• Title/Summary/Keyword: 자원기반학습

Search Result 448, Processing Time 0.026 seconds

A Study on the Search of Optimal Aquaculture farm condition based on Machine Learning (머신러닝 기반의 최적 양식장 조건 검색에 관한 연구)

  • Kang, Min-Soo;Jung, Yong-Gyu;Jang, Du-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.135-140
    • /
    • 2017
  • The demand for aquatic products in the domestic and overseas is increased, so that the aquaculture industry can achieve high performance by controlling and standardizing the production even with a relatively small amount of resources compared with existing fisheries. However, traditional method has problems of low productivity such as natural disasters and ecosystem pollution, and it is necessary to develop a new culture system that can move to the optimal culture site. In order to find the optimal location, you need to collect and analyze the necessary data such as temperature and DO in real time. Data analysis was performed by using K-means clustering method based on machine learning, so that it was possible to decision when and where to move the farm by repeated unsupervised learning. The proposed research could solve the problems of low productivity such as natural disasters and ecosystem pollution if applied to regressive fish farmers.

Semantic-based Automatic Open API Composition Algorithm for Easier-to-use Mashups (Easier-to-use 매쉬업을 위한 시맨틱 기반 자동 Open API 조합 알고리즘)

  • Lee, Yong Ju
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.5
    • /
    • pp.359-368
    • /
    • 2013
  • Mashup is a web application that combines several different sources to create new services using Open APIs(Application Program Interfaces). Although the mashup has become very popular over the last few years, there are several challenging issues when combining a large number of APIs into the mashup, especially when composite APIs are manually integrated by mashup developers. This paper proposes a novel algorithm for automatic Open API composition. The proposed algorithm consists of constructing an operation connecting graph and searching composition candidates. We construct an operation connecting graph which is based on the semantic similarity between the inputs and the outputs of Open APIs. We generate directed acyclic graphs (DAGs) that can produce the output satisfying the desired goal. In order to produce the DAGs efficiently, we rapidly filter out APIs that are not useful for the composition. The algorithm is evaluated using a collection of REST and SOAP APIs extracted from ProgrammableWeb.com.

Analysis of AI-Applied Industry and Development Direction (인공지능 적용 산업과 발전방향에 대한 분석)

  • Moon, Seung Hyeog
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.77-82
    • /
    • 2019
  • AI is applied increasingly to overall industries such as living, medical, financial service, autonomous car, etc. thanks to rapid technology development. AI-leading countries are strengthening their competency to secure competitiveness since AI is positioned as the core technology in $4^{th}$ Industrial Revolution. Although Korea has the competitive IT infra and human resources, it lags behind traditional AI-leaders like United States, Canada, Japan and, even China which devotes all its might to develop intelligent technology-intentive industry. AI is the critical technology influencing on the national industry in the near future according to advancement of intelligent information society so that concentration of capability is required with national interest. Also, joint development with global AI-leading companies as well as development of own technology are crucial to prevent technology subordination. Additionally, regulatory reform and preparation of related law are very urgent.

Lightweight of ONNX using Quantization-based Model Compression (양자화 기반의 모델 압축을 이용한 ONNX 경량화)

  • Chang, Duhyeuk;Lee, Jungsoo;Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.93-98
    • /
    • 2021
  • Due to the development of deep learning and AI, the scale of the model has grown, and it has been integrated into other fields to blend into our lives. However, in environments with limited resources such as embedded devices, it is exist difficult to apply the model and problems such as power shortages. To solve this, lightweight methods such as clouding or offloading technologies, reducing the number of parameters in the model, or optimising calculations are proposed. In this paper, quantization of learned models is applied to ONNX models used in various framework interchange formats, neural network structure and inference performance are compared with existing models, and various module methods for quantization are analyzed. Experiments show that the size of weight parameter is compressed and the inference time is more optimized than before compared to the original model.

A Study on Robustness Evaluation and Improvement of AI Model for Malware Variation Analysis (악성코드 변종 분석을 위한 AI 모델의 Robust 수준 측정 및 개선 연구)

  • Lee, Eun-gyu;Jeong, Si-on;Lee, Hyun-woo;Lee, Tea-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.997-1008
    • /
    • 2022
  • Today, AI(Artificial Intelligence) technology is being extensively researched in various fields, including the field of malware detection. To introduce AI systems into roles that protect important decisions and resources, it must be a reliable AI model. AI model that dependent on training dataset should be verified to be robust against new attacks. Rather than generating new malware detection, attackers find malware detection that succeed in attacking by mass-producing strains of previously detected malware detection. Most of the attacks, such as adversarial attacks, that lead to misclassification of AI models, are made by slightly modifying past attacks. Robust models that can be defended against these variants is needed, and the Robustness level of the model cannot be evaluated with accuracy and recall, which are widely used as AI evaluation indicators. In this paper, we experiment a framework to evaluate robustness level by generating an adversarial sample based on one of the adversarial attacks, C&W attack, and to improve robustness level through adversarial training. Through experiments based on malware dataset in this study, the limitations and possibilities of the proposed method in the field of malware detection were confirmed.

