• 제목/요약/키워드: 컴퓨터 재구성

Search Result 422, Processing Time 0.025 seconds

Host-Based Intrusion Detection Model Using Few-Shot Learning (Few-Shot Learning을 사용한 호스트 기반 침입 탐지 모델)

  • Park, DaeKyeong;Shin, DongIl;Shin, DongKyoo;Kim, Sangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.271-278
    • /
    • 2021
  • As the current cyber attacks become more intelligent, the existing Intrusion Detection System is difficult for detecting intelligent attacks that deviate from the existing stored patterns. In an attempt to solve this, a model of a deep learning-based intrusion detection system that analyzes the pattern of intelligent attacks through data learning has emerged. Intrusion detection systems are divided into host-based and network-based depending on the installation location. Unlike network-based intrusion detection systems, host-based intrusion detection systems have the disadvantage of having to observe the inside and outside of the system as a whole. However, it has the advantage of being able to detect intrusions that cannot be detected by a network-based intrusion detection system. Therefore, in this study, we conducted a study on a host-based intrusion detection system. In order to evaluate and improve the performance of the host-based intrusion detection system model, we used the host-based Leipzig Intrusion Detection-Data Set (LID-DS) published in 2018. In the performance evaluation of the model using that data set, in order to confirm the similarity of each data and reconstructed to identify whether it is normal data or abnormal data, 1D vector data is converted to 3D image data. Also, the deep learning model has the drawback of having to re-learn every time a new cyber attack method is seen. In other words, it is not efficient because it takes a long time to learn a large amount of data. To solve this problem, this paper proposes the Siamese Convolutional Neural Network (Siamese-CNN) to use the Few-Shot Learning method that shows excellent performance by learning the little amount of data. Siamese-CNN determines whether the attacks are of the same type by the similarity score of each sample of cyber attacks converted into images. The accuracy was calculated using Few-Shot Learning technique, and the performance of Vanilla Convolutional Neural Network (Vanilla-CNN) and Siamese-CNN was compared to confirm the performance of Siamese-CNN. As a result of measuring Accuracy, Precision, Recall and F1-Score index, it was confirmed that the recall of the Siamese-CNN model proposed in this study was increased by about 6% from the Vanilla-CNN model.

Preliminary Study on the MR Temperature Mapping using Center Array-Sequencing Phase Unwrapping Algorithm (Center Array-Sequencing 위상펼침 기법의 MR 온도영상 적용에 관한 기초연구)

  • Tan, Kee Chin;Kim, Tae-Hyung;Chun, Song-I;Han, Yong-Hee;Choi, Ki-Seung;Lee, Kwang-Sig;Jun, Jae-Ryang;Eun, Choong-Ki;Mun, Chi-Woong
    • Investigative Magnetic Resonance Imaging
    • /
    • v.12 no.2
    • /
    • pp.131-141
    • /
    • 2008
  • Purpose : To investigate the feasibility and accuracy of Proton Resonance Frequency (PRF) shift based magnetic resonance (MR) temperature mapping utilizing the self-developed center array-sequencing phase unwrapping (PU) method for non-invasive temperature monitoring. Materials and Methods : The computer simulation was done on the PU algorithm for performance evaluation before further application to MR thermometry. The MR experiments were conducted in two approaches namely PU experiment, and temperature mapping experiment based on the PU technique with all the image postprocessing implemented in MATLAB. A 1.5T MR scanner employing a knee coil with $T2^*$ GRE (Gradient Recalled Echo) pulse sequence were used throughout the experiments. Various subjects such as water phantom, orange, and agarose gel phantom were used for the assessment of the self-developed PU algorithm. The MR temperature mapping experiment was initially attempted on the agarose gel phantom only with the application of a custom-made thermoregulating water pump as the heating source. Heat was generated to the phantom via hot water circulation whilst temperature variation was observed with T-type thermocouple. The PU program was implemented on the reconstructed wrapped phase images prior to map the temperature distribution of subjects. As the temperature change is directly proportional to the phase difference map, the absolute temperature could be estimated from the summation of the computed temperature difference with the measured ambient temperature of subjects. Results : The PU technique successfully recovered and removed the phase wrapping artifacts on MR phase images with various subjects by producing a smooth and continuous phase map thus producing a more reliable temperature map. Conclusion : This work presented a rapid, and robust self-developed center array-sequencing PU algorithm feasible for the application of MR temperature mapping according to the PRF phase shift property.

