• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.029 seconds

Finding Unexpected Test Accuracy by Cross Validation in Machine Learning

  • Yoon, Hoijin
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.549-555
    • /
    • 2021
  • Machine Learning(ML) splits data into 3 parts, which are usually 60% for training, 20% for validation, and 20% for testing. It just splits quantitatively instead of selecting each set of data by a criterion, which is very important concept for the adequacy of test data. ML measures a model's accuracy by applying a set of validation data, and revises the model until the validation accuracy reaches on a certain level. After the validation process, the complete model is tested with the set of test data, which are not seen by the model yet. If the set of test data covers the model's attributes well, the test accuracy will be close to the validation accuracy of the model. To make sure that ML's set of test data works adequately, we design an experiment and see if the test accuracy of model is always close to its validation adequacy as expected. The experiment builds 100 different SVM models for each of six data sets published in UCI ML repository. From the test accuracy and its validation accuracy of 600 cases, we find some unexpected cases, where the test accuracy is very different from its validation accuracy. Consequently, it is not always true that ML's set of test data is adequate to assure a model's quality.

Design and Implementation of Hierarchical Image Classification System for Efficient Image Classification of Objects (효율적인 사물 이미지 분류를 위한 계층적 이미지 분류 체계의 설계 및 구현)

  • You, Taewoo;Kim, Yunuk;Jeong, Hamin;Yoo, Hyunsoo;Ahn, Yonghak
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.53-59
    • /
    • 2018
  • In this paper, we propose a hierarchical image classification scheme for efficient object image classification. In the non-hierarchical image classification, which classifies the existing whole images at one time, it showed that objects with relatively similar shapes are not recognized efficiently. Therefore, in this paper, we introduce the image classification method in the hierarchical structure which attempts to classify object images hierarchically. Also, we introduce to the efficient class structure and algorithms considering the scalability that can occur when a deep learning image classification is applied to an actual system. Such a scheme makes it possible to classify images with a higher degree of confidence in object images having relatively similar shapes.

  • PDF

Technological Aspects of the Use of Modern Intelligent Information Systems in Educational Activities by Teachers

  • Tkachuk, Stanislav;Poluboiaryna, Iryna;Lapets, Olha;Lebid, Oksana;Fadyeyeva, Kateryna;Udalova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.99-102
    • /
    • 2021
  • The article considers one of the areas of development of artificial intelligence where there is the development of computer intelligent systems capable of performing functions traditionally considered intelligent - language comprehension, inference, use of accumulated knowledge, learning, pattern recognition, as well as learn and explain their decisions. It is found that informational intellectual systems are promising in their development. The article is devoted to intelligent information systems and technologies in educational activities, ie issues of organization, design, development and application of systems designed for information processing, which are based on the use of artificial intelligence methods.

A Novel Approach to Predict the Longevity in Alzheimer's Patients Based on Rate of Cognitive Deterioration using Fuzzy Logic Based Feature Extraction Algorithm

  • Sridevi, Mutyala;B.R., Arun Kumar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.79-86
    • /
    • 2021
  • Alzheimer's is a chronic progressive disease which exhibits varied symptoms and behavioural traits from person to person. The deterioration in cognitive abilities is more noticeable through their Activities and Instrumental Activities of Daily Living rather than biological markers. This information discussed in social media communities was collected and features were extracted by using the proposed fuzzy logic based algorithm to address the uncertainties and imprecision in the data reported. The data thus obtained is used to train machine learning models in order to predict the longevity of the patients. Models built on features extracted using the proposed algorithm performs better than models trained on full set of features. Important findings are discussed and Support Vector Regressor with RBF kernel is identified as the best performing model in predicting the longevity of Alzheimer's patients. The results would prove to be of high value for healthcare practitioners and palliative care providers to design interventions that can alleviate the trauma faced by patients and caregivers due to chronic diseases.

A New Digital Image Steganography Approach Based on The Galois Field GF(pm) Using Graph and Automata

  • Nguyen, Huy Truong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4788-4813
    • /
    • 2019
  • In this paper, we introduce concepts of optimal and near optimal secret data hiding schemes. We present a new digital image steganography approach based on the Galois field $GF(p^m)$ using graph and automata to design the data hiding scheme of the general form ($k,N,{\lfloor}{\log}_2p^{mn}{\rfloor}$) for binary, gray and palette images with the given assumptions, where k, m, n, N are positive integers and p is prime, show the sufficient conditions for the existence and prove the existence of some optimal and near optimal secret data hiding schemes. These results are derived from the concept of the maximal secret data ratio of embedded bits, the module approach and the fastest optimal parity assignment method proposed by Huy et al. in 2011 and 2013. An application of the schemes to the process of hiding a finite sequence of secret data in an image is also considered. Security analyses and experimental results confirm that our approach can create steganographic schemes which achieve high efficiency in embedding capacity, visual quality, speed as well as security, which are key properties of steganography.

