RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Improving the Physical education curriculum of the Air Force Academy by predicting the G-resistance of prospective pilots using machine learning

        Jaemo Yang(양재모),Changju Lee(이창주) 대한인간공학회 2021 대한인간공학회 학술대회논문집 Vol.2021 No.11

        Objective: This study aims to improve the physical education curriculum of the Air Force Academy to enhance the G-resistance of the Air Force Academy cadets who are prospective pilots. To achieve this goal, we attempted to identify the relationship between the results of the G-test (5G, 30 seconds), body composition, physical strength, and factors affecting G-resistance, and apply the result to the current physical education curriculum of the Air Force Academy. Background: The Air Force Academy has been recruiting all cadets as pilot resources to foster elite pilots since 2017. Cadets must pass the G-test to start the flight training. However, the pass rate of seniors who are going to start flight training is only 63%. To foster more elite pilots as Air Force intended, more cadets should pass the G-test. Therefore, analyzing various factors affecting G-resistance and improving the curriculum of the Air Force Academy followed by the analysis are important issues. Method: We measured and collected the body composition (height, weight, bone muscle rate, body fat percentage, lower body muscle rate, etc.), fitness test records (push-up, sit-up, 3km running), and G-test of 167 senior male cadets of the Air Force Academy. These data were analyzed through machine learning techniques of logistic regression analysis and decision tree analysis. Based on the results, we figured out what affects G-resistance and complementary points of the current physical education curriculum. Results: As a result of analyzing the data through several experiments, logistic regression models performed the best with LBMR (lower body muscle rate), BMI (body mass index), MuscleRate (bone muscle rate), and Running (3㎞ running) with the maximum prediction of 94%. Decision tree models performed the best with BMI (body mass index), Running (3㎞ running), LBMR (lower body muscle rate), and Push-up with the maximum prediction of 91%. Conclusion: Currently, the weight training and fitness training courses, which can help to improve G-resistance are only for freshman and sophomore. We recommend these courses be expanded to junior and senior. Moreover, the basic physical fitness evaluation(InBody) should be measured quarterly rather than half-yearly to check cadets’ body status more often. The minimum requirement for 3km running should be raised from 12 minutes 30 seconds to 12 minutes 10 seconds for seniors as running record affected G-resistance significantly. Finally, in case of the Five types of pilot muscle strength evaluation, physical education courses should concentrate on leg press and leg curl in priority. In case of health fitness evaluation that evaluates body composition, BMI and lower body muscle rate should be added to the evaluation items. Application: Based on our study, the physical education curriculum of the Air Force Academy can be improved. This improvement can contribute to enhancing the G-resistance of cadets who are prospective elite pilots and lead to the building of a strong Air Force.

      • SCISCIE

        Design of a 24-GHz CMOS VCO With an Asymmetric-Width Transformer

        Jaemo Yang,Choul-Young Kim,Dong-Wook Kim,Songcheol Hong IEEE 2010 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS PART 2 E Vol.57 No.3

        <P>A K-band CMOS voltage-controlled oscillator (VCO) is implemented with a 0.18- ¿m radio frequency CMOS process. For low supply voltage operation, a transformer-feedback topology using a transformer is proposed. The analysis of the transformer-feedback VCO is presented. This shows that the inductance ratio of the transformer must be optimized, and asymmetric-width transformers allow the easy optimization and the high Q-factor. Based on this analysis, the transformer design consideration of the transformer feedback VCO is presented. The VCO operates at 24.27 GHz with the phase noise of -100.33 dBc/Hz at 1-MHz offset, and it consumes 7.8 mW from a 0.65-V supply voltage.</P>

      • KCI등재

        계층적인 가버 특징들과 베이지안 망을 이용한 필기체 숫자인식

        성재모(JaeMo Sung),방승양(Sung-Yang Bang) 한국정보과학회 2004 정보과학회논문지 : 소프트웨어 및 응용 Vol.31 No.1

        본 논문에서는 필기체 숫자인식을 위해서 계층적으로 서로 다른 레벨의 정보를 표현할 수 있는 구조화된 특징들의 추출 방법과 특징들 사이에 의존도를 이용하여 분류하는 베이지안 망을 제안한다. 이러한 계층적 특징들을 추출하기 위해서 레벨 단위로 가버 필터들을 정의하고, FLD(Fisher Linear Discriminant) 척도를 이용하여 최적화된 가버 필터들을 선택한다. 계층적 가버 특징들은 최적화된 가버필터들을 이용하여 추출되며, 하위 레벨일수록 더욱 국부적인 정보를 표현한다. 추출된 계층적 가버 특징들의 분류성능 향상을 위해서 가버 특징들 사이의 계층적 의존도를 이용하는 베이지안 망을 생성한다. 본 논문에서 제안하는 방법은 naive Bayesian 분류기, k-nearest neighbor 분류기, 그리고 신경망 분류기들과 함께 필기체 숫자인식에 적용되어 계층적 가버 특징들의 효율성과 계층적 의존도를 이용하는 베이지안망은 분류성능을 향상시킬 수 있다는 것을 보여준다. For the handwritten digit recognition, this paper proposes a hierarchical Gabor features extraction method and a Bayesian network for them. Proposed Gabor features are able to represent hierarchically different level information and Bayesian network is constructed to represent hierarchically structured dependencies among these Gabor features. In order to extract such features, we define Gabor filters level by level and choose optimal Gabor filters by using Fisher's Linear Discriminant measure. Hierarchical Gabor features are extracted by optimal Gabor filters and represent more localized information in the lower level. Proposed methods were successfully applied to handwritten digit recognition with well-known naive Bayesian classifier, k-nearest neighbor classifier, and backpropagation neural network and showed good performance.

