• Title/Summary/Keyword: 공개 데이터

Search Result 1,032, Processing Time 0.025 seconds

Investigating the Influence of a Food-themed TV Program on Delivery Food Order Amount Using Big Data with Difference-in-Differences Method (빅 데이터를 이용한 음식방송의 효과 확인: 이중차이분석을 적용하여)

  • Park, Jihye;Park, Jaehong
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.25-39
    • /
    • 2016
  • This study suggests a case for people who are unfamiliar with data analysis to equip them in using big data easily without complex programming tasks. Consequently, we investigate whether a food-themed TV program influences the number of delivery food orders with the use of the difference-in-differences method. Results show that the number of delivery food orders significantly increased after broadcasting four of five food-themed TV program episodes, each of which focuses on a particular delivery food. This study contributes to the existing literature by presenting the possibility that food-themed TV programs can positively affect not only the broadcast delivery food stores but also the entire delivery food business. In addition, this study provides practical contributions by recommending a big data analysis methodology that can be easily employed by many people.

Comparison of Performance of Medical Image Semantic Segmentation Model in ATLASV2.0 Data (ATLAS V2.0 데이터에서 의료영상 분할 모델 성능 비교)

  • So Yeon Woo;Yeong Hyeon Gu;Seong Joon Yoo
    • Journal of Broadcast Engineering
    • /
    • v.28 no.3
    • /
    • pp.267-274
    • /
    • 2023
  • There is a problem that the size of the dataset is insufficient due to the limitation of the collection of the medical image public data, so there is a possibility that the existing studies are overfitted to the public dataset. In this paper, we compare the performance of eight (Unet, X-Net, HarDNet, SegNet, PSPNet, SwinUnet, 3D-ResU-Net, UNETR) medical image semantic segmentation models to revalidate the superiority of existing models. Anatomical Tracings of Lesions After Stroke (ATLAS) V1.2, a public dataset for stroke diagnosis, is used to compare the performance of the models and the performance of the models in ATLAS V2.0. Experimental results show that most models have similar performance in V1.2 and V2.0, but X-net and 3D-ResU-Net have higher performance in V1.2 datasets. These results can be interpreted that the models may be overfitted to V1.2.

A Study on the Research Trends of Information Freedom in Korea (국내 정보공개 연구 동향 분석)

  • Choi, Jeong Min;Kim, You-seung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.3
    • /
    • pp.173-197
    • /
    • 2013
  • The study aims at providing research trends of information freedom in Korea. A total of 97 articles, which deal with issues on freedom of information from multidisciplinary areas, were selected for this study. These articles are analyzed according to academic backgrounds, research subjects, disciplinary characteristics, and each research period. The study found that the articles, which review various aspects of freedom of information, are conducted by a number of different disciplinary fields as time passed. However, there was a certain tendency that research methods, purposes, and subjects in this area are limited and biased. As a result, it suggests that expanded multidisciplinary studies are needed and that the complex nature of issues related to freedom of information should be considered.

KoCED: English-Korean Critical Error Detection Dataset (KoCED: 윤리 및 사회적 문제를 초래하는 기계번역 오류 탐지를 위한 학습 데이터셋)

  • Sugyeong Eo;Suwon Choi;Seonmin Koo;Dahyun Jung;Chanjun Park;Jaehyung Seo;Hyeonseok Moon;Jeongbae Park;Heuiseok Lim
    • Annual Conference on Human and Language Technology
    • /
    • 2022.10a
    • /
    • pp.225-231
    • /
    • 2022
  • 최근 기계번역 분야는 괄목할만한 발전을 보였으나, 번역 결과의 오류가 불완전한 의미의 왜곡으로 이어지면서 사용자로 하여금 불편한 반응을 야기하거나 사회적 파장을 초래하는 경우가 존재한다. 특히나 오역에 의해 변질된 의미로 인한 경제적 손실 및 위법 가능성, 안전에 대한 잘못된 정보 제공의 위험, 종교나 인종 또는 성차별적 발언에 의한 파장은 실생활과 문제가 직결된다. 이러한 문제를 완화하기 위해, 기계번역 품질 예측 분야에서는 치명적 오류 감지(Critical Error Detection, CED)에 대한 연구가 이루어지고 있다. 그러나 한국어에 관련해서는 연구가 존재하지 않으며, 관련 데이터셋 또한 공개된 바가 없다. AI 기술 수준이 높아지면서 다양한 사회, 윤리적 요소들을 고려하는 것은 필수이며, 한국어에서도 왜곡된 번역의 무분별한 증식을 낮출 수 있도록 CED 기술이 반드시 도입되어야 한다. 이에 본 논문에서는 영어-한국어 기계번역 분야에서의 치명적 오류를 감지하는 KoCED(English-Korean Critical Error Detection) 데이터셋을 구축 및 공개하고자 한다. 또한 구축한 KoCED 데이터셋에 대한 면밀한 통계 분석 및 다국어 언어모델을 활용한 데이터셋의 타당성 실험을 수행함으로써 제안하는 데이터셋의 효용성을 면밀하게 검증한다.

