• Title/Summary/Keyword: key feature

Search Result 803, Processing Time 0.026 seconds

Finite Element Formulation Based on Enhanced First-order Shear Deformation Theory for Thermo-mechanical Analysis of Laminated Composite Structures (복합소재 적층 구조물에 대한 열-기계적 거동 예측을 위한 개선된 일차전단변형이론의 유한요소 정식화)

  • Jun-Sik Kim;Dae-Hyeon Na;Jang-Woo Han
    • Composites Research
    • /
    • v.36 no.2
    • /
    • pp.117-125
    • /
    • 2023
  • This paper proposes a new finite element formulation based on enhanced first-order shear deformation theory including the transverse normal strain effect via the mixed formulation (EFSDTM-TN) for the effective thermo-mechanical analysis of laminated composite structures. The main objective of the EFSDTM-TN is to provide an accurate and efficient solution in describing the thermo-mechanical behavior of laminated composite structures by systematically establishing the relationship between two independent fields (displacement and transverse stress fields) via the mixed formulation. Another key feature is to consider the thermal strain effect without additional unknown variables by introducing a refined transverse displacement field. In the finite element formulation, an eight-node isoparametric plate element is newly developed to implement the advantage of the EFSDTM-TN. Numerical solutions for the thermo-mechanical behavior of laminated composite structures are compared with those available in the open literature to demonstrate the numerical performance of the proposed finite element model.

Improving Field Crop Classification Accuracy Using GLCM and SVM with UAV-Acquired Images

  • Seung-Hwan Go;Jong-Hwa Park
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.1
    • /
    • pp.93-101
    • /
    • 2024
  • Accurate field crop classification is essential for various agricultural applications, yet existing methods face challenges due to diverse crop types and complex field conditions. This study aimed to address these issues by combining support vector machine (SVM) models with multi-seasonal unmanned aerial vehicle (UAV) images, texture information extracted from Gray Level Co-occurrence Matrix (GLCM), and RGB spectral data. Twelve high-resolution UAV image captures spanned March-October 2021, while field surveys on three dates provided ground truth data. We focused on data from August (-A), September (-S), and October (-O) images and trained four support vector classifier (SVC) models (SVC-A, SVC-S, SVC-O, SVC-AS) using visual bands and eight GLCM features. Farm maps provided by the Ministry of Agriculture, Food and Rural Affairs proved efficient for open-field crop identification and served as a reference for accuracy comparison. Our analysis showcased the significant impact of hyperparameter tuning (C and gamma) on SVM model performance, requiring careful optimization for each scenario. Importantly, we identified models exhibiting distinct high-accuracy zones, with SVC-O trained on October data achieving the highest overall and individual crop classification accuracy. This success likely stems from its ability to capture distinct texture information from mature crops.Incorporating GLCM features proved highly effective for all models,significantly boosting classification accuracy.Among these features, homogeneity, entropy, and correlation consistently demonstrated the most impactful contribution. However, balancing accuracy with computational efficiency and feature selection remains crucial for practical application. Performance analysis revealed that SVC-O achieved exceptional results in overall and individual crop classification, while soybeans and rice were consistently classified well by all models. Challenges were encountered with cabbage due to its early growth stage and low field cover density. The study demonstrates the potential of utilizing farm maps and GLCM features in conjunction with SVM models for accurate field crop classification. Careful parameter tuning and model selection based on specific scenarios are key for optimizing performance in real-world applications.

A Response to a Shift toward "Assertive" Global Trade Environment: Focusing on EU's Proposed Anti-Coercion Instrument ('공세적' 국제통상환경으로의 변화와 그 대응 : EU의 경제적 위협 대응조치 규칙안을 중심으로)

  • Kyoung-hwa Kim
    • Korea Trade Review
    • /
    • v.48 no.4
    • /
    • pp.169-188
    • /
    • 2023
  • The increase in assertive and unilateral measures represents a key feature of the recent global trade environment. Against this backdrop, the EU is pushing to introduce the so-called "anti-coercion instrument(the instrument)," which aims to allow unilateral countermeasures in the event of economic coercion or threats from third countries. This paper examines the recent assertive trade environment and the legislative background of the instrument. It evaluated the necessity of and concerns arising from the instrument by comparing the existing EU trade policy, i.e., Trade Barrier Regulation (TBR). In addition, the paper aims to analyze the permissibility of the instrument under the WTO system, especially in the context of the principle of "strengthening of the multilateral system." Finally, the paper draws implications of the instrument in terms of our domestic policies that can effectively address economic threats or trade friction in the growing geopolitical crisis.

