• Title/Summary/Keyword: classification technique

Search Result 1,709, Processing Time 0.024 seconds

Bilataral Trade Balance between Korea and Her Trading Partners: Using Panel Approach (한국의 무역상대국간 무역수지와 환율간의 장기관계분석: 패널분석의 적용)

  • Kim, Joung-Gu
    • International Area Studies Review
    • /
    • v.14 no.1
    • /
    • pp.185-202
    • /
    • 2010
  • While it is often assumed that a country's trade balance will improve in the long-run if its currency is allowed to depreciate, this is not necessarily the case for specific industry. This paper is to examine the long-run relationships between trade balance and real exchange rate using bilateral data of SITC 10 Industry Classification for Korea vis-${\grave{a}}$-vis her trading partners Indonesia, India, China, Japan on a quarterly basis over the period of 1999Q1 to 2008Q4. I applied the recent panel cointegration technique to reduce the small sample problems and improving power performance of the relevant estimation and inference procedures. The results reveal evidence of the Marshall-Lerner Condition in Indonesia 2 industries, India 5 industries, Japanese 4 industries, Chinese 6 industries. Whole group's cointegration statistic of India, China, Japan was supported Marshall-Lerner Condition but Indonesia was rejected.

A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns (종단간의 유사 연결 패턴을 갖는 정상 서버 활동과 공격의 구분 및 탐지 방법)

  • Chang, Beom-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1315-1324
    • /
    • 2012
  • Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.

Books Related to Acupuncture Published in North Korea (북한의 침구학 서적에 대한 개괄적 연구)

  • Kim, Jong-hyun;Kim, Song-Yi
    • Korean Journal of Acupuncture
    • /
    • v.37 no.4
    • /
    • pp.231-244
    • /
    • 2020
  • Objectives : This study was conducted to introduce the types and contents of books related to acupuncture published in North Korea that can be identified in South Korea, and to understand the general characteristics of North Korean acupuncture. Methods : Firstly, we identified books related to acupuncture in the Information Center on North Korea of the National Library of Korea. Specialized books on treatment interventions such as acupuncture, moxibustion, cupping, electrotherapy, and manual therapy including acupressure which stimulate acupoints were included in the study. Two authors reviewed the title, table of contents, and contents of each book in the order of publication year for the searched books. Based on this, the characteristics and trends of North Korean acupuncture were comprehensively examined. Results : The included 18 books were published between 1964 and 2018. One of them was considered a Chinese book translated into Korean and published in China, and another was a North Korean book republished by a South Korean publisher. Except for these, all were published in North Korea, two of which were translations of Chinese books. Most of them were books on the theory and clinical applications of acupuncture, but some of them focused on specific treatment interventions such as auricular acupuncture, fire needling, manual therapy, cupping, or electrotherapy. Also, there was a book about the mechanism of acupuncture analgesia in a neurophysiological way. Conclusions : Since the mid-1960s, North Korea has been steadily attempting to combine acupuncture and Western medicine by applying the disease name and classification system of Western medicine, using modern diagnostic technique, and explaining the mechanism of acupuncture based on the latest research. After the 2000s, the standard international acupuncture nomenclature by World Health Organization was used. In recent years, there has been a tendency to publish and widely disseminate specialized books on non-pharmacological treatment such as cupping, electrotherapy, and fire needling.

Applicable Focal Points of HFACS to Investigate Domestic Civil Unmanned Aerial Vehicle Accidents (국내 민간 무인항공기 사고조사 HFACS 적용중점)

  • Lee, Keon-Hee;Kim, Hyeon-Deok
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.3
    • /
    • pp.256-266
    • /
    • 2021
  • Domestic and foreign studies point to human factors as the main cause of unmanned aerial vehicle accidents, and HFACS is introduced as a technique to effectively analyze these human factors. Until now, domestic and foreign cases of analyzing the human factors of unmanned aerial vehicle accidents using HFACS were mainly targeted by military unmanned aerial vehicles, which can be used as an objective cause identification and similar accident prevention tool. In particular, identifying the focus of HFACS application considering the performance and operation conditions of domestic civilian unmanned aerial vehicles is expected to greatly help identify the cause and prevent recurrence in the event of an accident. Based on HFACS version 7.0, this study analyzed the accident investigation report data conducted by Korea Aviation and Railway Accident Investigation Board to identify the focus of HFACS application that can be used for domestic civilian unmanned aircraft accident investigations.

Data Analysis of Dropouts of University Students Using Topic Modeling (토픽모델링을 활용한 대학생의 중도탈락 데이터 분석)

  • Jeong, Do-Heon;Park, Ju-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.88-95
    • /
    • 2021
  • This study aims to provide implications for establishing support policies for students by empirically analyzing data on university students dropouts. To this end, data of students enrolled in D University after 2017 were sampled and collected. The collected data was analyzed using topic modeling(LDA: Latent Dirichlet Allocation) technique, which is a probabilistic model based on text mining. As a result of the study, it was found that topics that were characteristic of dropout students were found, and the classification performance between groups through topics was also excellent. Based on these results, a specific educational support system was proposed to prevent dropout of university students. This study is meaningful in that it shows the use of text mining techniques in the education field and suggests an education policy based on data analysis.