  • PDF

A Trustworthiness Improving Link Evaluation Technique for LOD considering the Syntactic Properties of RDFS, OWL, and OWL2 (RDFS, OWL, OWL2의 문법특성을 고려한 신뢰향상적 LOD 연결성 평가 기법)

  • Park, Jaeyeong;Sohn, Yonglak
    • Journal of KIISE:Databases
    • /
    • v.41 no.4
    • /
    • pp.226-241
    • /
    • 2014
  • LOD(Linked Open Data) is composed of RDF triples which are based on ontologies. They are identified, linked, and accessed under the principles of linked data. Publications of LOD data sets lead to the extension of LOD cloud and ultimately progress to the web of data. However, if ontologically the same things in different LOD data sets are identified by different URIs, it is difficult to figure out their sameness and to provide trustworthy links among them. To solve this problem, we suggest a Trustworthiness Improving Link Evaluation, TILE for short, technique. TILE evaluates links in 4 steps. Step 1 is to consider the inference property of syntactic elements in LOD data set and then generate RDF triples which have existed implicitly. In Step 2, TILE appoints predicates, compares their objects in triples, and then evaluates links between the subjects in the triples. In Step 3, TILE evaluates the predicates' syntactic property at the standpoints of subject description and vocabulary definition and compensates the evaluation results of Step 2. The syntactic elements considered by TILE contain RDFS, OWL, OWL2 which are recommended by W3C. Finally, TILE makes the publisher of LOD data set review the evaluation results and then decide whether to re-evaluate or finalize the links. This leads the publishers' responsibility to be reflected in the trustworthiness of links among the data published.

Training a semantic segmentation model for cracks in the concrete lining of tunnel (터널 콘크리트 라이닝 균열 분석을 위한 의미론적 분할 모델 학습)

  • Ham, Sangwoo;Bae, Soohyeon;Kim, Hwiyoung;Lee, Impyeong;Lee, Gyu-Phil;Kim, Donggyou
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.23 no.6
    • /
    • pp.549-558
    • /
    • 2021
  • In order to keep infrastructures such as tunnels and underground facilities safe, cracks of concrete lining in tunnel should be detected by regular inspections. Since regular inspections are accomplished through manual efforts using maintenance lift vehicles, it brings about traffic jam, exposes works to dangerous circumstances, and deteriorates consistency of crack inspection data. This study aims to provide methodology to automatically extract cracks from tunnel concrete lining images generated by the existing tunnel image acquisition system. Specifically, we train a deep learning based semantic segmentation model with open dataset, and evaluate its performance with the dataset from the existing tunnel image acquisition system. In particular, we compare the model performance in case of using all of a public dataset, subset of the public dataset which are related to tunnel surfaces, and the tunnel-related subset with negative examples. As a result, the model trained using the tunnel-related subset with negative examples reached the best performance. In the future, we expect that this research can be used for planning efficient model training strategy for crack detection.

Recent Trend Analysis of Certificate Revocation Mechanism (인증서 폐기 메커니즘의 최근 동향 분석)

  • 황원섭;김자영;정수민;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.77-82
    • /
    • 2004
  • The notion of a certificate was introduced by Kohnfelder in his 1978 MIT bachelor's thesis. The idea, now common, was that a certificate is a digitally signed statement binding the key-holder's name to a public key. With the increasing acceptance of digital certificate, there has been a gaining impetus for methods to nullify the compromised digital certificates and enable the end user to receive this information before be trusts a revoked certificate. The problem of certificate revocation is getting more and more crucial with the development of wide spread PKIs. In this paper, we investigate recent trend of certificate revocation mechanism.

