• Title/Summary/Keyword: Evolving Algorithm

Search Result 110, Processing Time 0.024 seconds

A Study on the Analysis of Bridge Safety by Truck Platooning (차량 군집 주행에 따른 교량 안전성 분석에 관한 연구 )

  • Sangwon Park;Minwoo Chang;Dukgeun Yun;Minhyung No
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.27 no.2
    • /
    • pp.50-57
    • /
    • 2023
  • Autonomous driving technologies have been gradually improved for road traffic owing to the development of artificial intelligence. Since the truck platooning is beneficial in terms of the associated transporting expenses, the Connected-Automated Vehicle technology is rapidly evolving. The structural performance is, however, rarely investigated to capture the effect of truck platooning on civil infrastructures.In this study, the dynamic behavior of bridges under truck platooning was investigated, and the amplification factor of responses was estimated considering several parameters associated with the driving conditions. Artificial intelligence techniques were used to estimate the maximum response of the mid span of a bridge as the platooning vehicles passing, and the importance of the parameters was evaluated. The most suitable algorithm was selected by evaluating the consistency of the estimated displacement.

Comparison and Evaluation of Data Collection System Database for Edge-Based Lightweight Platform (엣지 기반 경량화 플랫폼을 위한 데이터 수집 시스템의 데이터베이스 비교 및 평가)

  • Woojin Cho;Chae-young Lim;Jae-hoi Gu
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.49-58
    • /
    • 2023
  • Factory energy management system is rapidly growing and evolving due to factors such as the 3rd Basic Energy Plan and global energy cost increases, as well as environmental issues. However, implementing an essential data collection system for energy management in factory settings, which have limited space and unique characteristics, presents spatial, environmental, and energy-related challenges. This paper endeavors to mitigate these challenges by devising a data collection system implemented through an edge-based lightweight platform. A comparison and evaluation of database operation on edge devices are conducted. To conduct the evaluation, a benchmarking tool called CDI Benchmark is developed, utilizing the characteristics of existing factories involved in practical applications. The evaluation results revealed that RDBMS systems like MySQL encountered errors in the database due to high data insertion loads, making them inoperable. On the other hand, InfluxDB, thanks to its highly efficient compression algorithm, demonstrated compression rates about 6 times higher than MyRocks according to the evaluation. However, it was observed that MyRocks outperformed InfluxDB by a significant margin, recording a maximum processing time approximately 80 times faster compared to InfluxDB.

  • PDF

Mining Frequent Trajectory Patterns in RFID Data Streams (RFID 데이터 스트림에서 이동궤적 패턴의 탐사)

  • Seo, Sung-Bo;Lee, Yong-Mi;Lee, Jun-Wook;Nam, Kwang-Woo;Ryu, Keun-Ho;Park, Jin-Soo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.127-136
    • /
    • 2009
  • This paper proposes an on-line mining algorithm of moving trajectory patterns in RFID data streams considering changing characteristics over time and constraints of single-pass data scan. Since RFID, sensor, and mobile network technology have been rapidly developed, many researchers have been recently focused on the study of real-time data gathering from real-world and mining the useful patterns from them. Previous researches for sequential patterns or moving trajectory patterns based on stream data have an extremely time-consum ing problem because of multi-pass database scan and tree traversal, and they also did not consider the time-changing characteristics of stream data. The proposed method preserves the sequential strength of 2-lengths frequent patterns in binary relationship table using the time-evolving graph to exactly reflect changes of RFID data stream from time to time. In addition, in order to solve the problem of the repetitive data scans, the proposed algorithm infers candidate k-lengths moving trajectory patterns beforehand at a time point t, and then extracts the patterns after screening the candidate patterns by only one-pass at a time point t+1. Through the experiment, the proposed method shows the superior performance in respect of time and space complexity than the Apriori-like method according as the reduction ratio of candidate sets is about 7 percent.

