• Title/Summary/Keyword: 약 지도 학습

Search Result 416, Processing Time 0.026 seconds

Cox Model Improvement Using Residual Blocks in Neural Networks: A Study on the Predictive Model of Cervical Cancer Mortality (신경망 내 잔여 블록을 활용한 콕스 모델 개선: 자궁경부암 사망률 예측모형 연구)

  • Nang Kyeong Lee;Joo Young Kim;Ji Soo Tak;Hyeong Rok Lee;Hyun Ji Jeon;Jee Myung Yang;Seung Won Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.6
    • /
    • pp.260-268
    • /
    • 2024
  • Cervical cancer is the fourth most common cancer in women worldwide, and more than 604,000 new cases were reported in 2020 alone, resulting in approximately 341,831 deaths. The Cox regression model is a major model widely adopted in cancer research, but considering the existence of nonlinear associations, it faces limitations due to linear assumptions. To address this problem, this paper proposes ResSurvNet, a new model that improves the accuracy of cervical cancer mortality prediction using ResNet's residual learning framework. This model showed accuracy that outperforms the DNN, CPH, CoxLasso, Cox Gradient Boost, and RSF models compared in this study. As this model showed accuracy that outperformed the DNN, CPH, CoxLasso, Cox Gradient Boost, and RSF models compared in this study, this excellent predictive performance demonstrates great value in early diagnosis and treatment strategy establishment in the management of cervical cancer patients and represents significant progress in the field of survival analysis.

A Normalization Method to Utilize Brain Waves as Brain Computer Interface Game Control (뇌파를 BCI 게임 제어에 활용하기 위한 정규화 방법)

  • Sung, Yun-Sick;Cho, Kyung-Eun;Um, Ky-Hyun
    • Journal of Korea Game Society
    • /
    • v.10 no.6
    • /
    • pp.115-124
    • /
    • 2010
  • In the beginning brain waves were used for monkeys to control robot arm with neural activity. In recent years there are research that measured brain waves are used for the control of programs which monitor the progression of dementia or enhance of attention in children diagnosed with Attention Deficit Hyperactivity Disorder (ADHD). Moreover, low-price devices that can be used as a game control interface have become available. One of the problems associated with control using brain waves is that the mean amplitude, mean wavelength, and mean vibrational frequency of the brain waves differ from individual to individual. This paper attempts to propose a method to normalize measured brain waves using normal distribution and calculate the waveforms that can be used in controlling games. For this, a framework in which brain waves are converted in seven stages has been suggested. In addition, the estimation process in each stage has been described. In an experiment the waveforms of two subjects have been compared using the proposed method in the BCI English word learning program. The level of similarity between two subjects' waveforms has been compared with correlation coefficient. When the proposed method was applied, both meditation and concentration increased by 13% and 8%, respectively. Because the proposed regularization method is converted into a waveform fit for control functions by reducing personal characteristics reflected in the brain waves, it is fitting for application programs such as games.

Artificial Intelligence Algorithms, Model-Based Social Data Collection and Content Exploration (소셜데이터 분석 및 인공지능 알고리즘 기반 범죄 수사 기법 연구)

  • An, Dong-Uk;Leem, Choon Seong
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.23-34
    • /
    • 2019
  • Recently, the crime that utilizes the digital platform is continuously increasing. About 140,000 cases occurred in 2015 and about 150,000 cases occurred in 2016. Therefore, it is considered that there is a limit handling those online crimes by old-fashioned investigation techniques. Investigators' manual online search and cognitive investigation methods those are broadly used today are not enough to proactively cope with rapid changing civil crimes. In addition, the characteristics of the content that is posted to unspecified users of social media makes investigations more difficult. This study suggests the site-based collection and the Open API among the content web collection methods considering the characteristics of the online media where the infringement crimes occur. Since illegal content is published and deleted quickly, and new words and alterations are generated quickly and variously, it is difficult to recognize them quickly by dictionary-based morphological analysis registered manually. In order to solve this problem, we propose a tokenizing method in the existing dictionary-based morphological analysis through WPM (Word Piece Model), which is a data preprocessing method for quick recognizing and responding to illegal contents posting online infringement crimes. In the analysis of data, the optimal precision is verified through the Vote-based ensemble method by utilizing a classification learning model based on supervised learning for the investigation of illegal contents. This study utilizes a sorting algorithm model centering on illegal multilevel business cases to proactively recognize crimes invading the public economy, and presents an empirical study to effectively deal with social data collection and content investigation.

