• Title/Summary/Keyword: Persistent learning

Search Result 55, Processing Time 0.024 seconds

Movement Play Program of for the Child with Mental Retardation (정신지체아의 운동놀이 프로그램)

  • Rha Ki-Yong
    • The Journal of Korean Physical Therapy
    • /
    • v.14 no.2
    • /
    • pp.116-132
    • /
    • 2002
  • In the management of the child with mental retardation, the physical therapist is challenged to use various skills. The many complex and persistent difficulties encountered by retarded children often require innovative methods physical therapy. These methods must incorporate not only he basic principles of physical therapy, but also an understanding of the teaching and learning as they relate to the mentally retarded person. Movement Play needs to parents and other professionals requires not only technical expertise on the part of the therapist, but also psychosocial skills and the ability to be a sensitive listener and teacher. We can help the mentally retarded child strive to attain goals in life.

  • PDF

Future Trends of AI-Based Smart Systems and Services: Challenges, Opportunities, and Solutions

  • Lee, Daewon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.717-723
    • /
    • 2019
  • Smart systems and services aim to facilitate growing urban populations and their prospects of virtual-real social behaviors, gig economies, factory automation, knowledge-based workforce, integrated societies, modern living, among many more. To satisfy these objectives, smart systems and services must comprises of a complex set of features such as security, ease of use and user friendliness, manageability, scalability, adaptivity, intelligent behavior, and personalization. Recently, artificial intelligence (AI) is realized as a data-driven technology to provide an efficient knowledge representation, semantic modeling, and can support a cognitive behavior aspect of the system. In this paper, an integration of AI with the smart systems and services is presented to mitigate the existing challenges. Several novel researches work in terms of frameworks, architectures, paradigms, and algorithms are discussed to provide possible solutions against the existing challenges in the AI-based smart systems and services. Such novel research works involve efficient shape image retrieval, speech signal processing, dynamic thermal rating, advanced persistent threat tactics, user authentication, and so on.

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1129-1135
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on december in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attacks(Advanced Persistent Threat Attacks) thus far. We will use big data analytics to analyze whether or not APT attacks has occurred. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean Defense System. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attacks. Lastly, we will present an effective response method to address a detected APT attacks.

Analysis of Topological Invariants of Manifold Embedding for Waveform Signals (파형 신호에 대한 다양체 임베딩의 위상학적 불변항의 분석)

  • Hahn, Hee-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.291-299
    • /
    • 2016
  • This paper raises a question of whether a simple periodic phenomenon is associated with the topology and provides the convincing answers to it. A variety of music instrumental sound signals are used to prove our assertion, which are embedded in Euclidean space to analyze their topologies by computing the homology groups. A commute time embedding is employed to transform segments of waveforms into the corresponding geometries, which is implemented by organizing patches according to the graph-based metric. It is shown that commute time embedding generates the intrinsic topological complexities although their geometries are varied according to the spectrums of the signals. This paper employs a persistent homology to determine the topological invariants of the simplicial complexes constructed by randomly sampling the commute time embedding of the waveforms, and discusses their applications.

The impact of language-learning environments on Korean learners' English vowel production

  • Lee, Shinsook;Nam, Hosung;Kang, Jaekoo;Shin, Dong-Jin;Kim, Young Shin
    • Phonetics and Speech Sciences
    • /
    • v.9 no.2
    • /
    • pp.69-76
    • /
    • 2017
  • The current study investigated whether Korean learners' English-learning environments, especially target English accent (General American English (GAE) vs. Southern British English (SBE)) and English-language experience affected their production of English vowels. Thirty six EFL learners, 27 ESL-US learners, and 33 ESL-UK learners produced 8 English vowels with a bVt frame (beat, bit, bet, bat, bought, bot, boat, boot). The learners' productions were acoustically analyzed in terms of F1 and F2 frequencies. The overall results revealed that the learners' target accent had an effect on their production of some English vowels. The EFL and ESL-US learners' (especially, female learners') production of bought, bot, boat, and boot, which show characteristic differences between the GAE and SBE accents, was closer to that of the native American English (AE) speakers than the native British English (BE) speakers. In contrast, the ESL-UK learners' production of bought and bot demonstrated the opposite pattern. Thus, the impact of target accent was not demonstrated across the board. The effect of the learners' different English-language experience was also rather limited. This was because the EFL learners' production was not much different from the ESL-US learners' production, in spite of the ESL-US learners' residence in the US for more than 9 years. Furthermore, the Korean learners, irrespective of their different English-language experience, tended to produce bit and bat with lower F1 than the native AE and BE speakers, thus resulting in bit and bat to be produced similarly to beat and bet, respectively. This demonstrates the learners' persistent L1 effects on their English vowel production despite the learners' residence in the English speaking countries or their high English proficiency.

