• Title/Summary/Keyword: 사전 기반 모델

Search Result 841, Processing Time 0.031 seconds

A Case Study on the Operation of Artificial Intelligence Camp for Elementary School Students (초등학생을 위한 인공지능 캠프 운영 사례 연구)

  • Youngseok Lee;Jungwon Cho
    • Journal of Practical Engineering Education
    • /
    • v.15 no.1
    • /
    • pp.23-29
    • /
    • 2023
  • For given the importance of elementary school students developing the ability to solve problems using artificial intelligence (AI), problem-solving abilities should be developed using AI along with education to develop problem-solving abilities. Such students need a form that allows them to understand the concepts and principles of AI and to be easily educated in a fun way to understand basic understanding of how AI works. To this end, this study planned an 8-hour AI convergence program and operated based on self-driving cars, demonstrating that it was effective in improving elementary school students' problem-solving abilities, creativity, and AI understanding. As a result of operating the camp, students' understanding of AI was 3.56 (standard deviation 0.85), 4.00 (standard deviation 0.71), and t-value was -5.412 (p<0.001), indicating statistically improved understanding of AI, and high satisfaction and interest of students. In the future, it will be necessary to develop an educational program that allows elementary school students to devise their own ideas and create products to which AI models can be applied.

Development of a Failure Probability Model based on Operation Data of Thermal Piping Network in District Heating System (지역난방 열배관망 운영데이터 기반의 파손확률 모델 개발)

  • Kim, Hyoung Seok;Kim, Gye Beom;Kim, Lae Hyun
    • Korean Chemical Engineering Research
    • /
    • v.55 no.3
    • /
    • pp.322-331
    • /
    • 2017
  • District heating was first introduced in Korea in 1985. As the service life of the underground thermal piping network has increased for more than 30 years, the maintenance of the underground thermal pipe has become an important issue. A variety of complex technologies are required for periodic inspection and operation management for the maintenance of the aged thermal piping network. Especially, it is required to develop a model that can be used for decision making in order to derive optimal maintenance and replacement point from the economic viewpoint in the field. In this study, the analysis was carried out based on the repair history and accident data at the operation of the thermal pipe network of five districts in the Korea District Heating Corporation. A failure probability model was developed by introducing statistical techniques of qualitative analysis and binomial logistic regression analysis. As a result of qualitative analysis of maintenance history and accident data, the most important cause of pipeline damage was construction erosion, corrosion of pipe and bad material accounted for about 82%. In the statistical model analysis, by setting the separation point of the classification to 0.25, the accuracy of the thermal pipe breakage and non-breakage classification improved to 73.5%. In order to establish the failure probability model, the fitness of the model was verified through the Hosmer and Lemeshow test, the independent test of the independent variables, and the Chi-Square test of the model. According to the results of analysis of the risk of thermal pipe network damage, the highest probability of failure was analyzed as the thermal pipeline constructed by the F construction company in the reducer pipe of less than 250mm, which is more than 10 years on the Seoul area motorway in winter. The results of this study can be used to prioritize maintenance, preventive inspection, and replacement of thermal piping systems. In addition, it will be possible to reduce the frequency of thermal pipeline damage and to use it more aggressively to manage thermal piping network by establishing and coping with accident prevention plan in advance such as inspection and maintenance.

Sentiment Analysis of Movie Review Using Integrated CNN-LSTM Mode (CNN-LSTM 조합모델을 이용한 영화리뷰 감성분석)

