• Title/Summary/Keyword: Next-Generation

Search Result 5,371, Processing Time 0.04 seconds

Development and Utilization of Evaluation Methods for Offshore Wind Farm Landscape Quality Assessment (해상풍력발전단지 경관의 질 평가를 위한 평가기법의 개발 및 활용방안)

  • Jin-Oh Kim;Byoungwook Min;Kyung-Sook Woo;Jin-Pyo Kim
    • Journal of Environmental Impact Assessment
    • /
    • v.32 no.6
    • /
    • pp.577-589
    • /
    • 2023
  • In Korea, the technical techniques for assessing visual impacts are standardized, but the methods for assessing the marine landscape itself are not standardized and need to be improved. In particular, in the landscape impact assessment of offshore wind power generation in Korea, it is necessary to recognize the landscape itself as a receptor and prepare a system that can evaluate the characteristics and sensitivity of the landscape. In this study, we propose an evaluation method for preparing a marine landscape quality assessment document that reflects the project characteristics of offshore wind power projects, and examine the possibility of utilization by applying it to actual project sites as an example. To evaluate the quality of marine scenery in offshore wind power projects, evaluation items of landscape characteristics, physical characteristics, and socio-cultural characteristics were evaluated based on the preliminary survey contents, and the quality of marine scenery was divided into five grades. Next, the evaluation criteria of the evaluation items were synthesized and the quality of the marine landscape was classified into preservation grade (grade 5), semi-preservation grade (grade 4), buffer grade (grade 3), semi-improvement grade (grade 2), and improvement grade (grade 1). In addition, the Sinan-Ui Offshore Wind Farm, an actual project site, was randomly selected to conduct the evaluation process and examine its utilization. This study aims to complement the existing method of visual impact assessment in offshore wind power projects and evaluate the quality of the marine landscape itself to effectively conserve marine landscape resources during offshore wind power projects. Rather than relying on mechanical and quantitative evaluation, this study is expected to be used as a basis for comprehensive understanding of the location and socio-cultural characteristics of the project site and for communication and cooperation with stakeholders.

A Study of Myth of King Heokgeose, the Founder of Shilla Dynasty from a Perspective of Analytical Psychology (신라 시조 혁거세왕 신화에 대한 분석심리학적 연구)

  • Sang Ick Han
    • Sim-seong Yeon-gu
    • /
    • v.28 no.1
    • /
    • pp.50-87
    • /
    • 2013
  • C. G. Jung believed that universal and basic condition of human's Unconscious comes out from Märchen or mythology. We can easily experience these universality of human nature in dreams. Therefore, It is very important to interpret mythogens that appear in myths and märchen in analytical psychology to understand these 'big dreams' which could be seen in clinical practice. As I was interested in interpreting myths in analytic psychology, I tried to find universality of archetypes in Korea's traditional folk tales and took note of the birth myth of Hyeokgeose, the founder of Shilla dynasty, while examining the chater of the Unsual in history in the Heritage of the Three Kingdoms. Shilla was founded earlier than two other countries, but it was located in the very south of the Korean Peninsula, and it was behind times in politically, militarily, and culturally compare to Goguryeo and Baekje. However, Shilla achieved unifying the Three Kingdoms and it lasted 1000 years, the longest unified history in Korean history. I tried to examine archetypes in the birth myth if there are any backgrounds that are related to finding a Shilla Kingdom. It is noted that myth of the founder of Korean Peninsula's small Kingdom Shilla has complete story from before the birth to birth, birth of spouse, growth, marriage, accession, governing, death, after death, and succession. Symbols such as numbers 1, 3, 5, 6, 7, 13 and 61, various azimuthes including north, west, south, east, and central, animals like tiger, white horse, hen, dragon, phoenix, and snakes, natures like main symbol egg, rock, gourd, lightening, spring water, stream, tree, forest, mountain, iron and goddess-image like seon-do Holy Mother gradually appears in the myth. These symbols could show a meaning of human experience such as birth of Conscious, growth and development of paternal and maternal love, and story of regeneration and extinction. Moreover, It could be seen as these progress eternally continues in next generation. I have found out that a word, a sentence or stories that looks meaningless in myth revealed its true symbolical meaning. In addition, interaction between Unconscious and Conscious repeats in different forms, and expressed in layered.

