• Title/Summary/Keyword: 모델리스트

Search Result 182, Processing Time 0.029 seconds

Shadow Recovery for Column-based Databases (컬럼-기반 데이터베이스를 위한 그림자 복구)

  • Byun, Si-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2784-2790
    • /
    • 2015
  • The column-oriented database storage is a very advanced model for large-volume data transactions because of its superior I/O performance. Traditional data storages exploit row-oriented storage where the attributes of a record are placed contiguously in hard disk for fast write operations. However, for search-mostly data warehouse systems, column-oriented storage has become a more proper model because of its superior read performance. Recently, solid state drive using flash memory is largely recognized as the preferred storage media for high-speed data analysis systems. In this research, we propose a new transaction recovery scheme for a column-oriented database environment which is based on a flash media file system. We improved traditional shadow paging schemes by reusing old data pages which are supposed to be invalidated in the course of writing a new data page in the flash file system environment. In order to reuse these data pages, we exploit reused shadow list structure in our column-oriented shadow recovery(CoSR) scheme. CoSR scheme minimizes the additional storage overhead for keeping shadow pages and minimizes the I/O performance degradation caused by column data compression of traditional recovery schemes. Based on the results of the performance evaluation, we conclude that CoSR outperforms the traditional schemes by 17%.

Quantification Model Development of Human Accidents on External Construction Site by Applying Probabilistic Method (확률론적 기법을 활용한 건설현장 외부 인명피해 정량화 모델 개발)

  • Ha, Sun-Geun;Kim, Tae-Hui;Son, Ki-Young;Kim, Ji-Myong;Son, Seung-Hyun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.18 no.6
    • /
    • pp.611-619
    • /
    • 2018
  • The researches have only conducted regarding construction safety management and risk on interior construction site(workers) and is insufficient about the exterior construction site(third party). As a result, ordinary people who were near construction sites have injured and hold a negative view when they think about the construction industry because construction industry have been exposed to them having a high accidents rate through media. In addition, the importance of industrial disaster prevention is emphasized at this point in time, the overall safety management system should be constructed with considering construction site external(third human) for improving the negative image of the construction industry among ordinary people. Therefore, the objective of this study is to develop the quantification model of human accident utilizing the insurance claim payout occurred construction site exterior(third party). In the future, it can be used as a reference for developing the safety management checklist in construction site interior exterior and development for forecasting control system of human accident.

Collaborative Filtering based Recommender System using Restricted Boltzmann Machines

  • Lee, Soojung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.101-108
    • /
    • 2020
  • Recommender system is a must-have feature of e-commerce, since it provides customers with convenience in selecting products. Collaborative filtering is a widely-used and representative technique, where it gives recommendation lists of products preferred by other users or preferred by the current user in the past. Recently, researches on the recommendation system using deep learning artificial intelligence technologies are actively being conducted to achieve performance improvement. This study develops a collaborative filtering based recommender system using restricted Boltzmann machines of the deep learning technology by utilizing user ratings. Moreover, a learning parameter update algorithm is proposed for learning efficiency and performance. Performance evaluation of the proposed system is made through experimental analysis and comparison with conventional collaborative filtering methods. It is found that the proposed algorithm yields superior performance than the basic restricted Boltzmann machines.

Coreference Resolution for Korean Pronouns using Pointer Networks (포인터 네트워크를 이용한 한국어 대명사 상호참조해결)

  • Park, Cheoneum;Lee, Changki
    • Journal of KIISE
    • /
    • v.44 no.5
    • /
    • pp.496-502
    • /
    • 2017
  • Pointer Networks is a deep-learning model for the attention-mechanism outputting of a list of elements that corresponds to the input sequence and is based on a recurrent neural network (RNN). The coreference resolution for pronouns is the natural language processing (NLP) task that defines a single entity to find the antecedents that correspond to the pronouns in a document. In this paper, a pronoun coreference-resolution method that finds the relation between the antecedents and the pronouns using the Pointer Networks is proposed; furthermore, the input methods of the Pointer Networks-that is, the chaining order between the words in an entity-are proposed. From among the methods that are proposed in this paper, the chaining order Coref2 showed the best performance with an F1 of MUC 81.40 %. The method showed performances that are 31.00 % and 19.28 % better than the rule-based (50.40 %) and statistics-based (62.12 %) coreference resolution systems, respectively, for the Korean pronouns.

