• Title/Summary/Keyword: Data and Chance

Search Result 468, Processing Time 0.028 seconds

A Z-Index based MOLAP Cube Storage Scheme (Z-인덱스 기반 MOLAP 큐브 저장 구조)

  • Kim, Myung;Lim, Yoon-Sun
    • Journal of KIISE:Databases
    • /
    • v.29 no.4
    • /
    • pp.262-273
    • /
    • 2002
  • MOLAP is a technology that accelerates multidimensional data analysis by storing data in a multidimensional array and accessing them using their position information. Depending on a mapping scheme of a multidimensional array onto disk, the sliced of MOLAP operations such as slice and dice varies significantly. [1] proposed a MOLAP cube storage scheme that divides a cube into small chunks with equal side length, compresses sparse chunks, and stores the chunks in row-major order of their chunk indexes. This type of cube storage scheme gives a fair chance to all dimensions of the input data. Here, we developed a variant of their cube storage scheme by placing chunks in a different order. Our scheme accelerates slice and dice operations by aligning chunks to physical disk block boundaries and clustering neighboring chunks. Z-indexing is used for chunk clustering. The efficiency of the proposed scheme is evaluated through experiments. We showed that the proposed scheme is efficient for 3~5 dimensional cubes that are frequently used to analyze business data.

Low-Power Multiplier Using Input Data Partition (입력 데이터 분할을 이용한 저전력 부스 곱셈기 설계)

  • Park Jongsu;Kim Jinsang;Cho Won-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1092-1097
    • /
    • 2005
  • In this paper, we propose a low-power Booth multiplication which reduces the switching activities of partial products during multiplication process. Radix-4 Booth algorithm has a characteristic that produces the Booth encoded products with zero when input data have sequentially equal values (0 or 1). Therefore, partial products have higher chances of being zero when an input with a smaller effective dynamic range of two multiplication inputs is used as a multiplier data instead of a multiplicand. The proposed multiplier divides a multiplication expression into several multiplication expressions with smaller bits than those of an original input data, and each multiplication is computed independently for the Booth encoding. Finally, the results of each multiplication are added. This means that the proposed multiplier has a higher chance to have zero encoded products so that we can implement a low power multiplier with the smaller switching activity. Implementation results show the proposed multiplier can save maximally about $20\%$ power dissipation than a previous Booth multiplier.

Exploring the Feasibility of Neural Networks for Criminal Propensity Detection through Facial Features Analysis

  • Amal Alshahrani;Sumayyah Albarakati;Reyouf Wasil;Hanan Farouquee;Maryam Alobthani;Someah Al-Qarni
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.11-20
    • /
    • 2024
  • While artificial neural networks are adept at identifying patterns, they can struggle to distinguish between actual correlations and false associations between extracted facial features and criminal behavior within the training data. These associations may not indicate causal connections. Socioeconomic factors, ethnicity, or even chance occurrences in the data can influence both facial features and criminal activity. Consequently, the artificial neural network might identify linked features without understanding the underlying cause. This raises concerns about incorrect linkages and potential misclassification of individuals based on features unrelated to criminal tendencies. To address this challenge, we propose a novel region-based training approach for artificial neural networks focused on criminal propensity detection. Instead of solely relying on overall facial recognition, the network would systematically analyze each facial feature in isolation. This fine-grained approach would enable the network to identify which specific features hold the strongest correlations with criminal activity within the training data. By focusing on these key features, the network can be optimized for more accurate and reliable criminal propensity prediction. This study examines the effectiveness of various algorithms for criminal propensity classification. We evaluate YOLO versions YOLOv5 and YOLOv8 alongside VGG-16. Our findings indicate that YOLO achieved the highest accuracy 0.93 in classifying criminal and non-criminal facial features. While these results are promising, we acknowledge the need for further research on bias and misclassification in criminal justice applications

