• 제목/요약/키워드: Samsung SDS

검색결과 159건 처리시간 0.028초

생성 모델과 검색 모델을 이용한 한국어 멀티턴 응답 생성 연구 (A study on Korean multi-turn response generation using generative and retrieval model)

  • 이호동;이종민;서재형;장윤나;임희석
    • 한국융합학회논문지
    • /
    • 제13권1호
    • /
    • pp.13-21
    • /
    • 2022
  • 최근 딥러닝 기반의 자연어처리 연구는 사전 훈련된 언어 모델을 통해 대부분의 자연어처리 분야에서 우수한 성능을 보인다. 특히 오토인코더 (auto-encoder) 기반의 언어 모델은 다양한 한국어 이해 분야에서 뛰어난 성능과 쓰임을 증명하고 있다. 그러나 여전히 디코더 (decoder) 기반의 한국어 생성 모델은 간단한 문장 생성 과제에도 어려움을 겪고 있으며, 생성 모델이 가장 일반적으로 쓰이는 대화 분야에서의 세부 연구와 학습 가능한 데이터가 부족한 상황이다. 따라서 본 논문은 한국어 생성 모델을 위한 멀티턴 대화 데이터를 구축하고 전이 학습을 통해 생성 모델의 대화 능력을 개선하여 성능을 비교 분석한다. 또한, 검색 모델을 통해 외부 지식 정보에서 추천 응답 후보군을 추출하여 모델의 부족한 대화 생성 능력을 보완하는 방법을 제안한다.

I형 뮤코다당증 환자들에서 효소 보충 요법이 성장에 미치는 영향 (Effect of Enzyme Replacement Therapy on Growth in Korean Patients with Mucopolysaccharidosis Type I)

  • 허림;조성윤;장미선;이지은;권영희;김수진;손영배;박성원;맹세현;권은경;한선주;정주연;진동규
    • 대한유전성대사질환학회지
    • /
    • 제13권2호
    • /
    • pp.111-119
    • /
    • 2013
  • 목적: I형 뮤코다당증 (MPS I)은 ${\alpha}$-L-iduronidase 효소의 결핍으로 인하여 발생하는 리소좀 축적 질환으로, 광범위한 양상으로 다기관에 영향을 미친다. 저신장과 성장 속도의 감소는 MPS I의 중요한 특징이다. 본 연구에서는 효소 보충 요법이 MPS I 환자들의 성장에 미치는 효과에 대해 알아보기 위하여 단일 기관의 환자들을 대상으로 분석하였다. 방법: 2세에서 15세 사이에 효소 보충 요법을 시작하여 최소 3년 이상의 치료를 시행 받은 10명의 한국 MPS I 환자들의 키 측정치를 후향적으로 분석하였다. 효소 보충 요법 시작시의 평균 나이는 7년 7개월 이였으며, 남아는 6명, 여아는 4명 이였다. 키는 표준 편차(SDS)로 표현되었다. 효소 보충 요법 전과 후의 연간 성장 속도를 계산하였으며, 구분회귀모델을 이용하여 치료 전과 후의 키 z-score를 분석하였다. 표현형[(중증(Hurler) versus 경증(Hurler-Scheie, Scheie)]이 성장에 미치는 영향에 대해서는 개별 분석을 시행하였다. 결과: 효소 보충 요법 전 1년 동안의 연간 성장은 3.3 cm (z-score=-0.21) 였으며, 효소 보충 요법 후 1년, 2년, 3년에서는 각각 6.2 cm (z-score=0.17), 5.8 cm (z-score=0.07), 3.8 cm (z-score=-0.4)이였다. 회귀분석 결과, 효소 보충 요법 전에 비하여 치료 후 기울기에 유의한 호전을 보였다(기울기 차이=0.04; P=0.022). 중증과 경증 표현형 간의 치료 전(P=0.001)과 후(P<0.0001)의 기울기 차이는 통계적으로 유의하였으나, 표현형에 따라 분석하였을 때 통계적으로 유의한 차이는 보이지 않았다. 결론: MPS I 환자들의 키 성장에 있어 aldurazyme 효소 보충 요법이 긍정적인 효과를 미치는 것으로 보인다.

