 no.4
    • /
    • pp.473-491
    • /
    • 2010
  • In the TIMSS assessment goal and open TIMSS 2007, Singapore recorded a lower overall achievement level compared with Korea; however, the excellent results shown by Singapore furnished an opportunity for various countries to research into the education in Singapore. This paper conducted a comparative analysis of the "Proportion, Proportional Expression, and Percentile" area out of the three topics involving "Fractions and Decimals", "Proportion, Proportional expression, and Percentile", and "Measurement", in all of which Singapore exhibited a higher percentage of correct answers than Korea. The paper was able to discover the following differences through a comparative analysis of how Korean and Singaporean textbooks deal with the open questions of TIMSS 2007 after looking into them according to four assessment goals. First, the Singaporean textbook introduced the concept of proportion one year ahead of the Korean textbook. Second, the Singaporean textbook repeatedly coped with the topic of "Proportion, Proportional Expression, and Percentile" in depth and by academic year, and its volume was larger than that of the Korean textbook. Third, there was a difference in the introduction and definition of the concept of proportion. Fourth, the way of introducing a proportional expression was also different, and the Singaporean textbook proposed many more questions that utilize this expression in ordinary life. Based on these differences, the paper suggested implications that could be applied to the Korean curriculum and textbook.

  • PDF

Workflow for Building a Draft Genome Assembly using Public-domain Tools: Toxocara canis as a Case Study (개 회충 게놈 응용 사례에서 공개용 분석 툴을 사용한 드래프트 게놈 어셈블리 생성)

  • Won, JungIm;Kong, JinHwa;Huh, Sun;Yoon, JeeHee
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.9
    • /
    • pp.513-518
    • /
    • 2014
  • It has become possible for small scale laboratories to interpret large scale genomic DNA, thanks to the reduction of the sequencing cost by the development of next generation sequencing (NGS). De novo assembly is a method which creates a putative original sequence by reconstructing reads without using a reference sequence. There have been various study results on de novo assembly, however, it is still difficult to get the desired results even by using the same assembly procedures and the analysis tools which were suggested in the studies reported. This is mainly because there are no specific guidelines for the assembly procedures or know-hows for the use of such analysis tools. In this study, to resolve these problems, we introduce steps to finding whole genome of an unknown DNA via NGS technology and de novo assembly, while providing the pros and cons of the various analysis tools used in each step. We used 350Mbp of Toxocara canis DNA as an application case for the detailed explanations of each stated step. We also extend our works for prediction of protein-coding genes and their functions from the draft genome sequence by comparing its homology with reference sequences of other nematodes.

Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services (위치기반서비스에서 개인의 궤적 정보를 보호하기 위한 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-hye;Song, Doo-hee;Cai, Tian-yuan;Park, Kwang-jin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.31-38
    • /
    • 2017
  • Recently with the rapid development of LBS (Location-based Services) technology, approaches of protecting user's location have gained tremendous attentions. For using LBS, users need to forward their real locations to LBS server. However, if the user sends his/her real location to LBS server, the server will have the all the information about user in LBS. Moreover, if the user opens it to LBS server for a long time, the trajectory of user may be released. In this paper, we propose GTC (Grid-based Trajectory Cloaking) method to address the privacy issue. Different from existing approaches, firstly the GTC method sets the predicting trajectory and divides the map into $2^n*2^n$ grid. After that we will generate cloaking regions according to user's desired privacy level. Finally the user sends them to LBS server randomly. The GTC method can make the cost of process less than sequential trajectory k-anonymity. Because of confusing the departure and destination, LBS server could not know the user's trajectory any more. Thus, we significantly improve the privacy level. evaluation results further verify the effectiveness and efficiency of our GTC method.