Development of a complex failure prediction system using Hierarchical Attention Network (Hierarchical Attention Network를 이용한 복합 장애 발생 예측 시스템 개발)

  • Park, Youngchan;An, Sangjun;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.127-148
    • /
    • 2020
  • The data center is a physical environment facility for accommodating computer systems and related components, and is an essential foundation technology for next-generation core industries such as big data, smart factories, wearables, and smart homes. In particular, with the growth of cloud computing, the proportional expansion of the data center infrastructure is inevitable. Monitoring the health of these data center facilities is a way to maintain and manage the system and prevent failure. If a failure occurs in some elements of the facility, it may affect not only the relevant equipment but also other connected equipment, and may cause enormous damage. In particular, IT facilities are irregular due to interdependence and it is difficult to know the cause. In the previous study predicting failure in data center, failure was predicted by looking at a single server as a single state without assuming that the devices were mixed. Therefore, in this study, data center failures were classified into failures occurring inside the server (Outage A) and failures occurring outside the server (Outage B), and focused on analyzing complex failures occurring within the server. Server external failures include power, cooling, user errors, etc. Since such failures can be prevented in the early stages of data center facility construction, various solutions are being developed. On the other hand, the cause of the failure occurring in the server is difficult to determine, and adequate prevention has not yet been achieved. In particular, this is the reason why server failures do not occur singularly, cause other server failures, or receive something that causes failures from other servers. In other words, while the existing studies assumed that it was a single server that did not affect the servers and analyzed the failure, in this study, the failure occurred on the assumption that it had an effect between servers. In order to define the complex failure situation in the data center, failure history data for each equipment existing in the data center was used. There are four major failures considered in this study: Network Node Down, Server Down, Windows Activation Services Down, and Database Management System Service Down. The failures that occur for each device are sorted in chronological order, and when a failure occurs in a specific equipment, if a failure occurs in a specific equipment within 5 minutes from the time of occurrence, it is defined that the failure occurs simultaneously. After configuring the sequence for the devices that have failed at the same time, 5 devices that frequently occur simultaneously within the configured sequence were selected, and the case where the selected devices failed at the same time was confirmed through visualization. Since the server resource information collected for failure analysis is in units of time series and has flow, we used Long Short-term Memory (LSTM), a deep learning algorithm that can predict the next state through the previous state. In addition, unlike a single server, the Hierarchical Attention Network deep learning model structure was used in consideration of the fact that the level of multiple failures for each server is different. This algorithm is a method of increasing the prediction accuracy by giving weight to the server as the impact on the failure increases. The study began with defining the type of failure and selecting the analysis target. In the first experiment, the same collected data was assumed as a single server state and a multiple server state, and compared and analyzed. The second experiment improved the prediction accuracy in the case of a complex server by optimizing each server threshold. In the first experiment, which assumed each of a single server and multiple servers, in the case of a single server, it was predicted that three of the five servers did not have a failure even though the actual failure occurred. However, assuming multiple servers, all five servers were predicted to have failed. As a result of the experiment, the hypothesis that there is an effect between servers is proven. As a result of this study, it was confirmed that the prediction performance was superior when the multiple servers were assumed than when the single server was assumed. In particular, applying the Hierarchical Attention Network algorithm, assuming that the effects of each server will be different, played a role in improving the analysis effect. In addition, by applying a different threshold for each server, the prediction accuracy could be improved. This study showed that failures that are difficult to determine the cause can be predicted through historical data, and a model that can predict failures occurring in servers in data centers is presented. It is expected that the occurrence of disability can be prevented in advance using the results of this study.

Epidemiological Studies of Clonorchiasis - II. Current Status and Natural Transition of the Endemicity of Clonorchis sinensis in Goyang Gun, a Low Endemic Area in Korea (간흡충증(肝吸虫症) 역학(疫學) - II. 저도유행지(低度流行地) 고양지방(高陽地方)에 있어서의 간흡충감염(肝吸虫感染)의 현황(現況)과 자연추이(自然推移))

