• Title/Summary/Keyword: 소프트웨어 테스트

Search Result 1,039, Processing Time 0.027 seconds

Development of a Simulator for RBF-Based Networks on Neuromorphic Chips (뉴로모픽 칩에서 운영되는 RBF 기반 네트워크 학습을 위한 시뮬레이터 개발)

  • Lee, Yeowool;Seo, Keyongeun;Choi, Daewoong;Ko, Jaejin;Lee, Sangyub;Lee, Jaekyu;Cho, Heyonjoong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.11
    • /
    • pp.251-262
    • /
    • 2019
  • In this paper, we propose a simulator that provides various algorithms of RBF networks on neuromorphic chips. To develop algorithms based on neuromorphic chips, the disadvantages of using simulators are that it is difficult to test various types of algorithms, although time is fast. This proposed simulator can simulate four times more types of network architecture than existing simulators, and it provides an additional a two-layer structure algorithm in particular, unlike RBF networks provided by existing simulators. This two-layer architecture algorithm is configured to be utilized for multiple input data and compared to the existing RBF for performance analysis and validation of utilization. The analysis showed that the two-layer structure algorithm was more accurate than the existing RBF networks.

Implementation Wireless Internet Security Connection System Using Bluetooth Beacon in Smart Factory (블루투스 비컨을 사용한 스마트 팩토리에서의 무선인터넷 보안 연결 시스템 구현)

  • Jang, Yun Seong;Shin, Soo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1705-1713
    • /
    • 2018
  • It is currently undergoing the fourth industrial revolution, which is the convergence of ICT and manufacturing, connecting both industrial equipment and production processes to one network and communicating with each other. The fact that they are connected to one network has the advantage of management, but there is a risk of security. In particular, Wi-Fi can be easily accessed by outsiders through a software change of the MAC address or password exposures. In this paper, by applying the method of Beacon using a Bluetooth Low Energy Add in Bluetooth 4.0, we propose a system of black-box approach to secure connections to wireless Internet, users do not have to know the password. We also implemented the proposed system using the raspberry pi and verified the effectiveness of a real-time system by testing the communication.

Development of Eye Tracker System for Early Childhood (유아용 시선 추적 장치의 개발 연구)

  • Lee, Byungho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.91-98
    • /
    • 2019
  • The purpose of this study was to develop and test an eye tracker focusing on early childhood participants, based on the characteristics of early childhood eye tracking studies. Eye tracking collects eye movement data of the subject, which provides scientific evidence of human cognition and thinking. The researcher built a Do It Yourself eye tracker camera module from general electronic components, and used Viewpoint analysis software from Arrington Research. The researcher compared the eye tracking data between the DIY eye tracker group and Tobii Pro eye tracker group, which provides a professional eye tracking system. Eye tracking data was collected from 52 five-year old children. The average proportion of valid trials between the two groups was compared with t test, and no significant difference was found. This result indicates that the DIY eye tracker can be used to collect valid eye tracking data from young children under certain research environment.

A Stock Price Prediction Based on Recurrent Convolution Neural Network with Weighted Loss Function (가중치 손실 함수를 가지는 순환 컨볼루션 신경망 기반 주가 예측)

  • Kim, HyunJin;Jung, Yeon Sung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.3
    • /
    • pp.123-128
    • /
    • 2019
  • This paper proposes the stock price prediction based on the artificial intelligence, where the model with recurrent convolution neural network (RCNN) layers is adopted. In the motivation of this prediction, long short-term memory model (LSTM)-based neural network can make the output of the time series prediction. On the other hand, the convolution neural network provides the data filtering, averaging, and augmentation. By combining the advantages mentioned above, the proposed technique predicts the estimated stock price of next day. In addition, in order to emphasize the recent time series, a custom weighted loss function is adopted. Moreover, stock data related to the stock price index are adopted to consider the market trends. In the experiments, the proposed stock price prediction reduces the test error by 3.19%, which is over other techniques by about 19%.

Determination of Intrusion Log Ranking using Inductive Inference (귀납 추리를 이용한 침입 흔적 로그 순위 결정)

  • Ko, Sujeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.1-8
    • /
    • 2019
  • Among the methods for extracting the most appropriate information from a large amount of log data, there is a method using inductive inference. In this paper, we use SVM (Support Vector Machine), which is an excellent classification method for inductive inference, in order to determine the ranking of intrusion logs in digital forensic analysis. For this purpose, the logs of the training log set are classified into intrusion logs and normal logs. The associated words are extracted from each classified set to generate a related word dictionary, and each log is expressed as a vector based on the generated dictionary. Next, the logs are learned using the SVM. We classify test logs into normal logs and intrusion logs by using the log set extracted through learning. Finally, the recommendation orders of intrusion logs are determined to recommend intrusion logs to the forensic analyst.

