• Title/Summary/Keyword: network society

Search Result 26,749, Processing Time 0.055 seconds

Development of Data Analysis and Interpretation Methods for a Hybrid-type Unmanned Aircraft Electromagnetic System (하이브리드형 무인 항공 전자탐사시스템 자료의 분석 및 해석기술 개발)

  • Kim, Young Su;Kang, Hyeonwoo;Bang, Minkyu;Seol, Soon Jee;Kim, Bona
    • Geophysics and Geophysical Exploration
    • /
    • v.25 no.1
    • /
    • pp.26-37
    • /
    • 2022
  • Recently, multiple methods using small aircraft for geophysical exploration have been suggested as a result of the development of information and communication technology. In this study, we introduce the hybrid unmanned aircraft electromagnetic system of the Korea Institute of Geosciences and Mineral resources, which is under development. Additionally, data processing and interpretation methods are suggested via the analysis of datasets obtained using the system under development to verify the system. Because the system uses a three-component receiver hanging from a drone, the effects of rotation on the obtained data are significant and were therefore corrected using a rotation matrix. During the survey, the heights of the source and the receiver and their offsets vary in real time and the measured data are contaminated with noise. The noise makes it difficult to interpret the data using the conventional method. Therefore, we developed a recurrent neural network (RNN) model to enable rapid predictions of the apparent resistivity using magnetic field data. Field data noise is included in the training datasets of the RNN model to improve its performance on noise-contaminated field data. Compared with the results of the electrical resistivity survey, the trained RNN model predicted similar apparent resistivities for the test field dataset.

Grading of Harvested 'Mihwang' Peach Maturity with Convolutional Neural Network (합성곱 신경망을 이용한 '미황' 복숭아 과실의 성숙도 분류)

  • Shin, Mi Hee;Jang, Kyeong Eun;Lee, Seul Ki;Cho, Jung Gun;Song, Sang Jun;Kim, Jin Gook
    • Journal of Bio-Environment Control
    • /
    • v.31 no.4
    • /
    • pp.270-278
    • /
    • 2022
  • This study was conducted using deep learning technology to classify for 'Mihwang' peach maturity with RGB images and fruit quality attributes during fruit development and maturation periods. The 730 images of peach were used in the training data set and validation data set at a ratio of 8:2. The remains of 170 images were used to test the deep learning models. In this study, among the fruit quality attributes, firmness, Hue value, and a* value were adapted to the index with maturity classification, such as immature, mature, and over mature fruit. This study used the CNN (Convolutional Neural Networks) models for image classification; VGG16 and InceptionV3 of GoogLeNet. The performance results show 87.1% and 83.6% with Hue left value in VGG16 and InceptionV3, respectively. In contrast, the performance results show 72.2% and 76.9% with firmness in VGG16 and InceptionV3, respectively. The loss rate shows 54.3% and 62.1% with firmness in VGG16 and InceptionV3, respectively. It considers increasing for adapting a field utilization with firmness index in peach.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

A Vision Transformer Based Recommender System Using Side Information (부가 정보를 활용한 비전 트랜스포머 기반의 추천시스템)

  • Kwon, Yujin;Choi, Minseok;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.3
    • /
    • pp.119-137
    • /
    • 2022
  • Recent recommendation system studies apply various deep learning models to represent user and item interactions better. One of the noteworthy studies is ONCF(Outer product-based Neural Collaborative Filtering) which builds a two-dimensional interaction map via outer product and employs CNN (Convolutional Neural Networks) to learn high-order correlations from the map. However, ONCF has limitations in recommendation performance due to the problems with CNN and the absence of side information. ONCF using CNN has an inductive bias problem that causes poor performances for data with a distribution that does not appear in the training data. This paper proposes to employ a Vision Transformer (ViT) instead of the vanilla CNN used in ONCF. The reason is that ViT showed better results than state-of-the-art CNN in many image classification cases. In addition, we propose a new architecture to reflect side information that ONCF did not consider. Unlike previous studies that reflect side information in a neural network using simple input combination methods, this study uses an independent auxiliary classifier to reflect side information more effectively in the recommender system. ONCF used a single latent vector for user and item, but in this study, a channel is constructed using multiple vectors to enable the model to learn more diverse expressions and to obtain an ensemble effect. The experiments showed our deep learning model improved performance in recommendation compared to ONCF.

