• Title/Summary/Keyword: behavior selection network

Search Result 73, Processing Time 0.037 seconds

An Exploratory Two-dimensional Approach to Port Selection Behavior (항만선택행위에 대한 탐색적 이차원적 접근)

  • Park, Byung In
    • Journal of Korea Port Economic Association
    • /
    • v.33 no.4
    • /
    • pp.37-58
    • /
    • 2017
  • The implicit assumption of port selection studies based on survey and respondents' perceptions is that the preference of the port selection attributes is proportional to the selection behavior. Further, the straight lines of the port selection attributes could also have non-linear properties. This study confirms nonlinear characteristics of selection attributes by using Kano model. The findings of this study showed that several properties of carriers were evaluated as nonlinear characteristics, such as the intermodal links and network accessibility, and size of port and terminal. Hence, port service providers such as port authorities and terminal operating companiesl, should construct a port operation strategy that reflects the non-linear port selection characteristics of shipping companies. Since this study aimed at exploring the forms of port selection characteristics, long-term additional verification studies on ports and stakeholders at domestics and abroad were needed. The Kano model and importance-selection analysis method used for analysis and strategy establishment also need to be improved to capture evident characteristics and to present strategic guidelines.

A Study on the Insider Behavior Analysis Using Machine Learning for Detecting Information Leakage (정보 유출 탐지를 위한 머신 러닝 기반 내부자 행위 분석 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • In this paper, we design and implement PADIL(Prediction And Detection of Information Leakage) system that predicts and detect information leakage behavior of insider by analyzing network traffic and applying a variety of machine learning methods. we defined the five-level information leakage model(Reconnaissance, Scanning, Access and Escalation, Exfiltration, Obfuscation) by referring to the cyber kill-chain model. In order to perform the machine learning for detecting information leakage, PADIL system extracts various features by analyzing the network traffic and extracts the behavioral features by comparing it with the personal profile information and extracts information leakage level features. We tested various machine learning methods and as a result, the DecisionTree algorithm showed excellent performance in information leakage detection and we showed that performance can be further improved by fine feature selection.

Dynamic behavior control of a collective autonomous mobile robots using artificial immune networks (인공면역네트워크에 의한 자율이동로봇군의 동적 행동 제어)

  • 이동욱;심귀보
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.124-127
    • /
    • 1997
  • In this paper, we propose a method of cooperative control based on immune system in distributed autonomous robotic system(DARS). Immune system is living body's self-protection and self-maintenance system. Thus these features can be applied to decision making of optimal swarm behavior in dynamically changing environment. For the purpose of applying immune system to DARS, a robot is regarded as a B lymphocyte(B cell), each environmental condition as an antigen, and a behavior strategy as an antibody respectively. The executing process of proposed method is as follows. When the environmental condition changes, a robot selects an appropriate behavior strategy. And its behavior strategy is simulated and suppressed by other robot using communication. Finally much simulated strategy is adopted as a swarm behavior strategy. This control scheme is based on clonal selection and idiotopic network hypothesis. And it is used for decision making of optimal swarm strategy.

  • PDF

Regularization Parameter Selection for Total Variation Model Based on Local Spectral Response

  • Zheng, Yuhui;Ma, Kai;Yu, Qiqiong;Zhang, Jianwei;Wang, Jin
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1168-1182
    • /
    • 2017
  • In the past decades, various image regularization methods have been introduced. Among them, total variation model has drawn much attention for the reason of its low computational complexity and well-understood mathematical behavior. However, regularization parameter estimation of total variation model is still an open problem. To deal with this problem, a novel adaptive regularization parameter selection scheme is proposed in this paper, by means of using the local spectral response, which has the capability of locally selecting the regularization parameters in a content-aware way and therefore adaptively adjusting the weights between the two terms of the total variation model. Experiment results on simulated and real noisy image show the good performance of our proposed method, in visual improvement and peak signal to noise ratio value.

