• Title/Summary/Keyword: black-box

Search Result 457, Processing Time 0.027 seconds

Exploring the OECD ITP(Initial Teacher Preparation) Program and Its Implications for Future Teacher Education and Induction Policy (OECD 교원양성 국제비교 연구(ITP)가 한국의 중등교원양성제도 개혁에 주는 시사점)

  • Jeon, Sue-Bin
    • Korean Journal of Comparative Education
    • /
    • v.28 no.4
    • /
    • pp.1-21
    • /
    • 2018
  • The OECD ITP project has looked at the black box of each participating countries' teacher education system. In the 2000s, various countries have tried to reform their professional development systems for teachers, including teacher education and induction, as an initial yet crucial step to improve the quality of education. Since 2015, OECD member countries have been conducting an international comparison study on teacher education and induction programs(i.e. ITP). The ITP project is an in-depth comparative study among the member countries that have expressed willingness to participate voluntarily. This paper introduces the progress of the ITP project and analyzed the national background report on the teacher education and induction system of the participating countries and compared the features of the systems. In addition, this study explores the common issues surrounding the teacher education and induction system. Moreover, the researcher has tried to derive some suggestions for improvement of teacher education and induction system in Korea.

Explanable Artificial Intelligence Study based on Blockchain Using Point Cloud (포인트 클라우드를 이용한 블록체인 기반 설명 가능한 인공지능 연구)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.36-41
    • /
    • 2021
  • Although the technology for prediction or analysis using artificial intelligence is constantly developing, a black-box problem does not interpret the decision-making process. Therefore, the decision process of the AI model can not be interpreted from the user's point of view, which leads to unreliable results. We investigated the problems of artificial intelligence and explainable artificial intelligence using Blockchain to solve them. Data from the decision-making process of artificial intelligence models, which can be explained with Blockchain, are stored in Blockchain with time stamps, among other things. Blockchain provides anti-counterfeiting of the stored data, and due to the nature of Blockchain, it allows free access to data such as decision processes stored in blocks. The difficulty of creating explainable artificial intelligence models is a large part of the complexity of existing models. Therefore, using the point cloud to increase the efficiency of 3D data processing and the processing procedures will shorten the decision-making process to facilitate an explainable artificial intelligence model. To solve the oracle problem, which may lead to data falsification or corruption when storing data in the Blockchain, a blockchain artificial intelligence problem was solved by proposing a blockchain-based explainable artificial intelligence model that passes through an intermediary in the storage process.

The Impact of Perception of Entrepreneurial Opportunity on the Entrepreneurial Intention: Focusing on Positive Psychological Capital (창업기회인식이 창업의도에 미치는 영향에 관한 탐색적 연구: 긍정심리자본의 매개효과를 중심으로)

  • Jang, Hyeon Cheol;Kim, Jong Sung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.6
    • /
    • pp.43-55
    • /
    • 2021
  • Recently, as the domestic job problem has become serious, government ministries are investing a lot of budgets to encourage startups by prospective entrepreneurs. What is important to the success of startups is the recognition of various startup opportunities before starting a startup, and the experience through trial. However, in reality, prospective entrepreneurs recognize and seek various startup opportunities through support such as startup education and initial commercialization funds through various government supported projects, but it is difficult to actually start a business. Previous studies have revealed that the recognition of entrepreneurial opportunities affects entrepreneurial intentions by various variables such as gender, but research is insufficient on what kind of black box exists between the recognition of entrepreneurial opportunities and entrepreneurial intentions. The purpose of this study is to emphasize the importance of positive psychological capital as a major method for improving the entrepreneurial intention, and to analyze exploratorily whether positive psychological capital plays a mediating role between the recognition of entrepreneurial opportunities and the entrepreneurial intention. As a result of the study, it was confirmed that the recognition of startup opportunities affects the intention to start a business, and positive psychological capital has a mediating effect between the recognition of the startup opportunity and the intention to start a business. This means that positive psychological capital is important in order to lead to actual entrepreneurial intentions after recognizing a startup opportunity. Therefore, in order to revitalize the startups of prospective entrepreneurs in the current startup ecosystem, it is necessary to prepare a plan to improve the recognition of startup opportunities and positive psychological capital.

An Overloaded Vehicle Identifying System based on Object Detection Model (객체 인식 모델을 활용한 적재불량 화물차 탐지 시스템 개발)

  • Jung, Woojin;Park, Yongju;Park, Jinuk;Kim, Chang-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.562-565
    • /
    • 2022
  • Recently, the increasing number of overloaded vehicles on the road poses a risk to traffic safety, such as falling objects, road damage, and chain collisions due to the abnormal weight distribution, and can cause great damage once an accident occurs. However, this irregular weight distribution is not possible to be recognized with the current weight measurement system for vehicles on roads. To address this limitation, we propose to build an object detection-based AI model to identify overloaded vehicles that cause such social problems. In addition, we present a simple yet effective method to construct an object detection model for the large-scale vehicle images. In particular, we utilize the large-scale of vehicle image sets provided by open AI-Hub, which include the overloaded vehicles from the CCTV, black box, and hand-held camera point of view. We inspected the specific features of sizes of vehicles and types of image sources, and pre-processed these images to train a deep learning-based object detection model. Finally, we demonstrated that the detection performance of the overloaded vehicle was improved by about 23% compared to the one using raw data. From the result, we believe that public big data can be utilized more efficiently and applied to the development of an object detection-based overloaded vehicle detection model.

