• Title/Summary/Keyword: the Hidden Self

Search Result 111, Processing Time 0.023 seconds

Experience of Nursing Students' Self-awareness in 'Counseling Theory and Practice' Online Class ('상담이론과 실제' 온라인 수업에서 간호대학생의 자기인식 경험)

  • Kim, Mi-Wha;Choi, Goya;Seo, Ji-Young
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.4
    • /
    • pp.43-50
    • /
    • 2021
  • The purpose of the study was to explore experience of self-awareness of nursing students in 'Counseling theory and practice' online class. Participants were 40 of nursing students learning of counseling theory subject in online, and Colaizzi's phenomenological method was used. The results were as follows. There were five theme clusters that 'find hidden my inner side', 'improve my healthy inner self', 'reflection of myself', 'recognize each others' different viewpoints' and 'create an aspiration and an impact'. Therefore, nursing students established self-awareness after learning of 'Counseling theory and practice' online class.

Enhanced Fuzzy Multi-Layer Perceptron

  • Kim, Kwang-Baek;Park, Choong-Sik;Abhjit Pandya
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05a
    • /
    • pp.1-5
    • /
    • 2004
  • In this paper, we propose a novel approach for evolving the architecture of a multi-layer neural network. Our method uses combined ART1 algorithm and Max-Min neural network to self-generate nodes in the hidden layer. We have applied the. proposed method to the problem of recognizing ID number in student identity cards. Experimental results with a real database show that the proposed method has better performance than a conventional neural network.

  • PDF

Look at the future´s control from artificial life

  • Tomoo, Aoyama;Zhang, Y.G.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.88.2-88
    • /
    • 2001
  • In this paper Author introduce a new field named Artificial Life and its main directions of research. That is the research of evolutionary robot and artificial brain. Then author explored the advanced scientific thought hidden in them. Furthermore, the author tries intuitively to show a new type of control that is heuristically raised from artificial life research. It could be named as evolutionary control. This type of control is more like human body´s structure, and it is self-organized.

  • PDF

A Neural Net System Self-organizing the Distributed Concepts for Speech Recognition (음성인식을 위한 분산개념을 자율조직하는 신경회로망시스템)

  • Kim, Sung-Suk;Lee, Tai-Ho
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.5
    • /
    • pp.85-91
    • /
    • 1989
  • In this paper, we propose a neural net system for speech recognition, which is composed of two neural networks. Firstly the self-supervised BP(Back Propagation) network generates the distributed concept corresponding to the activity pattern in the hidden units. And then the self-organizing neural network forms a concept map which directly displays the similarity relations between concepts. By doing the above, the difficulty in learning the conventional BP network is solved and the weak side of BP falling into a pattern matcher is gone, while the strong point of generating the various internal representations is used. And we have obtained the concept map which is more orderly than the Kohonen's SOFM. The proposed neural net system needs not any special preprocessing and has a self-learning ability.

  • PDF

Load Frequency Control using Parameter Self-Tuning fuzzy Controller (파라미터 자기조정 퍼지제어기를 이용한 부하주파수제어)

  • 탁한호;추연규
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.8 no.2
    • /
    • pp.50-59
    • /
    • 1998
  • This paper presents stabilization and adaptive control of flexible single link robot manipulator system by self-recurrent neural networks that is one of the neural networks and is effective in nonlinear control. The architecture of neural networks is a modified model of self-recurrent structure which has a hidden layer. The self-recurrent neural networks can be used to approximate any continuous function to any desired degree of accuracy and the weights are updated by feedback-error learning algorithm. When a flexible manipulator is rotated by a motor through the fixed end, transverse vibration may occur. The motor toroque should be controlled in such a way that the motor rotates by a specified angle, while simultaneously stabilizing vibration of the flexible manipuators so that it is arresed as soon as possible at the end of rotation. Accurate vibration control of lightweight manipulator during the large changes in configuration common to robotic tasks requires dynamic models that describe both the rigid body motions, as well as the flexural vibrations. Therefore, a dynamic models for a flexible single link robot manipulator is derived, and then a comparative analysis was made with linear controller through an simulation and experiment. The results are proesented to illustrate thd advantages and imporved performance of the proposed adaptive control ove the conventional linear controller.