  • PDF

Allergenic potential and enzymatic resistance of buckwheat

  • Lee, Sujin;Han, Youngshin;Do, Jeong-Ryong;Oh, Sangsuk
    • Nutrition Research and Practice
    • /
    • 제7권1호
    • /
    • pp.3-8
    • /
    • 2013
  • Buckwheat is known as a health food but is one of the major food allergens triggering potentially fatal anaphylaxis in Asia, especially in Japan and Korea. This study was conducted to investigate the characteristic of enzymatic resistance of buckwheat protein and allergenic potential. Enzymatic resistance of buckwheat protein was performed with in vitro digestibility test in simulated gastric fluid (SGF), pH 1.2, using pepsin and simulated intestinal fluid (SIF) using chymotrypsin. Reactivity of buckwheat proteins to human IgE was performed using six allergic patients sensitized to buckwheat. Buckwheat's IgE levels were measured using the Phadia UniCAP-system. Buckwheat protein, 16 kDa, still remained after 30 min treatment of pepsin on SDS-PAGE. Even though 16 kDa almost disappeared after 60 min treatment, two out of the six buckwheat patients' sera showed reactivity to hydrolysate after 60 min treatment, indicating that allergenicity still remained. In simulated intestinal fluid (SIF) using chymotrypsin, buckwheat protein, 24 kDa, showed resistance to hydrolysis with chymotrypsin on SDS-PAGE, and still had allergenicity based on the result of ELISA. Our results suggest that buckwheat proteins have strong resistance to enzyme degradation. This may be attributed in part to the allergenic potential of buckwheat. Further study should be continued regarding buckwheat allergy.

IoD 환경에서 MEC를 활용한 U2U 인증에서 보안 취약점 분석 (Analysis of Security Vulnerability in U2U Authentication Using MEC in IoD Environment)

  • 최재현;이상훈;정익래;변진욱
    • 정보보호학회논문지
    • /
    • 제31권1호
    • /
    • pp.11-17
    • /
    • 2021
  • 최근 사물인터넷(IoT)의 발달과 드론을 활용한 서비스의 증가로 인해 IoD에 대한 연구가 활발히 진행 중이다. 드론은 연산능력이 약하고 저장소의 크기가 작은 자원적인 한계를 갖고 있으며 드론 간 통신 시 정당한 개체 간 인증을 거친 후 데이터를 주고받는다. 드론은 위치, 이동 경로와 같은 민감 정보를 포함하기 때문에 추적성으로부터 안전해야 한다. 본 논문에서는 기존 IoD 연구에서 가명 및 인증서 사용으로 발생할 수 있는 치명적인 보안 취약점을 지적하고 해결책을 제안한다.

유방암 환자의 자기초월감 증진을 위한 자조집단과정 개발 및 운영 효과 (Effects of the Self-help Group Program for Promoting Self-Transcendence in Women with Breast Cancer)

  • 권인각;박은영;함윤희;류성숙;이은옥
    • 종양간호연구
    • /
    • 제1권2호
    • /
    • pp.217-228
    • /
    • 2001
  • Cancer survivor's self-help group may promote psychosocial adjustment in cancer patients. Self-transcendence has been shown to be related with crisis and adjustment in women with breast cancer. The purpose of this study is to determine the effectiveness of self-transcendence promoting program to facilitate self-transcendence, physical, and emotional well-being in women with breast cancer. Thirty patients who received mastectomy were recruited, but 9 subjects of experimental group and 14 subjects of control group participated in this study. Subjects of experimental group attended the self-help group for self-transcendence once a week for 6 weeks. Each session of program was proceeded for 2hours and the program contained activities for promoting self-transcendence, stress management, communication skill, exercise and relaxation, symptom management, and family support. Data were collected by self-reporting questionnaires within seven days after mastectomy and after the program was finished in experimental group, within 7 days after mastectomy and after 3 months in control group. Self-transcendence was assessed using the self-transcendence scale (STS) developed by Reed. Physical well being was assessed using Symptom distress scale (SDS) developed by McCorkle and Young and emotional well being was assessed using Profile of mood states (POMS). As a result, no significant differences were found between both groups in changes of self-transcendence, emotional well-being, and physical well-being. Self-transcendence score was significantly decreased in control group (p =0.16). But that of experimental group showed no decrease. In conclusions, when the self-transcendence promoting program is provided to the patients with breast cancer, it can be helpful for promoting self- transcendence. For the further study, repeated research with appropriate sample size and more intensive nursing intervention to promote self-transcendence is suggested. And reassessment after 6 months is recommended for testing long term effects of the program.

