Type II solar radio bursts show frequency drifts from high to low over time. They have been known as a signature of coronal shock associated with Coronal Mass Ejections (CMEs) and/or flares, which cause an abrupt change in the space environment near the Earth (space weather). Therefore, early detection of type II bursts is important for forecasting of space weather. In this study, we develop a deep-learning (DL) model for the automatic detection of type II bursts. For this purpose, we adopted a 1-D Convolution Neutral Network (CNN) as it is well-suited for processing spatiotemporal information within the applied data set. We utilized a total of 286 radio burst spectrum images obtained by Hiraiso Radio Spectrograph (HiRAS) from 1991 and 2012, along with 231 spectrum images without the bursts from 2009 to 2015, to recognizes type II bursts. The burst types were labeled manually according to their spectra features in an answer table. Subsequently, we applied the 1-D CNN technique to the spectrum images using two filter windows with different size along time axis. To develop the DL model, we randomly selected 412 spectrum images (80%) for training and validation. The train history shows that both train and validation losses drop rapidly, while train and validation accuracies increased within approximately 100 epoches. For evaluation of the model's performance, we used 105 test images (20%) and employed a contingence table. It is found that false alarm ratio (FAR) and critical success index (CSI) were 0.14 and 0.83, respectively. Furthermore, we confirmed above result by adopting five-fold cross-validation method, in which we re-sampled five groups randomly. The estimated mean FAR and CSI of the five groups were 0.05 and 0.87, respectively. For experimental purposes, we applied our proposed model to 85 HiRAS type II radio bursts listed in the NGDC catalogue from 2009 to 2016 and 184 quiet (no bursts) spectrum images before and after the type II bursts. As a result, our model successfully detected 79 events (93%) of type II events. This results demonstrates, for the first time, that the 1-D CNN algorithm is useful for detecting type II bursts.
Recently, as demand for high-strength, lightweight materials has increased, there has been great interest in joining with metals. In the case of mechanical bonding, such as bolting and riveting, chemical bonding using adhesives is attracting attention as stress concentration, cracks, and peeling occur. In this paper, surface treatment was performed to improve the adhesive strength, and the change in adhesive strength was analyzed. For the adhesive strength test were conducted with Carbon Fiber Reinforced Plastic(CFRP), CR340(Steel), and Al6061(Aluminum), and laser and plasma surface treatment were used. After plasma surface treatment, the adhesive strength improved by 7.3% and 39.2% in CFRP-CR340 and CFRP-Al6061, respectively. CR340-Al6061 was improved by 56.2% in laser surface treatment. Surface free energy(SFE) was measured by contact angle after plasma treatment, and it is thought that the adhesion strength was improved by minimizing damage through a chemical reaction mechanism. For laser surface treatment, it is thought that creates a rough bonding surface and improves adhesive strength due to the mechanical interlocking effect. Therefore, surface treatment is effect to improve adhesive strength, and based on this paper, the long-term fatigue test will be conducted to prevent fatigue failure, which is a representative cause of actual structural damage.
Recent ransomware attacks employ various techniques and pathways, posing significant challenges in early detection and defense. Consequently, the scale of damage is continually growing. This paper introduces a machine learning-based approach for effective ransomware detection by focusing on file encryption and encryption patterns, which are pivotal functionalities utilized by ransomware. Ransomware is identified by analyzing password behavior and encryption patterns, making it possible to detect specific ransomware variants and new types of ransomware, thereby mitigating ransomware attacks effectively. The proposed machine learning-based encryption behavior detection technique extracts encryption and encryption pattern characteristics and trains them using a machine learning classifier. The final outcome is an ensemble of results from two classifiers. The classifier plays a key role in determining the presence or absence of ransomware, leading to enhanced accuracy. The proposed technique is implemented using the numpy, pandas, and Python's Scikit-Learn library. Evaluation indicators reveal an average accuracy of 94%, precision of 95%, recall rate of 93%, and an F1 score of 95%. These performance results validate the feasibility of ransomware detection through encryption behavior analysis, and further research is encouraged to enhance the technique for proactive ransomware detection.
