• 제목/요약/키워드: distributed learning

검색결과 595건 처리시간 0.025초

경량 작업증명시스템을 이용한 스마트 홈 접근제어 연구 (A Study on a Smart Home Access Control using Lightweight Proof of Work)

  • 김대엽
    • 전기전자학회논문지
    • /
    • 제24권4호
    • /
    • pp.931-941
    • /
    • 2020
  • 기계학습을 이용한 자연어처리 기술이 발전하면서 SHNS (Smart Home Network Service)가 다시 주목받고 있다. 그러나 SHNS는 구성 기기의 다양성과 사용자의 가변성 등으로 인하여 표준화된 인증 시스템 적용이 어렵다. 블록체인은 분산 환경에서 데이터 인증을 위한 기술로 제안되고 있지만, 작업증명시스템 구현 시 요구되는 계산 오버헤드 때문에 SHNS에 적용하는데 한계가 있다. 본 논문에서는 경량화된 작업증명시스템을 제안하였다. 제안하는 경량화된 작업증명시스템은 기기의 작업 권한을 제어함으로써 블록 생성을 관리하도록 제안되었다. 또한 본 논문에서는 이를 기반으로 SHNS의 접근통제 방안을 제안한다.

Conformance of Accounting Education in Saudi Arabia Universities to the International Accounting Education Standards: An Exploratory Study

  • AL-DHUBAIBI, Ahmed Abdullah Saad
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제9권6호
    • /
    • pp.313-324
    • /
    • 2022
  • The goal of this research is to see how closely accounting programs in Saudi Arabian colleges comply with the International Accounting Education Standards (IESs). Further, it aims to assess the level of awareness and knowledge of IESs among accounting academics and to examine the possible explanatory factors for their variation. A structured questionnaire was sent to accounting faculty members at 37 Saudi universities. Out of 541 distributed questionnaires, a total of 102 usable responses were received from 26 universities. The findings show that accounting programs in Saudi universities are partially compliant with the guidelines of IESs and accounting academics in those universities are moderately aware of IESs. High variation in the level of academics' knowledge of IESs was detected and was significantly influenced by industry work experience, academic ranks, and professional qualification. The findings of this study suggest that Saudi Universities should work closely with the local and international accounting professional bodies, i.e. the Saudi Organization for Chartered and Professional Accountants (SOCPA) and the International Federation of Accountants (IFAC) to improve accounting programs based on the guidelines of IESs to cope with the recent changes in the capital market of the kingdom and the adoption of the International Financial Reporting Standards.

간호대학생의 환자안전관리활동: 계획된 행위이론을 중심으로 (Patient Safety Management Activities of Nursing University Students: Focus on the Theory of Planned Behavior)

  • 김남이
    • 한국보건간호학회지
    • /
    • 제36권1호
    • /
    • pp.47-58
    • /
    • 2022
  • Purpose: This study was undertaken to present an effective plan for the development of an educational program and a strategy to promote patient safety management activities for nursing students by identifying factors that affect these activities based on the theory of planned behavior. Methods: A self-report questionnaire was distributed to 300 nursing students who had clinical practice experience at three nursing colleges in Daejeon, Gyeongbuk, and Jeonbuk. The significance of the model fit, and the path effect was confirmed by confirmatory factor analysis. Results: The hypothetical model for patient safety management activities was appropriate. Among the 5 pathways, 4 were significant. It was found that behavioral intention had a direct influence on patient safety management activities, and perceived behavioral control and attitude had an influence on behavioral intention. Conclusion: To strengthen the perceived behavioral control of nursing students' patient safety management activities, it is necessary to analyze and remove obstacles and provide education that reflects the characteristics of the subject's health problems. In addition, through self-directed learning involving simulation practice, nursing students should be exposed to patient safety accidents, so that they can recognize the risks early and solve problems through critical thinking while bringing about the necessary changes in their attitude.

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.

