• 제목/요약/키워드: computer models

검색결과 3,894건 처리시간 0.028초

Modeling and Simulation of LEACH Protocol to Analyze DEVS Kernel-models in Sensor Networks

  • Nam, Su Man;Kim, Hwa Soo
    • 한국컴퓨터정보학회논문지
    • /
    • 제25권4호
    • /
    • pp.97-103
    • /
    • 2020
  • 무선 센서 네트워크는 인간의 개입 없이 다양한 환경에서 센싱 데이터를 수집하고 분석한다. 센서 네트워크는 초기에 설치된 라우팅 프로토콜들에 따라 네트워크 수명이 변경된다. 게다가, 네트워크가 운영 중에 라우팅 경로를 변경하기 위해 센서들은 많은 에너지를 소모해야 한다. 센서 네트워크를 실제 필드에 구축하기 전에 시뮬레이션을 통해 성능 측정하는 것은 중요하다. 본 논문은 DEVS 커널 모델들을 사용하여 저전력 적응형 클러스터링 계층 프로토콜을 위한 WSN 모델을 제안한다. 제안 모델은 커널 모델인 브로드캐스트 모델과 컨트롤드 모델로 구현된다. 실험 결과, 컨트롤드 기반의 WSN 모델은 데이터 전송 부분에서는 효율적이지만, 컨트롤드 모델에서 특정 모델을 선택하기 위해 CPU 사용량이 높은 것을 확인했다.

역량기반 학습성과 평가 시스템 구현을 위한 데이터 모델링 및 알고리즘 설계 (Data modeling and algorithms design for implementing Competency-based Learning Outcomes Assessment System)

  • 정현숙;김정민
    • 융합정보논문지
    • /
    • 제11권11호
    • /
    • pp.335-344
    • /
    • 2021
  • 본 논문의 목적은 교과기반 학습성취평가 시스템 구현을 위한 교과 데이터 모델 및 학습 성취도 산출 알고리즘 개발이다. 현재 대학 교육의 방향인 역량기반 교육을 위해서는 교과기반 학습성취 평가가 필수적이지만 기존 연구들은 교육학적 관점으로서 컴퓨터 시스템 관점의 해결책이 매우 부족하다. 본 논문에서는 코스맵 데이터 구조 분석을 통해 계층 구조의 학습성과 모델, 학습모듈 및 학습활동 모델, 학습성과와 학습활동 연계 매트릭스 모델 및 자동화된 성취도 산출 및 성취수준 평가를 위한 성취도 계산 알고리즘을 제안한다. 이를 통해 교과기반 학습성취 평가 시스템을 개발할 수 있으며 시스템 활용을 통해 학습자의 역량 성취를 효과적으로 평가할 수 있다. 제안된 모델과 알고리즘의 평가를 위해 실제 운영중인 자바프로그래밍 교과목에 적용하였으며 이를 통해 교과기반 학습성과 성취평가 시스템 구현의 핵심요소로 활용할 수 있음을 확인하였다. 향후 연구는 학습성과 성취도 산출을 기반으로 적응형 학습 피드백과 개인화된 학습 추천 알고리즘 개발 및 시스템 구현이다.

An Ensemble Approach to Detect Fake News Spreaders on Twitter

  • Sarwar, Muhammad Nabeel;UlAmin, Riaz;Jabeen, Sidra
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.294-302
    • /
    • 2022
  • Detection of fake news is a complex and a challenging task. Generation of fake news is very hard to stop, only steps to control its circulation may help in minimizing its impacts. Humans tend to believe in misleading false information. Researcher started with social media sites to categorize in terms of real or fake news. False information misleads any individual or an organization that may cause of big failure and any financial loss. Automatic system for detection of false information circulating on social media is an emerging area of research. It is gaining attention of both industry and academia since US presidential elections 2016. Fake news has negative and severe effects on individuals and organizations elongating its hostile effects on the society. Prediction of fake news in timely manner is important. This research focuses on detection of fake news spreaders. In this context, overall, 6 models are developed during this research, trained and tested with dataset of PAN 2020. Four approaches N-gram based; user statistics-based models are trained with different values of hyper parameters. Extensive grid search with cross validation is applied in each machine learning model. In N-gram based models, out of numerous machine learning models this research focused on better results yielding algorithms, assessed by deep reading of state-of-the-art related work in the field. For better accuracy, author aimed at developing models using Random Forest, Logistic Regression, SVM, and XGBoost. All four machine learning algorithms were trained with cross validated grid search hyper parameters. Advantages of this research over previous work is user statistics-based model and then ensemble learning model. Which were designed in a way to help classifying Twitter users as fake news spreader or not with highest reliability. User statistical model used 17 features, on the basis of which it categorized a Twitter user as malicious. New dataset based on predictions of machine learning models was constructed. And then Three techniques of simple mean, logistic regression and random forest in combination with ensemble model is applied. Logistic regression combined in ensemble model gave best training and testing results, achieving an accuracy of 72%.

