• Title/Summary/Keyword: information processing purpose

Search Result 1,555, Processing Time 0.035 seconds

Preliminary Inspection Prediction Model to select the on-Site Inspected Foreign Food Facility using Multiple Correspondence Analysis (차원축소를 활용한 해외제조업체 대상 사전점검 예측 모형에 관한 연구)

  • Hae Jin Park;Jae Suk Choi;Sang Goo Cho
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.121-142
    • /
    • 2023
  • As the number and weight of imported food are steadily increasing, safety management of imported food to prevent food safety accidents is becoming more important. The Ministry of Food and Drug Safety conducts on-site inspections of foreign food facilities before customs clearance as well as import inspection at the customs clearance stage. However, a data-based safety management plan for imported food is needed due to time, cost, and limited resources. In this study, we tried to increase the efficiency of the on-site inspection by preparing a machine learning prediction model that pre-selects the companies that are expected to fail before the on-site inspection. Basic information of 303,272 foreign food facilities and processing businesses collected in the Integrated Food Safety Information Network and 1,689 cases of on-site inspection information data collected from 2019 to April 2022 were collected. After preprocessing the data of foreign food facilities, only the data subject to on-site inspection were extracted using the foreign food facility_code. As a result, it consisted of a total of 1,689 data and 103 variables. For 103 variables, variables that were '0' were removed based on the Theil-U index, and after reducing by applying Multiple Correspondence Analysis, 49 characteristic variables were finally derived. We build eight different models and perform hyperparameter tuning through 5-fold cross validation. Then, the performance of the generated models are evaluated. The research purpose of selecting companies subject to on-site inspection is to maximize the recall, which is the probability of judging nonconforming companies as nonconforming. As a result of applying various algorithms of machine learning, the Random Forest model with the highest Recall_macro, AUROC, Average PR, F1-score, and Balanced Accuracy was evaluated as the best model. Finally, we apply Kernal SHAP (SHapley Additive exPlanations) to present the selection reason for nonconforming facilities of individual instances, and discuss applicability to the on-site inspection facility selection system. Based on the results of this study, it is expected that it will contribute to the efficient operation of limited resources such as manpower and budget by establishing an imported food management system through a data-based scientific risk management model.

A Study on Christian Educational Implications for 6 Key Competencies of 2015 Revised National Curriculum (2015 개정 교육과정의 6개 핵심역량에 대한 기독교교육적 함의)

  • Seo, Mikyoung
    • Journal of Christian Education in Korea
    • /
    • v.63
    • /
    • pp.221-253
    • /
    • 2020
  • The purpose of this study is to define the key competency as Christian(in another word: Christian key competency) and to interpret the six key competencies of the 2015 revised curriculum in a Christian educational way. Also as an alternative to the key competencies model of the 2015 revised curriculum, this study aims to materialize the formation of a Christian key competencies model based on Christian faith. This study derived 'faith' from the key competencies as Christian throughout preceding research analysis. The 'faith' of the key competencies as Christian means the ability to know oneself, and to know the world and God within the knowledge of the Bible (knowledge of God) in the personal relationship with God, and also it is the ability to think, judge, and act with biblical values, Christian world view, and Christian self-identity. The key competency 'faith' could be the basis (standard) of motivation, attitude and the value of all competencies in cultivation and exercise. The model of Christian key competencies has the structure in which each six key competencies become to be cultivated based on the Christian key competency called "faith." Based on the structure, the six key competencies of the 2015 revised curriculum were interpreted and explained from the perspective of Christian education. In the self-management competency, self-identity can be correctly formed in relations with transcendent God. In aesthetic emotional competency, the empathic understanding of human beings comes from the understanding of the image of God, the supreme beauty, the source of beauty. About the community competency, human community is the source of God who created the universe, human and all of things. It is because a Christian community is a community within the relationship of Trinity God, Nature and others. Therefore regions, countries, and the world become one community. Communication competency first stem from good attitudes toward yourself and others with respectful mind. It comes from an understanding of Christian human beings. Also, there is a need of having a common language for communications. The common language is the Bible that given to us for our communicative companionship. Through the language of the Bible, God made us to know about God, human being and the creative world, and also made us to continue to communicate with God, others and the world. For having the knowledge-information processing competency, a standard of value for the processing and utilization of knowledge and information is required. The standard should be the basis of moral and ethical values for human respect. About creative thinking competency, the source of creativity is God who created the world. Human beings who have the image of God own creative potential. As well as, creativity has different expression forms depending on individual preferences and interests, and different approaches will be made depending on each individual's importance and achievement. Individual creativity can be found through education, and it can be embodied by converging knowledge, skills and experience.