  • Kim, D.C.;Lee, O.Y.;Lee, J.S.;Ahn, J.S.;Chang, Y.M.;Son, S.C.;See, S.H.
    • Journal of agricultural medicine and community health
    • /
    • v.8 no.1
    • /
    • pp.66-80
    • /
    • 1983
  • As a part of the epidemiological studies of clonorchiasis in Korea, this study was conducted to evaluate the current endemicity and the natural transition of the Clonorchis infection in Goyang Gun a low endemic area in recent years, prior to the introduction of praziquantel which will eventually influence to the status of the prevalence. The data obtained in this study in 1983 were evaluated for natural transition of the infection in comparison with those obtained 16 years ago in 1967 by the author (Kim, 1974). The areas of investigation, villages and schools surveyed, methods and techniques used in this study were the same as in 1967, except for the contents of the questionnaire for raw freshwater fish consumption by the local inhabitants. 1) The current prevalence rate of Clonorchis infection among the inhabitants was 7.5% on the average out of a total of 479 persons examined. The prevalence rate was 9.0% in the riverside area and 4.2% in the inland area. Among the schoolchildren, the prevalence rate was 1.1% out of a total of 1 319 examined. By area, it was 1.4% in the riverside area and 0.7% in the inland area. By sex, the prevalence rate was 13.3% in the male and 1.3% in the female in the inhabitants and no difference was seen in the schoolchildren. 2) In the natural transition of the infection, the prevalence rate in the inhabitants has decreased from 22.5% in 1967 to 7.5% in 1983, and in the schoolchildren, from 9.5% in 1967 to 1.1% in 1983. The reduction rate was higher in the riverside area than in the inland area. 3) In the prevalence rate by age, 1.2% was seen in the 10-14 age group and gradually increased to 8.1% in the 30-39 age group and reached peak 18.1% in the 40-49 age group. By sex, in the male, the prevalence rates have increased to 31.9% and 33.3% in the 40-49 and 50-59 age groups, respectively and decreased thereafter. In the female, the prevalence rate less than 5% was seen only in between the 10-14 and 30-39 age groups. 4) In the natural transition of the prevalence rate by age, sharp decrease was seen in the male from around 50% in 1967 between 15-19 and 30-39 age groups. The generation over 40s showed less decrease. In the female, the prevalence rate has decreased from 13% in 1967 to 5% in 1983 in the middle age groups and dropped to 0% in the rest of the age groups. 5) The intensity of the infection among clonorchiasis cases by mean EPmg (number of eggs per mg feces) value was 1.4. In the inhabitants, the value was 2.0 in the riverside area and 0.4 in the inland area. While in the schoolchildren, the value was 0.2 in both riverside and inland areas. 6) In the transition of the intensity of the infection, EPmg among the inhabitants has decreased from 3.9 in 1967 to 2.0 in 1983 in the riverside area, and from 2.9 to 0.4 in the inland area. In the schoolchildren, the reduction was similar in both riverside and inland areas resulting from 1.0-1.1 in 1967 to 0.2 in 1983. 7) In the intensity of the infection by age, EPmg 3.4 was peak at the 40-49 age group and 0.2-1.0 was seen in the rest of the age groups. The mean value was 1.5 in the male and 0.6 in the female. 8) In the natural transition of the intensity of the infection, the EPmg has decreased from 2.7 in 1967 to 1.4 in 1983. By age, reduction was seen in all of the age groups, particularly in the young and the old age groups of 50s and over, except in the 40-49 age group in which reverse phenomenon was seen. By sex, it has decreased from 3.5 in 1967 to 1.5 in 1983 in the male and from 1.0 to 0.6 in the female. 9) In the distribution of the clonorchiasis cases by the range of EPmg value, 70.3% of the cases were placed in the range of 0.1-0.9 as the most and 16.2% in 1.0-4.9 as the next. With such figures, those included in the range less than 0.9 as light infection were 78.4% and under 5.0-9.9 up to moderate infection 99.3% of the cases were covered. The cases were distributed up to 20.0-39.9 in the male and to 1.0-4.9 in the female. 10) In the transition of the distribution of the clonorchiasis cases by EPmg, the highest intensity reached up to 60.0-79.9 in 1967 and to 20.0-39.9 in 1983. In the range of light infection, under 0.1-0.9, the distribution in rate was 64.5% in 1967 and 78.4% in 1983. Up to the range of moderate infection, under 5.0-9.9, 91.7% in 1967 and 97.3% in 1983 were seen respectively. 11) In a survey for raw freshwater fish consumption among the local inhabitants,78.3 of the clonorchiasis cases interviewed admitted their experience of the raw consumption. However, those who practised in the past two years were 34.8% 55.6% of those who have such experience in the past professed that they did not practise raw freshwater fish consumption in the past two years. 12) The major cause of the reduction of the raw freshwater fish consumption among the inhabitants were the wide spread water pollution in the locality. The most common reason professed for stopping raw freshwater fish consumption among the inhabitants was the risk of the fluke infection. 13) In animal survey, 3.1% of dogs were found infected with Clonorchis, decreasing from 21.6% in 1967. 14) The distribution of the first intermediate host, Parafossarulus manchouricus has greatly diminished in this locality and found only in two localized ponds. No Clonorchis infection was found from the snails examined. 15) The second intermediate freshwater fish host has been further limited by extended water pollution. No susceptible fish host could be examined. 16) In conclusion, the endemicity of Clonorchis infection in Croyang Gun, low endemic area, has significantly decreased during the past 16 years. The major cause of the regressive transition of the infection was the water pollution of the freshwater system of this locality. This has upset the ecosystems of the intermediate host of Clonorchis sinensis in many areas of waterbodies and further discouraged to a significant extent the local inhabitants from raw freshwater fish consumption.

