• Title/Summary/Keyword: network-based

Search Result 25,851, Processing Time 0.056 seconds

A Comparative study on smoothing techniques for performance improvement of LSTM learning model

  • Tae-Jin, Park;Gab-Sig, Sim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.17-26
    • /
    • 2023
  • In this paper, we propose a several smoothing techniques are compared and applied to increase the application of the LSTM-based learning model and its effectiveness. The applied smoothing technique is Savitky-Golay, exponential smoothing, and weighted moving average. Through this study, the LSTM algorithm with the Savitky-Golay filter applied in the preprocessing process showed significant best results in prediction performance than the result value shown when applying the LSTM model to Bitcoin data. To confirm the predictive performance results, the learning loss rate and verification loss rate according to the Savitzky-Golay LSTM model were compared with the case of LSTM used to remove complex factors from Bitcoin price prediction, and experimented with an average value of 20 times to increase its reliability. As a result, values of (3.0556, 0.00005) and (1.4659, 0.00002) could be obtained. As a result, since crypto-currencies such as Bitcoin have more volatility than stocks, noise was removed by applying the Savitzky-Golay in the data preprocessing process, and the data after preprocessing were obtained the most-significant to increase the Bitcoin prediction rate through LSTM neural network learning.

A Ship-Wake Joint Detection Using Sentinel-2 Imagery

  • Woojin, Jeon;Donghyun, Jin;Noh-hun, Seong;Daeseong, Jung;Suyoung, Sim;Jongho, Woo;Yugyeong, Byeon;Nayeon, Kim;Kyung-Soo, Han
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.1
    • /
    • pp.77-86
    • /
    • 2023
  • Ship detection is widely used in areas such as maritime security, maritime traffic, fisheries management, illegal fishing, and border control, and ship detection is important for rapid response and damage minimization as ship accident rates increase due to recent increases in international maritime traffic. Currently, according to a number of global and national regulations, ships must be equipped with automatic identification system (AIS), which provide information such as the location and speed of the ship periodically at regular intervals. However, most small vessels (less than 300 tons) are not obligated to install the transponder and may not be transmitted intentionally or accidentally. There is even a case of misuse of the ship'slocation information. Therefore, in this study, ship detection was performed using high-resolution optical satellite images that can periodically remotely detect a wide range and detectsmallships. However, optical images can cause false-alarm due to noise on the surface of the sea, such as waves, or factors indicating ship-like brightness, such as clouds and wakes. So, it is important to remove these factors to improve the accuracy of ship detection. In this study, false alarm wasreduced, and the accuracy ofship detection wasimproved by removing wake.As a ship detection method, ship detection was performed using machine learning-based random forest (RF), and convolutional neural network (CNN) techniquesthat have been widely used in object detection fieldsrecently, and ship detection results by the model were compared and analyzed. In addition, in this study, the results of RF and CNN were combined to improve the phenomenon of ship disconnection and the phenomenon of small detection. The ship detection results of thisstudy are significant in that they improved the limitations of each model while maintaining accuracy. In addition, if satellite images with improved spatial resolution are utilized in the future, it is expected that ship and wake simultaneous detection with higher accuracy will be performed.

Heating Characteristics of Planar Heater Fabricated with Different Mixing Ratios of MXene-CNT-WPU Composites (MXene-CNT-WPU 복합소재 기반 면상발열체의 배합 비율에 따른 발열 특성)

  • Hyo-Jun, Oh;Quy-Dat, Nguyen;Yoonsik, Yi;Choon-Gi, Choi
    • Clean Technology
    • /
    • v.28 no.4
    • /
    • pp.278-284
    • /
    • 2022
  • This study presents an excellent planar heater based on low-dimensional composites. By optimizing the ratio of 1D carbon nanotubes (CNT) and 2D MXene (Ti3C2TX), it is possible to create a planar heater that has superior electrical conductivity and high heat generation characteristics. Low-dimensional composites were prepared by mixing CNT paste and MXene solution with eco-friendly waterborne polyurethane (WPU). In order to find the optimal mixing ratio for the MXene-CNT-WPU composites, samples with MXene to CNT weight ratios of 3:1, 1:1, 1:3, 1:7, and 1:14 were investigated. In addition to these different weight ratios, 5 wt% WPU was equally applied to each sample. It was confirmed that the higher the weight ratio of CNT, the lower the sheet resistance and the higher the heating temperature. In particular, when the MXene-CNT-WPU planar heater was fabricated by mixing MXene and CNT at a weight ratio of 1:7 and 1:14, the heating temperature was higher than the heating temperature of a CNT-WPU planar heater. These characteristics are due to the optimized mixture of the 1D materials (CNT) and the 2D materials (MXene) causing the formation of a flat surface and a dense network structure. The low-dimensional composites manufactured with the optimized mixing ratios found in this study are expected to be applied in flexible electronic devices.