The Construction of QoS Integration Platform for Real-time Negotiation and Adaptation Stream Service in Distributed Object Computing Environments (분산 객체 컴퓨팅 환경에서 실시간 협약 및 적응 스트림 서비스를 위한 QoS 통합 플랫폼의 구축)

  • Jun, Byung-Taek;Kim, Myung-Hee;Joo, Su-Chong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3651-3667
    • /
    • 2000
  • Recently, in the distributed multimedia environments based on internet, as radical growing technologies, the most of researchers focus on both streaming technology and distributed object thchnology, Specially, the studies which are tried to integrate the streaming services on the distributed object technology have been progressing. These technologies are applied to various stream service mamgements and protocols. However, the stream service management mexlels which are being proposed by the existing researches are insufficient for suporting the QoS of stream services. Besides, the existing models have the problems that cannot support the extensibility and the reusability, when the QoS-reiatedfunctions are being developed as a sub-module which is suited on the specific-purpose application services. For solving these problems, in this paper. we suggested a QoS Integrated platform which can extend and reuse using the distributed object technologies, and guarantee the QoS of the stream services. A structure of platform we suggested consists of three components such as User Control Module(UCM), QoS Management Module(QoSM) and Stream Object. Stream Object has Send/Receive operations for transmitting the RTP packets over TCP/IP. User Control ModuleI(UCM) controls Stream Objects via the COREA service objects. QoS Management Modulel(QoSM) has the functions which maintain the QoS of stream service between the UCMs in client and server. As QoS control methexlologies, procedures of resource monitoring, negotiation, and resource adaptation are executed via the interactions among these comiXments mentioned above. For constmcting this QoS integrated platform, we first implemented the modules mentioned above independently, and then, used IDL for defining interfaces among these mexlules so that can support platform independence, interoperability and portability base on COREA. This platform is constructed using OrbixWeb 3.1c following CORBA specification on Solaris 2.5/2.7, Java language, Java, Java Media Framework API 2.0, Mini-SQL1.0.16 and multimedia equipments. As results for verifying this platform functionally, we showed executing results of each module we mentioned above, and a numerical data obtained from QoS control procedures on client and server's GUI, while stream service is executing on our platform.

  • PDF

Study on the Fire Risk Prediction Assessment due to Deterioration contact of combustible cables in Underground Common Utility Tunnels (지하공동구내 가연성케이블의 열화접촉으로 인한 화재위험성 예측평가)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.135-147
    • /
    • 2015
  • Recent underground common utility tunnels are underground facilities for jointly accommodating more than 2 kinds of air-conditioning and heating facilities, vacuum dust collector, information processing cables as well as electricity, telecommunications, waterworks, city gas, sewerage system required when citizens live their daily lives and facilities responsible for the central function of the country but it is difficult to cope with fire accidents quickly and hard to enter into common utility tunnels to extinguish a fire due to toxic gases and smoke generated when various cables are burnt. Thus, in the event of a fire, not only the nerve center of the country is paralyzed such as significant property damage and loss of communication etc. but citizen inconveniences are caused. Therefore, noticing that most fires break out by a short circuit due to electrical works and degradation contact due to combustible cables as the main causes of fires in domestic and foreign common utility tunnels fire cases that have occurred so far, the purpose of this paper is to scientifically analyze the behavior of a fire by producing the model of actual common utility tunnels and reproducing the fire. A fire experiment was conducted in a state that line type fixed temperature detector, fire door, connection deluge set and ventilation equipment are installed in underground common utility tunnels and transmission power distribution cables are coated with fire proof paints in a certain section and heating pipes are fire proof covered. As a result, in the case of Type II, the maximum temperature was measured as $932^{\circ}C$ and line type fixed temperature detector displayed the fire location exactly in the receiver at a constant temperature. And transmission power distribution cables painted with fire proof paints in a certain section, the case of Type III, were found not to be fire resistant and fire proof covered heating pipes to be fire resistant for about 30 minutes. Also, fire simulation was carried out by entering fire load during a real fire test and as a result, the maximum temperature is $943^{\circ}C$, almost identical with $932^{\circ}C$ during a real fire test. Therefore, it is considered that fire behaviour can be predicted by conducting fire simulation only with common utility tunnels fire load and result values of heat release rate, height of the smoke layer, concentration of O2, CO, CO2 etc. obtained by simulation are determined to be applied as the values during a real fire experiment. In the future, it is expected that more reliable information on domestic underground common utility tunnels fire accidents can be provided and it will contribute to construction and maintenance repair effectively and systematically by analyzing and accumulating experimental data on domestic underground common utility tunnels fire accidents built in this study and fire cases continuously every year and complementing laws and regulations and administration manuals etc.