Implementation of an Arduino Compatible Modular Kit for Educational Purpose (모듈 기반 교육용 아두이노 호환 키트 제작)

  • Heo, Gyeongyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.547-554
    • /
    • 2019
  • With the curriculum revision in 2015, informatics for secondary high schools was designated as mandatory. As a result, there is an increasing interest in programming in elementary and junior high schools as well as in universities. Arduino is one of the famous tools for programming education, and the usefulness of it has been proven through various case studies. However, existing Arduino-based kits have hardware-dependent drawbacks such as complicated wiring, poor scalability, etc. To overcome these problems, we proposed a kit design, which has a module-based structure, can be extended through one common interface, and can be used for learning at various levels. In this paper, we describe the implementation details of FRUTO kit and a software to use it, which satisfies the proposed design criteria. FRUTO kit has been determined in its current form through several design changes, and is under pre-test before launching.

An LSTM Method for Natural Pronunciation Expression of Foreign Words in Sentences (문장에 포함된 외국어의 자연스러운 발음 표현을 위한 LSTM 방법)

  • Kim, Sungdon;Jung, Jaehee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.4
    • /
    • pp.163-170
    • /
    • 2019
  • Korea language has postpositions such as eul, reul, yi, ga, wa, and gwa, which are attached to nouns and add meaning to the sentence. When foreign notations or abbreviations are included in sentences, the appropriate postposition for the pronunciation of the foreign words may not be used. Sometimes, for natural expression of the sentence, two postpositions are used with one in parentheses as in "eul(reul)" so that both postpositions can be acceptable. This study finds examples of using unnatural postpositions when foreign words are included in Korean sentences and proposes a method for using natural postpositions by learning the final consonant pronunciation of nouns. The proposed method uses a recurrent neural network model to naturally express postpositions connected to foreign words. Furthermore, the proposed method is proven by learning and testing with the proposed method. It will be useful for composing perfect sentences for machine translation by using natural postpositions for English abbreviations or new foreign words included in Korean sentences in the future.

Single Shot Detector for Detecting Clickable Object in Mobile Device Screen (모바일 디바이스 화면의 클릭 가능한 객체 탐지를 위한 싱글 샷 디텍터)

  • Jo, Min-Seok;Chun, Hye-won;Han, Seong-Soo;Jeong, Chang-Sung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.1
    • /
    • pp.29-34
    • /
    • 2022
  • We propose a novel network architecture and build dataset for recognizing clickable objects on mobile device screens. The data was collected based on clickable objects on the mobile device screen that have numerous resolution, and a total of 24,937 annotation data were subdivided into seven categories: text, edit text, image, button, region, status bar, and navigation bar. We use the Deconvolution Single Shot Detector as a baseline, the backbone network with Squeeze-and-Excitation blocks, the Single Shot Detector layer structure to derive inference results and the Feature pyramid networks structure. Also we efficiently extract features by changing the input resolution of the existing 1:1 ratio of the network to a 1:2 ratio similar to the mobile device screen. As a result of experimenting with the dataset we have built, the mean average precision was improved by up to 101% compared to baseline.

Exploiting Korean Language Model to Improve Korean Voice Phishing Detection (한국어 언어 모델을 활용한 보이스피싱 탐지 기능 개선)

  • Boussougou, Milandu Keith Moussavou;Park, Dong-Joo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.10
    • /
    • pp.437-446
    • /
    • 2022
  • Text classification task from Natural Language Processing (NLP) combined with state-of-the-art (SOTA) Machine Learning (ML) and Deep Learning (DL) algorithms as the core engine is widely used to detect and classify voice phishing call transcripts. While numerous studies on the classification of voice phishing call transcripts are being conducted and demonstrated good performances, with the increase of non-face-to-face financial transactions, there is still the need for improvement using the latest NLP technologies. This paper conducts a benchmarking of Korean voice phishing detection performances of the pre-trained Korean language model KoBERT, against multiple other SOTA algorithms based on the classification of related transcripts from the labeled Korean voice phishing dataset called KorCCVi. The results of the experiments reveal that the classification accuracy on a test set of the KoBERT model outperforms the performances of all other models with an accuracy score of 99.60%.

Disease Prediction By Learning Clinical Concept Relations (딥러닝 기반 임상 관계 학습을 통한 질병 예측)

  • Jo, Seung-Hyeon;Lee, Kyung-Soon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.1
    • /
    • pp.35-40
    • /
    • 2022
  • In this paper, we propose a method of constructing clinical knowledge with clinical concept relations and predicting diseases based on a deep learning model to support clinical decision-making. Clinical terms in UMLS(Unified Medical Language System) and cancer-related medical knowledge are classified into five categories. Medical related documents in Wikipedia are extracted using the classified clinical terms. Clinical concept relations are established by matching the extracted medical related documents with the extracted clinical terms. After deep learning using clinical knowledge, a disease is predicted based on medical terms expressed in a query. Thereafter, medical terms related to the predicted disease are selected as an extended query for clinical document retrieval. To validate our method, we have experimented on TREC Clinical Decision Support (CDS) and TREC Precision Medicine (PM) test collections.