• Title/Summary/Keyword: Knowledge-based systems

Search Result 2,129, Processing Time 0.031 seconds

A Design and Implementation of a Web-based Ship ERP(SHERP) (웹기반 선박용 ERP (SHERP) 설계 및 구현)

  • Kim, Sang-Rak;Bae, Jae-Hak J.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.710-719
    • /
    • 2011
  • Shipping companies have become interested in the development of strategic ship assets management systems which are implemented for high competitiveness and business rationalization to meet the tough business environment of high oil prices and decrease in cargo. In this paper we introduce a ship assets management system that is suitable for the SAN(Ship Area Network) environment. This system is designed to execute business strategy of ship owners giving consideration to requirements of shipping stakeholders. In addition we have implemented it in a web-based ERP system (SHERP) which separates user interface and business logic. The SHERP is based on STEP and PLIB, which are international standards for data exchange of mechanical devices and parts. It also adopts a ship ontology to manage the ship information and knowledge during its life-cycle. The SHERP will be a concrete example of servitization of shipbuilding, as an information system which is used in ships and ship groups.

Collaborative Learning Supporting Agent for Facilitating Peer Interaction (상호작용 촉진을 위한 협력학습지원 에이전트)

  • Suh Hee-Jeon;Moon Kyung-Ae
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.547-556
    • /
    • 2005
  • Online collaborative teaming, which has emerged as a new type of education in knowledge-based society, is being discussed actively in the areas of action learning at companies and project-based learning and inquiry-based learning at schools. It regards as an effective method for improving learners practical and highly advanced problem solving abilities, and for stimulating their absorption into learning through pursuing common goals of learning together. Different from individual learning, however, collaborative learning involves complicated processes such as organizing teams, setting common goals, performing tasks and evaluating the outcome of team activities .Thus, it is difficult for a teacher to promote and evaluate the whole process of collaborative learning, and it is necessary to develop systems to support collaborative learning. Therefore, in order to monitor and promote interaction among learners in the process of collaborative learning, the present study developed an extensible collaborative teaming supporting agent (ECOLA) in online learning environments.

A Study on Preservation Metadata Elements for Research Information (연구정보를 위한 보존 메타데이터 요소 개발에 관한 연구: 경제·인문사회연구회 연구관리시스템을 중심으로)

  • Kim, Pan-Jun
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.4
    • /
    • pp.169-191
    • /
    • 2010
  • This study aimed at developing preservation metadata elements and its applications for research information which is considered as a valuable digital resource these days. Specifically, the developed preservation metadata intends to provide a basis for the research information of the government-funded research institutes in economic and social science fields which are major knowledge producers of national policy. To ensure the interoperability of the research information across various departments and organizations, this study compared the elements from the CERIF(European Standard) and those from the PREMIS Data Dictionary which is based on OAIS reference model (ISO 14721). Based on this comparative analysis, this study developed complementary preservation metadata elements based on the two standards' characteristics. Consequently, this study suggested a new preservation metadata elements and its applications that are compatible between the two systems and can be implemented in practice.

Web Service based Recommendation System using Inference Engine (추론엔진을 활용한 웹서비스 기반 추천 시스템)

  • Kim SungTae;Park SooMin;Yang JungJin
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.59-72
    • /
    • 2004
  • The range of Internet usage is drastically broadened and diversed from information retrieval and collection to many different functions. Contrasting to the increase of Internet use, the efficiency of finding necessary information is decreased. Therefore, the need of information system which provides customized information is emerged. Our research proposes Web Service based recommendation system which employes inference engine to find and recommend the most appropriate products for users. Web applications in present provide useful information for users while they still carry the problem of overcoming different platforms and distributed computing environment. The need of standardized and systematic approach is necessary for easier communication and coherent system development through heterogeneous environments. Web Service is programming language independent and improves interoperability by describing, deploying, and executing modularized applications through network. The paper focuses on developing Web Service based recommendation system which will provide benchmarks of Web Service realization. It is done by integrating inference engine where the dynamics of information and user preferences are taken into account.

  • PDF

DeepBlock: Web-based Deep Learning Education Platform (딥블록: 웹 기반 딥러닝 교육용 플랫폼)

  • Cho, Jinsung;Kim, Geunmo;Go, Hyunmin;Kim, Sungmin;Kim, Jisub;Kim, Bongjae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.43-50
    • /
    • 2021
  • Recently, researches and projects of companies based on artificial intelligence have been actively carried out. Various services and systems are being grafted with artificial intelligence technology. They become more intelligent. Accordingly, interest in deep learning, one of the techniques of artificial intelligence, and people who want to learn it have increased. In order to learn deep learning, deep learning theory with a lot of knowledge such as computer programming and mathematics is required. That is a high barrier to entry to beginners. Therefore, in this study, we designed and implemented a web-based deep learning platform called DeepBlock, which enables beginners to implement basic models of deep learning such as DNN and CNN without considering programming and mathematics. The proposed DeepBlock can be used for the education of students or beginners interested in deep learning.

