• Title/Summary/Keyword: 구현방법

Search Result 14,299, Processing Time 0.061 seconds

A Case Study of a Text Mining Method for Discovering Evolutionary Patterns of Mobile Phone in Korea (국내 휴대폰의 진화패턴 규명을 위한 텍스트 마이닝 방안 제안 및 사례 연구)

  • On, Byung-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.29-45
    • /
    • 2015
  • Systematic theory, concepts, and methodology for the biological evolution have been developed while patterns and principles of the evolution have been actively studied in the past 200 years. Furthermore, they are applied to various fields such as evolutionary economics, evolutionary psychology, evolutionary linguistics, making significant progress in research. In addition, existing studies have applied main biological evolutionary models to artifacts although such methods do not fit to them. These models are also limited to generalize evolutionary patterns of artifacts because they are designed in terms of a subjective point of view of experts who know well about the artifacts. Unlike biological organisms, because artifacts are likely to reflect the imagination of the human will, it is known that the theory of biological evolution cannot be directly applied to artifacts. In this paper, beyond the individual's subjective, the aim of our research is to present evolutionary patterns of a given artifact based on peeping the idea of the public. For this, we propose a text mining approach that presents a systematic framework that can find out the evolutionary patterns of a given artifact and then visualize effectively. In particular, based on our proposal, we focus mainly on a case study of mobile phone that has emerged as an icon of innovation in recent years. We collect and analyze review posts on mobile phone available in the domestic market over the past decade, and discuss the detailed results about evolutionary patterns of the mobile phone. Moreover, this kind of task is a tedious work over a long period of time because a small number of experts carry out an extensive literature survey and summarize a huge number of materials to finally draw a diagram of evolutionary patterns of the mobile phone. However, in this work, to minimize the human efforts, we present a semi-automatic mining algorithm, and through this research we can understand how human creativity and imagination are implemented. In addition, it is a big help to predict the future trend of mobile phone in business and industries.

A Study on the Experience Design and Practical Use of Experience by On- and Off-Line Environment (온 오프라인 환경에 따른 경험의 활용과 경험디자인에 관한 연구)

  • Yoon, Se-Kyun;Kim, Tae-Kyun;Kim, Min-Su
    • Archives of design research
    • /
    • v.18 no.3 s.61
    • /
    • pp.5-14
    • /
    • 2005
  • In the past, consumers sought utilitarian and defensive consumption in an attempt to move to a balanced state. However, today's consumers go beyond this to consume more for hedonic and creative reasons if not for sheer pleasure. There is an obvious shift from the type of consumption that satisfies basic desires through the characteristics, convenience and quality of goods and services to an era of 'experiential consumption,' in which consumers pursue distinctive value systems and way of life along with a total 'experience' provided by such goods and services. Such a sign of the times has given birth to the experience design that aims at maximizing the strategic use of experiences in design. Research on this subject is gradually increasing. The research and application peformed even without the proper understanding about the concepts and purposes of experience design, however, is likely to deviate from the true nature in its process or method. Also, they are likely to cause rather than solve problems. Accordingly, this study examined the meaning of experience from a spatial aspect, focusing on areas that recognize the experience as economically valuable, making the most of it substantively. The main concept of experience practical used on-line is enhancement of the usability of a medium by reflecting the experience of users accustomed to both off-line and on-line environments and materializing the environment doser to and more familiar with the users, thus allowing them to comfortably use the medium. This is to allow the users to feel more comfortable. The experience practical used pertaining to off-line is a tool to fulfill the sensitivity of users, with efforts to create new, future-oriented consumer values. This, based on the understanding of consumer behavior, seeks to maximize the consumption experience of consumers by providing a combination of sensual and sensitive experiences as well as to enhance the existing experiences by permitting users to create new, extended experiences from the fixed characteristics of products. Furthermore, it aims to provide consumers with the hedonic experience of play through the joy, fun and uniqueness of alternate experiences.