Light-weight Classification Model for Android Malware through the Dimensional Reduction of API Call Sequence using PCA

  • Jeon, Dong-Ha;Lee, Soo-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.123-130
    • /
    • 2022
  • Recently, studies on the detection and classification of Android malware based on API Call sequence have been actively carried out. However, API Call sequence based malware classification has serious limitations such as excessive time and resource consumption in terms of malware analysis and learning model construction due to the vast amount of data and high-dimensional characteristic of features. In this study, we analyzed various classification models such as LightGBM, Random Forest, and k-Nearest Neighbors after significantly reducing the dimension of features using PCA(Principal Component Analysis) for CICAndMal2020 dataset containing vast API Call information. The experimental result shows that PCA significantly reduces the dimension of features while maintaining the characteristics of the original data and achieves efficient malware classification performance. Both binary classification and multi-class classification achieve higher levels of accuracy than previous studies, even if the data characteristics were reduced to less than 1% of the total size.

A study on the Improvement of the Food Waste Discharge System through the Classification on Foreign Substances (이물질 구별을 통한 음식물쓰레기 배출시스템 개선에 관한 연구)

  • Kim, Yongil;Kim, Seungcheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.51-56
    • /
    • 2022
  • With the development of industrialization, the amount of food and waste is rapidly increasing. Accordingly, the government is aware of the seriousness and is making efforts in various ways to reduce it. As a part of that, the volume-based food system was introduced, and although there were several trials and errors at the beginning of the introduction, it shows a reduction effect of 20 to 30%. These results suggest that the volume-based food system is being established. However, the waste is caused by foreign substances in the process of recycling resources by collecting them from the 1st collection to the 2nd collection process. Therefore, in this study, to solve these problems fundamentally, artificial intelligence is applied to classify foreign substances and improve them. Due to the nature of food waste, there is a limit to obtaining many images, so we compare several models based on CNNs and classify them as abnormal data, that is, CNN-based models are trained on various types of foreign substances, and then models with high accuracy are selected. We intend to prepare improvement measures for maintenance, such as manpower input to protect equipment and classify foreign substances by applying it.

IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training (IaC-VIMF: 사이버 공방훈련을 위한 IaC 기반 가상 인프라 변이 생성 프레임워크)

  • Joo-Young Roh;Se-Han Lee;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.527-535
    • /
    • 2023
  • To develop experts capable of responding to cyber security incidents, numerous institutions have established cyber training facilities to cultivate security professionals equipped with effective defense strategies. However, these challenges such as limited resources, scenario-based content development, and cost constraints. To address these issues, this paper proposes a virtual infrastructure variation generation framework. It provides customized, diverse IT infrastructure environments for each organization, allowing cyber defense trainers to accumulate a wide range of experiences. By leveraging Infrastructure-as-Code (IaC) containers and employing Word2Vec, a natural language processing model, mutable code elements are extracted and trained, enabling the generation of new code and presenting novel container environments.

A Study on the Development of Larchiveum Strategies and an Instructional Model for School Libraries (학교도서관 라키비움 전략 및 교육모형 개발 연구)

  • Soo-Youn Cho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.3
    • /
    • pp.35-64
    • /
    • 2024
  • The purpose of this study is to develop educational strategies and models by applying future-oriented elements of libraries, which are transitioning into integrated spaces through collaboration with archives and museums, into school library education. This study focuses on the changes where libraries expand their spaces and roles in response to the trends of a pluralistic society. The term 'Larchiveum' was established to represent a knowledge and culture complex space. The concepts and functions of this term were identified, and the characteristics of materials collected and managed by archives, museums, and art galleries, as well as domestic and international educational information services, were analyzed to explore ways to integrate them into school library education. Based on the ASSURE instructional design model, which emphasizes the effective selection and use of teaching and learning media, this study developed Larchiveum strategies, including 'Inquiry-based Information Utilization,' 'Curriculum Integration and Convergence,' 'Collaboration, Sharing, and Dissemination,' and 'Digital Archive,' and structured the educational content accordingly. The procedures and steps were refined through the evaluation and feedback of field experts, leading to the development of a collaborative educational model that incorporates Larchiveum strategies, resources, and inquiry-based instruction.

Sleep Deprivation Attack Detection Based on Clustering in Wireless Sensor Network (무선 센서 네트워크에서 클러스터링 기반 Sleep Deprivation Attack 탐지 모델)

  • Kim, Suk-young;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.83-97
    • /
    • 2021
  • Wireless sensors that make up the Wireless Sensor Network generally have extremely limited power and resources. The wireless sensor enters the sleep state at a certain interval to conserve power. The Sleep deflation attack is a deadly attack that consumes power by preventing wireless sensors from entering the sleep state, but there is no clear countermeasure. Thus, in this paper, using clustering-based binary search tree structure, the Sleep deprivation attack detection model is proposed. The model proposed in this paper utilizes one of the characteristics of both attack sensor nodes and normal sensor nodes which were classified using machine learning. The characteristics used for detection were determined using Long Short-Term Memory, Decision Tree, Support Vector Machine, and K-Nearest Neighbor. Thresholds for judging attack sensor nodes were then learned by applying the SVM. The determined features were used in the proposed algorithm to calculate the values for attack detection, and the threshold for determining the calculated values was derived by applying SVM.Through experiments, the detection model proposed showed a detection rate of 94% when 35% of the total sensor nodes were attack sensor nodes and improvement of up to 26% in power retention.