• Title/Summary/Keyword: Confusion

Search Result 1,545, Processing Time 0.027 seconds

Development of Specific SNP Molecular Marker from Thistle in the DNA Sequences of Chloroplast TrnL-F and Matk Region Using HRM Analysis (엉겅퀴의 엽록체 TrnL-F와 Matk 영역 염기서열의 HRM 분석을 통한 특이적 SNP 분자마커의 개발)

  • Lee, Shin-Woo;Lee, Soo Jin;Kim, Yun-Hee
    • Journal of Life Science
    • /
    • v.29 no.5
    • /
    • pp.524-529
    • /
    • 2019
  • Medicinal plants resources are becoming important assets since their usages have been expanded to the development of functional foods for human health, cosmetics and pharmaceutical industries. However, their phylogenetic origins and names are different from each country and quite often they are mixed each other resulting in the confusion for consumers. Particularly when they are very similar based on their morphological characteristics and distributed, it is extremely difficult to differentiate their origins even by specialists. Therefore, identification of each plant species is important for standardizing herbal medicine. Thistle is a medicinal and perennial plant. Obtaining information about the genetic diversity of plant populations is highly important for conservation and germplasm utilization. Although thistle is an important medicinal plant species registered in South Korea, no molecular markers are currently available to distinguish from other similar species from different countries. In this study, we developed single nucleotide polymorphism (SNP) markers derived from chloroplast genomic sequences to identify distinct Korean-specific thistle species via high resolution melting (HRM) curve analyses. We performed molecular authentication of four different kinds of thistle species from different regions using DNA sequences in the trnL-F and matK chloroplast intergenic region. The SNP markers developed in this study are useful for rapidly identifying specific thistle species from different country.

A Study on the Design of Supervised and Unsupervised Learning Models for Fault and Anomaly Detection in Manufacturing Facilities (제조 설비 이상탐지를 위한 지도학습 및 비지도학습 모델 설계에 관한 연구)

  • Oh, Min-Ji;Choi, Eun-Seon;Roh, Kyung-Woo;Kim, Jae-Sung;Cho, Wan-Sup
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.23-35
    • /
    • 2021
  • In the era of the 4th industrial revolution, smart factories have received great attention, where production and manufacturing technology and ICT converge. With the development of IoT technology and big data, automation of production systems has become possible. In the advanced manufacturing industry, production systems are subject to unscheduled performance degradation and downtime, and there is a demand to reduce safety risks by detecting and reparing potential errors as soon as possible. This study designs a model based on supervised and unsupervised learning for detecting anomalies. The accuracy of XGBoost, LightGBM, and CNN models was compared as a supervised learning analysis method. Through the evaluation index based on the confusion matrix, it was confirmed that LightGBM is most predictive (97%). In addition, as an unsupervised learning analysis method, MD, AE, and LSTM-AE models were constructed. Comparing three unsupervised learning analysis methods, the LSTM-AE model detected 75% of anomalies and showed the best performance. This study aims to contribute to the advancement of the smart factory by combining supervised and unsupervised learning techniques to accurately diagnose equipment failures and predict when abnormal situations occur, thereby laying the foundation for preemptive responses to abnormal situations. do.

Understanding Sexual Identity-related Concerns through the Analysis of Questions on a Social Q&A Site (소셜 Q&A 사이트의 질문 분석을 통한 청소년의 성 정체성(sexual identity) 고민에 대한 이해)

  • Zhu, Yongjun;Nam, Seojin;Yi, Dajeong;Yi, Yong Jeong
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.4
    • /
    • pp.101-119
    • /
    • 2020
  • The study aims to understand major topics and concerns of gender identity-related questions expressed by the users of the NAVER social Q&A site. To achieve this goal, we analyzed 2,120 questions created from 2010 to 2018 using natural language- and information retrieval-based methods. Results indicated that the major topics discussed by the users include interpersonal relationships, doubts about gender identity, sexual orientation, feelings and relationships, and concerns about gender identity. In addition, users mainly expressed concerns regarding general issues of gender identity; sexual orientation; negative cognition about gender identity; confession, coming-out, homosexuality; future, heterosexual relationships, military enlistment; and causes of gender identity confusion. The present study effectively derives information needs from real-world concerns about sexual identity by employing topic modeling techniques, and by comparing the advantages of exact match and tf-idf-based information retrieval methods extends methodology of Library and Information Science. Further, it has contributed to the academic maturity of the study of information behavior by observing the information needs or information-seeking behaviors of online community users with specific interests.