  • PDF

Implementation and Experimentation of StyleJigsaw for Programming Beginners (프로그래밍 초보자를 위한 스타일직소의 구현과 실험)

  • Lee, Yun-Jung;Jung, In-Joon;Woo, Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.2
    • /
    • pp.19-31
    • /
    • 2013
  • Since the high readable source codes help us to understand and modify the program, it is much easy to maintain them. The readability of source code is not only affected by the complexity of algorithms such as control structures but also affected by the coding styles such as naming and indentation. Although various coding standards have been presented for promoting the readability of source codes, it has been usually lost or ignored in a programming course. One of the reasons is that the coding standard is not a hard-and-false rule since it does not contribute to the performance of software. In this paper, we propose a simple automatic system, namely StyleJigsaw, which checks the style of the source codes written by C/C++ or Java. In this system, the coding style score is calculated and visualized as a jigsaw puzzle. To measure the educational effectiveness of StyleJigsaw, several experiments have been conducted on a class students in C++ programming course. According to the experimental results, the coding style score increased about 8.0 points(10.9%) on average using StyleJigsaw. Further, according to a questionnaire survey targeting the students who attended the programming course, about 88.5% of the students responded that StyleJigsaw was of help to learn the coding standards. We expect that the StyleJigsaw can be effectively used to encourage the students to obey the coding standards, resulting in high readable programs.

IDS Model using Improved Bayesian Network to improve the Intrusion Detection Rate (베이지안 네트워크 개선을 통한 탐지율 향상의 IDS 모델)

  • Choi, Bomin;Lee, Jungsik;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.5
    • /
    • pp.495-503
    • /
    • 2014
  • In recent days, a study of the intrusion detection system collecting and analyzing network data, packet or logs, has been actively performed to response the network threats in computer security fields. In particular, Bayesian network has advantage of the inference functionality which can infer with only some of provided data, so studies of the intrusion system based on Bayesian network have been conducted in the prior. However, there were some limitations to calculate high detection performance because it didn't consider the problems as like complexity of the relation among network packets or continuos input data processing. Therefore, in this paper we proposed two methodologies based on K-menas clustering to improve detection rate by reforming the problems of prior models. At first, it can be improved by sophisticatedly setting interval range of nodes based on K-means clustering. And for the second, it can be improved by calculating robust CPT through applying weighted-leaning based on K-means clustering, too. We conducted the experiments to prove performance of our proposed methodologies by comparing K_WTAN_EM applied to proposed two methodologies with prior models. As the results of experiment, the detection rate of proposed model is higher about 7.78% than existing NBN(Naive Bayesian Network) IDS model, and is higher about 5.24% than TAN(Tree Augmented Bayesian Network) IDS mode and then we could prove excellence our proposing ideas.

A Case Study on the classroom life and the identity of the Elementary Mathematics Gifted Education (초등수학 영재교육원의 교실 생활과 정체성에 대한 사례연구)

