• Title/Summary/Keyword: memory accuracy

Search Result 639, Processing Time 0.029 seconds

Prediction of multipurpose dam inflow using deep learning (딥러닝을 활용한 다목적댐 유입량 예측)

  • Mok, Ji-Yoon;Choi, Ji-Hyeok;Moon, Young-Il
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.2
    • /
    • pp.97-105
    • /
    • 2020
  • Recently, Artificial Neural Network receives attention as a data prediction method. Among these, a Long Shot-term Memory (LSTM) model specialized for time-series data prediction was utilized as a prediction method of hydrological time series data. In this study, the LSTM model was constructed utilizing deep running open source library TensorFlow which provided by Google, to predict inflows of multipurpose dams. We predicted the inflow of the Yongdam Multipurpose Dam which is located in the upper stream of the Geumgang. The hourly flow data of Yongdam Dam from 2006 to 2018 provided by WAMIS was used as the analysis data. Predictive analysis was performed under various of variable condition in order to compare and analyze the prediction accuracy according to four learning parameters of the LSTM model. Root mean square error (RMSE), Mean absolute error (MAE) and Volume error (VE) were calculated and evaluated its accuracy through comparing the predicted and observed inflows. We found that all the models had lower accuracy at high inflow rate and hourly precipitation data (2006~2018) of Yongdam Dam utilized as additional input variables to solve this problem. When the data of rainfall and inflow were utilized together, it was found that the accuracy of the prediction for the high flow rate is improved.

A Comparative Study of Machine Learning Algorithms Using LID-DS DataSet (LID-DS 데이터 세트를 사용한 기계학습 알고리즘 비교 연구)

  • Park, DaeKyeong;Ryu, KyungJoon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • Today's information and communication technology is rapidly developing, the security of IT infrastructure is becoming more important, and at the same time, cyber attacks of various forms are becoming more advanced and sophisticated like intelligent persistent attacks (Advanced Persistent Threat). Early defense or prediction of increasingly sophisticated cyber attacks is extremely important, and in many cases, the analysis of network-based intrusion detection systems (NIDS) related data alone cannot prevent rapidly changing cyber attacks. Therefore, we are currently using data generated by intrusion detection systems to protect against cyber attacks described above through Host-based Intrusion Detection System (HIDS) data analysis. In this paper, we conducted a comparative study on machine learning algorithms using LID-DS (Leipzig Intrusion Detection-Data Set) host-based intrusion detection data including thread information, metadata, and buffer data missing from previously used data sets. The algorithms used were Decision Tree, Naive Bayes, MLP (Multi-Layer Perceptron), Logistic Regression, LSTM (Long Short-Term Memory model), and RNN (Recurrent Neural Network). Accuracy, accuracy, recall, F1-Score indicators and error rates were measured for evaluation. As a result, the LSTM algorithm had the highest accuracy.

Preliminary Study on the Reproduction of Dissolved Oxygen Concentration in Jinhae Bay Based on Deep Learning Model (딥러닝 모형 기반 진해만 용존산소농도 재현을 위한 기초연구)

  • Park, Seongsik;Kim, Kyunghoi
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.2
    • /
    • pp.193-200
    • /
    • 2022
  • We conducted a case study to determine the optimal model parameters and predictors of Long Short-Term Memory (LSTM) for the reproduction of dissolved oxygen (DO) concentration in Jinhae Bay. The model parameter case study indicated the lowest accuracy when the Hidden node=10, Epoch=100. This was caused by underfitting of machine learning. The accuracy increased as the Hidden node and Epoch increased. The accuracy was the highest when the Hidden node=80 and Epoch=100 with R2=0.99. In the bottom DO reproduction of Step 1 of the predictors case study, accuracy was highest when the water temperature was used as a predictor with R2=0.81. In Step 2, The R2 value increased up to 0.92 when the water temperature and SiO2 were used as a predictor. This was caused by a high correlation between the bottom DO and SiO2 concentrations. Consequently, we determined the optimal model parameters and predictors of LSTM for the reproduction of DO concentration in Jinhae Bay.

