• Title/Summary/Keyword: Software Performance Analysis

Search Result 1,815, Processing Time 0.028 seconds

Comparison of Performance Between Incremental and Batch Learning Method for Information Analysis of Cyber Surveillance and Reconnaissance (사이버 감시정찰의 정보 분석에 적용되는 점진적 학습 방법과 일괄 학습 방법의 성능 비교)

  • Shin, Gyeong-Il;Yooun, Hosang;Shin, DongIl;Shin, DongKyoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.3
    • /
    • pp.99-106
    • /
    • 2018
  • In the process of acquiring information through the cyber ISR (Intelligence Surveillance Reconnaissance) and research into the agent to help decision-making, periodic communication between the C&C (Command and Control) server and the agent may not be possible. In this case, we have studied how to effectively surveillance and reconnaissance. Due to the network configuration, agents planted on infiltrated computers can not communicate seamlessly with C&C servers. In this case, the agent continues to collect data continuously, and in order to analyze the collected data within a short time in When communication is possible with the C&C server, it can utilize limited resources and time to continue its mission without being discovered. This research shows the superiority of incremental learning method over batch method through experiments. At an experiment with the restricted memory of 500 mega bytes, incremental learning method shows 10 times decrease in learning time. But at an experiment with the reuse of incorrectly classified data, the required time for relearn takes twice more.

A Study of the Effect of Acoustic Noise Attenuator on Auditory Functional MRI (소음 감쇠기를 이용한 청각의 뇌기능 자기공명영상)

  • Kim, S.H.;Kim, I.S.;Lee, J.J.;Park, J.A.;Lee, Y.J.;Yeo, J.R.;Bae, S.J.;Lee, S.H.;Chang, Y.
    • Investigative Magnetic Resonance Imaging
    • /
    • v.9 no.2
    • /
    • pp.134-139
    • /
    • 2005
  • Purpose : To evaluate the usefulness of acoustic noise attenuator on auditory fMRI examination. Materials and methods : The acoustic noise attenuator consists of mask, earmuff and silicon earplug. The soft polyurethane sheet and polyurethane form , which has a good soundproof characteristic were used for mask and earmuff. Auditory fMRI experiments of 500 Hz pure tone stimulation were performed in three different cases; first all of mask, earmuff and earplug, secondly earmuff and earplug only and finally without attenuator in 4 normal hearing volunteers. For data acquisition, BOLD MR imaging technique was employed at a 1.5T MR scanner equipped with high performance gradient system. The raw data were analyzed using a SPM-99 analysis software and the activation maps were obtained. Results : In case of all items of acoustic attenuator used, the results revealed that activation was focused on primary auditory area. When only earmuff and earplug were used, the results showed that the activation spread over primary auditory and secondary associative areas. Last, when no device used, only weak activation was observed on the right auditory cortex. Conclusion : It is expected that the acoustic noise attenuator, which consists of earplugs, earmuffs and mask, is a very useful device in auditory fMRI study.

  • PDF

Prognostic Significance of TP53 Mutations and Single Nucleotide Polymorphisms in Acute Myeloid Leukemia: A case Series and Literature Review

  • Zeichner, Simon Blechman;Alghamdi, Sarah;Elhammady, Gina;Poppiti, Robert John;Castellano-Sanchez, Amilcar
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.4
    • /
    • pp.1603-1609
    • /
    • 2014
  • Background: The response to treatment and overall survival (OS) of patients with acute myeloid leukemia (AML) is variable, with a median ranging from 6 months to 11.5 years. TP53 is associated with old age, chemotherapy resistance, and worse OS. Using genetic sequencing, we set out to look at our own experience with AML, and hypothesized that both TP53 mutations and SNPs at codon 72 would mimic the literature by occurring in a minority of patients, and conferring a worse OS. Materials and Methods: We performed a pilot study of randomly selected, newly diagnosed AML patients at Mount Sinai Medical Center, diagnosed from 2005-2008 (n=10). TP53 PCR sequencing was performed using DNA from bone marrow smears. Analysis was accomplished using Mutation Surveyor software with confirmation of the variants using the COSMIC and dbSNP databases. Results: Fewer than half of the patients harbored TP53 mutations (40%). There was no significant difference in OS based on gender, AML history, risk-stratified karyotype, or TP53 mutation. There were possible trends toward improved survival among patients less than 60 (11 vs 4 months, p=0.09), Hispanics (8 vs 1 months, p=0.11), and those not harboring SNP P72R (8 vs 2 months, p=0.10). There was a significant improvement in survival among patients with better performance status (28 vs 4 months, p=0.01) and those who did not have a complex karyotype (8 vs 1 months, p=0.03). The most commonly observed TP53 mutation was a missense N310K (40%) and the most commonly observed SNP was P72R (100.0%). Conclusions: Our study confirms previous reports that poor PS and the presence of a complex karyotype are associated with a decreased OS. In our cohort, TP53 mutations were relatively common, occurring more frequently in male patients with an adverse karyotype. Although there was no significant difference in survival between TP53 mutated and un-mutated patients, there was a possible trend toward worse OS among patients with SNP P72R. Larger studies are needed to validate these findings.

