• Title/Summary/Keyword: Rule-based method

Search Result 1,515, Processing Time 0.031 seconds

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

Study on the Evaluation of Ship Collision Risk based on the Dempster-Shafer Theory (Dempster-Shafer 이론 기반의 선박충돌위험성 평가에 관한 연구)

  • Jinwan Park;Jung Sik Jeong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.5
    • /
    • pp.462-469
    • /
    • 2023
  • In this study, we propose a method for evaluating the risk of collision between ships to support determination on the risk of collision in a situation in which ships encounter each other and to prevent collision accidents. Because several uncertainties are involved in the navigation of a ship, must be considered when evaluating the risk of collision. We apply the Dempster-Shafer theory to manage this uncertainty and evaluate the collision risk of each target vessel in real time. The distance at the closest point approach (DCPA), time to the closest point approach (TCPA), distance from another vessel, relative bearing, and velocity ratio are used as evaluation factors for ship collision risk. The basic probability assignments (BPAs) calculated by membership functions for each evaluation factor are fused through the combination rule of the Dempster-Shafer theory. As a result of the experiment using automatic identification system (AIS) data collected in situations where ships actually encounter each other, the suitability of evaluation was verified. By evaluating the risk of collision in real time in encounter situations between ships, collision accidents caused by human errora can be prevented. This is expected to be used for vessel traffic service systems and collision avoidance systems for autonomous ships.

Some Thoughts on Reestablishing Appraisal System of Presidential Records (대통령기록물 평가제도 재정립을 위한 몇 가지 단상)

  • Kim, Myoung-hun;Lee, Seung-il
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.271-303
    • /
    • 2024
  • In our country, which has a strong presidential system, the power and responsibilities of the president are truly enormous. He is the head of state and diplomatic representative, and at the same time exercises authority over all areas of the country, including the legislature, judiciary, and constitutional institutions, along with his responsibilities as head of the executive branch. Considering these aspects, it can be said that presidential records created during the president's rule have a high level of national and historical significance and value compared to other public records. Considering these importance of presidential records, the Presidential Records Management Act was enacted in 2007 to establish an institutional mechanism to systematically manage presidential records. However, the current institutional basis for appraisal of presidential records is very weak. In this regard, there is a need to begin discussions on the appraisal of presidential records in earnest. Considering the national importance and symbolism of presidential records, it is necessary to establish a new direction for appraisal of presidential records that is different from general public records. Accordingly, in this paper, as part of reestablishing Korea's presidential records appraisal system, this article analyzed the status and problems of the current presidential records appraisal system and presented directions needed to find future improvement measures. To this end, as a premise for discussing the importance and value of presidential records, it examined the powers and responsibilities of the presidency as defined in our country's Constitution.Next, we looked at the appraisal system and method for presidential records that are currently in operation, and then analyzed the problems that emerged here in connection with the characteristics of presidential records. Based on this, it presented five perspectives on issues that need to be discussed publicly in the records management community in order to reestablish Korea's presidential records appraisal system in the future.

Study on size diversity according to the sex, period, and habitat of three new Korean Hynobius salamanders: Hynobius geojeensis, H. perplicatus, and H. unisacculus (한국산 도롱뇽 3종 거제도롱뇽, 숨은의령도롱뇽, 꼬마도롱뇽의 성별, 시기 그리고 서식지에 따른 크기 다양성 연구)

  • Yu-Jeong Jeong;Yikweon Jang;Kyo Soung Koo
    • Korean Journal of Environmental Biology
    • /
    • v.41 no.4
    • /
    • pp.557-569
    • /
    • 2023
  • Amphibians are the world's most threatened group of animals, with approximately 41% facing extinction. Contrary to this global trend, the number of amphibian species in Korea has increased by approximately 53.3% over the past 20 years. In particular, salamanders within the genus Hynobius showed even greater diversity, with the number increasing three-fold from two species to seven. However, morphological and ecological traits required for the clear differentiation of these animals are yet to be determined, leading to much confusion. In this study, we investigated the validity of using size traits for species identification, as this method is currently considered a rule of thumb when differentiating Geoje salamanders (Hynobius geojeensis), cryptic Uiryeong salamanders (H. perplicatus), and Korean small salamanders (H. unisacculus). Our study revealed that sex, study period, and habitat were all factors associated with significant differences in snout-vent length, head width, and body weight. Differences in these size traits were evident both between and within species. Our results show that body size traits applied in the recent classification of the three new salamander species could not be seen as a suitable criterion. Such identification methods based solely on body size not only cause great confusion in the field but will also limit future research on Korean Hynobius salamanders.

