• Title/Summary/Keyword: block learning

Search Result 308, Processing Time 0.032 seconds

Role of Machine Learning in Intrusion Detection System: A Systematic Review

  • Alhasani, Areej;Al omrani, Faten;Alzahrani, Taghreed;alFahhad, Rehab;Alotaibi, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.155-162
    • /
    • 2022
  • Over the last 10 years, there has been rapid growth in the use of Machine Learning (ML) techniques to automate the process of intrusion threat detection at a scale never imagined before. This has prompted researchers, software engineers, and network specialists to rethink the applications of machine ML techniques particularly in the area of cybersecurity. As a result there exists numerous research documentations on the use ML techniques to detect and block cyber-attacks. This article is a systematic review involving the identification of published scholarly articles as found on IEEE Explore and Scopus databases. The articles exclusively related to the use of machine learning in Intrusion Detection Systems (IDS). Methods, concepts, results, and conclusions as found in the texts are analyzed. A description on the process taken in the identification of the research articles included: First, an introduction to the topic which is followed by a methodology section. A table is used to list identified research articles in the form of title, authors, methodology, and key findings.

Error elimination for systems with periodic disturbances using adaptive neural-network technique (주기적 외란을 수반하는 시스템의 적응 신경망 회로 기법에 의한 오차 제거)

  • Kim, Han-Joong;Park, Jong-Koo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.5 no.8
    • /
    • pp.898-906
    • /
    • 1999
  • A control structure is introduced for the purpose of rejecting periodic (or repetitive) disturbances on a tracking system. The objective of the proposed structure is to drive the output of the system to the reference input that will result in perfect following without any changing the inner configuration of the system. The structure includes an adaptation block which learns the dynamics of the periodic disturbance and forces the interferences, caused by disturbances, on the output of the system to be reduced. Since the control structure acquires the dynamics of the disturbance by on-line adaptation, it is possible to generate control signals that reject any slowly varying time-periodic disturbance provided that its amplitude is bounded. The artificial neural network is adopted as the adaptation block. The adaptation is done at an on-line process. For this , the real-time recurrent learning (RTRL) algoritnm is applied to the training of the artificial neural network.

  • PDF

A multi-dimensional crime spatial pattern analysis and prediction model based on classification

  • Hajela, Gaurav;Chawla, Meenu;Rasool, Akhtar
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.272-287
    • /
    • 2021
  • This article presents a multi-dimensional spatial pattern analysis of crime events in San Francisco. Our analysis includes the impact of spatial resolution on hotspot identification, temporal effects in crime spatial patterns, and relationships between various crime categories. In this work, crime prediction is viewed as a classification problem. When predictions for a particular category are made, a binary classification-based model is framed, and when all categories are considered for analysis, a multiclass model is formulated. The proposed crime-prediction model (HotBlock) utilizes spatiotemporal analysis for predicting crime in a fixed spatial region over a period of time. It is robust under variation of model parameters. HotBlock's results are compared with baseline real-world crime datasets. It is found that the proposed model outperforms the standard DeepCrime model in most cases.

Neural Feature Compression with Block-based Feature Resizing (블록 기반 특징맵 크기 조정을 이용한 DNN 특징맵 압축)

  • Yoon, Curie;Jeong, Hye Won;Kim, Yeongwoong;Kim, Younhee;Jeong, Se-Yoon;Kim, Hui Yong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.06a
    • /
    • pp.1203-1206
    • /
    • 2022
  • 자율주행, IoT 등 많은 양의 영상 정보를 실시간으로 처리해야 하는 기술과 mobile device 등의 기기에서 Machine Learning 연산을 하는 소프트웨어들이 등장함에 따라 사람을 위한 영상을 출력하는 영상 부호화 기술 대신 기계의 vision task 성능을 위해 특화된 영상 부호화 기술의 필요성이 대두됐다. 본 연구에서는 영상에서 추출한 특징맵을 Neural-Net based Video Coding 모델을 이용해 압축률과 기계의 vision task 성능을 동시에 최적화한다. 또한, 하드웨어 친화적인 block-based 처리와 이로 인한 성능 저하를 최소화하기 위해 적응적 resizing 방식을 제안한다.

