• Title/Summary/Keyword: Distance-Based Learning

검색결과 598건 처리시간 0.025초

A Study on the M2M Energy Trading System Using Proof of Location Blockchain Network (위치증명기반 블록체인 네트워크를 활용한 사물 간 에너지 직거래 시스템에 관한 연구)

  • Kim, Young-Gon;Heo, Keol;Choi, Jung-In
    • Journal of Energy Engineering
    • /
    • 제29권3호
    • /
    • pp.86-90
    • /
    • 2020
  • This paper examines a blockchain network-based transaction system using location proofing in power direct transactions between networked energy clouds, energy communities, and prosumer machines participating in smart cities. It utilizes location-based blockchain network technology, which enables long-distance travel with recharging by power purchases during autonomous movements, autonomous electric vehicles that can purchase and sell electricity, and solar street lights that can be produced and sold in fixed form. In addition, it is possible to provide optimum power transaction matching and settlement reliability between machines without human intervention in power transactions between electric chargers. It also introduces a business-to-object business model between autonomous machines that exist in multiple and different spaces and through energy clouds that are expected to be scattered with various transaction prices, policies, and incentives.

A Study on the Process of Constructing the Instantaneous Rate of Change of Exponential Function y=2x at x=0 Based on Understanding of the Natural Constant e (자연상수 e에 대한 이해를 기반으로 지수함수 y=2x의 x=0에서의 순간변화율 구성에 관한 연구)

  • Lee, Dong Gun;Yang, Seong Hyun;Shin, Jaehong
    • School Mathematics
    • /
    • 제19권1호
    • /
    • pp.95-116
    • /
    • 2017
  • Through the teaching experiments, we investigated a series of processes for obtaining the differential coefficient at x=0 of the exponential function $y=2^x$ based on the process of constructing the natural constant e and the understanding of it. and all of the students who participated in this study were students who had no experience of calculating the derivative of the exponential function. The purpose of this study was not to generalize the responses of students but to suggest implications for mathematical concept mapping related to calculus by analyzing various responses of students participating in experiments. It is expected that the accumulation of research data derived in this kind of research on the way of understanding and composition of learners will be an important basic data for presenting the learning model related to calculus.

The System Integration Model based on CORBA (CORBA 기반 시스템 통합 모델)

  • Kim, Nam-Yong;Wang, Chang-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • 제5권1호
    • /
    • pp.63-72
    • /
    • 1998
  • Diversity in hardware and software is increasing ever and our networked computing environment is becoming more diverse. The development of software becomes expensive works because of a collection of diverse computers, storing various data type in different places, working together by incompatabilities of operating system and various databases and protocols. CORBA is a standard for distributed computing environment and for system integration of heterogeneous distributed environment. CORBA provides many technical benefits for effective system integration and seamless infrastructure for distributed communication environment of heterogeneous systems. In this paper, we proposed a system integraton model based on CORBA for distributed object environment, softwarc reuse and the intcrconnecion of WWW. The model is composed of factory server, trading server, convcrsion scrvcr and applicaton scrvcr. Thc proposed model can easy application development and system integration. And we implcmcntcd thc gateway for cooperation with WWW. As a proof of the proposed model, we show how the distance learning system designed using the services provided by the proposed model.

  • PDF

User control based OTT content search algorithms (사용자 제어기반 OTT 콘텐츠 검색 알고리즘)

  • Kim, Ki-Young;Suh, Yu-Hwa;Park, Byung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • 제20권5호
    • /
    • pp.99-106
    • /
    • 2015
  • This research is focused on the development of the proprietary database embedded in the OTT device, which is used for searching and indexing video contents, and also the development of the search algorithm in the form of the critical components of the interface application with the OTT's database to provide video query searching, such as remote control smartphone application. As the number of available channels has increased to anywhere from dozens to hundreds of channels, it has become increasingly difficult for the viewer to find programs they want to watch. To address this issue, content providers are now in need of methods to recommend programs catering to each viewer's preference. the present study aims provide of the algorithm which recommends contents of OTT program by analyzing personal watching pattern based on one's history.

No-reference Image Blur Assessment Based on Multi-scale Spatial Local Features

  • Sun, Chenchen;Cui, Ziguan;Gan, Zongliang;Liu, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권10호
    • /
    • pp.4060-4079
    • /
    • 2020
  • Blur is an important type of image distortion. How to evaluate the quality of blurred image accurately and efficiently is a research hotspot in the field of image processing in recent years. Inspired by the multi-scale perceptual characteristics of the human visual system (HVS), this paper presents a no-reference image blur/sharpness assessment method based on multi-scale local features in the spatial domain. First, considering various content has different sensitivity to blur distortion, the image is divided into smooth, edge, and texture regions in blocks. Then, the Gaussian scale space of the image is constructed, and the categorized contrast features between the original image and the Gaussian scale space images are calculated to express the blur degree of different image contents. To simulate the impact of viewing distance on blur distortion, the distribution characteristics of local maximum gradient of multi-resolution images were also calculated in the spatial domain. Finally, the image blur assessment model is obtained by fusing all features and learning the mapping from features to quality scores by support vector regression (SVR). Performance of the proposed method is evaluated on four synthetically blurred databases and one real blurred database. The experimental results demonstrate that our method can produce quality scores more consistent with subjective evaluations than other methods, especially for real burred images.