Research on the Financial Data Fraud Detection of Chinese Listed Enterprises by Integrating Audit Opinions

  • Leiruo Zhou;Yunlong Duan;Wei Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3218-3241
    • /
    • 2023
  • Financial fraud undermines the sustainable development of financial markets. Financial statements can be regarded as the key source of information to obtain the operating conditions of listed companies. Current research focuses more on mining financial digital data instead of looking into text data. However, text data can reveal emotional information, which is an important basis for detecting financial fraud. The audit opinion of the financial statement is especially the fair opinion of a certified public accountant on the quality of enterprise financial reports. Therefore, this research was carried out by using the data features of 4,153 listed companies' financial annual reports and audits of text opinions in the past six years, and the paper puts forward a financial fraud detection model integrating audit opinions. First, the financial data index database and audit opinion text database were built. Second, digitized audit opinions with deep learning Bert model was employed. Finally, both the extracted audit numerical characteristics and the financial numerical indicators were used as the training data of the LightGBM model. What is worth paying attention to is that the imbalanced distribution of sample labels is also one of the focuses of financial fraud research. To solve this problem, data enhancement and Focal Loss feature learning functions were used in data processing and model training respectively. The experimental results show that compared with the conventional financial fraud detection model, the performance of the proposed model is improved greatly, with Area Under the Curve (AUC) and Accuracy reaching 81.42% and 78.15%, respectively.

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

Renormalization of Thalamic Sub-Regional Functional Connectivity Contributes to Improvement of Cognitive Function after Liver Transplantation in Cirrhotic Patients with Overt Hepatic Encephalopathy

  • Yue Cheng;Jing-Li Li;Jia-Min Zhou;Gao-Yan Zhang;Wen Shen;Xiao-Dong Zhang
    • Korean Journal of Radiology
    • /
    • v.22 no.12
    • /
    • pp.2052-2061
    • /
    • 2021
  • Objective: The role of preoperative overt hepatic encephalopathy (OHE) in the neurophysiological mechanism of cognitive improvement after liver transplantation (LT) remains elusive. This study aimed to explore changes in sub-regional thalamic functional connectivity (FC) after LT and their relationship with neuropsychological improvement using resting-state functional MRI (rs-fMRI) data in cirrhotic patients with and without a history of OHE. Materials and Methods: A total of 51 cirrhotic patients, divided into the OHE group (n = 21) and no-OHE group (n = 30), and 30 healthy controls were enrolled in this prospective study. Each patient underwent rs-fMRI before and 1 month after LT. Using 16 bilateral thalamic subregions as seeds, we conducted a seed-to-voxel FC analysis to compare the thalamic FC alterations before and after LT between the OHE and no-OHE groups, as well as differences in FC between the two groups of cirrhotic patients and the control group. Correction for multiple comparisons was conducted using the false discovery rate (p < 0.05). Results: We found abnormally increased FC between the thalamic sub-region and prefrontal cortex, as well as an abnormally decreased FC between the bilateral thalamus in both OHE and no-OHE cirrhotic patients before LT, which returned to normal levels after LT. Compared with the no-OHE group, the OHE group exhibited more extensive abnormalities prior to LT, and the increased FC between the right thalamic subregions and right inferior parietal lobe was markedly reduced to normal levels after LT. Conclusion: The renormalization of FC in the cortico-thalamic loop might be a neuro-substrate for the recovery of cognitive function after LT in cirrhotic patients. In addition, hyperconnectivity between thalamic subregions and the inferior parietal lobe might be an important feature of OHE. Changes in FC in the thalamus might be used as potential biomarkers for recovery of cognitive function after LT in cirrhotic patients.