  • PDF

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

Twelve Years of Experience with Vascular Ring Surgery (혈관륜 수술의 12년 경험 보고)

  • Kim, Yun-Seok;Goo, Hyun-Woo;Jhang, Won-Kyoung;Yun, Tae-Jin;Seo, Dong-Man;Park, Jeong-Jun
    • Journal of Chest Surgery
    • /
    • v.42 no.6
    • /
    • pp.749-756
    • /
    • 2009
  • Background: Vascular ring is a rare anomaly of the aortic arch. We did surgical repair procedures on 16 cases of vascular ring over the past 12 years. This article reviews our results. Material and Method: Between 1995 and 2007, 16 patients (5 with double aortic arch, 7 with right aortic arch-left ligamentum, 4 with pulmonary artery sling) underwent surgical repair. Mean age at the time of the operation were as follows: double aortic arch, $5.7{\pm}5.5$ years; right aortic arch-left ligamentum, $6.1{\pm}13.4$ years; pulmonary artery sling, $2.9{\pm}2.6$ years. Five patients (71%) with right aortic arch-left ligamentum had an associated Kommerell's diverticulum. Two patients (40%) with double aortic arch, 2 patients (28.6%) with right aortic arch-left ligament and 4 patients (100%) with pulmonary artery sling had associated airway stenosis. Cardiac anomalies were present in 8 of 16 patients. Result: There was no peri-operative or post-operative mortality. The mean hospital stay was $27.1{\pm}38.2$ days. None of our patients underwent reoperation. Conclusion: Vascular ring is rare, but, it needs surgical correction. It is important to suspect the diagnosis and to validate with echocardiography. Preoperative and postoperative computed tomography and bronchoscopy are useful to evaluate the airway and surrounding structures.

The Modes of Place Rootedness on Geochang Mohyeonjeong and Supodae (거창 모현정과 수포대의 장소착근(場所着根) 방식)

  • Rho, Jae-Hyun;Kim, Hong-Gyun;Lee, Hyun-Woo
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.30 no.3
    • /
    • pp.87-96
    • /
    • 2012
  • This study aimed at empirically identifying how the cultural phenomena of localisation and attachment are implemented through Mohyeonjeong and Supodae at Gajo-myeon, Geochang-gun, Gyeongnam. 'Daehakdong', the name of the place where the Mohyeon-jeong and Supodae is located, has a meaning of the place where Geong-Pil Kim(金宏弼) the Hanhwondang(寒暄堂), one of the 5 eastern sages, and Yeo-Chang Jeong(鄭汝昌) the Ildu tought Neo-Confucianism. In addition, in case of Mt. Odo(1,134m) embracing the garden, the meaning of Odo is the five virtues in Confucianism, so we can see that Confucianism was strong in that area. The meaning of 'Mohyeon(慕賢)', "missing and thinking of sages", reflects the emotion of attachment to the place where people pay a tribute to the memory of Seon-Saeng Yang the Hwondu, one of the 5 eastern sages and the creator of Neo-Confucianism in Kyeongnam, and Suk-Ryang Choi(崔淑梁) the ancestors Pyeongchon. In addition, Odojae(吾道齋), Kijeok monument to pay a tribute to the memory of Pyeongchon, the persimmon tree symbolizing Hanhwondang, and Jidongam(志同巖) standing in front of Mohyeon pavillion represent the united wills of the above 3 people to show their Dohak(道學) spirit by practicing it, and also a reiterated expression of attachment to the place. 'Hwonduyangseonsaeng janggujiso' and 'Pyeongchonchoigong ganghakjiso(坪村崔公講學地所)' engraved on the rock of Myeongso Supodae where they gave a lecture of Neo-Confucianism to local Confucianists for many years and enjoyed nature make us to identify the intrinsic meaning of the location that was inherited in the memory of people. Along with this, most of the content of poetry, restoration records, and Sangryang articles are filled with the content reminding of the historical meaning and origin of Mohyeon-jeong and Supodae, so we can see from this that the place had the spatial meaning of Jangsujiso(藏修之所), 'the place of lecturing and communicating' and respecting ancient sages. This spatial tradition is the result of positive attachment to the place, and Mohyeon-jeong and Supodae is the place where the attachment to the place was made spontaneously througth the localisation. To sum it up, Mohyeon-jeong and Supodae was the place of attachment where one paid a tribute to the memory of ancient sages, and Mohyeonjeong and Supodae rocks were the representative examples of the localisation to show the meaning of the place by implication. Studying the process of attachment and localisation of the place does not only enable us to infer the genuine form of the traditional memorial space and park, but also to reproduce the place with the modern concept.

