• Title/Summary/Keyword: Software classification

Search Result 899, Processing Time 0.022 seconds

Overview of technologies: ensure anonymity of privacy coins

  • Kwon, Hoon;Kim, Eun-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.77-86
    • /
    • 2022
  • Recently, various cryptocurrencies (coins) based on block chains have appeared, and interest in privacy coins, which is an anonymity-based cryptocurrency that values personal information protection, is growing. In this paper, we look at coin abuse cases using privacy coins, and analyze the technology that guarantees the anonymity of 8 mainly traded privacy coins (Monero, Dash, Zcash, BEAM, Grin, Horizen, Verge, and Pirate Chain). We would like to analyze the applied technologies for We present the problems that can occur in these privacy coins, check the technology and each element applied to the privacy coin, and analyze the technical difficulty of the anonymity guarantee technology for the mainly traded coins through this, and Appropriate countermeasures and classification of privacy coins for technical difficulty were presented through the problem. Through this, the standard for re-evaluating the value of the coin according to the application of appropriate technology for the privacy coin can be presented.

Building Domain Ontology through Concept and Relation Classification (개념 및 관계 분류를 통한 분야 온톨로지 구축)

  • Huang, Jin-Xia;Shin, Ji-Ae;Choi, Key-Sun
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.9
    • /
    • pp.562-571
    • /
    • 2008
  • For the purpose of building domain ontology, this paper proposes a methodology for building core ontology first, and then enriching the core ontology with the concepts and relations in the domain thesaurus. First, the top-level concept taxonomy of the core ontology is built using domain dictionary and general domain thesaurus. Then, the concepts of the domain thesaurus are classified into top-level concepts in the core ontology, and relations between broader terms (BT) - narrower terms (NT) and related terms (RT) are classified into semantic relations defined for the core ontology. To classify concepts, a two-step approach is adopted, in which a frequency-based approach is complemented with a similarity-based approach. To classify relations, two techniques are applied: (i) for the case of insufficient training data, a rule-based module is for identifying isa relation out of non-isa ones; a pattern-based approach is for classifying non-taxonomic semantic relations from non-isa. (ii) For the case of sufficient training data, a maximum-entropy model is adopted in the feature-based classification, where k-NN approach is for noisy filtering of training data. A series of experiments show that performances of the proposed systems are quite promising and comparable to judgments by human experts.

Classification of Axis-symmetric Flaws with Non-Symmetric Cross-Sections using Simulated Eddy Current Testing Signals (모사 와전류 탐상신호를 이용한 비대칭 단면을 갖는 축대칭 결함의 형상분류)

  • Song, S.J.;Kim, C.H.;Shin, Y.K.;Lee, H.B.;Park, Y.W.;Yim, C.J.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.21 no.5
    • /
    • pp.510-517
    • /
    • 2001
  • This paper describes an initial study for the application of eddy current pattern recognition approaches to more realistic flaw characterization in steam generator tubes. For this purpose, finite-element model-based theoretical eddy current testing (ECT) signals are simulated from 5 types of OD flaws with the variation in flaw size parameters and testing frequency. In addition, three kinds of software are developed for the convenience in the application of steps in pattern recognition approaches such as feature extraction feature selection and classification by probabilistic neural networks (PNNs). The cross point of the ECT signals simulated from flaws with non-symmetric cross-sections shows the deviation from the origin of the impedance plane. New features taking advantages of this phenomenon are added to complete the feature set with a total of 18 features. Then, classification with PNNs are performed based on this feature set. The PNN classifiers show high performance for the identification of symmetry in the cross-section of a flaw. However, they show very limited success in the interrogation of the sharpness of flaw tips.

