• Title/Summary/Keyword: Learning Patterns

Search Result 1,186, Processing Time 0.028 seconds

Traffic Anomaly Identification Using Multi-Class Support Vector Machine (다중 클래스 SVM을 이용한 트래픽의 이상패턴 검출)

  • Park, Young-Jae;Kim, Gye-Young;Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1942-1950
    • /
    • 2013
  • This paper suggests a new method of detecting attacks of network traffic by visualizing original traffic data and applying multi-class SVM (support vector machine). The proposed method first generates 2D images from IP and ports of transmitters and receivers, and extracts linear patterns and high intensity values from the images, representing traffic attacks. It then obtains variance of ports of transmitters and receivers and extracts the number of clusters and entropy features using ISODATA algorithm. Finally, it determines through multi-class SVM if the traffic data contain DDoS, DoS, Internet worm, or port scans. Experimental results show that the suggested multi-class SVM-based algorithm can more effectively detect network traffic attacks.

The Spatial and Social Characteristics of the Farmland Reduction Area in Urban Vicinity - Focusing on Gimhae City in Gyeongsangnamdo - (도시주변 농지감소지역의 공간 및 사회적 특성 - 경상남도 김해시를 중심으로 -)

  • Lee, Seung-Hye;Lee, Yoo-Jick
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.1
    • /
    • pp.99-111
    • /
    • 2018
  • This study was conducted for the purpose of deriving implications by observing the changing patterns and characteristics of the farmland reduction area in urban vicinity with Gimhae city, Gyeongsangnam-do as the subject. In order to achieve this goal, we first examined the problems and possibilities of farmland reduction area in urban vicinity through a theoretical review. Additionally, the characteristics of land use and community were examined for Gimhae city, Gyeongsangnam-do. The results of the study are summarized as follows. First, for 35 years from 1981 to 2015, Gimhae decreased $50.52km^2$ of farmland, which is about 17.4 times that of Yoido, and about 69.4% of the decreased farmland area. Second, the decrease in agricultural land has been expanding to the whole of Gimhae City from 1990 to 2010, and has been continuing since 2010 around dong-area. Third, in the farmland reduction area in urban vicinity, the number of settlements increases rapidly, but the aging population also increases. Fourth, the composition of the community is getting complicated with the change of the members. Taken together, it is necessary to manage the area efficiently because rapid change is present in the farmland reduction area in urban vicinity. Based on this, the implications are summarized as follows. First, there is a change in land use due to the reduction of farmland not designated as agricultural development region. Therefore, it is necessary to supplement the farmland-conversion standard. Second, despite the fact that land use management has been carried out, there have been problems such as uncontrolled development due to the development pressure beyond institutional management, and therefore it is necessary to improve the structural defects of the pertinent legal system. Fourth, while the traditional farming activities are decreasing with the decrease of agricultural land area, the increase in farms with secondary jobs and the urban-rural interchanges organization's efforts can lead to increased visits from outsiders that seek rural tourism and experiential learning.

Enhancing Visualization in Self-Organizing Maps (SOM에서 개체의 시각화)

  • Um Ick-Hyun;Huh Myung-Hoe
    • The Korean Journal of Applied Statistics
    • /
    • v.18 no.1
    • /
    • pp.83-98
    • /
    • 2005
  • Exploring distributional patterns of multivariate data is very essential in understanding the characteristics of given data set, as well as in building plausible models for the data. For that purpose, low-dimensional visualization methods have been developed by many researchers along various directions. As one of methods, Kohonen's SOM (Self-Organizing Map) is prominent. SOM compresses the volume of the data, yields abstraction from the data and offers visual display on low-dimensional grids. Although it is proven quite effective, it has one undesirable property: SOM's display is discrete. In this study, we propose two techniques for enhancing quality of SOM's display, so that SOM's display becomes continuous. The proposed methods are demonstrated in two numerical examples.

