• Title/Summary/Keyword: Real-Time Implementation

Search Result 3,227, Processing Time 0.034 seconds

Analysis and Performance Evaluation of Pattern Condensing Techniques used in Representative Pattern Mining (대표 패턴 마이닝에 활용되는 패턴 압축 기법들에 대한 분석 및 성능 평가)

  • Lee, Gang-In;Yun, Un-Il
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.77-83
    • /
    • 2015
  • Frequent pattern mining, which is one of the major areas actively studied in data mining, is a method for extracting useful pattern information hidden from large data sets or databases. Moreover, frequent pattern mining approaches have been actively employed in a variety of application fields because the results obtained from them can allow us to analyze various, important characteristics within databases more easily and automatically. However, traditional frequent pattern mining methods, which simply extract all of the possible frequent patterns such that each of their support values is not smaller than a user-given minimum support threshold, have the following problems. First, traditional approaches have to generate a numerous number of patterns according to the features of a given database and the degree of threshold settings, and the number can also increase in geometrical progression. In addition, such works also cause waste of runtime and memory resources. Furthermore, the pattern results excessively generated from the methods also lead to troubles of pattern analysis for the mining results. In order to solve such issues of previous traditional frequent pattern mining approaches, the concept of representative pattern mining and its various related works have been proposed. In contrast to the traditional ones that find all the possible frequent patterns from databases, representative pattern mining approaches selectively extract a smaller number of patterns that represent general frequent patterns. In this paper, we describe details and characteristics of pattern condensing techniques that consider the maximality or closure property of generated frequent patterns, and conduct comparison and analysis for the techniques. Given a frequent pattern, satisfying the maximality for the pattern signifies that all of the possible super sets of the pattern must have smaller support values than a user-specific minimum support threshold; meanwhile, satisfying the closure property for the pattern means that there is no superset of which the support is equal to that of the pattern with respect to all the possible super sets. By mining maximal frequent patterns or closed frequent ones, we can achieve effective pattern compression and also perform mining operations with much smaller time and space resources. In addition, compressed patterns can be converted into the original frequent pattern forms again if necessary; especially, the closed frequent pattern notation has the ability to convert representative patterns into the original ones again without any information loss. That is, we can obtain a complete set of original frequent patterns from closed frequent ones. Although the maximal frequent pattern notation does not guarantee a complete recovery rate in the process of pattern conversion, it has an advantage that can extract a smaller number of representative patterns more quickly compared to the closed frequent pattern notation. In this paper, we show the performance results and characteristics of the aforementioned techniques in terms of pattern generation, runtime, and memory usage by conducting performance evaluation with respect to various real data sets collected from the real world. For more exact comparison, we also employ the algorithms implementing these techniques on the same platform and Implementation level.

Development of smart education-based teaching and learning plans and a smart textbook for 'healthy diet and meal plans' unit in 「Technology·Home Economics」 (중학교 「기술·가정」의 '건강한 식생활과 식사 구성' 단원에 적용한 스마트 교수·학습 과정안과 교재 개발)

  • Choi, Song Eun;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.26 no.4
    • /
    • pp.85-114
    • /
    • 2014
  • The main purpose of this study was to develop teaching and learning plans and a smart textbook for food and nutrition education in Home Economics focusing on 'healthy diet and meal plans' unit in "Technology home Economics" textbooks for 7th graders to evaluate the effectiveness of the instruction conducted with the smart textbook. The content of the study to achieve the purpose is as follows: First, design a smart education-based teaching and learning curriculum for food and nutrition education in Home Economics, focusing on 'healthy diet and meal plans' unit. Second, develop a smart textbook for food and nutrition education based on the teaching and learning curriculum, using a smart content authoring tool. Third, evaluate the effectiveness of the instruction after applying the curriculum in real classroom situations. The results of this study were as follows: First, teaching and learning plans and materials were developed for two units, 'issues regarding teenagers' diet' and 'implementation of a healthy and balanced diet', under 'teenagers' life'. The first unit, 'issues regarding teenagers' diet', dealt with topics such as teenagers' dietary behaviors, nutrition, and health. Learning objectives for this unit were to help students identify and evaluate their own dietary behaviors. The second unit, 'implementation of a healthy and balanced diet', encouraged students to diagnose problems with their diet and plan nutrient rich meals. The objectives for this unit were to help students implement a healthy and balanced diet by providing them with nutrition and dietary guidelines for Koreans, sample meal plans, and guidelines for developing healthy eating habits for teenagers. In order to develop a teaching and learning plans to achieve these objectives, teaching and learning materials including inquiry tasks, materials for group activities, multimedia, applications and various pop-up learning materials were developed. Second, a smart textbook using DocZoom, which was a smart content authoring tool was developed. The textbook dealt with issues regarding teenagers' diet and implementation of a healthy and balanced diet. Multimedia material used in the textbook come from the Ministry of Food and Drug Safety's food and nutrition education web sites and other sources. To develop student-oriented material, relevant video clips were added to the smart textbook to motivate students and enhance their interest in the course. Third, the outcome of this study indicated that the instruction using teaching and learning plans and learning materials with the smart textbook was effective for enhancing students' interest in Home Economics classes (t-value=-3.99, p<.001), creating enthusiasm for learning(t-value = -2.61, p<.05), encouraging self-directed and independent learning(t-value = -4.77, p<.001), and improving students' interest in food and nutrition courses(t-value = -3.83, p<.001). The students' evaluation of the instruction were as follows: the instruction using teaching and learning plans and learning materials with smart textbooks, instead of paper textbooks, helped them save time looking for learning materials; students evaluated that it was easier for them to see and understand video clips and charts. In addition, most students answered that instruction with smart textbooks were more fun and convenient, and they agreed that the courses enhanced their learning experience.

