• Title/Summary/Keyword: 가중치부여 기법

Search Result 264, Processing Time 0.03 seconds

Extraction of Important Areas Using Feature Feedback Based on PCA (PCA 기반 특징 되먹임을 이용한 중요 영역 추출)

  • Lee, Seung-Hyeon;Kim, Do-Yun;Choi, Sang-Il;Jeong, Gu-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.461-469
    • /
    • 2020
  • In this paper, we propose a PCA-based feature feedback method for extracting important areas of handwritten numeric data sets and face data sets. A PCA-based feature feedback method is proposed by extending the previous LDA-based feature feedback method. In the proposed method, the data is reduced to important feature dimensions by applying the PCA technique, one of the dimension reduction machine learning algorithms. Through the weights derived during the dimensional reduction process, the important points of data in each reduced dimensional axis are identified. Each dimension axis has a different weight in the total data according to the size of the eigenvalue of the axis. Accordingly, a weight proportional to the size of the eigenvalues of each dimension axis is given, and an operation process is performed to add important points of data in each dimension axis. The critical area of the data is calculated by applying a threshold to the data obtained through the calculation process. After that, induces reverse mapping to the original data in the important area of the derived data, and selects the important area in the original data space. The results of the experiment on the MNIST dataset are checked, and the effectiveness and possibility of the pattern recognition method based on PCA-based feature feedback are verified by comparing the results with the existing LDA-based feature feedback method.

An Efficient Routing Protocol Considering Path Reliability in Cognitive Radio Ad-hoc Networks (인지 무선 애드혹 네트워크에서 경로 신뢰성을 고려한 효율적인 라우팅 기법)

  • Choi, Jun-Ho;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.730-742
    • /
    • 2014
  • In the case of On-demand routing protocol in cognitive radio ad-hoc networks, broadcasting of control packets may occur common control channel overload and packet collisions during the routing procedure. This situation is to increase the overhead of path finding and also limited to find the accurate and reliable path. Since reliable channel and path finding is restricted, path life time is shorten and path reliability is reduced. In this paper, we propose a new routing algorithm that reduces control channel overhead and increases path life time by considering the probability of appearance of primary user and channel status of neighbor nodes. Each node performs periodic local sensing to detect primary user signal and to derive primary user activity patterns. The probability of primary appearance on the current channel and the channel status can be obtained based on the periodic sensing. In addition, each node identifies the quality of the channel by message exchange through a common channel with neighbor nodes, then determines Link_Levels with neighbor nodes. In the proposed method, the Link Level condition reduces the number of control messages that are generated during the route discovery process. The proposed method can improve path life time by choosing a path through Path_Reliability in which stability and quality are weighted depending on the location. Through simulation, we show that our proposed algorithm reduces packet collisions and increases path life time in comparison with the traditional algorithm.

A Study on Anti-collision Algorithm in Gen2 Protocol Based RFID Systems (Gen2기반 RFID시스템에서의 충돌방지 알고리즘에 관한 연구)

  • Quan Cheng-Hao;Mo Hee-Sook;Choi Gil-Young;Pyo Cheol-Sig;Chae Jong-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.561-571
    • /
    • 2006
  • RFID technology, as one contact-less identification technology with using electronic tag, is the field where its multiple researches have been studied. Especially, in the field of supply chain management, when it is necessary to identify a lot of objects by real-time, performance of anti-collision algorithm for multiple tag identification has an effect on performance of entire system. GEN2 is global, open, interoperability protocol for UHF RFID system, the active researches and developments are processed about it. In this paper, we introduce an anti-collision algorithm based on Slotted-ALOHA for GEN2 protocol, focus on estimating number of tags and setting number of slots and review the previous works. We propose new scheme that can estimate number of tags efficiently, and define system efficiency newly when it's used in setting number of slots. We also present result of compare and analysis with previous scheme through simulation. The proposed scheme of estimating number of tags is easy to implement, number of tags which is less than 4 times of number of slots can estimate tags efficiently, we also proved that identification efficiency based on weighted-slot distinguished with definition of previous slot efficiency can improve system efficiency.