  • PDF

On Finding a Convenient Path in the Hierarchical Road Network

  • Sung, Ki-Seok;Park, Chan-Kyoo;Lee, Sang-Wook;Doh, Seung-Yong;Park, Soon-Dal
    • Management Science and Financial Engineering
    • /
    • 제12권2호
    • /
    • pp.87-110
    • /
    • 2006
  • In a hierarchical road network, all roads can be classified according to their attributes such as speed limit, number of lanes, etc. By splitting the whole road network into the subnetworks of the highlevel and low-level roads, we can reduce the size of the network to be calculated at once, and find a path in the way that drivers usually adopt when searching out a travel route. To exploit the hierarchical property of road networks, we define a convenient path and propose an algorithm for finding convenient paths. We introduce a parameter indicating the driver's tolerance to the difference between the length of a convenient path and that of a shortest convenient path. From this parameter, we can determine how far we have to search for the entering and exiting gateway. We also propose some techniques for reducing the number of pairs of entries and exits to be searched in a road network. A result of the computational experiment on a real road network is given to show the efficiency of the proposed algorithm.

가상사설망의 성능개선을 위한 동적 키 재생성 주기 변경 알고리즘 (A Dynamic Key Lifetime Change Algorithm for Performance Improvement of Virtual Private Networks)

  • 한종훈;이정우;박성한
    • 대한전자공학회논문지TC
    • /
    • 제42권10호
    • /
    • pp.31-38
    • /
    • 2005
  • IPSec은 인터넷의 네트워크 계층의 IP 메시지를 위한 기밀성과 인증서비스를 제공하는 보안 프로토콜이다. Internet Key Exchange (IKE)는 안전하게 Security Association (SA)를 협상하고 키 재료를 제공하는 프로토콜이다. 본 논문에서는 IPSec을 적용한 가상사설망의 성능 개선을 위해 동적으로 키 재생성 주기를 변경하는 알고리즘을 제안한다. 제안하는 알고리즘은 보안 터널 수에 따라 키 재생성 주기를 변경한다. 성능 평가를 위해 Linux 2.4.18과 FreeS/WAN을 사용하여 구현한다. 구현한 시스템은 기존 프로토콜에 비하여 네트워크 처리율과 보안성 측면에서 성능이 개선됨을 보여주고 있다.

Growth Hormone Therapy in PWS with Mobile Application-Living with PWS

  • Im, Minji
    • Journal of mucopolysaccharidosis and rare diseases
    • /
    • 제4권2호
    • /
    • pp.42-44
    • /
    • 2018
  • Prader-Willi syndrome (PWS) is a multisystemic complex disorder characterized by hyperphagia and impaired satiety which lead to severe and early obesity. In infancy, hypotonia and poor suck are main problems, and a child goes through Failure-to-thrive. During childhood, clinical manifestations change to food seeking as well as excessive weight gain, short stature, developmental delay, cognitive disability and behavioral problems. Also, growth hormone insufficiency is frequent. Most patients receive the recombinant growth hormone (rGH) therapy that provides improvement in growth, body composition, and physical attributes. The clinical care guideline for rGH therapy in PWS had been noticed in 2013. The rGH therapy helps in body fat, lean body mass, height SDS and head circumference. Also, the rGH therapy helps motor function, psychomotor development and cognition and behavioral issues.In Samsung medical center, there are clinical care guidelines for rGH therapy in PWS and an useful application for the patients. 'Living with PWS', the name of an moblie application for PWS patients, was introduced in the lecture. The application revised to version 2. It was made more convenient to users than in version 1. It helps caregivers to schedule the rGH therapy and to monitor height and weight.

Relations among Security Models for Authenticated Key Exchange

  • Kwon, Jeong Ok;Jeong, Ik Rae
    • ETRI Journal
    • /
    • 제36권5호
    • /
    • pp.856-864
    • /
    • 2014
  • Usually, key-establishment protocols are suggested in a security model. However, there exist several different security models in the literature defined by their respective security notions. In this paper, we study the relations between the security models of key establishment. For the chosen security models, we first show that some proven key-establishment protocols are not secure in the more restricted security models. We then suggest two compilers by which we can convert a key-establishment protocol that is secure in a specific security model into a key-establishment protocol that is still secure in a more restricted security model.

Robust investment model for long range capacity expansion of chemical processing networks using two-stage algorithm

  • Bok, Jinkwang;Lee, Heeman;Park, Sunwon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1997년도 한국자동제어학술회의논문집; 한국전력공사 서울연수원; 17-18 Oct. 1997
    • /
    • pp.1758-1761
    • /
    • 1997
  • The problem of long range capacity expansion planing for chemical processing network under uncertain demand forecast secnarios is addressed. This optimization problem involves capactiy expansion timing and sizing of each chemical processing unit to maximize the expected net present value considering the deviation of net present values and the excess capacity over a given time horizon. A multiperiod mixed integer nonlinear programming optimization model that is both solution and modle robust for any realization of demand scenarios is developed using the two-stage stochastic programming algorithm. Two example problems are considered to illustrate the effectiveness of the model.

  • PDF