  • PDF

A Software Architecture for Supporting Dynamic Collaboration Environment on the Internet (인터넷 상에서의 동적인 협업 환경의 지원을 위한 소프트웨어 구조)

  • 이장호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.2
    • /
    • pp.146-157
    • /
    • 2003
  • Our experience with Internet-based scientific collaboratories indicates that they need to be user-extensible, allow users to add tools and objects dynamically to workspaces, per mit users to move work dynamically between private and shared workspaces, and be easily accessible on the Internet. We present the software architecture of a development environment, called Collaboratory Builder's Environment(CBE), for building collaboratories to meet such needs. CBE provides user extensibility by allowing a collaboratory to be constructed as a collection of collaborative applets. To support dynamic reconfiguration of shared workspaces, CBE uses the metaphor of room that can contain applets, users, and arbitrary data objects. Rooms can be used not only for synchronous collaboration but also for asynchronous collaboration by supporting persistence. For the access over the Internet room participants are given different roles with appropriate access rights. A prototype of the model has been implemented in Java and can be run from a Java-enabled Web browser. The implemented system had been used by 95 users including 79 space scientists around the world in a scientific campaign that ran for 4 days. The usage evaluation of the campaign is also presented.

Mobility Support Scheme Based on Machine Learning in Industrial Wireless Sensor Network (산업용 무선 센서 네트워크에서의 기계학습 기반 이동성 지원 방안)

  • Kim, Sangdae;Kim, Cheonyong;Cho, Hyunchong;Jung, Kwansoo;Oh, Seungmin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.256-264
    • /
    • 2020
  • Industrial Wireless Sensor Networks (IWSNs) is exploited to achieve various objectives such as improving productivity and reducing cost in the diversity of industrial application, and it has requirements such as low-delay and high reliability packet transmission. To accomplish the requirement, the network manager performs graph construction and resource allocation about network topology, and determines the transmission cycle and path of each node in advance. However, this network management scheme cannot treat mobile devices that cause continuous topology changes because graph reconstruction and resource reallocation should be performed as network topology changes. That is, despite the growing need of mobile devices in many industries, existing scheme cannot adequately respond to path failure caused by movement of mobile device and packet loss in the process of path recovery. To solve this problem, a network management scheme is required to prevent packet loss caused by mobile devices. Thus, we analyse the location and movement cycle of mobile devices over time using machine learning for predicting the mobility pattern. In the proposed scheme, the network manager could prevent the problems caused by mobile devices through performing graph construction and resource allocation for the predicted network topology based on the movement pattern. Performance evaluation results show a prediction rate of about 86% compared with actual movement pattern, and a higher packet delivery ratio and a lower resource share compared to existing scheme.

Validity of midsagittal reference planes constructed in 3D CT images (전산화단층사진을 이용한 3차원 영상에서 정중시상기준평면 설정에 관한 연구)

