• Title/Summary/Keyword: 약 지도 학습

Search Result 416, Processing Time 0.027 seconds

A Study on the International Research Trend in Education Development focused on Text Network Analysis(2002~2017) (교육개발협력에 관한 국제 학술지 연구 동향 고찰 : 텍스트 네트워크 분석을 중심으로(2002~2017))

  • Kim, Sang-Mi;Kim, Young-Hwan;Cho, Won-Gyeum
    • Korean Journal of Comparative Education
    • /
    • v.28 no.1
    • /
    • pp.1-24
    • /
    • 2018
  • The objective of the article is to find the research trends and the main traits presented in the keywords on abstracts of research articles of "International Journal of Education Development" from 2002 to 2017. To do this, Text Network Analysis(TNA) was applied targeting 966 papers on the journal and the major research outcomes are as follows. First, the frequency analysis on the keywords showed that the keywords like Administration of education program, Schools and instruction, Regional public administration, Educational support service, Elementary education, and Elementary and secondary school were analyzed more than 100 times and also high in centrality degree. Second, the analysis results of the keywords presented in those research articles by development goal periods showed that several new keywords like Elementary education, Elementary and secondary school, Education quality, Secondary education, Educational planning have emerged frequently after SDGs and these keywords showed high in their centrality analysis. Third, the analysis on education level showed that the keywords like Elementary education, Administration of education program, School children were high in frequency and centrality degree in Elementary level. In secondary level, Schools and instruction, Administration of education program, Academic achievement were high, and in high level, college and university was high, respectively.

Study on the Research and Education (R&E) Programs in the Science High Schools and Gifted High Schools: Focusing on the Current Status (과학고 및 영재고 Research and Education (R&E) 운영 현황 및 실태 분석)

  • Jung, Hyun-Chul;Chae, Yoo-Jung;Ryu, Chun-Ryol
    • Journal of Gifted/Talented Education
    • /
    • v.22 no.3
    • /
    • pp.597-617
    • /
    • 2012
  • The purpose of this study was to investigate the current status of Research and Education (R&E) program. The sample included 21 high schools(18 science high schools and 3 gifted high schools) and 1,466 students and 310 mentors. The results are as follows. Total 502 R&E projects were planned and completed. 72.1% of the total research works were guided by professors only, 23.3% were guided by teachers only, and 4.6% were guided by professors and teachers together. Total R&E mentors were 861(385 professors and 476 teachers) and mentees were 2,168. The total budget of 2011 R&E was approximately 4.5 billion won. The needs for program improvement R&E were as follows. 1) When selecting R&E topics, mentors need to consider students' current knowledge level and school curriculum. 2) Mentors should provide enough opportunities to master topic-related basic knowledge. 3) The performance should be monitored periodically. 4) The support for continuous research and improvement of research environment were requested.

The Pattern Analysis of Financial Distress for Non-audited Firms using Data Mining (데이터마이닝 기법을 활용한 비외감기업의 부실화 유형 분석)