Generation of Progressively Sampled DTM using Model Key Points Extracted from Contours in Digital Vector Maps (수치지도 등고선의 Model Key Point 추출과 Progressive Sampling에 의한 수치지형모델 생성)

  • Lee, Sun-Geun;Yom, Jae-Hong;Lim, Sae-Bom;Kim, Kye-Lim;Lee, Dong-Cheon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.6_2
    • /
    • pp.645-651
    • /
    • 2007
  • In general, contours in digital vector maps, which represent terrain characteristics and shape, are created by 3D digitizing the same height points using aerial photographs on the analytical or digital plotters with stereoscopic viewing. Hence, it requires lots of task, and subjective decision and experience of the operators. DTMs are generated indirectly by using contours since the national digital maps do not include digital terrain model (DTM) data. In this study, model key points which depict the important information about terrain characteristics were extracted from the contours. Further, determination of the efficient and flexible grid sizes were proposed to generate optimal DTM in terms of both quantitative and qualitative aspects. For this purpose, a progressive sampling technique was implemented, i.e., the smaller grid sizes are assigned for the mountainous areas where have large relief while the larger grid sizes are assigned for the relatively flat areas. In consequence, DTMs with multi-grid for difference areas could be generated instead of DTMs with a fixed grid size. The multi-grid DTMs reduce computations for data processing and provide fast display.

Using the fusion of spatial and temporal features for malicious video classification (공간과 시간적 특징 융합 기반 유해 비디오 분류에 관한 연구)

  • Jeon, Jae-Hyun;Kim, Se-Min;Han, Seung-Wan;Ro, Yong-Man
    • The KIPS Transactions:PartB
    • /
    • v.18B no.6
    • /
    • pp.365-374
    • /
    • 2011
  • Recently, malicious video classification and filtering techniques are of practical interest as ones can easily access to malicious multimedia contents through the Internet, IPTV, online social network, and etc. Considerable research efforts have been made to developing malicious video classification and filtering systems. However, the malicious video classification and filtering is not still being from mature in terms of reliable classification/filtering performance. In particular, the most of conventional approaches have been limited to using only the spatial features (such as a ratio of skin regions and bag of visual words) for the purpose of malicious image classification. Hence, previous approaches have been restricted to achieving acceptable classification and filtering performance. In order to overcome the aforementioned limitation, we propose new malicious video classification framework that takes advantage of using both the spatial and temporal features that are readily extracted from a sequence of video frames. In particular, we develop the effective temporal features based on the motion periodicity feature and temporal correlation. In addition, to exploit the best data fusion approach aiming to combine the spatial and temporal features, the representative data fusion approaches are applied to the proposed framework. To demonstrate the effectiveness of our method, we collect 200 sexual intercourse videos and 200 non-sexual intercourse videos. Experimental results show that the proposed method increases 3.75% (from 92.25% to 96%) for classification of sexual intercourse video in terms of accuracy. Further, based on our experimental results, feature-level fusion approach (for fusing spatial and temporal features) is found to achieve the best classification accuracy.

NetFPGA-based Scheduler Implementation and its Performance Evaluation for QoS of Virtualized Network Resources on the Future Internet Testbed (미래인터넷 테스트베드 가상화 자원의 QoS를 위한 NetFPGA 기반 스케쥴러 구현 및 성능 평가)

  • Min, Seok-Hong;Jung, Whoi-Jin;Kim, Byung-Chul;Lee, Jae-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.8
    • /
    • pp.42-50
    • /
    • 2011
  • Recently, research activities on the future internet are being actively performed in foreign and domestic. In domestic, ETRI and 4 universities are focused on implementation of a testbed for research on the future internet named as 'FiRST(Future Internet Research for Sustainable Testbed)'. In the 'FiRST' project, 4 universities are performing a project in collaboration named as 'FiRST@PC' project that is for an implementation of the testbed using the programmable platform-based openflow switches. Currently, the research on the virtualization of the testbed is being performed that has a purpose for supporting an isolated network to individual researcher. In this paper, we implemented a traffic scheduler for providing QoS by using the programmable platform that performs a hardware-based packet processing and we are implemented a testbed using that traffic scheduler. We perform a performance evaluation of the traffic scheduler on the testbed. As a result, we show that the hardware-based NetFPGA scheduler can provide reliable and stable QoS to virtualized networks of the Future Internet Testbed.

