• Title/Summary/Keyword: 학습 집합

Search Result 553, Processing Time 0.034 seconds

Short-Term Prediction of Vehicle Speed on Main City Roads using the k-Nearest Neighbor Algorithm (k-Nearest Neighbor 알고리즘을 이용한 도심 내 주요 도로 구간의 교통속도 단기 예측 방법)

  • Rasyidi, Mohammad Arif;Kim, Jeongmin;Ryu, Kwang Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.121-131
    • /
    • 2014
  • Traffic speed is an important measure in transportation. It can be employed for various purposes, including traffic congestion detection, travel time estimation, and road design. Consequently, accurate speed prediction is essential in the development of intelligent transportation systems. In this paper, we present an analysis and speed prediction of a certain road section in Busan, South Korea. In previous works, only historical data of the target link are used for prediction. Here, we extract features from real traffic data by considering the neighboring links. After obtaining the candidate features, linear regression, model tree, and k-nearest neighbor (k-NN) are employed for both feature selection and speed prediction. The experiment results show that k-NN outperforms model tree and linear regression for the given dataset. Compared to the other predictors, k-NN significantly reduces the error measures that we use, including mean absolute percentage error (MAPE) and root mean square error (RMSE).

An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining (베이지안 확률 및 폐쇄 순차패턴 마이닝 방식을 이용한 설명가능한 로그 이상탐지 시스템)

  • Yun, Jiyoung;Shin, Gun-Yoon;Kim, Dong-Wook;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.77-87
    • /
    • 2021
  • With the development of the Internet and personal computers, various and complex attacks begin to emerge. As the attacks become more complex, signature-based detection become difficult. It leads to the research on behavior-based log anomaly detection. Recent work utilizes deep learning to learn the order and it shows good performance. Despite its good performance, it does not provide any explanation for prediction. The lack of explanation can occur difficulty of finding contamination of data or the vulnerability of the model itself. As a result, the users lose their reliability of the model. To address this problem, this work proposes an explainable log anomaly detection system. In this study, log parsing is the first to proceed. Afterward, sequential rules are extracted by Bayesian posterior probability. As a result, the "If condition then results, post-probability" type rule set is extracted. If the sample is matched to the ruleset, it is normal, otherwise, it is an anomaly. We utilize HDFS datasets for the experiment, resulting in F1score 92.7% in test dataset.

Exploring Elementary Students' Positioning in a Context of Socio-scientific Issues (SSI) Education: Focus on an Action-oriented Climate Change Club Activity (과학 관련 사회적 문제 (SSI) 교육 맥락에서 초등학생의 위치짓기 양상 -실천 지향 기후변화 동아리 활동을 중심으로-)

  • Kim, Jong-Uk;Kim, Chan-Jong
    • Journal of The Korean Association For Science Education
    • /
    • v.41 no.6
    • /
    • pp.501-517
    • /
    • 2021
  • In the present age, when the development of science and technology is leading the changes, this study supports the view that students should possess the literacy to participate democratically and critically in socio-scientific issues, and should be positioned as agentic and participatory citizens. Accordingly, we implemented a club activity that emphasize climate social action for elementary students, and explored how students were positioned in relation to climate change. In this study, position is defined as a complex cluster of rights and duties that students have in relation to climate change. The club activity was implemented throughout 46 sessions from March to July, 2019 for 11 sixth graders of 'H elementary School' in Seoul, and transcripts of video and interviews were analyzed by means of a constant comparison method. In the course of the activity consisting of three steps, the students exhibited different positioning and they are as follows: In the global warming modeling activity for Step 1, students were positioned as 'active learners', but at the same time, they showed a contradiction in being positioned as 'apprentice'. In the student-led research activities inherent to Step 2, they were positioned as 'scientists who design and conduct research' and 'bystanders' due to the controversial nature of SSI knowledge. As students participate in the social actions involved in Step 3, the position changed from 'elementary school students facing difficulty in making a change' to 'participatory citizens creating changes.' This study is significant because it shows students' potential to promote participatory and democratic citizenship through action-oriented SSI activities. In addition, pedagogical approaches were discussed dealing with the contradictions and limitations of positioning.