  • Lee, Su Hyun;Park, Jung Min;Lee, Hyoung Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.4
    • /
    • pp.111-131
    • /
    • 2015
  • There are only a handful number of research conducted on pattern analysis of corporate distress as compared with research for bankruptcy prediction. The few that exists mainly focus on audited firms because financial data collection is easier for these firms. But in reality, corporate financial distress is a far more common and critical phenomenon for non-audited firms which are mainly comprised of small and medium sized firms. The purpose of this paper is to classify non-audited firms under distress according to their financial ratio using data mining; Self-Organizing Map (SOM). SOM is a type of artificial neural network that is trained using unsupervised learning to produce a lower dimensional discretized representation of the input space of the training samples, called a map. SOM is different from other artificial neural networks as it applies competitive learning as opposed to error-correction learning such as backpropagation with gradient descent, and in the sense that it uses a neighborhood function to preserve the topological properties of the input space. It is one of the popular and successful clustering algorithm. In this study, we classify types of financial distress firms, specially, non-audited firms. In the empirical test, we collect 10 financial ratios of 100 non-audited firms under distress in 2004 for the previous two years (2002 and 2003). Using these financial ratios and the SOM algorithm, five distinct patterns were distinguished. In pattern 1, financial distress was very serious in almost all financial ratios. 12% of the firms are included in these patterns. In pattern 2, financial distress was weak in almost financial ratios. 14% of the firms are included in pattern 2. In pattern 3, growth ratio was the worst among all patterns. It is speculated that the firms of this pattern may be under distress due to severe competition in their industries. Approximately 30% of the firms fell into this group. In pattern 4, the growth ratio was higher than any other pattern but the cash ratio and profitability ratio were not at the level of the growth ratio. It is concluded that the firms of this pattern were under distress in pursuit of expanding their business. About 25% of the firms were in this pattern. Last, pattern 5 encompassed very solvent firms. Perhaps firms of this pattern were distressed due to a bad short-term strategic decision or due to problems with the enterpriser of the firms. Approximately 18% of the firms were under this pattern. This study has the academic and empirical contribution. In the perspectives of the academic contribution, non-audited companies that tend to be easily bankrupt and have the unstructured or easily manipulated financial data are classified by the data mining technology (Self-Organizing Map) rather than big sized audited firms that have the well prepared and reliable financial data. In the perspectives of the empirical one, even though the financial data of the non-audited firms are conducted to analyze, it is useful for find out the first order symptom of financial distress, which makes us to forecast the prediction of bankruptcy of the firms and to manage the early warning and alert signal. These are the academic and empirical contribution of this study. The limitation of this research is to analyze only 100 corporates due to the difficulty of collecting the financial data of the non-audited firms, which make us to be hard to proceed to the analysis by the category or size difference. Also, non-financial qualitative data is crucial for the analysis of bankruptcy. Thus, the non-financial qualitative factor is taken into account for the next study. This study sheds some light on the non-audited small and medium sized firms' distress prediction in the future.

Semantic Segmentation of the Habitats of Ecklonia Cava and Sargassum in Undersea Images Using HRNet-OCR and Swin-L Models (HRNet-OCR과 Swin-L 모델을 이용한 조식동물 서식지 수중영상의 의미론적 분할)

  • Kim, Hyungwoo;Jang, Seonwoong;Bak, Suho;Gong, Shinwoo;Kwak, Jiwoo;Kim, Jinsoo;Lee, Yangwon
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_3
    • /
    • pp.913-924
    • /
    • 2022
  • In this paper, we presented a database construction of undersea images for the Habitats of Ecklonia cava and Sargassum and conducted an experiment for semantic segmentation using state-of-the-art (SOTA) models such as High Resolution Network-Object Contextual Representation (HRNet-OCR) and Shifted Windows-L (Swin-L). The result showed that our segmentation models were superior to the existing experiments in terms of the 29% increased mean intersection over union (mIOU). Swin-L model produced better performance for every class. In particular, the information of the Ecklonia cava class that had small data were also appropriately extracted by Swin-L model. Target objects and the backgrounds were well distinguished owing to the Transformer backbone better than the legacy models. A bigger database under construction will ensure more accuracy improvement and can be utilized as deep learning database for undersea images.

Implementation of Radiotherapy Educational Contents Using Virtual Reality (가상현실 기술을 활용한 방사선치료 교육 콘텐츠 제작 구현)

  • Kwon, Soon-Mu;Shim, Jae-Goo;Chon, Kwon-Su
    • Journal of the Korean Society of Radiology
    • /
    • v.12 no.3
    • /
    • pp.409-415
    • /
    • 2018
  • The development of smart devices has brought about significant changes in daily life and one of the most significant changes is the virtual reality zone. Virtual reality is a technology that creates the illusion that a 3D high-resolution image has already been created using a display device just like it does in itself. Unrealized subjects are forced to rely on audiovisual materials, resulting in a decline in the concentration of practices and the quality of classes. It used virtual reality to develop effective teaching materials for radiology students. In order to produce a video clip bridge using virtual reality, a radiology clinic was selected to conduct two exposures from July to September 2017. The video was produced taking into account the radiology and work flow chart and filming was carried out in two separate locations : in the computerized tomography unit and in the LINAC room. Prior to filming the scenario and the filming route were checked in advance to facilitate editing of the video. Modeling and mapping was performed in a PC environment using the Window XP operating system. Using two leading virtual reality camera Gopro Hero, CC pixels were produced using a 4K UHD, Adobe, followed by an 8 megapixel resolution of $3,840{\times}2,160/4,096{\times}2,160$. Total regeneration time was performed in about 5 minutes during the production of using virtual reality to prevent vomiting and dizziness. Currently developed virtual reality radiation and educational contents are being used to secure the market and extend the promotion process to be used by various institutions. The researchers will investigate the satisfaction level of radiation and educational contents using virtual reality and carry out supplementary tasks depending on the results.