  • Lee, Hak-Ro;Ryu, Sung-Rim
    • Communications of Mathematical Education
    • /
    • v.25 no.1
    • /
    • pp.99-118
    • /
    • 2011
  • For this case study of gifted education, two classrooms in two locations, show life in general of the gifted educational system. And for this case study the identity of teachers and the gifted, help to activate the mathematically gifted education for these research questions, which are as followed: Firstly, how is the gifted education classroom life? Secondly, what kind of identity do the teachers and gifted students bring to mathematics, mathematics teaching and mathematics learning? Being selected in the gifted children's education center solves the research problem of characteristic and approach. Backed by the condition and the permission possibility, 2 selected classes and 2 people, which are coming and going. Gifted education classroom life, the identity of teachers and gifted students in mathematics and mathematics teaching and mathematic learning. It will be for 3 months, with various recordings and vocal instruction between teacher and students. Collected observations and interviews will be analyzed over the course of instruction. The results analyzed include, social participation, structure, and the formation of the gifted education classroom life. The organization of classes were analyzed by the classes conscious levels to collect and retain data. The classes verification levels depended on the program's first class incentive, teaching and learning levels and understanding of gifted math. A performance assessment will be applied after the final lesson and a consultation with parents and students after the final class. The six kinds of social participation structure come out of the type of the most important roles in gifted education accounts, for these types of group discussions and interactions, students must have an interaction or individual activity that students can use, such as a work product through the real materials, which release teachers and other students for that type of questions to evaluate. In order for the development of meaningful mathematical concepts to formulate, mathematical principles require problem solving among all students, which will appear in the resolution or it will be impossible to map the meaning of the instruction from which it was formed. These results show the analysis of the mathematics, mathematics teaching, mathematics learning and about the identity of the teachers and gifted. Gifted education teachers are defined by gifted math, which is more difficult and requires more differentiated learning, suitable for gifted students. Gifted was defined when higher level math was created and challenged students to deeper thinking. Gifted students think that gifted math is creative learning and they are forward or passive to one-way according to the education atmosphere.

Base Study for Improvement of School Environmental Education with the Education Indigenous Plants - In the case of Mapo-Gu Elementary School in Seoul - (자생식물 교육을 통한 학교 환경교육 개선에 관한 기초연구 - 서울시 마포구 초등학교를 중심으로 -)

  • Bang, Kwang-Ja;Park, Sung-Eun;Kang, Hyun-Kung;Ju, Jin-Hee
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.3 no.1
    • /
    • pp.10-19
    • /
    • 2000
  • Due to the urbanization, concentrated population, and limited land exploitation in the modern society, the environment surrounding that we live in is getting polluted more and more, and it has become hard even to let urban children experience the nature. This research was conducted to help people recognize the importance of our natural resources through the environmental education of elementary school and to use school's practical open-space for the Indigenous Plants education. The results of this study are as follows : First, the status of a plant utilization in our institutional education : There were 362 species totally of 124 species of Trees, 156 species of Herbs, 63 species of Crops, and 19 species of Hydrophytes which appear in the elementary school text book. Of all, the most frequently appearing species of tree were the Malus pumila var. dulcissima, Pinus densijlora, Citrus unshiu, Diospyros kaki. Second, the effect of plant education using the land around schools : The result of research on the open-space of the 19 elementary schools located in Mapo-gu showed that most of the species planted are the Juniperus chinensisrose, Hibiscus syriacus. Pelargonium inquinans in the order of size, and the plants appearing in text book were grown in the botanical garden organized in 7 schools. Especially most of the Indigenous Plants were being planted in botanical garden, and Pinus densijlora, Abeliophyllum distichum, Polygonatum var. plurijlorum, Liriope platyphylla and so on. Last, the result of this research on recognition of Environment, Planting education and Indigenous plants : It showed that educational necessity of students and teachers about environment and Indigenous Plants was more than 80%. The management of botanical garden was conducted by some teachers and managers. The results of this study suggested that we needed the reconstruction of curriculum, the efficient application of plant education for effectiveness of using school environment and monitoring continually and construction information sources for the better environment education in the elementary schools.