Design and Analysis of Real-time Intrusion Detection Model for Distributed Environment (분산환경을 위한 실시간 침입 탐지 모델의 설계)

  • 이문구;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.71-84
    • /
    • 1999
  • The most of intrusion detection methods do not detect intrusion when it happens. To solve the problem, we are studying a real-time intrusion detection. Because a previous intrusion detection system(IDS) is running on the host level, it difficult to port and to extend to other system on the network level that distributed environment. Also IDS provides the confidentiality of messages when it sends each other. This paper proposes a model of real-time intrusion detection using agents. It applies to distributed environment using an extensibility and communication mechanism among agents, supports a portability, an extensibility and a confidentiality of IDS.

An Experimental Study on the Semi-Automated Formal Verification of Cryptographic Protocols (암호프로토콜 논리성 자동 검증에 관한 연구)

  • 권태경;양숙현;김승주;임선간
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.115-129
    • /
    • 2003
  • This paper presents a semi-automated formal verification method based on the famous SVO logic, and discusses its experimental results. We discuss several problems on automating the SVO logic and design its derivative, ASVO logic for automation. Also the proposed method is implemented by the Isabelle/Isar system. As a result, we verified the well-known weakness of the NSSK protocol that is vulnerable to the Denning-Sacco attack, using our Isabelle/ASVO system. Finally, we refined the protocol by following the logical consequence of the ASVO verification.

Design of an Operator Architecture for Finite Fields in Constrained Environments (제약적인 환경에 적합한 유한체 연산기 구조 설계)

  • Jung, Seok-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.45-50
    • /
    • 2008
  • The choice of an irreducible polynomial and the representation of elements have influence on the efficiency of operators for finite fields. This paper suggests two serial multiplier for the extention field GF$(p^n)$ where p is odd prime. A serial multiplier using an irreducible binomial consists of (2n+5) resisters, 2 MUXs, 2 multipliers of GF(p), and 1 adder of GF(p). It obtains the mulitplication result after $n^2+n$ clock cycles. A serial multiplier using an AOP consists of (2n+5) resisters, 1 MUX, 1 multiplier of CF(p), and 1 adder of GF(p). It obtains the mulitplication result after $n^2$+3n+2 clock cycles.

The FPGA Implementation of The Viterbi Algorithm for Error Correcting (에러 정정을 위한 Viterbi 알고리즘의 FPGA 구현)

  • 조현숙;한승조;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.115-126
    • /
    • 1999
  • As the processing speed of communication and computer system has been improved, high speed data processing is required to correct error of data. In this paper, decoding algorithm which is applicable to the wireless communication system is proposed and encoder and decoder are designed by using the proposed decoding algorithm. We design the encoder and decoder by using the VHDL(VHSIC Hardware Description Language) and simulate the designed encoder and decoder by using V-system. Designed algorithm is synthesized by using synopsys tools and is made to one chip by means of XILINX XC4010EPC84-4. When 20MHz was used as the input clock, data arrival time was 29.20ns and data require time was 48.70ns.

Design of traceable Electronic Cash System based on Feige-Fiat-Shamir blind digital signature (Feige-Fiat-Shamir 은닉전자서명에 기반한 추적 가능한 전자화폐 시스템의 설계)

  • 박왕석;박창섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.33-44
    • /
    • 2001
  • E-commerce has various advantages such as saving the cost and no constraint on time and space, unlike real-world commerce. On the other hand, e-commerce has some important issues to solve since the commerce is conducted on the cyberspace. The issues are a mutual confidence of parties participating in the commerce as well as a method of payments. On early days, electronic cash was designed using blind digital signature to protect the personal information from being exposed and to provide the perfect anonymity for user. In this paper, a new blind signature scheme based on Feige-Fiat-Shamir digital signature is proposed, which is very efficient compared with the other schemes in terms of the computational complexity. Also, a traceable Electronic Cash System which is based on the proposed blind digital signature is designed, which has a nice feature of identifying the spender in case of using the money illegally.