• Title/Summary/Keyword: on-line learning

Search Result 846, Processing Time 0.029 seconds

An Improved Signature Hashing-based Pattern Matching for High Performance IPS (고성능 침입방지 시스템을 위해 개선한 시그니처 해싱 기반 패턴 매칭 기법)

  • Lee, Young-Sil;Kim, Nack-Hyun;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.434-437
    • /
    • 2010
  • NIPS(Network Intrusion Prevention System) is in line at the end of the external and internal networks which performed two kinds of action: Signature-based filtering and anomaly detection and prevention-based on self-learning. Among them, a signature-based filtering is well known to defend against attacks. By using signature-based filtering, intrusion prevention system passing a payload of packets is compared with attack patterns which are signature. If match, the packet is discard. However, when there is packet delay, it will increase the required pattern matching time as the number of signature is increasing whenever there is delay occur. Therefore, to ensure the performance of IPS, we needed more efficient pattern matching algorithm for high-performance ISP. To improve the performance of pattern matching the most important part is to reduce the number of comparisons signature rules and the packet whenever the packets arrive. In this paper, we propose an improve signature hashing-based pattern matching method. We use tuple pruning algorithm with Bloom filters, which effectively remove unnecessary tuples. Unlike other existing signature hashing-based IPS, our proposed method to improve the performance of IPS.

  • PDF

Predicting win-loss using game data and deriving the importance of subdivided variables (게임데이터를 이용한 승패예측 및 세분화된 변수 중요도 도출 기법)

  • Oh, Min-Ji;Choi, Eun-Seon;Oui, Som Akhamixay;Cho, Wan-Sup
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.231-240
    • /
    • 2020
  • With the development in the IT industry and the growth in the game industry, user's game data is recorded in seconds according to various plays and options, and a vast amount of game data can be analyzed based on Bigdata. Combined with business, Bigdata is used to discover new values for profit creation in various fields, but it is utilized in the game industry in insufficient ways. In this study, considering the characteristics of the subdivided lines, we constructed a win-loss prediction model for each line using the game data of League of Legends, and derived the importance of variables. This study can contribute to planning of strategies for general game users to get information about team members in advance and increase the win rate by using the record search sites.

A technique for predicting the cutting points of fish for the target weight using AI machine vision

  • Jang, Yong-hun;Lee, Myung-sub
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.27-36
    • /
    • 2022
  • In this paper, to improve the conditions of the fish processing site, we propose a method to predict the cutting point of fish according to the target weight using AI machine vision. The proposed method performs image-based preprocessing by first photographing the top and front views of the input fish. Then, RANSAC(RANdom SAmple Consensus) is used to extract the fish contour line, and then 3D external information of the fish is obtained using 3D modeling. Next, machine learning is performed on the extracted three-dimensional feature information and measured weight information to generate a neural network model. Subsequently, the fish is cut at the cutting point predicted by the proposed technique, and then the weight of the cut piece is measured. We compared the measured weight with the target weight and evaluated the performance using evaluation methods such as MAE(Mean Absolute Error) and MRE(Mean Relative Error). The obtained results indicate that an average error rate of less than 3% was achieved in comparison to the target weight. The proposed technique is expected to contribute greatly to the development of the fishery industry in the future by being linked to the automation system.

Development of a Stock Trading System Using M & W Wave Patterns and Genetic Algorithms (M&W 파동 패턴과 유전자 알고리즘을 이용한 주식 매매 시스템 개발)