A Study on Non-Fungible Token Platform for Usability and Privacy Improvement (사용성 및 프라이버시 개선을 위한 NFT 플랫폼 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.403-410
    • /
    • 2022
  • Non-Fungible Tokens (NFTs) created on the basis of blockchain have their own unique value, so they cannot be forged or exchanged with other tokens or coins. Using these characteristics, NFTs can be issued to digital assets such as images, videos, artworks, game characters, and items to claim ownership of digital assets among many users and objects in cyberspace, as well as proving the original. However, interest in NFTs exploded from the beginning of 2020, causing a lot of load on the blockchain network, and as a result, users are experiencing problems such as delays in computational processing or very large fees in the mining process. Additionally, all actions of users are stored in the blockchain, and digital assets are stored in a blockchain-based distributed file storage system, which may unnecessarily expose the personal information of users who do not want to identify themselves on the Internet. In this paper, we propose an NFT platform using cloud computing, access gate, conversion table, and cloud ID to improve usability and privacy problems that occur in existing system. For performance comparison between local and cloud systems, we measured the gas used for smart contract deployment and NFT-issued transaction. As a result, even though the cloud system used the same experimental environment and parameters, it saved about 3.75% of gas for smart contract deployment and about 4.6% for NFT-generated transaction, confirming that the cloud system can handle computations more efficiently than the local system.

Analysis of Research Trends in Elder Abuse Using Text Mining : Academic Papers from 2004 to 2021. (텍스트 마이닝 분석을 통한 노인학대 관련 연구 동향 분석 : 2004년~2021년까지 발행된 국내 학술논문을 중심으로)

  • Youn, Ki-Hyok
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.25-40
    • /
    • 2022
  • This study aimed to understand the increasing number of elder abuses in South Korea, where entry into the super-aged society is imminent, by implementing text mining analysis. Korean Academic journals were obtained from 2004, the establishment year of the senior care agency, to 2021. We performed natural language processing of the titles, keywords, and abstracts and divided them into three segments of periods to identify latent meanings in the data. The results illustrated that the first section included 81 papers, the second 64, and the third 104 respectively, averaging 13.8 annually, which increased its numbers from 2014 until the decrease below the annual average in 2020. Word frequency demonstrated that the common keywords of the entire segments were 'elder abuse,' 'elders,' 'influences,' 'factors,' 'recognition,' 'family,' 'society,' 'prevention plans,' 'experiences,' 'abused elders,' 'abuse prevention,' 'depression,' etc., in consecutive order. TF-IDF indicated that 'influences,' 'recognition,' 'society,' 'prevention plans,' 'abuse prevention,' 'experiences,' 'depression,' etc., were the common keywords of all divisions. Network text analysis displayed that the commonly represented keywords were 'elder abuse,' 'elders,' 'influences,' 'factors,' 'characteristics,' 'recognition,' 'family,' 'prevention plans,' 'society,' 'abuse prevention,' and 'experiences' in the entire sections. concor analysis presented that the first segment consisted of 5 groups, the second 7, and the third 6. We suggest future directions for elder abuse research based on the results.