An Effective Face Authentication Method for Resource - Constrained Devices (제한된 자원을 갖는 장치에서 효과적인 얼굴 인증 방법)

  • Lee Kyunghee;Byun Hyeran
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1233-1245
    • /
    • 2004
  • Though biometrics to authenticate a person is a good tool in terms of security and convenience, typical authentication algorithms using biometrics may not be executed on resource-constrained devices such as smart cards. Thus, to execute biometric processing on resource-constrained devices, it is desirable to develop lightweight authentication algorithm that requires only small amount of memory and computation. Also, among biological features, face is one of the most acceptable biometrics, because humans use it in their visual interactions and acquiring face images is non-intrusive. We present a new face authentication algorithm in this paper. Our achievement is two-fold. One is to present a face authentication algorithm with low memory requirement, which uses support vector machines (SVM) with the feature set extracted by genetic algorithms (GA). The other contribution is to suggest a method to reduce further, if needed, the amount of memory required in the authentication at the expense of verification rate by changing a controllable system parameter for a feature set size. Given a pre-defined amount of memory, this capability is quite effective to mount our algorithm on memory-constrained devices. The experimental results on various databases show that our face authentication algorithm with SVM whose input vectors consist of discriminating features extracted by GA has much better performance than the algorithm without feature selection process by GA has, in terms of accuracy and memory requirement. Experiment also shows that the number of the feature ttl be selected is controllable by a system parameter.

Neuropretective effect of Kupunggibodan, Gamisamul-tang and Whangryunhaedok-tang on the ischemia-induced learning and memory deficits by MCAO in the rats (중풍 한방처방전의 효능비교 연구 ; 황련해독탕, 거풍지보단, 가미사물탕이 국소 전뇌허혈에 의한 학습과 기억에 미치는 효과)

  • Lee Bom-Bi;Chung Jin-Yong;Kim Sun-Yeou;Kim Ho-Cheol;Kwon Youn-Jun;Hahm Dae-Hyun;Lee Hae-Jeong;Shim In-Sup
    • Korean Journal of Acupuncture
    • /
    • v.19 no.2
    • /
    • pp.63-78
    • /
    • 2002
  • Kupunggibodan(KU), Gamisamul-tang(GA) and Whangryunhaedok-tang(WH) are clinically the most popular prescriptions as an herbal medicine in the treatment of ischemia. In order to compare and evaluate their protective effects on the ischema-induced cognitive deficits by middle cerebral artery occlusion (MCAO), we examined its ability to improve ischemia-induced cell loss and impairements of learning and memory in the Morris water maze and eight-arm radial arm maze. Focal cerebral ischemia produced a marked cell loss, decrease in acetylcholinesterase(AchE) reactivity in the hippocampus, and learning and memory deficits in two behavioral tasks. Pretreatment with WH (100 mg/kg, p.o.) produced a substantial increase in acquisition in the Morris water maze. Pretreatment with KU increased the perfomance of the resention test in the Morris water maze. WH, KU and GA caused a significant improvement in choice accuracy in radial arm maze test. WH was superior to KU and GA in perfomance of the radial arm maze test. Consistent with behavioral data, staining with cresyl violet showed that pretreatments with WH, but not KU and GA significantly recovered the ischemia-induced cell loss in the hippcampal CA1 area. In addition, pretreatments with WH and KU recovered the ischemia-induced reduction of AchE reactivity in the hippocampal CA1 area. These results demonstrated that KU, GA and WH have protective effects against ischimea-induced learning and memory impairments and that the efficacy was the order of WH>KU>GA in tratment of ischemia induced memory deficits. The present studies provide an evidence of KU, GA and WH as putative treatment of vascular dementia. Supported by a fund from the Ministry of Health and Welfare(HMP-00-OO-04-0004), and the Brain Korea 21 Project from Korean Ministry of Education, Korea.

  • PDF

Accuracy Analysis of Fixed Point Arithmetic for Hardware Implementation of Binary Weight Network (이진 가중치 신경망의 하드웨어 구현을 위한 고정소수점 연산 정확도 분석)

  • Kim, Jong-Hyun;Yun, SangKyun
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.805-809
    • /
    • 2018
  • In this paper, we analyze the change of accuracy when fixed point arithmetic is used instead of floating point arithmetic in binary weight network(BWN). We observed the change of accuracy by varying total bit size and fraction bit size. If the integer part is not changed after fixed point approximation, there is no significant decrease in accuracy compared to the floating-point operation. When overflow occurs in the integer part, the approximation to the maximum or minimum of the fixed point representation minimizes the decrease in accuracy. The results of this paper can be applied to the minimization of memory and hardware resource requirement in the implementation of FPGA-based BWN accelerator.