THE PEAK ENERGY-DURATION CORRELATION AND POSSIBLE IMPLICATIONS ON GAMMA RAY BURST PROGENITOR

  • Chang Heon-Young
    • Journal of Astronomy and Space Sciences
    • /
    • v.23 no.3
    • /
    • pp.167-176
    • /
    • 2006
  • We investigate the correlation between the peak energy and the burst duration using available long GRB data with known redshift, whose circumburst medium type has been suggested via afterglow light curve modeling. We find that the peak energy and the burst duration of the observed GRBs are correlated both in the observer frame and in the GRB rest frame. For our total sample we obtain, for instance, the Spearman rank-order correlation values ${\sim}0.75\;and\;{\sim}0.65$ with the chance probabilities $P=1.0{\times}10^{-3}\;and\;P=6.0{\times}10^{-3}$ in the observer frame and in the GRB rest frame, respectively. We note that taking the effects of the expanding universe into account reduces the value a bit. We further attempt to separate our GRB sample into the 'ISM' GRBs and the 'WIND' GRBs according to environment models inferred from the afterglow light curves and apply statistical tests, as one may expect that clues on the progenitor of GRBs can be deduced directly from prompt emission properties other than from the ambient environment surrounding GRBs. We find that two subsamples of GRBs show different correlation coefficients. That is, the Spearman rank-order correlation are ${\sim}0.65\;and\;{\sim}0.57$ for the 'ISM' GRBs and 'WIND' GRBs, respectively, after taking the effects of the expanding universe into account. It is not yet, however, statistically very much significant that the GRBS in two types of circumburst media show statistically characteristic behaviors, from which one may conclude that all the long bursts are not originated from a single progenitor population. A larger size of data is required to increase the statistical significance.

Application of Fuzzy Logic for Predicting of Mine Fire in Underground Coal Mine

  • Danish, Esmatullah;Onder, Mustafa
    • Safety and Health at Work
    • /
    • v.11 no.3
    • /
    • pp.322-334
    • /
    • 2020
  • Background: Spontaneous combustion of coal is one of the factors which causes direct or indirect gas and dust explosion, mine fire, the release of toxic gases, loss of reserve, and loss of miners' life. To avoid these incidents, the prediction of spontaneous combustion is essential. The safety of miner's in the mining field can be assured if the prediction of a coal fire is carried out at an early stage. Method: Adularya Underground Coal Mine which is fully mechanized with longwall mining method was selected as a case study area. The data collected for 2017, by sensors from ten gas monitoring stations were used for the simulation and prediction of a coal fire. In this study, the fuzzy logic model is used because of the uncertainties, nonlinearity, and imprecise variables in the data. For coal fire prediction, CO, O2, N2, and temperature were used as input variables whereas fire intensity was considered as the output variable.The simulation of the model is carried out using the Mamdani inference system and run by the Fuzzy Logic Toolbox in MATLAB. Results: The results showed that the fuzzy logic system is more reliable in predicting fire intensity with respect to uncertainties and nonlinearities of the data. It also indicates that the 1409 and 610/2B gas station points have a greater chance of causing spontaneous combustion and therefore require a precautional measure. Conclusion: The fuzzy logic model shows higher probability in predicting fire intensity with the simultaneous application of many variables compared with Graham's index.

Relationship between the Patients' Activities Daily Living and Family Burden, Social Support under (가정 간호 환자의 일상생활 수행정도와 가족의 부담감 및 사회적 지지와의 관계)

  • Ju Sung Ja
    • Journal of Korean Public Health Nursing
    • /
    • v.14 no.1
    • /
    • pp.131-146
    • /
    • 2000
  • The purpose of this study is to clarify the correlation between the degree of patients daily activities and that of a sense and social support of families. This study covers families of 252 patients under home health nursing care at 6 University Hospitals during the period of March to May. 1999. The data were collected by using three different questionnaires. Data were analysed by utilizing SAS program such as frequency. average. percentage. t-test. ANOVA. Scheffe test and Pearson Correlation Coefficient. The results were as follows: 1. The average score of patients' daily living activity was $2.36\pm0.67$. $97.2\%$ patients turned out to be. in part. dependent on their family's care. $66.5\%$ of the patients were still dependent on their families in walking: $66.3\%$ In bathing: and $61.0\%$ in using toilet. 2. The average score burdened family caregivers had felt was 2.25 in 4 full point which can be interpreted as average. Among the six burden dimensions. time was said to be the No. 1 burden-yielding factor. When it comes to the characteristics of patients. there were tendencies for patients with lower incomes residing in communal housing. with cerebrovasculal diseases and with higher score of daily living activity to show a higher burden scores. 3. The average score of social support was 2.49 in 5 point. which represents a average score. Among other items. the opportunity of social integration was 2.66. topping the list whereas a chance of upbringing was starkly low at 2.42. The higher scores of social support were shown in cases where the caregiver was male spouse. total care giving duration exceeded 25 months and malignant patients daily living activity scores were low. 4. The score of patients daily activity was positively correlated to the degree of the family burden (r=0.1942). Data indicates there was direct correlation between daily living activity and burden of time consuming, self-improving and physical impairment. 5. The score of the patients daily living was negatively correlated to the social support (r=0.3414), As a whole. there was negative correlation between social support and the formation of intimacy and self-confidence.