  • PDF

Studies on Biology and Control of the Mulberry Small Weevil, Baris deplanata ROELOFS (Coleoptera: Curculionidae) (뽕나무애바구미의 생태 및 방제에 관한 연구)

  • 백현준;백운하
    • Journal of Sericultural and Entomological Science
    • /
    • v.18 no.2
    • /
    • pp.65-78
    • /
    • 1976
  • The mulberry small weevil, Baris deplanata ROELOFS, has highly infested mulberry trees in Korea. As the damage caused by the mulberry small weevil in mulberry fields has been increased over the country since 1969, the authors has carried out a series of biological and controlling studies on the pest from 1971 to 1972. The results obtained are summarized as follows. 1. The adult weevil is elongate oval in shape with black in color and the probocis is long as usual in curculionidae. The size of adult female is 3.30${\pm}$0.04mm in length, 1.47${\pm}$0.04mm in width, and the length of proboscis is 1.25${\pm}$0.014mm, while adult male is 3.28${\pm}$0.06mm in length, 1.40${\pm}$0.04mm in width, and the length of proboscis is 1.30${\pm}$0.02mm. The antenna is geniculate consisting of 12 segments. The terminal sternite of the abdomen has a pointed tip in male but not in female. 2. The egg is long oval in shape, milky white in color, 0.51${\pm}$0.05mm in length and 0.32${\pm}$0.02mm in width. 3. The mature larva is cylindrical and light yellowow in color except the head of dark brown, and legless, 3.88${\pm}$0.06mm in length, 1.40${\pm}$0.02mm width, each segment bearing many wrinkless and short setae. 4. The pupa is long oval, milky white and exarate, 3.53${\pm}$0.09 in length, 1.40${\pm}$0.03mm in width. 5. Majority of the species has one generation through a year and overwinters as adult in xylem of withered branch and come out again from late April to early May in next year. But some of the female oviposit in the same year and the offsprings overwinter as larva (0.4%) or pupa (0.1%) 6. The eggs are mostly laid under the cork layer of withered branch and the number of eggs deposited by an adult female is 73.44${\pm}$8.74, the average egg-laying period is 33.88${\pm}$6.04 days. The incubation period is 11.69${\pm}$0.39 days, the larval period 45.04${\pm}$1.63 and the pupal period 11.05${\pm}$0.49 days. The period of adult's activity is 46.7${\pm}$5.90 days. 7. The larvae feed on the cambium under the bark and adults feed on the winter bud, the latent bud, the leaf stalk and the base of newly shoot. 8. An active period of adults was observed during the period of 4 months from April to July. However, the peak of adult-density occurred in the early May (in the fields of spring-prunning) and early to middle June(in the fields of summer-prunning). 9. There is a positive correlation between the density of larvae and diameter and length of the branches. 10. The pattern of distributions of the adult of mulberry small weevil is negative binomial distribution. 11. The chalcid fly was disclosed to be a natural enemy which was parasite on the larvae of mulberry small weevil and its parasitic ratio was 11.9%. 12. Phosvel D, Malix D, Salithion EC, DDVP EC, and Phosvel EC were effective for the control of adults and Satchukoto-S EC, and Salithio EC were effective for the control of larvae.