Enhancing LoRA Fine-tuning Performance Using Curriculum Learning

  • Daegeon Kim;Namgyu Kim
    • 한국컴퓨터정보학회논문지
    • /
    • 제29권3호
    • /
    • pp.43-54
    • /
    • 2024
  • 최근 언어모델을 활용하기 위한 연구가 활발히 이루어지며, 큰 규모의 언어모델이 다양한 과제에서 혁신적인 성과를 달성하고 있다. 하지만 실제 현장은 거대 언어모델 활용에 필요한 자원과 비용이 한정적이라는 한계를 접하면서, 최근에는 주어진 자원 내에서 모델을 효과적으로 활용할 수 있는 방법에 주목하고 있다. 대표적으로 학습 데이터를 난이도에 따라 구분한 뒤 순차적으로 학습하는 방법론인 커리큘럼 러닝이 주목받고 있지만, 난이도를 측정하는 방법이 복잡하거나 범용적이지 않다는 한계를 지닌다. 따라서, 본 연구에서는 신뢰할 수 있는 사전 정보를 통해 데이터의 학습 난이도를 측정하고, 이를 다양한 과제에 쉽게 활용할 수 있는 데이터 이질성 기반 커리큘럼 러닝 방법론을 제안한다. 제안방법론의 성능 평가를 위해 국가 R&D 과제 전문 문서 중 정보통신 분야 전문 문서 5,000건, 보건의료전문 문서 데이터 4,917건을 적용하여 실험을 수행한 결과, 제안 방법론이 LoRA 미세조정과 전체 미세조정 모두에서 전통적인 미세조정에 비해 분류 정확도 측면에서 우수한 성능을 나타냄을 확인했다.

고밀도 그리드 모델과 앵커모델을 이용한 동적 객체검지 향상에 관한 연구 (A Study on Improvement of Dynamic Object Detection using Dense Grid Model and Anchor Model)

  • 윤보른;이선우;최경호;이상민;권장우
    • 한국ITS학회 논문지
    • /
    • 제17권3호
    • /
    • pp.98-110
    • /
    • 2018
  • 본 논문은, 동적인 객체의 인식률 향상을 위해 고밀도 그리드 모델과 앵커 모델을 제안하였다. 두 가지 실험은 수행하여 제안하는 CNN 모델들을 제안하였다. 첫 번째 실험에 있어서, YOLO-v2모델을 KITTI 데이터 셋에 적용시켜 보았고, 고밀도 그리드 모델과 앵커 모델을 기존 YOLO-v2와 비교하였다. 실험에 있어서, 본 논문에서 제안하는 두 가지 모델은 기존의 YOLO-v2모델에 비하여 '어려움' 난이도의 자동차 검지에 있어서 6.26%에서 10.99%까지 우수한 성능을 나타낸 것을 확인하였다. 두 번째 실험에 있어서는 새로운 데이터 셋을 학습하였고, 두 가지 모델은 기존의 YOLO-v2모델보다 22.4%까지 '어려움' 난이도의 자동차 인식률 향상이 있음을 확인할 수 있었다.

ROLE OF COMPUTER SIMULATION MODELING IN PESTICIDE ENVIRONMENTAL RISK ASSESSMENT

  • Wauchope, R.Don;Linders, Jan B.H.J.
    • 한국환경독성학회:학술대회논문집
    • /
    • 한국환경독성학회 2003년도 추계국제학술대회
    • /
    • pp.91-93
    • /
    • 2003
  • It has been estimated that the equivalent of approximately $US 50 billion has been spent on research on the behavior and fate of pesticides in the environment since Rachel Carson published “Silent Spring” in 1962. Much of the resulting knowledge has been summarized explicitly in computer algorithms in a variety of empirical, deterministic, and probabilistic simulation models. These models describe and predict the transport, degradation and resultant concentrations of pesticides in various compartments of the environment during and after application. In many cases the known errors of model predictions are large. For this reason they are typically designed to be “conservative”, i.e., err on the side of over-prediction of concentrations in order to err on the side of safety. These predictions are then compared with toxicity data, from tests of the pesticide on a series of standard representative biota, including terrestrial and aquatic indicator species and higher animals (e.g., wildlife and humans). The models' predictions are good enough in some cases to provide screening of those compounds which are very unlikely to do harm, and to indicate those compounds which must be investigated further. If further investigation is indicated a more detailed (and therefore more complicated) model may be employed to give a better estimate, or field experiments may be required. A model may be used to explore “what if” questions leading to possible alternative pesticide usage patterns which give lower potential environmental concentrations and allowable exposures. We are currently at a maturing stage in this research where the knowledge base of pesticide behavior in the environmental is growing more slowly than in the past. However, innovative uses are being made of the explosion in available computer technology to use models to take ever more advantage of the knowledge we have. In this presentation, current developments in the state of the art as practiced in North America and Europe will be presented. Specifically, we will look at the efforts of the ‘Focus’ consortium in the European Union, and the ‘EMWG’ consortium in North America. These groups have been innovative in developing a process and mechanisms for discussion amongst academic, agriculture, industry and regulatory scientists, for consensus adoption of research advances into risk management methodology.