GAN System Using Noise for Image Generation (이미지 생성을 위해 노이즈를 이용한 GAN 시스템)

  • Bae, Sangjung;Kim, Mingyu;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.700-705
    • /
    • 2020
  • Generative adversarial networks are methods of generating images by opposing two neural networks. When generating the image, randomly generated noise is rearranged to generate the image. The image generated by this method is not generated well depending on the noise, and it is difficult to generate a proper image when the number of pixels of the image is small In addition, the speed and size of data accumulation in data classification increases, and there are many difficulties in labeling them. In this paper, to solve this problem, we propose a technique to generate noise based on random noise using real data. Since the proposed system generates an image based on the existing image, it is confirmed that it is possible to generate a more natural image, and if it is used for learning, it shows a higher hit rate than the existing method using the hostile neural network respectively.

Development of men's jacket design applying nature's folding characteristics (자연의 주름 특성을 활용한 남성 재킷 디자인)

  • Kim, Hee Jung;Lee, Youn Mee;Lee, Younhee
    • The Research Journal of the Costume Culture
    • /
    • v.28 no.6
    • /
    • pp.787-800
    • /
    • 2020
  • This study aims to derive the criteria of folding techniques and their characteristics through analysis of literature and previous studies. This will be realized by performing a case study on male fashion design and folding. It will propose diverse directions and data for male fashion design, by making men's jackets using a folding technique. The concept and terms of folding were clarified through examination of existing literature and previous studies. Specifically, four pieces were created with motifs of the four seasons. Among the types of pleats expressed in the works, composition pleats include double ruffles, gathers, and draperies, while processed ones include box pleats, knife pleats, and accordion pleats. This study expresses continuity, fluidity, scalability, and ambiguity through the use of such pleats. The results of the production are as follows. First, in terms of the continuous use of regular and repetitive pleats, a possibility of rich pleats was confirmed because they varied depending on the gap between the pleat and target material. Second, in liquid but irregular pleats, diverse moods were created by the pleat movement. The overlapping of repeated pleats expresses diverse spaces and shapes in a 3D extended silhouette. Third, in pleat classification, ambiguity was confirmed with the use of continuous accordion pleats in the printed gradation fabric. It is anticipated that more diverse and creative designs could be created using more extended techniques in future studies.

A Study on the Establishment of ISAR Image Database Using Convolution Neural Networks Model (CNN 모델을 활용한 항공기 ISAR 영상 데이터베이스 구축에 관한 연구)

  • Jung, Seungho;Ha, Yonghoon
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.4
    • /
    • pp.21-31
    • /
    • 2020
  • NCTR(Non-Cooperative Target Recognition) refers to the function of radar to identify target on its own without support from other systems such as ELINT(ELectronic INTelligence). ISAR(Inverse Synthetic Aperture Radar) image is one of the representative methods of NCTR, but it is difficult to automatically classify the target without an identification database due to the significant changes in the image depending on the target's maneuver and location. In this study, we discuss how to build an identification database using simulation and deep-learning technique even when actual images are insufficient. To simulate ISAR images changing with various radar operating environment, A model that generates and learns images through the process named 'Perfect scattering image,' 'Lost scattering image' and 'JEM noise added image' is proposed. And the learning outcomes of this model show that not only simulation images of similar shapes but also actual ISAR images that were first entered can be classified.

Sensor Data Collection & Refining System for Machine Learning-Based Cloud (기계학습 기반의 클라우드를 위한 센서 데이터 수집 및 정제 시스템)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.165-170
    • /
    • 2021
  • Machine learning has recently been applied to research in most areas. This is because the results of machine learning are not determined, but the learning of input data creates the objective function, which enables the determination of new data. In addition, the increase in accumulated data affects the accuracy of machine learning results. The data collected here is an important factor in machine learning. The proposed system is a convergence system of cloud systems and local fog systems for service delivery. Thus, the cloud system provides machine learning and infrastructure for services, while the fog system is located in the middle of the cloud and the user to collect and refine data. The data for this application shall be based on the Sensitive data generated by smart devices. The machine learning technique applied to this system uses SVM algorithm for classification and RNN algorithm for status recognition.

A Case Study on the Estimation of the Risk based on Statistics (산업재해통계기반 Risk 산정에 관한 연구)

  • Woo, Jong-Gwon;Lee, Mi-Jeong;Seol, Mun-Su;Baek, Jong-Bae
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.4
    • /
    • pp.80-87
    • /
    • 2021
  • Risk assessment techniques are processes used to evaluate hazardous risk factors in construction sites, facilities, raw materials, machinery, and equipment, and to estimate the size of risk that could lead to injury or disease, and establish countermeasures. The most important thing in assessing risk is calculating the size of the risk. If the size of the risk cannot be calculated objectively and quantitatively, all members who participated in the evaluation would passively engage in establishing and implementing appropriate measures. Therefore, this study focused on predicting accidents that are expected to occur in the future based on past occupational accident statistics, and quantifying the size of the risk in an overview. The technique employed in this study differs from other risk assessment techniques in that the subjective elements of evaluators were excluded as much as possible by utilizing past occupational accident statistics. This study aims to calculate the size of the risk, regardless of evaluators, such as a manager, supervisor, safety manager, or employee. The size of the risk is the combination of the likelihood and severity of an accident. In this study, the likelihood of an accident was evaluated using the theory of Bud Accident Chainability, and the severity of an accident was calculated using the occupational accident statistics over the past five years according to the accident classification by the International Labor Organization.