• Title/Summary/Keyword: AI-based System and Technology

Search Result 467, Processing Time 0.034 seconds

Design and Implementation of Interactive Search Service based on Deep Learning and Morpheme Analysis in NTIS System (NTIS 시스템에서 딥러닝과 형태소 분석 기반의 대화형 검색 서비스 설계 및 구현)

  • Lee, Jong-Won;Kim, Tae-Hyun;Choi, Kwang-Nam
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.9-14
    • /
    • 2020
  • Currently, NTIS (National Technology Information Service) is building an interactive search service based on artificial intelligence technology. In order to understand users' search intentions and provide R&D information, an interactive search service is built based on deep learning models and morpheme analyzers. The deep learning model learns based on the log data loaded when using NTIS and interactive search services and understands the user's search intention. And it provides task information through step-by-step search. Understanding the search intent makes exception handling easier, and step-by-step search makes it easier and faster to obtain the desired information than integrated search. For future research, it is necessary to expand the range of information provided to users.

Privacy Preserving Techniques for Deep Learning in Multi-Party System (멀티 파티 시스템에서 딥러닝을 위한 프라이버시 보존 기술)

  • Hye-Kyeong Ko
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.647-654
    • /
    • 2023
  • Deep Learning is a useful method for classifying and recognizing complex data such as images and text, and the accuracy of the deep learning method is the basis for making artificial intelligence-based services on the Internet useful. However, the vast amount of user da vita used for training in deep learning has led to privacy violation problems, and it is worried that companies that have collected personal and sensitive data of users, such as photographs and voices, own the data indefinitely. Users cannot delete their data and cannot limit the purpose of use. For example, data owners such as medical institutions that want to apply deep learning technology to patients' medical records cannot share patient data because of privacy and confidentiality issues, making it difficult to benefit from deep learning technology. In this paper, we have designed a privacy preservation technique-applied deep learning technique that allows multiple workers to use a neural network model jointly, without sharing input datasets, in multi-party system. We proposed a method that can selectively share small subsets using an optimization algorithm based on modified stochastic gradient descent, confirming that it could facilitate training with increased learning accuracy while protecting private information.

A Filter Algorithm based on Partial Mask and Lagrange Interpolation for Impulse Noise Removal (임펄스 잡음 제거를 위한 부분 마스크와 라그랑지 보간법에 기반한 필터 알고리즘)

  • Cheon, Bong-Won;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.675-681
    • /
    • 2022
  • Recently, with the development of IoT technology and AI, unmanned and automated in various fields, interest in video processing, which is the basis for automation such as object recognition and object classification, is increasing. Various studies have been conducted on noise removal in the video processing process, which has a significant impact on image quality and system accuracy and reliability, but there is a problem that it is difficult to restore images for areas with high impulse noise density. In this paper proposes a filter algorithm based on partial mask and Lagrange interpolation to restore the damaged area of impulse noise in the image. In the proposed algorithm, the filtering process was switched by comparing the filtering mask with the noise estimate and the purge weight was calculated based on the low frequency component and the high frequency component of the image to restore the image.

Damage detection of subway tunnel lining through statistical pattern recognition

  • Yu, Hong;Zhu, Hong P.;Weng, Shun;Gao, Fei;Luo, Hui;Ai, De M.
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.2
    • /
    • pp.231-242
    • /
    • 2018
  • Subway tunnel structure has been rapidly developed in many cities for its strong transport capacity. The model-based damage detection of subway tunnel structure is usually difficult due to the complex modeling of soil-structure interaction, the indetermination of boundary and so on. This paper proposes a new data-based method for the damage detection of subway tunnel structure. The root mean square acceleration and cross correlation function are used to derive a statistical pattern recognition algorithm for damage detection. A damage sensitive feature is proposed based on the root mean square deviations of the cross correlation functions. X-bar control charts are utilized to monitor the variation of the damage sensitive features before and after damage. The proposed algorithm is validated by the experiment of a full-scale two-rings subway tunnel lining, and damages are simulated by loosening the connection bolts of the rings. The results verify that root mean square deviation is sensitive to bolt loosening in the tunnel lining and X-bar control charts are feasible to be used in damage detection. The proposed data-based damage detection method is applicable to the online structural health monitoring system of subway tunnel lining.