  • PDF

Implementation of Physical Computing Module of AI Block Python Coding Platform (인공지능 블록 파이썬 코딩 플랫폼의 피지컬 컴퓨팅 모듈 구현)

  • Lee, Se-hoon;Nam, Ji-won;Kim, Gwan-pil;Jeon, Woo-jin;Kim, Ki-Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.453-454
    • /
    • 2021
  • 본 논문에서는 딥아이(DIY) 블록 프로그래밍과 라즈베리파이의 피지컬 컴퓨팅을 활용해 엑츄에이터와 센서를 제어하고 센서를 통해 수집한 데이터를 전처리해 인공지능에 활용함으로써 효율적인 인공지능 교육 방식을 제안한다. 해당 방식은 블록코딩 방식을 사용함으로써 문자코딩 대비 오타을 줄이고 문법 구애율을 낮춤으로써 프로그래밍 입문자의 구문적 어려움을 최소화하고 개념과 전략적 학습을 극대화한다. 블록프로그래밍 사용언어로 파이썬을 채택해 입문자의 편의를 도모하고 파일처리, 크롤링, csv데이터 추출을 통해 인공지능 교육에 활용한다.

  • PDF

Tool Utilization Strategy for Using Block Programming Language as a Preceding Organizer for Text Programming Language Learning (텍스트 프로그래밍 언어 학습을 위한 블록 프로그래밍 언어를 선행조직자로 활용할 수 있는 도구 활용 전략)

  • Go, HakNeung;Lee, Youngjun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.395-396
    • /
    • 2022
  • 본 논문에서는 블록 프로그래밍 언어를 선행조직자로 하여 텍스트 프로그래밍 언어를 학습하는 도구 활용 전략을 연구하였다. 텍스트 프로그래밍 언어는 파이썬이며, 블록 프로그래밍 언어는 엔트리, 활용하는 도구는 주피터 노트북으로 선정하였다. 주피터 노트북을 활용한 블록 프로그래밍 언어 선행조직자 학습 전략은 code cell에 IPython.display.IFrame 클래스를 활용하여 결과 창에 엔트리 작업환경을 불러와 선행조직자로 제시하여 엔트리를 학습 후 code cell에서 파이썬으로 학습한다. 주피터 노트북을 통해 블록 프로그래밍 언어를 선행조직자로 제시 후 텍스트 프로그래밍 언어를 제시함으로써 텍스트 프로그래밍 언어를 학습할 때 인지적 부담을 줄어들고 긍정적 전이가 일어나 효과적인 학습이 될 것으로 기대된다.

  • PDF

Human Action Recognition Using Pyramid Histograms of Oriented Gradients and Collaborative Multi-task Learning

  • Gao, Zan;Zhang, Hua;Liu, An-An;Xue, Yan-Bing;Xu, Guang-Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.483-503
    • /
    • 2014
  • In this paper, human action recognition using pyramid histograms of oriented gradients and collaborative multi-task learning is proposed. First, we accumulate global activities and construct motion history image (MHI) for both RGB and depth channels respectively to encode the dynamics of one action in different modalities, and then different action descriptors are extracted from depth and RGB MHI to represent global textual and structural characteristics of these actions. Specially, average value in hierarchical block, GIST and pyramid histograms of oriented gradients descriptors are employed to represent human motion. To demonstrate the superiority of the proposed method, we evaluate them by KNN, SVM with linear and RBF kernels, SRC and CRC models on DHA dataset, the well-known dataset for human action recognition. Large scale experimental results show our descriptors are robust, stable and efficient, and outperform the state-of-the-art methods. In addition, we investigate the performance of our descriptors further by combining these descriptors on DHA dataset, and observe that the performances of combined descriptors are much better than just using only sole descriptor. With multimodal features, we also propose a collaborative multi-task learning method for model learning and inference based on transfer learning theory. The main contributions lie in four aspects: 1) the proposed encoding the scheme can filter the stationary part of human body and reduce noise interference; 2) different kind of features and models are assessed, and the neighbor gradients information and pyramid layers are very helpful for representing these actions; 3) The proposed model can fuse the features from different modalities regardless of the sensor types, the ranges of the value, and the dimensions of different features; 4) The latent common knowledge among different modalities can be discovered by transfer learning to boost the performance.