Counterfeit Money Detection Algorithm based on Morphological Features of Color Printed Images and Supervised Learning Model Classifier (컬러 프린터 영상의 모폴로지 특징과 지도 학습 모델 분류기를 활용한 위변조 지폐 판별 알고리즘)

  • Woo, Qui-Hee;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.12
    • /
    • pp.889-898
    • /
    • 2013
  • Due to the popularization of high-performance capturing equipments and the emergence of powerful image-editing softwares, it is easy to make high-quality counterfeit money. However, the probability of detecting counterfeit money to the general public is extremely low and the detection device is expensive. In this paper, a counterfeit money detection algorithm using a general purpose scanner and computer system is proposed. First, the printing features of color printers are calculated using morphological operations and gray-level co-occurrence matrix. Then, these features are used to train a support vector machine classifier. This trained classifier is applied for identifying either original or counterfeit money. In the experiment, we measured the detection rate between the original and counterfeit money. Also, the printing source was identified. The proposed algorithm was compared with the algorithm using wiener filter to identify color printing source. The accuracy for identifying counterfeit money was 91.92%. The accuracy for identifying the printing source was over 94.5%. The results support that the proposed algorithm performs better than previous researches.

Analysis of race time between Korean athletes participating in 2016 Seoul International Wheelchair Marathon (2016 서울 국제 휠체어 마라톤 경기대회에 참가한 국내 선수의 구간 및 기록변화 분석)

  • Kim, Seong-Ho;Kim, Sang-Hoon
    • Journal of Industrial Convergence
    • /
    • v.18 no.3
    • /
    • pp.91-98
    • /
    • 2020
  • The purpose of this study was to identify differences in records for each section of the wheelchair marathon and to provide information necessary for training and basic data for developing training methods. The subjects of this study were analyzed for the records of a total of 5 foreign male athletes and 4 domestic top athletes who completed the 42.195km full course among the participants at the 2016 Seoul International Wheelchair Marathon. Every 5km section records and finish records were used, and the first section to the ninth section were set. As for the data processing method, descriptive statistics (Mean, SD) were used using the statistical program SPSS 25.0. The following conclusions were drawn according to the above research methods and procedures. In the case of the winning W1 athletes, the record at 30km to 35km was the fastest 8 minutes and 43 seconds in the entire section, and the difference was 1 minute and 4 seconds compared to the K1 athletes of the nation's No. 1 athletes. In order to be ranked higher in international competitions, training to adapt to a quick pace at a later stage is required. That is, it was found that the second half face should be faster based on the half distance. In addition, in each section of the first half, it is necessary to develop a race pace suitable for the average speed level for each individual section. Therefore, it is considered that the fitness training program that can maintain the early race and the training program that can cope with changes in pace after the second half should be applied.

Image-to-Image Translation Based on U-Net with R2 and Attention (R2와 어텐션을 적용한 유넷 기반의 영상 간 변환에 관한 연구)

  • Lim, So-hyun;Chun, Jun-chul
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.9-16
    • /
    • 2020
  • In the Image processing and computer vision, the problem of reconstructing from one image to another or generating a new image has been steadily drawing attention as hardware advances. However, the problem of computer-generated images also continues to emerge when viewed with human eyes because it is not natural. Due to the recent active research in deep learning, image generating and improvement problem using it are also actively being studied, and among them, the network called Generative Adversarial Network(GAN) is doing well in the image generating. Various models of GAN have been presented since the proposed GAN, allowing for the generation of more natural images compared to the results of research in the image generating. Among them, pix2pix is a conditional GAN model, which is a general-purpose network that shows good performance in various datasets. pix2pix is based on U-Net, but there are many networks that show better performance among U-Net based networks. Therefore, in this study, images are generated by applying various networks to U-Net of pix2pix, and the results are compared and evaluated. The images generated through each network confirm that the pix2pix model with Attention, R2, and Attention-R2 networks shows better performance than the existing pix2pix model using U-Net, and check the limitations of the most powerful network. It is suggested as a future study.