Comparison of Association Rule Learning and Subgroup Discovery for Mining Traffic Accident Data (교통사고 데이터의 마이닝을 위한 연관규칙 학습기법과 서브그룹 발견기법의 비교)

  • Kim, Jeongmin;Ryu, Kwang Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.4
    • /
    • pp.1-16
    • /
    • 2015
  • Traffic accident is one of the major cause of death worldwide for the last several decades. According to the statistics of world health organization, approximately 1.24 million deaths occurred on the world's roads in 2010. In order to reduce future traffic accident, multipronged approaches have been adopted including traffic regulations, injury-reducing technologies, driving training program and so on. Records on traffic accidents are generated and maintained for this purpose. To make these records meaningful and effective, it is necessary to analyze relationship between traffic accident and related factors including vehicle design, road design, weather, driver behavior etc. Insight derived from these analysis can be used for accident prevention approaches. Traffic accident data mining is an activity to find useful knowledges about such relationship that is not well-known and user may interested in it. Many studies about mining accident data have been reported over the past two decades. Most of studies mainly focused on predict risk of accident using accident related factors. Supervised learning methods like decision tree, logistic regression, k-nearest neighbor, neural network are used for these prediction. However, derived prediction model from these algorithms are too complex to understand for human itself because the main purpose of these algorithms are prediction, not explanation of the data. Some of studies use unsupervised clustering algorithm to dividing the data into several groups, but derived group itself is still not easy to understand for human, so it is necessary to do some additional analytic works. Rule based learning methods are adequate when we want to derive comprehensive form of knowledge about the target domain. It derives a set of if-then rules that represent relationship between the target feature with other features. Rules are fairly easy for human to understand its meaning therefore it can help provide insight and comprehensible results for human. Association rule learning methods and subgroup discovery methods are representing rule based learning methods for descriptive task. These two algorithms have been used in a wide range of area from transaction analysis, accident data analysis, detection of statistically significant patient risk groups, discovering key person in social communities and so on. We use both the association rule learning method and the subgroup discovery method to discover useful patterns from a traffic accident dataset consisting of many features including profile of driver, location of accident, types of accident, information of vehicle, violation of regulation and so on. The association rule learning method, which is one of the unsupervised learning methods, searches for frequent item sets from the data and translates them into rules. In contrast, the subgroup discovery method is a kind of supervised learning method that discovers rules of user specified concepts satisfying certain degree of generality and unusualness. Depending on what aspect of the data we are focusing our attention to, we may combine different multiple relevant features of interest to make a synthetic target feature, and give it to the rule learning algorithms. After a set of rules is derived, some postprocessing steps are taken to make the ruleset more compact and easier to understand by removing some uninteresting or redundant rules. We conducted a set of experiments of mining our traffic accident data in both unsupervised mode and supervised mode for comparison of these rule based learning algorithms. Experiments with the traffic accident data reveals that the association rule learning, in its pure unsupervised mode, can discover some hidden relationship among the features. Under supervised learning setting with combinatorial target feature, however, the subgroup discovery method finds good rules much more easily than the association rule learning method that requires a lot of efforts to tune the parameters.

Design and Implementation of Content-based Video Database using an Integrated Video Indexing Method (통합된 비디오 인덱싱 방법을 이용한 내용기반 비디오 데이타베이스의 설계 및 구현)

  • Lee, Tae-Dong;Kim, Min-Koo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.661-683
    • /
    • 2001
  • There is a rapid increase in the use of digital video information in recent years, it becomes more important to manage video databases efficiently. The development of high speed data network and digital techniques has emerged new multimedia applications such as internet broadcasting, Video On Demand(VOD) combined with video data processing and computer. Video database should be construct for searching fast, efficient video be extract the accurate feature information of video with more massive and more complex characteristics. Video database are essential differences between video databases and traditional databases. These differences lead to interesting new issues in searching of video, data modeling. So, cause us to consider new generation method of database, efficient retrieval method of video. In this paper, We propose the construction and generation method of the video database based on contents which is able to accumulate the meaningful structure of video and the prior production information. And by the proposed the construction and generation method of the video database implemented the video database which can produce the new contents for the internet broadcasting centralized on the video database. For this production, We proposed the video indexing method which integrates the annotation-based retrieval and the content-based retrieval in order to extract and retrieval the feature information of the video data using the relationship between the meaningful structure and the prior production information on the process of the video parsing and extracting the representative key frame. We can improve the performance of the video contents retrieval, because the integrated video indexing method is using the content-based metadata type represented in the low level of video and the annotation-based metadata type impressed in the high level which is difficult to extract the feature information of the video at he same time.

