• Title/Summary/Keyword: Weakness learning

Search Result 97, Processing Time 0.028 seconds

A Course Scheduling Multi-module System based on Web using Algorithm for Analysis of Weakness (취약성 분석 알고리즘을 이용한 웹기반 코스 스케줄링 멀티 모듈 시스템)

  • 이문호;김태석;김봉기
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.290-297
    • /
    • 2002
  • The appearance of web technology has accelerated the role of the application of multimedia technology, computer communication technology and multimedia application contents. Recently WBI model which is based on web has been proposed in the part of the new activity model of teaching-teaming. How to learn and evaluate is required to consider individual learner's learning level. And it is recognized that the needs of the efficient and automated education agents in the web-based instruction is increased But many education systems that had been studied recently did not service fluently the courses which learners had been wanting and could not provide the way for the learners to study the learning weakness which is observed in the continuous feedback of the course. In this paper we propose design of multi-module system for course scheduling of learner-oriented using weakness analysis algorithm. First proposed system monitors learner's behaviors constantly, evaluates them, and calculates his accomplishment and weakness. From this weakness the multi-agent prepares the learner a suitable course environment to strengthen his weakness. Then the learner achieves an active and complete teaming from the repeated and suitable course.

  • PDF

Application of Machine Learning Techniques for the Classification of Source Code Vulnerability (소스코드 취약성 분류를 위한 기계학습 기법의 적용)

  • Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.735-743
    • /
    • 2020
  • Secure coding is a technique that detects malicious attack or unexpected errors to make software systems resilient against such circumstances. In many cases secure coding relies on static analysis tools to find vulnerable patterns and contaminated data in advance. However, secure coding has the disadvantage of being dependent on rule-sets, and accurate diagnosis is difficult as the complexity of static analysis tools increases. In order to support secure coding, we apply machine learning techniques, such as DNN, CNN and RNN to investigate into finding major weakness patterns shown in secure development coding guides and present machine learning models and experimental results. We believe that machine learning techniques can support detecting security weakness along with static analysis techniques.

Detecting Common Weakness Enumeration(CWE) Based on the Transfer Learning of CodeBERT Model (CodeBERT 모델의 전이 학습 기반 코드 공통 취약점 탐색)

  • Chansol Park;So Young Moon;R. Young Chul Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.431-436
    • /
    • 2023
  • Recently the incorporation of artificial intelligence approaches in the field of software engineering has been one of the big topics. In the world, there are actively studying in two directions: 1) software engineering for artificial intelligence and 2) artificial intelligence for software engineering. We attempt to apply artificial intelligence to software engineering to identify and refactor bad code module areas. To learn the patterns of bad code elements well, we must have many datasets with bad code elements labeled correctly for artificial intelligence in this task. The current problems have insufficient datasets for learning and can not guarantee the accuracy of the datasets that we collected. To solve this problem, when collecting code data, bad code data is collected only for code module areas with high-complexity, not the entire code. We propose a method for exploring common weakness enumeration by learning the collected dataset based on transfer learning of the CodeBERT model. The CodeBERT model learns the corresponding dataset more about common weakness patterns in code. With this approach, we expect to identify common weakness patterns more accurately better than one in traditional software engineering.

Learning from Benchmarking: A Comparison of Iranian and Korean Foresight Exercises

  • Miremadi, Tahereh
    • STI Policy Review
    • /
    • v.8 no.2
    • /
    • pp.49-74
    • /
    • 2017
  • What are some of the explanations for cross-national diversity of foresight performance among technological followers? Why are some countries more successful than others in learning how to develop national innovation system foresight? This paper argues that the answers are linked to organizational capacities at three different levels: governmental, policy network and social learning. To corroborate this argument, the paper chose Iran and Korea as benchmarking partners, and attempts to find out what makes Iran a slow learner in building innovation system foresight. The conceptual model is an improved model of Saritas's, by integrating Borras' and Andersen's conceptions and classifications. The data are collected from comprehensive interviews in both countries and second-hand data of international indexes. The paper, finally, concludes that it is the weakness of analytical-systemic capacity that impedes and delays the emergence of systemic foresight in Iran, and that this weakness stems from the adverse impacts of the dominant institutions, surrounding the innovation system. The final point is that it is not sufficient for Iran to learn the methods and techniques of foresight from Korea. It should learn how to open its macro-policy towards the global market and design appropriate industrial strategy in a coherent policy-strategy portfolio.