Design and Implementation of Quality Broker Architecture to Web Service Selection based on Autonomic Feedback (자율적 피드백 기반 웹 서비스 선정을 위한 품질 브로커 아키텍처의 설계 및 구현)

  • Seo, Young-Jun;Song, Young-Jae
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.223-234
    • /
    • 2008
  • Recently the web service area provides the efficient integrated environment of the internal and external of corporation and enterprise that wants the introduction of it is increasing. Also the web service develops and the new business model appears, the domestic enterprise environment and e-business environment are changing caused by web service. The web service which provides the similar function increases, most the method which searches the suitable service in demand of the user is more considered seriously. When it needs to choose one among the similar web services, service consumer generally needs quality information of web service. The problem, however, is that the advertised QoS information of a web service is not always trustworthy. A service provider may publish inaccurate QoS information to attract more customers, or the published QoS information may be out of date. Allowing current customers to rate the QoS they receive from a web service, and making these ratings public, can provide new customers with valuable information on how to rank services. This paper suggests the agent-based quality broker architecture which helps to find a service providing the optimum quality that the consumer needs in a position of service consumer. It is able to solve problem which modify quality requirements of the consumer from providing the architecture it selects a web service to consumer dynamically. Namely, the consumer is able to search the service which provides the optimal quality criteria through UDDI browser which is connected in quality broker server. To quality criteria value decision of each service the user intervention is excluded the maximum. In the existing selection architecture, the objective evaluation was difficult in subjective class of service selecting of the consumer. But the proposal architecture is able to secure an objectivity with the quality criteria value decision where the agent monitors binding information in consumer location. Namely, it solves QoS information of service which provider does not provide with QoS information sharing which is caused by with feedback of consumer side agents.

Introduction of GOCI-II Atmospheric Correction Algorithm and Its Initial Validations (GOCI-II 대기보정 알고리즘의 소개 및 초기단계 검증 결과)

  • Ahn, Jae-Hyun;Kim, Kwang-Seok;Lee, Eun-Kyung;Bae, Su-Jung;Lee, Kyeong-Sang;Moon, Jeong-Eon;Han, Tai-Hyun;Park, Young-Je
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_2
    • /
    • pp.1259-1268
    • /
    • 2021
  • The 2nd Geostationary Ocean Color Imager (GOCI-II) is the successor to the Geostationary Ocean Color Imager (GOCI), which employs one near-ultraviolet wavelength (380 nm) and eight visible wavelengths(412, 443, 490, 510, 555, 620, 660, 680 nm) and three near-infrared wavelengths(709, 745, 865 nm) to observe the marine environment in Northeast Asia, including the Korean Peninsula. However, the multispectral radiance image observed at satellite altitude includes both the water-leaving radiance and the atmospheric path radiance. Therefore, the atmospheric correction process to estimate the water-leaving radiance without the path radiance is essential for analyzing the ocean environment. This manuscript describes the GOCI-II standard atmospheric correction algorithm and its initial phase validation. The GOCI-II atmospheric correction method is theoretically based on the previous GOCI atmospheric correction, then partially improved for turbid water with the GOCI-II's two additional bands, i.e., 620 and 709 nm. The match-up showed an acceptable result, with the mean absolute percentage errors are fall within 5% in blue bands. It is supposed that part of the deviation over case-II waters arose from a lack of near-infrared vicarious calibration. We expect the GOCI-II atmospheric correction algorithm to be improved and updated regularly to the GOCI-II data processing system through continuous calibration and validation activities.

Numerical Calculations of IASCC Test Worker Exposure using Process Simulations (공정 시뮬레이션을 이용한 조사유기응력부식균열 시험 작업자 피폭량의 전산 해석에 관한 연구)

  • Chang, Kyu-Ho;Kim, Hae-Woong;Kim, Chang-Kyu;Park, Kwang-Soo;Kwak, Dae-In
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.6
    • /
    • pp.803-811
    • /
    • 2021
  • In this study, the exposure amount of IASCC test worker was evaluated by applying the process simulation technology. Using DELMIA Version 5, a commercial process simulation code, IASCC test facility, hot cells, and workers were prepared, and IASCC test activities were implemented, and the cumulative exposure of workers passing through the dose-distributed space could be evaluated through user coding. In order to simulate behavior of workers, human manikins with a degree of freedom of 200 or more imitating the human musculoskeletal system were applied. In order to calculate the worker's exposure, the coordinates, start time, and retention period for each posture were extracted by accessing the sub-information of the human manikin task, and the cumulative exposure was calculated by multiplying the spatial dose value by the posture retention time. The spatial dose for the exposure evaluation was calculated using MCNP6 Version 1.0, and the calculated spatial dose was embedded into the process simulation domain. As a result of comparing and analyzing the results of exposure evaluation by process simulation and typical exposure evaluation, the annual exposure to daily test work in the regular entrance was predicted at similar levels, 0.388 mSv/year and 1.334 mSv/year, respectively. Exposure assessment was also performed on special tasks performed in areas with high spatial doses, and tasks with high exposure could be easily identified, and work improvement plans could be derived intuitively through human manikin posture and spatial dose visualization of the tasks.

