• Title/Summary/Keyword: whole processing type

Search Result 88, Processing Time 0.023 seconds

Application of Indicator Geostatistics for Probabilistic Uncertainty and Risk Analyses of Geochemical Data (지화학 자료의 확률론적 불확실성 및 위험성 분석을 위한 지시자 지구통계학의 응용)

  • Park, No-Wook
    • Journal of the Korean earth science society
    • /
    • v.31 no.4
    • /
    • pp.301-312
    • /
    • 2010
  • Geochemical data have been regarded as one of the important environmental variables in the environmental management. Since they are often sampled at sparse locations, it is important not only to predict attribute values at unsampled locations, but also to assess the uncertainty attached to the prediction for further analysis. The main objective of this paper is to exemplify how indicator geostatistics can be effectively applied to geochemical data processing for providing decision-supporting information as well as spatial distribution of the geochemical data. A whole geostatistical analysis framework, which includes probabilistic uncertainty modeling, classification and risk analysis, was illustrated through a case study of cadmium mapping. A conditional cumulative distribution function (ccdf) was first modeled by indicator kriging, and then e-type estimates and conditional variance were computed for spatial distribution of cadmium and quantitative uncertainty measures, respectively. Two different classification criteria such as a probability thresholding and an attribute thresholding were applied to delineate contaminated and safe areas. Finally, additional sampling locations were extracted from the coefficient of variation that accounts for both the conditional variance and the difference between attribute values and thresholding values. It is suggested that the indicator geostatistical framework illustrated in this study be a useful tool for analyzing any environmental variables including geochemical data for decision-making in the presence of uncertainty.

A Study on the Ideal Pattern of Family Ritual and the Spatial Use of Yangban Houses - focused on Gwanrye and Honrye - (관(冠).혼례(婚禮)를 중심으로 본 조선시대(朝鮮時代) 반가(班家)에서의 행예규범(行禮規範)과 공간사용(空間使用))

  • Kim, Ki-Joo;Kim, Sung-Woo
    • Journal of architectural history
    • /
    • v.3 no.2 s.6
    • /
    • pp.47-66
    • /
    • 1994
  • Chosun dynasty had accepted the Confucianism as a means of governing whole society and in its practical aspect ${\ulcorner}$Garye${\lrcorner}$ and the ceremonies of family ritual regarded as important. As a result, after mid-Chosun dynasty family ritual was begun to popularized on a national scale, and the socio-culture system which was interrelated with it changed into confucian ones. These fill-scaled change, on the other hand, resulted into the change of spatial use and plan type of yangban houses. In this aspect, this study intends to clarify the influence of family ritual on spatial use of yangban houses through the comparison between ideal pattern and behavioral one of family ritual. And this study made Gwanhonrye except Sangjerye an object because these two ceremonies were peformed in sucession in those day's behavior. The research setting is the Korean traditional society prior to modernization. The collected materials are based on ethnographic information as well as personal documents, public records, field works and the books on family ritual. The methodology for the present study is primarily based on the comparison study between available documents and field work. Especially, as the books on family ritual include some explanatory diagrams of the ideal pattern, these diagrams are compared with another ones made by the author of the behavioral pattern. The major findings are as follows. Firstly, in the aspect of Gwanhonrye's process, the ideal pattern is similar to the behavioral one. But even the essential course of the ideal pattern of Honrye is 'chinyoung', it has never been accepcted in Chosun dynasty on account of 'seoryubuga'. Secondly, even though the names of the performing space of family ritual are different each pattern, the methods of spatial use in processing these two ceremonies are similar. In other words, according to the books on family ritual the major performing spaces of Gwanhonrye are 'chungsa' and 'jungchim', but in practical process of both ceremonies 'sarangchae' and 'anche' are used. Lastly, as family ritual like Gwanrye and Honrye had been practiced at yangban houses after mid-Chosun dynasty as mentioned above, the spatial arrangement had to be changed to a certain extent.

  • PDF

A study on non-existence information of the information disclosure system : focused on the central administrative agencies (정보공개제도상의 정보부존재에 관한 고찰 중앙행정기관을 중심으로)