  • PDF

A Study on the Various Attributes of E-Sport Influencing Flow and Identification (e-스포츠의 다양한 속성이 유동(flow)과 동일시에 미치는 영향에 관한 연구)

  • Suh, Mun-Shik;Ahn, Jin-Woo;Kim, Eun-Young;Um, Seong-Won
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.1
    • /
    • pp.59-80
    • /
    • 2008
  • Recently, e-sports are growing with potentiality as a new industry with conspicuous profit model. But studies that dealing with e-sports are not enough. Hence, proposes of this paper are both to establish basic model that is for the design of e-sport marketing strategy and to contribute toward future studies which are related to e-sports. Recently, the researches to explain sports-sponsorship through the identification theory have been discovered. Many researches say that somewhat proper identification is a requirement for most sponsors to improve the their images which is essential to sponsorship activity. Consequently, the research for sponsorship associated with identification in the e-sports, not in the physical sports is the core sector of this study. We extracted the variables from online's major characteristics and existing sport sponsorship researches. First, because e-sports mean the tournaments or leagues in the use of online game, the main event of the game is likely to call it online game. Online media's attributes are distinguished from those of offline. Especially, interactivity, anonymity, and expandibility as a e-sport game attributes are able to be mentioned. So, these inherent online attributes are examined on the relationship with flow. Second, in physical sports games, Fisher(1998) revealed that team similarity and team attractivity were positively related to team identification. Wann(1996) said that the result of former game influenced the evaluation of the next game, then in turn has an effect on the identification of team supporters. Considering these results in the e-sports side, e-sports gamer' attractivity, similarity, and match result seem to be important precedent variables of the identification with a gamer. So, these e-sport gamer attributes are examined on the relationship with both flow and identification with a gamer. Csikszentmihalyi(1988) defined the term flow as feeling status for him to be making current positive experience optimally. Hoffman and Novak(1996) also said that if a user experienced the flow he would visit a website without any reward. Therefore flow might be positively associated with user's identification with a gamer. And, Swanson(2003) disclosed that team identification influenced the positive results of sponsorship, which included attitude toward sponsors, sponsor patronage, and satisfaction with sponsors. That is, identification with a gamer expect to be connected with corporation identification significantly. According to the above, we can design the following research model. All variables used in this study(interactivity, anonymity, expandibility, attractivity, similarity, match result, flow, identification with a gamer, and identification with a sponsor) definitely were defined operationally underlying precedent researches. Sample collection was carried out to the person who has an experience to have enjoyed e-sports during June 2006. Much portion of samples is men because much more men than women enjoy e-sports in general. Two-step approach was used to test the hypotheses. First, confirmatory factor analysis was committed to guarantee the validity and reliability of variables. The results showed that all variables had not only intensive and discriminant validity, but also reliability. Then, research model was examined with fully structural equation using LISREL 8.3 version. The fitness of the suggested model mostly was at the acceptable level. Shortly speaking about the results, first of all, in e-sports game attributes, only interactivity which is called a basic feature in online situation affected flow positively. Secondly, in e-sports gamer's attributes, similarity with a gamer and match result influenced flow positively, but there was no significant effect in the relationship between the attractivity of a gamer and flow. And as expected, similarity had an effect on identification with a gamer significantly. But unexpectedly attractivity and match result did not influence identification with a gamer significantly. Just the same as the fact verified in the many precedent researches, flow greatly influenced identification with a gamer, and identification with a gamer continually had an influence on the identification with a sponsor significantly. There are some implications in these results. If the sponsor of e-sports supports the pro-game player who absolutely should have the superior ability to others and is similar to the user enjoying e-sports, many amateur gamers will feel much of the flow and identification with a pro-gamer, and then after all, feel the identification with a sponsor. Such identification with a sponsor leads people enjoying e-sports to have purchasing intention for products produced by the sponsor and to make a positive word-of-mouth for those products or the sponsor. For the future studies, we recommend a few ideas. Based on the results of this study, it is necessary to find new variables relating to the e-sports, which is not mentioned in this study. For this work to be possible, qualitative research seems to be needed to consider the inherent e-sport attributes. Finally, to generalize the results related to e-sports, a wide range of generations not a specific generation should be researched.

