• Title/Summary/Keyword: behavior algorithm

Search Result 1,476, Processing Time 0.027 seconds

Analysis of Spatial Trip Regularity using Trajectory Data in Urban Areas (도시부 경로자료를 이용한 통행의 공간적 규칙성 분석)

  • Lee, Su jin;Jang, Ki tae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.96-110
    • /
    • 2018
  • As the development of ICT has made it easier to collect various traffic information, research on creating new traffic attributes is drawing attention. Estimation and forecasts of demand and traffic volume are one of the main indicators that are essential to traffic operation, assuming that the traffic pattern at a particular node or link is repeated. Traditionally, a survey method was used to demonstrate this similarity on trip behavior. However, the method was limited to achieving high accuracy with high costs and responses that relied on the respondents' memory. Recently, as traffic data has become easier to gather through ETC system, smart card, studies are performed to identify the regularity of trip in various ways. In, this study, route-level trip data collected in Daegu metropolitan city were analyzed to confirm that individual traveler forms a spatially similar trip chain over several days. For this purpose, we newly define the concept of spatial trip regularity and assess the spatial difference between daily trip chains using the sequence alignment algorithm, Dynamic Time Warping. In addition, we will discuss the applications as the indicators of fixed traffic demand and transportation services.

Capacity Design of Eccentrically Braced Frame Using Multiobjective Optimization Technique (다목적 최적화 기법을 이용한 편심가새골조의 역량설계)

  • Hong, Yun-Su;Yu, Eunjong
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.6
    • /
    • pp.419-426
    • /
    • 2020
  • The structural design of the steel eccentrically braced frame (EBF) was developed and analyzed in this study through multiobjective optimization (MOO). For the optimal design, NSGA-II which is one of the genetic algorithms was utilized. The amount of structure and interfloor displacement were selected as the objective functions of the MOO. The constraints include strength ratio and rotation angle of the link, which are required by structural standards and have forms of the penalty function such that the values of the objective functions increase drastically when a condition is violated. The regulations in the code provision for the EBF system are based on the concept of capacity design, that is, only the link members are allowed to yield, whereas the remaining members are intended to withstand the member forces within their elastic ranges. However, although the pareto front obtained from MOO satisfies the regulations in the code provision, the actual nonlinear behavior shows that the plastic deformation is concentrated in the link member of a certain story, resulting in the formation of a soft story, which violates the capacity design concept in the design code. To address this problem, another constraint based on the Eurocode was added to ensure that the maximum values of the shear overstrength factors of all links did not exceed 1.25 times the minimum values. When this constraint was added, it was observed that the resulting pareto front complied with both the design regulations and capacity design concept. Ratios of the link length to beam span ranged from 10% to 14%, which was within the category of shear links. The overall design is dominated by the constraint on the link's overstrength factor ratio. Design characteristics required by the design code, such as interstory drift and member strength ratios, were conservatively compared to the allowable values.

Development and Validation of the GPU-based 3D Dynamic Analysis Code for Simulating Rock Fracturing Subjected to Impact Loading (충격 하중 시 암석의 파괴거동해석을 위한 GPGPU 기반 3차원 동적해석기법의 개발과 검증 연구)

  • Min, Gyeong-Jo;Fukuda, Daisuke;Oh, Se-Wook;Cho, Sang-Ho
    • Explosives and Blasting
    • /
    • v.39 no.2
    • /
    • pp.1-14
    • /
    • 2021
  • Recently, with the development of high-performance processing devices such as GPGPU, a three-dimensional dynamic analysis technique that can replace expensive rock material impact tests has been actively developed in the defense and aerospace fields. Experimentally observing or measuring fracture processes occurring in rocks subjected to high impact loads, such as blasting and earth penetration of small-diameter missiles, are difficult due to the inhomogeneity and opacity of rock materials. In this study, a three-dimensional dynamic fracture process analysis technique (3D-DFPA) was developed to simulate the fracture behavior of rocks due to impact. In order to improve the operation speed, an algorithm capable of GPGPU operation was developed for explicit analysis and contact element search. To verify the proposed dynamic fracture process analysis technique, the dynamic fracture toughness tests of the Straight Notched Disk Bending (SNDB) limestone samples were simulated and the propagation of the reflection and transmission of the stress waves at the rock-impact bar interfaces and the fracture process of the rock samples were compared. The dynamic load tests for the SNDB sample applied a Pulse Shape controlled Split Hopkinson presure bar (PS-SHPB) that can control the waveform of the incident stress wave, the stress state, and the fracture process of the rock models were analyzed with experimental results.

