• Title/Summary/Keyword: 증거 기반 표준

Search Result 12, Processing Time 0.027 seconds

Higher Order Conditionalization and Undermining (고차 조건화와 믿음 기반 약화)

  • Park, Ilho
    • Korean Journal of Logic
    • /
    • v.18 no.2
    • /
    • pp.167-195
    • /
    • 2015
  • This paper aims to respond to Weisberg's claim that the standard Bayesian epistemology cannot model an agent's belief updating that is triggered by some undermining evidence. Our epistemological intuition seems to require that the undermining evidence decreases some particular relevant credences. According to Weisberg, however, such a belief change cannot result from the standard Bayesian belief updating rules-i.e., (Jeffrey) Conditionalization. This is because probabilistic independence between some propositions is preserved under (Jeffrey) Conditionalization on the relevant evidence. Yet I will show in this paper that this conclusion is somewhat hasty. In particular, I will show that there is another version of Conditionalization and that when one updates her credences by means of such a version, the belief updating originated in undermining evidence can be well modeled in the Bayesian framework. Some authors often call the version Higher Order Conditionalization.

  • PDF

A Study on Manual Model of Public Qualification Processing System based on IT Governance Structures (IT거버넌스 체계 기반의 공공자격 처리시스템 지침서 모델에 관한 연구)

  • Chang, Young-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.316-319
    • /
    • 2011
  • 본 논문에서는 공공자격처리시스템의 관리 효율성을 극대화하기 위한 지침서의 신개발 사양으로 다양한 이론에 근거한 IT 거버넌스 체계를 적용하여 모델을 개발하고 실제 운영시스템에 적용한다. 모델의 개발은 정보기술자원과 정보를 공공자격처리시스템 개발 전략과 목표를 기준으로 일반적 사항인 계획, 조직, 도입에 대한 사항의 상위개념으로서 구축, 운영, 지원, 모니터링 등에 대하여 시스템 관리자와 함께 일반 행정처리 중심의 사용자를 바탕으로 한 기술 분야의 세부사항을 자세하게 중점적으로 적용하는 방법론을 도입한다. 개발자와 관리자 및 행정사용자가 중심체계가 되는 방법론을 적용하여 관리자 지침서를 모델링하는 본 논문은 공공자격처리시스템 프로젝트를 2개의 대규모 개발 시스템으로 분류하고 각각 7가지의 분야에 대하여 세부사항을 도출하고 운영책임 관리자와 일반 행정처리 사용자에게 적용하여 결과를 평가한다. 국가정보화 IT 거버넌스 혁신을 통하여 8가지 영역의 표준 지침서 제작의 필요성이 대두되어지는 관점에서 본 연구가 국가가 시행하는 공공자격 처리시스템의 특수 분야에서 확장되어진 기술적 공유를 추구할 수 있다.

  • PDF

ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation (이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법)

  • Park, Se Jin;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.311-320
    • /
    • 2018
  • Recently, the use of digital audio and video as proof in criminal and all kinds of litigation is increasing, and scientific investigation using digital forensic technique is developing. With the development of computing and file editing technologies, anyone can simply manipulate video files, and the number of cases of manipulating digital data is increasing. As a result, the integrity of the evidence and the reliability of the evidence Is required. In this paper, we propose a technique for extracting the Electrical Network Frequency (ENF) through a grid of power grids according to the geographical environment for power supply, and then performing signal processing for peak detection using QIFFT. Through the detection algorithm using the standard deviation, it was confirmed that the video file was falsified with 73% accuracy and the forgery point was found.

