• 제목/요약/키워드: Machine Building

검색결과 568건 처리시간 0.022초

국내외 사이버보안 훈련 동향 (The Trends of Domestic and Overseas Cyber Security Training)

  • Lee, Daesung
    • 한국정보통신학회논문지
    • /
    • 제25권6호
    • /
    • pp.857-860
    • /
    • 2021
  • The 21st century society has entered the fourth industrial society of machine to machine from the information society of human to machine. Accordingly, countries around the world are always operating efficient crisis management systems that can quickly respond to disasters or crises. As cyber attacks such as cyber warfare are actually progressing, countries around the world are conducting defense training in response to cyber attacks, and reflecting the results of simulation attacks in improving or building security systems. In this paper, we would like to consider the future cyber training development guide by comparing and analyzing the trends of cyber training in domestic and foreign countries.

Hindi Correspondence of Bengali Nominal Suffixes

  • Chatterji, Sanjay
    • Journal of Multimedia Information System
    • /
    • 제8권4호
    • /
    • pp.221-232
    • /
    • 2021
  • One bottleneck of Bengali to Hindi transfer based machine translation system is the translation of suffixes of noun. The appropriate translation of a nominal suffix often depends on the semantic role of the corresponding noun chunk in the sentence. With the availability of a high performance Bengali morphological analyzer and a basic Bengali parser it is possible to identify the role of each noun chunk. This information may be used for building rules for translating the ambiguous nominal suffixes. As there are some similarities between the uses of Bengali and Hindi nominal suffixes we find that the rules may be identified by linguistically analyzing corpus data. In this paper, we identify rules for the ambiguous four Bengali nominal suffixes from corpus data and evaluate their performances. This set of rules is able to resolve a majority of the nominal suffix ambiguities in Bengali to Hindi transfer based machine translation system. Using the rules, we are able to translate 98.17% Bengali nouns correctly which is much better than the baseline ILMT system's accuracy of 62.8%.

Compressive strength estimation of eco-friendly geopolymer concrete: Application of hybrid machine learning techniques

  • Xiang, Yang;Jiang, Daibo;Hateo, Gou
    • Steel and Composite Structures
    • /
    • 제45권6호
    • /
    • pp.877-894
    • /
    • 2022
  • Geopolymer concrete (GPC) has emerged as a feasible choice for construction materials as a result of the environmental issues associated with the production of cement. The findings of this study contribute to the development of machine learning methods for estimating the properties of eco-friendly concrete to help reduce CO2 emissions in the construction industry. The compressive strength (fc) of GPC is predicted using artificial intelligence approaches in the present study when ground granulated blast-furnace slag (GGBS) is substituted with natural zeolite (NZ), silica fume (SF), and varying NaOH concentrations. For this purpose, two machine learning methods multi-layer perceptron (MLP) and radial basis function (RBF) were considered and hybridized with arithmetic optimization algorithm (AOA), and grey wolf optimization algorithm (GWO). According to the results, all methods performed very well in predicting the fc of GPC. The proposed AOA - MLP might be identified as the outperformed framework, although other methodologies (AOA - RBF, GWO - RBF, and GWO - MLP) were also reliable in the fc of GPC forecasting process.

Anomaly-Based Network Intrusion Detection: An Approach Using Ensemble-Based Machine Learning Algorithm

  • Kashif Gul Chachar;Syed Nadeem Ahsan
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.107-118
    • /
    • 2024
  • With the seamless growth of the technology, network usage requirements are expanding day by day. The majority of electronic devices are capable of communication, which strongly requires a secure and reliable network. Network-based intrusion detection systems (NIDS) is a new method for preventing and alerting computers and networks from attacks. Machine Learning is an emerging field that provides a variety of ways to implement effective network intrusion detection systems (NIDS). Bagging and Boosting are two ensemble ML techniques, renowned for better performance in the learning and classification process. In this paper, the study provides a detailed literature review of the past work done and proposed a novel ensemble approach to develop a NIDS system based on the voting method using bagging and boosting ensemble techniques. The test results demonstrate that the ensemble of bagging and boosting through voting exhibits the highest classification accuracy of 99.98% and a minimum false positive rate (FPR) on both datasets. Although the model building time is average which can be a tradeoff by processor speed.