Research on the Influence of Interaction, Identification and Recommendation of Entertainment Communication Platform (커뮤니케이션 플랫폼의 상호작용이 동일시와 추천 의도에 미치는 영향)

  • Zhao, Yi-Dan;Choi, Myeong-gil
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.6
    • /
    • pp.23-33
    • /
    • 2021
  • Under the long-term influence of COVID-19, offline activities were interrupted and online communication became the main way. With the rapid development of Korean Wave and network information technology, there have been many entertainment communication platforms. Fans can communicate with stars and other fans and share information through entertainment and communication platforms. This can improve users' perception of the value of entertainment communication platforms, arouse emotional resonance and have a positive impact on users' platform recommendation intention. In this study, the influence of user interaction, identity and recommendation intention of entertainment communication platforms was investigated by questionnaire. The results are as follows: First, the interaction between fans and content has a positive effect on psychological and behavioral identity. Second, the interaction between fans does not affect their psychological and behavioral identity. Third, the interaction between fans and stars has a positive impact on psychological identity and behavior identity. Fourth, psychological identity and behavioral identity have a positive impact on community members' willingness to recommend. Behavioral identity plays a partial mediating role between psychological identity and recommendation intention. Based on the above analysis results, the present situation, limitations and future research directions of this study are put forward.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

Cost Avoidance and Clinical Pharmacist Interventions on Hospitalized Patients in Hematologic malignancies (혈액종양 입원 환자 대상 임상약사의 처방중재활동 및 회피비용 분석)

  • Kim, Ye Seul;Hong, So Yeon;Kim, Yoon Hee;Choi, Kyung Suk;Lee, Jeong Hwa;Lee, Ju-Yeun;Lee, Euni
    • Korean Journal of Clinical Pharmacy
    • /
    • v.32 no.3
    • /
    • pp.215-225
    • /
    • 2022
  • Background: Patients with hematologic cancers have a risk of drug-related problems (DRPs) from medications associated with chemotherapy and supportive care. Although the role of oncology pharmacists has been widely documented in the literature, few studies have reported its impact on cost reduction. This study aimed to describe the activities of oncology pharmacists with respect to hematologic diseases and evaluate the associated cost avoidance. Methods: From January to July 2021, patients admitted to the department of hemato-oncology at Seoul National University, Bundang Hospital were studied. The activities of oncology pharmacists were reported by DRP type following the Pharmaceutical Care Network version 9.1 guidelines, and the acceptance rate was calculated. The avoided cost was estimated based on the cost of the pharmacy intervention, pharmacist manpower, and prescriptions associated with the intervention. Results: Pharmacists intervened in 584 prescriptions from 208 patients during the study period. The most prevalent DRP was "adverse drug event (possibly) occurring" (32.4%), followed by "effect of drug treatment not optimal" (28.6%). "Drug selection" (42.5%) and "dose selection" (30.3%) were the most common causes of DRPs. The acceptance rate of the interventions was 97.1%. The total avoidance cost was KRW 149,468,321; the net profit of the avoidance cost, excluding labor costs, was KRW 121,051,690; and the estimated cost saving was KRW 37,223,748. Conclusion: Oncology pharmacists identified and resolved various types of DRPs from prescriptions for patients with hematologic disease, by reviewing the prescriptions. Their clinical service contributed to enhanced patient safety and the avoidance of associated costs.

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

Analysis of Deep Learning Research Trends Applied to Remote Sensing through Paper Review of Korean Domestic Journals (국내학회지 논문 리뷰를 통한 원격탐사 분야 딥러닝 연구 동향 분석)

  • Lee, Changhui;Yun, Yerin;Bae, Saejung;Eo, Yang Dam;Kim, Changjae;Shin, Sangho;Park, Soyoung;Han, Youkyung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.437-456
    • /
    • 2021
  • In the field of remote sensing in Korea, starting in 2017, deep learning has begun to show efficient research results compared to existing research methods. Currently, research is being conducted to apply deep learning in almost all fields of remote sensing, from image preprocessing to applications. To analyze the research trend of deep learning applied to the remote sensing field, Korean domestic journal papers, published until October 2021, related to deep learning applied to the remote sensing field were collected. Based on the collected 60 papers, research trend analysis was performed while focusing on deep learning network purpose, remote sensing application field, and remote sensing image acquisition platform. In addition, open source data that can be effectively used to build training data for performing deep learning were summarized in the paper. Through this study, we presented the problems that need to be solved in order for deep learning to be established in the remote sensing field. Moreover, we intended to provide help in finding research directions for researchers to apply deep learning technology into the remote sensing field in the future.