• Title/Summary/Keyword: Information and communication learning model

Search Result 748, Processing Time 0.023 seconds

Prediction Model of Software Fault using Deep Learning Methods (딥러닝 기법을 사용하는 소프트웨어 결함 예측 모델)

  • Hong, Euyseok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.111-117
    • /
    • 2022
  • Many studies have been conducted on software fault prediction models for decades, and the models using machine learning techniques showed the best performance. Deep learning techniques have become the most popular in the field of machine learning, but few studies have used them as classifiers for fault prediction models. Some studies have used deep learning to obtain semantic information from the model input source code or syntactic data. In this paper, we produced several models by changing the model structure and hyperparameters using MLP with three or more hidden layers. As a result of the model evaluation experiment, the MLP-based deep learning models showed similar performance to the existing models in terms of Accuracy, but significantly better in AUC. It also outperformed another deep learning model, the CNN model.

Machine Learning-based hydrogen charging station energy demand prediction model (머신러닝 기반 수소 충전소 에너지 수요 예측 모델)

  • MinWoo Hwang;Yerim Ha;Sanguk Park
    • Journal of Internet Computing and Services
    • /
    • v.24 no.2
    • /
    • pp.47-56
    • /
    • 2023
  • Hydrogen energy is an eco-friendly energy that produces heat and electricity with high energy efficiency and does not emit harmful substances such as greenhouse gases and fine dust. In particular, smart hydrogen energy is an economical, sustainable, and safe future smart hydrogen energy service, which means a service that stably operates based on 'data' by digitally integrating hydrogen energy infrastructure. In this paper, in order to implement a data-based hydrogen charging station demand forecasting model, three hydrogen charging stations (Chuncheon, Sokcho, Pyeongchang) installed in Gangwon-do were selected, supply and demand data of hydrogen charging stations were secured, and 7 machine learning and deep learning algorithms were used. was selected to learn a model with a total of 27 types of input data (weather data + demand for hydrogen charging stations), and the model was evaluated with root mean square error (RMSE). Through this, this paper proposes a machine learning-based hydrogen charging station energy demand prediction model for optimal hydrogen energy supply and demand.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

Machine Learning-Enhanced Survival Analysis: Identifying Significant Predictors of Mortality in Heart Failure

  • Heejeong Jasmine Lee;Sang-Sun Yoo;Kang-Yoon Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2495-2511
    • /
    • 2024
  • State of the art machine learning methods can enhance the analysis of clinical data and improve the ability to predict patient outcomes because data collected from clinical records, such as heart failure mortality studies, are often high dimensional, heterogeneous and give challenges to traditional statistical analysis techniques. To address this challenge, this study conducted a survival analysis based on a dataset of 299 patients with heart failure, using Python libraries. Cox regression was used to model and analyse mortality, and to find which features are strongly associated with this outcome. The Kaplan-Meier survival curve approach was used to show the patterns of patient survival over time. The analysis showed that age, ejection fraction, and serum creatinine level were significantly (p≤0.001) associated with mortality. Anaemia and creatinine phosphokinase also reached statistical significance (p-values 0.026 and 0.007, respectively). The Cox model showed good concordance (0.77) with the data, suggesting that the identified variables are useful for predicting mortality in patients with heart failure.

Privacy-Preserving Deep Learning using Collaborative Learning of Neural Network Model

  • Hye-Kyeong Ko
    • International journal of advanced smart convergence
    • /
    • v.12 no.2
    • /
    • pp.56-66
    • /
    • 2023
  • The goal of deep learning is to extract complex features from multidimensional data use the features to create models that connect input and output. Deep learning is a process of learning nonlinear features and functions from complex data, and the user data that is employed to train deep learning models has become the focus of privacy concerns. Companies that collect user's sensitive personal information, such as users' images and voices, own this data for indefinite period of times. Users cannot delete their personal information, and they cannot limit the purposes for which the data is used. The study has designed a deep learning method that employs privacy protection technology that uses distributed collaborative learning so that multiple participants can use neural network models collaboratively without sharing the input datasets. To prevent direct leaks of personal information, participants are not shown the training datasets during the model training process, unlike traditional deep learning so that the personal information in the data can be protected. The study used a method that can selectively share subsets via an optimization algorithm that is based on modified distributed stochastic gradient descent, and the result showed that it was possible to learn with improved learning accuracy while protecting personal information.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