  • Yang, Hoonseok;Kim, Sunwoong;Choi, Heung Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.63-83
    • /
    • 2019
  • Investors prefer to look for trading points based on the graph shown in the chart rather than complex analysis, such as corporate intrinsic value analysis and technical auxiliary index analysis. However, the pattern analysis technique is difficult and computerized less than the needs of users. In recent years, there have been many cases of studying stock price patterns using various machine learning techniques including neural networks in the field of artificial intelligence(AI). In particular, the development of IT technology has made it easier to analyze a huge number of chart data to find patterns that can predict stock prices. Although short-term forecasting power of prices has increased in terms of performance so far, long-term forecasting power is limited and is used in short-term trading rather than long-term investment. Other studies have focused on mechanically and accurately identifying patterns that were not recognized by past technology, but it can be vulnerable in practical areas because it is a separate matter whether the patterns found are suitable for trading. When they find a meaningful pattern, they find a point that matches the pattern. They then measure their performance after n days, assuming that they have bought at that point in time. Since this approach is to calculate virtual revenues, there can be many disparities with reality. The existing research method tries to find a pattern with stock price prediction power, but this study proposes to define the patterns first and to trade when the pattern with high success probability appears. The M & W wave pattern published by Merrill(1980) is simple because we can distinguish it by five turning points. Despite the report that some patterns have price predictability, there were no performance reports used in the actual market. The simplicity of a pattern consisting of five turning points has the advantage of reducing the cost of increasing pattern recognition accuracy. In this study, 16 patterns of up conversion and 16 patterns of down conversion are reclassified into ten groups so that they can be easily implemented by the system. Only one pattern with high success rate per group is selected for trading. Patterns that had a high probability of success in the past are likely to succeed in the future. So we trade when such a pattern occurs. It is a real situation because it is measured assuming that both the buy and sell have been executed. We tested three ways to calculate the turning point. The first method, the minimum change rate zig-zag method, removes price movements below a certain percentage and calculates the vertex. In the second method, high-low line zig-zag, the high price that meets the n-day high price line is calculated at the peak price, and the low price that meets the n-day low price line is calculated at the valley price. In the third method, the swing wave method, the high price in the center higher than n high prices on the left and right is calculated as the peak price. If the central low price is lower than the n low price on the left and right, it is calculated as valley price. The swing wave method was superior to the other methods in the test results. It is interpreted that the transaction after checking the completion of the pattern is more effective than the transaction in the unfinished state of the pattern. Genetic algorithms(GA) were the most suitable solution, although it was virtually impossible to find patterns with high success rates because the number of cases was too large in this simulation. We also performed the simulation using the Walk-forward Analysis(WFA) method, which tests the test section and the application section separately. So we were able to respond appropriately to market changes. In this study, we optimize the stock portfolio because there is a risk of over-optimized if we implement the variable optimality for each individual stock. Therefore, we selected the number of constituent stocks as 20 to increase the effect of diversified investment while avoiding optimization. We tested the KOSPI market by dividing it into six categories. In the results, the portfolio of small cap stock was the most successful and the high vol stock portfolio was the second best. This shows that patterns need to have some price volatility in order for patterns to be shaped, but volatility is not the best.

Development of A Dynamic Departure Time Choice Model based on Heterogeneous Transit Passengers (이질적 지하철승객 기반의 동적 출발시간선택모형 개발 (도심을 목적지로 하는 단일 지하철노선을 중심으로))

  • 김현명;임용택;신동호;백승걸
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.5
    • /
    • pp.119-134
    • /
    • 2001
  • This paper proposed a dynamic transit vehicle simulation model and a dynamic transit passengers simulation model, which can simultaneously simulate the transit vehicles and passengers traveling on a transit network, and also developed an algorithm of dynamic departure time choice model based on individual passenger. The proposed model assumes that each passenger's behavior is heterogeneous based on stochastic process by relaxing the assumption of homogeneity among passengers and travelers have imperfect information and bounded rationality to more actually represent and to simulate each passenger's behavior. The proposed model integrated a inference and preference reforming procedure into the learning and decision making process in order to describe and to analyze the departure time choices of transit passengers. To analyze and evaluate the model an example transit line heading for work place was used. Numerical results indicated that in the model based on heterogeneous passengers the travelers' preference influenced more seriously on the departure time choice behavior, while in the model based on homogeneous passengers it does not. The results based on homogeneous passengers seemed to be unrealistic in the view of rational behavior. These results imply that the aggregated travel demand models such as the traditional network assignment models based on user equilibrium, assuming perfect information on the network, homogeneity and rationality, might be different from the real dynamic travel demand patterns occurred on actual network.