Development and application of a Teaching and Learning Plan and Practical Performance Assessment Tools to Promote Communication Between Teenagers Children and Their Parents: focusing on conversation analysis of real conversation in UCC video projects (청소년 자녀와 부모간 의사소통 개선을 위한 교수학습 과정안과 실제 상황적 수행평가 개발 및 적용 - 부모자녀의 실제대화 UCC동영상을 활용한 대화분석을 토대로 -)

  • You, Hye-Jung;Cho, Byung-Eun
    • Journal of Korean Home Economics Education Association
    • /
    • v.23 no.3
    • /
    • pp.139-160
    • /
    • 2011
  • The purpose of this study is twofold: (i) to develop a teaching and learning plan and practical performance assessment tools for the improvement of teenager-parent communication and relationships as well as explore their effects on the communication in the everyday family life; and (ii) to find the underlying problems of teenager- parent communication through conversation analysis and to provide a improved dialogue model. We provided the experimental group with a performance task of communication training between teenagers and their parents in the real family situation while the control group practiced communication skills in a learning situation. However for both classes, before and after performance tasks were equally provided. The experimental group exhibited a longer conversation time with their parents, better communication skills, and higher degrees of relational satisfaction than the control group. Conversation analysis revealed that the experimental group reduced the use of blocking techniques in the teenager-parent conversations more than the control group, and all so raised the frequency of functional communications more than the control group. In both areas of communication in the experimental group was significantly improved, Most notably, a problem-solving case through no-lose conflict resolution methods was effective, succeeding by 70% in the e experimental group and 43.3% in the control group. Parents use blocking techniques like admonition, lecturing, blaming. sarcastic remarking, ordering and so forth, while teenagers use dispute, avoidance, blaming, and teasing in this order. The communication problems during the conversation process, teenagers' evasive and rebellious way of speaking instigates adverse communication responses from parents, so their conversation tends to unfold as ambiguous evasion opposed to: inquiring or evasion by short answers vs. ordering-preaching, or disputing vs. criticizing-making sarcastic, disputing vs. disputing-teaching, and criticizing vs. criticizing.

  • PDF

Host-Based Intrusion Detection Model Using Few-Shot Learning (Few-Shot Learning을 사용한 호스트 기반 침입 탐지 모델)

  • Park, DaeKyeong;Shin, DongIl;Shin, DongKyoo;Kim, Sangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.271-278
    • /
    • 2021
  • As the current cyber attacks become more intelligent, the existing Intrusion Detection System is difficult for detecting intelligent attacks that deviate from the existing stored patterns. In an attempt to solve this, a model of a deep learning-based intrusion detection system that analyzes the pattern of intelligent attacks through data learning has emerged. Intrusion detection systems are divided into host-based and network-based depending on the installation location. Unlike network-based intrusion detection systems, host-based intrusion detection systems have the disadvantage of having to observe the inside and outside of the system as a whole. However, it has the advantage of being able to detect intrusions that cannot be detected by a network-based intrusion detection system. Therefore, in this study, we conducted a study on a host-based intrusion detection system. In order to evaluate and improve the performance of the host-based intrusion detection system model, we used the host-based Leipzig Intrusion Detection-Data Set (LID-DS) published in 2018. In the performance evaluation of the model using that data set, in order to confirm the similarity of each data and reconstructed to identify whether it is normal data or abnormal data, 1D vector data is converted to 3D image data. Also, the deep learning model has the drawback of having to re-learn every time a new cyber attack method is seen. In other words, it is not efficient because it takes a long time to learn a large amount of data. To solve this problem, this paper proposes the Siamese Convolutional Neural Network (Siamese-CNN) to use the Few-Shot Learning method that shows excellent performance by learning the little amount of data. Siamese-CNN determines whether the attacks are of the same type by the similarity score of each sample of cyber attacks converted into images. The accuracy was calculated using Few-Shot Learning technique, and the performance of Vanilla Convolutional Neural Network (Vanilla-CNN) and Siamese-CNN was compared to confirm the performance of Siamese-CNN. As a result of measuring Accuracy, Precision, Recall and F1-Score index, it was confirmed that the recall of the Siamese-CNN model proposed in this study was increased by about 6% from the Vanilla-CNN model.