Development of Information Extraction System from Multi Source Unstructured Documents for Knowledge Base Expansion (지식베이스 확장을 위한 멀티소스 비정형 문서에서의 정보 추출 시스템의 개발)

  • Choi, Hyunseung;Kim, Mintae;Kim, Wooju;Shin, Dongwook;Lee, Yong Hun
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.111-136
    • /
    • 2018
  • In this paper, we propose a methodology to extract answer information about queries from various types of unstructured documents collected from multi-sources existing on web in order to expand knowledge base. The proposed methodology is divided into the following steps. 1) Collect relevant documents from Wikipedia, Naver encyclopedia, and Naver news sources for "subject-predicate" separated queries and classify the proper documents. 2) Determine whether the sentence is suitable for extracting information and derive the confidence. 3) Based on the predicate feature, extract the information in the proper sentence and derive the overall confidence of the information extraction result. In order to evaluate the performance of the information extraction system, we selected 400 queries from the artificial intelligence speaker of SK-Telecom. Compared with the baseline model, it is confirmed that it shows higher performance index than the existing model. The contribution of this study is that we develop a sequence tagging model based on bi-directional LSTM-CRF using the predicate feature of the query, with this we developed a robust model that can maintain high recall performance even in various types of unstructured documents collected from multiple sources. The problem of information extraction for knowledge base extension should take into account heterogeneous characteristics of source-specific document types. The proposed methodology proved to extract information effectively from various types of unstructured documents compared to the baseline model. There is a limitation in previous research that the performance is poor when extracting information about the document type that is different from the training data. In addition, this study can prevent unnecessary information extraction attempts from the documents that do not include the answer information through the process for predicting the suitability of information extraction of documents and sentences before the information extraction step. It is meaningful that we provided a method that precision performance can be maintained even in actual web environment. The information extraction problem for the knowledge base expansion has the characteristic that it can not guarantee whether the document includes the correct answer because it is aimed at the unstructured document existing in the real web. When the question answering is performed on a real web, previous machine reading comprehension studies has a limitation that it shows a low level of precision because it frequently attempts to extract an answer even in a document in which there is no correct answer. The policy that predicts the suitability of document and sentence information extraction is meaningful in that it contributes to maintaining the performance of information extraction even in real web environment. The limitations of this study and future research directions are as follows. First, it is a problem related to data preprocessing. In this study, the unit of knowledge extraction is classified through the morphological analysis based on the open source Konlpy python package, and the information extraction result can be improperly performed because morphological analysis is not performed properly. To enhance the performance of information extraction results, it is necessary to develop an advanced morpheme analyzer. Second, it is a problem of entity ambiguity. The information extraction system of this study can not distinguish the same name that has different intention. If several people with the same name appear in the news, the system may not extract information about the intended query. In future research, it is necessary to take measures to identify the person with the same name. Third, it is a problem of evaluation query data. In this study, we selected 400 of user queries collected from SK Telecom 's interactive artificial intelligent speaker to evaluate the performance of the information extraction system. n this study, we developed evaluation data set using 800 documents (400 questions * 7 articles per question (1 Wikipedia, 3 Naver encyclopedia, 3 Naver news) by judging whether a correct answer is included or not. To ensure the external validity of the study, it is desirable to use more queries to determine the performance of the system. This is a costly activity that must be done manually. Future research needs to evaluate the system for more queries. It is also necessary to develop a Korean benchmark data set of information extraction system for queries from multi-source web documents to build an environment that can evaluate the results more objectively.

