• Title/Summary/Keyword: Key task

Search Result 529, Processing Time 0.023 seconds

An Interpretable Bearing Fault Diagnosis Model Based on Hierarchical Belief Rule Base

  • Boying Zhao;Yuanyuan Qu;Mengliang Mu;Bing Xu;Wei He
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1186-1207
    • /
    • 2024
  • Bearings are one of the main components of mechanical equipment and one of the primary components prone to faults. Therefore, conducting fault diagnosis on bearings is a key issue in mechanical equipment research. Belief rule base (BRB) is essentially an expert system that effectively integrates qualitative and quantitative information, demonstrating excellent performance in fault diagnosis. However, class imbalance often occurs in the diagnosis task, which poses challenges to the diagnosis. Models with interpretability can enhance decision-makers' trust in the output results. However, the randomness in the optimization process can undermine interpretability, thereby reducing the level of trustworthiness in the results. Therefore, a hierarchical BRB model based on extreme gradient boosting (XGBoost) feature selection with interpretability (HFS-IBRB) is proposed in this paper. Utilizing a main BRB alongside multiple sub-BRBs allows for the conversion of a multi-classification challenge into several distinct binary classification tasks, thereby leading to enhanced accuracy. By incorporating interpretability constraints into the model, interpretability is effectively ensured. Finally, the case study of the actual dataset of bearing fault diagnosis demonstrates the ability of the HFS-IBRB model to perform accurate and interpretable diagnosis.

Impact on societal system and rapid response strategies for the recovery: Cases of rapid vaccine development programme (시스템 충격과 회복을 위한 신속대응 전략: 백신 신속개발 프로그램 사례연구)

  • Inyong Park;Mi-young Park
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.20 no.1
    • /
    • pp.34-49
    • /
    • 2024
  • Since the outbreak of COVID-19, 'overcoming infectious disease' has emerged as a priority task for most policies. Each country has implemented policy programs to significantly shorten the vaccine development period with the goal of rapid vaccine development. This study judged this process to be a shock to the existing social and technological system and its recovery. Accordingly, the United States' Operation Warp Speed, CEPI's 100 days mission, and Japan's SCARDA were selected as examples of policy programs with 'rapid vaccine development' as their mission and analyzed difference from traditional vaccine development system in terms of rapid development. As a result, it was confirmed that the accumulation of innovative resources was shared as the key to achieving the mission in the preparation stage before the outbreak of an infectious disease. However, it was also possible to discover an approach to shortening the period of each stage without fundamentally changing the vaccine development structure itself.

A Study on Technology Transfer in IT Industry (IT 산업계의 기술이전에 관한 연구)

  • Sung, Tae-Kyung
    • Management & Information Systems Review
    • /
    • v.28 no.3
    • /
    • pp.45-68
    • /
    • 2009
  • The Korean government is actively pursuing an ambitious IT strategy to establish Korea as one of the leaders in the world IT market. To implement the strategy, successful technology transfer from research institutions to market should be achieved. Comprehensive literature identifies sixteen variables affecting the process and results of technology transfer. The research results in four key factors in technology transfer: Communication, Distance, Equivocality, and Motivation. Communication refers to the degree to which a medium is able to efficiently and accurately conveys task-relevant information and media while distance involves both physical and cultural proximity. Equivocality refers to the degree of concreteness of technology to be transferred while motivation involves incentives for and the recognition of the importance of technology transfer activities. Further analysis shows that there are four distinctive clusters and they show very contrasting characteristics in terms of four key factors. The careful mapping of the four clusters on the four key factors show very informative technology transfer patterns, the Technology Transfer Grid.

  • PDF

Needs Analysis Case Using Key Competencies of National Competency Standards (국가직무능력표준(NCS) 직업기초능력 기반의 직군별 요구역량 : 국내 대기업 A사를 중심으로)

  • Yoon, Duk-Won;Woo, Hye-Jung;Ghang, Bong-Jun;Kim, Yoon-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.383-398
    • /
    • 2016
  • The objective of this research is to depict examples of how a company could derive the skillset areas with the highest priority when analyzing the skill set requirements of human resources, based on the skillset requirements that are unique to each work site. For this purpose, a survey was conducted for each of the job categories for new employee in A company. The analysis results showed that in 32 out of the 34 areas, the gaps between the current levels and the expected levels were statistically significant. For employees of company A, the following 7 areas were determined to be the key job competencies with the highest priority: document creation skills, diagram creation skills, thinking skills, problem solving skills, time management skills, technology comprehension ability, and task comprehension skills. The required job competencies with the highest priority were found to be different for each job category. As a result of this research, the priority rankings of skillset requirements for each job category in company A could be determined, along with the implications for HRD/HRM and other companies.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