  • Jeon, Ye-Na;Lee, Ki-Heon;Hwang, Hyeon-Shik
    • The korean journal of orthodontics
    • /
    • v.37 no.3 s.122
    • /
    • pp.182-191
    • /
    • 2007
  • Objective: The purpose of this study was to evaluate the validity of midsagittal reference (MSR) planes constructed in maxillofacial 3D images. Methods: Maxillofacial computed tomography (CT) images were obtained in 36 normal occlusion individuals who did not have apparent facial asymmetry, and 3D images were reconstructed using a computer software. Six MSR planes (Cg-ANS-Ba, Cg-ANS-Op, Cg-PNS-Ba, Cg-PNS-OP, FH${\perp}$(Cg, Ba), FH${\perp}$(Cg, Op)) were constructed using the landmarks located in the midsagittal area of the maxillofacial structure, such as Cg, ANS, PNS, Ba and Op, and FH plane constructed with Po and Or. The six pairs of landmarks (Z, Fr, Fs, Zy, Mx, Ms), which represent right and left symmetry in the maxillofacial structure, were selected. Statistically significant differences of the right and the left measurements were examined through t-test, and the difference of the right and the left measurement was compared among the six MSR planes. Results: The distances from the right and the left landmarks in each pair to each MSR plane did not show a statistically significant difference. The reproducibility of the landmark identification was excellent. Conclusion: All the six planes constructed in this study can be used as a MSR plane in maxillofacial 3D analysis, particularly, the planes including Cg and ANS.

Reproducibilities of cephalometric measurements of three-dimensional CT images reconstructed in the personal computer (개인용 컴퓨터에서 재구성한 3차원 전산화단층영상의 두부계측 재현성)

  • Jeon Kug-Jin;Park Hyok;Lee Hee-Cheol;Kim Kee-Deog;Park Chang-Seo
    • Imaging Science in Dentistry
    • /
    • v.33 no.3
    • /
    • pp.171-178
    • /
    • 2003
  • Purpose: The purpose of this study was to report the reproducibility of intra-observer and inter-observer consistency of cephalometric measurements using three-dimensional (3D) computed tomography (CT), and the degree of difference of the cephalometric measurements. Materials and Methods: CT images of 16 adult patients with normal class I occlusion were sent to personal computer and reconstructed into 3D images using V-Works 3.5/sup TM/(Cybermed Inc., Seoul, Korea). With the internal program of V-Works 3.5/sup TM/, 12 landmarks on regular cephalograms were transformed into 21 analytic categories and measured by 2 observers and in addition, one of the observers repeated their measurements. Intra-observer difference was calculated using paired t-test, and inter-observer by two sample test. Results: There were significant differences in the intra-observer measurements (p < 0.05) in four of the categories which included ANS-Me, ANS-PNS, Cdl-Go (Lt), GoL-GoR, but with the exception of Cdl-Go (Lt), ZmL-ZmR, Zyo-Zyo, the average differences were within 2 mm of each other. The inter-observer observations also showed significant differences in the measurements of the ZmL-ZmR and Zyo-Zyo categories (p < 0.05). With the exception of the Cdl-Me (Rt), ZmL-ZmR, Zyo-Zyo categories, the average differences between the two observers were within 2 mm, but the ZmL-ZmR and Zyo-Zyo values differed greatly with values of 8.10 and 19.8 mm respectively. Conclusion: In general, 3D CT images showed greater accuracy and reproducibility, with the exception of suture areas such as Zm and Zyo, than regular cephalograms in orthodontic measurements, showing differences of less than 2 mm, therefore 3D CT images can be useful in cephalometric measurements and treatment planning.

  • PDF

Image Reconstruction of Eigenvalue of Diffusion Principal Axis Using Diffusion Tensor Imaging (확산텐서영상을 이용한 확산 주축의 고유치 영상 재구성)

