• Title/Summary/Keyword: 패턴 지도 방안

Search Result 375, Processing Time 0.027 seconds

Adaption of Neural Network Algorithm for Pattern Recognition of Weld Flaws (용접결함 패턴인식을 위한 신경망 알고리즘 적용)

  • Kim, Chang-Hyun;Yu, Hong-Yeon;Hong, Sung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.65-72
    • /
    • 2007
  • In this study, we used nondestructive test based on ultrasonic test as inspection method and compared backpropagation neural network(BPNN) with probabilistic neural network(PNN) as pattern recognition algorithm of weld flaws. For this purpose, variables are applied the same to two algorithms. Where, feature variables are zooming flaw signals of reflected whole signals from weld flaws in time domain. Through this process, we compared advantages/ disadvantages of two algorithms and confirmed application methods of two algorithms.

Vehicle Mobility Management Scheme Using AdaBoost Algorithm (AdaBoost 기법을 이용한 차량 이동성 관리 방안)

  • Han, Sang-Hyuck;Lee, Hyukjoon;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.1
    • /
    • pp.53-60
    • /
    • 2014
  • Redundant handovers cause degraded quality of service to passengers in vehicle. This paper proposes a handover scheme suitable for users traveling in vehicles, which enables continuous learning of the handover process using a discrete-time Markov chain (DTMC). Through AdaBoost machine learning algorithm, the proposed handover scheme avoids unnecessary handover trials when a short dwell time in a target cell is expected or when the target cell is an intermediate cell through which the vehicle quickly passes. Simulation results show that the proposed scheme reduces the number of handover occurrences and maintains adequate throughput.

C4ISR Systems IDS Performance Enhancing Method (C4ISR 체계 IDS의 성능 향상 방안)

  • Choi, Junesung;Kook, Kwangho
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.57-69
    • /
    • 2012
  • C4ISR system is an important tool for military operational command and control. Therefore, it is frequently exposed to the cyber-terror attempt to paralyze the military command and control system. Generally, the information system uses IDS and firewall as major security computing tools. C4ISR system also uses them as major measures for the information protection. But the usefulness of IDS is reduced due to the frequent false-positives and false-negatives if the behavioral patterns are modified or new behavioral patterns appear. This paper presents new IDS structure which can create modified attack patterns and unexpected attack patterns automatically during IDS probing process. The proposed IDS structure is expected to enhance the information protection capability of the C4ISR system by reducing false-positives and false-negatives through the creation and verification of new attack patterns.

The attribution of the security guard failure and grope for efficient operational measures of security guard through the analysis of failures : propensity eduction of failure-factors of security guard and patterns of danger and injury (경호실패귀인과 실패사례 분석을 통한 효율적인 경호운용방안 모색 : 경호환경의 실패요인과 위해패턴 성향 도출)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.143-155
    • /
    • 2018
  • The purpose of this study is to extract the failure attributions to identify the failure factors of the security guards and to derive the risk factor factors through failure cases analysis. Failure attributions were prepared by using semi-structured questionnaires(17) and closed questionnaires(179) starting from the fully open questionnaires(8), and processed through SPSS 21.0 and AMOS 21.O statistical packages. As a result of summarizing the causal relationship between the failure attribution and the failure case (patrol failure pattern factor), In Park Jung-Hee's assassination, lack of experience(2), negative mind(1), lack of work ability(1), lack of experience(2), organizational non-system activeness(2), lack of awareness of mission(1) Failure(2), lack of consciousness(2), and 14 failure patterns were found. Aung-San National Cemetery explosion occurred in eight failure patterns including insecurity(1), negative mind(1), lack of work skills(2), lack of experience(2), individualism(1), There were eight failure patterns in the case of Mr. Yook Young-Su 's sniping, including insincerity(2), negative mind (1), lack of experience(2), lack of awareness of mission(2) and failure to share work(1).

  • PDF

Transaction Pattern between Real Life and Games Centered on Players (플레이어의 현실과 게임내의 교류패턴)

  • Hyun, Hye-Jung;Ko, Il-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.95-107
    • /
    • 2012
  • Communication skill to maintain personal relationships is a crucial factor in our social life. However, even though a number of people are experiencing difficulty in communication owing to their poor interpersonal interchanges in real life, they are interacting with virtual characters in artificially created virtual space. In order to remedy such a lack of communication among game players, first, they need to search appropriate ways to communicate each other in real life, but not in virtual space, or to create a game space as a new place for interaction among them by utilizing advantages of the game world. To accomplish such an aim, it is necessary to precede the research on what kind of relations or characteristics for game players' interaction to others in the real life and game world. For the reason, in this paper, we investigate interaction patterns of game players in real life and in the virtual space. In order to perform this investigation, an ego-gram, which demonstrates the pattern of the ego states as a field-oriented approach is used as the research method. The result shows that there are differences between patterns in each spaces. so, we apply a factor analysis and analyse the relationship between the transaction pattern of players in two spaces using the ego-gram.