  • PDF

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments (무선 네트워크 환경에서의 효과적인 Quality of Protection(QoP) 평가)

  • Kim, Hyeon-Seung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.97-106
    • /
    • 2008
  • Quality of Protection(QoP) provides a standard that can evaluate networks offering protection. Also, QoP estimates stability of the system by quantifying intensity of the security. Security should be established based on the circumstance which applied to appropriate level, and this should chose a security policy which fit to propose of network because it is not always proportioned that between stability of security mechanism which is used at network and performance which has to be supported by system. With evolving wireless networks, a variety of security services are defined for providing secure wireless network services. In this paper, we propose a new QoP model which makes up for weak points of existing QoP model to choose an appropriate security policy for wireless network. Proposed new QoP model use objectively organized HVM by Flow-based Abnormal Traffic Detection Algorithm for constructing Utility function and relative weight for constructing Total reward function.

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

Hate Speech Detection Using Modified Principal Component Analysis and Enhanced Convolution Neural Network on Twitter Dataset

  • Majed, Alowaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.112-119
    • /
    • 2023
  • Traditionally used for networking computers and communications, the Internet has been evolving from the beginning. Internet is the backbone for many things on the web including social media. The concept of social networking which started in the early 1990s has also been growing with the internet. Social Networking Sites (SNSs) sprung and stayed back to an important element of internet usage mainly due to the services or provisions they allow on the web. Twitter and Facebook have become the primary means by which most individuals keep in touch with others and carry on substantive conversations. These sites allow the posting of photos, videos and support audio and video storage on the sites which can be shared amongst users. Although an attractive option, these provisions have also culminated in issues for these sites like posting offensive material. Though not always, users of SNSs have their share in promoting hate by their words or speeches which is difficult to be curtailed after being uploaded in the media. Hence, this article outlines a process for extracting user reviews from the Twitter corpus in order to identify instances of hate speech. Through the use of MPCA (Modified Principal Component Analysis) and ECNN, we are able to identify instances of hate speech in the text (Enhanced Convolutional Neural Network). With the use of NLP, a fully autonomous system for assessing syntax and meaning can be established (NLP). There is a strong emphasis on pre-processing, feature extraction, and classification. Cleansing the text by removing extra spaces, punctuation, and stop words is what normalization is all about. In the process of extracting features, these features that have already been processed are used. During the feature extraction process, the MPCA algorithm is used. It takes a set of related features and pulls out the ones that tell us the most about the dataset we give itThe proposed categorization method is then put forth as a means of detecting instances of hate speech or abusive language. It is argued that ECNN is superior to other methods for identifying hateful content online. It can take in massive amounts of data and quickly return accurate results, especially for larger datasets. As a result, the proposed MPCA+ECNN algorithm improves not only the F-measure values, but also the accuracy, precision, and recall.

A Coevolution of Artificial-Organism Using Classification Rule And Enhanced Backpropagation Neural Network (분류규칙과 강화 역전파 신경망을 이용한 이종 인공유기체의 공진화)

  • Cho Nam-Deok;Kim Ki-Tae
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.349-356
    • /
    • 2005
  • Artificial Organism-used application areas are expanding at a break-neck speed with a view to getting things done in a dynamic and Informal environment. A use of general programming or traditional hi methods as the representation of Artificial Organism behavior knowledge in these areas can cause problems related to frequent modifications and bad response in an unpredictable situation. Strategies aimed at solving these problems in a machine-learning fashion includes Genetic Programming and Evolving Neural Networks. But the learning method of Artificial-Organism is not good yet, and can't represent life in the environment. With this in mind, this research is designed to come up with a new behavior evolution model. The model represents behavior knowledge with Classification Rules and Enhanced Backpropation Neural Networks and discriminate the denomination. To evaluate the model, the researcher applied it to problems with the competition of Artificial-Organism in the Simulator and compared with other system. The survey shows that the model prevails in terms of the speed and Qualify of learning. The model is characterized by the simultaneous learning of classification rules and neural networks represented on chromosomes with the help of Genetic Algorithm and the consolidation of learning ability caused by the hybrid processing of the classification rules and Enhanced Backpropagation Neural Network.