A Study on the Application of Machine Learning to Improve BIS (Bus Information System) Accuracy (BIS(Bus Information System) 정확도 향상을 위한 머신러닝 적용 방안 연구)

  • Jang, Jun yong;Park, Jun tae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.3
    • /
    • pp.42-52
    • /
    • 2022
  • Bus Information System (BIS) services are expanding nationwide to small and medium-sized cities, including large cities, and user satisfaction is continuously improving. In addition, technology development related to improving reliability of bus arrival time and improvement research to minimize errors continue, and above all, the importance of information accuracy is emerging. In this study, accuracy performance was evaluated using LSTM, a machine learning method, and compared with existing methodologies such as Kalman filter and neural network. As a result of analyzing the standard error for the actual travel time and predicted values, it was analyzed that the LSTM machine learning method has about 1% higher accuracy and the standard error is about 10 seconds lower than the existing algorithm. On the other hand, 109 out of 162 sections (67.3%) were analyzed to be excellent, indicating that the LSTM method was not entirely excellent. It is judged that further improved accuracy prediction will be possible when algorithms are fused through section characteristic analysis.

Wavelet Transform Based Defect Detection for PCB Inspection Machines (PCB 검사기를 위한 웨이블릿 변환 기반의 결함 검출 방법)

  • Youn, Seung-Geun;Kim, Young-Gyu;Park, Tae-Hyung
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.10
    • /
    • pp.1508-1515
    • /
    • 2017
  • This paper proposes the defect detection method for automatic inspection machines in printed circuit boards (PCBs) manufacturing system. The defects of PCB such as open, short, pin hole and scratch can be detected by comparing the standard image and the target image. The standard image is obtained from CAD file such as ODB++ format, and the target image is obtained by arranging, filtering and binarization of captured PCB image. Since the PCB size is too large and image resolution is too high, the image processing requires a lot of memory and computational time. The wavelet transform is applied to compress the standard and target images, which results in reducing the memory and computational time. To increase the inspection accuracy, we utilize the he HH-domain as well as LL-domain of the transformed images. Experimental results are finally presented to show the performance improvement of the proposed method.

An Optimal and Dynamic Monitoring Interval for Grid Resource Information Services (그리드 자원정보 서비스를 위한 최적화된 동적 모니터링 인터벌에 관한 연구)

  • Kim Hye-Ju;Huh Eui-Nam;Lee Woong-Jae;Park Hyoung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.4 no.6
    • /
    • pp.13-24
    • /
    • 2003
  • Grid technology requires use of geographically distributed resources from multiple domains. Resource monitoring services or tools consisting sensors or agents will run on many systems to find static resource information (such as architecture vendor, OS name and version, MIPS rate, memory size, CPU capacity, disk size, and NIC information) and dynamic resource information (CPU usage, network usage(bandwidth, latency), memory usage, etc.). Thus monitoring itself may cause system overhead. This paper proposes the optimal monitoring interval to reduce the cost of monitoring services and the dynamic monitoring interval to measure monitoring events accurately. By employing two features, we find out unnecessary system overhead is significantly reduced and accuracy of events is still acquired.

  • PDF

MALICIOUS URL RECOGNITION AND DETECTION USING ATTENTION-BASED CNN-LSTM

  • Peng, Yongfang;Tian, Shengwei;Yu, Long;Lv, Yalong;Wang, Ruijin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5580-5593
    • /
    • 2019
  • A malicious Uniform Resource Locator (URL) recognition and detection method based on the combination of Attention mechanism with Convolutional Neural Network and Long Short-Term Memory Network (Attention-Based CNN-LSTM), is proposed. Firstly, the WHOIS check method is used to extract and filter features, including the URL texture information, the URL string statistical information of attributes and the WHOIS information, and the features are subsequently encoded and pre-processed followed by inputting them to the constructed Convolutional Neural Network (CNN) convolution layer to extract local features. Secondly, in accordance with the weights from the Attention mechanism, the generated local features are input into the Long-Short Term Memory (LSTM) model, and subsequently pooled to calculate the global features of the URLs. Finally, the URLs are detected and classified by the SoftMax function using global features. The results demonstrate that compared with the existing methods, the Attention-based CNN-LSTM mechanism has higher accuracy for malicious URL detection.