A Study on Personalized Advertisement System Using Web Mining (웹 마이닝을 이용한 개인 광고기법에 관한 연구)

  • 김은수;송강수;이원돈;송정길
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.92-103
    • /
    • 2003
  • Great many advertisements are serviced in on-line by development of electronic commerce and internet user's rapid increase recently. However, this advertisement service is stopping in one-side service of relevant advertisement rather than doing users' inclination analysis to basis. Therefore, want advertisement service that many websites are personalized for efficient service of relevant advertisement and service through relevant server's log analysis research and enforce. Take advantage of log data of local system that this treatise is not analysis of server log data and analyze user's Preference degree and inclination. Also, try to propose advertisement system personalized by making relevant site tributary category and give weight of relevant tributary. User's preference user preference which analysis is one part of cooperation fielder ring of web personalized techniques use information in visit site tributary and suppose internet user's action in visit number of times of relevant site and try inclination analysis of mixing form. Express user's preference degree by vector, and inclination analysis result uninterrupted data that simplicity application form is not regarded and techniques that propose inclination analysis change of data since with move data use and analyze newly and proposed so that can do continuous renewal and application as feedback Sikkim. Presented method that can choose advertisements of relevant tributary through this result and provide personalized advertisement service by applying process such as user inclination analysis in advertisement chosen.

  • PDF

The Study of quality measurement plan for software reliability (소프트웨어 신뢰도 품질측정 방안에 관한 연구)

  • Lim, Kwang-Hyeon;Ryu, Kwang-Sun;Shon, Ho-Sun;Ryu, Keun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.187-198
    • /
    • 2012
  • International standard for software quality evaluation, ISO/IEC 9126 defines the quality characteristics and sub-characteristics consisting of quality of the software. Also, in this standard, the quality assessment items are presented in metrics based on maturity, fault tolerance, recoverability and compliance which are sub-characteristics of reliability. However, this reliability assessment items which are presented are not applied now due to the mathematical difficulties and the problems caused by collection of data. In order to resolve these problems, this study introduces measures to develop a specific test technique by quality attributes and to measure the quality. In other words, the detailed guidelines are presented to be utilized as a standard by summarizing test activities and techniques by each development life the most commonly used. The SW quality results are derived by assigning weights to software in order of the most important quality characteristics of respective software using checklist that can be easily utilized and applying test technique that can be utilized for detailed evaluation items and checklist. This improves problems that include reliability assessment item of ISO/IEC 9126 as the measures to measure new reliability quality of software.

Health Risk Assessments using GIS Method for the Abandoned Asbestos Mines (GIS 기법을 이용한 폐석면 광산의 위해성 평가)

  • Choi, Jin-Beom;Son, Ill;Noh, Jin-Hwan
    • Journal of the Mineralogical Society of Korea
    • /
    • v.24 no.1
    • /
    • pp.43-53
    • /
    • 2011
  • Health risk assessments for the abandoned asbestos mine were usually performed with activity-based sampling (ABS) method, which was not a effective tool for indexing health risk on an exact small area of mine. A newly proposed potential index of health risk (PIHR) was applied with proper spatial determination of geographical information system (GIS) to assess quantitatively health risks. A new trial was applied to a certain abandoned mine in Boryong as follows: A high grade area of PIHR was estimated 7.8% of the whole area of the mine (about 27.3 ha). Based on US EPA IRIS (integrated risk information system) model considering lifetime excess cancer risk (LECR), the health risk assessment indicated that the high grade area increased from 3.0 ha through 12.9 ha to 19.5 ha with an increase of asbestos contents in soil from 0.36% (1E-04 level) through 0.1% (3E-05 level) to 0.04% (1E-05 level). These results can be effectively applied to determine reclamation area of the abandoned asbestos mine.