  • Park, Ho-yeon;Kim, Kyoung-jae
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.141-154
    • /
    • 2019
  • Rapid growth of internet technology and social media is progressing. Data mining technology has evolved to enable unstructured document representations in a variety of applications. Sentiment analysis is an important technology that can distinguish poor or high-quality content through text data of products, and it has proliferated during text mining. Sentiment analysis mainly analyzes people's opinions in text data by assigning predefined data categories as positive and negative. This has been studied in various directions in terms of accuracy from simple rule-based to dictionary-based approaches using predefined labels. In fact, sentiment analysis is one of the most active researches in natural language processing and is widely studied in text mining. When real online reviews aren't available for others, it's not only easy to openly collect information, but it also affects your business. In marketing, real-world information from customers is gathered on websites, not surveys. Depending on whether the website's posts are positive or negative, the customer response is reflected in the sales and tries to identify the information. However, many reviews on a website are not always good, and difficult to identify. The earlier studies in this research area used the reviews data of the Amazon.com shopping mal, but the research data used in the recent studies uses the data for stock market trends, blogs, news articles, weather forecasts, IMDB, and facebook etc. However, the lack of accuracy is recognized because sentiment calculations are changed according to the subject, paragraph, sentiment lexicon direction, and sentence strength. This study aims to classify the polarity analysis of sentiment analysis into positive and negative categories and increase the prediction accuracy of the polarity analysis using the pretrained IMDB review data set. First, the text classification algorithm related to sentiment analysis adopts the popular machine learning algorithms such as NB (naive bayes), SVM (support vector machines), XGboost, RF (random forests), and Gradient Boost as comparative models. Second, deep learning has demonstrated discriminative features that can extract complex features of data. Representative algorithms are CNN (convolution neural networks), RNN (recurrent neural networks), LSTM (long-short term memory). CNN can be used similarly to BoW when processing a sentence in vector format, but does not consider sequential data attributes. RNN can handle well in order because it takes into account the time information of the data, but there is a long-term dependency on memory. To solve the problem of long-term dependence, LSTM is used. For the comparison, CNN and LSTM were chosen as simple deep learning models. In addition to classical machine learning algorithms, CNN, LSTM, and the integrated models were analyzed. Although there are many parameters for the algorithms, we examined the relationship between numerical value and precision to find the optimal combination. And, we tried to figure out how the models work well for sentiment analysis and how these models work. This study proposes integrated CNN and LSTM algorithms to extract the positive and negative features of text analysis. The reasons for mixing these two algorithms are as follows. CNN can extract features for the classification automatically by applying convolution layer and massively parallel processing. LSTM is not capable of highly parallel processing. Like faucets, the LSTM has input, output, and forget gates that can be moved and controlled at a desired time. These gates have the advantage of placing memory blocks on hidden nodes. The memory block of the LSTM may not store all the data, but it can solve the CNN's long-term dependency problem. Furthermore, when LSTM is used in CNN's pooling layer, it has an end-to-end structure, so that spatial and temporal features can be designed simultaneously. In combination with CNN-LSTM, 90.33% accuracy was measured. This is slower than CNN, but faster than LSTM. The presented model was more accurate than other models. In addition, each word embedding layer can be improved when training the kernel step by step. CNN-LSTM can improve the weakness of each model, and there is an advantage of improving the learning by layer using the end-to-end structure of LSTM. Based on these reasons, this study tries to enhance the classification accuracy of movie reviews using the integrated CNN-LSTM model.

Classification of Radar Signals Using Machine Learning Techniques (기계학습 방법을 이용한 레이더 신호 분류)

  • Hong, Seok-Jun;Yi, Yearn-Gui;Choi, Jong-Won;Jo, Jeil;Seo, Bo-Seok
    • Journal of IKEEE
    • /
    • v.22 no.1
    • /
    • pp.162-167
    • /
    • 2018
  • In this paper, we propose a method to classify radar signals according to the jamming technique by applying the machine learning to parameter data extracted from received radar signals. In the present army, the radar signal is classified according to the type of threat based on the library of the radar signal parameters mostly built by the preliminary investigation. However, since radar technology is continuously evolving and diversifying, it can not properly classify signals when applying this method to new threats or threat types that do not exist in existing libraries, thus limiting the choice of appropriate jamming techniques. Therefore, it is necessary to classify the signals so that the optimal jamming technique can be selected using only the parameter data of the radar signal that is different from the method using the existing threat library. In this study, we propose a method based on machine learning to cope with new threat signal form. The method classifies the signal corresponding the new jamming method for the new threat signal by learning the classifier composed of the hidden Markov model and the neural network using the existing library data.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

A Study of Concepts on the Brand Love (브랜드 사랑 구성개념에 대한 연구)

  • Min, Guihong;Park, Pumsoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.315-326
    • /
    • 2020
  • Corporate efforts to build strong brands have made consumers interested in brand love. In the field of brand love, however, there is a lack of systematic research on the multidimensionality of the concept of brand love and on the scale development to measure it. Thus, based on the methodological research design of Churchill(1979) and DeVellis(1991), this study explored properties of brand love and classified them into two levels - 'emotion' and 'relationship' - and generated corresponding measurement items. To do this, the research was conducted in a total of eight stages, including preliminary studies such as literature review, open surveys, and in-depth interviews, as well as the main study process in which the factors were analyzed step by step. As a result, the level of emotion appeared to have five subcomponents (self-esteem, warmth, interest, responsibility, pleasure) with 19 items, and the level of relationship - three subcomponents (unchanging, sharing/supporting, understanding) with 11 items, adding up to a total of 30 measurement items for brand love with reliability, convergent and discriminant validity, and nomological validity. Additionally, we intended to expand the scope of research related to brand love by presenting the result model of organic interaction between the concepts that constitute brand love and proposing '4 categories of brand love strength' based on it.