Construction of Multiple Classifier Systems based on a Classifiers Pool (인식기 풀 기반의 다수 인식기 시스템 구축방법)

  • Kang, Hee-Joong
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.8
    • /
    • pp.595-603
    • /
    • 2002
  • Only a few studies have been conducted on how to select multiple classifiers from the pool of available classifiers for showing the good classification performance. Thus, the selection problem if classifiers on how to select or how many to select still remains an important research issue. In this paper, provided that the number of selected classifiers is constrained in advance, a variety of selection criteria are proposed and applied to tile construction of multiple classifier systems, and then these selection criteria will be evaluated by the performance of the constructed multiple classifier systems. All the possible sets of classifiers are trammed by the selection criteria, and some of these sets are selected as the candidates of multiple classifier systems. The multiple classifier system candidates were evaluated by the experiments recognizing unconstrained handwritten numerals obtained both from Concordia university and UCI machine learning repository. Among the selection criteria, particularly the multiple classifier system candidates by the information-theoretic selection criteria based on conditional entropy showed more promising results than those by the other selection criteria.

Design and Implementation of Indoor Location Recognition System based on Fingerprint and Random Forest (핑거프린트와 랜덤포레스트 기반 실내 위치 인식 시스템 설계와 구현)

  • Lee, Sunmin;Moon, Nammee
    • Journal of Broadcast Engineering
    • /
    • v.23 no.1
    • /
    • pp.154-161
    • /
    • 2018
  • As the number of smartphone users increases, research on indoor location recognition service is necessary. Access to indoor locations is predominantly WiFi, Bluetooth, etc., but in most quarters, WiFi is equipped with WiFi functionality, which uses WiFi features to provide WiFi functionality. The study uses the random forest algorithm, which employs the fingerprint index of the acquired WiFi and the use of the multI-value classification method, which employs the receiver signal strength of the acquired WiFi. As the data of the fingerprint, a total of 4 radio maps using the Mac address together with the received signal strength were used. The experiment was conducted in a limited indoor space and compared to an indoor location recognition system using an existing random forest, similar to the method proposed in this study for experimental analysis. Experiments have shown that the system's positioning accuracy as suggested by this study is approximately 5.8 % higher than that of a conventional indoor location recognition system using a random forest, and that its location recognition speed is consistent and faster than that of a study.

A Study on User Authentication with Smartphone Accelerometer Sensor (스마트폰 가속도 센서를 이용한 사용자 인증 방법 연구)

  • Seo, Jun-seok;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1477-1484
    • /
    • 2015
  • With the growth of financial industry with smartphone, interest on user authentication using smartphone has been arisen in these days. There are various type of biometric user authentication techniques, but gait recognition using accelerometer sensor in smartphone does not seem to develop remarkably. This paper suggests the method of user authentication using accelerometer sensor embedded in smartphone. Specifically, calibrate the sensor data from smartphone with 3D-transformation, extract features from transformed data and do principle component analysis, and learn model with using gaussian mixture model. Next, authenticate user data with confidence interval of GMM model. As result, proposed method is capable of user authentication with accelerometer sensor on smartphone as a high degree of accuracy(about 96%) even in the situation that environment control and limitation are minimum on the research.