• Title/Summary/Keyword: machine learning applications

Search Result 538, Processing Time 0.022 seconds

A Review of AI-based Automobile Accident Prevention Systems (인공지능 기반의 자동차사고 감지 시스템 적용 사례 분석)

  • Choi, Jae Gyeong;Kong, Chan Woo;Lim, Sunghoon
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.1
    • /
    • pp.9-14
    • /
    • 2020
  • Artificial intelligence (AI) has been applied to most industries by enhancing automation and contributing greatly to efficient processes and high-quality production. This research analyzes the applications of AI-based automobile accident prevention systems. It deals with AI-based collision prevention systems that learn information from various sensors attached to cars and AI-based accident detection systems that automatically report accidents to the control center in the event of a collision. Based on the literature review, technological and institutional changes are taking place at the national levels, which recognize the effectiveness of the systems. In addition, start-ups at home and abroad as well as major car manufacturers are in the process of commercializing auto parts equipped with AI-based collision prevention technology.

Camouflaged Adversarial Patch Attack on Object Detector (객체탐지 모델에 대한 위장형 적대적 패치 공격)

  • Jeonghun Kim;Hunmin Yang;Se-Yoon Oh
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.1
    • /
    • pp.44-53
    • /
    • 2023
  • Adversarial attacks have received great attentions for their capacity to distract state-of-the-art neural networks by modifying objects in physical domain. Patch-based attack especially have got much attention for its optimization effectiveness and feasible adaptation to any objects to attack neural network-based object detectors. However, despite their strong attack performance, generated patches are strongly perceptible for humans, violating the fundamental assumption of adversarial examples. In this paper, we propose a camouflaged adversarial patch optimization method using military camouflage assessment metrics for naturalistic patch attacks. We also investigate camouflaged attack loss functions, applications of various camouflaged patches on army tank images, and validate the proposed approach with extensive experiments attacking Yolov5 detection model. Our methods produce more natural and realistic looking camouflaged patches while achieving competitive performance.

Enhancing Autonomous Vehicle RADAR Performance Prediction Model Using Stacking Ensemble (머신러닝 스태킹 앙상블을 이용한 자율주행 자동차 RADAR 성능 향상)

  • Si-yeon Jang;Hye-lim Choi;Yun-ju Oh
    • Journal of Internet Computing and Services
    • /
    • v.25 no.2
    • /
    • pp.21-28
    • /
    • 2024
  • Radar is an essential sensor component in autonomous vehicles, and the market for radar applications in this context is steadily expanding with a growing variety of products. In this study, we aimed to enhance the stability and performance of radar systems by developing and evaluating a radar performance prediction model that can predict radar defects. We selected seven machine learning and deep learning algorithms and trained the model with a total of 49 input data types. Ultimately, when we employed an ensemble of 17 models, it exhibited the highest performance. We anticipate that these research findings will assist in predicting product defects at the production stage, thereby maximizing production yield and minimizing the costs associated with defective products.

Imaging Evaluation of Peritoneal Metastasis: Current and Promising Techniques

  • Chen Fu;Bangxing Zhang;Tiankang Guo;Junliang Li
    • Korean Journal of Radiology
    • /
    • v.25 no.1
    • /
    • pp.86-102
    • /
    • 2024
  • Early diagnosis, accurate assessment, and localization of peritoneal metastasis (PM) are essential for the selection of appropriate treatments and surgical guidance. However, available imaging modalities (computed tomography [CT], conventional magnetic resonance imaging [MRI], and 18fluorodeoxyglucose positron emission tomography [PET]/CT) have limitations. The advent of new imaging techniques and novel molecular imaging agents have revealed molecular processes in the tumor microenvironment as an application for the early diagnosis and assessment of PM as well as real-time guided surgical resection, which has changed clinical management. In contrast to clinical imaging, which is purely qualitative and subjective for interpreting macroscopic structures, radiomics and artificial intelligence (AI) capitalize on high-dimensional numerical data from images that may reflect tumor pathophysiology. A predictive model can be used to predict the occurrence, recurrence, and prognosis of PM, thereby avoiding unnecessary exploratory surgeries. This review summarizes the role and status of different imaging techniques, especially new imaging strategies such as spectral photon-counting CT, fibroblast activation protein inhibitor (FAPI) PET/CT, near-infrared fluorescence imaging, and PET/MRI, for early diagnosis, assessment of surgical indications, and recurrence monitoring in patients with PM. The clinical applications, limitations, and solutions for fluorescence imaging, radiomics, and AI are also discussed.

User Data Collection and Personalization Services in Mobile Shopping Environment (모바일 쇼핑 환경에서 사용자 데이터 수집 및 개인화 서비스 방법)

  • Kim, Sung-jin;Kim, Sung-gyu;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.560-561
    • /
    • 2018
  • The spread of smartphones is increasing the proportion of mobile shopping in the online shopping market. Most mobile shopping services are delivered through applications. However, personalization services are very important for user data collection and analysis. Therefore, in this paper, we implemented the product barcode recognition function and machine learning-based product image recognition function using smartphones camera to collect user data in mobile shopping environment. The implemented function and push notification services enabled the collection and analysis of user data and personalization services for online shopping platform applications.

  • PDF

A Smart Framework for Mobile Botnet Detection Using Static Analysis

  • Anwar, Shahid;Zolkipli, Mohamad Fadli;Mezhuyev, Vitaliy;Inayat, Zakira
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2591-2611
    • /
    • 2020
  • Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.