Adaptive Web Search based on User Web Log (사용자 웹 로그를 이용한 적응형 웹 검색)

  • Yoon, Taebok;Lee, Jee-Hyong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6856-6862
    • /
    • 2014
  • Web usage mining is a method to extract meaningful patterns based on the web users' log data. Most existing patterns of web usage mining, however, do not consider the users' diverse inclination but create general models. Web users' keywords can have a variety of meanings regarding their tendency and background knowledge. This study evaluated the extraction web-user's pattern after collecting and analyzing the web usage information on the users' keywords of interest. Web-user's pattern can supply a web page network with various inclination information based on the users' keywords of interest. In addition, the Web-user's pattern can be used to recommend the most appropriate web pages and the suggested method of this experiment was confirmed to be useful.

Efficient Hardware Support: The Lock Mechanism without Retry (하드웨어 지원의 재시도 없는 잠금기법)

  • Kim Mee-Kyung;Hong Chul-Eui
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1582-1589
    • /
    • 2006
  • A lock mechanism is essential for synchronization on the multiprocessor systems. The conventional queuing lock has two bus traffics that are the initial and retry of the lock-read. %is paper proposes the new locking protocol, called WPV (Waiting Processor Variable) lock mechanism, which has only one lock-read bus traffic command. The WPV mechanism accesses the shared data in the initial lock-read phase that is held in the pipelined protocol until the shared data is transferred. The nv mechanism also uses the cache state lock mechanism to reduce the locking overhead and guarantees the FIFO lock operations in the multiple lock contentions. In this paper, we also derive the analytical model of WPV lock mechanism as well as conventional memory and cache queuing lock mechanisms. The simulation results on the WPV lock mechanism show that about 50% of access time is reduced comparing with the conventional queuing lock mechanism.

A Study of Features by Avatar type according to Internet communication services (인터넷 매체 서비스 이용자의 아바타 사용에 따른 유형별 특성에 관한 연구)

  • Lee, Kyung-A;Jeong, Bong-Keum
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.270-277
    • /
    • 2007
  • 가상공간에서 사용자들은 온라인 커뮤니티(Online Community)로 관계(Relationship)를 맺고, 같은 관심사를 가지고 공감대를 형성하는 일이 하나의 디지털문화로 형성되었다. 이러한 가상공간에서 자신을 대변할 수 있는 또 다른 나, 즉 아바타(Avatar)에 대한 선호가 증가하고 있으며, 사용목적에 따른 사용자 감성의 반영으로 아바타 디자인이 다양한 형태로 발전하고 있다. 아바타의 근원은 분신(分身) 화신(化身)을 뜻하는 산스크리스트어 '아바따라(avataara)'에서 유래되었으며, 인터넷시대가 열리면서 3차원이나 가상현실게임 또는 웹에서의 채팅 등을 즐길 때 사용자를 대신하는 그래픽 아이콘으로 표상되면서 인터넷 상에서 자신을 대표하는 분신으로 정의되고 있다. 본 연구의 목적은 인터넷 매체 서비스 이용자의 아바타 사용에 따른 유형별 특성에 관한 것으로서, 이 연구를 통해 아바타 디자인의 시각적 표현요소에 효과적으로 활용될 수 요인을 찾고자 하였다. 분석을 위해 인터넷 공동체 집단을 미니홈피/블로그, 채팅, 게임으로 구분하였으며, 아바타 이용자들이 이와 같은 커뮤니티를 이용할 때 어떤 목적에 따라 사용하고 있으며, 그들이 아바타를 선택할 때 어떤 유형별 특성이 나타나는가를 실증하고자 하였다. 이것은 아바타 이용자들이 자신이 표현하려는 아바타 이미지와의 관계를 파악함으로써 가상세계에서 표출하는 아바타 사용 목적에 맞는 유형을 설명할 수 있을 것이다. 따라서 아바타 이용자의 특성을 파악하여 그들의 감성을 반영하는 디자인 전략을 세울 수 있다. 연구방법은 아바타의 개념과 유형분류, 그리고 미니홈피/블로그, 게임, 채팅의 이론적 논의 및 근거제시를 위한 문헌연구를 하였으며, 아바타 이용목적에 따른 유형별 특성을 심도 있게 파악하기 위해 질적연구(Qualitative)로서 표적집단면접(Focus Group Interview)을 실시하였으며, 그에 따른 내용분석과 표현분석을 하였다. 그리고 이것을 보다 객관적으로 검증(verification)하기 위해 양적연구(Quantitative)를 병행하였다. 조사대상은 아바타를 이용해 본 경험이 있는 384명의 학생들이며, 성별 연령별에 따른 분류를 통해 각 조사대상자별 특징을 발견하고자 하였다. 조사를 통해 미니홈피/블로그, 채팅, 게임의 서비스 공간에서 보여 지는 각각의 특성에 맞게 아바타 이용자들은 자신이 표현하려는 아바타의 유형에서 선호의 차이를 나타내고 있음을 알 수 있었다. 결과적으로 아바타사용자의 인터넷 매체 이용목적에 따른 유형별 특성을 파악할 수 있었으며, 향후 사이트(site)의 특성에 따라 사용자의 감성선호를 고려한 아바타 디자인 전략과 그 모델(Design model)을 제시할 수 있을 것이다.

