• Title/Summary/Keyword: sequence-to-sequence 모델

Search Result 695, Processing Time 0.022 seconds

A Classification Model for Attack Mail Detection based on the Authorship Analysis (작성자 분석 기반의 공격 메일 탐지를 위한 분류 모델)

  • Hong, Sung-Sam;Shin, Gun-Yoon;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.35-46
    • /
    • 2017
  • Recently, attackers using malicious code in cyber security have been increased by attaching malicious code to a mail and inducing the user to execute it. Especially, it is dangerous because it is easy to execute by attaching a document type file. The author analysis is a research area that is being studied in NLP (Neutral Language Process) and text mining, and it studies methods of analyzing authors by analyzing text sentences, texts, and documents in a specific language. In case of attack mail, it is created by the attacker. Therefore, by analyzing the contents of the mail and the attached document file and identifying the corresponding author, it is possible to discover more distinctive features from the normal mail and improve the detection accuracy. In this pager, we proposed IADA2(Intelligent Attack mail Detection based on Authorship Analysis) model for attack mail detection. The feature vector that can classify and detect attack mail from the features used in the existing machine learning based spam detection model and the features used in the author analysis of the document and the IADA2 detection model. We have improved the detection models of attack mails by simply detecting term features and extracted features that reflect the sequence characteristics of words by applying n-grams. Result of experiment show that the proposed method improves performance according to feature combinations, feature selection techniques, and appropriate models.

Design of Fetal Health Classification Model for Hospital Operation Management (효율적인 병원보건관리를 위한 태아건강분류 모델)

  • Chun, Je-Ran
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.263-268
    • /
    • 2021
  • The purpose of this study was to propose a model which is suitable for the actual delivery system by designing a fetal delivery hospital operation management and fetal health classification model. The number of deaths during childbirth is similar to the number of maternal mortality rate of 295,000 as of 2017. Among those numbers, 94% of deaths are preventable in most cases. Therefore, in this paper, we proposed a model that predicts the health condition of the fetus using data like heart rate of fetuses, fetal movements, uterine contractions, etc. that are extracted from the Cardiotocograms(CTG) test using a random forest. If the redundancy of the data is unbalanced, This proposed model guarantees a stable management of the fetal delivery health management system. To secure the accuracy of the fetal delivery health management system, we remove the outlier which embedded in the system, by setting thresholds for the upper and lower standard deviations. In addition, as the proportion of the sequence class uses the health status of fetus, a small number of classes were replicated by data-resampling to balance the classes. We had the 4~5% improvement and as the result we reached the accuracy of 97.75%. It is expected that the developed model will contribute to prevent death and effective fetal health management, also disease prevention by predicting and managing the fetus'deaths and diseases accurately in advance.

A Study on the Relationship between Adolescent Misconducts and Harmful Environment Based on Health Belief Model (건강신념모델을 적용한 청소년 비행과 유해환경과의 관련성 연구)

  • 이명선
    • Korean Journal of Health Education and Promotion
    • /
    • v.18 no.3
    • /
    • pp.37-58
    • /
    • 2001
  • This study placed its objectives in suggesting the basic data for setting up an approach to protect the educational environment, by analyzing the relevance between the misconducts of adolescence and the harmful environment around the school, as an object of study, middle school students and high school students all over the country. Thus, this study carried out the questionnaire survey, by the multi-stage of stratified sampling in 2,114 middle school and high school students from June 29, 2000 through July 29, 2000. And the results of analysis were as follows: 1. In case of the ratio of students using harmful environment, the electronic game room had the highest ratio (78.3%); next, the PC room (75.6%), the singing room (71.6%), and the cartoon room (34.3%). 2. In terms of the experiences of using the harmful environment according to the personal characteristics, high school students used it in a higher ratio, compared with middle school students (p〈0.001); the students, whose father graduated from a high school, comparatively used it much more(p〈0.05). Also, when a school is located near to amusement quarters or shopping centers, students used the harmful environment most highly (p〈0.001). And the differences were found to be statistically significant. 3. In case of the perceived susceptibility factors, the harmful environment was found to be used in lower ratio, by the students who answered “very so” to the question item, The more harmful environment facilities are positioned around school, the more student have the opportunities to use them. (p〈0.001). That is, the findings showed that the higher students' degree of perceived susceptibility factors was the less students used harmful environment facilities. The differences were statistically significant. In terms of the ratio of using harmful environment according to perceived seriousness factors, it was founded out that the students, who answered, “If I use any harmful environment facilities, it will be very harmful to myself.”. had the less opportunities of having used them, compared with the students who did not answer so (p〈0.001). This indicated that the higher the degrees perceived seriousness of students, the less they used harmful environment facilities. And the differences were statistically significant. In the side of the ratio of using harmful environment according to the perceived barriers, it was found out that there were any special large differences. That is, perceived barriers had nothing to do with students' using harmful environment. 4. As the result of having analyzed the factors influencing the behaviors of using harmful environment, the factor to explain the behaviors of using harmful environment was found to be the degree of perceived seriousness, among individual perceiving factors; next, the location of a school - one of personal characteristics, the degree of perceived susceptibility and ages, m sequence. 5. Among students' misconduct experiences, drinking was highest (21.6%), next, smoking (11.9%), drug abuse (4.3%), and sexual relations (1.6%), In sequence. Among other problematic behaviors, excessive waste was highest (14.6%); next, disobedience and lie (10.7%), night wandering (7.8%), and bad dressing and making-up (5.5%), in sequence. 6. In terms of the misconducts according to the behaviors of using harmful environment, compared with the students who did not commit any misconducts, harmful environment facilities were used more highly, by each group of students who experienced drinking (p〈0.00l), smoking (p〈0.001), sexual relations (p〈0.05), excessive waste (p〈0.001), disobedience & lie (p〈0.001), and bad dressing & making-up (p〈0.05). And the differences were statistically significant.