  • Kim, In-Seong;Kim, Joo-Hyun;Yeon, Gun;Suh, Kyung-Jin;Yoo, Don-Sik;Kang, Duk-Sik;Bae, Sung-Jin;Chang, Yong-Min
    • Investigative Magnetic Resonance Imaging
    • /
    • v.11 no.2
    • /
    • pp.110-118
    • /
    • 2007
  • Purpose: The objective of this work to construct eigenvalue maps that have information of magnitude of three primary diffusion directions using diffusion tensor images. Materials and Methods: To construct eigenvalue maps, we used a 3.0T MRI scanner. We also compared the Moore-Penrose pseudo-inverse matrix method and the SVD (single value decomposition) method to calculate magnitude of three primary diffusion directions. Eigenvalue maps were constructed by calculating of magnitude of three primary diffusion directions. We did investigate the relationship between eigenvalue maps and fractional anisotropy map. Results: Using Diffusion Tensor Images by diffusion tensor imaging sequence, we did construct eigenvalue maps of three primary diffusion directions. Comparison between eigenvalue maps and Fractional Anisotropy map shows what is difference of Fractional Anisotropy value in brain anatomy. Furthermore, through the simulation of variable eigenvalues, we confirmed changes of Fractional Anisotropy values by variable eigenvalues. And Fractional anisotropy was not determined by magnitude of each primary diffusion direction, but it was determined by combination of each primary diffusion direction. Conclusion: By construction of eigenvalue maps, we can confirm what is the reason of fractional anisotropy variation by measurement the magnitude of three primary diffusion directions on lesion of brain white matter, using eigenvalue maps and fractional anisotropy map.

  • PDF

Improvement of Flood Forecasting System in the Nakdong River (낙동강홍수예보시스템 개선)

  • Yoon, Kwang-Seok;Lee, Min-Ho;Lee, Byung-Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.806-810
    • /
    • 2005
  • 홍수로 인한 국민의 재산과 인명피해를 방지 또는 최소화하기 위한 방법으로 주요지점을 선정하여 홍수예보를 수행하고 있다. 이러한 홍수예보는 초기 강우법, 수위법 등의 단순한 방법으로 수행되었으나, 컴퓨터가 발달되면서 여러 형태의 홍수유출모형이 개발되어 현재에는 홍수유출모형을 이용한 홍수예보를 수행하고 있다. 낙동강홍수예보 시스템은 1987년 낙동강홍수통제소의 개소시 42개소의 수위관측소와 54개소의 우량관측소를 중심으로 43개 소유역을 구분하고 티센망을 구성하여 홍수예보시스템을 구축하였다. 홍수예보시스템이 구축된 후 여러 차례의 매개변수 개선과정을 거쳐 운용하고 있다. 반면, 지속적인 수문관측소의 증설이 이루어졌으나 이를 모형에 반영하지 않아 증설된 수위관측소를 반영하여 114개 소유역으로 구분하고 추가된 우량관측소를 이용하여 티센망을 구성하였으며, 당초 반영되지 않았던 소규모댐을 모형에 추가하여 예측의 정확도를 재고하였다. 증설된 수문관측소를 모형에 반영과 함께 우량자료의 신뢰성 및 안정성을 확보하기 위한 우량관측소의 확장방안을 제시하였다. 본 연구에서 수행한 낙동강홍수예보 시스템의 소유역을 114개로 나누고 기존의 유효우량산정법, 유역유출모형 하도유출모형의 매개변수를 전통적인 방법으로 재산정하여 홍수기에 적용한 결과 당초의 홍수예보시스템으로 예측한 결과보다 소유역의 적절하게 재구성하는 것으로도 예측의 정밀도가 개선되었음을 확인할 수 있었다. 그러나, 소유역의 수와 하도의 수가 증가하면서 발생하는 오차를 감소시킬 필요성이 있으며, 이는 지속적인 시스템의 운용을 통하여 모형구성을 개선함으로서 어느 정도 개선될 것으로 판단된다. 그밖에 기존의 매개변수산정을 전통적인 방법에서 우리나라 하천 또는 낙동강유역의 하천에 적당한 방법을 개발하여 개선시킬 필요성이 있다.>$4.3\%$로 가장 근접한 결과를 나타내었으며, 총 유출량에서도 각각 $7.8\%,\;13.2\%$의 오차율을 가지는 것으로 분석되어 타 모형에 비해 실유량과의 차가 가장 적은 것으로 모의되었다. 향후 도시유출을 모의하는 데 가장 근사한 유출량을 산정할 수 있는 근거가 될 것이며, 도시재해 저감대책을 수립하는데 기여할 수 있을 것이라 판단된다.로 판단되는 대안들을 제시하는 예비타당성(Prefeasibility) 계획을 수립하였다. 이렇게 제시된 계획은 향후 과학적인 분석(세부평가방법)을 통해 대안을 평가하고 구체적인 타당성(feasibility) 계획을 수립하는데 토대가 될 것이다.{0.11R(mm)}(r^2=0.69)$로 나타났다. 이는 토양의 투수특성에 따라 강우량 증가에 비례하여 점증하는 침투수와 구분되는 현상이었다. 경사와 토양이 같은 조건에서 나지의 경우 역시 $Ro_{B10}(mm)=20.3e^{0.08R(mm)(r^2=0.84)$로 지수적으로 증가하는 경향을 나타내었다. 유거수량은 토성별로 양토를 1.0으로 기준할 때 사양토가 0.86으로 가장 작았고, 식양토 1.09, 식토 1.15로 평가되어 침투수에 비해 토성별 차이가 크게 나타났다. 이는 토성이 세립질일 수록 유거수의 저항이 작기 때문으로 생각된다. 경사에 따라서는 경사도가 증가할수록 증가하였으며 $10\% 경사일 때를 기준으로 $Ro(mm)=Ro_{10}{\times}0.797{\times}e^{-0.021s(\%)}$로 나타났다.천성 승모판 폐쇄 부전등을 초래하는 심각한 선천성 심질환이다. 그러나 진단 즉시 직접 좌관상동맥-대동맥 이식술로 수술적 교정을 해줌으로써 좋은 성적을 기대할 수 있음을 보