  • PDF

Analysis of Core Patent and Technology of Unmanned Ground Technology Using an Analytical Method of the Patent Information (특허정보 분석 방법을 이용한 지상무인화 기술 분야 핵심 특허 및 기술 분석)

  • Park, Jae Yong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.5
    • /
    • pp.189-194
    • /
    • 2018
  • Unmanned technology is a representative technology that integrates various technologies like electric, electronic, mechanical, artificial intelligence, ICT technology, ect. In special emphasize, ground technology has been developing exponentially in the military field and expanding its utilization area. The patent information analysis method presented in this study, proposes a new patent analysis methodology for patent information analysis and patent information on unmanned ground technology. The patent information analysis processor has 6 levels to extract core patents and technologies. The process consists of: selection of technology to be analyzed, classification of detailed technology / key keyword selection, patent information collection / noise reduction, selection of patent information analysis method, patent information analysis, finally, core patents and key technologies that are extracted. Patent information on unmanned ground technology is also analyzed in this study. First, the technical classification of ground unmanned technology is carried out in detail. The core technology and core patents of ground unmanned technology were extracted through CPP and IPC code connectivity analysis. The results of patent information analysis using proposed patent information analysis method that can be applied to various fields of technology and analysis. These can be used as a material to forecast the direction of future research and development on the technology to be analyzed.

A Study on GIS Component Classification considering Functional/Non-Functional Elements (기능적/비기능적 요소를 고려한 GIS 컴포넌트 분류에 관한 연구)

  • Jo, Yun-Won;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.3
    • /
    • pp.77-86
    • /
    • 2002
  • Recently software industry in GIS(geographic information system) becomes an interesting issue by performing a large scale of national GIS application development as well as even small unit of FMS(facility management system). Also, there exist many cases to combine GIS with various business domains such as MIS(marketing information system), CNS(car navigation system) and ITS(intelligent transportation system). In this situation, in order to develop an efficient and useful GIS application for a short term, there must be a deep consideration of not only developing GIS component but also managing GIS component. In fact, even though there exist many certain components having high reusability, excellent interoperability and good quality, their reusability may be reduced because of their difficulty to access in a certain repository. Therefore, it is important to classify components having common characteristic based on their particular rule with reflecting their functionality and non-functionality before cataloging them. Here, there are two non-functional classification categories discussed such as GIS content-dependent metadata and GIS content-independent metadata. This cataloged components will help application developers to select easily their desired components. Moreover, new components may be easily producted by modifying and combining previous components. Finally, the original goal of all this effort can be defined through obtaining high reusability and interoperability of GIS component.

  • PDF

Classifying Sub-Categories of Apartment Defect Repair Tasks: A Machine Learning Approach (아파트 하자 보수 시설공사 세부공종 머신러닝 분류 시스템에 관한 연구)

  • Kim, Eunhye;Ji, HongGeun;Kim, Jina;Park, Eunil;Ohm, Jay Y.
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.9
    • /
    • pp.359-366
    • /
    • 2021
  • A number of construction companies in Korea invest considerable human and financial resources to construct a system for managing apartment defect data and for categorizing repair tasks. Thus, this study proposes machine learning models to automatically classify defect complaint text-data into one of the sub categories of 'finishing work' (i.e., one of the defect repair tasks). In the proposed models, we employed two word representation methods (Bag-of-words, Term Frequency-Inverse Document Frequency (TF-IDF)) and two machine learning classifiers (Support Vector Machine, Random Forest). In particular, we conducted both binary- and multi- classification tasks to classify 9 sub categories of finishing work: home appliance installation work, paperwork, painting work, plastering work, interior masonry work, plaster finishing work, indoor furniture installation work, kitchen facility installation work, and tiling work. The machine learning classifiers using the TF-IDF representation method and Random Forest classification achieved more than 90% accuracy, precision, recall, and F1 score. We shed light on the possibility of constructing automated defect classification systems based on the proposed machine learning models.