Assessing the Effectiveness of Smartphone Usage to Interact with Learning Materials in Independent Learning Outside of Classrooms among Undergraduate Students

  • Sununthar Vongjaturapat;Nopporn Chotikakamthorn;Panitnat Yimyam
    • Asia pacific journal of information systems
    • /
    • v.31 no.1
    • /
    • pp.43-75
    • /
    • 2021
  • Clearly, the smartphone is increasingly playing a greater role in everyday life, thus providing opportunities to evaluate how well the use of the smartphone meets the requirements of undergraduate students in independent learning outside of a classroom setting. This study used the task-technology fit (TTF) model to explore the effectiveness of smartphone usage to interact with learning materials in independent learning outside of classrooms, the need for smartphone support, and the fit of devices to tasks as well as performance. First, the study used interviews, observation, and survey data to identify what are the most important constructs of smartphones that stimulate students to interact with learning materials in independent learning outside of classrooms. Based on the findings from the exploratory study and Task Technology Fit theory, we postulated the Navigation design, Ergonomic design, Content support, and Capacity as the essential dimension of the smartphone construct. Then, we proposed a research model and empirically tested hypotheses with the structural model analysis. The results reveal a significant positive impact of task and technology on TTF for smartphone usage to interact with learning materials in independent learning outside of classrooms; it also confirmed the TTF and performance have a direct effect on actual use.

Development of a Deep Learning Prediction Model to Recognize Dangerous Situations in a Gas-use Environment (가스 사용 환경에서의 위험 상황 인지를 위한 딥러닝 예측모델 개발)

  • Kang, Byung Jun;Cho, Hyun-Chan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.1
    • /
    • pp.132-135
    • /
    • 2022
  • Recently, with the development of IoT communication technology, products and services that detect and inform the surrounding environment under the name of smart plugs are being developed. In particular, in order to prepare for fire or gas leakage accidents, products that automatically close and warn when abnormal symptoms occur are used. Most of them use methods of collecting, analyzing, and processing information through networks. However, there is a disadvantage that it cannot be used when the network is temporarily in a failed state. In this paper, sensor information was analyzed using deep learning, and a model that can predict abnormal symptoms was learned in advance and applied to MCU. The performance of each model was evaluated by developing firmware that can judge and process on its own regardless of network and applying a predictive model to the MCU after 3 to 120 seconds.

One-dimensional CNN Model of Network Traffic Classification based on Transfer Learning

  • Lingyun Yang;Yuning Dong;Zaijian Wang;Feifei Gao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.420-437
    • /
    • 2024
  • There are some problems in network traffic classification (NTC), such as complicated statistical features and insufficient training samples, which may cause poor classification effect. A NTC architecture based on one-dimensional Convolutional Neural Network (CNN) and transfer learning is proposed to tackle these problems and improve the fine-grained classification performance. The key points of the proposed architecture include: (1) Model classification--by extracting normalized rate feature set from original data, plus existing statistical features to optimize the CNN NTC model. (2) To apply transfer learning in the classification to improve NTC performance. We collect two typical network flows data from Youku and YouTube, and verify the proposed method through extensive experiments. The results show that compared with existing methods, our method could improve the classification accuracy by around 3-5%for Youku, and by about 7 to 27% for YouTube.

A Social Learning as Study Platform using Social Media (소셜 미디어를 학습플랫폼으로 활용한 소셜 러닝)

  • Cho, Byung-Ho
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.5 no.4
    • /
    • pp.180-185
    • /
    • 2012
  • Social Learning is a new study model of future knowledge information society. In different existing study, it concentrate on relationship with others and design to connect studying with social effect as a study platform using social media such as Blog, SNS, UCC, Microblog. In my paper, social learning characteristics are described to understand social learning, that is 3 keyword such as context, connectivity, collaboration. Also we investigate social media characteristics and social media how to be used social learning. Also social learning system building method using facebook is presented.