• 제목/요약/키워드: Enhancing data

검색결과 2,520건 처리시간 0.029초

Development of Personal-Credit Evaluation System Using Real-Time Neural Learning Mechanism

  • Park, Jong U.;Park, Hong Y.;Yoon Chung
    • 정보기술과데이타베이스저널
    • /
    • 제2권2호
    • /
    • pp.71-85
    • /
    • 1995
  • Many research results conducted by neural network researchers have claimed that the classification accuracy of neural networks is superior to, or at least equal to that of conventional methods. However, in series of neural network classifications, it was found that the classification accuracy strongly depends on the characteristics of training data set. Even though there are many research reports that the classification accuracy of neural networks can be different, depending on the composition and architecture of the networks, training algorithm, and test data set, very few research addressed the problem of classification accuracy when the basic assumption of data monotonicity is violated, In this research, development project of automated credit evaluation system is described. The finding was that arrangement of training data is critical to successful implementation of neural training to maintain monotonicity of the data set, for enhancing classification accuracy of neural networks.

  • PDF

XML 기반의 생물정보학시스템 (XML-BASED BIOINFORMATIC SYSTEMS)

  • 신종환;정무영
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 2002년도 춘계공동학술대회
    • /
    • pp.301-305
    • /
    • 2002
  • Bioinformatics can beexplained as the science of developing algorithms, applicatiou tools, and computer databases and so on, for the purpose of supporting and enhancing biological research. Bioinformatic information systems (BIS) typically handle large data sets and the amount of the data goes up exponentially. Another impediment to easy extraction and retrieval of genomic data in BIS is the need to access different sites for similar information. Recently. there has been some attempts to integrate bioinformatics data in the World Wide Web (WWW) among the bioinformatics community by the internet computing technology. However, the work to integrate bioinformatics data on a universal platform has some problems because of the lack of standard, terminologies, semantics, and ontologies about bioinformatics. In this paper, an XML-based BIS architecture is proposed as an integrated BIS framework. The XML and related technologies allow the creation of meaningful information tags to exchange data between various databases as a standard format, and to create more simple interfaces. This integrated BIS framework has bioinformatic architectural components which is used in the Corporate Information Factory (CIF) method.

  • PDF

Multi-block Analysis of Genomic Data Using Generalized Canonical Correlation Analysis

  • Jun, Inyoung;Choi, Wooree;Park, Mira
    • Genomics & Informatics
    • /
    • 제16권4호
    • /
    • pp.33.1-33.9
    • /
    • 2018
  • Recently, there have been many studies in medicine related to genetic analysis. Many genetic studies have been performed to find genes associated with complex diseases. To find out how genes are related to disease, we need to understand not only the simple relationship of genotypes but also the way they are related to phenotype. Multi-block data, which is a summation form of variable sets, is used for enhancing the analysis of the relationships of different blocks. By identifying relationships through a multi-block data form, we can understand the association between the blocks in comprehending the correlation between them. Several statistical analysis methods have been developed to understand the relationship between multi-block data. In this paper, we will use generalized canonical correlation methodology to analyze multi-block data from the Korean Association Resource project, which has a combination of single nucleotide polymorphism blocks, phenotype blocks, and disease blocks.

Quantifying Values from BIM-projects life cycle with cloud-based computing

  • Choi, Michelle Mang Syn;Kim, Inhan
    • 국제학술발표논문집
    • /
    • The 6th International Conference on Construction Engineering and Project Management
    • /
    • pp.271-275
    • /
    • 2015
  • A variety of evaluation application and initiatives on the adoption of Building Information Modelling (BIM) have been introduced in recent years. Most of which however, focused mainly on evaluating design to construction phase-processes, or BIM utilization performances. Through studying existing publications, it is found that continuous utilization of BIM data throughout the building's life cycle is comparatively less explored or documented. Therefore, this study looks at improving this incomplete life cycle condition with the concept that accumulated BIM data should be carried forward and statistically quantified for cross comparison, in order to facilitate practitioners to better improve the projects the future. Based on this conceptual theory of moving towards a closedloop BIM building life cycle, this study explores, through existing literature, the use of cloud based computing as the means to quantify and adaptively utilize BIM data. Categorization of BIM data relations in adaptive utilization of BIM data is then suggested as a initial step for enhancing cross comparison of BIM data in a cloud environment.

