• Title/Summary/Keyword: admissibility

Search Result 75, Processing Time 0.023 seconds

유비쿼터스 컴퓨팅 황경에서 발생하는 에이전트간 충돌 해결 모델

  • 이건수;김민구
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2004.11a
    • /
    • pp.249-258
    • /
    • 2004
  • 오늘날 활발하게 이루어지고 있는 유비쿼터스 컴퓨팅 관련 기술 연구는 사용자가 시간과 장소에 구애받지 않고 네트워크에 접근해 다양한 컴퓨터 관련 서비스를 제공 받을 수 있는 방법에 초점을 맞추고 있다. 이 처럼 시간과 공간의 한계를 뛰어 넘은 네트워크로의 자유로운 접근은 일상 생활의 패러다임을 바꾸어 놓게 될 것이다. 유비쿼터스 컴퓨팅 기술을 통해 가장 큰 변화가 일어나는 분야는 일반 가정환경에서 일어나는 인텔리전트 홈 네트워크 (Intelligent Home Network) 라고 할 수 있다. 집에 들어오면, 자동으로 문을 열어주고, 불을 켜주며, 놓쳤던 TV 프로그램을 자동으로 녹화해 놓았다가 원하는 시간에 보여주고, 적당한 시간에 목욕물을 미리 받아준다. 또한 집밖으로 나가기 전, 일기예보에 따라 우산을 챙겨주고, 일정을 확인시켜주며 입고 나갈 옷을 골라줄 수도 있다. 이 모든 일들이 유비쿼터스 컴퓨팅 기술이 가져올 인텔리전트 홈 네트워크의 모습이다. 그러나, 모든 사용자에게 효과적인 서비스를 제공하기 위해서는 홈 네트워크 상의 자원 관리에서 일어날 수 있는 에이전트들간의 자원 접근 권한 충돌을 효율적으로 방지할 수 있는 기술이 필요하다. 유비쿼터스 컴퓨팅 환경에서 자원관리 특성은 점유의 연속성, 자원 사이의 연관성, 그리고 자원과 사용자 사 사이의 연계성의 3 가지 특성을 지니고 있다. 본 논문에서는 유비쿼터스 컴퓨팅 환경에서 일어날 수 있는 자원 충돌 상황을 효율적으로 처리하기 위한 자원 협상 방법을 제안한다. 본 방법은 자원 관리 특성을 바탕으로 시간논리에 기반을 둔 자원 선점과 분배 규칙으로 구성된다.트 시스템은 b-Cart를 기반으로 할 것으로 예측할 수 있다.타났다. 또한, 스네이크의 초기 제어점을 얼굴은 44개, 눈은 16개, 입은 24개로 지정하여 MER추출에 성공한 영상에 대해 스네이크 알고리즘을 수행한 결과, 추출된 영역의 오차율은 각각 2.2%, 2.6%, 2.5%로 나타났다.해서 Template-based reasoning 예를 보인다 본 방법론은 검색노력을 줄이고, 검색에 있어 Feasibility와 Admissibility를 보장한다.매김할 수 있는 중요한 계기가 될 것이다.재무/비재무적 지표를 고려한 인공신경망기법의 예측적중률이 높은 것으로 나타났다. 즉, 로지스틱회귀 분석의 재무적 지표모형은 훈련, 시험용이 84.45%, 85.10%인 반면, 재무/비재무적 지표모형은 84.45%, 85.08%로서 거의 동일한 예측적중률을 가졌으나 인공신경망기법 분석에서는 재무적 지표모형이 92.23%, 85.10%인 반면, 재무/비재무적 지표모형에서는 91.12%, 88.06%로서 향상된 예측적중률을 나타내었다.ting LMS according to increasing the step-size parameter $\mu$ in the experimentally computed. learning curve. Also we find that convergence speed of proposed algorithm is increased by (B+1) time proportional to B which B is the number of recycled data b