In recent years, success of information system projects to possess competitive advantage in business has become very important for stakeholders. Stakeholders who are interested in the success of information system projects typically consist of users who need the system, developers who build it, and project managers who are responsible for project success. However, recently, there has been increasing in the number of business analysts engaged in bridging relationships among these stakeholders in information system projects. So far, there have been many researches on the competence of users, developers or project managers. But, the research on the competencies of business analysts has not been done much. So, in this study, what competencies are needed for business analysts who are engaged in information system projects are researched, and the level and difference of stakeholders' expectations and satisfaction with them are identified, using IPA techniques. The results of this study are expected to contribute greatly to providing basic information on the development of competency models or training programs needed for recruitment, evaluation and training of business analysts who are or will be engaged in information system projects.
As cloud services and deployment models become diverse, there are a growing number of cloud computing selection options. Therefore, financial companies need a methodology to select the appropriated cloud for each financial computing system. This study adopted the Balanced Scorecard (BSC) framework to classify factors for the introduction of cloud computing in financial companies. Using Analytic Hierarchy Process (AHP), the evaluation items are layered into the performance perspective and the cloud consideration factor and a comprehensive decision model is proposed. To verify the proposed research model, a system of financial company is divided into three: account, information, and channel system, and the result of decision making by both financial business experts and technology experts from two financial companies were collected. The result shows that some common factors are important in all systems, but most of the factors considered are very different from system to system. We expect that our methodology contributes to the spread of cloud computing adoption.
Background: This study evaluated the learning outcomes of dental hygiene students' ethical consciousness and ethical decision-making competence through dental ethics courses conducted in some universities. Methods: The subjects were 35 and 29 fourth-year dental hygiene students at G University in the first semester of 2021 and 2022, respectively, and 53 and 43 third-year dental hygiene students at D University, respectively, for a total of 160 students. After implementing the dental hygiene ethics course, classroom performance was evaluated in terms of moral sensitivity, confidence in making ethical decisions, classroom practicality, learning outcomes, and class satisfaction. Statistical analysis was conducted using independent t-test and paired t-test, and the statistical significance level was 0.05. Results: Both universities reported an increase in moral sensitivity and confidence in ethical decision-making after the course (p<0.001). Classroom practicality and class satisfaction for the dental hygiene ethics course did not differ between disciplines and were rated positively with a score of 4 or higher (p>0.05). Learning outcomes were higher among 4-year students than 3-year students (p<0.001). Conclusions: It was evaluated that the ethics in dental hygiene curriculum can strengthen students' competence in ethical decision-making, including moral sensitivity and confidence in solving ethical problems in dental hygiene.
Jae-young Park;Jung Hwan Lee;Mo-Yeol Kang;Tae-Won Jang;Hyoung-Ryoul Kim;Se-Yeong Kim;Jongin Lee
Annals of Occupational and Environmental Medicine
/
v.35
/
pp.24.1-24.15
/
2023
Background: The construction workers are vulnerable to fatigue due to high physical workload. This study aimed to investigate the relationship between overwork and heart rate in construction workers and propose a scheme to prevent overwork in advance. Methods: We measured the heart rates of construction workers at a construction site of a residential and commercial complex in Seoul from August to October 2021 and develop an index that monitors overwork in real-time. A total of 66 Korean workers participated in the study, wearing real-time heart rate monitoring equipment. The relative heart rate (RHR) was calculated using the minimum and maximum heart rates, and the maximum acceptable working time (MAWT) was estimated using RHR to calculate the workload. The overwork index (OI) was defined as the cumulative workload evaluated with the MAWT. An appropriate scenario line (PSL) was set as an index that can be compared to the OI to evaluate the degree of overwork in real-time. The excess overwork index (EOI) was evaluated in real-time during work performance using the difference between the OI and the PSL. The EOI value was used to perform receiver operating characteristic (ROC) curve analysis to find the optimal cut-off value for classification of overwork state. Results: Of the 60 participants analyzed, 28 (46.7%) were classified as the overwork group based on their RHR. ROC curve analysis showed that the EOI was a good predictor of overwork, with an area under the curve of 0.824. The optimal cut-off values ranged from 21.8% to 24.0% depending on the method used to determine the cut-off point. Conclusion: The EOI showed promising results as a predictive tool to assess overwork in real-time using heart rate monitoring and calculation through MAWT. Further research is needed to assess physical workload accurately and determine cut-off values across industries.