The Quality Assurance Technique of Resistance Spot Welding Pieces using Neuro-Fuzzy Algorithm (뉴로-퍼지 알고리즘을 이용한 점용접재의 강도추론 기술)

  • Kim, Joo-Seok;Choo, Youn-Joon;Lee, Sang-Ryong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.10
    • /
    • pp.141-151
    • /
    • 1999
  • The resistance Spot Welding is widely used in the field of assembling the plates. However we don't still have any satisfactory solution, which is non-destructive quality evaluation in real-time or on-line, against it. Moreover, even though the rate of welding under the condition of expulsion has been high until now, quality control of welding against expulsion hasn't still been established. In this paper, it was proposed on the quality assurance technique of resistance spot welding pieces using Neuro-Fuzzy algorithm. Four parameters from electrode separation signal in the case of non-expulsion, and dynamic resistance patterns in the case of expulsion are selected as fuzzy input parameters. The parameters consist of Fuzzy Inference System are determined through Neuro-Learning algorithm. And then, fuzzy Inference System is constructed. It was confirmed that the fuzzy inference values of strength have within ${\pm}$4% error specimen in comparison with real strength for the total strength range, and the specimen percent having within ${\pm}$1% error was 88.8%. According to KS(Korean Industrial Standard), tensile-shear strength limit for electric coated of zinc is 400kgf/mm2. Judging to the quality of welding is good or bad, according to this criterion and the results of inference, the probability of misjudgement that good quality is valuated into poor one was 0.43%, on contrary it was 2.59%. Finally, the proposed Neuro-Fuzzy Inference System can infer the tensile-shear strength of resistance spot welding pieces with high performance for all cases-non-expulsion and expulsion. And On-Line Welding Quality Inspection System will be realized sooner or later.

  • PDF

Non-Textual Elements as Opportunities to Learn: An Analysis of Korean and U.S. Mathematics Textbooks (학습기회로서의 비문자적 표상 분석: 한미 중등 수학교과서 사례 연구)

  • Kim, Rae-Young
    • School Mathematics
    • /
    • v.12 no.4
    • /
    • pp.605-617
    • /
    • 2010
  • This study explores the characteristics and roles of non-textual elements in secondary mathematics textbooks in the United States and South Korea, using a conceptual framework that I have developed: variety, contextuality, and connectivity. Analyzing five U.S. standards-based textbooks and 13 Korean textbooks, this study shows that although non-textual elements in mathematics textbooks are free of literal language, they exhibit different emphases and reflect assumptions about what is important in learning mathematics and how it can be taught and learned in a particular societal context (Mishra, 1999; Zazkis & Gadowsky, 2001). While there are similar patterns in the use of different types of non-textual elements in textbooks from both countries, different opportunities are provided for students to learn mathematics between the two countries.

  • PDF

An Outlier Cluster Detection Technique for Real-time Network Intrusion Detection Systems (실시간 네트워크 침입탐지 시스템을 위한 아웃라이어 클러스터 검출 기법)

  • Chang, Jae-Young;Park, Jong-Myoung;Kim, Han-Joon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.43-53
    • /
    • 2007
  • Intrusion detection system(IDS) has recently evolved while combining signature-based detection approach with anomaly detection approach. Although signature-based IDS tools have been commonly used by utilizing machine learning algorithms, they only detect network intrusions with already known patterns, Ideal IDS tools should always keep the signature database of your detection system up-to-date. The system needs to generate the signatures to detect new possible attacks while monitoring and analyzing incoming network data. In this paper, we propose a new outlier cluster detection algorithm with density (or influence) function, Our method assumes that an outlier is a kind of cluster with similar instances instead of a single object in the context of network intrusion, Through extensive experiments using KDD 1999 Cup Intrusion Detection dataset. we show that the proposed method outperform the conventional outlier detection method using Euclidean distance function, specially when attacks occurs frequently.

  • PDF

An Efficient Damage Information Extraction from Government Disaster Reports

  • Shin, Sungho;Hong, Seungkyun;Song, Sa-Kwang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.55-63
    • /
    • 2017
  • One of the purposes of Information Technology (IT) is to support human response to natural and social problems such as natural disasters and spread of disease, and to improve the quality of human life. Recent climate change has happened worldwide, natural disasters threaten the quality of life, and human safety is no longer guaranteed. IT must be able to support tasks related to disaster response, and more importantly, it should be used to predict and minimize future damage. In South Korea, the data related to the damage is checked out by each local government and then federal government aggregates it. This data is included in disaster reports that the federal government discloses by disaster case, but it is difficult to obtain raw data of the damage even for research purposes. In order to obtain data, information extraction may be applied to disaster reports. In the field of information extraction, most of the extraction targets are web documents, commercial reports, SNS text, and so on. There is little research on information extraction for government disaster reports. They are mostly text, but the structure of each sentence is very different from that of news articles and commercial reports. The features of the government disaster report should be carefully considered. In this paper, information extraction method for South Korea government reports in the word format is presented. This method is based on patterns and dictionaries and provides some additional ideas for tokenizing the damage representation of the text. The experiment result is F1 score of 80.2 on the test set. This is close to cutting-edge information extraction performance before applying the recent deep learning algorithms.