Development and Application of the Butterfly Algorithm Based on Decision Making Tree for Contradiction Problem Solving (모순 문제 해결을 위한 의사결정트리 기반 나비 알고리즘의 개발과 적용)

  • Hyun, Jung Suk;Ko, Ye June;Kim, Yung Gyeol;Jean, Seungjae;Park, Chan Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.22 no.1
    • /
    • pp.87-98
    • /
    • 2019
  • It is easy to assume that contradictions are logically incorrect or empty sets that have no solvability. This dilemma, which can not be done, is difficult to solve because it has to solve the contradiction hidden in it. Paradoxically, therefore, contradiction resolution has been viewed as an innovative and creative problem-solving. TRIZ, which analyzes the solution of the problem from the perspective of resolving contradictions, has been used for people rather than computers. The Butterfly model, which analyzes the problem from the perspective of solving the contradiction like TRIZ, analyzed the type of contradiction problem using symbolic logic. In order to apply an appropriate concrete solution strategy for a given contradiction problems, we designed the Butterfly algorithm based on decision making tree. We also developed a visualization tool based on Python tkInter to find concrete solution strategies for given contradiction problems. In order to verify the developed tool, the third grade students of middle school learned the Butterfly algorithm, analyzed the contradiction of the wooden support, and won the grand prize at an invention contest in search of a new solution. The Butterfly algorithm developed in this paper systematically reduces the solution space of contradictory problems in the beginning of problem solving and can help solve contradiction problems without trial and errors.

Psychological Essentialism and Category Representation (심리적 본질주의와 범주표상)

  • Kim, ShinWoo;Jo, Jun-Hyoung;Li, Hyung-Chul O.
    • Korean Journal of Cognitive Science
    • /
    • v.32 no.2
    • /
    • pp.55-73
    • /
    • 2021
  • Psychological essentialism states that people believe some categories to have hidden and defining essential features which cause other features of the category (Gelman, 2003; Hirschfeld, 1996; Medin & Ortony, 1989). Essentialist belief on categories questions the Roschian argument (Rosch, 1973, 1978) that categories merely consist of clusters of correlated features. Unlike family resemblance categories, essentialized categories are likely to have clear between-category boundaries and high within-category coherence (Gelman, 2003; Prentice & Miller, 2007). Two experiments were conducted to test the effects of essentialist belief on category representation (i.e., between-category boundary, within-category coherence). Participants learned family resemblance and essentialized categories in their assigned conditions and then performed categorization task (Expt. 1) and frequency estimation task of category exemplars (Expt. 2). The results showed, in essentialized categories, both boundary intensification and greater category coherence. Theses results are likely to have arisen due to increased cue and category validity in essentialized categories and suggest that essentialist belief influences macroscopic representation of category structure.

Evaluation of Artificial Intelligence Accuracy by Increasing the CNN Hidden Layers: Using Cerebral Hemorrhage CT Data (CNN 은닉층 증가에 따른 인공지능 정확도 평가: 뇌출혈 CT 데이터)

  • Kim, Han-Jun;Kang, Min-Ji;Kim, Eun-Ji;Na, Yong-Hyeon;Park, Jae-Hee;Baek, Su-Eun;Sim, Su-Man;Hong, Joo-Wan
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • Deep learning is a collection of algorithms that enable learning by summarizing the key contents of large amounts of data; it is being developed to diagnose lesions in the medical imaging field. To evaluate the accuracy of the cerebral hemorrhage diagnosis, we used a convolutional neural network (CNN) to derive the diagnostic accuracy of cerebral parenchyma computed tomography (CT) images and the cerebral parenchyma CT images of areas where cerebral hemorrhages are suspected of having occurred. We compared the accuracy of CNN with different numbers of hidden layers and discovered that CNN with more hidden layers resulted in higher accuracy. The analysis results of the derived CT images used in this study to determine the presence of cerebral hemorrhages are expected to be used as foundation data in studies related to the application of artificial intelligence in the medical imaging industry.