  • PDF

Government 3.0 Era, Issues on Freedom of Information System (정부3.0 시대, 정보공개시스템의 개선 과제)

  • Jung, Zin-Im;Kim, You-Seung
    • The Korean Journal of Archival Studies
    • /
    • no.39
    • /
    • pp.45-72
    • /
    • 2014
  • In the recent years, Gov.2.0, which strengthens not only a claim for freedom of information but also sharing public information, became a new paradigm of government operations. In line with the paradigm the Korean government promotes the Gov.3.0 policy. This study exams the freedom of information system, which expends its roles and responsibilities for enhancing the usage of public information in the Gov.3.0 era. Furthermore, it analyzes the system's usability from the perspective of users. The freedom of information system is the fundamental portal for all the public information's disclosure and usage. Without providing the solution for problems of the system, the Korean government's Gov3.0 policy cannot succeed. Also, Park Geun-hye Government's Gov.3.0 initiatives which consists of tasks, such as reinforcing freedom of information, immediate releasing original documents, and expending public access to information, should be done through the freedom of information system. The importance of the system is increasingly heavy. It is not only the simple online contact point for public information, but also a public sphere for sharing public raw data and for implementing the Gov.3.0 vision. However, the current system still does not slove it problems. This study analyzes the system's problems in terms of usability and sustainability. As a result, it provides three alternative strategies for the freedom of information system, including 'personnel and financial support expansion', 'strengthening user-friendly operating' and 'establishing long-term strategies for system improvement.

A Scalable Architecture of Montgomery Multiplier on GF(p) (GF(p)상의 Scalable한 몽고메리 곱셈기)

  • 이광진;장용희;권용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.382-384
    • /
    • 2004
  • 최근 인터넷의 발달과 함께 인터넷 상에서의 데이터 보안에 대한 요구가 매우 증가되고 있다. 그래서 공개키 또는 비밀키 알고리즘을 사용하여 데이터 보안을 해결하고 있다. 대부분의 공개키 알고리즘은 모듈러 연산들을 기반으로 살고 있으며 이 중 복잡도가 가장 높은 모듈러 멱승 연산은 모듈러 곱셈 연산을 반복 수행하여 계산된다. 그래서 모듈러 곱셈연산을 효율적으로 계산하기 위한 많은 방법들이 제안되어 왔으며 하드웨어 구현 시 속도와 효율성 문제로 몽고메리 곱셈기에 대한 연구가 주목을 받아 왔다. 현재 몽고메리 곱셈 알고리즘을 이용한 곱셈기는 대부분이 성능과 면적만을 고려한 구조로 보안성 향상을 위해 입력 데이터의 비트수 증가 시 곱셈기의 구조 변경이 요구된다. 따라서 본 논문에서는 비트수 길이가 변하더라도 곱셈기 구조는 변함이 없는 GF(p)상에서의 Scalable한 몽고메리 곱셈기 구조를 제안한다. Sealable한 곱셈기의 구조는 FPGA와 같이 메모리를 포함하는 하드웨어 플랫폼에 적합하다. 제안된 구조는 Xilinx FPGA를 이용하여 하드웨어로 구현하며 ModelSim Tool을 통해 기능 및 타이밍 시뮬레이션을 수행한다.

  • PDF

The Security Method for GIS Data (GIS 정보유통을 위한 보안방안)

  • Kim, Ji-Hong;Lee, Sang-Moo
    • Journal of Korea Spatial Information System Society
    • /
    • v.2 no.1 s.3
    • /
    • pp.83-90
    • /
    • 2000
  • According to the development of Internet system recently, we focused in GIS data distribution and applications via internet rather than GIS data construction. Therefore in this paper, we present the necessity of security policy on GTS data. So we analyze the actual condition of GIS data through expert poll. We classify all of data used in GIS with the three security level : high level, middle level, low level. Finally we propose the proper security method on GIS data transfer and on GIS database access in accordance with progree of PKI project.

  • PDF