• Title/Summary/Keyword: Deep Learning System

Search Result 1,738, Processing Time 0.031 seconds

Collaborative Filtering based Recommender System using Restricted Boltzmann Machines

  • Lee, Soojung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.101-108
    • /
    • 2020
  • Recommender system is a must-have feature of e-commerce, since it provides customers with convenience in selecting products. Collaborative filtering is a widely-used and representative technique, where it gives recommendation lists of products preferred by other users or preferred by the current user in the past. Recently, researches on the recommendation system using deep learning artificial intelligence technologies are actively being conducted to achieve performance improvement. This study develops a collaborative filtering based recommender system using restricted Boltzmann machines of the deep learning technology by utilizing user ratings. Moreover, a learning parameter update algorithm is proposed for learning efficiency and performance. Performance evaluation of the proposed system is made through experimental analysis and comparison with conventional collaborative filtering methods. It is found that the proposed algorithm yields superior performance than the basic restricted Boltzmann machines.

Deep Learning-based Tourism Recommendation System using Social Network Analysis

  • Jeong, Chi-Seo;Ryu, Ki-Hwan;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.113-119
    • /
    • 2020
  • Numerous tourist-related data produced on the Internet contain not only simple tourist information but also diverse ideas and opinions from users. In order to derive meaningful information about tourist sites from such big data, the social network analysis of tourist keywords can identify the frequency of keywords and the relationship between keywords. Thus, it is possible to make recommendations more suitable for users by utilizing the clear recommendation criteria of tourist attractions and the relationship between tourist attractions. In this paper, a recommendation system was designed based on tourist site information through big data social network analysis. Based on user personality information, the types of tourism suitable for users are classified through deep learning and the network analysis among tourist keywords is conducted to identify the relationship between tourist attractions belonging to the type of tourism. Tour information for related tourist attractions shown on SNS and blogs will be recommended through tagging.

Development of Stair Climbing Robot for Delivery Based on Deep Learning (딥러닝 기반 자율주행 계단 등반 물품운송 로봇 개발)

  • Mun, Gi-Il;Lee, Seung-Hyeon;Choo, Jeong-Pil;Oh, Yeon-U;Lee, Sang-Soon
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.4
    • /
    • pp.121-125
    • /
    • 2022
  • This paper deals with the development of a deep-learning-based robot that recognizes various types of stairs and performs a mission to go up to the target floor. The overall motion sequence of the robot is performed based on the ROS robot operating system, and it is possible to detect the shape of the stairs required to implement the motion sequence through rapid object recognition through YOLOv4 and Cuda acceleration calculations. Using the ROS operating system installed in Jetson Nano, a system was built to support communication between Arduino DUE and OpenCM 9.04 with heterogeneous hardware and to control the movement of the robot by aligning the received sensors and data. In addition, the web server for robot control was manufactured as ROS web server, and flow chart and basic ROS communication were designed to enable control through computer and smartphone through message passing.

Long-Term Container Allocation via Optimized Task Scheduling Through Deep Learning (OTS-DL) And High-Level Security

  • Muthakshi S;Mahesh K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1258-1275
    • /
    • 2023
  • Cloud computing is a new technology that has adapted to the traditional way of service providing. Service providers are responsible for managing the allocation of resources. Selecting suitable containers and bandwidth for job scheduling has been a challenging task for the service providers. There are several existing systems that have introduced many algorithms for resource allocation. To overcome these challenges, the proposed system introduces an Optimized Task Scheduling Algorithm with Deep Learning (OTS-DL). When a job is assigned to a Cloud Service Provider (CSP), the containers are allocated automatically. The article segregates the containers as' Long-Term Container (LTC)' and 'Short-Term Container (STC)' for resource allocation. The system leverages an 'Optimized Task Scheduling Algorithm' to maximize the resource utilisation that initially inquires for micro-task and macro-task dependencies. The bottleneck task is chosen and acted upon accordingly. Further, the system initializes a 'Deep Learning' (DL) for implementing all the progressive steps of job scheduling in the cloud. Further, to overcome container attacks and errors, the system formulates a Container Convergence (Fault Tolerance) theory with high-level security. The results demonstrate that the used optimization algorithm is more effective for implementing a complete resource allocation and solving the large-scale optimization problem of resource allocation and security issues.

Comparison of Deep Learning Networks in Voice-Guided System for The Blind (시각장애인을 위한 음성안내 네비게이션 시스템의 심층신경망 성능 비교)

  • An, Ryun-Hui;Um, Sung-Ho;Yu, Yun Seop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.175-177
    • /
    • 2022
  • This paper introduces a system that assists the blind to move to their destination, and compares the performance of 3-types of deep learning network (DNN) used in the system. The system is made up with a smartphone application that finds route from current location to destination using GPS and navigation API and a bus station installation module that recognizes and informs the bus (type and number) being about the board at bus stop using 3-types of DNN and bus information API. To make the module recognize bus number to get on, We adopted faster-RCNN, YOLOv4, YOLOv5s and YOLOv5s showed best performance in accuracy and speed.

