• Title/Summary/Keyword: things classification

Search Result 187, Processing Time 0.029 seconds

URL Filtering by Using Machine Learning

  • Saqib, Malik Najmus
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.275-279
    • /
    • 2022
  • The growth of technology nowadays has made many things easy for humans. These things are from everyday small task to more complex tasks. Such growth also comes with the illegal activities that are perform by using technology. These illegal activities can simple as displaying annoying message to big frauds. The easiest way for the attacker to perform such activities is to convenience user to click on the malicious link. It has been a great concern since a decay to classify URLs as malicious or benign. The blacklist has been used initially for that purpose and is it being used nowadays. It is efficient but has a drawback to update blacklist automatically. So, this method is replace by classification of URLs based on machine learning algorithms. In this paper we have use four machine learning classification algorithms to classify URLs as malicious or benign. These algorithms are support vector machine, random forest, n-nearest neighbor, and decision tree. The dataset that is used in this research has 36694 instances. A comparison of precision accuracy and recall values are shown for dataset with and without preprocessing.

E2GSM: Energy Effective Gear-Shifting Mechanism in Cloud Storage System

  • You, Xindong;Han, GuangJie;Zhu, Chuan;Dong, Chi;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4681-4702
    • /
    • 2016
  • Recently, Massive energy consumption in Cloud Storage System has attracted great attention both in industry and research community. However, most of the solutions utilize single method to reduce the energy consumption only in one aspect. This paper proposed an energy effective gear-shifting mechanism (E2GSM) in Cloud Storage System to save energy consumption from multi-aspects. E2GSM is established on data classification mechanism and data replication management strategy. Data is classified according to its properties and then be placed into the corresponding zones through the data classification mechanism. Data replication management strategies determine the minimum replica number through a mathematical model and make decision on replica placement. Based on the above data classification mechanism and replica management strategies, the energy effective gear-shifting mechanism (E2GSM) can automatically gear-shifting among the nodes. Mathematical analytical model certificates our proposed E2GSM is energy effective. Simulation experiments based on Gridsim show that the proposed gear-shifting mechanism is cost effective. Compared to the other energy-saved mechanism, our E2GSM can save energy consumption substantially at the slight expense of performance loss while meeting the QoS of user.

A Classification of Korean Traditional Materials Focused on Visual Texture (시각적 질감을 중심으로 한 한국 전통소재의 체계적 분류)

  • 박영순;김영인;이현주;신인호;최선미;최희승
    • Archives of design research
    • /
    • v.14 no.2
    • /
    • pp.197-207
    • /
    • 2001
  • A designed object reveals its meaning and image through form, color and material. Among these three elements, material has more powerful influence with its tactile and visual characteristics. In Korea, traditionally materials itself were mainly used to design artifacts rather than various color or formal decoration. The purpose of this study is to investigate the Korean traditional materials, and to classify them by the characteristics of their texture. For this study, the pictures of Korean traditional artifacts were collected from the national museums and literature. Those are architectural and interior elements, furniture, cloths and textiles, arts and crafts. Total of 533 collected artifacts were classified into seven categories, metal, day, stone, paper, wood, straw, fabric things. : 59 metal things, 115 clay things, 62 stone things, 73 paper things, 80 wood things, 47 straw things, 97 fabric things. Each materials were classified into its forming methods and surface treatment focused on the he characteristics of their surface texture. Throughout this study, the uniqueness of forming method and surface treatment of each materials in Korea has been clarified. And furthermore the classification by this various traditional methods of materials will provide plentiful information and ideas to today's designers of the world.

  • PDF

Standardization Study of Font Shape Classification for Hangul Font Registration System (한글 글꼴 등록 시스템을 위한 글꼴 모양 분류체계 표준화 연구)

  • Kim, Hyun-Young;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.3
    • /
    • pp.571-580
    • /
    • 2017
  • Recently, there are many communication softwares based on text on various smart devices. Unlike traditional print publishing, mobile publishing and SNS tools tends to utilize more decorative or more emotional fonts so that users can pass some feelings from contents. So font providers have released new fonts which deal with the requirements of the market. Nevertheless being released lots of new fonts, general users have not used them because they searched only by font name or font provider's name. It means that there is no way for users to know and find new things. In this study, we suggest font shape classification rules for font registration system based on font design features. We proved the validity of classification standard study through some experiments with 50 commercial fonts. Also the result of this study was provided for Korea Telecommunication Technology Association and adopted by the Korea industrial standard.