A Study on Travel Pattern Analysis and Political Application using Transportation Card Data: In Gyeonggi-Do Case (교통카드자료를 이용한 통행패턴분석과 정책활용방안 연구 -경기도를 중심으로-)

  • Bin, Miyoung;Moon, Juback;Joh, Chang-Hyeon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.15 no.4
    • /
    • pp.615-627
    • /
    • 2012
  • This study analyzed the travel pattern with respect to use of public transportation by using transportation card data and presented the measures that can be used in a traffic policy. Transportation card data targeted Gyeonggi-Do area and as a utilization plan, a scenario that when a traffic policy decision maker improves bus stop facilities, the person selects a target site by using several variables that can be obtained from transportation card data was set and analyzed. The analysis result showed that K means cluster analysis which is decision making methodology and CHAID(Chi-squared automatic interaction detection) were used and it can be used usefully in policies in significance level of p <0.01. Also, based on these results, this study presented policy implications to be improved to actually use transportation card data in policies.

  • PDF

A Research on the Development of Trend Analysis Models for Residential Water consumption using realtime sensing data and on the Grafting of a GIS for Water Supply Administrative Purposes (물사용예측행정을 위한 실시간 생활용수 추세패턴 모형개발 및 GIS 연계방안에 관한 연구)

  • Kim,, Seong-Hoon;Lee, Si-Hyoung;Kim, Dong-Moon;Kim, Eui-Myoung;Park, Jae-Kook
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.4
    • /
    • pp.109-117
    • /
    • 2010
  • The ultimate purpose of this study is to propose a method to improve water supply management efficiency which is one of the two main approaches to solve the water supply-related problems. As an effort, targeting commercial water, a series of efforts was performed such as choosing a field area, selecting a sensing point, installing a sensor and server systems, and monitoring the real time data. Through the analyses of the real time data gathered, a series of water consumption trend analysis models were developed for each day and for each month. And Also proposed are the related utilization of the developed trend analysis models and a GIS. As a result of the aforementioned research, the proposed trend analysis technique is expected to offer some important role for the water supply forecasting agministation and management.

Tourism policy establishment plan using geographic information system and big data analysis system -Focusing on major tourist attractions in Incheon Metropolitan City- (지리정보시스템과 빅데이터 분석 시스템을 활용한 관광 정책수립 방안 -인천광역시 주요 관광지 중심으로-)

  • Min, Kyoungjun;Lim, Heuiseok
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.13-21
    • /
    • 2021
  • This study aims to analyze tourist inflow trends and consumption patterns using a geographic information system and big data analysis system. Songdo Central Park and Chinatown were selected among the major tourist destinations in Incheon, and floating population analysis and card sales analysis were conducted for one month in June 2017. The number of tourists visiting Songdo Central Park from metropolitan cities across the country was highest in the order of Incheon Metropolitan City, Gyeonggi-do, and Seoul Metropolitan City, and the proportion of foreign tourists was the highest in China. The number of card consumption used by Chinatown tourists was 12.4% higher for men than for women, and the amount of card consumption was also higher for men by 18%. This study has implications for proposing a strategic plan for tourism policy by analyzing the inflow trend and consumption pattern of tourists and deriving major issues in the establishment of tourism policy. Based on this study, it is expected that it can be helpful in improving the construction of tourism infrastructure in the future.

Study on the Classification Methodology for DSRC Travel Speed Patterns Using Decision Trees (의사결정나무 기법을 적용한 DSRC 통행속도패턴 분류방안)

  • Lee, Minha;Lee, Sang-Soo;Namkoong, Seong;Choi, Keechoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2014
  • In this paper, travel speed patterns were deducted based on historical DSRC travel speed data using Decision Tree technique to improve availability of the massive amount of historical data. These patterns were designed to reflect spatio-temporal vicissitudes in reality by generating pattern units classified by months, time of day, and highway sections. The study area was from Seoul TG to Ansung IC sections on Gyung-bu highway where high peak time of day frequently occurs in South Korea. Decision Tree technique was applied to categorize travel speed according to day of week. As a result, five different pattern groups were generated: (Mon)(Tue Wed Thu)(Fri)(Sat)(Sun). Statistical verification was conducted to prove the validity of patterns on nine different highway sections, and the accuracy of fitting was found to be 93%. To reduce travel pattern errors against individual travel speed data, inclusion of four additional variables were also tested. Among those variables, 'traffic condition on previous month' variable improved the pattern grouping accuracy by reducing 50% of speed variance in the decision tree model developed.

A Study on Efficient Application of Architectural Patterns by the Taxonomy of Software Requirements (소프트웨어 요구사항 분류체계를 이용한 효율적인 아키텍처 패턴 적용에 관한 연구)

  • Jong-Woo Choi;Sang Yoon Min
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.7
    • /
    • pp.285-294
    • /
    • 2023
  • As software grows continuously in scale and complexity, the role of software architecture has become increasingly important across various industries. Although software architects often rely on their experience and intuition when designing such architecture, there is a variety of methodologies being researched for architecture design. However, these methodologies do not address the specific effects of applying multiple architectural patterns to a system or the sequence in which they should be applied. In this study, we explain the variation in architectural design results depending on the order in which the same set of architectural patterns is applied to a single system. Based on this phenomenon, we identify requirements for applying architectural patterns and propose a method of classifying the patterns to be applied. We also propose a prioritization process for requirements to efficiently apply the classified patterns in a specific order. Finally, we show a case study that prioritizing requirements based on architectural pattern types is beneficial for efficient software architecture design in terms of quality attributes.