  • PDF

The Formation and Ratification of ISDS in International FTA and Its Characteristics -with a special emphasis on KORUS FTA, NAFTA & AUSFTA- (국제자유무역협약에서 ISDS의 생성과 비준에 관한 연구 -KORUS FTA, NAFTA 및 AUSFTA를 중심으로-)

  • Hahn, Jae-Phil
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.409-431
    • /
    • 2012
  • This article deals with the nature of ISDS along with the admissibility thereof, for the settlement of investment disputes between states and nationals of other states. ICSID as an organization of World Bank Group, has been established in 1966 and as of May in 2011, 157 nations ratified its convention. As for the Republic of Korea(ROK) it has been involved in the problematic situation with regard to ISDS of the KORUS FTA in negotiation with the United States. The ruling Grand National Party is pushing the FTA for ratification including ISDS. However, the opposition party, the Unified Democratic Party rejected the ISDS with a view to a toxin infringing on its judiciary sovereignty. The ROK has invested in the US 3.5 times more than the US did in Korea up to now. As a result, it seems that the ROK is more concerned about ISDS than the US is, considering that exhausting local remedy through the US local courts, applying even a municipal ordinance in their decisions which will be unsatisfactory toward the ROK side. The ROK is now struggling with the ISDS as a political issue between the ruling party and the opposition party mostly based on sovereignty with a reference on AUSFTA which excluded the ISDS. Australian model about ISDS has been impacted by the experience from the NAFTA which allowes direct claims against each other(the US against Canada and Canada against the US). It seems not to be much sympathy for developed countries because it has long been held to standards for pressing on developing countries. Australia is also struggling with ISDS from the political point of view likewise the ROK. And the ISDS is destined to the political situations established within the domestic countries among the political parties in relation with the acceptance or rejection of thereof.

  • PDF

Case Study on Treaty-Based Investor-State Arbitration and Environmental Litigations with Specific Reference to Chevron/Ecuador Litigation (환경 소송과 국제투자중재 - 쉐브론 사건을 중심으로)

  • Kang, Pyoung-Keun
    • Journal of Arbitration Studies
    • /
    • v.25 no.4
    • /
    • pp.3-23
    • /
    • 2015
  • The Chevron saga including Chevron/TexPet v. Ecuador, PCA Case No. 34877(hereinafter referred to as "Chevron I") and Chevron/TexPet v. Ecuador, PCA Case No. 2009-23(hereinafter referred to as "Chevron II") started out of domestic litigations between TexPet and Ecuador in the early 1990s. In Chevron I, the Tribunal decided that Article 2(7) of the U.S.-Ecuador BIT on effective means of provision was breached because of undue delays in the seven legal proceedings TexPet had brought against Ecuador in respect to contractual obligations. In Chevron II, it was contended that through the actions and inactions of the judiciary and the executive, Ecuador breached her several obligations under the BIT. Ecuador objected to the jurisdiction of the Tribunal because TexPet's investment was terminated in 1992, and because Chevron is not a party to the 1995 Settlement Agreement and 1998 Final Release. In its Interim Award on Jurisdiction and Admissibility, the Tribunal applied a prima facie standard to the facts alleged by the Claimants but denied by the Respondent, and decided that questions in respect of the Respondent's jurisdictional objections should be joined to the merits under Article 21(4) of the UNCITRAL Arbitration Rules. In the merits phase of Chevron II, the Tribunal divided the merits of the Parties' dispute into two parts, entitled "Track 1" and "Track 2". In its Partial Award on Track 1, the Tribunal decided that Chevron is a "Releasee" under the 1995 Settlement Agreement. In a decision on "Track 1B", the Tribunal decided that the Lago Agrio complaint cannot be read as pleading "exclusively" or "only" diffuse claims, and that, to this extent, the Claimants' reliance on the 1995 Settlement Agreement as a complete bar to the Lago Agrio complaint must fail, as a matter of Ecuadorian law. The Tribunal maintained the position that the Parties' disputes on both merit and jurisdiction should be reserved for Track 2. It remains to be seen how the Tribunal addresses the Claimants' allegations of multiple denials of justice under international law against the judgments of the Respondent's Courts, together with the Respondent's jurisdictional objections in Track 2 of the arbitration.