Intrusion Detection System of Network Based on Biological Immune System (생체 면역계를 이용한 네트워크 침입탐지 시스템)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.5
    • /
    • pp.411-416
    • /
    • 2002
  • Recently, the trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online internet, so it is expected to make a problem more and more. Currently, the general security system based on Internet couldn't cope with the attack properly, if ever, other regular systems have depended on common softwares to cope with the attack. In this paper, we propose the positive selection mechanism and negative selection mechanism of T-cell, which is the biological distributed autonomous system, to develop the self/non-self recognition algorithm, the anomalous behavior detection algorithm, and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. The proposed algorithm can cope with new intrusion as well as existing one to intrusion detection system in the network environment.

A Study on Analysis of Cases of Application of Emotion Architecture (Emotion Architecture 적용 사례 분석에 관한 연구)

  • 윤호창;오정석;전현주
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.447-453
    • /
    • 2003
  • Emotion Technology is used in many field such as computer A.I., graphics, robot, and interaction with agent. We focus on the theory, the technology and the features in emotion application. Firstly in the field of theory, there are psychological approach, behavior-based approach, action-selection approach. Secondly in the field of implementation technologies use the learning algorithm, self-organizing map of neural network and fuzzy cognition maps. Thirdly in the field of application, there are software agent, agent robot and entrainment robot. In this paper, we research the case of application and analyze emotion architecture.

  • PDF

Multiclass Botnet Detection and Countermeasures Selection

  • Farhan Tariq;Shamim baig
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.205-211
    • /
    • 2024
  • The increasing number of botnet attacks incorporating new evasion techniques making it infeasible to completely secure complex computer network system. The botnet infections are likely to be happen, the timely detection and response to these infections helps to stop attackers before any damage is done. The current practice in traditional IP networks require manual intervention to response to any detected malicious infection. This manual response process is more probable to delay and increase the risk of damage. To automate this manual process, this paper proposes to automatically select relevant countermeasures for detected botnet infection. The propose approach uses the concept of flow trace to detect botnet behavior patterns from current and historical network activity. The approach uses the multiclass machine learning based approach to detect and classify the botnet activity into IRC, HTTP, and P2P botnet. This classification helps to calculate the risk score of the detected botnet infection. The relevant countermeasures selected from available pool based on risk score of detected infection.

Feature Selection for Abnormal Driving Behavior Recognition Based on Variance Distribution of Power Spectral Density

  • Nassuna, Hellen;Kim, Jaehoon;Eyobu, Odongo Steven;Lee, Dongik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.15 no.3
    • /
    • pp.119-127
    • /
    • 2020
  • The detection and recognition of abnormal driving becomes crucial for achieving safety in Intelligent Transportation Systems (ITS). This paper presents a feature extraction method based on spectral data to train a neural network model for driving behavior recognition. The proposed method uses a two stage signal processing approach to derive time-saving and efficient feature vectors. For the first stage, the feature vector set is obtained by calculating variances from each frequency bin containing the power spectrum data. The feature set is further reduced in the second stage where an intersection method is used to select more significant features that are finally applied for training a neural network model. A stream of live signals are fed to the trained model which recognizes the abnormal driving behaviors. The driving behaviors considered in this study are weaving, sudden braking and normal driving. The effectiveness of the proposed method is demonstrated by comparing with existing methods, which are Particle Swarm Optimization (PSO) and Convolution Neural Network (CNN). The experiments show that the proposed approach achieves satisfactory results with less computational complexity.

Exploring reward efficacy in traffic management using deep reinforcement learning in intelligent transportation system

  • Paul, Ananya;Mitra, Sulata
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.194-207
    • /
    • 2022
  • In the last decade, substantial progress has been achieved in intelligent traffic control technologies to overcome consistent difficulties of traffic congestion and its adverse effect on smart cities. Edge computing is one such advanced progress facilitating real-time data transmission among vehicles and roadside units to mitigate congestion. An edge computing-based deep reinforcement learning system is demonstrated in this study that appropriately designs a multiobjective reward function for optimizing different objectives. The system seeks to overcome the challenge of evaluating actions with a simple numerical reward. The selection of reward functions has a significant impact on agents' ability to acquire the ideal behavior for managing multiple traffic signals in a large-scale road network. To ascertain effective reward functions, the agent is trained withusing the proximal policy optimization method in several deep neural network models, including the state-of-the-art transformer network. The system is verified using both hypothetical scenarios and real-world traffic maps. The comprehensive simulation outcomes demonstrate the potency of the suggested reward functions.