Blockly webc Programming Convergent Learning System (Blockly webc 프로그래밍 융합 학습시스템)

  • Cho, Sang
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.1
    • /
    • pp.23-28
    • /
    • 2015
  • Teaching programming skills is not only required for computer related departments but through the area of engineering and natural science. Moreover recently teaching programming skill is emphasized in software education for primary schools and secondary schools. Since programming ability is considered an essencial element of national competitiveness, we need programming learning system which alleviates the difficulty. We implemented Blockly webc Programming Convergent Learning System which is based on the graphic tools called Blockly by Google. Inside system problem sets for the programming beginners are embedded in the system. These problem sets are gone under more than 20 years verification and these problem sets may be used to help beginning programmers escape novice coder in short time. Blockly webc Programming Convergent Learning System together with already developed Simple Visual Language2 Programming Learning System is expected to play an important role as a programming learning system for the beginners.

Development of Block-based Code Generation and Recommendation Model Using Natural Language Processing Model (자연어 처리 모델을 활용한 블록 코드 생성 및 추천 모델 개발)

  • Jeon, In-seong;Song, Ki-Sang
    • Journal of The Korean Association of Information Education
    • /
    • v.26 no.3
    • /
    • pp.197-207
    • /
    • 2022
  • In this paper, we develop a machine learning based block code generation and recommendation model for the purpose of reducing cognitive load of learners during coding education that learns the learner's block that has been made in the block programming environment using natural processing model and fine-tuning and then generates and recommends the selectable blocks for the next step. To develop the model, the training dataset was produced by pre-processing 50 block codes that were on the popular block programming language web site 'Entry'. Also, after dividing the pre-processed blocks into training dataset, verification dataset and test dataset, we developed a model that generates block codes based on LSTM, Seq2Seq, and GPT-2 model. In the results of the performance evaluation of the developed model, GPT-2 showed a higher performance than the LSTM and Seq2Seq model in the BLEU and ROUGE scores which measure sentence similarity. The data results generated through the GPT-2 model, show that the performance was relatively similar in the BLEU and ROUGE scores except for the case where the number of blocks was 1 or 17.

S-PRESENT Cryptanalysis through Know-Plaintext Attack Based on Deep Learning (딥러닝 기반의 알려진 평문 공격을 통한 S-PRESENT 분석)

  • Se-jin Lim;Hyun-Ji Kim;Kyung-Bae Jang;Yea-jun Kang;Won-Woong Kim;Yu-Jin Yang;Hwa-Jeong Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.193-200
    • /
    • 2023
  • Cryptanalysis can be performed by various techniques such as known plaintext attack, differential attack, side-channel analysis, and the like. Recently, many studies have been conducted on cryptanalysis using deep learning. A known-plaintext attack is a technique that uses a known plaintext and ciphertext pair to find a key. In this paper, we use deep learning technology to perform a known-plaintext attack against S-PRESENT, a reduced version of the lightweight block cipher PRESENT. This paper is significant in that it is the first known-plaintext attack based on deep learning performed on a reduced lightweight block cipher. For cryptanalysis, MLP (Multi-Layer Perceptron) and 1D and 2D CNN(Convolutional Neural Network) models are used and optimized, and the performance of the three models is compared. It showed the highest performance in 2D convolutional neural networks, but it was possible to attack only up to some key spaces. From this, it can be seen that the known-plaintext attack through the MLP model and the convolutional neural network is limited in attackable key bits.