A Case Study on the Investor-State Dispute Relevant a Public Policy and the Domestic Implications (공공정책 관련 ISD 소송의 국내적 시사점 연구 -우리나라 관련 ISD사건을 중심으로-)

  • Kim, In-Sook
    • Journal of Legislation Research
    • /
    • no.55
    • /
    • pp.193-237
    • /
    • 2018
  • The recent surge in the ISD lawsuit filed against the Korean government is likely to cause major domestic confusion. This is because in most cases, foreign investors have claimed billions of won in damages filed against Korea in the ISD lawsuit. Public opinion will be generated to abolish the ISD lawsuit system, which is included in the international investment agreement, when a decision comes out in the Elliott/Mason case or Lone Star case, which has already been completed by the hearing. It is clear that the ISD clause, which is commonly included in most of the BITs, FTAs, can be a limiting factor in the government's public policy, as shown by many investment disputes. However, it is not necessary to have a negative view of the ISD clause itself, given that it is a system that can protect Korean investors from illegal and inappropriate actions by local governments. Since Korea already allows the system of ISD lawsuits with many countries through FTAs and BITs, and negotiations are underway to sign FTAs with new countries, the possibility that foreign investors will refer to the ISD proceeding further to our government's public policy will increase. In order to prepare for an ISD lawsuit, the Korean government has launched a response team consisting of government practitioners, private scholars, and legal professionals in the central government ministries to review major legal issues that are controversial in the cases of the ISD. In particular, local governments and public institutions, which fail to recognize the importance of international investment regulations and ISD clause, need to share and train relevant information so that all processes for public policy planning and implementation comply with international investment rules such as BITs and FTAs.

Life and Ideology of Jeong, Yeo Rip - Focused on Antagonistic Propensity to Zhu-xi's Ideology (정여립(鄭汝立)의 생애와 사상 - 반주자학적 성향을 중심으로 -)

  • Choi, Young-Sung
    • (The)Study of the Eastern Classic
    • /
    • no.37
    • /
    • pp.307-344
    • /
    • 2009
  • This year of 2009 is the 420th anniversary for the high treason case in the year of ox (year 1589). Until now, there is an endless discussion still progressing about Jeong, Yeo Rip. The evaluation of such individual varies widely according to the viewpoint of each individual. However, the problem is that such confusion or issue is exaggerated under the pretense of his idea's progressivity. The true identity and ideology of Jeong, Yeo Rip will become clear once we review such fact from the origin. This article considered abstract and ideological evaluation of occasion and took its approach thoroughly based on the historical research of literature. Until now, some parts academic world have denied and argued about the fabrication about every details of Jeong, Yeo Rip and event of high treason in the year of ox while accepting the habitual sentence spoken by such individual without a doubt. They have exaggerated Jeong, Yeo Rip as an 'Incompleted Revolutionist' or 'Individual of Revolutionary Ideology'. However, it is imprecise to speak about the terminology of 'Revolutionary'. His ideology is simply elucidating the principal of original Confucianism or a new interpretation of the principle of Confucianism. Jeong, Yeo Rip wanted to contradict the system of national school based on the Zhu-xi's ideology and returned to the principle of original Confucianism. His idea of utopia based on the Confucianism arouse out of the intention of reviving the spirit of original Confucianism. His antagonistic propensity to Zhu-xi's ideology or political idea has transcended the principle of justification based on Sung Confucianism and was also logical and realistic. He was forced on to the deadly circumstance since the society of Joseon Dynasty couldn't accept such logical and progressive idea and deemed him to be nothing more than a disturbing element for the society.

A Method for Detecting the Exposure of an OCSP Responder's Session Private Key in D-OCSP-KIS (D-OCSP-KIS에서 OCSP Responder의 세션 개인키의 노출을 검출하는 방법)

  • Lee, Young-Gyo;Nam, Jung-Hyun;Kim, Jee-Yeon;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.83-92
    • /
    • 2005
  • D-OCSP-KIS proposed by Koga and Sakurai not only reduces the number or OCSP Responder's certificate but also criers the certificate status validation about OCSP Responder to the client. Therefore, D-OCSP-KIS is an effective method that can reduce the communication cost, computational time and storage consumption in client, but it has some problems. In case an attacker accidentally acquires an OCSP Responder's session private key in a time period (e.g., one day), she can disguise as the OCSP Responder in the time period unless the OCSP Responder recognizes. She can offer the wrong response to the client using the hash value intercepted. And the server and user on I-commerce can have a serious confusion and damage. And the computation and releasing of hash chain can be a load to CA. Thus, we propose a method detecting immediately the exposure of an OCSP Responder's session private key and the abuse of hash value in D-OCSP-KIS.