  • PDF

Multi Label Deep Learning classification approach for False Data Injection Attacks in Smart Grid

  • Prasanna Srinivasan, V;Balasubadra, K;Saravanan, K;Arjun, V.S;Malarkodi, S
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2168-2187
    • /
    • 2021
  • The smart grid replaces the traditional power structure with information inventiveness that contributes to a new physical structure. In such a field, malicious information injection can potentially lead to extreme results. Incorrect, FDI attacks will never be identified by typical residual techniques for false data identification. Most of the work on the detection of FDI attacks is based on the linearized power system model DC and does not detect attacks from the AC model. Also, the overwhelming majority of current FDIA recognition approaches focus on FDIA, whilst significant injection location data cannot be achieved. Building on the continuous developments in deep learning, we propose a Deep Learning based Locational Detection technique to continuously recognize the specific areas of FDIA. In the development area solver gap happiness is a False Data Detector (FDD) that incorporates a Convolutional Neural Network (CNN). The FDD is established enough to catch the fake information. As a multi-label classifier, the following CNN is utilized to evaluate the irregularity and cooccurrence dependency of power flow calculations due to the possible attacks. There are no earlier statistical assumptions in the architecture proposed, as they are "model-free." It is also "cost-accommodating" since it does not alter the current FDD framework and it is only several microseconds on a household computer during the identification procedure. We have shown that ANN-MLP, SVM-RBF, and CNN can conduct locational detection under different noise and attack circumstances through broad experience in IEEE 14, 30, 57, and 118 bus systems. Moreover, the multi-name classification method used successfully improves the precision of the present identification.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

A Study on the Efficiency of Deep Learning on Embedded Boards (임베디드 보드에서의 딥러닝 사용 효율성 분석 연구)

  • Choi, Donggyu;Lee, Dongjin;Lee, Jiwon;Son, Seongho;Kim, Minyoung;Jang, Jong-wook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.668-673
    • /
    • 2021
  • As the fourth industrial revolution begins in earnest, related technologies are becoming a hot topic. Hardware development is accelerating to make the most of technologies such as high-speed wireless communication, and related companies are growing rapidly. Artificial intelligence often uses desktops in general for related research, but it is mainly used for the learning process of deep learning and often transplants the generated models into devices to be used by including them in programs, etc. However, it is difficult to produce results for devices that do not have sufficient power or performance due to excessive learning or lack of power due to the use of models built to the desktop's performance. In this paper, we analyze efficiency using boards with several Neural Process Units on sale before developing the performance of deep learning to match embedded boards, and deep learning accelerators that can increase deep learning performance with USB, and present a simple development direction possible using embedded boards.

Deep learning-based product image classification system and its usability evaluation for the O2O shopping mall platform (딥 러닝 기반 쇼핑몰 플랫폼용 상품 이미지 자동 분류 시스템 및 사용성 평가)

  • Sung, Jae-Kyung;Park, Sang-Min;Sin, Sang-Yun;Kim, Yung-Bok;Kim, Yong-Guk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.227-234
    • /
    • 2017
  • In this paper, we propose a system whereby one can automatically classifies categories based on image data of the products for a shopping mall platform. Many products sold within internet shopping malls are classified their category defined by the same use of product names and products. However, it is difficult to search by category classification when the classification of the product is uncertain and the product classified by the shopping mall seller judgment is different from the purchasing user judgment. We proposes classification and retrieval method by Deep Learning technique solely using product image. The system can categorize products by using their images and its speed and accuracy are quantified using test data. The performance is evaluated with the test data. In addition, its usability is tested with the participants.

CNN Based Real-Time DNS DDoS Attack Detection System (CNN 기반의 실시간 DNS DDoS 공격 탐지 시스템)

  • Seo, In Hyuk;Lee, Ki-Taek;Yu, Jinhyun;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.135-142
    • /
    • 2017
  • DDoS (Distributed Denial of Service) exhausts the target server's resources using the large number of zombie pc, As a result normal users don't access to server. DDoS Attacks steadly increase by many attacker, and almost target of the attack is critical system such as IT Service Provider, Government Agency, Financial Institution. In this paper, We will introduce the CNN (Convolutional Neural Network) of deep learning based real-time detection system for DNS amplification Attack (DNS DDoS Attack). We use the dataset which is mixed with collected data in the real environment in order to overcome existing research limits that use only the data collected in the experiment environment. Also, we build a deep learning model based on Convolutional Neural Network (CNN) that is used in pattern recognition.