Bargaining Game using Artificial agent based on Evolution Computation (진화계산 기반 인공에이전트를 이용한 교섭게임)

  • Seong, Myoung-Ho;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.293-303
    • /
    • 2016
  • Analysis of bargaining games utilizing evolutionary computation in recent years has dealt with important issues in the field of game theory. In this paper, we investigated interaction and coevolution process among heterogeneous artificial agents using evolutionary computation in the bargaining game. We present three kinds of evolving-strategic agents participating in the bargaining games; genetic algorithms (GA), particle swarm optimization (PSO) and differential evolution (DE). The co-evolutionary processes among three kinds of artificial agents which are GA-agent, PSO-agent, and DE-agent are tested to observe which EC-agent shows the best performance in the bargaining game. The simulation results show that a PSO-agent is better than a GA-agent and a DE-agent, and that a GA-agent is better than a DE-agent with respect to co-evolution in bargaining game. In order to understand why a PSO-agent is the best among three kinds of artificial agents in the bargaining game, we observed the strategies of artificial agents after completion of game. The results indicated that the PSO-agent evolves in direction of the strategy to gain as much as possible at the risk of gaining no property upon failure of the transaction, while the GA-agent and the DE-agent evolve in direction of the strategy to accomplish the transaction regardless of the quantity.

Effect of Illuminance on Color-based Analysis of Diabetes-Related Urine Fusion Analytes on Dipstick Using a Smartphone Camera (스마트폰 카메라를 활용한 뇨시험지 당뇨병관련 융합 분석인자의 색기반 분석에 미치는 외부 조도 영향)

  • Kim, Na-Kyung;Cho, Young-Sik;Kim, Seon-Chil
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.93-99
    • /
    • 2021
  • Recently, the miniaturization and digitalization for the inspection devices of point-of-care testing (POCT) are rapidly evolving. In the urine test, a lot of researches on index paper technology are being conducted because people can be self-diagnosed through visual color comparison using a urine test paper, Dipsick. The purpose of this study is to analyze the RGB values from the color changes on Dipstick Pad, which isused for urine test, using a smartphone camera. To this end, the primary, analytes in urine wasdiabetes-related parameters such as glucose, ketone body and pH, which is the most frequently tested elements, and we pursuited to quantify the changes in dipstick color caused from artificial urine containing different ranges of sugar, ketone body, and pH. In this experiment, changes in RGB values under bright and dark illuminances were compared, and changes in RGB value were monitored as a function of concentration of analytes under the ambient illumination of laboratory. As a result, color separation at the bright luminance region was good, but it did not appearat the low luminance region, and the changed profiles in RGB value under different illuminances was suggested to correct the problem of the color separation algorithm.

Prediction of Customer Satisfaction Using RFE-SHAP Feature Selection Method (RFE-SHAP을 활용한 온라인 리뷰를 통한 고객 만족도 예측)

  • Olga Chernyaeva;Taeho Hong
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.325-345
    • /
    • 2023
  • In the rapidly evolving domain of e-commerce, our study presents a cohesive approach to enhance customer satisfaction prediction from online reviews, aligning methodological innovation with practical insights. We integrate the RFE-SHAP feature selection with LDA topic modeling to streamline predictive analytics in e-commerce. This integration facilitates the identification of key features-specifically, narrowing down from an initial set of 28 to an optimal subset of 14 features for the Random Forest algorithm. Our approach strategically mitigates the common issue of overfitting in models with an excess of features, leading to an improved accuracy rate of 84% in our Random Forest model. Central to our analysis is the understanding that certain aspects in review content, such as quality, fit, and durability, play a pivotal role in influencing customer satisfaction, especially in the clothing sector. We delve into explaining how each of these selected features impacts customer satisfaction, providing a comprehensive view of the elements most appreciated by customers. Our research makes significant contributions in two key areas. First, it enhances predictive modeling within the realm of e-commerce analytics by introducing a streamlined, feature-centric approach. This refinement in methodology not only bolsters the accuracy of customer satisfaction predictions but also sets a new standard for handling feature selection in predictive models. Second, the study provides actionable insights for e-commerce platforms, especially those in the clothing sector. By highlighting which aspects of customer reviews-like quality, fit, and durability-most influence satisfaction, we offer a strategic direction for businesses to tailor their products and services.