Enhanced Sound Signal Based Sound-Event Classification (향상된 음향 신호 기반의 음향 이벤트 분류)

  • Choi, Yongju;Lee, Jonguk;Park, Daihee;Chung, Yongwha
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.5
    • /
    • pp.193-204
    • /
    • 2019
  • The explosion of data due to the improvement of sensor technology and computing performance has become the basis for analyzing the situation in the industrial fields, and various attempts to detect events based on such data are increasing recently. In particular, sound signals collected from sensors are used as important information to classify events in various application fields as an advantage of efficiently collecting field information at a relatively low cost. However, the performance of sound-event classification in the field cannot be guaranteed if noise can not be removed. That is, in order to implement a system that can be practically applied, robust performance should be guaranteed even in various noise conditions. In this study, we propose a system that can classify the sound event after generating the enhanced sound signal based on the deep learning algorithm. Especially, to remove noise from the sound signal itself, the enhanced sound data against the noise is generated using SEGAN applied to the GAN with a VAE technique. Then, an end-to-end based sound-event classification system is designed to classify the sound events using the enhanced sound signal as input data of CNN structure without a data conversion process. The performance of the proposed method was verified experimentally using sound data obtained from the industrial field, and the f1 score of 99.29% (railway industry) and 97.80% (livestock industry) was confirmed.

Learning Method for Regression Model by Analysis of Relationship Between Input and Output Data with Periodicity (주기성을 갖는 입출력 데이터의 연관성 분석을 통한 회귀 모델 학습 방법)

  • Kim, Hye-Jin;Park, Ye-Seul;Lee, Jung-Won
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.7
    • /
    • pp.299-306
    • /
    • 2022
  • In recent, sensors embedded in robots, equipment, and circuits have become common, and research for diagnosing device failures by learning measured sensor data is being actively conducted. This failure diagnosis study is divided into a classification model for predicting failure situations or types and a regression model for numerically predicting failure conditions. In the case of a classification model, it simply checks the presence or absence of a failure or defect (Class), whereas a regression model has a higher learning difficulty because it has to predict one value among countless numbers. So, the reason that regression modeling is more difficult is that there are many irregular situations in which it is difficult to determine one output from a similar input when predicting by matching input and output. Therefore, in this paper, we focus on input and output data with periodicity, analyze the input/output relationship, and secure regularity between input and output data by performing sliding window-based input data patterning. In order to apply the proposed method, in this study, current and temperature data with periodicity were collected from MMC(Modular Multilevel Converter) circuit system and learning was carried out using ANN. As a result of the experiment, it was confirmed that when a window of 2% or more of one cycle was applied, performance of 97% or more of fit could be secured.

Anomaly detection and attack type classification mechanism using Extra Tree and ANN (Extra Tree와 ANN을 활용한 이상 탐지 및 공격 유형 분류 메커니즘)

  • Kim, Min-Gyu;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.79-85
    • /
    • 2022
  • Anomaly detection is a method to detect and block abnormal data flows in general users' data sets. The previously known method is a method of detecting and defending an attack based on a signature using the signature of an already known attack. This has the advantage of a low false positive rate, but the problem is that it is very vulnerable to a zero-day vulnerability attack or a modified attack. However, in the case of anomaly detection, there is a disadvantage that the false positive rate is high, but it has the advantage of being able to identify, detect, and block zero-day vulnerability attacks or modified attacks, so related studies are being actively conducted. In this study, we want to deal with these anomaly detection mechanisms, and we propose a new mechanism that performs both anomaly detection and classification while supplementing the high false positive rate mentioned above. In this study, the experiment was conducted with five configurations considering the characteristics of various algorithms. As a result, the model showing the best accuracy was proposed as the result of this study. After detecting an attack by applying the Extra Tree and Three-layer ANN at the same time, the attack type is classified using the Extra Tree for the classified attack data. In this study, verification was performed on the NSL-KDD data set, and the accuracy was 99.8%, 99.1%, 98.9%, 98.7%, and 97.9% for Normal, Dos, Probe, U2R, and R2L, respectively. This configuration showed superior performance compared to other models.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.