OD matrix estimation using link use proportion sample data as additional information (표본링크이용비를 추가정보로 이용한 OD 행렬 추정)

  • 백승걸;김현명;신동호
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.4
    • /
    • pp.83-93
    • /
    • 2002
  • To improve the performance of estimation, the research that uses additional information addition to traffic count and target OD with additional survey cost have been studied. The purpose of this paper is to improve the performance of OD estimation by reducing the feasible solutions with cost-efficiently additional information addition to traffic counts and target OD. For this purpose, we Propose the OD estimation method with sample link use proportion as additional information. That is, we obtain the relationship between OD trip and link flow from sample link use proportion that is high reliable information with roadside survey, not from the traffic assignment of target OD. Therefore, this paper proposes OD estimation algorithm in which the conservation of link flow rule under the path-based non-equilibrium traffic assignment concept. Numerical result with test network shows that it is possible to improve the performance of OD estimation where the precision of additional data is low, since sample link use Proportion represented the information showing the relationship between OD trip and link flow. And this method shows the robust performance of estimation where traffic count or OD trip be changed, since this method did not largely affected by the error of target OD and the one of traffic count. In addition to, we also propose that we must set the level of data precision by considering the level of other information precision, because "precision problem between information" is generated when we use additional information like sample link use proportion etc. And we Propose that the method using traffic count as basic information must obtain the link flow to certain level in order to high the applicability of additional information. Finally, we propose that additional information on link have a optimal counting location problem. Expecially by Precision of information side it is possible that optimal survey location problem of sample link use proportion have a much impact on the performance of OD estimation rather than optimal counting location problem of link flow.

Auxiliary Reinforcement Method for the Safety of Tunnelling Face (터널 막장안정성에 따른 보강공법 적용)

  • Kim, Chang-Yong;Park, Chi-Hyun;Bae, Gyu-Jin;Hong, Sung-Wan;Oh, Myung-Ryul
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.2 no.2
    • /
    • pp.11-21
    • /
    • 2000
  • Tunnelling has been created as a great extent in view of less land space available because the growth of population in metropolitan has been accelerated at a faster pace than the development of the cities. In tunnelling, it is often faced that measures are obliged to be taken without confirmation for such abnormality as diverged movement of surrounding rock mass, growing crack of shotcrete and yielding of rockbolts. In this case, it is usually said that the judgments of experienced engineers for the selection of measure are importance and allowed us to get over the situations in many construction sites. But decrease of such experienced engineers need us to develop the new system to assist the selection of measures for the abnormality without any experiences of similar tunnelling sites. In this study, After a lot of tunnelling reinforcement methods were surveyed and the detail application were studied, an expert system was developed to predict the safety of tunnel and choose proper tunnel reinforcement system using fuzzy quantification theory and fuzzy inference rule based on tunnel information database. The expert system developed in this study have two main parts named pre-module and post-module. Pre-module decides tunnel information imput items based on the tunnel face mapping information which can be easily obtained in-situ site. Then, using fuzzy quantification theory II, fuzzy membership function is composed and tunnel safety level is inferred through this membership function. The comparison result between the predicted reinforcement system level and measured ones was very similar. In-situ data were obtained in three tunnel sites including subway tunnel under Han river. This system will be very helpful to make the most of in-situ data and suggest proper applicability of tunnel reinforcement system developing more resonable tunnel support method from dependance of some experienced experts for the absent of guide.

