• Title/Summary/Keyword: data learning process

Search Result 2,088, Processing Time 0.035 seconds

Analysis of the Valuation Model for the state-of-the-art ICT Technology (첨단 ICT 기술에 대한 가치평가 모델 분석)

  • Oh, Sun-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.705-710
    • /
    • 2021
  • Nowadays, cutting-edge information communication technology is the genuine core technology of the fourth Industrial Revolution and is still making great progress rapidly among various technology fields. The biggest issue in ICT fields is the machine learning based Artificial Intelligence applications using big data in cloud computing environment on the basis of wireless network, and also the technology fields of autonomous control applications such as Autonomous Car or Mobile Robot. Since value of the high-tech ICT technology depends on the surrounded environmental factors and is very flexible, the precise technology valuation method is urgently needed in order to get successful technology transfer, transaction and commercialization. In this research, we analyze the characteristics of the high-tech ICT technology and the main factors in technology transfer or commercialization process, and propose the precise technology valuation method that reflects the characteristics of the ICT technology through phased analysis of the existing technology valuationmodel.

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.

A Study on the Development of a Guideline Model for a Graduate Program in Archival Studies in Korea (한국 기록관리학 대학원 교육지침서 모형 개발에 관한 연구)

  • Lee, Yun-Jung;Chung, Yeon-Kyoung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.21 no.4
    • /
    • pp.65-80
    • /
    • 2021
  • The role of an archivist should include not only traditional archives management but also new archives management based on an understanding of electronic records and information technology. In this study, to verify the adequacy and content validity of the components, knowledge categories, and knowledge contents of the guideline for a graduate program in archival studies, the Delphi survey was carried out. As a result of the Delphi survey, the components of the guideline consisted of "preface," "curriculum," "faculty," "structure of the learning process," "administrative resources," and "conclusions," and the educational content consisted of 8 knowledge categories and 44 knowledge contents. This study aims to present the minimum components to be followed in the graduate program of archival science through the development of the guideline model and present educational contents to educate archivists with theoretical and practical capabilities. The model can be used as basic data for a future guideline for a graduate program in archival studies.

Intrusion Detection System Based on Sequential Model in SOME/IP (SOME/IP 에서의 시퀀셜 모델 기반 침입탐지 시스템)

  • Kang, Yeonjae;Pi, Daekwon;Kim, Haerin;Lee, Sangho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1171-1181
    • /
    • 2022
  • Front Collision-Avoidance Assist (FCA) or Smart Cruise Control (SCC) is installed in a modern vehicle, and the amount of data exchange between ECUs increases rapidly. Therefore, Automotive Ethernet, especially SOME/IP, which supports wide bandwidth and two-way communication, is widely adopted to overcome the bandwidth limitation of traditional CAN communication. SOME/IP is a standard protocol compatible with various automobile operating systems, and improves connectivity between components in the vehicle. However, no encryption or authentication process is defined in the SOME/IP protocol itself. Therefore, there is a need for a security study on the SOME/IP protocol. This paper proposes a deep learning-based intrusion detection system in SOME/IP and performs six attacks to confirm the performance of the intrusion detection system.

A Study on the Factors Affecting the Intention of Continuous Use of Intelligent Government Administrative Services (지능형 정부 행정서비스 지속사용의도에 영향을 미치는 요인에 대한 연구)

  • Lee, Se-Ho;Han, Seung-jo;Park, Kyung-Hye
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.85-93
    • /
    • 2021
  • The government is pursuing plans to create new e-government services. In terms of improving business procedures, dBrain (finance), e-people (personnel), and Onnara (electronic payment and business management) have achieved considerable results, and are currently making efforts to improve existing administrative services using newly emerged ICT. Among them, this paper attempted to study whether self-learning-based intelligent administrative services are efficient in the work process of public officials promoting actual work and affect their continued use. Based on individual perceptions and attitudes toward advanced ICTs such as AI, big data, and blockchain, public officials' influences on administrative services were identified and verified using UTAUT variables. They believe that the establishment and introduction of innovative administrative services can be used more efficiently, and they have high expectations for the use and provision of services as ICT develops. In the future, a model will be also applied to citizens

A Method for Region-Specific Anomaly Detection on Patch-wise Segmented PA Chest Radiograph (PA 흉부 X-선 영상 패치 분할에 의한 지역 특수성 이상 탐지 방법)

  • Hyun-bin Kim;Jun-Chul Chun
    • Journal of Internet Computing and Services
    • /
    • v.24 no.1
    • /
    • pp.49-59
    • /
    • 2023
  • Recently, attention to the pandemic situation represented by COVID-19 emerged problems caused by unexpected shortage of medical personnel. In this paper, we present a method for diagnosing the presence or absence of lesional sign on PA chest X-ray images as computer vision solution to support diagnosis tasks. Method for visual anomaly detection based on feature modeling can be also applied to X-ray images. With extracting feature vectors from PA chest X-ray images and divide to patch unit, region-specific abnormality can be detected. As preliminary experiment, we created simulation data set containing multiple objects and present results of the comparative experiments in this paper. We present method to improve both efficiency and performance of the process through hard masking of patch features to aligned images. By summing up regional specificity and global anomaly detection results, it shows improved performance by 0.069 AUROC compared to previous studies. By aggregating region-specific and global anomaly detection results, it shows improved performance by 0.069 AUROC compared to our last study.