  • PDF

Subsequent application of self-organizing map and hidden Markov models infer community states of stream benthic macroinvertebrates

  • Kim, Dong-Hwan;Nguyen, Tuyen Van;Heo, Muyoung;Chon, Tae-Soo
    • Journal of Ecology and Environment
    • /
    • v.38 no.1
    • /
    • pp.95-107
    • /
    • 2015
  • Because an ecological community consists of diverse species that vary nonlinearly with environmental variability, its dynamics are complex and difficult to analyze. To investigate temporal variations of benthic macroinvertebrate community, we used the community data that were collected at the sampling site in Baenae Stream near Busan, Korea, which is a clean stream with minimum pollution, from July 2006 to July 2013. First, we used a self-organizing map (SOM) to heuristically derive the states that characterizes the biotic condition of the benthic macroinvertebrate communities in forms of time series data. Next, we applied the hidden Markov model (HMM) to fine-tune the states objectively and to obtain the transition probabilities between the states and the emission probabilities that show the connection of the states with observable events such as the number of species, the diversity measured by Shannon entropy, and the biological water quality index (BMWP). While the number of species apparently addressed the state of the community, the diversity reflected the state changes after the HMM training along with seasonal variations in cyclic manners. The BMWP showed clear characterization of events that correspond to the different states based on the emission probabilities. The environmental factors such as temperature and precipitation also indicated the seasonal and cyclic changes according to the HMM. Though the usage of the HMM alone can guarantee the convergence of the training or the precision of the derived states based on field data in this study, the derivation of the states by the SOM that followed the fine-tuning by the HMM well elucidated the states of the community and could serve as an alternative reference system to reveal the ecological structures in stream communities.

Cryptography Module Detection and Identification Mechanism on Malicious Ransomware Software (악성 랜섬웨어 SW에 사용된 암호화 모듈에 대한 탐지 및 식별 메커니즘)

  • Hyung-Woo Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Cases in which personal terminals or servers are infected by ransomware are rapidly increasing. Ransomware uses a self-developed encryption module or combines existing symmetric key/public key encryption modules to illegally encrypt files stored in the victim system using a key known only to the attacker. Therefore, in order to decrypt it, it is necessary to know the value of the key used, and since the process of finding the decryption key takes a lot of time, financial costs are eventually paid. At this time, most of the ransomware malware is included in a hidden form in binary files, so when the program is executed, the user is infected with the malicious code without even knowing it. Therefore, in order to respond to ransomware attacks in the form of binary files, it is necessary to identify the encryption module used. Therefore, in this study, we developed a mechanism that can detect and identify by reverse analyzing the encryption module applied to the malicious code hidden in the binary file.

A Study on the Internet and Smart-Phone Addiction Diagnosis's Comparison through internet usage pattern of College Students (대학생의 인터넷 이용패턴을 통한 인터넷과 스마트폰 중독진단에 관한 비교연구)

  • Kim, Hee-Jae
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2014
  • Smartphone addiction and internet addiction cause a serious negative social problem due to the spread of the new media which is combined with the ubiquitous function. To evaluate the degree of Internet addiction and smartphone addiction of college students in the nearby areas, K-scale of internet addiction self-diagnosis scale and S-scale of smartphone addiction self-diagnosis scale for Korean adults were applied. This study aims to develop the survey questions, which get the basic internet patterns and access the web site, and to find the hidden addicts that is not found by general K-scale and S-scale using computers and smartphones. The result shows that a method of addiction diagnosis using the tolerance degree which is calculated by smart phone's internet main activities and using time(anticipated and real time) apart from K-scale and S-scale. So hidden internet and smartphone addicts could be found through the SPSS statistical analysis program.

  • PDF

Area-wise relational knowledge distillation

  • Sungchul Cho;Sangje Park;Changwon Lim
    • Communications for Statistical Applications and Methods
    • /
    • v.30 no.5
    • /
    • pp.501-516
    • /
    • 2023
  • Knowledge distillation (KD) refers to extracting knowledge from a large and complex model (teacher) and transferring it to a relatively small model (student). This can be done by training the teacher model to obtain the activation function values of the hidden or the output layers and then retraining the student model using the same training data with the obtained values. Recently, relational KD (RKD) has been proposed to extract knowledge about relative differences in training data. This method improved the performance of the student model compared to conventional KDs. In this paper, we propose a new method for RKD by introducing a new loss function for RKD. The proposed loss function is defined using the area difference between the teacher model and the student model in a specific hidden layer, and it is shown that the model can be successfully compressed, and the generalization performance of the model can be improved. We demonstrate that the accuracy of the model applying the method proposed in the study of model compression of audio data is up to 1.8% higher than that of the existing method. For the study of model generalization, we demonstrate that the model has up to 0.5% better performance in accuracy when introducing the RKD method to self-KD using image data.

HMM-Based Human Gait Recognition (HMM을 이용한 보행자 인식)

  • Sin Bong-Kee;Suk Heung-Il
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.5
    • /
    • pp.499-507
    • /
    • 2006
  • Recently human gait has been considered as a useful biometric supporting high performance human identification systems. This paper proposes a view-based pedestrian identification method using the dynamic silhouettes of a human body modeled with the Hidden Markov Model(HMM). Two types of gait models have been developed both with an endless cycle architecture: one is a discrete HMM method using a self-organizing map-based VQ codebook and the other is a continuous HMM method using feature vectors transformed into a PCA space. Experimental results showed a consistent performance trend over a range of model parameters and the recognition rate up to 88.1%. Compared with other methods, the proposed models and techniques are believed to have a sufficient potential for a successful application to gait recognition.