  • PDF

Graph Convolutional - Network Architecture Search : Network architecture search Using Graph Convolution Neural Networks (그래프 합성곱-신경망 구조 탐색 : 그래프 합성곱 신경망을 이용한 신경망 구조 탐색)

  • Su-Youn Choi;Jong-Youel Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.649-654
    • /
    • 2023
  • This paper proposes the design of a neural network structure search model using graph convolutional neural networks. Deep learning has a problem of not being able to verify whether the designed model has a structure with optimized performance due to the nature of learning as a black box. The neural network structure search model is composed of a recurrent neural network that creates a model and a convolutional neural network that is the generated network. Conventional neural network structure search models use recurrent neural networks, but in this paper, we propose GC-NAS, which uses graph convolutional neural networks instead of recurrent neural networks to create convolutional neural network models. The proposed GC-NAS uses the Layer Extraction Block to explore depth, and the Hyper Parameter Prediction Block to explore spatial and temporal information (hyper parameters) based on depth information in parallel. Therefore, since the depth information is reflected, the search area is wider, and the purpose of the search area of the model is clear by conducting a parallel search with depth information, so it is judged to be superior in theoretical structure compared to GC-NAS. GC-NAS is expected to solve the problem of the high-dimensional time axis and the range of spatial search of recurrent neural networks in the existing neural network structure search model through the graph convolutional neural network block and graph generation algorithm. In addition, we hope that the GC-NAS proposed in this paper will serve as an opportunity for active research on the application of graph convolutional neural networks to neural network structure search.

Explainable Artificial Intelligence (XAI) Surrogate Models for Chemical Process Design and Analysis (화학 공정 설계 및 분석을 위한 설명 가능한 인공지능 대안 모델)

  • Yuna Ko;Jonggeol Na
    • Korean Chemical Engineering Research
    • /
    • v.61 no.4
    • /
    • pp.542-549
    • /
    • 2023
  • Since the growing interest in surrogate modeling, there has been continuous research aimed at simulating nonlinear chemical processes using data-driven machine learning. However, the opaque nature of machine learning models, which limits their interpretability, poses a challenge for their practical application in industry. Therefore, this study aims to analyze chemical processes using Explainable Artificial Intelligence (XAI), a concept that improves interpretability while ensuring model accuracy. While conventional sensitivity analysis of chemical processes has been limited to calculating and ranking the sensitivity indices of variables, we propose a methodology that utilizes XAI to not only perform global and local sensitivity analysis, but also examine the interactions among variables to gain physical insights from the data. For the ammonia synthesis process, which is the target process of the case study, we set the temperature of the preheater leading to the first reactor and the split ratio of the cold shot to the three reactors as process variables. By integrating Matlab and Aspen Plus, we obtained data on ammonia production and the maximum temperatures of the three reactors while systematically varying the process variables. We then trained tree-based models and performed sensitivity analysis using the SHAP technique, one of the XAI methods, on the most accurate model. The global sensitivity analysis showed that the preheater temperature had the greatest effect, and the local sensitivity analysis provided insights for defining the ranges of process variables to improve productivity and prevent overheating. By constructing alternative models for chemical processes and using XAI for sensitivity analysis, this work contributes to providing both quantitative and qualitative feedback for process optimization.

A Framework of Test Scenario Development for Issuance of Conditional Driver's Licenses for Elderly Drivers (고령 운전자 조건부 운전면허 발급을 위한 평가 시나리오 개발 프레임워크)

  • Sangsu Kim;Younshik Chung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.1
    • /
    • pp.134-145
    • /
    • 2024
  • The purpose of this study was to propose a framework for developing test scenarios for issuance of conditional driver's licenses. The framework was composed of five stages. Initially, we reviewed the literature on traffic crash characteristics in terms of accident frequency and severity regarding the main factors of crashes caused by older drivers. In the second stage, the characteristics of crashes attributed to non-elderly, early elderly, and late elderly drivers were analyzed using data obtained from the Traffic Accident Analysis System (TAAS), and crash types for elderly drivers were derived. In the third stage, black box videos of high-risk crash types were analyzed to derive crash stories that described the circumstances in which crashes occurred. In the fourth step, crash situations were classified by rating the types of crash stories derived to develop various scenarios. Step 5 involved creating a scenario by applying the PEGASUS 5-Layer format, which has recently been used to develop test scenarios for autonomous vehicles. The results of this study are expected to be used as a basis for developing driving ability evaluation scenarios for the issuance of conditional driver's licenses.