  • PDF

An integrated Method of New Casuistry and Specified Principlism as Nursing Ethics Methodology (새로운 간호윤리학 방법론;통합된 사례방법론)

  • Um, Young-Rhan
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.3 no.1
    • /
    • pp.51-64
    • /
    • 1997
  • The purpose of the study was to introduce an integrated approach of new Casuistry and specified principlism in resolving ethical problems and studying nursing ethics. In studying clinical ethics and nursing ethics, there is no systematic research method. While nurses often experience ethical dilemmas in practice, much of previous research on nursing ethics has focused merely on describing the existing problems. In addition, ethists presented theoretical analysis and critics rather than providing the specific problems solving strategies. There is a need in clinical situations for an integrated method which can provide the objective description for existing problem situations as well as specific problem solving methods. We inherit two distinct ways of discussing ethical issues. One of these frames these issues in terms of principles, rules, and other general ideas; the other focuses on the specific features of particular kinds of moral cases. In the first way general ethical rules relate to specific moral cases in a theoretical manner, with universal rules serving as "axioms" from which particular moral judgments are deduced as theorems. In the seconds, this relation is frankly practical. with general moral rules serving as "maxims", which can be fully understood only in terms of the paradigmatic cases that define their meaning and force. Theoretical arguments are structured in ways that free them from any dependence on the circumstances of their presentation and ensure them a validity of a kind that is not affected by the practical context of use. In formal arguments particular conclusions are deduced from("entailed by") the initial axioms or universal principles that are the apex of the argument. So the truth or certainty that attaches to those axioms flows downward to the specific instances to be "proved". In the language of formal logic, the axioms are major premises, the facts that specify the present instance are minor premises, and the conclusion to be "proved" is deduced (follows necessarily) from the initial presises. Practical arguments, by contrast, involve a wider range of factors than formal deductions and are read with an eye to their occasion of use. Instead of aiming at strict entailments, they draw on the outcomes of previous experience, carrying over the procedures used to resolve earlier problems and reapply them in new problmatic situations. Practical arguments depend for their power on how closely the present circumstances resemble those of the earlier precedent cases for which this particular type of argument was originally devised. So. in practical arguments, the truths and certitudes established in the precedent cases pass sideways, so as to provide "resolutions" of later problems. In the language of rational analysis, the facts of the present case define the gounds on which any resolution must be based; the general considerations that carried wight in similar situations provide warrants that help settle future cases. So the resolution of any problem holds good presumptively; its strengh depends on the similarities between the present case and the prededents; and its soundness can be challenged (or rebutted) in situations that are recognized ans exceptional. Jonsen & Toulmin (1988), and Jonsen (1991) introduce New Casuistry as a practical method. The oxford English Dictionary defines casuistry quite accurately as "that part of ethics which resolves cases of conscience, applying the general rules of religion and morality to particular instances in which circumstances alter cases or in which there appears to be a conflict of duties." They modified the casuistry of the medieval ages to use in clinical situations which is characterized by "the typology of cases and the analogy as an inference method". A case is the unit of analysis. The structure of case was made with interaction of situation and moral rules. The situation is what surrounds or stands around. The moral rule is the essence of case. The analogy can be objective because "the grounds, the warrants, the theoretical backing, the modal qualifiers" are identified in the cases. The specified principlism was the method that Degrazia (1992) integrated the principlism and the specification introduced by Richardson (1990). In this method, the principle is specified by adding information about limitations of the scope and restricting the range of the principle. This should be substantive qualifications. The integrated method is an combination of the New Casuistry and the specified principlism. For example, the study was "Ethical problems experienced by nurses in the care of terminally ill patients"(Um, 1994). A semi-structured in-depth interview was conducted for fifteen nurses who mainly took care of terminally ill patients. The first stage, twenty one cases were identified as relevant to the topic, and then were classified to four types of problems. For instance, one of these types was the patient's refusal of care. The second stage, the ethical problems in the case were defined, and then the case was analyzed. This was to analyze the reasons, the ethical values, and the related ethical principles in the cases. Then the interpretation was synthetically done by integration of the result of analysis and the situation. The third stage was the ordering phase of the cases, which was done according to the result of the interpretation and the common principles in the cases. The first two stages describe the methodology of new casuistry, and the final stage was for the methodology of the specified principlism. The common principles were the principle of autonomy and the principle of caring. The principle of autonomy was specified; when competent patients refused care, nurse should discontinue the care to respect for the patients' decision. The principle of caring was also specified; when the competent patients refused care, nurses should continue to provide the care in spite of the patients' refusal to preserve their life. These specification may lead the opposite behavior, which emphasizes the importance of nurse's will and intentions to make their decision in the clinical situations.