Improvement of a Product Recommendation Model using Customers' Search Patterns and Product Details

  • Lee, Yunju;Lee, Jaejun;Ahn, Hyunchul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.265-274
    • /
    • 2021
  • In this paper, we propose a novel recommendation model based on Doc2vec using search keywords and product details. Until now, a lot of prior studies on recommender systems have proposed collaborative filtering (CF) as the main algorithm for recommendation, which uses only structured input data such as customers' purchase history or ratings. However, the use of unstructured data like online customer review in CF may lead to better recommendation. Under this background, we propose to use search keyword data and product detail information, which are seldom used in previous studies, for product recommendation. The proposed model makes recommendation by using CF which simultaneously considers ratings, search keywords and detailed information of the products purchased by customers. To extract quantitative patterns from these unstructured data, Doc2vec is applied. As a result of the experiment, the proposed model was found to outperform the conventional recommendation model. In addition, it was confirmed that search keywords and product details had a significant effect on recommendation. This study has academic significance in that it tries to apply the customers' online behavior information to the recommendation system and that it mitigates the cold start problem, which is one of the critical limitations of CF.

A Study on the Cerber-Type Ransomware Detection Model Using Opcode and API Frequency and Correlation Coefficient (Opcode와 API의 빈도수와 상관계수를 활용한 Cerber형 랜섬웨어 탐지모델에 관한 연구)

  • Lee, Gye-Hyeok;Hwang, Min-Chae;Hyun, Dong-Yeop;Ku, Young-In;Yoo, Dong-Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.363-372
    • /
    • 2022
  • Since the recent COVID-19 Pandemic, the ransomware fandom has intensified along with the expansion of remote work. Currently, anti-virus vaccine companies are trying to respond to ransomware, but traditional file signature-based static analysis can be neutralized in the face of diversification, obfuscation, variants, or the emergence of new ransomware. Various studies are being conducted for such ransomware detection, and detection studies using signature-based static analysis and behavior-based dynamic analysis can be seen as the main research type at present. In this paper, the frequency of ".text Section" Opcode and the Native API used in practice was extracted, and the association between feature information selected using K-means Clustering algorithm, Cosine Similarity, and Pearson correlation coefficient was analyzed. In addition, Through experiments to classify and detect worms among other malware types and Cerber-type ransomware, it was verified that the selected feature information was specialized in detecting specific ransomware (Cerber). As a result of combining the finally selected feature information through the above verification and applying it to machine learning and performing hyper parameter optimization, the detection rate was up to 93.3%.

Implementation of CNN-based Classification Training Model for Unstructured Fashion Image Retrieval using Preprocessing with MASK R-CNN (비정형 패션 이미지 검색을 위한 MASK R-CNN 선형처리 기반 CNN 분류 학습모델 구현)

  • Seunga, Cho;Hayoung, Lee;Hyelim, Jang;Kyuri, Kim;Hyeon-Ji, Lee;Bong-Ki, Son;Jaeho, Lee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.6
    • /
    • pp.13-23
    • /
    • 2022
  • In this paper, we propose a detailed component image classification algorithm by fashion item for unstructured data retrieval in the fashion field. Due to the COVID-19 environment, AI-based online shopping malls are increasing recently. However, there is a limit to accurate unstructured data search with existing keyword search and personalized style recommendations based on user surfing behavior. In this study, pre-processing using Mask R-CNN was conducted using images crawled from online shopping sites and then classified components for each fashion item through CNN. We obtain the accuaracy for collar of the shirt's as 93.28%, the pattern of the shirt as 98.10%, the 3 classese fit of the jeans as 91.73%, And, we further obtained one for the 4 classes fit of jeans as 81.59% and the color of the jeans as 93.91%. At the results for the decorated items, we also obtained the accuract of the washing of the jeans as 91.20% and the demage of jeans accuaracy as 92.96%.

Multi-scale Progressive Fatigue Damage Model for Unidirectional Laminates with the Effect of Interfacial Debonding (경계면 손상을 고려한 적층복합재료에 대한 멀티스케일 피로 손상 모델)

