• Title/Summary/Keyword: 블랙 박스

Search Result 355, Processing Time 0.025 seconds

Class Imbalance Resolution Method and Classification Algorithm Suggesting Based on Dataset Type Segmentation (데이터셋 유형 분류를 통한 클래스 불균형 해소 방법 및 분류 알고리즘 추천)

  • Kim, Jeonghun;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.3
    • /
    • pp.23-43
    • /
    • 2022
  • In order to apply AI (Artificial Intelligence) in various industries, interest in algorithm selection is increasing. Algorithm selection is largely determined by the experience of a data scientist. However, in the case of an inexperienced data scientist, an algorithm is selected through meta-learning based on dataset characteristics. However, since the selection process is a black box, it was not possible to know on what basis the existing algorithm recommendation was derived. Accordingly, this study uses k-means cluster analysis to classify types according to data set characteristics, and to explore suitable classification algorithms and methods for resolving class imbalance. As a result of this study, four types were derived, and an appropriate class imbalance resolution method and classification algorithm were recommended according to the data set type.

GPU Resource Contention Management Technique for Simultaneous GPU Tasks in the Container Environments with Share the GPU (GPU를 공유하는 컨테이너 환경에서 GPU 작업의 동시 실행을 위한 GPU 자원 경쟁 관리기법)

  • Kang, Jihun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.333-344
    • /
    • 2022
  • In a container-based cloud environment, multiple containers can share a graphical processing unit (GPU), and GPU sharing can minimize idle time of GPU resources and improve resource utilization. However, in a cloud environment, GPUs, unlike CPU or memory, cannot logically multiplex computing resources to provide users with some of the resources in an isolated form. In addition, containers occupy GPU resources only when performing GPU operations, and resource usage is also unknown because the timing or size of each container's GPU operations is not known in advance. Containers unrestricted use of GPU resources at any given point in time makes managing resource contention very difficult owing to where multiple containers run GPU tasks simultaneously, and GPU tasks are handled in black box form inside the GPU. In this paper, we propose a container management technique to prevent performance degradation caused by resource competition when multiple containers execute GPU tasks simultaneously. Also, this paper demonstrates the efficiency of container management techniques that analyze and propose the problem of degradation due to resource competition when multiple containers execute GPU tasks simultaneously through experiments.

A Study on Instructional Methods based on Computational Thinking Using Modular Data Analysis Tools for AI Education in Elementary School (모듈형 데이터 분석 도구를 활용한 컴퓨팅사고력 기반의 초등학교 인공지능교육 교수학습방법 연구)

  • Shin, Seungki
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.6
    • /
    • pp.917-925
    • /
    • 2021
  • This study aims to specify a constructivism-based instructional method using a modular data analysis tool. The value and meaning of a modular data analysis tool have been examined to be applied in the national curriculum for artificial intelligence education and the process of cultivating problem-solving ability based on computational thinking. The modular data analysis tool visually expresses the cognitive thinking process that forms the schema in equilibrating through assimilation and adjustment. Artificial intelligence education has features that embody abstract knowledge and structure the data analysis module through the represented schema as a BlackBox implemented as an algorithm. Therefore, the value of the modular data analysis tool could be examined because it has the advantage of connecting the conceptual and implicit schema.

A Study on the Change of Quality in a Residential Sector of Single Person Households in Seoul during the COVID-19: Analyze Variable Importance and Causality with Artificial Neural Networks and Logistic Regression Analysis (서울시 1인 가구의 코로나 19 전후 주거의 질 변화 연구: 인공신 경망과 로지스틱 회귀모형을 활용한 변수 중요도 및 인과관계 분석)

  • Jaebin, Lim;Kiseong, Jeong
    • Land and Housing Review
    • /
    • v.14 no.1
    • /
    • pp.67-82
    • /
    • 2023
  • Using the Artificial Neural Network model and Binary Logistic Regression model, this study investigates influence factors on the quality of life in terms of housing environment during the COVID-19 in Seoul. The results show that the lower the satisfaction level of housing policy, the lower the quality of life in the employment field and the lower the quality of residential field. On the other hand, permanent workers and self-employed respondents have experienced improvement in residential quality during the pandemic. A limitation of this study is associated with disentangling the causal relationship using the 'black box' characteristics of ANN method.

Query-Efficient Black-Box Adversarial Attack Methods on Face Recognition Model (얼굴 인식 모델에 대한 질의 효율적인 블랙박스 적대적 공격 방법)

  • Seo, Seong-gwan;Son, Baehoon;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1081-1090
    • /
    • 2022
  • The face recognition model is used for identity recognition of smartphones, providing convenience to many users. As a result, the security review of the DNN model is becoming important, with adversarial attacks present as a well-known vulnerability of the DNN model. Adversarial attacks have evolved to decision-based attack techniques that use only the recognition results of deep learning models to perform attacks. However, existing decision-based attack technique[14] have a problem that requires a large number of queries when generating adversarial examples. In particular, it takes a large number of queries to approximate the gradient. Therefore, in this paper, we propose a method of generating adversarial examples using orthogonal space sampling and dimensionality reduction sampling to avoid wasting queries that are consumed to approximate the gradient of existing decision-based attack technique[14]. Experiments show that our method can reduce the perturbation size of adversarial examples by about 2.4 compared to existing attack technique[14] and increase the attack success rate by 14% compared to existing attack technique[14]. Experimental results demonstrate that the adversarial example generation method proposed in this paper has superior attack performance.