  • PDF

Conceptual Changes of Middle School Students on the Motion of the Moon Using the Cognitive Conflict Instructional Model (인지갈등 수업모형을 적용한 중학생의 달의 운동 개념 변화)

  • Kim, Hee-Soo;Chung, Jung-In;Shim, Ki-Chang
    • Journal of the Korean earth science society
    • /
    • v.25 no.5
    • /
    • pp.348-363
    • /
    • 2004
  • The purpose of this study was to classify types of preconception about the motion of the moon held by middle school students and find out how the lesson applying cognitive conflict instructional model changes their conceptual view of the motion of the moon. A quantitative study was first conducted with 48 ninth graders and then followed by a qualitative study. In the qualitative study, male and female students were organized into groups of five and ten respectively. Students were instructed to observe the motion of the moon about for a month and at the same time were taught via the cognitive conflict instructional model for three class periods. Data were collected from interviews and a questionnaire evaluating the degree of concept development that each student showed. A majority of students were found to hold misconceptions formed from elementary school programs on the motion of the moon. Further, students showed lack of scientific ability to interpret the phenomena of the moon. This study showed that the cognitive conflict instructional model was effective for students to make progress regarding their conceptual views of the motion of the moon. However, it was observed that misconceptions by students may possibly occur when two dimensional figures or miniatures were used.

The Agriculture Decision-making System(ADS) based on Deep Learning for improving crop productivity (농산물 생산성 향상을 위한 딥러닝 기반 농업 의사결정시스템)

  • Park, Jinuk;Ahn, Heuihak;Lee, ByungKwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.521-530
    • /
    • 2018
  • This paper proposes "The Agriculture Decision-making System(ADS) based on Deep Learning for improving crop productivity" that collects weather information based on location supporting precision agriculture, predicts current crop condition by using the collected information and real time crop data, and notifies a farmer of the result. The system works as follows. The ICM(Information Collection Module) collects weather information based on location supporting precision agriculture. The DRCM(Deep learning based Risk Calculation Module) predicts whether the C, H, N and moisture content of soil are appropriate to grow specific crops according to current weather. The RNM(Risk Notification Module) notifies a farmer of the prediction result based on the DRCM. The proposed system improves the stability because it reduces the accuracy reduction rate as the amount of data increases and is apply the unsupervised learning to the analysis stage compared to the existing system. As a result, the simulation result shows that the ADS improved the success rate of data analysis by about 6%. And the ADS predicts the current crop growth condition accurately, prevents in advance the crop diseases in various environments, and provides the optimized condition for growing crops.

Influence of Motivational, Social, and Environmental Factors on the Learning of Hackers (동기적, 사회적, 그리고 환경적 요인이 해커의 기술 습득에 미치는 영향)

  • Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.57-78
    • /
    • 2016
  • Hacking has raised many critical issues in the modern world, particularly because the size and cost of the damages caused by this disruptive activity have steadily increased. Accordingly, many significant studies have been conducted by behavioral scientists to understand hackers and their practices. Nonetheless, only qualitative methods, such as interviews, meta-studies, and media studies, have been employed in such studies because of hacker sampling limitations. Existing studies have determined that intrinsic motivation was the dominant factor influencing hackers, and that their techniques were mainly acquired from online hacking communities. However, such results have yet to be causally proven. This study attempted to identify the causal factors influencing the motivational and environmental factors encouraging hackers to learn hacking skills. To this end, hacker community members using the theory of planned behavior were observed to identify the causal factors of their learning of hacking skills. We selected a group of students who were developing their hacking skills. The survey was conducted over a two-week period in May 2015 with a total of 227 students as respondents. After list-wise deletion, 215 of the responses were deemed usable (94.7 percent). In summary, the hackers were aware that hacking skills are considered socially unethical, and their attitudes toward the learning of hacking skills were affected by both intrinsic and extrinsic motivations. In addition, the characteristics of the online hacking community affected their perceived behavioral control. This study introduced new concepts in the process of conducting a causal relationship analysis on a hacker sample. Moreover, this research expanded the discussion on the causal direction of subjective norms in unethical research, and empirically confirmed that both intrinsic and extrinsic motivations affect the learning of hacking skills. This study also made a practical contribution by raising the educational and policy response issues for ethical hackers and demonstrating the necessity to intensify the punishment for hacking.