  • PDF

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Target Advertisement Service using a Viewer's Profile Reasoning (시청자 프로파일 추론 기법을 이용한 표적 광고 서비스)

  • Kim Munjo;Im Jeongyeon;Kang Sanggil;Kim Munchrul;Kang Kyungok
    • Journal of Broadcast Engineering
    • /
    • v.10 no.1 s.26
    • /
    • pp.43-56
    • /
    • 2005
  • In the existing broadcasting environment, it is not easy to serve the bi-directional service between a broadcasting server and a TV audience. In the uni-directional broadcasting environments, almost TV programs are scheduled depending on the viewers' popular watching time, and the advertisement contents in these TV programs are mainly arranged by the popularity and the ages of the audience. The audiences make an effort to sort and select their favorite programs. However, the advertisement programs which support the TV program the audience want are not served to the appropriate audiences efficiently. This randomly provided advertisement contents can occur to the audiences' indifference and avoidance. In this paper, we propose the target advertisement service for the appropriate distribution of the advertisement contents. The proposed target advertisement service estimates the audience's profile without any issuing the private information and provides the target-advertised contents by using his/her estimated profile. For the experimental results, we used the real audiences' TV usage history such as the ages, fonder and time of the programs from AC Neilson Korea. And we show the accuracy of the proposed target advertisement service algorithm. NDS (Normalized Distance Sum) and the Vector correlation method, and implementation of our target advertisement service system.

A Development of Facility Web Program for Small and Medium-Sized PSM Workplaces (중·소규모 공정안전관리 사업장의 웹 전산시스템 개발)

  • Kim, Young Suk;Park, Dal Jae
    • Korean Chemical Engineering Research
    • /
    • v.60 no.3
    • /
    • pp.334-346
    • /
    • 2022
  • There is a lack of knowledge and information on the understanding and application of the Process Safety Management (PSM) system, recognized as a major cause of industrial accidents in small-and medium-sized workplaces. Hence, it is necessary to prepare a protocol to secure the practical and continuous levels of implementation for PSM and eliminate human errors through tracking management. However, insufficient research has been conducted on this. Therefore, this study investigated and analyzed the various violations in the administrative measures, based on the regulations announced by the Ministry of Employment and Labor, in approximately 200 small-and medium-sized PSM workplaces with fewer than 300 employees across in korea. This study intended to contribute to the prevention of major industrial accidents by developing a facility maintenance web program that removed human errors in small-and medium-sized workplaces. The major results are summarized as follows. First, It accessed the web via a QR code on a smart device to check the equipment's specification search function, cause of failure, and photos for the convenience of accessing the program, which made it possible to make requests for the it inspection and maintenance in real time. Second, it linked the identification of the targets to be changed, risk assessment, worker training, and pre-operation inspection with the program, which allowed the administrator to track all the procedures from start to finish. Third, it made it possible to predict the life of the equipment and verify its reliability based on the data accumulated through the registration of the pictures for improvements, repairs, time required, cost, etc. after the work was completed. It is suggested that these research results will be helpful in the practical and systematic operation of small-and medium-sized PSM workplaces. In addition, it can be utilized in a useful manner for the development and dissemination of a facility maintenance web program when establishing future smart factories in small-and medium-sized PSM workplaces under the direction of the government.