Middleware for Context-Aware Ubiquitous Computing

  • Hung Q.;Sungyoung
    • Korea Information Processing Society Review
    • /
    • v.11 no.6
    • /
    • pp.56-75
    • /
    • 2004
  • In this article we address some system characteristics and challenging issues in developing Context-aware Middleware for Ubiquitous Computing. The functionalities of a Context-aware Middleware includes gathering context data from hardware/software sensors, reasoning and inferring high-level context data, and disseminating/delivering appropriate context data to interested applications/services. The Middleware should facilitate the query, aggregation, and discovery for the contexts, as well as facilities to specify their privacy policy. Following a formal context model using ontology would enable syntactic and semantic interoperability, and knowledge sharing between different domains. Moddleware should also provide different kinds of context classification mechanical as pluggable modules, including rules written in different types of logic (first order logic, description logic, temporal/spatial logic, fuzzy logic, etc.) as well as machine-learning mechanical (supervised and unsupervised classifiers). Different mechanisms have different power, expressiveness and decidability properties, and system developers can choose the appropriate mechanism that best meets the reasoning requirements of each context. And finally, to promote the context-trigger actions in application level, it is important to provide a uniform and platform-independent interface for applications to express their need for different context data without knowing how that data is acquired. The action could involve adapting to the new environment, notifying the user, communicating with another device to exchange information, or performing any other task.

  • PDF

INSTABILITY OF THE BETTI SEQUENCE FOR PERSISTENT HOMOLOGY AND A STABILIZED VERSION OF THE BETTI SEQUENCE

  • JOHNSON, MEGAN;JUNG, JAE-HUN
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.25 no.4
    • /
    • pp.296-311
    • /
    • 2021
  • Topological Data Analysis (TDA), a relatively new field of data analysis, has proved very useful in a variety of applications. The main persistence tool from TDA is persistent homology in which data structure is examined at many scales. Representations of persistent homology include persistence barcodes and persistence diagrams, both of which are not straightforward to reconcile with traditional machine learning algorithms as they are sets of intervals or multisets. The problem of faithfully representing barcodes and persistent diagrams has been pursued along two main avenues: kernel methods and vectorizations. One vectorization is the Betti sequence, or Betti curve, derived from the persistence barcode. While the Betti sequence has been used in classification problems in various applications, to our knowledge, the stability of the sequence has never before been discussed. In this paper we show that the Betti sequence is unstable under the 1-Wasserstein metric with regards to small perturbations in the barcode from which it is calculated. In addition, we propose a novel stabilized version of the Betti sequence based on the Gaussian smoothing seen in the Stable Persistence Bag of Words for persistent homology. We then introduce the normalized cumulative Betti sequence and provide numerical examples that support the main statement of the paper.

Applications of Intelligent Radio Technologies in Unlicensed Cellular Networks - A Survey

  • Huang, Yi-Feng;Chen, Hsiao-Hwa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2668-2717
    • /
    • 2021
  • Demands for high-speed wireless data services grow rapidly. It is a big challenge to increasing the network capacity operating on licensed spectrum resources. Unlicensed spectrum cellular networks have been proposed as a solution in response to severe spectrum shortage. Licensed Assisted Access (LAA) was standardized by 3GPP, aiming to deliver data services through unlicensed 5 GHz spectrum. Furthermore, the 3GPP proposed 5G New Radio-Unlicensed (NR-U) study item. On the other hand, artificial intelligence (AI) has attracted enormous attention to implement 5G and beyond systems, which is known as Intelligent Radio (IR). To tackle the challenges of unlicensed spectrum networks in 4G/5G/B5G systems, a lot of works have been done, focusing on using Machine Learning (ML) to support resource allocation in LTE-LAA/NR-U and Wi-Fi coexistence environments. Generally speaking, ML techniques are used in IR based on statistical models established for solving specific optimization problems. In this paper, we aim to conduct a comprehensive survey on the recent research efforts related to unlicensed cellular networks and IR technologies, which work jointly to implement 5G and beyond wireless networks. Furthermore, we introduce a positioning assisted LTE-LAA system based on the difference in received signal strength (DRSS) to allocate resources among UEs. We will also discuss some open issues and challenges for future research on the IR applications in unlicensed cellular networks.

Analysis of LinkedIn Jobs for Finding High Demand Job Trends Using Text Processing Techniques

  • Kazi, Abdul Karim;Farooq, Muhammad Umer;Fatima, Zainab;Hina, Saman;Abid, Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.223-229
    • /
    • 2022
  • LinkedIn is one of the most job hunting and career-growing applications in the world. There are a lot of opportunities and jobs available on LinkedIn. According to statistics, LinkedIn has 738M+ members. 14M+ open jobs on LinkedIn and 55M+ Companies listed on this mega-connected application. A lot of vacancies are available daily. LinkedIn data has been used for the research work carried out in this paper. This in turn can significantly tackle the challenges faced by LinkedIn and other job posting applications to improve the levels of jobs available in the industry. This research introduces Text Processing in natural language processing on datasets of LinkedIn which aims to find out the jobs that appear most in a month or/and year. Therefore, the large data became renewed into the required or needful source. This study thus uses Multinomial Naïve Bayes and Linear Support Vector Machine learning algorithms for text classification and developed a trained multilingual dataset. The results indicate the most needed job vacancies in any field. This will help students, job seekers, and entrepreneurs with their career decisions