  • PDF

A Study on the Consideration of the Locations of Gyeongju Oksan Gugok and Landscape Interpretation - Focusing on the Arbor of Lee, Jung-Eom's "Oksan Gugok" - (경주 옥산구곡(玉山九曲)의 위치비정과 경관해석 연구 - 이정엄의 「옥산구곡가」를 중심으로 -)

  • Peng, Hong-Xu;Kang, Tai-Ho
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.3
    • /
    • pp.26-36
    • /
    • 2018
  • This study aims to examine the characteristics of landscape through the analysis of location and the landscape of Gugok while also conducting the empirical study through the literature review, field study, and digital analysis of the Okgung Gugok. Oksan Gugok is a set of songs set in Ogsan Creek(玉山川)or Jagyese Creek(紫溪川, 紫玉山), which flows in front of the Oksan Memorial Hall(李彦迪), which is dedicated to the Lee Eong-jeok (李彦迪). We first ascertained the location and configuration of Oksan Gogok. Second, we confirmed the accurate location of Oksan Gogok by utilizing the digital topographic map of Oksan Gogok which was submitted by Google Earth Pro and Geographic Information Center as well as the length of the longitude of the gravel measured by the Trimble Juno SB GPS. Through the study of the literature and the field investigation, The results of the study are as follows. First, Yi Eonjeok was not a direct composer of Oksan Gugok, nor did he produce "Oksan Gugokha(Music)". Lee Ia-sung(李野淳), the ninth Youngest Son of Tweo-Kye, Hwang Lee, visited the "Oksan Gugokha" in the spring of 1823(Sunjo 23), which was the 270th years after the reign of Yi Eonjeok. At this time, receiving the proposal of Ian Sung, Lee Jung-eom(李鼎儼), Lee Jung-gi(李鼎基), and Lee Jung-byeong(李鼎秉), the descendants of Ian Sung set up a song and created Oksan Gugok Music. And the Essay of Oksan Travel Companions writted by Lee Jung-gi turns out being a crucial data to describe the situation when setting up the Ok-San Gugok. Second, In the majority of cases, Gogok Forest is a forest managed by a Confucian Scholar, not run by ordinary people. The creation of "Oksan Bugok Music" can be regarded as an expression of pride that the descendants of Yi Eonjeok and Lee Hwang, and next generation of several Confucian scholars had inherited traditional Neo-Confucian. Third, Lee Jung-eom's "Oksan Donghaengki" contains a detailed description of the "Oksan Gugokha" process and the process of creating a song. Fourth, We examined the location of one to nine Oksan songs again. In particular, eight songs and nine songs were located at irregular intervals, and eight songs were identified as $36^{\circ}01^{\prime}08.60^{{\prime}{\prime}}N$, $129^{\circ}09^{\prime}31.20^{{\prime}{\prime}}E$. Referring to the ancient kingdom of Taojam, the nine-stringed Sainam was unbiased as a lower rock where the two valleys of the East West congregate. The location was estimated at $36^{\circ}01^{\prime}19.79^{{\prime}{\prime}}N$, $129^{\circ}09^{\prime}30.26^{{\prime}{\prime}}E$. Fifth, The landscape elements and landscapes presented in Lee Jung-eom's "Oksan Gugokha" were divided into form, semantic and climatic elements. As a result, Lee Jung-eom's Cho Young-gwan was able to see the ideal of mountain water and the feeling of being idle in nature as well as the sense of freedom. Sixth, After examining the appearance of the elements and the frequency of the appearance of the landscape, 'water' and 'mountain' were the absolute factors that emphasized the original curved environment at the mouth of Lee Jung-eom. Therefore, there was gugokga can gauge the fresh ideas(神仙思想)and retreat ever(隱居思想). This inherent harmony between the landscape as well as through the mulah any ideas that one with nature and meditation, Confucian tube.

Open Digital Textbook for Smart Education (스마트교육을 위한 오픈 디지털교과서)