  • PDF

A Literature Review and Classification of Recommender Systems on Academic Journals (추천시스템관련 학술논문 분석 및 분류)

  • Park, Deuk-Hee;Kim, Hyea-Kyeong;Choi, Il-Young;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.139-152
    • /
    • 2011
  • Recommender systems have become an important research field since the emergence of the first paper on collaborative filtering in the mid-1990s. In general, recommender systems are defined as the supporting systems which help users to find information, products, or services (such as books, movies, music, digital products, web sites, and TV programs) by aggregating and analyzing suggestions from other users, which mean reviews from various authorities, and user attributes. However, as academic researches on recommender systems have increased significantly over the last ten years, more researches are required to be applicable in the real world situation. Because research field on recommender systems is still wide and less mature than other research fields. Accordingly, the existing articles on recommender systems need to be reviewed toward the next generation of recommender systems. However, it would be not easy to confine the recommender system researches to specific disciplines, considering the nature of the recommender system researches. So, we reviewed all articles on recommender systems from 37 journals which were published from 2001 to 2010. The 37 journals are selected from top 125 journals of the MIS Journal Rankings. Also, the literature search was based on the descriptors "Recommender system", "Recommendation system", "Personalization system", "Collaborative filtering" and "Contents filtering". The full text of each article was reviewed to eliminate the article that was not actually related to recommender systems. Many of articles were excluded because the articles such as Conference papers, master's and doctoral dissertations, textbook, unpublished working papers, non-English publication papers and news were unfit for our research. We classified articles by year of publication, journals, recommendation fields, and data mining techniques. The recommendation fields and data mining techniques of 187 articles are reviewed and classified into eight recommendation fields (book, document, image, movie, music, shopping, TV program, and others) and eight data mining techniques (association rule, clustering, decision tree, k-nearest neighbor, link analysis, neural network, regression, and other heuristic methods). The results represented in this paper have several significant implications. First, based on previous publication rates, the interest in the recommender system related research will grow significantly in the future. Second, 49 articles are related to movie recommendation whereas image and TV program recommendation are identified in only 6 articles. This result has been caused by the easy use of MovieLens data set. So, it is necessary to prepare data set of other fields. Third, recently social network analysis has been used in the various applications. However studies on recommender systems using social network analysis are deficient. Henceforth, we expect that new recommendation approaches using social network analysis will be developed in the recommender systems. So, it will be an interesting and further research area to evaluate the recommendation system researches using social method analysis. This result provides trend of recommender system researches by examining the published literature, and provides practitioners and researchers with insight and future direction on recommender systems. We hope that this research helps anyone who is interested in recommender systems research to gain insight for future research.

A Study on the Damages of Head Works by the Storm Flood in the Area of Cheong Ju and Boeun -Emphasis onFactors Influenced on the Disasters and their Countermeasures- (淸州 및 報恩地方의 頭首工洪水災害에 關한 調査硏究(II) -災害原因 및 對策方案을 中心으로-)

  • Nam, Seong-Woo;Kim, Choul-Kee
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.24 no.2
    • /
    • pp.49-55
    • /
    • 1982
  • The purpose of this study is to classify the factors influenced on the damages of head works suffered from the storm flood occurred on July 22 1980 in both Musim and Bochong rivers and to find out an integral counter measures against the causes influenced on the disaster of head works in the engineering aspect of planning, design, construction and maintenance. In this survey, number of samples was taken 25 head Works, and the counter measures against the causes of their disasters summarized was as follows, 1. In the aspect of planning a. As the flood water level after the establishment of head works is more increased than the level before setting of head works owing to having more gentle slope of river bed between the head works than nature slope of river bed. Number of head works should be reduced for the appropriate annexation of them b. In the place where head works is established on the curved point of levee, the destruction of levee becomes severe by the strong deflective current. Therefore the setting of head works on the curved point should be kept off as long as possible and in case of unavoidable circumstances the construction method such as reinforced concrete wall or stone wall filed with concrete and anchored bank revetments should be considered. 2. In the aspect of design a. As scoring phenomena at up stream is serious around the weir Where the concentration of strong current is present in such a place, up stream apron having impermeability should be designed to resist and prevent scoring. b. As the length of apron and protected bed is too short to prevent scoring as down stream bed, the design length should be taken somewhat more than the calculated value, but in the case the calculated length becomes too long to be profitable, a device of water cushion should be considered. c. The structure of protected river bed should be improved to make stone mesh bags fixed to apron and to have vinyl mattress laid on river bed together with the improvement for increasing the stability of stone mesh bags and preventing the sucked sand from the river bed. d. As the shortage of cut-off length, especialy in case of the cutoffs conneting both shore sides of river makes the cause of destruction of embankment and weir body, the culculation of cut-off length should be taken enough length based on seepage length. 3. In the aspect of design and constructions a. The overturing destruction of weir by piping action was based on the jet water through cracks at the construction and expansion joints. therefore the expansion joint should be designed and constructed with the insertion of water proof plate and asphalt filling, and the construction joint, with concaved shape structure and steel reinforcement. b. As the wrong design and construction of the weep holes on apron will cause water piping and weir destruction, the design and construction of filter based on the rule of filter should be kept for weep holes. c. The wrong design and construction of bank revetment caused the severe destruction of levee and weir body resulting from scoring and impulse by strong current and formation of water route behind the revetment. Therefore bank revetment should be designod and constructed with stone wall filled with concrete and anchored, or reinforced concrete wall to prevent the formation of water flow route behind the wall and to resist against the scoring and impulse of strong stream. 4. In the aspect of maintenance When the damaged parts occurred at head works the authorities and farmers concerned should find and mend them as soon as possible with mutual cooperation, and on the other hand public citizen should be guided for good use of public property.