Analysis of Time Life in North Korean with the perspectives of Defectors (탈북인을 통해 본 북한의 시간생활 실태 및 남한과의 차이점 분석)

  • 이기영;이기춘;이은영;이순형;김대년;박영숙;최연실
    • Journal of Family Resource Management and Policy Review
    • /
    • v.4 no.2
    • /
    • pp.57-73
    • /
    • 2000
  • The Purpose of this study is to scrutinize the time structure and time use pattern of North Korean and to identify the differences of time use patterns between South and North Korean Societies. To carry out this Purpose in-depth interviews with ten people who escaped from North Korea after 1990 and empirical survey with 158 subjects were conducted. The findings are as follows. The characteristics of time life of North Korean are uniform time use pattern in tightly scheduled daily life and shortage of disposable time and constraint of free time due to job related labor, extra job activities including learning, meeting and evaluation, and labor mobilization. Women are faced with heavy burden of doing job and housework in the continuing patriarchal way of thinking and in the circumstances of poor housing environment. In North, Leisure time is constraint and leisure facilities are poor and the concept of leisure is totally different as that of South. North Korean think leisure as connecting with work and education and as public sphere, not private sphere. I this context leisure is considered as means for the strengthening of the communist society. Differences in the perception of time life through defectors are as follows. In South, there are plenty of leisure time and man can control his own time. Man spend his free time for various activities, especially for cultural activities such as sports, recreation, eating out with families and spend time till late in the outdoors. This study revealed differences in many aspects of time life between South and North Korean societies. These results will provide useful informations for the overcome of differences of cultural life of South and North Korean societies and accomplishment of the real integration of two societies.

  • PDF

Intrusion Detection System Based on Multi-Class SVM (다중 클래스 SVM기반의 침입탐지 시스템)

  • Lee Hansung;Song Jiyoung;Kim Eunyoung;Lee Chulho;Park Daihee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.282-288
    • /
    • 2005
  • In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This new intrusion detection system, named to MMIDS, was designed to satisfy all the following requirements : 1) Fast detection of new types of attack unknown to the system; 2) Provision of detail information about the detected types of attack; 3) cost-effective maintenance due to fast and efficient learning and update; 4) incrementality and scalability of system. The fast and efficient training and updating faculties of proposed novel multi-class SVM which is a core component of MMIDS provide cost-effective maintenance of intrusion detection system. According to the experimental results, our method can provide superior performance in separating similar patterns and detailed separation capability of MMIDS is relatively good.

Inference of Context-Free Grammars using Binary Third-order Recurrent Neural Networks with Genetic Algorithm (이진 삼차 재귀 신경망과 유전자 알고리즘을 이용한 문맥-자유 문법의 추론)

  • Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.11-25
    • /
    • 2012
  • We present the method to infer Context-Free Grammars by applying genetic algorithm to the Binary Third-order Recurrent Neural Networks(BTRNN). BTRNN is a multiple-layered architecture of recurrent neural networks, each of which is corresponding to an input symbol, and is combined with external stack. All parameters of BTRNN are represented as binary numbers and each state transition is performed with any stack operation simultaneously. We apply Genetic Algorithm to BTRNN chromosomes and obtain the optimal BTRNN inferring context-free grammar of positive and negative input patterns. This proposed method infers BTRNN, which includes the number of its states equal to or less than those of existing methods of Discrete Recurrent Neural Networks, with less examples and less learning trials. Also BTRNN is superior to the recent method of chromosomes representing grammars at recognition time complexity because of performing deterministic state transitions and stack operations at parsing process. If the number of non-terminals is p, the number of terminals q, the length of an input string k, and the max number of BTRNN states m, the parallel processing time is O(k) and the sequential processing time is O(km).