  • Koo, Young-Il;Park, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.177-189
    • /
    • 2013
  • In Smart Education, the roles of digital textbook is very important as face-to-face media to learners. The standardization of digital textbook will promote the industrialization of digital textbook for contents providers and distributers as well as learner and instructors. In this study, the following three objectives-oriented digital textbooks are looking for ways to standardize. (1) digital textbooks should undertake the role of the media for blended learning which supports on-off classes, should be operating on common EPUB viewer without special dedicated viewer, should utilize the existing framework of the e-learning learning contents and learning management. The reason to consider the EPUB as the standard for digital textbooks is that digital textbooks don't need to specify antoher standard for the form of books, and can take advantage od industrial base with EPUB standards-rich content and distribution structure (2) digital textbooks should provide a low-cost open market service that are currently available as the standard open software (3) To provide appropriate learning feedback information to students, digital textbooks should provide a foundation which accumulates and manages all the learning activity information according to standard infrastructure for educational Big Data processing. In this study, the digital textbook in a smart education environment was referred to open digital textbook. The components of open digital textbooks service framework are (1) digital textbook terminals such as smart pad, smart TVs, smart phones, PC, etc., (2) digital textbooks platform to show and perform digital contents on digital textbook terminals, (3) learning contents repository, which exist on the cloud, maintains accredited learning, (4) App Store providing and distributing secondary learning contents and learning tools by learning contents developing companies, and (5) LMS as a learning support/management tool which on-site class teacher use for creating classroom instruction materials. In addition, locating all of the hardware and software implement a smart education service within the cloud must have take advantage of the cloud computing for efficient management and reducing expense. The open digital textbooks of smart education is consdered as providing e-book style interface of LMS to learners. In open digital textbooks, the representation of text, image, audio, video, equations, etc. is basic function. But painting, writing, problem solving, etc are beyond the capabilities of a simple e-book. The Communication of teacher-to-student, learner-to-learnert, tems-to-team is required by using the open digital textbook. To represent student demographics, portfolio information, and class information, the standard used in e-learning is desirable. To process learner tracking information about the activities of the learner for LMS(Learning Management System), open digital textbook must have the recording function and the commnincating function with LMS. DRM is a function for protecting various copyright. Currently DRMs of e-boook are controlled by the corresponding book viewer. If open digital textbook admitt DRM that is used in a variety of different DRM standards of various e-book viewer, the implementation of redundant features can be avoided. Security/privacy functions are required to protect information about the study or instruction from a third party UDL (Universal Design for Learning) is learning support function for those with disabilities have difficulty in learning courses. The open digital textbook, which is based on E-book standard EPUB 3.0, must (1) record the learning activity log information, and (2) communicate with the server to support the learning activity. While the recording function and the communication function, which is not determined on current standards, is implemented as a JavaScript and is utilized in the current EPUB 3.0 viewer, ths strategy of proposing such recording and communication functions as the next generation of e-book standard, or special standard (EPUB 3.0 for education) is needed. Future research in this study will implement open source program with the proposed open digital textbook standard and present a new educational services including Big Data analysis.

Subject-Balanced Intelligent Text Summarization Scheme (주제 균형 지능형 텍스트 요약 기법)

  • Yun, Yeoil;Ko, Eunjung;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.141-166
    • /
    • 2019
  • Recently, channels like social media and SNS create enormous amount of data. In all kinds of data, portions of unstructured data which represented as text data has increased geometrically. But there are some difficulties to check all text data, so it is important to access those data rapidly and grasp key points of text. Due to needs of efficient understanding, many studies about text summarization for handling and using tremendous amounts of text data have been proposed. Especially, a lot of summarization methods using machine learning and artificial intelligence algorithms have been proposed lately to generate summary objectively and effectively which called "automatic summarization". However almost text summarization methods proposed up to date construct summary focused on frequency of contents in original documents. Those summaries have a limitation for contain small-weight subjects that mentioned less in original text. If summaries include contents with only major subject, bias occurs and it causes loss of information so that it is hard to ascertain every subject documents have. To avoid those bias, it is possible to summarize in point of balance between topics document have so all subject in document can be ascertained, but still unbalance of distribution between those subjects remains. To retain balance of subjects in summary, it is necessary to consider proportion of every subject documents originally have and also allocate the portion of subjects equally so that even sentences of minor subjects can be included in summary sufficiently. In this study, we propose "subject-balanced" text summarization method that procure balance between all subjects and minimize omission of low-frequency subjects. For subject-balanced summary, we use two concept of summary evaluation metrics "completeness" and "succinctness". Completeness is the feature that summary should include contents of original documents fully and succinctness means summary has minimum duplication with contents in itself. Proposed method has 3-phases for summarization. First phase is constructing subject term dictionaries. Topic modeling is used for calculating topic-term weight which indicates degrees that each terms are related to each topic. From derived weight, it is possible to figure out highly related terms for every topic and subjects of documents can be found from various topic composed similar meaning terms. And then, few terms are selected which represent subject well. In this method, it is called "seed terms". However, those terms are too small to explain each subject enough, so sufficient similar terms with seed terms are needed for well-constructed subject dictionary. Word2Vec is used for word expansion, finds similar terms with seed terms. Word vectors are created after Word2Vec modeling, and from those vectors, similarity between all terms can be derived by using cosine-similarity. Higher cosine similarity between two terms calculated, higher relationship between two terms defined. So terms that have high similarity values with seed terms for each subjects are selected and filtering those expanded terms subject dictionary is finally constructed. Next phase is allocating subjects to every sentences which original documents have. To grasp contents of all sentences first, frequency analysis is conducted with specific terms that subject dictionaries compose. TF-IDF weight of each subjects are calculated after frequency analysis, and it is possible to figure out how much sentences are explaining about each subjects. However, TF-IDF weight has limitation that the weight can be increased infinitely, so by normalizing TF-IDF weights for every subject sentences have, all values are changed to 0 to 1 values. Then allocating subject for every sentences with maximum TF-IDF weight between all subjects, sentence group are constructed for each subjects finally. Last phase is summary generation parts. Sen2Vec is used to figure out similarity between subject-sentences, and similarity matrix can be formed. By repetitive sentences selecting, it is possible to generate summary that include contents of original documents fully and minimize duplication in summary itself. For evaluation of proposed method, 50,000 reviews of TripAdvisor are used for constructing subject dictionaries and 23,087 reviews are used for generating summary. Also comparison between proposed method summary and frequency-based summary is performed and as a result, it is verified that summary from proposed method can retain balance of all subject more which documents originally have.