Radiology Department Infection Control According to Radiography Frequency and Disinfection Period (촬영 빈도수 및 소독 주기에 따른 영상의학과 감염 관리)

  • Lee, Jae-Seung;Jeong, Kyu-Hwan;Kim, Gyoung-Hee;Im, In-Chul;Kweon, Dae-Cheol;Goo, Eun-Hoe;Dong, Kyung-Rae;Chung, Woon-Kwan
    • Journal of the Korean Society of Radiology
    • /
    • v.5 no.2
    • /
    • pp.73-80
    • /
    • 2011
  • Questionnaires were distributed to Radiology departments at hospitals with 300 sickbeds throughout the Pohang region of North Gyeongsang Province concerning awareness and performance levels of infection control. The investigation included measurements of the pollution levels of imaging equipment and assistive apparatuses in order to prepare a plan for the activation of prevention and management of hospital infections. The survey was designed to question respondents in regards to personal data, infection management prevention education, and infection management guidelines. The ATP Public Heath Monitering System was used to measure seven items for pollution levels of imaging equipment and assistive apparatuses in the Radiology Department. Data was analysed using SPSS version 12.0 for paired t-test and Pearson coefficient with a statistically significant level of 0.05. The results of the survey showed a total awareness level of infection management prevention education averaged at $3.73{\pm}0.64$ and performance levels resulted at $3.39{\pm}0.83$ which were statistically significant (p = 0.01). Also the measurements of pollution levels for equipment with high patient contact showed a Pearson Coefficient of over 0.5 implying a focus on pathogenic bacterium. There was no statistical significance with the frequency of imaging (p < 0.05). Therefore for general hospitals with high patient contact, there is a need to supply analyzing equipment for real time monitoring and the implementation of disinfection management that uses a Ministry of Health and Welfare approved antiseptic solution twice every minute.

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

Design and Implementation of an Execution-Provenance Based Simulation Data Management Framework for Computational Science Engineering Simulation Platform (계산과학공학 플랫폼을 위한 실행-이력 기반의 시뮬레이션 데이터 관리 프레임워크 설계 및 구현)

  • Ma, Jin;Lee, Sik;Cho, Kum-won;Suh, Young-kyoon
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.77-86
    • /
    • 2018
  • For the past few years, KISTI has been servicing an online simulation execution platform, called EDISON, allowing users to conduct simulations on various scientific applications supplied by diverse computational science and engineering disciplines. Typically, these simulations accompany large-scale computation and accordingly produce a huge volume of output data. One critical issue arising when conducting those simulations on an online platform stems from the fact that a number of users simultaneously submit to the platform their simulation requests (or jobs) with the same (or almost unchanging) input parameters or files, resulting in charging a significant burden on the platform. In other words, the same computing jobs lead to duplicate consumption computing and storage resources at an undesirably fast pace. To overcome excessive resource usage by such identical simulation requests, in this paper we introduce a novel framework, called IceSheet, to efficiently manage simulation data based on execution metadata, that is, provenance. The IceSheet framework captures and stores each provenance associated with a conducted simulation. The collected provenance records are utilized for not only inspecting duplicate simulation requests but also performing search on existing simulation results via an open-source search engine, ElasticSearch. In particular, this paper elaborates on the core components in the IceSheet framework to support the search and reuse on the stored simulation results. We implemented as prototype the proposed framework using the engine in conjunction with the online simulation execution platform. Our evaluation of the framework was performed on the real simulation execution-provenance records collected on the platform. Once the prototyped IceSheet framework fully functions with the platform, users can quickly search for past parameter values entered into desired simulation software and receive existing results on the same input parameter values on the software if any. Therefore, we expect that the proposed framework contributes to eliminating duplicate resource consumption and significantly reducing execution time on the same requests as previously-executed simulations.

Dynamic Traffic Assignment Using Genetic Algorithm (유전자 알고리즘을 이용한 동적통행배정에 관한 연구)

  • Park, Kyung-Chul;Park, Chang-Ho;Chon, Kyung-Soo;Rhee, Sung-Mo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.8 no.1 s.15
    • /
    • pp.51-63
    • /
    • 2000
  • Dynamic traffic assignment(DTA) has been a topic of substantial research during the past decade. While DTA is gradually maturing, many aspects of DTA still need improvement, especially regarding its formulation and solution algerian Recently, with its promise for In(Intelligent Transportation System) and GIS(Geographic Information System) applications, DTA have received increasing attention. This potential also implies higher requirement for DTA modeling, especially regarding its solution efficiency for real-time implementation. But DTA have many mathematical difficulties in searching process due to the complexity of spatial and temporal variables. Although many solution algorithms have been studied, conventional methods cannot iud the solution in case that objective function or constraints is not convex. In this paper, the genetic algorithm to find the solution of DTA is applied and the Merchant-Nemhauser model is used as DTA model because it has a nonconvex constraint set. To handle the nonconvex constraint set the GENOCOP III system which is a kind of the genetic algorithm is used in this study. Results for the sample network have been compared with the results of conventional method.

  • PDF