  • PDF

Analysis of Loss of Offsite Power Transient Using RELAP5/MOD1/NSC; II: KNU1 Design-Base Simulation (RELAP5/MOD1/NSC를 이용한 원자력 1호기 외부전원상실사고해석;II:설계기준사고)

  • Kim, Hyo-Jung;Chung, Bub-Dong;Lee, Young-Jin;Kim, Jin-Soo
    • Nuclear Engineering and Technology
    • /
    • v.18 no.3
    • /
    • pp.175-182
    • /
    • 1986
  • The KNUI (Korea Nuclear Unit 1) loss of offsite power transient as a design-base accident has been simulated using the RELAP5/MOD1/NSC computer code. The analysis is carried out using the best-estimate methodology, but the sequence and its assumptions are based on the evaluation methodology th at emphasizes conservatism. Important thermal-hydraulic parameters such as average temperature, steam generator level and pressurizer water volume are compared with the results in the KNU1 Final Safety Analysis Report (FSAR). The present analysis gives much lower RCS average temperature and pressurizer water volume, and much higher S/G water volume at the turnaround point, which may be considered to be additional improved safety margins. This is expected since the present analysis deals with the best-estimate thermal-hydraulic models as well as the initial conditions on a best-estimate basis. These additional safety margins may contribute to further validate the safety of the KNU1 in this type of accidents(Decrease in Heat Removal by the Secondary System).

  • PDF

A Design of Model for Interoperability in Heterogeneous Multi-Database Adopting Mixed View Management Mechanism on Distributed Environments (분산환경에서 혼용 뷰 관리기법을 채택한 이질적인 멀티데이타베이스 상호운용 모델 설계)

  • Lee Seungyong;Park Jaebok;Kim Myunghee;Joo Sujong
    • The KIPS Transactions:PartD
    • /
    • v.12D no.4 s.100
    • /
    • pp.531-542
    • /
    • 2005
  • In this paper, we propose the MDBMS(Multi-DataBase Management System) which integrates the LDBMSs(Local DataBase Systems) with heterogeneous environment into distributed system and provides global users with rapidly query process. For designing the MDBMS, we define the functions of components and design the interaction among them. In a point of view of the global view manager in components, we describe the following 3 cases; (1)the case which the results for the global query are all stored to the global view repository, (2)the case which no result exists in the global view repository, and (3)the case which the partial results we stored to the global view repository. By comparing above cases, we establish the functionalities of our MDBMS through the sequence diagram including the interlace of among objects and the method calling. Finally, we propose the model designed in the concrete by showing the executing procedures of each function using sample query on established functions mentioned above.

A USE CASE based Test Model for CBD Based Software (CBD 기반 소프트웨어에 대한 유스케이스 기반 테스트모델)

  • 유지호;이남용
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.239-252
    • /
    • 2003
  • High quality software is the one that has an excellent performance with a low price, consumer's request satisfaction and less bug. In addition, it should have structure easily maintainable. CBD(Component Based Development)technology is getting more popular as a method for software development which can satisfy all above conditions. Although there are a lot of test methods about component for composition, function, compatibility and reliability, it's not enough to ensure that the component has reliability, maintainability, and reusability, so an integated method are necessary. In this paper, we are going to propose the solution model for integrating components, which are based on UML (Unified Modeling Language) technologies. This model can extract existing faults in the component interfaces by referencing sequence diagram and collaboration diagram.

  • PDF

Deep learning-based speech recognition for Korean elderly speech data including dementia patients (치매 환자를 포함한 한국 노인 음성 데이터 딥러닝 기반 음성인식)

  • Jeonghyeon Mun;Joonseo Kang;Kiwoong Kim;Jongbin Bae;Hyeonjun Lee;Changwon Lim
    • The Korean Journal of Applied Statistics
    • /
    • v.36 no.1
    • /
    • pp.33-48
    • /
    • 2023
  • In this paper we consider automatic speech recognition (ASR) for Korean speech data in which elderly persons randomly speak a sequence of words such as animals and vegetables for one minute. Most of the speakers are over 60 years old and some of them are dementia patients. The goal is to compare deep-learning based ASR models for such data and to find models with good performance. ASR is a technology that can recognize spoken words and convert them into written text by computers. Recently, many deep-learning models with good performance have been developed for ASR. Training data for such models are mostly composed of the form of sentences. Furthermore, the speakers in the data should be able to pronounce accurately in most cases. However, in our data, most of the speakers are over the age of 60 and often have incorrect pronunciation. Also, it is Korean speech data in which speakers randomly say series of words, not sentences, for one minute. Therefore, pre-trained models based on typical training data may not be suitable for our data, and hence we train deep-learning based ASR models from scratch using our data. We also apply some data augmentation methods due to small data size.