  • PDF

A study on TPACK of mathematics teachers : Focusing on recognitions and educational needs of TPACK (수학교사의 테크놀로지 교수 내용 지식(TPACK)에 대한 연구 : TPACK에 대한 인식 및 교육요구도 분석 중심으로)

  • Lee, Da-Hee;Whang, Woo-Hyung
    • The Mathematical Education
    • /
    • v.57 no.1
    • /
    • pp.1-36
    • /
    • 2018
  • The purpose of this study is to examine the relationship between utilization of technology and TPACK in mathematics teachers, and to analyze needs and retentions, difference between needs and retentions, and educational needs of TPACK in mathematics teachers. Furthermore, we will prioritize TPACK items that mathematics teachers want to change, and provide implications for teacher education related to TPACK in the future. To do this, we analyzed 328 mathematics teachers nationwide by using survey on the utilization of technology, averages of TPACK's needs and retentions, t-test of two averages, Borich's educational needs analysis, and the Locus for Focus model. The results are as follows. Firstly, the actual utilization rate was lower than the positive recognition of utilization of technology by mathematics teachers, and many mathematics teachers mentioned the lack of knowledge related to TPACK. Secondly, the characteristics of in-service mathematics teacher's needs and retentions for TPACK were clear, and TPACK's starting line of in-service mathematics teacher can be different from pre-mathematics teacher's. The retentions was high in the order of CK, PCK and PK, and the needs was higher in the order of TPACK, TCK, TK and TPK. All of the higher retentions were knowledge related to PCK, and the value of CK was extremely high among them. In addition, mathematics teachers recognized needs for integrated knowledge related to technology, and they needed more TCK than TPK. The difference between needs and retentions showed that all items except two items in the PK were significant. Retentions of all items in CK was higher than needs, needs of all items in TK, TCK, TPK and TPACK was higher than retentions, PK and PCK were mixed. Thirdly, based on the analysis of Borich's educational needs and the Locus for Focus model, teacher education on TPACK for mathematics teachers needs to focus on TPACK, TK, TCK, and TPK. Specifically, TPACK needs to combine technology in terms of creativity-convergence, mathematical connections, communication, improvement of evaluation quality, and TK needs to new technology acquisition, function of utilizing technology, troubleshoot problems with technology, TCK needs to mathematical value(esthetic, practical) with technology, and TPK needs to consider technology in terms of evaluation methods, teaching and learning methods, improvement of pedagogy. Therefore, when determining the direction of teacher education related to TPACK in the future, if they try to reflect these items in detail, the teachers could participate more actively and receive practical help.

The Korean Peninsula security and Military Strategy of USA and China (미.중의 군사전략과 한반도 안보)

  • Son, Do-Sim
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.289-350
    • /
    • 2006
  • The world has been rapidly restructured in an agenda of national security from center of military strength to that of economic strength since the post cold-war era China military leadership-division carried out RMA through learning of a lesson from Gulf war in 1990 -1991 and Iraq war in 2003, thus the leadership-division made an attempt to convert the military system to a technical intensive system. The principle based on RMA of China military is (National defense strategy) drafted by the central military committee 1985 and (Four modernization general principles) 1978. China has introduced Russian high-technological arms and equipment in order to build up the military arms greatly thanks to an economical development, and they take pragmatism line as chinese socialism with their strategy to make secure a position as military powers such as they successfully launched a manned spacecraft and are building an air-craft carrie and soon. USA has a theory of dichotomy whether a country is a cooperator for USA, or not. and also enemy or friend since 9.11terror, thus USA is different from their direction of police. This is because USA stands a position as the superpower of the supremacy hegemony of the world. We must be carefully aware that USA considers as important area for Middle east, West south Asia, Central Asia and Northwest Asia to meet the demands of 2lcentury. Accordingly, the focus of USA's military strategy will be probably concentrated at the above mentioned four areas. On the other hand, USA enjoys such a superpower position due to collapse of USSR which was the past main enemy since the post cold war era. We could give an conclusive example as fact that USA has recurred to unilateralism But USA carry on the military operations to the terror groups at global around by converting thje military strike strategy to pre-emptive strike strategy since9.11 terror, 2001. USA seeks for transformation to the mobile military forces with light-quantity oriented in order to carry on such the military operations and makes progress GPR, And the USA forces in Korea makes progress a military renovation as part of such a military strategy. On the other hand, USA promotes the measures of choose for the countries standing at the crossroads of strategy and carries forward a main scheme of provision for four priority aims that the leaders of a hostile country and mis-country shall be prohibited from use and obtainment of weapons of mass destruction. Accordingly, this treatise found out a significant meaning to have an effect on the national security in the korean peninsula.

