• Title/Summary/Keyword: 수도데이터

Search Result 517, Processing Time 0.028 seconds

A Study on Big Data Information System based on Artificial Intelligence -Filmmaker and Focusing on Movie case analysis of 10 million Viewers- (인공지능 기반형 빅데이터 정보시스템에 관한 연구 -영화제작자와 천만 영화 사례분석 중심으로-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.377-388
    • /
    • 2019
  • The system proposed in this paper was suggested as a big data system that works in the age of artificial intelligence of the 4th Industrial Revolution. The proposed system can be a good example in terms of government 's development of new intelligent big data information system. For example, the proposed system may be introduced into the system of a department as a function of the integration of existing cinema ticket integration network or its networking. For this purpose, the proposed system transmits the user's profile to the film producer or other company, where it is provided as comparison data. Soon, the information is sent to the user-specific characteristic data and then the film-maker will be able to gauge the success of the three elements of the movie's performance, cinematic quality, and break-even point in real time, which are revealed through the movie review that the actual user feels, including the so-called 'new reinterpretation.

An Investigation of Intellectual Structure on Data Papers Published in Data Journals in Web of Science (Web of Science 데이터학술지 게재 데이터논문의 지적구조 규명)

  • Chung, EunKyung
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.1
    • /
    • pp.153-177
    • /
    • 2020
  • In the context of open science, data sharing and reuse are becoming important researchers' activities. Among the discussions about data sharing and reuse, data journals and data papers shows visible results. Data journals are published in many academic fields, and the number of papers is increasing. Unlike the data itself, data papers contain activities that cite and receive citations, thus creating their own intellectual structures. This study analyzed 14 data journals indexed by Web of Science, 6,086 data papers and 84,908 cited references to examine the intellectual structure of data journals and data papers in academic community. Along with the author's details, the co-citation analysis and bibliographic coupling analysis were visualized in network to identify the detailed subject areas. The results of the analysis show that the frequent authors, affiliated institutions, and countries are different from that of traditional journal papers. These results can be interpreted as mainly because the authors who can easily produce data publish data papers. In both co-citation and bibliographic analysis, analytical tools, databases, and genome composition were the main subtopic areas. The co-citation analysis resulted in nine clusters, with specific subject areas being water quality and climate. The bibliographic analysis consisted of a total of 27 components, and detailed subject areas such as ocean and atmosphere were identified in addition to water quality and climate. Notably, the subject areas of the social sciences have also emerged.

A Study on the Ship's Speed Control and Ship Handling at Myeongnayang Waterway (명량수도 해역에서 항해속력 규제와 선박운용에 관한 연구)

  • Kim, Deug-Bong;Jeong, Jae-Yong;Park, Young-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.2
    • /
    • pp.193-201
    • /
    • 2014
  • This study provided safe sailing speed and appropriate passing time to areas of known strong current water to prevent marine accident of the ships. To the interpretation of these data which target Myeongnyang waterway, AIS data of the ship was collected from $12^{th}$ July to $15^{th}$ July 2010 and site environment was investigated on $4^{th}$ September 2010. On the basis of the collected data, the 'Minimum Navigation Speed' and 'Optimum Navigation Speed' were calculated. It has also considered the 'Spare control force' or allowance and the 'Respond Rudder Angle' for each tidal current speed. Additionally, it suggested the safe passing time to strong current area by analyzing tidal level and tidal current speed. The conclusion of the research are as follows : (1) If the flow rate is greater than 4.4 kn, it is difficult for the model ship to control herself by her own steering power and to cope with tidal current pressure force and yaw moment caused by the tidal current.. (2) The minimum navigation speed should be over 2.3 times the tidal current and the optimum navigation speed should be over 4.0 times the tidal current. (3) When spring tide, the optimum passing time at Myeongnyang waterway is between 30 minutes to 1 hour before the time of high/low water, and at 5 hours after high/low water, passing of ships should be avoided because it is time when the flow rate is over 4 kn.

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

Comparative study of data augmentation methods for fake audio detection (음성위조 탐지에 있어서 데이터 증강 기법의 성능에 관한 비교 연구)

  • KwanYeol Park;Il-Youp Kwak
    • The Korean Journal of Applied Statistics
    • /
    • v.36 no.2
    • /
    • pp.101-114
    • /
    • 2023
  • The data augmentation technique is effectively used to solve the problem of overfitting the model by allowing the training dataset to be viewed from various perspectives. In addition to image augmentation techniques such as rotation, cropping, horizontal flip, and vertical flip, occlusion-based data augmentation methods such as Cutmix and Cutout have been proposed. For models based on speech data, it is possible to use an occlusion-based data-based augmentation technique after converting a 1D speech signal into a 2D spectrogram. In particular, SpecAugment is an occlusion-based augmentation technique for speech spectrograms. In this study, we intend to compare and study data augmentation techniques that can be used in the problem of false-voice detection. Using data from the ASVspoof2017 and ASVspoof2019 competitions held to detect fake audio, a dataset applied with Cutout, Cutmix, and SpecAugment, an occlusion-based data augmentation method, was trained through an LCNN model. All three augmentation techniques, Cutout, Cutmix, and SpecAugment, generally improved the performance of the model. In ASVspoof2017, Cutmix, in ASVspoof2019 LA, Mixup, and in ASVspoof2019 PA, SpecAugment showed the best performance. In addition, increasing the number of masks for SpecAugment helps to improve performance. In conclusion, it is understood that the appropriate augmentation technique differs depending on the situation and data.