      • Supersymmetric heterotic action out of M5 brane

        Park, Jaemo,Sim, Woojoo IOP Publishing Ltd 2009 Journal of high energy physics Vol.2009 No.8

        Generalizing the work by Cherkis and Schwarz [1] where the bosonic part of the heterotic action was worked out with the novel introduction of the chiral bosons associated with the current algebra, we carry out the double dimensional reduction of supersymmetric M5 brane on K3 to obtain the supersymmetric action of heterotic string in 7-dimensional flat space-time. Motivated by this result, we propose the supersymmetric heterotic action in 10-dimensional flat space-time where the chiral bosons are introduced in similar way. We explicitly verify the κ-symmetry of the proposed action.

      • Supertwistor orbifolds: gauge theory amplitudes & topological strings

        Park, Jaemo,Rey, Soo-Jong IOP Publishing Ltd 2004 Journal of high energy physics Vol.2004 No.12

        <P>Witten established correspondence between multiparton amplitudes in four-dimensional maximally supersymmetric gauge theory and topological string theory on supertwistor space &BbbC;&BbbP;<SUP>3|4</SUP> . We extend Witten's correspondence to gauge theories with lower supersymmetries, product gauge groups, and fermions and scalars in complex representations. Such gauge theories arise in high-energy limit of the Standard Model of strong and electroweak interactions. We construct such theories by orbifolding prescription. Much like gauge and string theories, such prescription is applicable equally well to topological string theories on supertwistor space. We work out several examples of orbifolds of &BbbC;&BbbP;<SUP>3|4</SUP> that are dual to &calN; = 2,1,0 quiver gauge theories. We study gauged sigma model describing topological B-model on the superorbifolds, and explore mirror pairs with particular attention to the parity symmetry. We check the orbifold construction by studying multiparton amplitudes in these theories with particular attention to those involving fermions in bifundamental representations and interactions involving U(1) subgroups.</P>

      • A holographic QCD and excited baryons from string theory

        Park, Jaemo,Yi, Piljin IOP Publishing Ltd 2008 Journal of high energy physics Vol.2008 No.6

        We study baryons of arbitrary isospin in a stringy holographic QCD model. In this D4-D8 holographic setting, the flavor symmetry is promoted to a gauge symmetry in the bulk, and produces, as KK modes of the gauge field, pions and spin one mesons of low energy QCD. Baryons of arbitrary isospins are represented as instanton solitons with isospin and spin quantum numbers locked, in a manner similar to the Skyrmion model. The soliton picture leads to a natural effective field theory of arbitrary baryons interacting with mesons. Couplings of baryons to axial mesons, including pions, are dominated in the large <I>N</I><SUB><I>c</I></SUB> limit by a direct coupling to the flavor field strength in five dimensions. We delineate the relevant couplings and determine their strengths. This work generalizes part of refs. [D.K. Hong, M. Rho, H.-U. Yee and P. Yi, Chiral dynamics of baryons from string theory, <I>Phys. Rev.</I> D <B>76</B> (2007) 061901 [hep-th/0701276]] and [D.K. Hong, M. Rho, H.-U. Yee and P. Yi, Dynamics of baryons from string theory and vector dominance, JHEP 09 (2007) 063 [arXiv:0705.2632]] to all excited baryons. Due to technical difficulties in introducing relativistic higher spin fields, we perform all computations in the nonrelativistic regime, which suffices for the leading <I>N</I><SUB><I>c</I></SUB> predictions.

      • KCI등재

        이용자의 금융거래정보 보호를 위한 확장 종단간(End-to-End) 암호화 기술과 보안고려사항

        성재모(Jaemo Seung),이수미(Su-Mi Lee),노봉남(Bong-Nam Noh),안승호(Seung-Ho Ahn) 한국정보보호학회 2010 정보보호학회논문지 Vol.20 No.4

        종단간 암호화는 계좌 비밀번호 및 계좌번호 등 주요 금융거래정보를 암호화하여 이용자 PC에서부터 전자금융거래 서버까지 보호하는 것을 의미한다. 초기에 적용된 종단간 암호화는 이용자 PC내에 평문으로 존재하는 구간이 없어야 한다는 기본적인 보안요구사항을 만족하지 못하여 전자금융거래 시 여러 해킹기법에 의해 취약함이 발견되었다. 따라서 확장 종단간 암호화 기술은 이용자의 금융거래정보에 대해 기밀성 및 무결성을 제공하여 유출, 위ㆍ변조 등의 위협으로부터 보호하고 있다. 본 논문에서 확장 종단간 암호화 기술에 대해 살펴보고 금융회사에서 확장 종단간 암호화 기술 적용 시 고려해야 할 보안 고려사항에 대해 알아본다. End-to-End(E2E) encryption is to encrypt private and important financial information such as user's secret access numbers and account numbers from user's terminal to financial institutions. There has been found significant security vulnerabilities by various hacking in early E2E encryption system since early E2E encryption is not satisfied the basic security requirement which is that there does not exist user's financial information on plaintext in user's terminal. Extensional E2E encryption which is to improve early E2E encryption provides confidentiality and integrity to protect user's financial information from vulnerabilities such as alteration, forgery and leakage of confidential information. In this paper, we explain the extensional E2E encryption technology and present considerable security issues when the extensional E2E encryption technology is applied to financial systems.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