Comparison of the Neural Substrates Mediating the Semantic Processing of Korean and English Words Using Positron Emission Tomography (양전자방출단층촬영을 이용한 국어단어와 영어단어의 어의처리 신경매개체의 특성 비교)

  • Kim, Jea-Jin;Kim, Myung-Sun;Cho, Sang-Soo;Kwon, Jun-Soo;Lee, Jae-Sung;Lee, Dong-Soo;Chung, June-Key;Lee, Myung-Chul
    • The Korean Journal of Nuclear Medicine
    • /
    • v.35 no.3
    • /
    • pp.142-151
    • /
    • 2001
  • Purpose: This study was performed to search the relatively specific brain regions related to the semantic processing of Korean and English words on the one hand and the regions common to both on the other. Materials and Methods: Regional cerebral blood flow associated with different semantic tasks was examined using $[^{15}O]H_2O$ positron omission tomography in 13 healthy volunteers. The tasks consisted of semantic tasks for Korean words, semantic tasks for English words and control tasks using simple pictures. The regions specific and common to each language were identified by the relevant subtraction analysis using statistical parametric mapping. Results: Common to the semantic processing of both words, the activation site was observed in the fusiform gyrus, particularly the left side. In addition, activation of the left inferior temporal gyrus was found only in the semantic processing of English words. The regions specific to Korean words were observed in multiple areas, including the right primary auditory cortex; whereas the regions specific to English words were limited to the right posterior visual area. Conclusion: Internal phonological process is engaged in performing the visual semantic task for Korean words of the high proficiency, whereas visual scanning plays an important role in performing the task for English words of the low proficiency.

  • PDF

Issues on User Participation in Korean Disability Services : Implications from UK Community Care (영국 커뮤니티케어의 이용자 참여 기제와 한국 장애인복지서비스에 대한 함의)

  • Kim, Yong-Deug
    • Korean Journal of Social Welfare
    • /
    • v.57 no.3
    • /
    • pp.363-387
    • /
    • 2005
  • The purpose of this study is to find out implications which can be useful for enhancement of user participation in Korean disability services from UK community care experience. In Korea, until recently dominant issue on social services always has been the shortage of service provision. But during the recent 20 years, we experienced great expansion in quantity, as though it may be not yet enough. And more recently, disabled people and organizations began to actively argue for appropriate service in quantity and quality. Now, Korean disability policy and practice are confronted to the difficult and embarrassing task how to meet the need of disabled people with limited resources, and how to response to the disabled people's voice arguing on independence and choice. This task would require somewhat deliberate reform which might be quite different from previous one. UK's experience of implementation and development of community care system would give meaningful implications to Korean disability service policy and practice related to user participation. The results of the review on user participation issues in the UK community care give several implications to Korean disability services. Above all, consumerist approach which is the key strategy adopted by UK community care change is not appropriate for Korean disability service because of largely different service environment. The second implication is about decentralization. To enable decentralization of social service leads to enhancement of user involvement avoiding a lowering of service quality, prerequisite conditions should be secured. A third is securing and making declaration on the disabled person's right to assessment and constructing public service system operated by case management process. Fourth, formalized complaints procedure should be established. Fifth, professional education which enables professionals to encourage participation of disabled people should be developed, and the role of disability movement leading disabled users to participate on their services also should be highlighted.

  • PDF

A STUDY ON PLANNING AND IMPLEMENTATION OF COMPUTERIZATION OF LIBRARY WORK FOR UNIVERSITY LIBRARIES IN KOREA (우리나라 대학도서관 업무의 전산화 및 그 실현에 관한 연구)