An Empirical Study of Profiling Model for the SMEs with High Demand for Standards Using Data Mining (데이터마이닝을 이용한 표준정책 수요 중소기업의 프로파일링 연구: R&D 동기와 사업화 지원 정책을 중심으로)

  • Jun, Seung-pyo;Jung, JaeOong;Choi, San
    • Journal of Korea Technology Innovation Society
    • /
    • v.19 no.3
    • /
    • pp.511-544
    • /
    • 2016
  • Standards boost technological innovation by promoting information sharing, compatibility, stability and quality. Identifying groups of companies that particularly benefit from these functions of standards in their technological innovation and commercialization helps to customize planning and implementation of standards-related policies for demand groups. For this purpose, this study engages in profiling of SMEs whose R&D objective is to respond to standards as well as those who need to implement standards system for technological commercialization. Then it suggests a prediction model that can distinguish such companies from others. To this end, decision tree analysis is conducted for profiling of characteristics of subject SMEs through data mining. Subject SMEs include (1) those that engage in R&D to respond to standards (Group1) or (2) those in need of product standard or technological certification policies for commercialization purposes (Group 2). Then the study proposes a prediction model that can distinguish Groups 1 and 2 from others based on several variables by adopting discriminant analysis. The practicality of discriminant formula is statistically verified. The study suggests that Group 1 companies are distinguished in variables such as time spent on R&D planning, KoreanStandardIndustryClassification (KSIC) category, number of employees and novelty of technologies. Profiling result of Group 2 companies suggests that they are differentiated in variables such as KSIC category, major clients of the companies, time spent on R&D and ability to test and verify their technologies. The prediction model proposed herein is designed based on the outcomes of profiling and discriminant analysis. Its purpose is to serve in the planning or implementation processes of standards-related policies through providing objective information on companies in need of relevant support and thereby to enhance overall success rate of standards-related projects.

CNN-Based Novelty Detection with Effectively Incorporating Document-Level Information (효과적인 문서 수준의 정보를 이용한 합성곱 신경망 기반의 신규성 탐지)

  • Jo, Seongung;Oh, Heung-Seon;Im, Sanghun;Kim, Seonho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.10
    • /
    • pp.231-238
    • /
    • 2020
  • With a large number of documents appearing on the web, document-level novelty detection has become important since it can reduce the efforts of finding novel documents by discarding documents sharing redundant information already seen. A recent work proposed a convolutional neural network (CNN)-based novelty detection model with significant performance improvements. We observed that it has a restriction of using document-level information in determining novelty but assumed that the document-level information is more important. As a solution, this paper proposed two methods of effectively incorporating document-level information using a CNN-based novelty detection model. Our methods focus on constructing a feature vector of a target document to be classified by extracting relative information between the target document and source documents given as evidence. A series of experiments showed the superiority of our methods on a standard benchmark collection, TAP-DLND 1.0.

A checklist of Gasan Mt.: an online platform for virtual specimens (온라인 생물정보 플랫폼에 기반한 가산의 관속식물목록)

  • YANG, Sungyu;NAM, Bo-Mi;JANG, JuEun;CHOI, Mi-Jung;CHOI, Goya;CHUNG, Kyong-Sook;CHOI, Hyeok-Jae
    • Korean Journal of Plant Taxonomy
    • /
    • v.50 no.4
    • /
    • pp.453-474
    • /
    • 2020
  • Here, we present an updated checklist based on voucher specimens of vascular plants for Gasan Mt. which is located in Chilgok-gun, Gyeongsangbuk-do, South Korea. The list includes 322 taxa in 212 genera and 81 families of vascular plants, of which 14 are endemic, six are rare plants, 48 are floristic target species, and 14 are considered naturalized in Korea. Based on voucher specimens, Gasan Mt. was the southern limit of Cimicifuga heracleifolia var. bifida Nakai and Iris odaesanensis Y. N. Lee on the Korean peninsula. Moreover, we confirmed a hybrid plant deriving from two Iris parents, I. minutoaurea Makino and I. odaesanensis, in a mountain fortress of Gasan Mt. We also present online databases including 325 voucher specimens deposited at the Korea Institute of Oriental Medicine (KIOM; http://oasis.kiom.re.kr/herblib). This study has great significance as the first floristic study of Korean plants sharing virtual specimens online.