Effect of Non-homologous Spacing in Target DNA Sequence on the Frequency of Cloning Based Homologous Recombination (Target DNA 염기서열 내에 존재하는 비상동성 간격이 상동성재조합을 이용한 클로닝 빈도에 미치는 영향)

  • Kim Jae-Woo;Do Eun-Ju;Yoon Se-Lyun;Jeong Yun-Hee;Yoon Young-Ho;Leem Sun-Hee;Sunwoo Yangil;Park In-Ho
    • Korean Journal of Microbiology
    • /
    • v.41 no.4
    • /
    • pp.239-245
    • /
    • 2005
  • Transformation-Associated Recombination (TAR) cloning technique allows selective isolation of chromosomal regions and genes from complex genomes. The procedure requires knowledge of relatively small genomic sequences that reside adjacent to the chromosomal region of interest. This technique involves homologous recombination during yeast spheroplast transformation between genomic DNA and a TAR vector that has 5' and 3' gene targeting sequences. In this study, we examined the effect of non-homologous spacing sequence in target hooks on homologous recombination using a plasmid model system. The efficiency of homologous recombination between the modified his3-TRP1-his3 fragments and HlS3 gene on plasmid were analyzed by the characterization of $Ura^+$ transformants. The numbers of $Ura^+$ transformant showed same level when seven different modified his3-TRP1-his3 fragments were used. But the percentage of positive recombinants. $Trp^+His^-$, dramatically decreased when used the modified his3-TRP1-his3 fragments contained incorrect spacing of nonhomologous region. As a result, we suggest that incorrect spacing inhibits the homologous recombination between target hook and substrate DNA. Therefore, we should consider the correct spacing in target hook when the target hook are used for cloning of orthologue gene.

Analysis of Loss of Offsite Power Transient Using RELAP5/MODl/NSC; I: KNU1 Plant Transient Simulation (RELA5/MOD1/NSC를 이용한 원자력 1호기 외부전원상실사고해석 - I. 실제사고해석)

  • Kim, Hho-Jung;Chung, Bub-Dong;Lee, Young-Jin;Kim, Jin-Soo
    • Nuclear Engineering and Technology
    • /
    • v.18 no.2
    • /
    • pp.97-106
    • /
    • 1986
  • System thermal-hydraulic parameters and simulated, using the best-estimate system code(RELAPS/MODl/NSC), based upon the sequence of events for the KNU1 (Korea Nuclear Unit 1) loss of offsite power transient at 77.5% power which occurred on June 9,1981. The results are compared with the actual plant transient data and show good agreements. After the flow coastdown following the trips of both reactor coolant pumps, the establishment of natural circulation by the temperature difference between the hot and the cold legs is confirmed. The calculated reactor coolant flowrate closely approximates the plant data indicating the validity of relevant thermal-hydraulic models in the RELAP5/MOD1/NSC. Results also show that the sufficient heat removal capability is secured by the appropriate supply of the auxiliary feedwater without the operation of S/G PORVs. In addition, a scenario accident at full power, based upon the same sequence of events described above, is also analysed and the results confirmed that the safety of KNU1 is secured by the appropriate operation of the S/G PORVs coupled with the supply of auxiliary feedwater which ensures sufficient heat removal capability. The characteristics of the non-safety related components such as the turbine stop valve closing time, S/G PORV settings etc. are recognized to be important in the transient analyses on a bestestimate basis.

  • PDF

A Design of Time-based Anomaly Intrusion Detection Model (시간 기반의 비정상 행위 침입탐지 모델 설계)

  • Shin, Mi-Yea;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1066-1072
    • /
    • 2011
  • In the method to analyze the relationship in the system call orders, the normal system call orders are divided into a certain size of system call orders to generates gene and use them as the detectors. In the method to consider the system call parameters, the mean and standard deviation of the parameter lengths are used as the detectors. The attack of which system call order is normal but the parameter values are changed, such as the format string attack, cannot be detected by the method that considers only the system call orders, whereas the model that considers only the system call parameters has the drawback of high positive defect rate because of the information obtained from the interval where the attack has not been initiated, since the parameters are considered individually. To solve these problems, it is necessary to develop a more efficient learning and detecting method that groups the continuous system call orders and parameters as the approach that considers various characteristics of system call related to attacking simultaneously. In this article, we detected the anomaly of the system call orders and parameters by applying the temporal concept to the system call orders and parameters in order to improve the rate of positive defect, that is, the misjudgment of anomaly as normality. The result of the experiment where the DARPA data set was employed showed that the proposed method improved the positive defect rate by 13% in the system call order model where time was considered in comparison with that of the model where time was not considered.