• Title/Summary/Keyword: MachineLearning

Search Result 5,657, Processing Time 0.037 seconds

A New Method to Detect Anomalous State of Network using Information of Clusters (클러스터 정보를 이용한 네트워크 이상상태 탐지방법)

  • Lee, Ho-Sub;Park, Eung-Ki;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.545-552
    • /
    • 2012
  • The rapid development of information technology is making large changes in our lives today. Also the infrastructure and services are combinding with information technology which predicts another huge change in our environment. However, the development of information technology brings various types of side effects and these side effects not only cause financial loss but also can develop into a nationwide crisis. Therefore, the detection and quick reaction towards these side effects is critical and much research is being done. Intrusion detection systems can be an example of such research. However, intrusion detection systems mostly tend to focus on judging whether particular traffic or files are malicious or not. Also it is difficult for intrusion detection systems to detect newly developed malicious codes. Therefore, this paper proposes a method which determines whether the present network model is normal or abnormal by comparing it with past network situations.

AutoML and CNN-based Soft-voting Ensemble Classification Model For Road Traffic Emerging Risk Detection (도로교통 이머징 리스크 탐지를 위한 AutoML과 CNN 기반 소프트 보팅 앙상블 분류 모델)

  • Jeon, Byeong-Uk;Kang, Ji-Soo;Chung, Kyungyong
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.14-20
    • /
    • 2021
  • Most accidents caused by road icing in winter lead to major accidents. Because it is difficult for the driver to detect the road icing in advance. In this work, we study how to accurately detect road traffic emerging risk using AutoML and CNN's ensemble model that use both structured and unstructured data. We train CNN-based road traffic emerging risk classification model using images that are unstructured data and AutoML-based road traffic emerging risk classification model using weather data that is structured data, respectively. After that the ensemble model is designed to complement the CNN-based classification model by inputting probability values derived from of each models. Through this, improves road traffic emerging risk classification performance and alerts drivers more accurately and quickly to enable safe driving.

A case study on the application of process abnormal detection process using big data in smart factory (Smart Factory Big Data를 활용한 공정 이상 탐지 프로세스 적용 사례 연구)

  • Nam, Hyunwoo
    • The Korean Journal of Applied Statistics
    • /
    • v.34 no.1
    • /
    • pp.99-114
    • /
    • 2021
  • With the Fourth Industrial Revolution based on new technology, the semiconductor manufacturing industry researches various analysis methods such as detecting process abnormalities and predicting yield based on equipment sensor data generated in the manufacturing process. The semiconductor manufacturing process consists of hundreds of processes and thousands of measurement processes associated with them, each of which has properties that cannot be defined by chemical or physical equations. In the individual measurement process, the actual measurement ratio does not exceed 0.1% to 5% of the target product, and it cannot be kept constant for each measurement point. For this reason, efforts are being made to determine whether to manage by using equipment sensor data that can indirectly determine the normal state of each step of the process. In this study, the Functional Data Analysis (FDA) was proposed to define a process abnormality detection process based on equipment sensor data and compensate for the disadvantages of the currently applied statistics-based diagnosis method. Anomaly detection accuracy was compared using machine learning on actual field case data, and its effectiveness was verified.

Prediction Service of Wild Animal Intrusions to the Farm Field based on VAR Model (VAR 모델을 이용한 야생 동물의 농장 침입 예측 서비스)

  • Kadam, Ashwini L.;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.628-636
    • /
    • 2021
  • This paper contains the implementation and performance evaluation results of a system that collects environmental data at the time when the wild animal intrusion occurred at farms and then predicts future wild animal intrusions through a machine learning-based Vector Autoregression(VAR) model. To collect the data for intrusion prediction, an IoT-based hardware prototype was developed, which was installed on a small farm located near the school and simulated over a long period to generate intrusion events. The intrusion prediction service based on the implemented VAR model provides the date and time when intrusion is likely to occur over the next 30 days. In addition, the proposed system includes the function of providing real-time notifications to the farmers mobile device when wild animals intrusion occurs in the farm, and performance evaluation was conducted to confirm that the average response time was 7.89 seconds.

Voice Assistant for Visually Impaired People (시각장애인을 위한 음성 도우미 장치)

  • Chae, Jun-Gy;Jang, Ji-Woo;Kim, Dong-Wan;Jung, Su-Jin;Lee, Ik Hyun
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.4
    • /
    • pp.131-136
    • /
    • 2019
  • People with compromised visual ability suffer from many inconveniences in daily life, such as distinguishing colors, identifying currency notes and realizing the atmospheric temperature. Therefore, to assist the visually impaired people, we propose a system by utilizing optical and infrared cameras. In the proposed system, an optical camera is used to collect features related to colors and currency notes while an infrared camera is utilized to get temperature information. The user is enabled to select the desired service by pushing the button and the appreciate voice information are provided through the speaker. The device can distinguish 16 kinds of colors, four different currency notes, and temperature information in four steps and the current accuracy is around 90%. It can be improved further through block-wise input image, machine learning, and a higher version of the infrared camera. In addition, it will be attached to the stick for easy carrying and to use it more conveniently.