Study on the categorization of modus operandi and tools used in domestic burglary (건축물 침입에 이용되는 침입수법 및 도구의 유형화 연구)

  • Park, Hyeon-Ho;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.57-86
    • /
    • 2014
  • As the revision of Building Code including applying crime prevention design to buildings passed recently and target hardening ought to be evidence-based, we studied the Modus Operandi (MO) and intrusion tools of domestic burglary to earn basic data for improvement of crime prevention hardware in the future. To be specific, we reviewed related academic literature and police official statistics of domestic burglary critically and interviewed detectives in charge of burglary to specify and categorize MO and tools. We can derive some implications from research findings, including improvement of the statistical system for the MO of burglary, active sharing of the MO of burglary among the criminal justice agencies and related industries and experts. Also, crime prevention advice and education for the local residents focused on MO of burglary can be recommended. Based on this research, to enhance the level of community safety significantly, performance tests of crime prevention hardware such as security doors and windows etc. and the study on related certification system should be vitalized.

  • PDF

Improving Efficiency of Food Hygiene Surveillance System by Using Machine Learning-Based Approaches (기계학습을 이용한 식품위생점검 체계의 효율성 개선 연구)

  • Cho, Sanggoo;Cho, Seung Yong
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.53-67
    • /
    • 2020
  • This study employees a supervised learning prediction model to detect nonconformity in advance of processed food manufacturing and processing businesses. The study was conducted according to the standard procedure of machine learning, such as definition of objective function, data preprocessing and feature engineering and model selection and evaluation. The dependent variable was set as the number of supervised inspection detections over the past five years from 2014 to 2018, and the objective function was to maximize the probability of detecting the nonconforming companies. The data was preprocessed by reflecting not only basic attributes such as revenues, operating duration, number of employees, but also the inspections track records and extraneous climate data. After applying the feature variable extraction method, the machine learning algorithm was applied to the data by deriving the company's risk, item risk, environmental risk, and past violation history as feature variables that affect the determination of nonconformity. The f1-score of the decision tree, one of ensemble models, was much higher than those of other models. Based on the results of this study, it is expected that the official food control for food safety management will be enhanced and geared into the data-evidence based management as well as scientific administrative system.

A Study on Availability of AtoM for Recording Korean Wave Culture Contents : A Case of K-Food Contents (한류문화콘텐츠의 기록화를 위한 AtoM 활용 방안에 관한 연구 K-Food 콘텐츠를 중심으로)

  • Shim, Gab-yong;Yoo, Hyeon-Gyeong;Moon, Sang-Hoon;Lee, Youn-Yong;Lee, Jeong-Hyeon;Kim, Yong
    • The Korean Journal of Archival Studies
    • /
    • no.43
    • /
    • pp.5-42
    • /
    • 2015
  • Korean wave 3.0 is focused on 'K-Culture' which includes traditional culture, cultural art as well as existing culture contents as a keyword. It considers everything about Korean culture as materials of Korean wave culture contents. Since Korean wave culture contents reflect contemporary social aspect, it needs to preserve those contents as archives and records which have the important value of evidence. With this social environment, this study aims to implement RMS based on AtoM that manages various kinds of Korean wave culture contents through analysis of management situation of those materials. Recently, it is in progress individually to manage them through organizations dealing with korean cultures such as K-Pop, K-Food, K-Movie. However, it has problems in accumulating information and reproducing high quality contents because of lack of coordination among organizations. To solve the problems, this study proposed RMS based on open source software Access to Memory(AtoM) for managing and recording Korean wave culture contents. AtoM provides various functions for managing records and archives such as accumulation, classification, description and browsing. Furthermore AtoM is for free as open source software and easy to implement and use. Thus, this study implemented RMS based on AtoM to methodically manage korean wave culture contents by functional requirements of RMS. Also, this study considered contents relating K-Food as an object to collect, classify, and describe. To describe it, this study selected ISAD(G) standard.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.