  • Young Hong Soon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.12
    • /
    • pp.165-200
    • /
    • 1985
  • We have come to the time when we no longer ask why we computerize, but we need to concentrate on how to effectively accomplish the task. Application of computers has been very active in many fields in Korea during the last few years. And yet libraries are rather slow in taking adventage of computers most likely due to the lack of adequate funds and proper understanding of administrators, but also it seems that the majority of librarians are not quite prepared to adopt it. The purpose of this paper is to study the various aspects of computerization of library work, mainly for library administrators and librarians; although they need not understand the electronical and technical aspects of computers, but they should prepare themselves enough at least to be able to make proper requests to computer specialists in relation to what they want to accomplish with computers in order to improve the work of the library. In preparing this paper, not only successful cases of computer application which had been carried out in many libraries of advanced countries have been studied, but also various reasons for failure have been reviewed in order not to make the same mistakes. The paper covers those areas of library work where computers can be applied, such as feasibility, cost effectiveness, planning, implementation and some other aspects of computerization. As a conclusion, two viewpoints need to be discussed. First, each library should work cooperatively with other libraies instead of trying to develop its own computer programs, since we cannot affort to waste financial and technical resources as well as time. Computer applicable library work can be divided and assumed by certain libraries with responsibility to develop turn-key systems applicable to Korean university libraries. In order to carry out this task, there should be complete financial assistance from government, and in turn those libraries shouldf be required to offer assistance to any other interested libaries in Korea. Secondly, library school curriculum should offer such courses where future librarians can learn decision making, business administration and independent thinking in addition to traditional courses. Future librarians as well as those who are already in the profession should prepare themselves to meet the challenge of the professional requirements in order to meet the ever increasing and diverse needs for good quality service generated from the library users.

  • PDF

Performance Analysis of Fast Handover Scheme Based on Secure Smart Mobility in PMIPv6 Networks (프록시 모바일 IPv6 네트워크에서 안전한 스마트 이동성에 기반한 빠른 핸드오버 기법의 성능분석)

  • Yoon, KyoungWon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.121-133
    • /
    • 2013
  • Defect-free transfer service on the Next-generation wireless network extensive roaming mobile node (MN) to provide efficient mobility management has become very important. MIPv6(Mobility IPv6) is one of mobility management scheme proposed by IETF(Internet Engineering Task Force), and IPv6-based mobility management techniques have been developed in various forms. One of each management techniques, IPv6-based mobility management techniques for PMIPv6 (MIPv6) system to improve the performance of a variety of F-PMIPv6 (Fast Handover for Proxy MIPv6) is proposed. However, the F-PMIPv6 is cannot be excellent than PMIPv6 in all scenarios. Therefor, to select a proper mobility management scheme between PMIPv6 and F-PMIPv6 becomes an interesting issue, for its potenrials in enhancing the capacity and scalability of the system. In this paper, we develop an analytical model to analyze the applicability of PMIPv6 and F-PMIPv6. Based on this model, we design an Secure Smart Mobility Support(SSM) scheme that selects the better alternative between PMIPv6 and F-PMIPv6 for a user according to its changing mobility and service characteristics. When F-PMIPv6 is adopted, SSM chooses the best mobility anchor point and regional size to optimize the system performance. Numerical results illustrate the impact of some key parameters on the applicability of PMIPv6 and F-PMIPv6. Finally, SSM has proven even better result than PMIPv6 and F-PMIPv6.

A Maximally Disjoint Multipath Routing Protocol Based on AODV in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서의 AODV 기반 치대 비중첩 다중경로 라우팅 프로토콜)

  • Kim Jungtae;Moh Sangman;Chung Ilyong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.429-436
    • /
    • 2005
  • A mobile ad hoc network (MANET) is a collection of mobile nodes without any fixed infrastructure or my form of centralized administration such as access points and base stations. The ad hoc on-demand distance vector routing (AODV) protocol is an on-demand routing protocol for MANETs, which is one of the Internet-Drafts submitted to the Internet engineering task force (IETF) MANET working group. This paper proposes a new multipath routing protocol called maximally disjoint multipath AODV (MDAODV), which exploits maximally node- and link-disjoint paths and outperforms the conventional multipath protocol based on AODV as well as the basic AODV protocol. The key idea is to extend only route request (RREQ) message by adding source routing information and to make the destination node select two paths from multiple RREQs received for a predetermined time period. Compared to the conventional multipath routing protocol, the proposed MDAODV provides more reliable and robust routing paths and higher performance. It also makes the destination node determine the maximally node- and link-disjoint paths, reducing the overhead incurred at intermediate nodes. Our extensive simulation study shows that the proposed MDAODV outperforms the conventional multipath routing protocol based on AODV in terms of packet delivery ratio and average end-to-end delay, and reduces routing overhead.