• 제목/요약/키워드: Software classification

검색결과 890건 처리시간 0.025초

Wav2vec을 이용한 오디오 음성 기반의 파킨슨병 진단 (Diagnosis of Parkinson's disease based on audio voice using wav2vec)

  • 윤희진
    • 디지털융복합연구
    • /
    • 제19권12호
    • /
    • pp.353-358
    • /
    • 2021
  • 노년기에 접어들면서 알츠하이머 다음으로 흔한 퇴행성 뇌 질환은 파킨슨병이다. 파킨슨병의 증상은 손 떨림, 행동의 느려짐, 인지기능의 저하 등 일상생활의 삶의 질을 저하시키는 요인이 된다. 파킨슨병은 조기진단을 통하여 병의 진행 속도를 늦출 수 있는 질환이다. 파킨슨병의 조기진단을 위해 오디오 음성 파일 입력으로 wav2vec을 이용하여 특징을 추출하고 딥러닝(ANN)으로 파킨슨병의 유무를 진단하는 알고리즘을 구현하였다. 오디오 음성 파일을 이용하여 파킨슨병을 진단하는 실험 결과 정확도는 97.47%로 나타났다. 기존의 뉴럴네트워크를 이용하여 파킨슨병을 진단하는 결과보다 좋은 결과를 나타냈다. 오디오 음성 파일을 wav2vec 이용으로 간단하게 실험을 과정을 줄일 수 있었으며, 실험 결과 향상된 결과를 얻을 수 있었다.

NIST Lightweight Cryptography Standardization Process: Classification of Second Round Candidates, Open Challenges, and Recommendations

  • Gookyi, Dennis Agyemanh Nana;Kanda, Guard;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • 제17권2호
    • /
    • pp.253-270
    • /
    • 2021
  • In January 2013, the National Institute of Standards and Technology (NIST) announced the CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) contest to identify authenticated ciphers that are suitable for a wide range of applications. A total of 57 submissions made it into the first round of the competition out of which 6 were announced as winners in March 2019. In the process of the competition, NIST realized that most of the authenticated ciphers submitted were not suitable for resource-constrained devices used as end nodes in the Internet-of-Things (IoT) platform. For that matter, the NIST Lightweight Cryptography Standardization Process was set up to identify authenticated encryption and hashing algorithms for IoT devices. The call for submissions was initiated in 2018 and in April 2019, 56 submissions made it into the first round of the competition. In August 2019, 32 out of the 56 submissions were selected for the second round which is due to end in the year 2021. This work surveys the 32 authenticated encryption schemes that made it into the second round of the NIST lightweight cryptography standardization process. The paper presents an easy-to-understand comparative overview of the recommended parameters, primitives, mode of operation, features, security parameter, and hardware/software performance of the 32 candidate algorithms. The paper goes further by discussing the challenges of the Lightweight Cryptography Standardization Process and provides some suitable recommendations.

심층신경망 기반의 객체 검출 방식을 활용한 모바일 화면의 자동 프로그래밍에 관한 연구 (Automatic Mobile Screen Translation Using Object Detection Approach Based on Deep Neural Networks)

  • 윤영선;박지수;정진만;은성배;차신;소선섭
    • 한국멀티미디어학회논문지
    • /
    • 제21권11호
    • /
    • pp.1305-1316
    • /
    • 2018
  • Graphical user interface(GUI) has a very important role to interact with software users. However, designing and coding of GUI are tedious and pain taking processes. In many studies, the researchers are trying to convert GUI elements or widgets to code or describe formally their structures by help of domain knowledge of stochastic methods. In this paper, we propose the GUI elements detection approach based on object detection strategy using deep neural networks(DNN). Object detection with DNN is the approach that integrates localization and classification techniques. From the experimental result, if we selected the appropriate object detection model, the results can be used for automatic code generation from the sketch or capture images. The successful GUI elements detection can describe the objects as hierarchical structures of elements and transform their information to appropriate code by object description translator that will be studied at future.