Hot Keyword Extraction of Sci-tech Periodicals Based on the Improved BERT Model

  • Liu, Bing;Lv, Zhijun;Zhu, Nan;Chang, Dongyu;Lu, Mengxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1800-1817
    • /
    • 2022
  • With the development of the economy and the improvement of living standards, the hot issues in the subject area have become the main research direction, and the mining of the hot issues in the subject currently has problems such as a large amount of data and a complex algorithm structure. Therefore, in response to this problem, this study proposes a method for extracting hot keywords in scientific journals based on the improved BERT model.It can also provide reference for researchers,and the research method improves the overall similarity measure of the ensemble,introducing compound keyword word density, combining word segmentation, word sense set distance, and density clustering to construct an improved BERT framework, establish a composite keyword heat analysis model based on I-BERT framework.Taking the 14420 articles published in 21 kinds of social science management periodicals collected by CNKI(China National Knowledge Infrastructure) in 2017-2019 as the experimental data, the superiority of the proposed method is verified by the data of word spacing, class spacing, extraction accuracy and recall of hot keywords. In the experimental process of this research, it can be found that the method proposed in this paper has a higher accuracy than other methods in extracting hot keywords, which can ensure the timeliness and accuracy of scientific journals in capturing hot topics in the discipline, and finally pass Use information technology to master popular key words.

South-South Collaborations: A Policy Recommendation Model for Sustainable Win-Win Infrastructure Partnerships Based on Sino - Ghana and Nigeria Case.

  • Eshun, Bridget Tawiah Badu;Chan, Albert P.C.;Oteng, Daniel;Antwi-Afari, Maxwell Fordjour
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.33-41
    • /
    • 2022
  • Infrastructure procurement has been a major engagement route between China and Africa. This contributes immensely to the gradual infrastructure development seen on the continent. However, maturing discourse purports that these infrastructure collaborations lack intentionality in the continuous development of strategic guidelines and policies for effective implementation despite their uniqueness and criticality. This study proposes that an efficient approach to policy recommendations is through the political and economic analysis (PEA) of these partnerships using public-private partnership (PPP) optics. Unquestionably, these partnerships are representative of the concept of diplomatic transnational public-private partnership (DT-PPP) where infrastructure is procured through the collaboration of public (African governments) and private sector (Chinese state-owned corporations) who provide the managerial, financial, and technical resources for the project implementation. Given the quest for sustainable win-win, this study identifies strategies towards the realization of win-win in the implementation (i.e enablers of win-win) such that fairness and co-benefit, as well as interests, will be achieved. Thus, based on the PEA framework, case scenarios from Ghana and Nigeria using expert interviews identify the criticalities and best practices for the realization of these enablers at the development phase. Findings indicate more effort is required of the public sector (African host countries) in terms of people, structure/institutions, and the implementation processes. Recommendations include improvement of environmental management structures, contract administration procedures, external stakeholders/local community engagement mechanisms, knowledge and technology transfer procedures, and sector-based project operation and maintenance culture and systems. Additionally, actors must have emotional intelligence, good problem-solving abilities, and overall ensure cordial relationships for continued bilateral cooperation.

  • PDF

LSTM based Supply Imbalance Detection and Identification in Loaded Three Phase Induction Motors

  • Majid, Hussain;Fayaz Ahmed, Memon;Umair, Saeed;Babar, Rustum;Kelash, Kanwar;Abdul Rafay, Khatri
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.147-152
    • /
    • 2023
  • Mostly in motor fault detection the instantaneous values 3 axis vibration and 3phase current in time domain are acquired and converted to frequency domain. Vibrations are more useful in diagnosing the mechanical faults and motor current has remained more useful in electrical fault diagnosis. With having some experience and knowledge on the behavior of acquired data the electrical and mechanical faults are diagnosed through signal processing techniques or combine machine learning and signal processing techniques. In this paper, a single-layer LSTM based condition monitoring system is proposed in which the instantaneous values of three phased motor current are firstly acquired in simulated motor in in health and supply imbalance conditions in each of three stator currents. The acquired three phase current in time domain is then used to train a LSTM network, which can identify the type of fault in electrical supply of motor and phase in which the fault has occurred. Experimental results shows that the proposed single layer LSTM algorithm can identify the electrical supply faults and phase of fault with an average accuracy of 88% based on the three phase stator current as raw data without any processing or feature extraction.

A Study on Vulnerability Severity Evaluation Considering Attacker Skill Level Based on Time Series Characteristics (시계열 특성 기반의 공격자 기술 수준을 고려한 취약점 심각도 평가 방안 연구)

  • Seong-Su Yoon;Ieck-chae Euom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.281-293
    • /
    • 2023
  • Industrial control systems (ICS) are increasingly targeted by security incidents as attackers' knowledge of ICS characteristics grows and their connectivity to information technology expands. Vulnerabilities related to ICS are growing rapidly, but patching all vulnerabilities in a timely manner is challenging. The common vulnerability assessment system used to patch vulnerabilities has limitations as it does not consider weaponization after discovery. To address this, this study defines criteria for classifying attacker skill levels based on open information including operating technology and vulnerability information in ICS. The study also proposes a method to evaluate vulnerability severity that reflects actual risk and urgency by incorporating the corresponding attribute in the existing severity score calculation. Case studies based on actual accidents involving vulnerabilities were conducted to confirm the effectiveness of the evaluation method in the ICS environment.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.