An Implementation of Bandwidth Broker Based on COPS for Resource Management in Diffserv Network (차별화 서비스 망에서 COPS 기반 대역 브로커 설계 및 구현)

  • 한태만;김동원;정유현;이준화;김상하
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.518-531
    • /
    • 2004
  • This paper discusses a testbed architecture for implementing scalable service differentiation in the Internet. The differentiated services (DiffServ) testbed architecture is based on a model in which a bandwidth broker (BB) can control network resources, and the ALTQ can reserve resources in a router to guarantee a Quality of Service (QoS) for incoming traffic to the testbed. The reservation and releasemessage for the ALTQ is contingent upon a decision message in the BE. The BB has all the information in advance, which is required for a decision message, in the form of PIB. A signaling protocol between the BB and the routers is the COPS protocol proposed at the IETF. In terms of service differentiation, a user should make an SLA in advance, and reserve required bandwidth through an RAR procedure. The SLA and RAR message between a user and the BB has implemented with the COPS extension which was used between a router and the BB. We evaluates the service differentiation for the video streaming in that the EF class traffic shows superb performance than the BE class traffic where is a network congestion. We also present the differentiated service showing a better packet receiving rate, low packet loss, and low delay for the EF class video service.

  • PDF

Designation of Logical Bicycle Accident Dangerous Zone by Digital Map-Based Accident Characteristics Analysis (디지털 맵 기반 사고특성 분석을 통한 자전거 사고 논리 위험존 설정 연구)

  • Sung, Kwang-mo;Kim, Ki-cheol;Lee, Choul-ki;Kim, Sung-jin;Lee, Jung-uck
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.1
    • /
    • pp.117-130
    • /
    • 2017
  • Bicycles are leading to serious accidents in the event of a side collision, and it is very important to prevent accidents in advance because it is difficult to actively deal with them in a dangerous situation. As a part of the bicycle safety driving support technology, this study establishes bicycle accidents dangerous zone based on bicycle accident data and road property information of digital map nationwide and provides timely safety information to cyclists. The point selected by using actual accident data was called 'dangerous zone', and the potential accident occurrence point generated by modeling based on this 'dangerous zone' was called 'logical dangerous zone'. As a result of the research on the Designation of Logical Bicycle Accident Dangerous Zone, the regional specificity of the bicycle accident points across the nation was generalized to the form of the logical dangerous zone through the network data.

Development and Application of Systems Thinking-based STEAM Education Program to Improve Secondary Science Gifted and Talented Students' Systems Thinking Skill (중등 과학 영재학생들의 시스템 사고력 향상을 위한 융합인재교육 프로그램의 개발 및 적용)

  • Park, Byung-Yeol;Lee, Hyonyong
    • Journal of Gifted/Talented Education
    • /
    • v.24 no.3
    • /
    • pp.421-444
    • /
    • 2014
  • In STEAM education, contents that has been extracted from a variety of areas, so it can work closely and systematically. Therefore STEAM education requires systems thinking that can be grasped effectively these different disciplines. The purposes of this study are to develop a STEAM program based on systems thinking, and apply the program to the secondary science gifted student in order to investigate the educational effect. A model of the Program developed from previous research and theoretical contents of systems thinking and STEAM. A draft of the STEAM program was developed on the theme of "rocket". A total of 113 students was participated in this study. 100 seventh and 13 eighth graders were enrolled at seigy. A single group pre-post test paired t-test was conducted on them in systems thinking skills. Result of applying the program to the students as follows. The systems thinking ability was improved after the application of the program. 'Mental Model', 'Personal Skill', 'Team Learning', and 'System Analysis', 'Shared Vision' emerged for both improved significantly. In conclusion, the STEAM program based on system thinking improves students' systems thinking skills. This program of results can be helpful in cultivate human resources with the problem solving ability based on system thinking and STEAM literacy by used in public education curriculum.

Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data (개인화된 건강 데이터의 대량 처리 모니터링을 위한 메시지 모델 및 동적 버퍼 할당 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.187-193
    • /
    • 2015
  • The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.