An Outlier Cluster Detection Technique for Real-time Network Intrusion Detection Systems (실시간 네트워크 침입탐지 시스템을 위한 아웃라이어 클러스터 검출 기법)

  • Chang, Jae-Young;Park, Jong-Myoung;Kim, Han-Joon
    • Journal of Internet Computing and Services
    • /
    • 제8권6호
    • /
    • pp.43-53
    • /
    • 2007
  • Intrusion detection system(IDS) has recently evolved while combining signature-based detection approach with anomaly detection approach. Although signature-based IDS tools have been commonly used by utilizing machine learning algorithms, they only detect network intrusions with already known patterns, Ideal IDS tools should always keep the signature database of your detection system up-to-date. The system needs to generate the signatures to detect new possible attacks while monitoring and analyzing incoming network data. In this paper, we propose a new outlier cluster detection algorithm with density (or influence) function, Our method assumes that an outlier is a kind of cluster with similar instances instead of a single object in the context of network intrusion, Through extensive experiments using KDD 1999 Cup Intrusion Detection dataset. we show that the proposed method outperform the conventional outlier detection method using Euclidean distance function, specially when attacks occurs frequently.

  • PDF

An Exploratory Study of Collective E-Petitions Estimation Methodology Using Anomaly Detection: Focusing on the Voice of Citizens of Changwon City (이상탐지 활용 전자집단민원 추정 방법론에 관한 탐색적 연구: 창원시 시민의 소리 사례를 중심으로)

  • Jeong, Ha-Yeong
    • Informatization Policy
    • /
    • 제26권4호
    • /
    • pp.85-106
    • /
    • 2019
  • Recently, there have been increasing cases of collective petitions filed in the electronic petitions system. However, there is no efficient management system, raising concerns on side effects such as increased administrative workload and mass production of social conflicts. Aimed at suggesting a methodology for estimating electronic collective petitions using anomaly detection and corpus linguistics-based content analysis, this study conducted the followings: i) a theoretical review of the concept of collective petitions, ii) estimation of electronic collective petitions using anomaly detection based on nonparametric unsupervised learning, iii) a content similarity analysis on petitions using n-gram cosine angle distance, and iv) a case study on the Voice of Citizens of Changwon City, through which the utility of the proposed methodology, policy implications and future tasks were reviewed.

PE Header Characteristics Analysis Technique for Malware Detection (악성프로그램 탐지를 위한 PE헤더 특성 분석 기술)

  • Choi, Yang-Seo;Kim, Ik-Kyun;Oh, Jin-Tae;Ryu, Jae-Cheol
    • Convergence Security Journal
    • /
    • 제8권2호
    • /
    • pp.63-70
    • /
    • 2008
  • In order not to make the malwares be easily analyzed, the hackers apply various anti-reversing and obfuscation techniques to the malwares. However, as the more anti-revering techniques are applied to the malwares the more abnormal characteristics in the PE file's header which are not shown in the normal PE file, could be observed. In this letter, a new malware detection technique is proposed based on this observation. For the malware detection, we define the Characteristics Vector(CV) which can represent the characteristics of a PE file's header. In the learning phase, we calculate the average CV(ACV) of malwares(ACVM) and normal files(ACVN). To detect the malwares we calculate the 2 Weighted Euclidean Distances(WEDs) from a file's CV to ACVs and they are used to decide whether the file is a malware or not. The proposed technique is very fast and detection rate is fairly high, so it could be applied to the network based attack detection and prevention devices. Moreover, this technique is could be used to detect the unknown malwares because it does not utilize a signature but the malware's characteristics.

  • PDF

A Simple Stereo Matching Algorithm using PBIL and its Alternative (PBIL을 이용한 소형 스테레오 정합 및 대안 알고리즘)

  • Han Kyu-Phil
    • The KIPS Transactions:PartB
    • /
    • 제12B권4호
    • /
    • pp.429-436
    • /
    • 2005
  • A simple stereo matching algorithm using population-based incremental learning(PBIL) is proposed in this paper to decrease the general problem of genetic algorithms, such as memory consumption and inefficiency of search. PBIL is a variation of genetic algorithms using stochastic search and competitive teaming based on a probability vector. The structure of PBIL is simpler than that of other genetic algorithm families, such as serial and parallel ones, due to the use of a probability vector. The PBIL strategy is simplified and adapted for stereo matching circumstances. Thus, gene pool, chromosome crossover, and gene mutation we removed, while the evolution rule, that fitter chromosomes should have higher survival probabilities, is preserved. As a result, memory space is decreased, matching rules are simplified and computation cost is reduced. In addition, a scheme controlling the distance of neighbors for disparity smoothness is inserted to obtain a wide-area consistency of disparities, like a result of coarse-to-fine matchers. Because of this scheme, the proposed algorithm can produce a stable disparity map with a small fixed-size window. Finally, an alterative version of the proposed algorithm without using probability vector is also presented for simpler set-ups.

Recommendation Method of SNS Following to Category Classification of Image and Text Information (이미지와 텍스트 정보의 카테고리 분류에 의한 SNS 팔로잉 추천 방법)

  • Hong, Taek Eun;Shin, Ju Hyun
    • Smart Media Journal
    • /
    • 제5권3호
    • /
    • pp.54-61
    • /
    • 2016
  • According to many smart devices are development, SNS(Social Network Service) users are getting higher that is possible for real-time communicating, information sharing without limitations in distance and space. Nowadays, SNS users that based on communication and relationships, are getting uses SNS for information sharing. In this paper, we used the SNS posts for users to extract the category and information provider, how to following of recommend method. Particularly, this paper focuses on classifying the words in the text of the posts and measures the frequency using Inception-v3 model, which is one of the machine learning technique -CNN(Convolutional Neural Network) we classified image word. By classifying the category of a word in a text and image, that based on DMOZ to build the information provider DB. Comparing user categories classified in categories and posts from information provider DB. If the category is matched by measuring the degree of similarity to the information providers is classified in the category, we suggest that how to recommend method of the most similar information providers account.