  • PDF

A Study on UAV and The Issue of Law of War (무인항공기의 발전과 국제법적 쟁점)

  • Lee, Young-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.2
    • /
    • pp.3-39
    • /
    • 2011
  • People may operate unmanned aerial vehicles (UAVs or drones) thousands of miles from the drone's location. Drones were first used (like balloons) for surveillance. By 2001, the United States began arming drones with missiles and using them to strike targets during combat in Afghanistan. By mid-2010, over forty states and other entities possessed drones, many with the capability of launching missiles and dropping bombs. Each new development in military weapons technology invites assessment of the relevant international law. This Insight surveys the international law applicable to the recent innovation of weaponizing drones. In determining what international law rules govern drone use, the most salient feature is not the fact that drones are unmanned. The fact drones carry no human operator may be the most important new technological breakthrough, but the key feature for international law purposes is the type of weaponry drones carry. Whether law enforcement rules govern drone use depends on the situation and not necessarily who is operating the drone. Battlefield weapons may also be lawfully used before an armed conflict in the following situations: when initiating self-defense under Article 51 of the United Nations Charter; when authorized by the UN Security Council; when a government seeks to suppress internal armed conflict; and, perhaps, when a state is invited to assist a government in suppressing internal armed conflict. The rules governing resort to force in self-defense are found in Article 51 of the UN Charter and a number of decisions by international courts and tribunals. Commentators continue to debate whether drone technology represents the next revolution in military affairs. Regardless of the answer to that question, drones have not created a revolution in legal affairs. The current rules governing battlefield launch vehicles are adequate for regulating resort to drones. More research must be undertaken, however, to understand the psychological effects of deploying unmanned vehicles and the effects on drone operators of sustained, close visual contact with the aftermath of drone attacks.

  • PDF

A Study on the Direction of Human Identity and Dignity Education in the AI Era. (AI시대, 인간의 정체성과 존엄성 교육의 방향)

  • Seo, Mikyoung
    • Journal of Christian Education in Korea
    • /
    • v.67
    • /
    • pp.157-194
    • /
    • 2021
  • The issue of AI's ethical consciousness has been constantly on the rise. AI learns and imitates everything behavior human beings do, just like a child. Therefore, the ethical consciousness we currently demand from AI is first the ethical consciousness required of humans, and at the center of it is the dignity of humans. Thus, this study analyzed human identity and its problems according to the development of AI technology, apologized the theological premises and characteristics of human dignity, and sought the direction of human dignity education as follows. First, this study discussed the development of AI and its relation to human beings. The development of AI's technology has led to the sharing of "reason or intelligence" with machines called AI which have been restricted to the exclusive property of mankind. This raised the question of the superior humanity which humans would be remained to be distinguished from AI machines. Second, this study discussed transhumanism and human identity. Transhumanism has been argued for the combination of AI machines and humans in order to improve inefficient human intelligence and human capabilities. However, the combination of AI machines with humans raised the issue of human identity. In the AI era, human identity is to believe thoughts that God had when he built us. Third, this study apologized theological premise and characteristic about human dignity. Human dignity has become a key concept of the constitution and international human rights treaties around the world. Nonetheless, declarative conviction that human is dignified is difficult to be understanded without Christian theological premise. Theological premise of human dignity lies on the fact that human is dignified feature being granted life by Heavenly Father. This feature lies on longing for "Goodness" and "eternality", pursuit of beauty, a happy being in relationship with others. Fourth, this study presented the direction of human dignity education. The direction of human dignity education has to awaken what is identity of human and how human beings were created and how much they are precious. Furthermore, it lead human to ponder consciously and accept the highest value of what human beings are, how they were created, and how precious they are. That is about educating human identity, and its core is that regardless of the circumstances - the wealth gap, knowledge level, skin color, gender, age, disability, etc. - all people are in God's image and for the glory of God, thereby being very important to God.