Network Intrusion Detection with One Class Anomaly Detection Model based on Auto Encoder. (오토 인코더 기반의 단일 클래스 이상 탐지 모델을 통한 네트워크 침입 탐지)

  • Min, Byeoungjun;Yoo, Jihoon;Kim, Sangsoo;Shin, Dongil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.13-22
    • /
    • 2021
  • Recently network based attack technologies are rapidly advanced and intelligent, the limitations of existing signature-based intrusion detection systems are becoming clear. The reason is that signature-based detection methods lack generalization capabilities for new attacks such as APT attacks. To solve these problems, research on machine learning-based intrusion detection systems is being actively conducted. However, in the actual network environment, attack samples are collected very little compared to normal samples, resulting in class imbalance problems. When a supervised learning-based anomaly detection model is trained with such data, the result is biased to the normal sample. In this paper, we propose to overcome this imbalance problem through One-Class Anomaly Detection using an auto encoder. The experiment was conducted through the NSL-KDD data set and compares the performance with the supervised learning models for the performance evaluation of the proposed method.

Application of Integrated Security Control of Artificial Intelligence Technology and Improvement of Cyber-Threat Response Process (인공지능 기술의 통합보안관제 적용 및 사이버침해대응 절차 개선 )

  • Ko, Kwang-Soo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.59-66
    • /
    • 2021
  • In this paper, an improved integrated security control procedure is newly proposed by applying artificial intelligence technology to integrated security control and unifying the existing security control and AI security control response procedures. Current cyber security control is highly dependent on the level of human ability. In other words, it is practically unreasonable to analyze various logs generated by people from different types of equipment and analyze and process all of the security events that are rapidly increasing. And, the signature-based security equipment that detects by matching a string and a pattern has insufficient functions to accurately detect advanced and advanced cyberattacks such as APT (Advanced Persistent Threat). As one way to solve these pending problems, the artificial intelligence technology of supervised and unsupervised learning is applied to the detection and analysis of cyber attacks, and through this, the analysis of logs and events that occur innumerable times is automated and intelligent through this. The level of response has been raised in the overall aspect by making it possible to predict and block the continuous occurrence of cyberattacks. And after applying AI security control technology, an improved integrated security control service model was newly proposed by integrating and solving the problem of overlapping detection of AI and SIEM into a unified breach response process(procedure).

Chlorination of ortho-position on Polychlorinated Biphenyls Increases Protein Kinase C Activity in Neuronal Cells

  • Lee, Youn-Ju;Yang, Jae-Ho
    • Toxicological Research
    • /
    • v.28 no.2
    • /
    • pp.107-112
    • /
    • 2012
  • Polychlorinated biphenyls (PCBs) are persistent and bioaccumulative environmental pollutants. Recently, it is suggested that neurotoxic effects such as motor dysfunction and impairment in memory and learning have been associated with PCB exposure. However, structure relationship of PCB congeners with neurotoxic effects remains unknown. Since PKC signaling pathway is implicated in the modulation of motor behavior as well as learning and memory and the role of PKC are subspecies-specific, we attempted to study the effects of structurally distinct PCBs on the total PKC activity as well as subspecies of PKC in cerebellar granule cell culture model. Cells were exposed to 0, 25 and 50 ${\mu}M$ of PCB-126, PCB-169, PCB-114, PCB-157, PCB-52 and PCB-4 for 15 min. Cells were subsequently analyzed by [$^3H$] phorbol ester binding assay or immunoblotted against PKC-${\alpha}$ and -${\varepsilon}$ monoclonal antibodies. While non-dioxin-like-PCB (PCB-52 and PCB-4) induced a translocation of PKC-${\alpha}$ and -${\varepsilon}$ from cytosol to membrane fraction, dioxin-like PCBs (PCB-126, -169, -114, -157) had no effects. [$^3H$] Phorbol ester binding assay also revealed structure-dependent increase similar to translocation of PKC isozymes. While PCB-4 induced translocation of PKC-${\alpha}$ and -${\varepsilon}$ was inhibited by ROS inhibitor, the pattern of translocation was not affected in presence of AhR inhibitor. It is suggested that PCB-4-induced PKC activity may not be mediated via AhR-dependent pathway. Taken together, our findings suggest that chlorination of ortho-position in PCB may be a critical structural moiety associated with neurotoxic effects, which may be preferentially mediated via non-AhR-dependent pathway. Therefore, the present study may contribute to understanding the neurotoxic mechanism of PCBs as well as providing a basis for establishing a better neurotoxic assessment.