Purpose: Research and development of high-strength concrete enables high-rise buildings and reduces the self-weight of the structure by reducing the cross-section, thereby reducing the thickness of beams and slabs to build more floors. A large effective space can be secured and the amount of reinforcement and concrete used to designate the base surface can be reduced. Method: In terms of field construction and quality, the effect of reducing the occurrence of drying shrinkage can be confirmed by studying the combination of low water bonding ratio and minimizing bleeding on the concrete surface. Result: The ease of site construction was confirmed due to the high self-charging property due to the increased fluidity by using high-performance water reducing agents, and the advantage of shortening the time to remove the formwork by expressing the early strength of concrete was confirmed. These experimental results show that the field application of ultra-high-strength concrete with a design standard strength of 100 MPa or higher can be expanded in high-rise buildings. Through this study, we experimented and evaluated whether ultra-high-strength concrete with a strength of 130 MPa or higher, considering the applicability of high-rise buildings with more than 120 floors in Korea, could be applied in the field. Conclusion: This study found the optimal mixing ratio studied by various methods of indoor basic experiments to confirm the applicability of ultra-high strength, produced 130MPa ultra-high strength concrete at a ready-mixed concrete factory similar to the real size, and tested the applicability of concrete to the fluidity and strength expression and hydration heat.
In the context of the fourth industrial revolution, data-driven decision-making has increasingly become pivotal. However, the integrity of data analysis is compromised if data quality is not adequately ensured, potentially leading to biased interpretations. This is particularly critical for water level data, essential for water resource management, which often encounters quality issues such as missing values, spikes, and noise. This study addresses the challenge of noise-induced data quality deterioration, which complicates trend analysis and may produce anomalous outliers. To mitigate this issue, we propose a noise removal strategy employing Wavelet Transform, a technique renowned for its efficacy in signal processing and noise elimination. The advantage of Wavelet Transform lies in its operational efficiency - it reduces both time and costs as it obviates the need for acquiring the true values of collected data. This study conducted a comparative performance evaluation between our Wavelet Transform-based approach and the Denoising Autoencoder, a prominent machine learning method for noise reduction.. The findings demonstrate that the Coiflets wavelet function outperforms the Denoising Autoencoder across various metrics, including Mean Absolute Error (MAE), Mean Absolute Percentage Error (MAPE), and Mean Squared Error (MSE). The superiority of the Coiflets function suggests that selecting an appropriate wavelet function tailored to the specific application environment can effectively address data quality issues caused by noise. This study underscores the potential of Wavelet Transform as a robust tool for enhancing the quality of water level data, thereby contributing to the reliability of water resource management decisions.
Journal of the Korean Association of Geographic Information Studies
/
v.27
no.1
/
pp.115-127
/
2024
This research aimed to construct models with various structures based on the Transformer module and to perform land cover classification, thereby examining the applicability of the Transformer module. For the classification of land cover, the Unet model, which has a CNN structure, was selected as the base model, and a total of four deep learning models were constructed by combining both the encoder and decoder parts with the Transformer module. During the training process of the deep learning models, the training was repeated 10 times under the same conditions to evaluate the generalization performance. The evaluation of the classification accuracy of the deep learning models showed that the Model D, which utilized the Transformer module in both the encoder and decoder structures, achieved the highest overall accuracy with an average of approximately 89.4% and a Kappa coefficient average of about 73.2%. In terms of training time, models based on CNN were the most efficient. however, the use of Transformer-based models resulted in an average improvement of 0.5% in classification accuracy based on the Kappa coefficient. It is considered necessary to refine the model by considering various variables such as adjusting hyperparameters and image patch sizes during the integration process with CNN models. A common issue identified in all models during the land cover classification process was the difficulty in detecting small-scale objects. To improve this misclassification phenomenon, it is deemed necessary to explore the use of high-resolution input data and integrate multidimensional data that includes terrain and texture information.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.