CNN 기반 MS Office 악성 문서 탐지 (MS Office Malicious Document Detection Based on CNN)

  • 박현수;강아름
    • 정보보호학회논문지
    • /
    • 제32권2호
    • /
    • pp.439-446
    • /
    • 2022
  • 웹사이트나 메일의 첨부 파일을 이용해 문서형 악성코드의 유포가 활발하게 이루어지고 있다. 문서형 악성코드는 실행 파일이 직접 실행되는 것이 아니므로 보안 프로그램의 우회가 비교적 쉽다. 따라서 문서형 악성코드는 사전에 탐지하고 예방해야 한다. 이를 탐지하기 위해 문서의 구조를 파악하고 악성으로 의심되는 키워드를 선정하였다. 문서 내의 스트림 데이터를 아스키코드값으로 변환하여 데이터셋을 만들었다. CNN 알고리즘을 이용하여 문서의 스트림 데이터 내에 존재하는 악성 키워드의 위치를 확인하고 인접 정보를 활용하여 이를 악성으로 분류했다. 파일 내의 스트림 단위로 악성코드를 탐지한 결과 0.97의 정확도를 보였고, 파일 단위로 악성코드를 탐지한 결과 0.92의 정확도를 보였다.

Featured Student Profiles: An Instructional Blogging Strategy to Promote Student Interactions in Online Courses

  • LIM, Taehyeong;DENNEN, Vanessa P.
    • Educational Technology International
    • /
    • 제23권1호
    • /
    • pp.67-96
    • /
    • 2022
  • Although blogs have been used in online learning environments with optimistic expectations, the distributed nature of blogs can pose some challenges. Currently, we do not have a robust collection of tested blogging strategies to help students interact more effectively with each other when blogs are used as a primary form of engagement in an online class. Thus, the purpose of the study was to test an early iteration of an instructional blogging strategy, "Featured Student Profiles," which is designed to help students become acquainted with each other better and encourage them to visit and comment on each other's blogs. Sixteen pre-service teachers who were enrolled in an online course in which student blogs are the primary medium of peer interactions, participated in the study. Using a design case approach, seven students participated in interviews and all student blog interactions were analyzed. Thematic analysis was applied to analyze the interview data and identify salient themes of students' blogging experiences overall under the study strategy. The findings indicated that students took the most direct and efficient path they experienced to complete the blog task. Their peer interaction patterns varied, but several shifted from random to targeted relationships as the semester progressed. Although all students perceived the strategy as a positive approach to peer awareness, there was no clear evidence of its effect on student interactions.

딥러닝 기반 격자형 수문모형의 내부 파라메터 분석을 통한 물리기반 모형과의 유사점 및 차별성 판독하기 (Analyzing the internal parameters of a deep learning-based distributed hydrologic model to discern similarities and differences with a physics-based model)

  • 김동균
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2023년도 학술발표회
    • /
    • pp.92-92
    • /
    • 2023
  • 본 연구에서는 대한민국 도시 유역에 대하여 딥러닝 네트워크 기반의 분산형 수문 모형을 개발하였다. 개발된 모형은 완전연결계층(Fully Connected Layer)으로 연결된 여러 개의 장단기 메모리(LSTM-Long Short-Term Memory) 은닉 유닛(Hidden Unit)으로 구성되었다. 개발된 모형을 사용하여 연구 지역인 중랑천 유역을 분석하기 위해 1km2 해상도의 239개 모델 격자 셀에서 10분 단위 레이더-지상 합성 강수량과 10분 단위 기온의 시계열을 입력으로 사용하여 10분 단위 하도 유량을 모의하였다. 모형은 보정과(2013~2016년)과 검증 기간(2017~2019년)에 대한 NSE 계수는각각 0.99와 0.67로 높은 정확도를 보였다. 본 연구는 모형을 추가적으로 심층 분석하여 다음과 같은 결론을 도출하였다: (1) 모형을 기반으로 생성된 유출-강수 비율 지도는 토지 피복 데이터에서 얻은 연구 지역의 불투수율 지도와 유사하며, 이는 모형이 수문학에 대한 선험적 정보에 의존하지 않고 입력 및 출력 데이터만으로 강우-유출 분할과정을 성공적으로 학습하였음을 의미한다. (2) 모형은 연속 수문 모형의 필수 전제 조건인 토양 수분 의존 유출 프로세스를 성공적으로 재현하였다; (3) 각 LSTM 은닉 유닛은 강수 자극에 대한 시간적 민감도가 다르며, 응답이 빠른 LSTM 은닉 유닛은 유역 출구 근처에서 더 큰 출력 가중치 계수를 가졌는데, 이는 모형이 강수 입력에 대한 직접 유출과 지하수가 주도하는 기저 흐름과 같이 응답 시간의 차이가 뚜렷한 수문순환의 구성 요소를 별도로 고려하는 메커니즘을 가지고 있음을 의미한다.