A Study on Forgery Techniques of Smartphone Voice Recording File Structure and Metadata (스마트폰 음성녹음 파일 구조 및 메타데이터의 위변조 기법에 관한 연구)

  • Park, Jae Wan;Kwak, Won Jun;Lee, John Sanghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.807-812
    • /
    • 2022
  • Recently, as the number of voice recording files submitted as court evidence increases, the number of cases claiming forgery is also increasing. If the audio recording file structure and metadata, which are objective grounds, are completely forged, it is actually impossible to detect forgery of the sophisticated audio recording file. It is extremely rare for the court to reject the file structure and metadata analysis performed with the forged audio recording file. The purpose of this study is to prove that forgery of voice recording file structure and metadata is easily possible. To this end, in this study, it was introduced that forgery detection is impossible when the 'mixed paste' function, which enables sophisticated editing based on the typification of the editing method of voice recording files, is applied. Moreover, it has been proven through experiments that forgery of file structure and metadata is possible. Therefore, a stricter standard for judging the admissibility of evidence is required when the audio recording file is adopted as digital evidence. This study will not only contribute to the standard of integrity in the adoption of digital evidence by judges, but will also contribute to the method of constructing a dataset for artificial intelligence in detecting forgery of recorded files that is expected to be developed in the future.

One-probe P300 based concealed information test with machine learning (기계학습을 이용한 단일 관련자극 P300기반 숨김정보검사)

  • Hyuk Kim;Hyun-Taek Kim
    • Korean Journal of Cognitive Science
    • /
    • v.35 no.1
    • /
    • pp.49-95
    • /
    • 2024
  • Polygraph examination, statement validity analysis and P300-based concealed information test are major three examination tools, which are use to determine a person's truthfulness and credibility in criminal procedure. Although polygraph examination is most common in criminal procedure, but it has little admissibility of evidence due to the weakness of scientific basis. In 1990s to support the weakness of scientific basis about polygraph, Farwell and Donchin proposed the P300-based concealed information test technique. The P300-based concealed information test has two strong points. First, the P300-based concealed information test is easy to conduct with polygraph. Second, the P300-based concealed information test has plentiful scientific basis. Nevertheless, the utilization of P300-based concealed information test is infrequent, because of the quantity of probe stimulus. The probe stimulus contains closed information that is relevant to the crime or other investigated situation. In tradition P300-based concealed information test protocol, three or more probe stimuli are necessarily needed. But it is hard to acquire three or more probe stimuli, because most of the crime relevant information is opened in investigative situation. In addition, P300-based concealed information test uses oddball paradigm, and oddball paradigm makes imbalance between the number of probe and irrelevant stimulus. Thus, there is a possibility that the unbalanced number of probe and irrelevant stimulus caused systematic underestimation of P300 amplitude of irrelevant stimuli. To overcome the these two limitation of P300-based concealed information test, one-probe P300-based concealed information test protocol is explored with various machine learning algorithms. According to this study, parameters of the modified one-probe protocol are as follows. In the condition of female and male face stimuli, the duration of stimuli are encouraged 400ms, the repetition of stimuli are encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. In the condition of two-syllable word stimulus, the duration of stimulus is encouraged 300ms, the repetition of stimulus is encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. It was also conformed that the logistic regression (LR), linear discriminant analysis (LDA), K Neighbors (KNN) algorithms were probable methods for analysis of P300 amplitude. The one-probe P300-based concealed information test with machine learning protocol is helpful to increase utilization of P300-based concealed information test, and supports to determine a person's truthfulness and credibility with the polygraph examination in criminal procedure.