국가연구시설장비의 유사도 판단기법에 관한 연구 (A Study on Similarity Calculation Method Between Research Infrastructure)

  • 김용주;김영찬
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제7권12호
    • /
    • pp.469-476
    • /
    • 2018
  • 연구개발과정에서의 필수요소인 연구장비의 공동활용 및 효율적인 구축을 위해 한국에서는 국가예산으로 구축된 장비정보를 필수적으로 등록하도록 하고 있다. 등록정보의 다양한 활용(중복성 검토, 성능예측, 대체장비추천)을 위해 본 연구에서는 현재 유사장비검색기법에 대해 분석하고 유사도 산출 방법을 제시하였다. 이를 통해 자연어 상태인 장비정보에서 키워드를 추출하여 LSA 기법을 적용하면 키워드간의 유사도산출 및 장비정보 간 유사도 분석이 가능함을 확인하였으며 향후 연구장비분류정보를 접목하여 적용할 경우 의미있는 유사도 산출 및 이를 활용한 다양한 서비스가 가능 할 것으로 예측된다.

Evaluation of Meymeh Aquifer vulnerability to nitrate pollution by GIS and statistical methods

  • Tabatabaei, Javad;Gorji, Leila
    • Membrane and Water Treatment
    • /
    • 제10권4호
    • /
    • pp.313-320
    • /
    • 2019
  • Increasing the concentration of nitrate ions in the soil solution and then leaching it to underground aquifers increases the concentration of nitrate in the water, and can cause many health and ecological problems. This study was conducted to evaluate the vulnerability of Meymeh aquifer to nitrate pollution. In this research, sampling of 10 wells was performed according to standard sampling principles and analyzed in the laboratory by spectrophotometric method, then; the nitrate concentration zonation map was drawn by using intermediate models. In the drastic model, the effective parameters for assessing the vulnerability of groundwater aquifers, including the depth of ground water, pure feeding, aquifer environment, soil type, topography slope, non-saturated area and hydraulic conductivity. Which were prepared in the form of seven layers in the ARC GIS software, and by weighting and ranking and integrating these seven layers, the final map of groundwater vulnerability to contamination was prepared. Drastic index estimated for the region between 75-128. For verification of the model, nitrate concentration data in groundwater of the region were used, which showed a relative correlation between the concentration of nitrate and the prepared version of the model. A combination of two vulnerability map and nitrate concentration zonation was provided a qualitative aquifer classification map. According to this map, most of the study areas are within safe and low risk, and only a small portion of the Meymeh Aquifer, which has a nitrate concentration of more than 50 mg / L in groundwater, is classified in a hazardous area.

Floating Gas Power Plants

  • Kim, Hyun-Soo
    • 한국산업융합학회 논문집
    • /
    • 제23권6_1호
    • /
    • pp.907-915
    • /
    • 2020
  • Specification selection, Layout, specifications and combinations of Power Drives, and Ship motions were studied for FGPP(Floating Gas-fired Power Plants), which are still needed in areas such as the Caribbean, Latin America, and Southeast Asia where electricity is not sufficiently supplied. From this study, the optimal equipment layout in ships was derived. In addition, the difference between engine and turbine was verified through LCOE(Levelized Cost of Energy) comparison according to the type and combination of Power Drives. Analysis of Hs(Significant Height of wave) and Tp(spectrum Peak Period of wave) for places where this FGPP will be tested or applied enables design according to wave characteristics in Brazil and Indonesia. Normalized Sloshing Pressures of FGPP and LNG Carrier are verified using a sloshing analysis program, which is CFD(Computational Fluid Dynamics) software developed by ABS(American Bureau of Shipping). Power Transmission System is studied with Double bus with one Circuit Breaker Topology. A nd the CFD analysis allowed us to calculate linear roll damping coefficients for more accurate full load conditions and ballast conditions. Through RAO(Response Amplitude Operator) analysis, we secured data that could minimize the movement of ships according to the direction of waves and ship placement by identifying the characteristics of large movements in the beam sea conditions. The FGPP has been granted an AIP(Approval in Principle) from a classification society, the ABS.