Optimization of Approximate Modular Multiplier for R-LWE Cryptosystem (R-LWE 암호화를 위한 근사 모듈식 다항식 곱셈기 최적화)

  • Jae-Woo, Lee;Youngmin, Kim
    • Journal of IKEEE
    • /
    • v.26 no.4
    • /
    • pp.736-741
    • /
    • 2022
  • Lattice-based cryptography is the most practical post-quantum cryptography because it enjoys strong worst-case security, relatively efficient implementation, and simplicity. Ring learning with errors (R-LWE) is a public key encryption (PKE) method of lattice-based encryption (LBC), and the most important operation of R-LWE is the modular polynomial multiplication of rings. This paper proposes a method for optimizing modular multipliers based on approximate computing (AC) technology, targeting the medium-security parameter set of the R-LWE cryptosystem. First, as a simple way to implement complex logic, LUT is used to omit some of the approximate multiplication operations, and the 2's complement method is used to calculate the number of bits whose value is 1 when converting the value of the input data to binary. We propose a total of two methods to reduce the number of required adders by minimizing them. The proposed LUT-based modular multiplier reduced both speed and area by 9% compared to the existing R-LWE modular multiplier, and the modular multiplier using the 2's complement method reduced the area by 40% and improved the speed by 2%. appear. Finally, the area of the optimized modular multiplier with both of these methods applied was reduced by up to 43% compared to the previous one, and the speed was reduced by up to 10%.

A Dynamic exploration of Constructivism Research based on Citespace Software in the Filed of Education (교육학 분야에서 CiteSpace에 기초한 구성주의 연구 동향 탐색)

  • Jiang, Yuxin;Song, Sun-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.576-584
    • /
    • 2022
  • As an important branch of cognitive psychology, "constructivism" is called a "revolution" in contemporary educational psychology, which has a profound influence on the field of pedagogy and psychology. Based on "WOS" database, this study selects "WOS Core database" and "KCI database", uses CiteSpace visualization software as analysis tool, and makes knowledge map analysis on the research literature of "constructivism" in the field of education in recent 35 years. Analysis directions include annual analysis, network connection analysis by country(region) branch, author, institution or University, and keyword analysis. The purpose of the analysis is to grasp the subject areas, research hotspots and future trends of the research on constructivism, and to provide theoretical reference for the research on constructivism. There are three conclusions from the study. 1. Studies on the subject of constructivism have continued from the 1980s to the present. It is now in a period of steady development. 2. Countries concerned with the subject of constructivism mainly include the United States, Canada, Britain, Australia and the Netherlands. The main research institutions and authors are mainly located in these countries. 3. Currently, the keywords constructivism research focus on the clusters of "instructional strategies", and the development of science and technology is affecting individual learning. In the future, instructional strategies will become the focus of structural constructivism research. With the development of instructional technology, it is necessary to conduct research related to the development of new teaching models.

A study on pollutant loads prediction using a convolution neural networks (합성곱 신경망을 이용한 오염부하량 예측에 관한 연구)