  • PDF

The YIQ Model of Computed Tomography Color Image Variable Block with Fractal Image Coding (전산화단층촬영 칼라영상의 YIQ모델을 가변블록 이용한 프랙탈 영상 부호화)

  • Park, Jae-Hong;Park, Cheol-Woo
    • Journal of the Korean Society of Radiology
    • /
    • v.10 no.4
    • /
    • pp.263-270
    • /
    • 2016
  • This paper suggests techniques to enhance coding time which is a problem in traditional fractal compression and to improve fidelity of reconstructed images by determining fractal coefficient through adaptive selection of block approximation formula. First, to reduce coding time, we construct a linear list of domain blocks of which characteristics is given by their luminance and variance and then we control block searching time according to the first permissible threshold value. Next, when employing three-level block partition, if a range block of minimum partition level cannot find a domain block which has a satisfying approximation error, There applied to 24-bpp color image compression and image techniques. The result did not occur a loss in the image quality of the image when using the encoding method, such as almost to the color in the YIQ image compression rate and image quality, such as RGB images and showed good.

On NeMRI-Based Multicasting for Network Mobility (네트워크 이동성을 고려한 NeMRI 기반의 멀티캐스트 라우팅 프로토콜)

  • Kim, Moon-Seong;Park, Jeong-Hoon;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.35-42
    • /
    • 2008
  • Mobile IP is a solution to support mobile nodes, however, it does not handle NEtwork MObility (NEMO). The NEMO Basic Support (NBS) protocol ensures session continuity for all the nodes in the mobile network. Since the protocol is based on Mobile IP, it inherits the same fundamental problem such as tunnel convergence, when supporting the multicast for NEMO. In this paper, we propose the multicast route optimization scheme for NEMO environment. We assume that the Mobile Router (MR) has a multicast function and the Nested Mobile Router Information (NeMRI) table. The NeMRI is used to record o list of the CoAs of all the MRs located below it. And it covers whether MRs desire multicast services. Any Route Optimization (RO) scheme can be employed here for pinball routing. Therefore, we achieve optimal routes for multicasting based on the given architecture. We also propose cost analytic models to evaluate the performance of our scheme. We observe significantly better multicast cost in NEMO compared with other techniques such as Bi-directional Tunneling, Remote Subscription, and Mobile Multicast based on the NBS protocol.

  • PDF

Wi-Fi Fingerprint Location Estimation System Based on Reliability (신뢰도 기반 Wi-Fi 핑거프린트 위치 추정 시스템)

  • Son, Sanghyun;Park, Youngjoon;Kim, Beomjun;Baek, Yunju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.6
    • /
    • pp.531-539
    • /
    • 2013
  • Fingerprinting technique uses the radio signal strength measured reference locations is typically used, although there are many Wi-Fi based location tracking techniques. However, it needs numerous reference locations for precision and accuracy. This paper the analyzes problems of previous techniques and proposes a fingerprinting system using reliability based on a signal strength map. The system collects the signal strength data from a number of reference locations designated by the developer. And then it generates path-loss models to one of the access points for each reference location. These models calculate the predicted signal strength and reliability for a lattice. To evaluate proposed method and system performance, We perform experiments in a $20m{\times}22m$ real indoor environment installed access points. According to the result, the proposed system reduced distance error than RADAR. Comparing the existing system, it reduced about 1.74m.