A Course Scheduling Multi-Agent System For Ubiquitous Web Learning Environment (유비쿼터스 웹 학습 환경을 위한 코스 스케줄링 멀티 에이전트 시스템)

  • Han, Seung-Hyun;Ryu, Dong-Yeop;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.365-373
    • /
    • 2005
  • Ubiquitous learning environment needs various new model of e-learning as web based education system has been proposed. The demand for the customized courseware which is required from the learners is increased. the needs of the efficient and automated education agents in the web-based instruction are recognized. But many education systems that had been studied recently did not service fluently the courses which learners had been wanting and could not provide the way for the learners to study the learning weakness which is observed in the continuous feedback of the course. In this paper we propose a multi-agent system for course scheduling of learner-oriented using weakness analysis algorithm via personalized ubiquitous environment factors. First proposed system analyze learner's result of evaluation and calculates learning accomplishment. From this accomplishment the multi-agent schedules the suitable course for the learner. The learner achieves an active and complete learning from the repeated and suitable course.

  • PDF

A Software Vulnerability Analysis System using Learning for Source Code Weakness History (소스코드의 취약점 이력 학습을 이용한 소프트웨어 보안 취약점 분석 시스템)

  • Lee, Kwang-Hyoung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.46-52
    • /
    • 2017
  • Along with the expansion of areas in which ICT and Internet of Things (IoT) devices are utilized, open source software has recently expanded its scope of applications to include computers, smart phones, and IoT devices. Hence, as the scope of open source software applications has varied, there have been increasing malicious attempts to attack the weaknesses of open source software. In order to address this issue, various secure coding programs have been developed. Nevertheless, numerous vulnerabilities are still left unhandled. This paper provides some methods to handle newly raised weaknesses based on the analysis of histories and patterns of previous open source vulnerabilities. Through this study, we have designed a weaknesses analysis system that utilizes weakness histories and pattern learning, and we tested the performance of the system by implementing a prototype model. For five vulnerability categories, the average vulnerability detection time was shortened by about 1.61 sec, and the average detection accuracy was improved by 44%. This paper can provide help for researchers studying the areas of weaknesses analysis and for developers utilizing secure coding for weaknesses analysis.

Mechanism of Course Scheduling of Learner-Oriented Using Weakness Analysis Algorithm (취약성 분석 알고리즘을 이용한 학습자 중심의 코스 스케줄링 기법)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3241-3245
    • /
    • 2009
  • In this paper we propose mechanism for course scheduling of learner-oriented using weakness analysis algorithm. The proposed mechanism monitors learner's behaviors constantly evaluates them and calculates his accomplishment. From this accomplishment the schedules the suitable course for the learner. The learner achieves an active and complete learning from the repeated and suitable course.

Q-learning to improve learning speed using Minimax algorithm (미니맥스 알고리즘을 이용한 학습속도 개선을 위한 Q러닝)

  • Shin, YongWoo
    • Journal of Korea Game Society
    • /
    • v.18 no.4
    • /
    • pp.99-106
    • /
    • 2018
  • Board games have many game characters and many state spaces. Therefore, games must be long learning. This paper used reinforcement learning algorithm. But, there is weakness with reinforcement learning. At the beginning of learning, reinforcement learning has the drawback of slow learning speed. Therefore, we tried to improve the learning speed by using the heuristic using the knowledge of the problem domain considering the game tree when there is the same best value during learning. In order to compare the existing character the improved one. I produced a board game. So I compete with one-sided attacking character. Improved character attacked the opponent's one considering the game tree. As a result of experiment, improved character's capability was improved on learning speed.

A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis

  • Hussain, Israr;Zeng, Jishen;Qin, Xinhong;Tan, Shunquan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1228-1248
    • /
    • 2020
  • Steganalysis & steganography have witnessed immense progress over the past few years by the advancement of deep convolutional neural networks (DCNN). In this paper, we analyzed current research states from the latest image steganography and steganalysis frameworks based on deep learning. Our objective is to provide for future researchers the work being done on deep learning-based image steganography & steganalysis and highlights the strengths and weakness of existing up-to-date techniques. The result of this study opens new approaches for upcoming research and may serve as source of hypothesis for further significant research on deep learning-based image steganography and steganalysis. Finally, technical challenges of current methods and several promising directions on deep learning steganography and steganalysis are suggested to illustrate how these challenges can be transferred into prolific future research avenues.

An improvement of the learning speed through Influence Map on Reinforcement Learning (영향력분포도를 이용한 강화학습의 학습속도개선)

  • Shin, Yong-Woo
    • Journal of Korea Game Society
    • /
    • v.17 no.4
    • /
    • pp.109-116
    • /
    • 2017
  • It takes quite amount of time to study a board game because there are many game characters and many state spaces are exist for board games. Therefore, game must do learning long. But, there is weakness with reinforcement learning. On Learning early, the learning speed becomes slow. If there were equal result that both are considered to be best ones during the course of learning stage, Heuristic which utilizes learning of problem area of Jul-Gonu was used to improve the speed of learning. To compare a normal character to an improved one, a board game was created, and then they fought against each other. As a result, improved character's ability was improved on learning speed.