  • Dongwon Ha;Jeong Hwan Kim;Taeri Kim;Young Sik Joo;Gun Jin Yun
    • Composites Research
    • /
    • v.36 no.1
    • /
    • pp.16-24
    • /
    • 2023
  • This paper presents a multi-scale progressive fatigue damage model incorporating the model for interfacial debonding between fibers and matrix. The micromechanics model for the progressive interface debonding was adopted, which defined the four different interface phases: (1) perfectly bonded fibers; (2) mild imperfect interface; (3) severe imperfect interface; and (4) completely debonded fibers. As the number of cycles increases, the progressive transition from the perfectly bonded state to the completely debonded fiber state occurs. Eshelby's tensor for each imperfect state is calculated by the linear spring model for a damaged interface, and effective elastic properties are obtained using the multi-phase homogenization method. The fatigue damage evolution formulas for fiber, matrix and interface were proposed to demonstrate the fatigue behavior of CFRP laminates under cyclic loading. The material parameters for the fiber/matrix fatigue damage were characterized using the chaotic firefly algorithm. The model was implemented into the UMAT subroutine of ABAQUS, and successfully validated with flat-bar UD laminate specimens ([0]8,[90]8, [30]16) of AS4/3501-6 graphite/epoxy composite.

Running Safety and Ride Comfort Prediction for a Highspeed Railway Bridge Using Deep Learning (딥러닝 기반 고속철도교량의 주행안전성 및 승차감 예측)

  • Minsu, Kim;Sanghyun, Choi
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.35 no.6
    • /
    • pp.375-380
    • /
    • 2022
  • High-speed railway bridges carry a risk of dynamic response amplification due to resonance caused by train loads, and running safety and riding comfort must therefore be reviewed through dynamic analysis in accordance with design codes. The running safety and ride comfort calculation procedure, however, is time consuming and expensive because dynamic analyses must be performed for every 10 km/h interval up to 110% of the design speed, including the critical speed for each train type. In this paper, a deep-learning-based prediction system that can predict the running safety and ride comfort in advance is proposed. The system does not use dynamic analysis but employs a deep learning algorithm. The proposed system is based on a neural network trained on the dynamic analysis results of each train and speed of the railway bridge and can predict the running safety and ride comfort according to input parameters such as train speed and bridge characteristics. To confirm the performance of the proposed system, running safety and riding comfort are predicted for a single span, straight simple beam bridge. Our results confirm that the deck vertical displacement and deck vertical acceleration for calculating running safety and riding comfort can be predicted with high accuracy.

Comparing the 2015 with the 2022 Revised Primary Science Curriculum Based on Network Analysis (2015 및 2022 개정 초등학교 과학과 교육과정에 대한 비교 - 네트워크 분석을 중심으로 -)

  • Jho, Hunkoog
    • Journal of Korean Elementary Science Education
    • /
    • v.42 no.1
    • /
    • pp.178-193
    • /
    • 2023
  • The aim of this study was to investigate differences in the achievement standards from the 2015 to the 2022 revised national science curriculum and to present the implications for science teaching under the revised curriculum. Achievement standards relevant to primary science education were therefore extracted from the national curriculum documents; conceptual domains in the two curricula were analyzed for differences; various kinds of centrality were computed; and the Louvain algorithm was used to identify clusters. These methods revealed that, in the revised compared with the preceding curriculum, the total number of nodes and links had increased, while the number of achievement standards had decreased by 10 percent. In the revised curriculum, keywords relevant to procedural skills and behavior received more emphasis and were connected to collaborative learning and digital literacy. Observation, survey, and explanation remained important, but varied in application across the fields of science. Clustering revealed that the number of categories in each field of science remained mostly unchanged in the revised compared with the previous curriculum, but that each category highlighted different skills or behaviors. Based on those findings, some implications for science instruction in the classroom are discussed.

A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wallet (브라우저 익스텐션 기반 암호화폐 지갑의 디지털 포렌식 아티팩트 수집 및 분석 연구)

  • Ju-eun Kim;Seung-hee Seo;Beong-jin Seok;Heoyn-su Byun;Chang-hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.471-485
    • /
    • 2023
  • Recently, due to the nature of blockchain that guarantees users' anonymity, more and more cases are being exploited for crimes such as illegal transactions. However, cryptocurrency is protected in cryptocurrency wallets, making it difficult to recover criminal funds. Therefore, this study acquires artifacts from the data and memory area of a local PC based on user behavior from four browser extension wallets (Metamask, Binance, Phantom, and Kaikas) to track and retrieve cryptocurrencies used in crime, and analyzes how to use them from a digital forensics perspective. As a result of the analysis, the type of wallet and cryptocurrency used by the suspect was confirmed through the API name obtained from the browser's cache data, and the URL and wallet address used for the remittance transaction were obtained. We also identified Client IDs that could identify devices used in cookie data, and confirmed that mnemonic code could be obtained from memory. Additionally, we propose an algorithm to measure the persistence of obtainable mnemonic code and automate acquisition.