User Access Patterns Discovery based on Apriori Algorithm under Web Logs (웹 로그에서의 Apriori 알고리즘 기반 사용자 액세스 패턴 발견)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.681-689
    • /
    • 2019
  • Web usage pattern discovery is an advanced means by using web log data, and it's also a specific application of data mining technology in Web log data mining. In education Data Mining (DM) is the application of Data Mining techniques to educational data (such as Web logs of University, e-learning, adaptive hypermedia and intelligent tutoring systems, etc.), and so, its objective is to analyze these types of data in order to resolve educational research issues. In this paper, the Web log data of a university are used as the research object of data mining. With using the database OLAP technology the Web log data are preprocessed into the data format that can be used for data mining, and the processing results are stored into the MSSQL. At the same time the basic data statistics and analysis are completed based on the processed Web log records. In addition, we introduced the Apriori Algorithm of Web usage pattern mining and its implementation process, developed the Apriori Algorithm program in Python development environment, then gave the performance of the Apriori Algorithm and realized the mining of Web user access pattern. The results have important theoretical significance for the application of the patterns in the development of teaching systems. The next research is to explore the improvement of the Apriori Algorithm in the distributed computing environment.

A Study on Validation for Mapping of Gas Detectors at a BTX Plant (BTX 공정에서 Gas Detector Mapping 적정성 검토에 관한 연구)

  • Seo, Ji Hye;Han, Man Hyoeng;Kim, Il Kwon;Chon, Young Woo
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.5
    • /
    • pp.168-178
    • /
    • 2017
  • In order to prevent major and chemical accidents, some of the plants which would like to install and operate hazard chemicals handling facilities must submit Off-site Consequence Analysis due to recent arisen leak accidents since 2015. A lot of chemical industrials choose gas detectors as mitigation equipment to early detect gas vapor. The way of placement of gas detectors has two methods; Code-based Design(CBD) and Performance-based Design. The CBD has principles for gas detectors to be installed with consideration for the place that is expected to accumulate gas, and the leak locations according to legal standards and technical guidelines, and has a possibility to be unable to detect by these rules to locate gas detectors by vapor density information. The PBD has two methods; a Geographic Method and Scenario based Method. The Scenario-based Method has been suggested to make up for the Geographic Coverage Method. This Scenario-based Method draw the best optimum placement of gas detectors by considering leak locations, leak speed information, leak directions and etc. However, the domestic placement guidelines just refers to the CBD. Therefore, this study is to compare existing placement location of gas detectors by the domestic CBD with placement locations, coverages and the number of gas detectors in accordance with the Scenario-based Method. Also this study has measures for early detecting interest of Vapor Cloud and suitable placement of gas detectors to prevent chemical accidents. The Phast software was selected to simulate vapor cloud dispersion to predict the consequence. There are two cases; an accident hole size of leak(8 mm) from API which is the highst accident hole size less than 24.5 mm, and a normal leak hole size from KOSHA Guide (1.8 mm). Detect3D was also selected to locate gas detectors efficiently and compare CBD results and PBD results. Currently, domestic methods of gas detectors do not consider any risk, but just depend on domestic code methods which lead to placement of gas detectors not to make personnels recognize tolerable or intolerable risks. The results of the Scenario-based Method, however, analyze the leak estimated range by simulating leak dispersion, and then it is able to tell tolerable risks. Thus it is considered that individuals will be able to place gas detectors reasonably by making objectives and roles flexibly according to situations in a specific plant.

