• Title/Summary/Keyword: 결합 알고리즘

Search Result 1,723, Processing Time 0.029 seconds

A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)

  • Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1525-1540
    • /
    • 2015
  • Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.

(The Development of Janggi Board Game Using Backpropagation Neural Network and Q Learning Algorithm) (역전파 신경회로망과 Q학습을 이용한 장기보드게임 개발)

  • 황상문;박인규;백덕수;진달복
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.1
    • /
    • pp.83-90
    • /
    • 2002
  • This paper proposed the strategy learning method by means of the fusion of Back-Propagation neural network and Q learning algorithm for two-person, deterministic janggi board game. The learning process is accomplished simply through the playing each other. The system consists of two parts of move generator and search kernel. The one consists of move generator generating the moves on the board, the other consists of back-propagation and Q learning plus $\alpha$$\beta$ search algorithm in an attempt to learn the evaluation function. while temporal difference learns the discrepancy between the adjacent rewards, Q learning acquires the optimal policies even when there is no prior knowledge of effects of its moves on the environment through the learning of the evaluation function for the augmented rewards. Depended on the evaluation function through lots of games through the learning procedure it proved that the percentage won is linearly proportional to the portion of learning in general.

A Study on the Performance Improvement of Fuzzy Controller Using Genetic Algorithm and Evolution Programming (유전알고리즘과 진화프로그램을 이용한 퍼지제어기의 성능 향상에 관한 연구)

  • 이상부;임영도
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.7 no.4
    • /
    • pp.58-64
    • /
    • 1997
  • FLC(Fuzzy Logic Controller) is stronger to the disturbance than a classical controller and its overshoot of the intialized value is excellent. In case an unknown process or the mathematical modeling of a complicated system is impossible, a fit control quantity can be acquired by the Fuzzy inference. But FLC can not converge correctly to the desirable value because the FLC's output value by the size of the quantization level of the Fuzzy variable always has a minor error. There are many ways to eliminate the minor error, but I will suggest GA-FLC and EP-FLC Hybrid controller which csombines FLC with GA(Genetic Algorithm) and EP(Evo1ution Programming). In this paper, the output characteristics of this Hybrid controller will be compared and analyzed with those of FLC, it will he showed that this Hybrid controller converge correctly to the desirable value without any error, and !he convergence speed performance of these two kinds of Hyhrid controller also will be compared.

  • PDF

Interference Avoidance Technology in Cognitive Based MB-OFDM UWB System (인지 기반 MB-OFDM UWB 시스템에서의 간섭 회피 기술)

  • Sung, Tae-Kyung;Weon, Young-Su;Cho, Hyung-Rae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.6
    • /
    • pp.677-687
    • /
    • 2008
  • CR technology is an intelligent technology which can sense the spectrum environment an adaptively adjust the parameters for wireless transmission. In this paper, by using CR-UWB, the spectrum efficiency of the transmission channel is largely improved; Furthermore, the interference to other system can be effectively avoided. In this paper, we propose a solution on interference problem of UWB system using cognitive radio. We use interference temperature model of cognitive radio that has proposed by FCC for estimating interference signal. Calculating channel capacity of UWB system with interference temperature, we suggest how to solve interference problem. We have used genetic algorithm in cognitive engine's calculation precess. The proposed UWB System with cognitive radio shows very efficient in solving interference problem.

Optimization of a Broadband Waveguide Magic-T for X-Band Monopulse Tracking Radars (X-Band 모노펄스 추적 레이더를 위한 광대역 도파관 Magic-T 최적화 설계)

  • Hwang, Keum-Cheol
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.10
    • /
    • pp.1042-1049
    • /
    • 2009
  • Design and optimization of a broadband waveguide magic-T was performed for X-Band tracking radars. A multi-stepped conducting cylinder was used to enhance the bandwidth performance of the conventional waveguide magic-Ts. Particles swarm optimization in conjunction with genetic algorithm was employed to obtain the optimized geometrical parameters. The optimized design exhibits low reflection coefficient below -20 dB at all waveguide ports with frequency bandwidth of 12%. The transmission loss and difference are within 0.2 dB and 0.1 dB, respectively. Measured results are also shown to be in good agreement with the simulated results. Finally, the bandwidth performances for five and seven-stepped conducting cylinders are also investigated.