  • PDF

저압용 SPD가 설치된 전력선통신에서 데이터전송 성능 향상 (A Method for Enhancing Data Transmission Performance in the Power-Line Communication Channel with Low-Voltage Surge Protective Devices)

  • 최종민;전태현
    • 조명전기설비학회논문지
    • /
    • 제26권2호
    • /
    • pp.78-85
    • /
    • 2012
  • Low-Voltage power lines should equip surge protection devices which protect electronic equipments and human lives against lightning and abnormal voltages. Data transmission capacity of the power line is determined by frequency characteristics of the surge protective devices. To analyze the effects of surge protective devices on the data transmission performance, various combinations of installation methods are tested which include ZnO varistor elements that is compatible with class I, class II and class III. The result claims that ZnO varistor for class III is found to be one of the main factors that deteriorates the transmission performance. To overcome this problem a serial connection methed between Gap type SPD and ZnO varistor is proposed. With the proposed scheme, laboratory experimental results show that the data transmission performance can be improved up to 91.9[%] with proper SPD combination.

콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법 (A Content-Name Encoding Scheme for CCN)

  • 김대엽
    • 한국멀티미디어학회논문지
    • /
    • 제17권6호
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

효율향상 프로그램의 성과계량검증을 위한 계측자료 보정 기법 (A Measuring Data Calibration Technique for Measurement and Verification of Energy-Efficiency Programs)

  • 조기선;박종진;이창호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 제36회 하계학술대회 논문집 A
    • /
    • pp.834-836
    • /
    • 2005
  • This paper describes algorithms for enhancing the reliability of measurements to verify the performance of energy efficiency programs with an simple method. Fundamentally, measurements contain erroneous data because of the various causes. and so proper procedures or schemes are prepared before the performance is evaluated. In this paper, we propose an approach for detecting and correcting an adulterate data, such as missing and bad data. Erroneous data are detected or corrected by pre-described measuring conditions, ensemble average, and standard deviation of measurements at measuring time. The proposed algorithms are tested by field test measurements. From case studies we drew the promising results.

  • PDF

배전원격관리를 위한 차세대 디지털 적산전력계 설계 (A Study on the Design of Advanced Digital Kwh-Meter for the Remote Management of Distribution System)

  • 고윤석;임철수;김관호;윤상문;서성진
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 하계학술대회 논문집 A
    • /
    • pp.238-240
    • /
    • 2002
  • This paper proposes an advanced digital kwh-meter, which records voltage management data, load management data as well as the existing kwh data. This meter supports the requests from DRMS (Distribution Remote Management System) which include kwh meter reading, voltage management data reading, and load management data reading request, it can enhance greatly the economics of the existing remote meter reading system. Also it can improve highly the quality of power supplied to the electric customer by minimizing the voltage management cost and by enhancing the efficiency of load management.

  • PDF

여과기법 보안효율을 높이기 위한 센서네트워크 클러스터링 방법 (Enhancing Method to make Cluster for Filtering-based Sensor Networks)

  • 김병희;조대호
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2008년도 정보통신설비 학술대회
    • /
    • pp.141-145
    • /
    • 2008
  • Wireless sensor network (WSN) is expected to be used in many applications. However, sensor nodes still have some secure problems to use them in the real applications. They are typically deployed on open, wide, and unattended environments. An adversary using these features can easily compromise the deployed sensor nodes and use compromised sensor nodes to inject fabricated data to the sensor network (false data injection attack). The injected fabricated data drains much energy of them and causes a false alarm. To detect and drop the injected fabricated data, a filtering-based security method and adaptive methods are proposed. The number of different partitions is important to make event report since they can make a correctness event report if the representative node does not receive message authentication codes made by the different partition keys. The proposed methods cannot guarantee the detection power since they do not consider the filtering scheme. We proposed clustering method for filtering-based secure methods. Our proposed method uses fuzzy system to enhance the detection power of a cluster.

  • PDF

An Intelligent Machine Learning Inspired Optimization Algorithm to Enhance Secured Data Transmission in IoT Cloud Ecosystem

  • Ankam, Sreejyothsna;Reddy, N.Sudhakar
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.83-90
    • /
    • 2022
  • Traditional Cloud Computing would be unable to safely host IoT data due to its high latency as the number of IoT sensors and physical devices accommodated on the Internet grows by the day. Because of the difficulty of processing all IoT large data on Cloud facilities, there hasn't been enough research done on automating the security of all components in the IoT-Cloud ecosystem that deal with big data and real-time jobs. It's difficult, for example, to build an automatic, secure data transfer from the IoT layer to the cloud layer, which incorporates a large number of scattered devices. Addressing this issue this article presents an intelligent algorithm that deals with enhancing security aspects in IoT cloud ecosystem using butterfly optimization algorithm.