  • PDF

초임 중등 과학교사의 교수활동에서 나타나는 과학 내용에 대한 질적 연구

  • An, Yu-Min;Choe, Seung-Eon;Kim, Chan-Jong
    • 한국지구과학회:학술대회논문집
    • /
    • 2005.09a
    • /
    • pp.269-275
    • /
    • 2005
  • 중등 교육의 질을 확보하기 위한 가장 핵심적인 변인은 교사이며 교사의 자질 향상과 전문성 개발은 교육에 있어 중요한 화두이다. 교사의 전문성은 무엇보다도 교사의 가르치는 능력에서 확보되어야 하며 교과 내용 지식의 확보가 이를 위한 첫걸음이라고 할 수 있다. 본 연구에서는 수업과 심층면담에서 드러나는 초임 교사의 내용 지식(knowledge), 실천 행위(practice), 의미 이해 전략(sense-making strategy)을 분석하여 교사의 과학 내용에 대한 전문성을 파악하는 것을 목적으로 한다. 이를 위해 수도권의 중등학교에서 근무하는 여섯 명의 중등 초임 과학교사를 대상으로 각각 두 차례의 수업 관찰과 구조화된 면담, 한 차례의 우선순위 면담을 실시하였으며, 미시건 주립대학의 Knowles팀에서 개발한 분석틀을 사용하여 질적으로 분석하였다. 본 연구의 결과는 다음과 같다. 첫째, 초임 교사들은 그들이 지향하는 교사상에 따라 과학 교수 활동에 대해 다양한 의도를 가지고 있었으며 비전공 교과의 과학 내용 지식에 대해서는 다소 어려움을 표현하고 있었다. 둘째, 연구에 참여한 교사들은 대체로 교과서에 의존하여 교육과정에서 제시한 내용과 교과서에 제시된 지도 방법에 크게 의존하여 수업을 진행하고 있었으며 교과서 수준의 개념을 중심으로 나열하는 방식을 주로 사용하였다. 다만, 교사가 스스로 재구성한 내용을 바탕으로 자신의 내러티브로 이끌어가려는 시도가 드러나기도 하였다. 셋째, 학생들의 내용 이해를 돕기 위하여 중요한 과학적 개념을 강조하고 그러한 개념을 반복하는 전략을 주로 사용하였다. 그러나 일부 초임 교사의 사례에서는 적절한 비유와 예시를 도입하려는 시도가 발견되기도 하였다. 한편, 연구에 참여한 초임 교사들은 모두 전문성 개발을 위한 노력이 필요하다고 인식하였으며 교사 양성 과정에서 교직과 관련하여 실제적인 도움을 줄 수 있는 프로그램 개발의 필요성을 주장하였다.주로 나타났으며 우리나라 교육과정수업에서는 DC-DP DP-AD맥락의 반성적 탐구가 나타났다. 정리활동에서 우리나라 교육과정은 반성적 교육과정보다 자료 맥락의 영역개념을 더 자주 이용하고 다양한 맥락의 반성적 탐구가 나오고 있으며, 이는 우리나라 교육과정의 학습지의 활동이나 문제는 학생들에게 익숙하고, 자료 패턴을 가지고 행동결정으로 연결짓는 활동이 명확히 제시되었기 때문이라고 판단된다. 두 그룹의 상호작용 특징에 따른 반성적 탐구의 성향의 차이는 도입단계에서 그룹의 특징과 상관없이 A-AD, AD-SR맥락의 반성적 탐구가 나왔으며 전개와 정리단계에서는 N그룹에서는 DP와 관련된 의미 있는 반성적 탐구가 나오는 반면 M그룹에서는 이러한 맥락의 반성적 탐구는 아주 드물게 나타나며, GN과 관련된 행동결정이 자주 보이고 있었다. 정리활동시 주로 하는 기록 활동에서 N그룹에서는 다양한 맥락에서 반성적 탐구를 하고 있는 것에 비해 비교 그룹에서는 서로 견제하고 확인하는 상호작용의 특징에서 나타나는 AD-SR맥락의 반성적 탐구가 자주 나타났다. 반성적 탐구 척도 두 그룹을 비교 했을 때 CON 상호작용의 특징이 낮게 나타나는 N그룹이 양적으로 그리고 내용적으로 더 의미 있는 반성적 탐구를 했다용을 지원하는 홈페이지를 만들어 자료 제공 사이트에 대한 메타 자료를 데이터베이스화했으며 이를 통해 학생들이 원하는 실시간 자료를 검색하여 찾을 수 있고 홈페이지를 방분했을 때 이해하기 어려운 그래프나 각 홈페이지가 제공하는 자료들에 대한 처리 방법을 도움말로 제공받을 수 있게 했다. 실시간 자료들을 이용한 학습은 학생들의 학습 의욕과 탐구 능력을 향상시켰으며 컴퓨터 활용 능력과 외국어 자료 활용 능력을 향상 시키는데도 도움을 주었다.지역산업 발전을 위한 기술역량이 강화될 것이다.정 ${\rightarrow}$ 분배 ${\rightarrow}$ 최대다수의 최