Building Topic Hierarchy of e-Documents using Text Mining Technology

  • Kim, Han-Joon
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2004년도 e-Biz World Conference
    • /
    • pp.294-301
    • /
    • 2004
  • ·Text-mining approach to e-documents organization based on topic hierarchy - Machine-Learning & information Theory-based ㆍ 'Category(topic) discovery' problem → document bundle-based user-constraint document clustering ㆍ 'Automatic categorization' problem → Accelerated EM with CU-based active learning → 'Hierarchy Construction' problem → Unsupervised learning of category subsumption relation

  • PDF

A m-Business Application Case for Small Scale Company

  • Shi, Lin
    • 한국산업정보학회:학술대회논문집
    • /
    • 한국산업정보학회 2007년도 춘계학술대회
    • /
    • pp.209-212
    • /
    • 2007
  • A very detail instruction of a m-Business application case for small scale company is given. Two results are proved. The one is that m-business application can reduce system building and maintaining fee. The other is that m-business application should running on the mobile machine with caching some application data on it.

  • PDF

벽식구조 표준시험동에서 중량충격음장에 관한 연구 (Investigation of the heavy-weight floor impact sound field in a testing building with bearing wall structure)

  • 유승엽;이신영;전진용
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2007년도 춘계학술대회논문집
    • /
    • pp.969-973
    • /
    • 2007
  • The heavy-weight floor impact sound field of the receiving room in a testing building with bearing wall structure was investigated using bang machine and impact ball. The sound field was investigated through the impact sound pressure level distribution by the field measurement and computational analysis. Predicted sound field using the computational analysis agree with measurement result in the low frequency band. Result shows that standard deviations of the single number rating value are about 2dB in each impact source. Particularly, impact sound pressure level at 120cm height in 63Hz octave band was 5dB lower than spatial averaging value. It was found that receiving positions in the ministry of construction and transportation notice should be reconsidered.

  • PDF

강구조물 건설에서의 Building Information Modeling(BIM)의 도입 (Application of Building Information Modeling for Steel Structures)

  • 이석주;천진호
    • 한국전산구조공학회:학술대회논문집
    • /
    • 한국전산구조공학회 2006년도 정기 학술대회 논문집
    • /
    • pp.192-199
    • /
    • 2006
  • BIM is a collaborative. model-based way to work. Structural BIM is one of the key elements in the building process where the majority of structural information is created. Open BIM interfaces make it possible for all design information to be produced and managed within a single 3D product model. To make structural BIM a reality between owners, general contractors, architects and engineers. the software used need to be open in their communication. We used to Tekla Structures to provide an open environment through standard interfaces and Tekla Open API collaboration. We have developed MCP(machine cutting plan) and PIM(product information management)to provide cutting plan and drawing and manage to B.O.M, Materials, Production, Shipping and Project.

  • PDF

굴 패각을 골재로 사용한 모르타르의 온도별 가열 시간에 따른 휨·압축 강도에 관한 연구 (A Study on Bending, Compressive Strength of Mortar According to Temperature and Heating Time Change using Oyster Shell as Aggregate)

  • 유남규;정의인;김봉주
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2017년도 춘계 학술논문 발표대회
    • /
    • pp.131-132
    • /
    • 2017
  • As the building is becomes bigger and larger, it can lead to big damage in case of fire. Also, tunnel, machine room and underground joint are spaces that can cause high temperature fire above 1,350℃ in case of fire. Therefore, a refractory material is need that can be withstand in high temperatures for long time. One side, the composition of oyster shell is CaCO3 of 90% or more. It is expected that it will be possible to use it as a high calcium natural material which is the material of the refractory board. According to, Study on bending, compressive strength of mortar according to temperature and heating time change using oyster shell as aggregate the most commonly occurring particle sizes form 2.5mm to 5mm.

  • PDF

분급한 굴 패각을 골재로 사용한 모르타르의 가열 시간에 따른 휨·압축 강도에 관한 연구 (A study on bending, Compressive Strength of Mortar According to Temperature and Heating Time Change using Classified Oyster shell as Aggregate)

  • 유남규;홍상훈;정의인;김봉주
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2017년도 추계 학술논문 발표대회
    • /
    • pp.122-123
    • /
    • 2017
  • As the building is becomes bigger and larger, it can lead to big damage in case of fire. Also, tunnel, machine room and underground joint are spaces that can cause high temperature fire above 1,350℃ in case of fire. Therefore, a refractory material is need that can be withstand in high temperatures for long time. One side, the composition of oyster shell is CaCO3 of 90% or more. It is expected that it will be possible to use it as a high calcium natural material which is the material of the refractory board. According to, Study on bending, compressive strength of mortar according to temperature and heating time change using classified oyster shell as aggregate.

  • PDF