Linguistic, Cultural, and Historical Momentums through History of Korean Literature -Focused on the Recognition and Descriptive Aspects of Korean Modern Literature in the History of Korean Literature Written in Japan- (한국문학사를 가로지르는 언어·문화·역사의 계기들 - 일본 저술 한국문학사의 한국근현대문학 인식과 서술양상을 중심으로 -)

  • Yoon, Song-ah
    • Cross-Cultural Studies
    • /
    • v.48
    • /
    • pp.31-66
    • /
    • 2017
  • This study examines ways of recognizing and aspects of describing Korean modern literature revealed by each literary history from the viewpoint of 'transculturation', focusing on Lim Jeon-Hye's "History of Korean Literature in Japan until 1945", Shirakawa Yutaka's "Footsteps of Korean Modern Literature", and Saegusa Toshikatsu's "Taste of Korean Literature" from the history of Korean literature written in Japan. First, Lim Jeon-Hye periodically examines Korean literature written in Japan, focusing on literary activities of Korean students in Japan and the proletarian literature movement, and addresses points of active cultural negotiation, mutual understanding and political solidarity between Korea and Japan. Shirakawa Yutaka focuses on the concurrency and connection of Korea, China, and Japan in the process of modern literary formation, covering Japanese language literature and pro-Japanese literature with great care, and describes the middle-layer position as a mediating researcher in the conflicting boundaries between Korea and Japan. Saegusa Toshikatsu provides interesting transcultural momentum in exploring internal logic and denotation of Korean literature via comparative literature review encompassing East Asia, implementation of literary forms and themes connecting tradition and modernity, and an out-of-boundary point of view to overlook 'pro-Japanese literature', etc. Transcultural aspects in this literary history to examine are as follow. First, the history of Korean modern literature based on 'national literature history' is catabolized in the magnetic field of the 'colonial experience' and 'national nationalism' and considered in multifaceted context. Second, they provide the possibility of three-dimensional and micro-narrative description of literature that complement the narrative aspect of existing Korean literature history. Third, they provide an opportunity to expand and open the description of literature history through acceptance of comparative literary perspectives encompassing East Asia. Fourth, through discovery of Korean-Japanese literature and Japanese language literature, they contribute to broadening the history of Korean modern literature and enriching foundations.

A Study on the Characteristics of Seoul Olympic Organizing Committee's Official Documents (서울올림픽대회 조직위원회 공문서의 성격에 관한 연구)

  • Cheon, Ho-Jun
    • The Korean Journal of Archival Studies
    • /
    • no.24
    • /
    • pp.113-171
    • /
    • 2010
  • The purpose of this study was to examine the characteristics of Seoul Olympic Organizing Committee's official documents. To conduct this work, the fundamental of producing archives were examined by analyzing structure and management of Seoul Olympic Organizing Committee and structure of official document production. After all, simultaneous and synthesis characteristics of Seoul Olympic Organizing Committee's official documents were presented through overall analysis of production fundamental and relationship between their management and remained archives. The result of this study are as follows. Firstly, The Organizing Committee had bicameral organizational structure and matrix organizational format consisting of functional department and project department. Indicating the institutions and development phase of decision making in the committee, most of institutions were in name only. Also, there were many problems occurred in the procedure of decision making since the president of committee exercised all of the authorities. Secondly, It was found that existing official documents of the committee were partial and caused fragment phenomenon and severe situations because of unsystematic archival management department and regulations. Moreover, as the result of investigating production procedure and management of official documents, procedure of production, distribution, preservation and abolition of them were specifically verified. Thirdly, It was verified that the official documents were abolished arbitrarily because of unsystematic archival management department and insufficient regulations. For the actual condition of management, filing or description activity which is essential measure for using and utilizing the official documents has not been conducted yet. Based on these facts, the characteristics of Seoul Olympic Organizing Committee's official documents can be referred as follows. The official archives of the committee have multiplicity of the origin and severe fragment phenomenon damaging the origin and the elementary substance of the archives. Also, the format of existing archives was unbalance. Besides, there was not enough related research since they were in adverse situation to utilize them as the archives which are not assessed or not arranged. Thus, it was hard to grasp the utility value at present and future, and was also limited for usage object.