Effects of Model Construction and Pattern Identification Activities on Views on the Nature of Science in the Context of Science 10 Inquiry Unit (10학년 과학 탐구 단원의 맥락에서 모델구성과 규칙발견을 통한 명시적 수업이 과학의 본성의 관점에 미치는 효과)

  • Cho, Jung-Il;Kim, Jin-Hee;Hong, Hang-Hwa
    • Journal of The Korean Association For Science Education
    • /
    • v.28 no.8
    • /
    • pp.955-963
    • /
    • 2008
  • This study was conducted to assess any change in students' views on the nature of science (NOS) after lessons through the activities of model construction and pattern identification. The instrument used to examine NOS views was the Views of Nature of Science questionnaire (VNOS). Four students' responses on VNOS before and after instruction were analyzed. The two levels of their views, novice and expert, were judged by the authors based on criteria set by several science educators. The instruction consisted of six hours of the so-called black box and cube activities developed for model construction and pattern identification, respectively. Students' views were at the novice level in definition of scientific theory, tentativeness of scientific knowledge, difference of hypotheses, theories and laws, model construction, and creativity and imagination in experiments and investigations. Students' views on NOS knowledge such as model and theory have improved for two students after instruction. The improvement seemed to be due to an explicit approach using the activities of model construction and pattern identification. The factors of changes and no-changes of views on NOS were identified and discussed in terms of improvement of the views.

Video Analysis System for Action and Emotion Detection by Object with Hierarchical Clustering based Re-ID (계층적 군집화 기반 Re-ID를 활용한 객체별 행동 및 표정 검출용 영상 분석 시스템)

  • Lee, Sang-Hyun;Yang, Seong-Hun;Oh, Seung-Jin;Kang, Jinbeom
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.89-106
    • /
    • 2022
  • Recently, the amount of video data collected from smartphones, CCTVs, black boxes, and high-definition cameras has increased rapidly. According to the increasing video data, the requirements for analysis and utilization are increasing. Due to the lack of skilled manpower to analyze videos in many industries, machine learning and artificial intelligence are actively used to assist manpower. In this situation, the demand for various computer vision technologies such as object detection and tracking, action detection, emotion detection, and Re-ID also increased rapidly. However, the object detection and tracking technology has many difficulties that degrade performance, such as re-appearance after the object's departure from the video recording location, and occlusion. Accordingly, action and emotion detection models based on object detection and tracking models also have difficulties in extracting data for each object. In addition, deep learning architectures consist of various models suffer from performance degradation due to bottlenects and lack of optimization. In this study, we propose an video analysis system consists of YOLOv5 based DeepSORT object tracking model, SlowFast based action recognition model, Torchreid based Re-ID model, and AWS Rekognition which is emotion recognition service. Proposed model uses single-linkage hierarchical clustering based Re-ID and some processing method which maximize hardware throughput. It has higher accuracy than the performance of the re-identification model using simple metrics, near real-time processing performance, and prevents tracking failure due to object departure and re-emergence, occlusion, etc. By continuously linking the action and facial emotion detection results of each object to the same object, it is possible to efficiently analyze videos. The re-identification model extracts a feature vector from the bounding box of object image detected by the object tracking model for each frame, and applies the single-linkage hierarchical clustering from the past frame using the extracted feature vectors to identify the same object that failed to track. Through the above process, it is possible to re-track the same object that has failed to tracking in the case of re-appearance or occlusion after leaving the video location. As a result, action and facial emotion detection results of the newly recognized object due to the tracking fails can be linked to those of the object that appeared in the past. On the other hand, as a way to improve processing performance, we introduce Bounding Box Queue by Object and Feature Queue method that can reduce RAM memory requirements while maximizing GPU memory throughput. Also we introduce the IoF(Intersection over Face) algorithm that allows facial emotion recognized through AWS Rekognition to be linked with object tracking information. The academic significance of this study is that the two-stage re-identification model can have real-time performance even in a high-cost environment that performs action and facial emotion detection according to processing techniques without reducing the accuracy by using simple metrics to achieve real-time performance. The practical implication of this study is that in various industrial fields that require action and facial emotion detection but have many difficulties due to the fails in object tracking can analyze videos effectively through proposed model. Proposed model which has high accuracy of retrace and processing performance can be used in various fields such as intelligent monitoring, observation services and behavioral or psychological analysis services where the integration of tracking information and extracted metadata creates greate industrial and business value. In the future, in order to measure the object tracking performance more precisely, there is a need to conduct an experiment using the MOT Challenge dataset, which is data used by many international conferences. We will investigate the problem that the IoF algorithm cannot solve to develop an additional complementary algorithm. In addition, we plan to conduct additional research to apply this model to various fields' dataset related to intelligent video analysis.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.