Evaluation of the Coverage Assessment of Rainfall-Runoff Model for Data Length (데이터 길이에 대한 강우-유출 모델 적용범위 평가)

  • Jeon Seong Jae;Shin Mun Ju;Jung Yong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.383-383
    • /
    • 2023
  • 오늘날 수문학 분야에서는 유역에 대한 강우-유출 시뮬레이션을 머신 러닝(ML: Machine Learning)을 활용하여 다양한 연구를 실행하고 있다. 본 연구에서는 시간별 강우-유출 예측 모델인 GR4H(Génie Rural à 4 paramètres Horaires)를 사용하여 충주댐 유역을 대상으로 연구를 수행하였다. 유역의 속성에 따라서 모델의 성능이 어떻게 달라지는지 비교하여 특성에 맞는 모델을 알아내고. 또한 이 과정에서 기상 및 유출 데이터의 보정 길이를 가지고 어느 정도의 데이터 기간이 모델에서 좋은 성능을 보이는지 파악하였다. 뿐만 아니라 모델에 필요한 선행기간의 데이터가 있는 경우와 없는 경우를 비교하여 어떠한 차이를 보이는지, 그리고 선행기간은 얼마나 필요한지 연구를 통하여 알아냈다. 본 연구를 통하여 충주댐 유역에 대한 모델의 적용성 및 성능을 파악하고 수문 모형 구축에 제한이 있는 유역에 대해서도 사용이 가능한지 판단한다. 실험 유역의 관측 값을 모델에 입력한 후 각 모델에 해당하는 매개변수의 최적값을 찾아내는 과정을 거쳐 시뮬레이션을실 행했다. 본 연구에서 사용한 강우-유출 모델인 GR4H는 프랑스의 INRAE-Antony(Institut National de la recherche agronomique-Antony)에서 만들어진 airGR의 일종으로, 시간별 강우-유출 예측을 위해 개발된 공정 기반(process-based)의 집중적, 개념적 수문학 모델이다. 4개의 매개변수(parameter)가 있으며 이는 유역의 특정 속성을 나타낸다. GR4H를 시뮬레이션 하는 과정에서 매개변수의 최적화를 위해 적절한 보정 길이를 파악하여야 한다. 이러한 과정은 4년, 5년, 6년 등 1년씩 데이터의 양을 늘려가며 매개변수를 최적화한다. 이 과정에서 기상 및 유출 데이터의 적절한 보정 길이를 찾아낸다. 시뮬레이션을 통해 얻은 데이터를 관측 값과 비교하여 모델의 성능을 평가하고 다른 관측 값을 통해 시뮬레이션을 실행하여 검증을 거친다.

  • PDF

Deleuze and Guattari's Machinism and Pedagogy of Assemblages (들뢰즈와 가타리의 기계론과 배치의 교육학)

  • Choi, Seung-hyun;Seo, Beom Jong
    • Korean Educational Research Journal
    • /
    • v.43 no.1
    • /
    • pp.183-213
    • /
    • 2022
  • The purpose of this study is to examine the implications of Deleuze and Guattari's Machinism and Pedagogy of Assemblages. A slow, empirical process offered by Deleuze and Guattari is possible only if they experience a repetition of the duration in time. The identity of this world, a combination of potential and reality, is expressed as a machine. The identity of the 'machine' is the generation. The identity of the information society that exists everywhere in the cloud and unconsciously collects big data is also the information society. The information society is at risk of leaning toward a society in which individual desires are managed prior to the manifestation of a self-reliance a machine consisting of unmarked and mechanical arrangements. Social science based on the theory of layout shares the characteristics of repetition patterns, coexistence of linguistic and materiality, attention to boundary and negation to total whole. The pedagogy of layout, in which the collective pattern is structurally deformed in time, conforms to the original problem consciousness of Deleuze and Guattari, slow and empirical education. In addition, the work of examining the materiality and expression of the education-machine will contribute to the establishment of a new learning theory, an educational theory in the era of trans-human.

Collision Cause-Providing Ratio Prediction Model Using Natural Language Processing Analytics (자연어 처리 기법을 활용한 충돌사고 원인 제공 비율 예측 모델 개발)

  • Ik-Hyun Youn;Hyeinn Park;Chang-Hee, Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.1
    • /
    • pp.82-88
    • /
    • 2024
  • As the modern maritime industry rapidly progresses through technological advancements, data processing technology is emphasized as a key driver of this development. Natural language processing is a technology that enables machines to understand and process human language. Through this methodology, we aim to develop a model that predicts the proportions of outcomes when entering new written judgments by analyzing the rulings of the Marine Safety Tribunal and learning the cause-providing ratios of previously adjudicated ship collisions. The model calculated the cause-providing ratios of the accident using the navigation applied at the time of the accident and the weight of key keywords that affect the cause-providing ratios. Through this, the accuracy of the developed model could be analyzed, the practical applicability of the model could be reviewed, and it could be used to prevent the recurrence of collisions and resolve disputes between parties involved in marine accidents.

YOLOv8-based plastic surface inspector with custom labeling for defect detection

  • In-Bok Jung;Sangmin Suh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.11
    • /
    • pp.11-20
    • /
    • 2024
  • The rapid advancement of society due to industrialization, particularly through mass production enabled by automation, has led to the production of numerous products. However, it is difficult to ensure that all products are manufactured perfectly without defects. Therefore, identifying defects in products during the production process has become crucial. In modern society, detecting defects in various materials is highly valued. This paper focuses on detecting defects in plastic materials, which are among the most widely used and practical materials. In this study, we manually labeled the dataset, creating a dataset consisting of two classes. We utilized the YOLOv8 (You Only Look Once) model, which is capable of object detection, for training. To ensure fair evaluation, k-Fold Cross Validation was performed, resulting in an average F1 Score of 0.95, mAP50 of 0.97, and mAP50-95 of 0.68.