Robust User Activity Recognition using Smartphone Accelerometer Sensors (스마트폰 가속도 센서를 이용한 강건한 사용자 행위 인지 방법)

  • Jeon, Myung Joong;Park, Young Tack
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.9
    • /
    • pp.629-642
    • /
    • 2013
  • Recently, with the advent of smart phones, it brought many changes in lives of modern people. Especially, application utilizing the sensor information of smart phone, which provides the service adapted by user situations, has been emerged. Sensor data of smart phone can be used for recognizing the user situation, Because it is closely related to the behavior and habits of the user. currently, GPS sensor one of mobile sensor has been utilized a lot to recognize basic user activity. But, depending on the user situation, activity recognition system cannot receive GPS signal, and also not collect received data. So utilization is reduced. In this paper, for solving this problem, we suggest a method of user activity recognition that focused on the accelerometer sensor data using smart phone. Accelerometer sensor is stable to collect the data and it's sensitive to user behavior. Finally this paper suggests a noble approach to use state transition diagrams which represent the natural flow of user activity changes for enhancing the accuracy of user activity recognition.

A Study on the MAC Protocol for ABR Service in Wireless environments (무선 환경에서 ABR 서비스를 위한 MAC 프로토콜에 관한 연구)

  • 강상욱;정종혁
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2000.11a
    • /
    • pp.463-470
    • /
    • 2000
  • In this paper, we describe a wireless MAC protocol named APRMA(Abitrary Period Reservation Multiple Access), which is capable of supporting the ABR type data service and maximizing channel utilization. In original PRMA protocol, data terminals with random data packets cannot reserve slot. That is, slot reservation is applicable to the. time constraint voice packet exclusively. But the reservation scheme have to be performed for loss sensitive data packet, so data packets can get their quality of service. The aspects of service, if fixed bandwidth is allocated to data terminals, time constraint voice packets may have a low efficiency So in this study, the terminal which wants to request for ABR type service, acquires a minimum bandwidth from system for the first time. If the system have extra available bandwidth, ABR terminals would acquire additional bandwidth slot by slot. As a result, APRMA protocol can support the data service with loss sensitivity and maintain their channel utilization highly. Also high Priority services like voice can be satisfied with their QoS by APRMA.

  • PDF

Comparison of Ordinary Kriging and Artificial Neural Network for Estimation of Ground Profile Information in Unboring Region (미시추 구간의 지반 층상정보 예측을 위한 정규 크리깅 및 인공신경망 기법의 비교)

  • Chun, Chanjun;Choi, Changho;Cho, Jinwoo
    • Journal of the Korean GEO-environmental Society
    • /
    • v.20 no.3
    • /
    • pp.15-20
    • /
    • 2019
  • A large amount of site investigation data is essential to obtain reliable design value. However, site investigations are generally insufficient due to economic problems. It is important to estimate the ground profile information in unboring region for accurate earthwork-volume prediction, and such ground profile information can be estimated by using the geo-statistical approach. Furthermore, the ground profile information in unboring region can be estimated by training a model via machine learning technique such as artificial neural network. In this paper, artificial neural network-based model estimated the ground profile information in unboring region, and this results were compared with that of ordinary kriging technique, which is referred to the geo-statistical approach. Accordingly, a total of 84 ground profile information in an actual bridge environment was split into 75 training and 9 test databases. The observed ground profile information of the test database was compared with those of the ordinary kriging technique and artificial neural network.

Comparison of ANN model's prediction performance according to the level of data uncertainty in water distribution network (상수도관망 내 데이터 불확실성에 따른 절점 압력 예측 ANN 모델 수행 성능 비교)

  • Jang, Hyewoon;Jung, Donghwi;Jun, Sanghoon
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.spc1
    • /
    • pp.1295-1303
    • /
    • 2022
  • As the role of water distribution networks (WDNs) becomes more important, identifying abnormal events (e.g., pipe burst) rapidly and accurately is required. Since existing approaches such as field equipment-based detection methods have several limitations, model-based methods (e.g., machine learning based detection model) that identify abnormal events using hydraulic simulation models have been developed. However, no previous work has examined the impact of data uncertainties on the results. Thus, this study compares the effects of measurement error-induced pressure data uncertainty in WDNs. An artificial neural network (ANN) is used to predict nodal pressures and measurement errors are generated by using cumulative density function inverse sampling method that follows Gaussian distribution. Total of nine conditions (3 input datasets × 3 output datasets) are considered in the ANN model to investigate the impact of measurement error size on the prediction results. The results have shown that higher data uncertainty decreased ANN model's prediction accuracy. Also, the measurement error of output data had more impact on the model performance than input data that for a same measurement error size on the input and output data, the prediction accuracy was 72.25% and 38.61%, respectively. Thus, to increase ANN models prediction performance, reducing the magnitude of measurement errors of the output pressure node is considered to be more important than input node.

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.