A Deep Learning Based Approach to Recognizing Accompanying Status of Smartphone Users Using Multimodal Data (스마트폰 다종 데이터를 활용한 딥러닝 기반의 사용자 동행 상태 인식)

  • Kim, Kilho;Choi, Sangwoo;Chae, Moon-jung;Park, Heewoong;Lee, Jaehong;Park, Jonghun
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.163-177
    • /
    • 2019
  • As smartphones are getting widely used, human activity recognition (HAR) tasks for recognizing personal activities of smartphone users with multimodal data have been actively studied recently. The research area is expanding from the recognition of the simple body movement of an individual user to the recognition of low-level behavior and high-level behavior. However, HAR tasks for recognizing interaction behavior with other people, such as whether the user is accompanying or communicating with someone else, have gotten less attention so far. And previous research for recognizing interaction behavior has usually depended on audio, Bluetooth, and Wi-Fi sensors, which are vulnerable to privacy issues and require much time to collect enough data. Whereas physical sensors including accelerometer, magnetic field and gyroscope sensors are less vulnerable to privacy issues and can collect a large amount of data within a short time. In this paper, a method for detecting accompanying status based on deep learning model by only using multimodal physical sensor data, such as an accelerometer, magnetic field and gyroscope, was proposed. The accompanying status was defined as a redefinition of a part of the user interaction behavior, including whether the user is accompanying with an acquaintance at a close distance and the user is actively communicating with the acquaintance. A framework based on convolutional neural networks (CNN) and long short-term memory (LSTM) recurrent networks for classifying accompanying and conversation was proposed. First, a data preprocessing method which consists of time synchronization of multimodal data from different physical sensors, data normalization and sequence data generation was introduced. We applied the nearest interpolation to synchronize the time of collected data from different sensors. Normalization was performed for each x, y, z axis value of the sensor data, and the sequence data was generated according to the sliding window method. Then, the sequence data became the input for CNN, where feature maps representing local dependencies of the original sequence are extracted. The CNN consisted of 3 convolutional layers and did not have a pooling layer to maintain the temporal information of the sequence data. Next, LSTM recurrent networks received the feature maps, learned long-term dependencies from them and extracted features. The LSTM recurrent networks consisted of two layers, each with 128 cells. Finally, the extracted features were used for classification by softmax classifier. The loss function of the model was cross entropy function and the weights of the model were randomly initialized on a normal distribution with an average of 0 and a standard deviation of 0.1. The model was trained using adaptive moment estimation (ADAM) optimization algorithm and the mini batch size was set to 128. We applied dropout to input values of the LSTM recurrent networks to prevent overfitting. The initial learning rate was set to 0.001, and it decreased exponentially by 0.99 at the end of each epoch training. An Android smartphone application was developed and released to collect data. We collected smartphone data for a total of 18 subjects. Using the data, the model classified accompanying and conversation by 98.74% and 98.83% accuracy each. Both the F1 score and accuracy of the model were higher than the F1 score and accuracy of the majority vote classifier, support vector machine, and deep recurrent neural network. In the future research, we will focus on more rigorous multimodal sensor data synchronization methods that minimize the time stamp differences. In addition, we will further study transfer learning method that enables transfer of trained models tailored to the training data to the evaluation data that follows a different distribution. It is expected that a model capable of exhibiting robust recognition performance against changes in data that is not considered in the model learning stage will be obtained.