  • PDF

A Recovery Technique of PDF File in the Unit of Page (PDF 파일의 페이지단위 복구 기법)

  • Jang, Jeewon;Bang, Seung Gyu;Han, Jaehyeok;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.25-30
    • /
    • 2017
  • The influence of the data deletion method which is one of anti-forensic techniques is substantial in terms of forensic analysis compared to its simplicity of the act. In academic world, recovery techniques on deleted files have been continuously studied in response to the data deletion method and representatively, the file system-based file recovery technique and file format based recovery technique exist. If there's metadata of deleted file in file system, the file can be easily recovered by using it, but if there's no metadata, the file is recovered by using the signature-based carving technique or the file format based recovery technique has to be applied. At this time, in the file format based recovery technique, the file structure analysis and possible recovery technique should be provided. This paper proposes the page recovery technique on deleted PDF file based on the structural characteristics of PDF file. This technique uses the tag value of page object which constitutes one page of PDF file. Object is extracted by utilizing each tag value as a kind of signature and by analyzing extracted object, the metadata of PDF file is recombined and then it's reconfigured page by page. Recovering by page means that even if deleted PDF file is damaged, even some pages consisting of PDF file can be recovered. Generally, if the file system based file is not recoverable, deleted file is recovered by applying the signature based carving technique. The technique which we proposed in this paper can recover PDF files that are damaged. In the digital forensic perspective, it can be utilized to recover more data than previously.