A Study on the Selection of Borrow Pits by Using VE Techniques (VE 기법을 이용한 토취장 선정에 관한 연구)

  • Kim, Seung-Ki;Lee, Byung-Suk;Yang, Jae-Hyouk;Lee, Jong-Cheon;Kim, Chan-kee
    • Journal of the Korean Geosynthetics Society
    • /
    • v.15 no.1
    • /
    • pp.59-70
    • /
    • 2016
  • The purpose of this study is to review that the VE techniques can be used as a selection tool of borrow pit locations. The analysis of the soil investigation report is performed for the selection of proposed borrow pit site on a large-scale residential development area. Possible earthwork volume of mining is estimated and the weighting matrix evaluation is applied to the VE techniques. After determining the evaluation items for VE assessment, important degree was calculated. The Rating and evaluation of performance is carried out on a proposed borrow pit site. And, development priority has to be decided for a proposed borrow pit sites. As a result, the relative construction cost is closely related to the haulage distance. As the haulage distance increases, the relative construction cost will be increased. Therefore, it was confirmed quantitatively that haulage distance has a significant impact on the select of borrow pits. Also, it was found that the condition of borrow pits itself is important, but it cannot be ignored the impact of the life cycle cost for the selection of optimal borrow pit sites.

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

Potential Mapping of Mountainous Wetlands using Weights of Evidence Model in Yeongnam Area, Korea (Weight of Evidence 기법을 이용한 영남지역의 산지습지 가능지역 추출)

  • Baek, Seung-Gyun;Jang, Dong-Ho
    • Journal of The Geomorphological Association of Korea
    • /
    • v.20 no.1
    • /
    • pp.21-33
    • /
    • 2013
  • Weight of evidence model was applied for potential mapping of mountainous wetland to reduce the range of the field survey and to increase the efficiency of operations because the surveys of mountainous wetland need a lot of time and money owing to inaccessibility and extensiveness. The relationship between mountainous wetland location and related factors is expressed as a probability by Weight of evidence model. For this, the spatial database consist of slope map, curvature map, vegetation index map, wetness index map, soil drainage rating map was constructed in Yeongnam area, Korea, and weights of evidence based on the relationship between mountainous wetland location and each factor rating were calculated. As a result of correlation analysis between mountainous wetland location and each factors rating using likelihood ratio values, the probability of mountainous wetlands were increased at condition of lower slope, lower curvature, lower vegetation index value, lower wetness value, moderate soil drainage rating. Mountainous Wetland Potential Index(MWPI) was calculated by summation of the likelihood ratio and mountainous wetland potential map was constucted from GIS integration. The mountain wetland potential map was verified by comparison with the known mountainous wetland locations. The result showed the 75.48% in prediction accuracy.

Environmental Analysis of Waste Cable Recycling Process using a Life Cycle Assessment Method (전과정평가기법을 활용한 폐전선 재자원화 공정의 환경성 평가)

  • Jang, Mi-Sun;Seo, Hyo-Su;Park, Hee-Won;Hwang, Yong-Woo;Kang, Hong-Yoon
    • Resources Recycling
    • /
    • v.31 no.1
    • /
    • pp.37-45
    • /
    • 2022
  • The development of the electrical, electronic, and telecommunication industries has increased the share of electricity in total energy consumption. With the enforcement of the Act on the Promotion of the Development, Use, and Diffusion of New and Renewable Energy in 2021, the mandatory supply ratio of new and renewable energy is expected to expand, and the amount of waste cables generated in the stage of replacing and discarding cables used in the industry is also expected to increase. The purpose of this study was to quantify the environmental burden of waste cable recycling through the life cycle assessment (LCA) method. The results showed that the higher the amount of glue contained in the waste cable, the greater was the amount of fine dust and greenhouse gases generated. In addition, by assigning weights to 10 environmental burden items, it was confirmed that the marine aquatic eco-toxicity potential (MAETP) and human toxicity potential (HTP) had the greatest environmental burden. The main causes were identified as heptane and ethanol, which were the glue contained in the waste cable and the cleaning solutions used to remove them. Therefore, it is necessary to refrain from using glue in the cable production process and reduce the environmental burden by reducing the use of waste cable cleaning solutions used in the recycling process or using alternative materials.