  • PDF

Improved Character-Based Neural Network for POS Tagging on Morphologically Rich Languages

  • Samat Ali;Alim Murat
    • Journal of Information Processing Systems
    • /
    • 제19권3호
    • /
    • pp.355-369
    • /
    • 2023
  • Since the widespread adoption of deep-learning and related distributed representation, there have been substantial advancements in part-of-speech (POS) tagging for many languages. When training word representations, morphology and shape are typically ignored, as these representations rely primarily on collecting syntactic and semantic aspects of words. However, for tasks like POS tagging, notably in morphologically rich and resource-limited language environments, the intra-word information is essential. In this study, we introduce a deep neural network (DNN) for POS tagging that learns character-level word representations and combines them with general word representations. Using the proposed approach and omitting hand-crafted features, we achieve 90.47%, 80.16%, and 79.32% accuracy on our own dataset for three morphologically rich languages: Uyghur, Uzbek, and Kyrgyz. The experimental results reveal that the presented character-based strategy greatly improves POS tagging performance for several morphologically rich languages (MRL) where character information is significant. Furthermore, when compared to the previously reported state-of-the-art POS tagging results for Turkish on the METU Turkish Treebank dataset, the proposed approach improved on the prior work slightly. As a result, the experimental results indicate that character-based representations outperform word-level representations for MRL performance. Our technique is also robust towards the-out-of-vocabulary issues and performs better on manually edited text.

Prediction of Global Industrial Water Demand using Machine Learning

  • Panda, Manas Ranjan;Kim, Yeonjoo
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2022년도 학술발표회
    • /
    • pp.156-156
    • /
    • 2022
  • Explicitly spatially distributed and reliable data on industrial water demand is very much important for both policy makers and researchers in order to carry a region-specific analysis of water resources management. However, such type of data remains scarce particularly in underdeveloped and developing countries. Current research is limited in using different spatially available socio-economic, climate data and geographical data from different sources in accordance to predict industrial water demand at finer resolution. This study proposes a random forest regression (RFR) model to predict the industrial water demand at 0.50× 0.50 spatial resolution by combining various features extracted from multiple data sources. The dataset used here include National Polar-orbiting Partnership (NPP)/Visible Infrared Imaging Radiometer Suite (VIIRS) night-time light (NTL), Global Power Plant database, AQUASTAT country-wise industrial water use data, Elevation data, Gross Domestic Product (GDP), Road density, Crop land, Population, Precipitation, Temperature, and Aridity. Compared with traditional regression algorithms, RF shows the advantages of high prediction accuracy, not requiring assumptions of a prior probability distribution, and the capacity to analyses variable importance. The final RF model was fitted using the parameter settings of ntree = 300 and mtry = 2. As a result, determinate coefficients value of 0.547 is achieved. The variable importance of the independent variables e.g. night light data, elevation data, GDP and population data used in the training purpose of RF model plays the major role in predicting the industrial water demand.

  • PDF

The Social Media Factor: How Platforms Impact Usability of Blackboard at Umm Al Qura University

  • Ahmed R Albashiri
    • International Journal of Computer Science & Network Security
    • /
    • 제24권7호
    • /
    • pp.207-213
    • /
    • 2024
  • This study investigated the perceived usability of the Blackboard learning management system (LMS) amongst students at Umm Al-Qura University. A quantitative approach was employed to explore the potential relationship between Blackboard usability and social media platform usage. Additionally, the study aimed to identify other factors influencing perceived usability. Data were collected through a three-section questionnaire distributed electronically to a sample of students (n=544). The findings, based on System Usability Scale (SUS) scores, revealed that the overall perceived usability of Blackboard resided near the midpoint of the scale, indicating an "acceptable" level. A potential negative correlation emerged between social media usage time and perceived Blackboard usability. Students who reported lower social media usage exhibited higher SUS scores. Training on Blackboard usage demonstrably exerted a positive influence on perceived usability. Gender was not identified as a statistically significant factor. An analysis of student support methods revealed that seeking help from a friend was the most prevalent approach, followed by search engines, university technical support, and social media platforms. The findings suggest that implementing strategies to improve Blackboard usability at Umm Al-Qura University could be achieved through readily accessible training materials and the exploration of alternative support channels.