  • Kim, You-seung;Choi, Jeong Min
    • The Korean Journal of Archival Studies
    • /
    • no.46
    • /
    • pp.153-187
    • /
    • 2015
  • This study aims to discuss issues about non-existent information of the information disclosure system and to provide alternative strategies for the issues. For the theoretical discussion it reviews the definitions and standards of non-existent information and analyzes legal aspects and statistical changes of non-existent information. Furthemore, in order to discuss a current status and problems of non-existent information at the central administrative agencies, it analyzes the cases of the non-existent information notification. According to analysis results, non-existent information status of the surveyed institutions is a total of 4,421 cases for three years and it shows the continuous increasing trend year after year. The number of institutions that have the number of non-existent information equal to the number of nondisclosures or over it reached about 40%. It means excluding non-existent information from the reasons of nondisclosure influenced disclose rates and nondisclosure rates of many agencies. In the type analysis of the non-existent information reasons, the most main reason, the case of not producing or receiving the requested information by public institutions takes over 75% among the whole reasons. The next reason is the case of collecting or processing information takes over 7-10%. This study found the operational issues, as analyzing notifications of non-existent information. The operational issues are 1) the incomplete explanation of non-existent information, 2) the unclear scope of the collection and processing, 3) the problem of the transfer processing, and 4) the problem of recording management. Therefore, this study suggested some improvements of the perspective and the technical and procedural aspects. First, information disclosure issues including non-existent information are to be understood as an extension of records management. Second, disclosure service should improve overall based on advanced understanding. Third, the management procedures of non-existent information should be improved. Fourth, specific guidelines for handling non-existent information should be developed.

Edge to Edge Model and Delay Performance Evaluation for Autonomous Driving (자율 주행을 위한 Edge to Edge 모델 및 지연 성능 평가)

  • Cho, Moon Ki;Bae, Kyoung Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.191-207
    • /
    • 2021
  • Up to this day, mobile communications have evolved rapidly over the decades, mainly focusing on speed-up to meet the growing data demands of 2G to 5G. And with the start of the 5G era, efforts are being made to provide such various services to customers, as IoT, V2X, robots, artificial intelligence, augmented virtual reality, and smart cities, which are expected to change the environment of our lives and industries as a whole. In a bid to provide those services, on top of high speed data, reduced latency and reliability are critical for real-time services. Thus, 5G has paved the way for service delivery through maximum speed of 20Gbps, a delay of 1ms, and a connecting device of 106/㎢ In particular, in intelligent traffic control systems and services using various vehicle-based Vehicle to X (V2X), such as traffic control, in addition to high-speed data speed, reduction of delay and reliability for real-time services are very important. 5G communication uses high frequencies of 3.5Ghz and 28Ghz. These high-frequency waves can go with high-speed thanks to their straightness while their short wavelength and small diffraction angle limit their reach to distance and prevent them from penetrating walls, causing restrictions on their use indoors. Therefore, under existing networks it's difficult to overcome these constraints. The underlying centralized SDN also has a limited capability in offering delay-sensitive services because communication with many nodes creates overload in its processing. Basically, SDN, which means a structure that separates signals from the control plane from packets in the data plane, requires control of the delay-related tree structure available in the event of an emergency during autonomous driving. In these scenarios, the network architecture that handles in-vehicle information is a major variable of delay. Since SDNs in general centralized structures are difficult to meet the desired delay level, studies on the optimal size of SDNs for information processing should be conducted. Thus, SDNs need to be separated on a certain scale and construct a new type of network, which can efficiently respond to dynamically changing traffic and provide high-quality, flexible services. Moreover, the structure of these networks is closely related to ultra-low latency, high confidence, and hyper-connectivity and should be based on a new form of split SDN rather than an existing centralized SDN structure, even in the case of the worst condition. And in these SDN structural networks, where automobiles pass through small 5G cells very quickly, the information change cycle, round trip delay (RTD), and the data processing time of SDN are highly correlated with the delay. Of these, RDT is not a significant factor because it has sufficient speed and less than 1 ms of delay, but the information change cycle and data processing time of SDN are factors that greatly affect the delay. Especially, in an emergency of self-driving environment linked to an ITS(Intelligent Traffic System) that requires low latency and high reliability, information should be transmitted and processed very quickly. That is a case in point where delay plays a very sensitive role. In this paper, we study the SDN architecture in emergencies during autonomous driving and conduct analysis through simulation of the correlation with the cell layer in which the vehicle should request relevant information according to the information flow. For simulation: As the Data Rate of 5G is high enough, we can assume the information for neighbor vehicle support to the car without errors. Furthermore, we assumed 5G small cells within 50 ~ 250 m in cell radius, and the maximum speed of the vehicle was considered as a 30km ~ 200 km/hour in order to examine the network architecture to minimize the delay.

A study on small stone crafts in the Cho Sun Dynasty (조선조시대 소품 석공예에 관한 연구)