Form-finding of Tensegrity Systems by using Frequency Constraints (진동수 목적함수를 이용한 텐세그리티 시스템의 형상탐색기법)

  • Lee, Seung Hye;Lee, Jae Hong;Kang, Joo Won
    • Journal of Korean Society of Steel Construction
    • /
    • v.28 no.5
    • /
    • pp.337-344
    • /
    • 2016
  • In this study, a form-finding method of tensegrity systems by using the force density method combined with the stiffness matrix method was presented. Numerous studies have been made on form-finding methods of the tensegrity systems. However, these methods are limited in the tensegrity systems with multiple null space of the equilibrium matrix. The proposed method can uniquely define a single integral feasible set of force densities for the structures. In order to draw maximum natural frequency that can lead a maximum stiffness of the tensegrity systems, a constrained maximization problem is formulated in the genetic algorithm. Several numerical examples are presented to prove dfficiency in searching for self-equilibrium congifurations of tensegrity systems with multiple self-stress states. A good performance of the proposed method has been shown in the results.

Diagnosing Multiple Faults using Multiple Context Spaces (다중 상황공간을 이용한 다중 오류의 고장 진단)

  • Lee, Gye-Sung;Gwon, Gyeong-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.137-148
    • /
    • 1997
  • Diagnostic problem solving is a major application area of knowledge-based systems research. However, most of the current approaches, both heuristic and model-based, are designed to identify single faults, and do not generalize easily to multiple fault diagnosis without exhibiting exponential behavior in the amount of computation required. In this paper, we employ a decomposition approach based on system configuration to generate an efficient algorithm for multiple fault diagnosis. The basic idea of the algorithm is to reduce the inherent combinatorial explosion that occurs in generating multiple faults by partitioning the circuit into groups that correspond to output measurement points. Rules are multiple faults by partitioning the circuit into groups that correspond to output measurement points. rules are developed for combining candidates from individual groups, and forming consistent sets of minimal candidates.

  • PDF

Feature Vector Extraction and Automatic Classification for Transient SONAR Signals using Wavelet Theory and Neural Networks (Wavelet 이론과 신경회로망을 이용한 천이 수중 신호의 특징벡타 추출 및 자동 식별)

  • Yang, Seung-Chul;Nam, Sang-Won;Jung, Yong-Min;Cho, Yong-Soo;Oh, Won-Tcheon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.14 no.3
    • /
    • pp.71-81
    • /
    • 1995
  • In this paper, feature vector extraction methods and classification algorithms for the automatic classification of transient signals in underwater are discussed. A feature vector extraction method using wavelet transform, which shows good performance with small number of coefficients, is proposed and compared with the existing classical methods. For the automatic classification, artificial neural networks such as multilayer perceptron (MLP), radial basis function (RBF), and MLP-Class are utilized, where those neural networks as well as extracted feature vectors are combined to improve the performance and reliability of the proposed algorithm. It is confirmed by computer simulation with Traco's standard transient data set I and simulated data that the proposed feature vector extraction method and classification algorithm perform well, assuming that the energy of a given transient signal is sufficiently larger than that of a ambient noise, that there are the finite number of noise sources, and that there does not exist noise sources more than two simultaneously.

  • PDF

Hierarchical Clustering-Based Cloaking Algorithm for Location-Based Services (위치 기반 서비스를 위한 계층 클러스터 기반 Cloaking 알고리즘)

  • Lee, Jae-Heung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.8
    • /
    • pp.1155-1160
    • /
    • 2013
  • The rapid growth of smart phones has made location-based services (LBSs) widely available. However, the use of LBS can raise privacy issues, as LBS can allow adversaries to violate the location privacy of users. There has been a considerable amount of research on preserving user location privacy. Most of these studies try to preserve location privacy by achieving what is known as location K-anonymity. In this paper, we propose a hierarchical clustering-based spatial cloaking algorithm for LBSs. The proposed algorithm constructs a tree using a modified version of agglomerative hierarchical clustering. The experimental results show, in terms of the ASR size, that the proposed algorithm is better than Hilbert Cloak and comparable to RC-AR (R-tree Cloak implementation of Reciprocal with an Asymmetric R-tree split). In terms of the ASR generation time, the proposed algorithm is much better in its performance than RC-AR and similar in performance to Hilbert Cloak.

Inter-working Architecture for Seamless Handover and QoS in Heterogeneous Wireless Networks (무선 이종 네트워크에서 향상된 핸드오버 및 QoS 보장을 위한 연구)

  • Kim, Moon;Moon, Tae-Wook;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.24-30
    • /
    • 2007
  • The integration of WLAN and beyond 3G mobile networks offers the possibility of achieving anytime and anywhere Internet access. Moreover the requests for seamless multimedia services and the Quality of Service (QoS) support have been one of key issues in wireless networks. Therefore the researches relative to seamless multimedia service and QoS over heterogeneous wireless networks have been progressing rapidly. In this paper, we propose inter-working architecture for supporting seamless multimedia service and QoS over WLAN and WiBro networks. Based on the proposed inter-working architecture, we also provide both the seamless handover architecture such an inter-network vertical handover and the QoS-aware wireless Medium Access Control (MAC) scheme. In addition, we evaluate and compare the performance by Network Simulator-2 (NS-2) simulations.

  • PDF