  • PDF

Improving the Accuracy of Document Classification by Learning Heterogeneity (이질성 학습을 통한 문서 분류의 정확성 향상 기법)

  • Wong, William Xiu Shun;Hyun, Yoonjin;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.21-44
    • /
    • 2018
  • In recent years, the rapid development of internet technology and the popularization of smart devices have resulted in massive amounts of text data. Those text data were produced and distributed through various media platforms such as World Wide Web, Internet news feeds, microblog, and social media. However, this enormous amount of easily obtained information is lack of organization. Therefore, this problem has raised the interest of many researchers in order to manage this huge amount of information. Further, this problem also required professionals that are capable of classifying relevant information and hence text classification is introduced. Text classification is a challenging task in modern data analysis, which it needs to assign a text document into one or more predefined categories or classes. In text classification field, there are different kinds of techniques available such as K-Nearest Neighbor, Naïve Bayes Algorithm, Support Vector Machine, Decision Tree, and Artificial Neural Network. However, while dealing with huge amount of text data, model performance and accuracy becomes a challenge. According to the type of words used in the corpus and type of features created for classification, the performance of a text classification model can be varied. Most of the attempts are been made based on proposing a new algorithm or modifying an existing algorithm. This kind of research can be said already reached their certain limitations for further improvements. In this study, aside from proposing a new algorithm or modifying the algorithm, we focus on searching a way to modify the use of data. It is widely known that classifier performance is influenced by the quality of training data upon which this classifier is built. The real world datasets in most of the time contain noise, or in other words noisy data, these can actually affect the decision made by the classifiers built from these data. In this study, we consider that the data from different domains, which is heterogeneous data might have the characteristics of noise which can be utilized in the classification process. In order to build the classifier, machine learning algorithm is performed based on the assumption that the characteristics of training data and target data are the same or very similar to each other. However, in the case of unstructured data such as text, the features are determined according to the vocabularies included in the document. If the viewpoints of the learning data and target data are different, the features may be appearing different between these two data. In this study, we attempt to improve the classification accuracy by strengthening the robustness of the document classifier through artificially injecting the noise into the process of constructing the document classifier. With data coming from various kind of sources, these data are likely formatted differently. These cause difficulties for traditional machine learning algorithms because they are not developed to recognize different type of data representation at one time and to put them together in same generalization. Therefore, in order to utilize heterogeneous data in the learning process of document classifier, we apply semi-supervised learning in our study. However, unlabeled data might have the possibility to degrade the performance of the document classifier. Therefore, we further proposed a method called Rule Selection-Based Ensemble Semi-Supervised Learning Algorithm (RSESLA) to select only the documents that contributing to the accuracy improvement of the classifier. RSESLA creates multiple views by manipulating the features using different types of classification models and different types of heterogeneous data. The most confident classification rules will be selected and applied for the final decision making. In this paper, three different types of real-world data sources were used, which are news, twitter and blogs.