  • 유해철
    • Archives of design research
    • /
    • v.12 no.2
    • /
    • pp.157-168
    • /
    • 1999
  • Stone in the Cho Sun Dynasty has been used as the material of industry arts, widely building materials and an important material for the artistic design. But it has been generally used as an use of practical living Product like, suban, a metal printing type, a fire place, a pillowcase, a pencil case, etc, and ornament with the quality of stone material and the aesthetic view. There are several problems as like size, quantity, delivery and processing method with the stne material according to its variety and selection. Accordingly it has been studied through the whole process of shape, a material selection of design and processing method as well as studying about small stone crafts which were manufactured in the Cho Sun Dynasty, considering these problems. Stone crafts in Cho Sun Dynasty has been widely used as a living tool. There was some what difference on manufacturing purpose on its technique of folk crafts of stone crafts, but, through the research of collected crafts, they were almost the same that social need, user's taste and hobby in those days were reflected in. In the result of analysis as dividing the stone crafts into daily living product, stationery and tool, the major of daily products have been manufactured with emphasis of practicability. And they have been manufactured from agalmatolite for the propose of use. further, kitchen product had no design due to the function and living products which has been used in the main living room has been carved with the decorative expression of the various form by using intaglic, relieve, inlaid technique, etc. For the stationery, it has been characterized with aesthetic point considering the decorative effects & selection of material in accordance with use. A material for manufacturing has been used in the range of agalmtolite, atopaz, a sapphire, white stone etc. As the result of this research, It was noticeable that there was the spleudidness on the expression of design and carving. It was also noticeable that black stone and guanite have been widely esed because it didn't need the delicacy as a tool.

  • PDF

Case Study on Economical Fabrication and Erection of Steel Structure and Reduction in Field Erection Time (경제적 철골제작$\cdot$설치 및 공기단축 사례분석연구)

  • Ahn Jae-Bong;Choi Yoon ki
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.5 s.21
    • /
    • pp.183-192
    • /
    • 2004
  • Even in Korea the number of steel structure buildings that allow internal space and easy change of their layouts in accordance with the purpose of buildings and box-type steel bridges constructed with thick plates with thickness in a rage just from a few $\beta$AE to \$100\beta$AE is increasing these days and therefore, domestic fabrication and processing technology of members for steel structures is being improved at a pace faster than in the past to meet the growing requirements of consumers for high reliability on quality control on the related steel structures. However, most domestic fabricators os steel structures who are turning out their steel products in accordance with the designs prepared by engineering companies in their respective works for the sake of cost cut more than anything else, hesitating to introduce any advanced new technology into themselves. In the case of the steel structure design application for small and mid-size buildings in particular, it is quite meaningful not only for those who are involved in steel structure business, but also for the people working at construction work fields to review the result of the study on the connections of steel structure members deigned to obtain superb quality of steel structures within short period for steel fabrication and erection at fields in economical ways, as there is a glowing tendency seeking standardization of connection of steel structure members as well as whole structure together with the development on design of construction system of buildings including their exterior and interior decoration materials, manufacture of the related members and fabrication technique structure. This paper has been prepared with the aim to review the peculiar characteristics of buildings constructed with the main frames of steel structures and actual cases of the change made ing the connections between steel structure columns and between columns and girder members in order to reduce the work period necessary for fabrication and erection of steel structures at the maximum as well as the some examples of steel structures fabricated through automatic welding by robots for box-type columns in addition to the description of the problems found in the course of fabricating those steel structures, suggesting possible counter-measures to solve them.

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.

Host-Based Intrusion Detection Model Using Few-Shot Learning (Few-Shot Learning을 사용한 호스트 기반 침입 탐지 모델)

  • Park, DaeKyeong;Shin, DongIl;Shin, DongKyoo;Kim, Sangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.271-278
    • /
    • 2021
  • As the current cyber attacks become more intelligent, the existing Intrusion Detection System is difficult for detecting intelligent attacks that deviate from the existing stored patterns. In an attempt to solve this, a model of a deep learning-based intrusion detection system that analyzes the pattern of intelligent attacks through data learning has emerged. Intrusion detection systems are divided into host-based and network-based depending on the installation location. Unlike network-based intrusion detection systems, host-based intrusion detection systems have the disadvantage of having to observe the inside and outside of the system as a whole. However, it has the advantage of being able to detect intrusions that cannot be detected by a network-based intrusion detection system. Therefore, in this study, we conducted a study on a host-based intrusion detection system. In order to evaluate and improve the performance of the host-based intrusion detection system model, we used the host-based Leipzig Intrusion Detection-Data Set (LID-DS) published in 2018. In the performance evaluation of the model using that data set, in order to confirm the similarity of each data and reconstructed to identify whether it is normal data or abnormal data, 1D vector data is converted to 3D image data. Also, the deep learning model has the drawback of having to re-learn every time a new cyber attack method is seen. In other words, it is not efficient because it takes a long time to learn a large amount of data. To solve this problem, this paper proposes the Siamese Convolutional Neural Network (Siamese-CNN) to use the Few-Shot Learning method that shows excellent performance by learning the little amount of data. Siamese-CNN determines whether the attacks are of the same type by the similarity score of each sample of cyber attacks converted into images. The accuracy was calculated using Few-Shot Learning technique, and the performance of Vanilla Convolutional Neural Network (Vanilla-CNN) and Siamese-CNN was compared to confirm the performance of Siamese-CNN. As a result of measuring Accuracy, Precision, Recall and F1-Score index, it was confirmed that the recall of the Siamese-CNN model proposed in this study was increased by about 6% from the Vanilla-CNN model.