One-stop Platform for Verification of ICT-based environmental monitoring sensor data (ICT 기반 환경모니터링 센서 데이터 검증을 위한 원스탑 플랫폼)

  • Chae, Minah;Cho, Jae Hyuk
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.32-39
    • /
    • 2021
  • Existing environmental measuring devices mainly focus on electromagnetic wave and eco-friendly product certification and durability test, and sensor reliability verification and verification of measurement data are conducted mainly through sensor performance evaluation through type approval and registration, acceptance test, initial calibration, and periodic test. This platform has established an ICT-based environmental monitoring sensor reliability verification system that supports not only performance evaluation for each target sensor, but also a verification system for sensor data reliability. A sensor board to collect sensor data for environmental information was produced, and a sensor and data reliability evaluation and verification service system was standardized. In addition, to evaluate and verify the reliability of sensor data based on ICT, a sensor data platform monitoring prototype using LoRa communication was produced, and the test was conducted in smart cities. To analyze the data received through the system, an optimization algorithm was developed using machine learning. Through this, a sensor big data analysis system is established for reliability verification, and the foundation for an integrated evaluation and verification system is provide.

The Development of a 20MW PWM Driver for Advanced Fifteen-Phase Propulsion Induction Motors

  • Sun, Chi;Ai, Sheng;Hu, Liangdeng;Chen, Yulin
    • Journal of Power Electronics
    • /
    • v.15 no.1
    • /
    • pp.146-159
    • /
    • 2015
  • Since the power capacity needed for the propulsion of large ships is very large, a multiphase AC induction propulsion mode is generally adopted to meet the higher requirements of reliability, redundancy and maintainability. This paper gives a detailed description of the development of a 20MW fifteen-phase PWM driver for advanced fifteen-phase propulsion induction motors with a special third-harmonic injection in terms of the main circuit hardware, control system design, experiments, etc. The adoption of the modular design method for the main circuit hardware design can make the enclosed mechanical structure simple and maintainable. It can also avoid the larger switch stresses caused by the multiple turn on of the IGBTs in conventional large-capacity converter systems. The use of the distributed controller design method based on a high-speed fiber-optic ring net for the control system can overcome such disadvantages as the poor reliability and long maintenance times arising from the conventional centralized controller which is designed according to point-to-point communication. Finally, the performance of the 20MW PWM driver is verified by experimentation on a new fifteen-phase induction propulsion motor.

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

A Study on the Development of Artificial Intelligence Crop Environment Control Framework

  • Guangzhi Zhao
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.144-156
    • /
    • 2023
  • Smart agriculture is a rapidly growing field that seeks to optimize crop yields and reduce risk through the use of advanced technology. A key challenge in this field is the need to create a comprehensive smart farm system that can effectively monitor and control the growth environment of crops, particularly when cultivating new varieties. This is where fuzzy theory comes in, enabling the collection and analysis of external environmental factors to generate a rule-based system that considers the specific needs of each crop variety. By doing so, the system can easily set the optimal growth environment, reducing trial and error and the user's risk burden. This is in contrast to existing systems where parameters need to be changed for each breed and various factors considered. Additionally, the type of house used affects the environmental control factors for crops, making it necessary to adapt the system accordingly. While developing such a framework requires a significant investment of labour and time, the benefits are numerous and can lead to increased productivity and profitability in the field of smart agriculture. We developed an AI platform for optimal control of facility houses by integrating data from mushroom crops and environmental factors, and analysing the correlation between optimal control conditions and yield. Our experiments demonstrated significant performance improvement compared to the existing system.

A development of video-complex remote monitoring system for offshore plant (영상복합형 해양플랜트 원격 관제 시스템 개발)

  • Kim, Hun-Ki;Hwang, Hun-Gyu;Yoo, Gang-Ju;Lee, Jang-Se;Park, Hyu-Chan;Shin, Ok-Keun;Lee, Seong-Dae
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.1
    • /
    • pp.56-63
    • /
    • 2014
  • An offshore plant needs costly maintenance and has difficulty coping with various accidents coming from the exposure to the environmental threats such as typhoons, tidal waves and etc., in addition to the artificial ones such as fire, collision of ships and etc. In this paper, we develop the video-complex remote monitoring system for an offshore plant, using AtoN AIS and multi-stage database to monitor an offshore plant and solve those problems. The system handles real time video cameras to collect and monitor images on an offshore plant. So, users can be exactly and quickly aware of the information on various situations with the monitoring application based on ENC.