Basic Phonetic Problems Encountered by Poles Studying Korean. (폴란드인이 한국어 학습에 나타난 발음상의 음성학적 문제)

  • Paradowska Anna Isabella
    • Proceedings of the KSPS conference
    • /
    • 1996.10a
    • /
    • pp.247-251
    • /
    • 1996
  • This paper is intended as a preliminary study on phonetic and phonological differences between Polish and Korean languages. In this paper an attempt is made to examine the most conspicious difficulties encountered by Polish learners who begin to speak Korean (and in doing so, 1 would hope that it might be of help to future learners of both languages). Since the phoneme inventory and general phonetic rules for both languages are very different, teaching and learning accurate pronunciation is extremely difficult for both the Poles and Koreans without any previous phonetic training. In the case of Polish and Korean we can see how strong and persistent the influences of the mother-tongue are on the target language. As an example I would like to discuss the basic differences between Polish and Korean consonants. The most important consonantal opposition in Polish is voice-/voicelessness (f. ex.; 〔b〕 / 〔p〕, 〔g〕 / 〔k〕) while in Korean, opposition such as voice-/voicelessness is of secondary importance. Therefore Korean speakers do not perceive the difference between Polish voiced and voiceless consonants. On the other hand, Polish speakers can not distinguish Korean lenis / fortis / aspirated consonants (f. ex.; ㅂ 〔b〕 / ㅃ 〔p〕 / ㅍ〔ph〕, ㄱ 〔g〕 / ㄲ 〔k〕 / ㅋ 〔kh〕)) opposition. The other very important factor is palatalization which is of vital importance in Polish and, because of this, Polish speakers are extremely sensitive to it. In Korean palatalization is not important phonetically and Korean speakers do not distinguish between palatalized and non-palatalized consonants. The transcription used here is based on ' The principles of the International Phonetic Association and the Korean Phonetic Alphabet ' (1981) by Hyun Bok Lee.

  • PDF

Semi-supervised based Unknown Attack Detection in EDR Environment

  • Hwang, Chanwoong;Kim, Doyeon;Lee, Taejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4909-4926
    • /
    • 2020
  • Cyberattacks penetrate the server and perform various malicious acts such as stealing confidential information, destroying systems, and exposing personal information. To achieve this, attackers perform various malicious actions by infecting endpoints and accessing the internal network. However, the current countermeasures are only anti-viruses that operate in a signature or pattern manner, allowing initial unknown attacks. Endpoint Detection and Response (EDR) technology is focused on providing visibility, and strong countermeasures are lacking. If you fail to respond to the initial attack, it is difficult to respond additionally because malicious behavior like Advanced Persistent Threat (APT) attack does not occur immediately, but occurs over a long period of time. In this paper, we propose a technique that detects an unknown attack using an event log without prior knowledge, although the initial response failed with anti-virus. The proposed technology uses a combination of AutoEncoder and 1D CNN (1-Dimention Convolutional Neural Network) based on semi-supervised learning. The experiment trained a dataset collected over a month in a real-world commercial endpoint environment, and tested the data collected over the next month. As a result of the experiment, 37 unknown attacks were detected in the event log collected for one month in the actual commercial endpoint environment, and 26 of them were verified as malicious through VirusTotal (VT). In the future, it is expected that the proposed model will be applied to EDR technology to form a secure endpoint environment and reduce time and labor costs to effectively detect unknown attacks.