IoT Malware Detection and Family Classification Using Entropy Time Series Data Extraction and Recurrent Neural Networks (엔트로피 시계열 데이터 추출과 순환 신경망을 이용한 IoT 악성코드 탐지와 패밀리 분류)

  • Kim, Youngho;Lee, Hyunjong;Hwang, Doosung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.5
    • /
    • pp.197-202
    • /
    • 2022
  • IoT (Internet of Things) devices are being attacked by malware due to many security vulnerabilities, such as the use of weak IDs/passwords and unauthenticated firmware updates. However, due to the diversity of CPU architectures, it is difficult to set up a malware analysis environment and design features. In this paper, we design time series features using the byte sequence of executable files to represent independent features of CPU architectures, and analyze them using recurrent neural networks. The proposed feature is a fixed-length time series pattern extracted from the byte sequence by calculating partial entropy and applying linear interpolation. Temporary changes in the extracted feature are analyzed by RNN and LSTM. In the experiment, the IoT malware detection showed high performance, while low performance was analyzed in the malware family classification. When the entropy patterns for each malware family were compared visually, the Tsunami and Gafgyt families showed similar patterns, resulting in low performance. LSTM is more suitable than RNN for learning temporal changes in the proposed malware features.

A study on the classification systems of domestic security fields (국내 보안 분야의 분류 체계에 관한 연구)

  • Jeon, Jeong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.81-88
    • /
    • 2015
  • Recently the Security fields is emerged as a important issue in the world, While a variety of techniques such as a Cloud Computing or a Internet Of Things appeared. In these circumstances, The domestic security fields are divided into the Information Security, the Physical Security and the Convergence Security. and among these security fields, Convergence security is attracted much attention from various industries. the classification systems of a new field Convergence Security has become a very important criteria such about the Statistics calculation, the Analysis of status industry sector and the Road maps. However, In the domestic, The related institutions classified each other differently the Convergence Security Classification. so it is urgently needed a domestic security fields systematic classification due to the problems such as lack of reliability of the accuracy, compatibility of a data. Therefore, this paper will be analyzed to the characteristics of the domestic security classification systems by the cases. and will be proposed the newly improved classification system, to be possible to addition or deletion of an classification entries, and to be easy expanded according to the new technology trends. this proposed to classification system is expected to be utilized as a basis for the construct of a domestic security classification system in a future.

Characteristics and Development of Database Program for Maintenance and Management of Railway Tunnel (철도터널의 유지관리 DB 프로그램 개발 및 특성)

  • Lee, Song;Koo, Ja-Kap;Shim, Min-Bo
    • Journal of the Korean Society for Railway
    • /
    • v.3 no.3
    • /
    • pp.139-146
    • /
    • 2000
  • Recently, many kinds of research have been actively developing for a standardization and information to the field of design, construction, supervision, maintenance and management on facilities. The establishment of standard classification system on tunnel facilities and inspection data is most important among the things to have a efficiently maintenance and management. This paper suggests standard classification system on tunnel facilities and inspection data, and, on the basis of that, code work with standard classification system and input work was practised. The purpose of this paper is to suggest a kind of statistics data and investigate a characteristics of inspection using statistic data on railway tunnel.

  • PDF

Negative Selection Algorithm for DNA Sequence Classification

  • Lee, Dong Wook;Sim, Kwee-Bo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.2
    • /
    • pp.231-235
    • /
    • 2004
  • According to revealing the DNA sequence of human and living things, it increases that a demand on a new computational processing method which utilizes DNA sequence information. In this paper we propose a classification algorithm based on negative selection of the immune system to classify DNA patterns. Negative selection is the process to determine an antigenic receptor that recognize antigens, nonself cells. The immune cells use this antigen receptor to judge whether a self or not. If one composes n group of antigenic receptor for n different patterns, they can classify into n patterns. In this paper we propose a pattern classification algorithm based on negative selection in nucleotide base level and amino acid level.

IoT based Situation-specific Task Classification Algorithm (IoT 기반 상황 별 작업 분류 알고리즘)

  • Jeong, Dohyeong;Kim, Chuelhee;Lee, Jaeseung;Lee, Hyoungseon;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.613-614
    • /
    • 2017
  • Recently, research on the automation of home IoT has been carried out in which IoT (Internet of Things) is applied inside the home. However, the conventional IoT automation system has a problem that the operation of the device is limited only by the threshold value of the sensor, so that the device may collide and interfere with each other and the efficiency of the Task is low due to the malfunction of the device. In this paper, we propose a Situation-specific task classification algorithm to solve these problems. Using the sensor threshold and the current date as classification values in the decision tree, the task according to the internal situation of the home is classified and the corresponding device is selected and proceeded. Therefore, it is expected that the users will be provided with a service that changes flexibly according to changes in the internal situation of the home, and the accuracy of the operation will be increased by reducing the malfunction of the device and the collision between the devices.

  • PDF