Prediction of Drug Side Effects Based on Drug-Related Information (약물 관련 정보를 이용한 약물 부작용 예측)

  • Seo, Sukyung;Lee, Taekeon;Yoon, Youngmi
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.21-28
    • /
    • 2019
  • Side effects of drugs mean harmful and unintended effects resulting from drugs used to prevent, diagnose, or treat diseases. These side effects can lead to patients' death and are the main causes of drug developmental failures. Thus, various methods have been tried to identify side effects. These can be divided into biological and systems biology approaches. In this study, we use systems biology approach and focus on using various phenotypic information in addition to the chemical structure and target proteins. First, we collect datasets that are used in this study, and calculate similarities individually. Second, we generate a set of features using the similarities for each drug-side effect pair. Finally, we confirm the results by AUC(Area Under the ROC Curve), and showed the significance of this study through a comparison experiment.

Classes in Object-Oriented Modeling (UML): Further Understanding and Abstraction

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.139-150
    • /
    • 2021
  • Object orientation has become the predominant paradigm for conceptual modeling (e.g., UML), where the notions of class and object form the primitive building blocks of thought. Classes act as templates for objects that have attributes and methods (actions). The modeled systems are not even necessarily software systems: They can be human and artificial systems of many different kinds (e.g., teaching and learning systems). The UML class diagram is described as a central component of model-driven software development. It is the most common diagram in object-oriented models and used to model the static design view of a system. Objects both carry data and execute actions. According to some authorities in modeling, a certain degree of difficulty exists in understanding the semantics of these notions in UML class diagrams. Some researchers claim class diagrams have limited use for conceptual analysis and that they are best used for logical design. Performing conceptual analysis should not concern the ways facts are grouped into structures. Whether a fact will end up in the design as an attribute is not a conceptual issue. UML leads to drilling down into physical design details (e.g., private/public attributes, encapsulated operations, and navigating direction of an association). This paper is a venture to further the understanding of object-orientated concepts as exemplified in UML with the aim of developing a broad comprehension of conceptual modeling fundamentals. Thinging machine (TM) modeling is a new modeling language employed in such an undertaking. TM modeling interlaces structure (components) and actionality where actions infiltrate the attributes as much as the classes. Although space limitations affect some aspects of the class diagram, the concluding assessment of this study reveals the class description is a kind of shorthand for a richer sematic TM construct.

An Intelligent Bluetooth Intrusion Detection System for the Real Time Detection in Electric Vehicle Charging System (전기차 무선 충전 시스템에서 실시간 탐지를 위한 지능형 Bluetooth 침입 탐지 시스템 연구)

  • Yun, Young-Hoon;Kim, Dae-Woon;Choi, Jung-Ahn;Kang, Seung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.11-17
    • /
    • 2020
  • With the increase in cases of using Bluetooth devices used in the electric vehicle charging systems, security issues are also raised. Although various technical efforts have beed made to enhance security of bluetooth technology, various attack methods exist. In this paper, we propose an intelligent Bluetooth intrusion detection system based on a well-known machine learning method, Hidden Markov Model, for the purpose of detecting intelligently representative Bluetooth attack methods. The proposed approach combines packet types of H4, which is bluetooth transport layer protocol, and the transport directions of the packet firstly to represent the behavior of current traffic, and uses the temporal deployment of these combined types as the final input features for detecting attacks in real time as well as accurate detection. We construct the experimental environment for the data acquisition and analysis the performance of the proposed system against obtained data set.

Research on the Production of Risk Maps on Cut Slope Using Weather Information and Adaboost Model (기상정보와 Adaboost 모델을 이용한 깎기비탈면 위험도 지도 개발 연구)

  • Woo, Yonghoon;Kim, Seung-Hyun;Kim, Jin uk;Park, GwangHae
    • The Journal of Engineering Geology
    • /
    • v.30 no.4
    • /
    • pp.663-671
    • /
    • 2020
  • Recently, there have been many natural disasters in Korea, not only in forest areas but also in urban areas, and the national requirements for them are increasing. In particular, there is no pre-disaster information system that can systematically manage the collapse of the slope of the national highway. In this study, big data analysis was conducted on the factors causing slope collapse based on the detailed investigation report on the slope collapse of national roads in Gangwon-do and Gyeongsang-do areas managed by the Cut Slope Management System (CSMS) and the basic survey of slope failures. Based on the analysis results, a slope collapse risk prediction model was established through Adaboost, a classification-based machine learning model, reflecting the collapse slope location and weather information. It also developed a visualization map for the risk of slope collapse, which is a visualization program, to show that it can be used for preemptive disaster prevention measures by identifying the risk of slope due to changes in weather conditions.

Data Analysis of Dropouts of University Students Using Topic Modeling (토픽모델링을 활용한 대학생의 중도탈락 데이터 분석)

  • Jeong, Do-Heon;Park, Ju-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.88-95
    • /
    • 2021
  • This study aims to provide implications for establishing support policies for students by empirically analyzing data on university students dropouts. To this end, data of students enrolled in D University after 2017 were sampled and collected. The collected data was analyzed using topic modeling(LDA: Latent Dirichlet Allocation) technique, which is a probabilistic model based on text mining. As a result of the study, it was found that topics that were characteristic of dropout students were found, and the classification performance between groups through topics was also excellent. Based on these results, a specific educational support system was proposed to prevent dropout of university students. This study is meaningful in that it shows the use of text mining techniques in the education field and suggests an education policy based on data analysis.