  • Song, Chul Min
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.444-444
    • /
    • 2021
  • 하천의 오염부하량 관리 계획은 지속적인 모니터링을 통한 자료 구축과 모형을 이용한 예측결과를 기반으로 수립된다. 하천의 모니터링과 예측 분석은 많은 예산과 인력 등이 필요하나, 정부의 담당 공무원 수는 극히 부족한 상황이 일반적이다. 이에 정부는 전문가에게 관련 용역을 의뢰하지만, 한국과 같이 지형이 복잡한 지역에서의 오염부하량 배출 특성은 각각 다르게 나타나기 때문에 많은 예산 소모가 발생 된다. 이를 개선하고자, 본 연구는 합성곱 신경망 (convolution neural network)과 수문학적 이미지 (hydrological image)를 이용하여 강우 발생시 BOD 및 총인의 부하량 예측 모형을 개발하였다. 합성곱 신경망의 입력자료는 일반적으로 RGB (red, green, bule) 사진을 이용하는데, 이를 그래도 오염부하량 예측에 활용하는 것은 경험적 모형의 전제(독립변수와 종속변수의 관계)를 무너뜨리는 결과를 초래할 수 있다. 이에, 본 연구에서는 오염부하량이 수문학적 조건과 토지이용 등의 변수에 의해 결정된다는 인과관계를 만족시키고자 수문학적 속성이 내재된 수문학적 이미지를 합성곱 신경망의 훈련자료로 사용하였다. 수문학적 이미지는 임의의 유역에 대해 2차원 공간에서 무차원의 수문학적 속성을 갖는 grid의 집합으로 정의되는데, 여기서 각 grid의 수문학적 속성은 SCS 토양보존국(soil conservation service, SCS)에서 발표한 수문학적 토양피복형수 (curve number, CN)를 이용하여 산출한다. 합성곱 신경망의 구조는 2개의 Convolution Layer와 1개의 Pulling Layer가 5회 반복하는 구조로 설정하고, 1개의 Flatten Layer, 3개의 Dense Layer, 1개의 Batch Normalization Layer를 배열하고, 마지막으로 1개의 Dense Layer가 연결되는 구조로 설계하였다. 이와 함께, 각 층의 활성화 함수는 정규화 선형함수 (ReLu)로, 마지막 Dense Layer의 활성화 함수는 연속변수가 도출될 수 있도록 회귀모형에서 자주 사용되는 Linear 함수로 설정하였다. 연구의 대상지역은 경기도 가평군 조종천 유역으로 선정하였고, 연구기간은 2010년 1월 1일부터 2019년 12월 31일까지로, 2010년부터 2016년까지의 자료는 모형의 학습에, 2017년부터 2019년까지의 자료는 모형의 성능평가에 활용하였다. 모형의 예측 성능은 모형효율계수 (NSE), 평균제곱근오차(RMSE) 및 평균절대백분율오차(MAPE)를 이용하여 평가하였다. 그 결과, BOD 부하량에 대한 NSE는 0.9, RMSE는 1031.1 kg/day, MAPE는 11.5%로 나타났으며, 총인 부하량에 대한 NSE는 0.9, RMSE는 53.6 kg/day, MAPE는 17.9%로 나타나 본 연구의 모형은 우수(good)한 것으로 판단하였다. 이에, 본 연구의 모형은 일반 ANN 모형을 이용한 선행연구와는 달리 2차원 공간정보를 반영하여 오염부하량 모의가 가능했으며, 제한적인 입력자료를 이용하여 간편한 모델링이 가능하다는 장점을 나타냈다. 이를 통해 정부의 물관리 정책을 위한 의사결정 및 부족한 물관리 분야의 행정력에 도움이 될 것으로 생각된다.

  • PDF

Class-Agnostic 3D Mask Proposal and 2D-3D Visual Feature Ensemble for Efficient Open-Vocabulary 3D Instance Segmentation (효율적인 개방형 어휘 3차원 개체 분할을 위한 클래스-독립적인 3차원 마스크 제안과 2차원-3차원 시각적 특징 앙상블)

  • Sungho Song;Kyungmin Park;Incheol Kim
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.7
    • /
    • pp.335-347
    • /
    • 2024
  • Open-vocabulary 3D point cloud instance segmentation (OV-3DIS) is a challenging visual task to segment a 3D scene point cloud into object instances of both base and novel classes. In this paper, we propose a novel model Open3DME for OV-3DIS to address important design issues and overcome limitations of the existing approaches. First, in order to improve the quality of class-agnostic 3D masks, our model makes use of T3DIS, an advanced Transformer-based 3D point cloud instance segmentation model, as mask proposal module. Second, in order to obtain semantically text-aligned visual features of each point cloud segment, our model extracts both 2D and 3D features from the point cloud and the corresponding multi-view RGB images by using pretrained CLIP and OpenSeg encoders respectively. Last, to effectively make use of both 2D and 3D visual features of each point cloud segment during label assignment, our model adopts a unique feature ensemble method. To validate our model, we conducted both quantitative and qualitative experiments on ScanNet-V2 benchmark dataset, demonstrating significant performance gains.