동해안 너울성 파도 예측을 위한 머신러닝 모델 연구 (A Study of Machine Learning Model for Prediction of Swelling Waves Occurrence on East Sea)

  • 강동훈;오세종
    • 한국정보기술학회논문지
    • /
    • 제17권9호
    • /
    • pp.11-17
    • /
    • 2019
  • 최근 들어 동해안에서 너울성 파도에 의한 손실이 빈번히 발생하고 있다. 너울성 파도는 다양한 요인들이 결합되어 발생하기 때문에 예측이 어렵다. 본 연구에서는 머신러닝 기술에 기초하여 동해안에서 너울성 파도의 발생을 예측하는 모델을 제안하였다. 모델 개발을 위해 포항 신항의 하역중단 데이터 및 신항 부근의 기압, 풍속, 풍향, 수온 등의 기상자료를 수집하였다. 수집한 데이터로부터 너울발생에 중요한 영향을 미치는 변수들을 선별하였으며, 모델 개발을 위해 다양한 머신러닝 예측 알고리즘들을 테스트 하였다. 그 결과 조위, 수온, 기압이 너울 발생 예측을 위한 주요 변수로 확인이 되었고, Random Forest 모델이 가장 우수한 성능을 보였으며. 모델의 예측 정확도는 88.6%이다.

이미지와 해시태그를 이용한 인스타그램의 감정 분석 연구 (A Study on the Emotion Analysis of Instagram Using Images and Hashtags)

  • 정다혜;김장원
    • 한국정보기술학회논문지
    • /
    • 제17권9호
    • /
    • pp.123-131
    • /
    • 2019
  • 최근 소셜 네트워크 서비스 사용자들은 게시글을 통해 사회적 이슈 및 관심 콘텐츠들에 대한 자신의 감정을 적극적으로 표현하고 공유한다. 그 결과 소셜 네트워크에서의 개인 및 특정 집단의 감정 공유는 빠르게 확산된다. 그러므로 사용자들의 게시글에 대한 감정 분석 연구가 활발히 진행되고 있다. 그렇지만 다양한 감정이 포함된 게시글에 대한 감정 분석 연구가 미흡하다. 따라서 본 논문에서는 해시태그와 이미지를 이용한 인스타그램 게시글의 대표 감정 분석 방법을 제안한다. 이를 통해 사용자 게시글에 포함된 다종의 리소스를 활용하여 다중의 감정으로부터 대표 감정을 추출할 수 있으며 66.4%의 정확도와 81.7%의 재현율로 기존 방법보다 감정 분류 성능 향상을 보인다.

Study on Machine Learning Techniques for Malware Classification and Detection

  • Moon, Jaewoong;Kim, Subin;Song, Jaeseung;Kim, Kyungshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4308-4325
    • /
    • 2021
  • The importance and necessity of artificial intelligence, particularly machine learning, has recently been emphasized. In fact, artificial intelligence, such as intelligent surveillance cameras and other security systems, is used to solve various problems or provide convenience, providing solutions to problems that humans traditionally had to manually deal with one at a time. Among them, information security is one of the domains where the use of artificial intelligence is especially needed because the frequency of occurrence and processing capacity of dangerous codes exceeds the capabilities of humans. Therefore, this study intends to examine the definition of artificial intelligence and machine learning, its execution method, process, learning algorithm, and cases of utilization in various domains, particularly the cases and contents of artificial intelligence technology used in the field of information security. Based on this, this study proposes a method to apply machine learning technology to the method of classifying and detecting malware that has rapidly increased in recent years. The proposed methodology converts software programs containing malicious codes into images and creates training data suitable for machine learning by preparing data and augmenting the dataset. The model trained using the images created in this manner is expected to be effective in classifying and detecting malware.

Analysis of LinkedIn Jobs for Finding High Demand Job Trends Using Text Processing Techniques

  • Kazi, Abdul Karim;Farooq, Muhammad Umer;Fatima, Zainab;Hina, Saman;Abid, Hasan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.223-229
    • /
    • 2022
  • LinkedIn is one of the most job hunting and career-growing applications in the world. There are a lot of opportunities and jobs available on LinkedIn. According to statistics, LinkedIn has 738M+ members. 14M+ open jobs on LinkedIn and 55M+ Companies listed on this mega-connected application. A lot of vacancies are available daily. LinkedIn data has been used for the research work carried out in this paper. This in turn can significantly tackle the challenges faced by LinkedIn and other job posting applications to improve the levels of jobs available in the industry. This research introduces Text Processing in natural language processing on datasets of LinkedIn which aims to find out the jobs that appear most in a month or/and year. Therefore, the large data became renewed into the required or needful source. This study thus uses Multinomial Naïve Bayes and Linear Support Vector Machine learning algorithms for text classification and developed a trained multilingual dataset. The results indicate the most needed job vacancies in any field. This will help students, job seekers, and entrepreneurs with their career decisions