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

Design of a Greenhouse Monitoring System using Arduino and Wireless Communication (아두이노와 무선통신을 이용한 온실 환경 계측 시스템 설계)

  • Sung, Bo Hyun;Cho, Young-Yeol
    • Journal of Bio-Environment Control
    • /
    • v.31 no.4
    • /
    • pp.452-459
    • /
    • 2022
  • One of the important factors among the smart farm factors is environmental measurement. This study tried to design an environmental measurement monitoring system through Bluetooth wireless communication with LoRa using the open source programs Arduino, App Inventor, and Node Red. This system consists of Arduino, LoRa shield, temperature and humidity sensor (SHT10), and carbon dioxide sensor (K30). The environmental measurement system is configured as a system that allows the sensor to collect environmental data and transmit it to the user through wireless communication to conveniently monitor the farm environment. As libraries used in the Arduino program, LoRa.h, Sensirion.h, LiquidCrystal_I2C.h and K30_I2C.h were used. When receiving environmental data from the sensor at regular intervals, coding using average value was used for data stabilization. An Android-based app was developed using Node Red and App Inventor program as the user interface. It can be seen that the environmental data for the sensor is well collected with the screen output to the serial screen of Arduino, the screen of the smartphone, and the user interface of Node Red. Through these open source-based platforms and programs will be applied to various agricultural applications.

Comparative Study of Anomaly Detection Accuracy of Intrusion Detection Systems Based on Various Data Preprocessing Techniques (다양한 데이터 전처리 기법 기반 침입탐지 시스템의 이상탐지 정확도 비교 연구)

  • Park, Kyungseon;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.11
    • /
    • pp.449-456
    • /
    • 2021
  • An intrusion detection system is a technology that detects abnormal behaviors that violate security, and detects abnormal operations and prevents system attacks. Existing intrusion detection systems have been designed using statistical analysis or anomaly detection techniques for traffic patterns, but modern systems generate a variety of traffic different from existing systems due to rapidly growing technologies, so the existing methods have limitations. In order to overcome this limitation, study on intrusion detection methods applying various machine learning techniques is being actively conducted. In this study, a comparative study was conducted on data preprocessing techniques that can improve the accuracy of anomaly detection using NGIDS-DS (Next Generation IDS Database) generated by simulation equipment for traffic in various network environments. Padding and sliding window were used as data preprocessing, and an oversampling technique with Adversarial Auto-Encoder (AAE) was applied to solve the problem of imbalance between the normal data rate and the abnormal data rate. In addition, the performance improvement of detection accuracy was confirmed by using Skip-gram among the Word2Vec techniques that can extract feature vectors of preprocessed sequence data. PCA-SVM and GRU were used as models for comparative experiments, and the experimental results showed better performance when sliding window, skip-gram, AAE, and GRU were applied.

An Exploratory Study on the Learning Community: Focusing on the Covid19 Untact Era (배움공동체에 대한 탐색적 연구 : covid19 언택트시대를 중심으로)

  • Jeong, Su-Jeong;Im, Hong-Nam;Park, Hong-Jae
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.237-245
    • /
    • 2022
  • This study examines the social discourse on the characteristics of the learning community in the untact era, and discusses the directions that learning communities for children could explore and consider in the pandemic situation and beyond. For this purpose, big data for one year, from January 20, 2020 to January 20, 2021, were collected through internet portal sites (includingincluding Google News, Daum, Naver and other News surfaces), using two keywords "untact" and "learning community", and analyzed by employing a word frequency and network analysis method. The analysis results show that several important terms, such as 'village education community', 'operation', 'activity', 'corona 19', 'support', and 'online' are closely related to the learning community in the untact era. The findings from this study also have implications for developing the learning community as an alternative model to fill the existing gaps in public care and education for children during the prolonged pandemic and afterwards. In conclusion, the study findings highlight that it is meaningful to identify key terms and concepts through word frequency analysis in order to examine social trends and issues related to the learning community.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

Rock Mechanics Site Characterization for HLW Disposal Facilities (고준위방사성폐기물 처분시설 부지에 대한 암반역학 부지특성화)

  • Um, Jeong-Gi;Hyun, Seung Gyu
    • Economic and Environmental Geology
    • /
    • v.55 no.1
    • /
    • pp.1-17
    • /
    • 2022
  • The mechanical and thermal properties of the rock masses can affect the performance associated with both the isolating and retarding capacities of radioactive materials within the deep geological disposal system for High-Level Radioactive Waste (HLW). In this study, the essential parameters for the site descriptive model (SDM) related to the rock mechanics and thermal properties of the HLW disposal facilities site were reviewed, and the technical background was explored through the cases of the preceding site descriptive models developed by SKB (Swedish Nuclear and Fuel Management Company), Sweden and Posiva, Finland. SKB and Posiva studied parameters essential for the investigation and evaluation of mechanical and thermal properties, and derived a rock mechanics site descriptive model for safety evaluation and construction of the HLW disposal facilities. The rock mechanics SDM includes the results obtained from investigation and evaluation of the strength and deformability of intact rocks, fractures, and fractured rock masses, as well as the geometry of large-scaled deformation zones, the small-scaled fracture network system, thermal properties of rocks, and the in situ stress distribution of the disposal site. In addition, the site descriptive model should provide the sensitivity analysis results for the input parameters, and present the results obtained from evaluation of uncertainty.