Expansion of Product Liability : Applicability of SW and AI (제조물책임 범위의 확장 : SW와 AI의 적용가능성)

  • KIM, Yun-Myung
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.67-88
    • /
    • 2023
  • The expansion of the scope of product liability is necessary because the industrial environment has changed following the enactment of the Product Liability Act. Unlike human-coded algorithms, artificial intelligence is black-boxed according to machine learning, and even developers cannot explain the results. In particular, since the cause of the problem by artificial intelligence is unknown, the responsibility is unclear, and compensation for victims is not easy. This is because software or artificial intelligence is a non-object, and its productivity is not recognized under the Product Liability Act, which is limited to movable property. As a desperate measure, productivity may be recognized if it is stored or embedded in the medium. However, it is not reasonable to apply differently depending on the medium. The EU revise the product liability guidelines that recognize product liability when artificial intelligence is included. Although compensation for victims is the value pursued by the Product Liability Act, the essence has been overlooked by focusing on productivity. Even if an accident occurs using an artificial intelligence-adopted service, however, it is desirable to present standards according to practical risks instead of unconditionally holding product responsibility.

Development of an App-Based Bicycle Riding System (앱 기반 자전거 라이딩 시스템 개발)

  • Dong-Jin Shin;Seung-Yeon Hwang;Jae-Kon Oh;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.113-118
    • /
    • 2023
  • Recently, as more and more cyclists ride bicycles for their health and more people commute by bicycle, the number of cyclists has increased. However, as the number of users increases, many accidents occur, and the handling of bicycle accidents is unstable. It is inadequate to prepare for accidents in other ways except for safety equipment. Therefore, there is a need for a safe and convenient way for modern adults to ride. Unlike other apps, in this study, by adding a safety function, you can shoot a black box while riding, and a function to inform you that it is an accident-prone area is implemented. In addition, a function that can detect an accident using the Android built-in sensor and automatically make emergency contact is added. Cyclists can secure safety and convenience in one app without the need to use additional apps. Furthermore it develops an app system that allows you to talk about riding and share your route through the Riding Community bulletin board.

A Study on the analysis of ship motion using system identification method (시스템 식별법을 이용한 선체운동 해석에 관한 연구)

  • Song, Jaeyoung;Yim, Jeong-Bin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.271-271
    • /
    • 2019
  • Estimating ship motion is difficult because it take place in complex environments.. Estimating ship motion is an important factor in ensuring the safety of ship, so accurate estimates are needed. Existing motion-related studies compare the apparent motion of the model acquired and the reference model by experimenting with the ship motion on a particular alignment, making it difficult to intuitively estimate the hull motion. This study introduces the concept of estimating the characteristics of ship motion as a transfer function through pole-zero interpretation and frequency response analysis by applying the method of transfer function of Linear-Time Invariant system. Ship motion analysis model using Linear-Time Invariant system is consist with 1) wave as input signal 2) ship motion as output signal 3) hull defined as black box. This model can be defined by numericalizing the ship motion as a transfer function and is expected to facilitate the characterization of the ship motion through pole-zero analysis and frequency response analysis.

  • PDF

The Enhancement of intrusion detection reliability using Explainable Artificial Intelligence(XAI) (설명 가능한 인공지능(XAI)을 활용한 침입탐지 신뢰성 강화 방안)

  • Jung Il Ok;Choi Woo Bin;Kim Su Chul
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.101-110
    • /
    • 2022
  • As the cases of using artificial intelligence in various fields increase, attempts to solve various issues through artificial intelligence in the intrusion detection field are also increasing. However, the black box basis, which cannot explain or trace the reasons for the predicted results through machine learning, presents difficulties for security professionals who must use it. To solve this problem, research on explainable AI(XAI), which helps interpret and understand decisions in machine learning, is increasing in various fields. Therefore, in this paper, we propose an explanatory AI to enhance the reliability of machine learning-based intrusion detection prediction results. First, the intrusion detection model is implemented through XGBoost, and the description of the model is implemented using SHAP. And it provides reliability for security experts to make decisions by comparing and analyzing the existing feature importance and the results using SHAP. For this experiment, PKDD2007 dataset was used, and the association between existing feature importance and SHAP Value was analyzed, and it was verified that SHAP-based explainable AI was valid to give security experts the reliability of the prediction results of intrusion detection models.

Study of Risky Driving Decision Device using DGPS/RTK (DGPS/RTK를 이용한 위험운전 판단장치 성능검증에 관한 연구)

  • Oh, JuTaek;Lee, SangYong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.3D
    • /
    • pp.303-311
    • /
    • 2010
  • There have been various forms of systems such as a digital speedometer or a black box etc. to meet the social requirement for reducing traffic accidents and safe driving. However that systems are based on after-accident vehicle data, there is limit to prevent the accident before. So in our previous research, by storing, analyzing the Vehicle-dynamic information coming from driver's behavior, we are developing the decision-device which could provide driver with Alerting-Information in real-time to enhance the driver's safety drive. but the performance valuation is not yet executed. Finally, this study developed positional recognition system by using the DGPS for pre-developed risky driving decision device. The result of test analyzed with the same that the aggregated vehicle dynamics data in DGPS and dangerous risky driving decision device. If the performance of risky driving decision device is verified by precisely positional recognition system, the risky driving management of vehicle would be effected.