Facial Feature Detection and Facial Contour Extraction using Snakes (얼굴 요소의 영역 추출 및 Snakes를 이용한 윤곽선 추출)

  • Lee, Kyung-Hee;Byun, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.7
    • /
    • pp.731-741
    • /
    • 2000
  • This paper proposes a method to detect a facial region and extract facial features which is crucial for visual recognition of human faces. In this paper, we extract the MER(Minimum Enclosing Rectangle) of a face and facial components using projection analysis on both edge image and binary image. We use an active contour model(snakes) for extraction of the contours of eye, mouth, eyebrow, and face in order to reflect the individual differences of facial shapes and converge quickly. The determination of initial contour is very important for the performance of snakes. Particularly, we detect Minimum Enclosing Rectangle(MER) of facial components and then determine initial contours using general shape of facial components within the boundary of the obtained MER. We obtained experimental results to show that MER extraction of the eye, mouth, and face was performed successfully. But in the case of images with bright eyebrow, MER extraction of eyebrow was performed poorly. We obtained good contour extraction with the individual differences of facial shapes. Particularly, in the eye contour extraction, we combined edges by first order derivative operator and zero crossings by second order derivative operator in designing energy function of snakes, and we achieved good eye contours. For the face contour extraction, we used both edges and grey level intensity of pixels in designing of energy function. Good face contours were extracted as well.

  • PDF

A Simulation Study of Artificial Cochlea Based on Artificial Basilar Membrane for Improving the Performance of Frequency Separation (인공기저막 기반 인공와우의 주파수 분리 성능향상을 위한 인공기저막 전산모사)

  • Kim, Tae-In;Chang, Seong-Min;Song, Won-Joon;Bae, Sung-Jae;Kim, Wan-Doo;Cho, Maeng-Hyo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.4
    • /
    • pp.457-463
    • /
    • 2012
  • The basilar membrane (BM), one of organs of cochlea, has the specific positions of the maximum amplitude at each of related frequencies. This phenomenon is due to the geometry of BM. In this study, as the part of the research for the development of fully implantable artificial cochlea which is based on polymer membrane, parametric studies are performed to suggest the desirable artificial basilar membrane model which can detect wider range of frequency separation. The vibro-acoustic characteristics of the artificial basilar membrane are predicted through finite element analysis using commercial software Abaqus. Simulation results are verified by comparing with experimental results. Various geometric shapes of the BM and residual stress effects on the BM are investigated through the parametric study to enable a wider detectable frequency separation range.

Prioritizing of Civil-BIM DB Construction based on Geo-Spatial Information System (지형공간정보체계 기반의 토목-BIM DB구축 우선순위 선정)

  • Park, Dong Hyun;Kang, In Joon;Jang, Yong Gu;Lee, Byung Gul
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.1
    • /
    • pp.73-79
    • /
    • 2015
  • Recently, BIM proliferates at high speeds so that BIM planning is trying to be used in various kinds of engineering. However, when using different software during design phase and construction phase, the problem of mutual compatibility is coming out. Even the BIM technology has been used or the practical applicability has been made into result, it would be fair to say that BIM has limitations in the visual level. In this research, it is meaningless to obtain the BIM result as the primary purpose. As the usefulness of it is judged incomplete, we committed to master the trend and problems of terrain spatial information systems and BIM. Furthermore, the plan of building the BIM in the civil field, especially the civil-BIM based on the technology ofterrain spatial information has been presented. It can be judged through this research that the high-capacity DB of BIM occurred during the whole process may cause poor performance of the following stage the structure system which connects the terrain spatial information and civil-BIM. In order to manage the optimal full cycle, the spatial analysis technology of the stages after choosing the DB has been described.

An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering (Word2Vec과 가속화 계층적 밀집도 기반 클러스터링을 활용한 효율적 봇넷 탐지 기법)

  • Lee, Taeil;Kim, Kwanhyun;Lee, Jihyun;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.11-20
    • /
    • 2019
  • Numerous enterprises, organizations and individual users are exposed to large DDoS (Distributed Denial of Service) attacks. DDoS attacks are performed through a BotNet, which is composed of a number of computers infected with a malware, e.g., zombie PCs and a special computer that controls the zombie PCs within a hierarchical chain of a command system. In order to detect a malware, a malware detection software or a vaccine program must identify the malware signature through an in-depth analysis, and these signatures need to be updated in priori. This is time consuming and costly. In this paper, we propose a botnet detection scheme that does not require a periodic signature update using an artificial neural network model. The proposed scheme exploits Word2Vec and accelerated hierarchical density-based clustering. Botnet detection performance of the proposed method was evaluated using the CTU-13 dataset. The experimental result shows that the detection rate is 99.9%, which outperforms the conventional method.

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.