  • PDF

Model Multiplicity (UML) Versus Model Singularity in System Requirements and Design

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.103-114
    • /
    • 2021
  • A conceptual model can be used to manage complexity in both the design and implementation phases of the system development life cycle. Such a model requires a firm grasp of the abstract principles on which a system is based, as well as an understanding of the high-level nature of the representation of entities and processes. In this context, models can have distinct architectural characteristics. This paper discusses model multiplicity (e.g., unified modeling language [UML]), model singularity (e.g., object-process methodology [OPM], thinging machine [TM]), and a heterogeneous model that involves multiplicity and singularity. The basic idea of model multiplicity is that it is not possible to present all views in a single representation, so a number of models are used, with each model representing a different view. The model singularity approach uses only a single unified model that assimilates its subsystems into one system. This paper is concerned with current approaches, especially in software engineering texts, where multimodal UML is introduced as the general-purpose modeling language (i.e., UML is modeling). In such a situation, we suggest raising the issue of multiplicity versus singularity in modeling. This would foster a basic appreciation of the UML advantages and difficulties that may be faced during modeling, especially in the educational setting. Furthermore, we advocate the claim that a multiplicity of views does not necessitate a multiplicity of models. The model singularity approach can represent multiple views (static, behavior) without resorting to a collection of multiple models with various notations. We present an example of such a model where the static representation is developed first. Then, the dynamic view and behavioral representations are built by incorporating a decomposition strategy interleaved with the notion of time.

A Realistic Path Loss Model for Real-time Communication in the Urban Grid Environment for Vehicular Ad hoc Networks

  • Mostajeran, Ehsan;Noor, Rafidah Md;Anisi, Mohammad Hossein;Ahmedy, Ismail;Khan, Fawad Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권10호
    • /
    • pp.4698-4716
    • /
    • 2017
  • Wireless signal transmission is influenced by environmental effects. These effects have also been challenging for Vehicular Ad hoc Network (VANET) in real-time communication. More specifically, in an urban environment, with high mobility among vehicles, a vehicle's status from the transmitter can instantly trigger from line of sight to non-line of sight, which may cause loss of real-time communication. In order to overcome this, a deterministic signal propagation model is required, which has less complexity and more feasibility of implementation. Hence, we propose a realistic path loss model which adopts ray tracing technique for VANET in a grid urban environment with less computational complexity. To evaluate the model, it is applied to a vehicular simulation scenario. The results obtained are compared with different path loss models in the same scenario based on path loss value and application layer performance analysis. The proposed path loss model provides higher loss value in dB compared to other models. Nevertheless, the performance of vehicle-vehicle communication, which is evaluated by the packet delivery ratio with different vehicle transmitter density verifies improvement in real-time vehicle-vehicle communication. In conclusion, we present a realistic path loss model that improves vehicle-vehicle wireless real-time communication in the grid urban environment.

Comparative Analysis of Machine Learning Techniques for IoT Anomaly Detection Using the NSL-KDD Dataset

  • Zaryn, Good;Waleed, Farag;Xin-Wen, Wu;Soundararajan, Ezekiel;Maria, Balega;Franklin, May;Alicia, Deak
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.46-52
    • /
    • 2023
  • With billions of IoT (Internet of Things) devices populating various emerging applications across the world, detecting anomalies on these devices has become incredibly important. Advanced Intrusion Detection Systems (IDS) are trained to detect abnormal network traffic, and Machine Learning (ML) algorithms are used to create detection models. In this paper, the NSL-KDD dataset was adopted to comparatively study the performance and efficiency of IoT anomaly detection models. The dataset was developed for various research purposes and is especially useful for anomaly detection. This data was used with typical machine learning algorithms including eXtreme Gradient Boosting (XGBoost), Support Vector Machines (SVM), and Deep Convolutional Neural Networks (DCNN) to identify and classify any anomalies present within the IoT applications. Our research results show that the XGBoost algorithm outperformed both the SVM and DCNN algorithms achieving the highest accuracy. In our research, each algorithm was assessed based on accuracy, precision, recall, and F1 score. Furthermore, we obtained interesting results on the execution time taken for each algorithm when running the anomaly detection. Precisely, the XGBoost algorithm was 425.53% faster when compared to the SVM algorithm and 2,075.49% faster than the DCNN algorithm. According to our experimental testing, XGBoost is the most accurate and efficient method.