A Survey on the Adequacy of Question Items of the Chemistry Teacher Employment Examination (중등 과학교사 임용시험 중 화학영역 문항의 적절성과 개선 방안에 대한 조사)

  • Hyosoon Han;Jong-Yun Park
    • Journal of the Korean Chemical Society
    • /
    • v.47 no.5
    • /
    • pp.505-518
    • /
    • 2003
  • A survey has been administered to investigate the adequacy of the chemistry teacher employment examination. The questionnaires were sent to the professors of the fourteen departments of chemistry education all over the nation and the responses were collected from the thirteen departments. From the analyses of the responses, the problems were pointed out and the suggestions were made for the improvement of the examination to recruit excellent chemistry teachers. Reconsideration of the ratio of subject matter education to subject contents, adjustment of format and number of questions, maintaining of proper degree of difficulty and discrimination of items, reconsideration of relevancy to practical education, raising the number of committee for the examination, the reflection of the 7th science curriculum, and opening to the public of the information related to the teacher employment examination were discussed.

Image-Adaptive Watermarking of Wavelet base for Digital Image Protection (디지털 영상 데이터의 정보 보호를 위한 웨이브릿 기반의 이미지 적응 워터마킹)

  • Kim, Kuk-Se;Lee, Jeong-Ki;Park, Chan-Mo;Bae, Il-Ho;Cho, Ai-Ri;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.59-263
    • /
    • 2003
  • 정보통신의 비약적인 발전에 힘입어 멀티미디어 데이터는 언제 어디서든 전송 받거나 공유할 수 있게 되었다. 아날로그 형태에서 디지털의 아날로그를 형태로 빠르게 대체되고 있으며, 디지털로 신호를 표현하는 방법은 기존 사용하여 표현하는 방법에 비해 많은 장점을 가지고 있다. 하지만 디지털로 된 데이터는 언제 어디서든 대단위 복제가 가능하다. 즉, 저작권 침해, 불법 복제 및 배포, 손쉽게 위조할 수 있다는 점이 그것이다. 디지털 컨텐츠의 불법 복제와 유통은 저작자의 창작 의욕과 수입원을 차단하는 매우 중요한 문제이며, 이를 방지하기 위해서 멀티미디어 데이터의 저작권을 가진 소유자가 원하는 정보를 삽입함으로써 데이터의 저작권 보호와 복사 방지 및 불법적인 유통을 막고자 하는 기술이 개발되고 있다. 디지털 영상 정보의 보호를 위해 디지털 영상의 불법적인 내용 조작을 막고, 영상의 소유권을 보장할 수 있는 방법으로 디지털 워터마크(Digital Watermark)가 있다. 디지털 워터마크는 공개키 알고리즘이나 방화벽 등으로 해독된 영상에 대하여 부가적인 보호를 제공한다. 디지털 영상에 대한 저작권 정보, 배포자 정보 그리고 사용자 정보를 영상에 삽입함으로써 훗날 법적인 문제가 발생하였을 때 해결책을 제시할 수 있다. 본 논문에서는 디지털 영상 데이터의 정보 보호를 위해 주파수 영역에서의 웨이브릿 변환(Wavelet Transform)을 이용한 이미지 적응 디지털 워터마킹(Image-Adaptive Digital Watermarking) 방법을 제안한다. 이미지 적응 웨이브릿(Image-Adaptive Wavelet)은 영상을 주파수적으로 분해하면서 각 대역들의 공간 영역에서의 정보를 함께 지니고 JND(Just noticeable difference)을 포함한다. 이미지 적응 웨이브릿의 이러한 특성을 이용하여 다해상도 분해하고, 손실 압축(toss Compression) 이나 필터링(Filtering), 잡음(Noise) 등에 크게 영향받는 저주파 성분과 인간의 시각적으로 큰 의미를 갖는 고주파 성분의 특성을 이용하여 워터마크를 삽입한다.

  • PDF

Wavelet based data Watermarking (웨이브릿 기반의 데이터 워터마킹)

  • 김동현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1224-1228
    • /
    • 2003
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needs. Digital watermarking, the invisible encryption technique to insert digital watermarking into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack. ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.