A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis (소셜 네트워크 분석 기반의 금융회사 불법대출 이상징후 탐지기법에 관한 연구)

  • Wi, Choong-Ki;Kim, Hyoung-Joong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.851-868
    • /
    • 2012
  • After the financial crisis in 2008, the financial market still seems to be unstable with expanding the insolvency of the financial companies' real estate project financing loan in the aftermath of the lasted real estate recession. Especially after the illegal actions of people's financial institutions disclosed, while increased the anxiety of economic subjects about financial markets and weighted in the confusion of financial markets, the potential risk for the overall national economy is increasing. Thus as economic recession prolongs, the people's financial institutions having a weak profit structure and financing ability commit illegal acts in a variety of ways in order to conceal insolvent assets. Especially it is hard to find the loans of shareholder and the same borrower sharing credit risk in advance because most of them usually use a third-party's name bank account. Therefore, in order to effectively detect the fraud under other's name, it is necessary to analyze by clustering the borrowers high-related to a particular borrower through an analysis of association between the whole borrowers. In this paper, we introduce Analysis Techniques for detecting financial loan frauds in advance through an analysis of association between the whole borrowers by extending SNA(social network analysis) which is being studied by focused on sociology recently to the forensic accounting field of the financial frauds. Also this technique introduced in this pager will be very useful to regulatory authorities or law enforcement agencies at the field inspection or investigation.

Implementaion Mechanism of Homepage Failure Notification System in Public Sector in IDC Environment (IDC환경에서 공공부문 홈페이지 장애상황공지 시스템 구축방안)

  • Kim, Yong-Tae;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.426-433
    • /
    • 2021
  • Investment in public sector information services has been on the rise in recent years. The supply of high-speed Internet and smartphones has become more common, and the stability of the information system provided to the public in the public sector has become an important management factor. In other words, tasks such as handling civil complaints and issuing certificates by public institutions, financial transactions by banks, customs clearance work, and e-commerce by individuals or institutions are mostly done online. Therefore, how to deal with obstacles arising from the information system, which is in charge of important civil service affairs, is becoming a very important issue. In other words, in the case of a disability that does not function normally even for a short period of time, various problems can occur when the work is delayed, as well as causing serious financial damage to the civil petitioner. This could be accompanied by a decline in public confidence and various other damages such as filing civil complaints. The reasons for the occurrence of information system failures are very diverse and realistically difficult to predict when. Among the various measures to cope with disability, this paper proposed a plan to establish a disability situation notification system that can minimize confusion caused by disability in the event of a homepage malfunction. The proposed disability situation notification system was established in the public IDC environment to show the possibility of utilization.

Classification of the presence or absence of underlying disease in EEG Data using neural network (뉴럴네트워크를 이용하여 EEG Data의 기저질환 유무 분류)

  • Yoon, Hee-Jin
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.279-284
    • /
    • 2020
  • In January 2020, COVID19 plunged the whole planet into a pandemic. This has caused great economic losses and is causing social confusion. COVID19 has a superior infection rate among people with underlying disease such as heart disease, high blood pressure, diabetes, stroke, depression, and cancer. In addition, it was studied that patients with underlying disease had a higher fatality rate than those without underlying disease. In this study, the presence or absence of underlying disease was classified using EEG data. The data used to classify the presence or absence of underlying disease was EEG data provided by Data Science lab, consisting of 33 features and 69 samples. Z-score was used for data pretreatment. Classification was performed using the neural network NEWFM and ZNN engine. As a result of the classification of the presence or absence of the underlying disease, the experimental results were 77.945 for NEWFM and 76.4% for ZNN. Through this study, it is expected that EEG data can be measured, the presence or absence of an underlying disease is classified, and those with a high infection rate can be prevented from COVID19. Based on this, there is a need for research that can subdivide underlying disease in the future and research on the effects of each underlying disease on infectious disease.

Artifacts and Troubleshooting in Intraoperative Neurophysiological Monitoring (수술중신경계감시검사에서 발생하는 인공산물의 종류와 해결 방법)

  • Lim, Sung Hyuk;Kim, Kap Kyu;Jang, Min Hwan;Kim, Ki Eob;Park, Sang-Ku
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.53 no.1
    • /
    • pp.122-130
    • /
    • 2021
  • The types of artifacts that are observed in intraoperative neurophysiological monitoring (INM) is truly diverse. The removal of artifacts that interfere with the examination is essential. In addition, improving the quality of the examination by removing artifacts is a reflection of the competency of the examiner and is also the best way to ensure patient safety. However, if knowledge of the equipment or anesthesia in the operating room is insufficient due to lack of experience, artifacts cannot be removed even with a method appropriate to the situation. If artifacts are not separated and removed, the reading of the examination results in confusion in the operation process. This can be a fatal problem in neurosurgery that requires rapid and sophisticated procedures. In this paper, the causes of artifacts that occur during surgery are classified into electrical factors, non-electrical factors, and other factors, and a method and examination method for removing artifacts according to the specific situation is mentioned. Although the operating room environment is a very critical place to simultaneously consider various scenarios, we hope that a stable and optimal INM will play a role by knowing the types and causes of various artifacts and how to tackle them.