  • PDF

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.

Role of soy lecithin combined with soy isoflavone on cerebral blood flow in rats of cognitive impairment and the primary screening of its optimum combination

  • Hongrui Li;Xianyun Wang;Xiaoying Li;Xueyang Zhou;Xuan Wang;Tiantian Li;Rong Xiao;Yuandi Xi
    • Nutrition Research and Practice
    • /
    • v.17 no.2
    • /
    • pp.371-385
    • /
    • 2023
  • BACKGROUND/OBJECTIVES: Soy isoflavone (SIF) and soy lecithin (SL) have beneficial effects on many chronic diseases, including neurodegenerative diseases. Regretfully, there is little evidence to show the combined effects of these soy extractives on the impairment of cognition and abnormal cerebral blood flow (CBF). This study examined the optimal combination dose of SIF + SL to provide evidence for improving CBF and protecting cerebrovascular endothelial cells. MATERIALS/METHODS: In vivo study, SIF50 + SL40, SIF50 + SL80 and SIF50 + SL160 groups were obtained. Morris water maze, laser speckle contrast imaging (LSCI), and hematoxylin-eosin staining were used to detect learning and memory impairment, CBF, and damage to the cerebrovascular tissue in rat. The 8-hydroxy-2'-deoxyguanosine (8-OHdG) and the oxidized glutathione (GSSG) were detected. The anti-oxidative damage index of superoxide dismutase (SOD) and glutathione (GSH) in the serum of an animal model was also tested. In vitro study, an immortalized mouse brain endothelial cell line (bEND.3 cells) was used to confirm the cerebrovascular endothelial cell protection of SIF + SL. In this study, 50 µM of Gen were used, while the 25, 50, or 100 µM of SL for different incubation times were selected first. The intracellular levels of 8-OHdG, SOD, GSH, and GSSG were also detected in the cells. RESULTS: In vivo study, SIF + SL could increase the target crossing times significantly and shorten the total swimming distance of rats. The CBF in the rats of the SIF50 + SL40 group and SIF50 + SL160 group was enhanced. Pathological changes, such as attenuation of the endothelium in cerebral vessels were much less in the SIF50 + SL40 group and SIF50 + SL160 group. The 8-OHdG was reduced in the SIF50 + SL40 group. The GSSG showed a significant decrease in all SIF + SL pretreatment groups, but the GSH showed an opposite result. SOD was upregulated by SIF + SL pretreatment. Different combinations of Genistein (Gen)+SL, the secondary proof of health benefits found in vivo study, showed they have effective anti-oxidation and less side reaction on protecting cerebrovascular endothelial cell. SIF50 + SL40 in rats experiment and Gen50 + SL25 in cell test were the optimum joint doses on alleviating cognitive impairment and regulating CBF through protecting cerebrovascular tissue by its antioxidant activity. CONCLUSIONS: SIF+SL could significantly prevent cognitive defect induced by β-Amyloid through regulating CBF. This kind of effect might be attributed to its antioxidant activity on protecting cerebral vessels.

Usage and Analysis on Readability of Korean Typography in WBI for Children (효과적인 아동용 WBI를 위한 한글 타이포그래피의 가해성 분석과 활용)

  • Han, Jeong-Hye;Kim, Yong-Dae
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.3
    • /
    • pp.328-337
    • /
    • 2002
  • Looking at multimedia education contents from a design point of view, the instructor's design model may differ from the child's understanding model due to gap of the instructor's and child's knowledge. This fact implies it impacts the effectiveness of the education contents. The learning efficiency of Korean typography in WBI for children depends on the font-family, line space, font-size, the age of user, the output device such as the monitor, and other various factors. In this paper, we measured and analyzed on readability of Korean typography in WBI for children by reading speed method. The results of experiments show that readability depends on the font-family of typography, age(grade), and sex of children. In detail, "Goolymche" has the shortest time to be read, and girl and the highest grade students of elementary school have shorter time than boy and the lower grade students. Moreover, we consider the elegance of typography in WBI for holding children's interests because they prefer "Yopseoche". We provide some CSSs in WBI for children based on the experimental results, to used in school fields.

  • PDF