  • PDF

Meteorological Data Acquisition System for the Changkyeonggak (장경각 기상 자료 수집 체계)

  • Yu, Byung Yong;Jeon, Chai Ik;Lee, Kang Su;Shin, Kyo Cheol;Pyun, Chong Hong;Kim, Chang Hong
    • Journal of Conservation Science
    • /
    • v.5 no.1 s.5
    • /
    • pp.69-86
    • /
    • 1996
  • More than eighty thousands of wooden printing blocks of the Tripitaka Koreans are accommodated in the Changkyeonggak which consists of two open structured wooden buildings, Peoppojeon and Sudarajang. These blocks are virtually in pristine state even after three quarters of a millennium. The excellent preservation could be attributed to the careful preparation and meticulous finish of the blocks. But the meteorological environment or microclimate should be one of the key factors for the preservation. To keep the blocks intact as it is or at least do not accelerate the deterioration, we should study the blocks and its microclimatic environment supplied by the Changgyeonggak and the topology of the site. As a Part of this effort we designed a computerized meteorological data acquisition system, which can handle up to 4,096 sensors. A partial but operative installation of 16 temperature/humidity sensors was set up in the Peoppojeon. We hope to have a chance to install a full fledged system in the near future for the compilation of the fuller environmental data base.

  • PDF

Business Processes Automation and Analysis Techniques by Using BPM and SOA (BPM과 SOA기반의 비즈니스 프로세스 자동화와 분석기법)

  • Lee, Chung-Hun;Lee, Jong-Hak;Seo, Jeong-Man;Cho, Wan-Sup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.171-178
    • /
    • 2009
  • Recently, a combination of Business Process Management (BPM) and Service Oriented Architecture (SOA) is being recommended as the best approach for automating large business systems. And the need to create meaningful information from daily operational data is increased today. In this paper, we propose a methodology for automating business processes based on the BPM-SOA convergence trend and verify the methodology by implementing the project management business process. BPM-SOA convergence provides higher extensibility and productivity due to the loosely coupled system construction and maintenance. The system has good properties for frequent process changes and reuse of duplicate processes. We then analyze extensibility of the system as new business processes are added to the existing system. We finally analyze the data generated by BPM by using SAP business intelligence to support management's decision making and strategy. Business intelligence provides not only useful data for business decisions but also chance to optimize the business processes.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

Association of periodontitis with menopause and hormone replacement therapy: a hospital cohort study using a common data model

  • Ki-Yeol Park ;Min-Ho Kim;Seong-Ho Choi;Eun-Kyoung Pang
    • Journal of Periodontal and Implant Science
    • /
    • v.53 no.3
    • /
    • pp.184-193
    • /
    • 2023
  • Purpose: The present study was designed to compare the incidence of periodontitis according to menopausal status and to investigate the possible effect of hormone replacement therapy (HRT) on periodontitis in postmenopausal women using a common data model (CDM) at a single institution. Methods: This study involved retrospective cohort data of 950,751 patients from a 20-year database (2001 to 2020) of Ewha Womans University Mokdong Hospital converted to the Observational Medical Outcomes Partnership CDM. One-way analysis of variance models and the χ2 test were used to analyze the statistical differences in patient characteristics among groups. A time-dependent Cox regression analysis was used to calculate hazard ratios and 95% confidence intervals, and P values less than 0.05 were considered to indicate statistical significance. Results: Of the 29,729 patients, 1,307 patients were diagnosed with periodontitis and 28,422 patients were not. Periodontitis was significantly more common among postmenopausal patients regardless of HRT status than among the non-menopausal group (P<0.05). Time-dependent Cox regression analysis showed that the postmenopausal patients had a significantly higher chance of having periodontitis than non-menopausal patients (P<0.05), but after adjustment for age, body mass index, and smoking status, the difference between the non-menopausal and post-menopausal HRT-treated groups was insignificant (P=0.140). Conclusions: Postmenopausal women had a significantly greater risk of periodontitis than non-menopausal women. Additionally, the use of HRT in postmenopausal women could reduce the incidence of periodontitis.