• Title/Summary/Keyword: Bayesian Network

Search Result 514, Processing Time 0.02 seconds

Game Theory for Routing Modeling in Communication Networks - A Survey

  • Pavlidou, Fotini-Niovi;Koltsidas, Georgios
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.268-286
    • /
    • 2008
  • In this work, we review the routing models that use game theoretical methodologies. A very common assumption in the analysis and development of networking algorithms is the full cooperation of the participating nodes. Most of the analytical tools are based on this assumption. However, the reality may differ considerably. The existence of multiple domains belonging to different authorities or even the selfishness of the nodes themselves could result in a performance that significantly deviates from the expected one. Even though it is known to be extensively used in the fields of economics and biology, game theory has attracted the interest of researchers in the field of communication networking as well. Nowadays, game theory is used for the analysis and modeling of protocols in several layers, routing included. This review aims at providing an elucidation of the terminology and principles behind game theory and the most popular and recent routing models. The examined networks are both the traditional networks where latency is of paramount importance and the emerging ad hoc and sensor networks, where energy is the main concern.

Stereo Matching using Belief Propagation with Line Grouping (신뢰확산 알고리듬을 이용한 선 그룹화 기반 스테레오 정합)

  • Kim Bong-Gyum;Eem Jae-Kwon
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.3 s.303
    • /
    • pp.1-6
    • /
    • 2005
  • In the Markov network which models disparity map with the Markov Random Fields(MRF), the belief propagation algorithm is operated by message passing between nodes corresponding to each pixel. The initial message value is converged by iterations of the algorithm and the algorithm requires many iterations to get converged messages. In this paper, we simplify the algorithm by regarding the objects in the disparity map as combinations of lines with same message valued nodes to reduce iterations of the algorithm.

Features Reduction using Logistic Regression for Spam Filtering (로지스틱 회귀 분석을 이용한 스펨 필터링의 특징 축소)

  • Jung, Yong-Gyu;Lee, Bum-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.13-18
    • /
    • 2010
  • Today, The much amount of spam that occupies the mail server and network storage occurs the lack of negative issues, such as overload, and for users to delete the spam should spend time, resources have a problem. Automatic spam filtering on the incidence to solve the problem is essential. A lot of Spam filters have tried to solve the problem emerged as an essential element automatically. Unlike traditional method such as Naive Bayesian, PCA through the many-dimensional data set of spam with a few spindle-dimensional process that narrowed the operation to reduce the burden on certain groups for classification Logistic regression analysis method was used to filter the spam. Through the speed and performance, it was able to get the positive results.

A Study on Speaker Identification Using Hybrid Neural Network (하이브리드 신경회로망을 이용한 화자인식에 관한 연구)

  • Shin, Chung-Ho;Shin, Dea-Kyu;Lee, Jea-Hyuk;Park, Sang-Hee
    • Proceedings of the KIEE Conference
    • /
    • 1997.11a
    • /
    • pp.600-602
    • /
    • 1997
  • In this study, a hybrid neural net consisting of an Adaptive LVQ(ALVQ) algorithm and MLP is proposed to perform speaker identification task. ALVQ is a new learning procedure using adaptively feature vector sequence instead of only one feature vector in training codebooks initialized by LBG algorithm and the optimization criterion of this method is consistent with the speaker classification decision rule. ALVQ aims at providing a compressed, geometrically consistent data representation. It is fit to cover irregular data distributions and computes the distance of the input vector sequence from its nodes. On the other hand, MLP aim at a data representation to fit to discriminate patterns belonging to different classes. It has been shown that MLP nets can approximate Bayesian "optimal" classifiers with high precision, and their output values can be related a-posteriori class probabilities. The different characteristics of these neural models make it possible to devise hybrid neural net systems, consisting of classification modules based on these two different philosophies. The proposed method is compared with LBG algorithm, LVQ algorithm and MLP for performance.

  • PDF

Development of Customized Strategy for Enhancing Automobile Repurchase Using Data Mining Techniques (자동차 재구매 증진을 위한 데이터 마이닝 기반의 맞춤형 전략 개발)

  • Lee, Dong-Wook;Choi, Keun-Ho;Yoo, Dong-Hee
    • The Journal of Information Systems
    • /
    • v.26 no.3
    • /
    • pp.47-61
    • /
    • 2017
  • Purpose Although automobile production has increased since the development of the Korean automobile industry, the number of customers who can purchase automobiles decreases relatively. Therefore, automobile companies need to develop strategies to attract customers and promote their repurchase behaviors. To this end, this paper analyzed customer data from a Korean automobile company using data mining techniques to derive repurchase strategies. Design/methodology/approach We conducted under-sampling to balance the collected data and generated 10 datasets. We then implemented prediction models by applying a decision tree, naive Bayesian, and artificial neural network algorithms to each of the datasets. As a result, we derived 10 patterns consisting of 11 variables affecting customers' decisions about repurchases from the decision tree algorithm, which yielded the best accuracy. Using the derived patterns, we proposed helpful strategies for improving repurchase rates. Findings From the top 10 repurchase patterns, we found that 1) repurchases in January are associated with a specific residential region, 2) repurchases in spring or autumn are associated with whether it is a weekend or not, 3) repurchases in summer are associated with whether the automobile is equipped with a sunroof or not, and 4) a customized promotion for a specific occupation increases the number of repurchases.

Information Recommendation in Mobile Environment using a Multi-Criteria Decision Making (다기준 의사 결정 방법을 이용한 모바일 환경에서의 정보추천)

  • Park, Han-Saem;Park, Moon-Hee;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.306-310
    • /
    • 2008
  • Since the preference for information recommendation service can change according to the context, we should know the user context before providing information recommendation. This paper proposes recommender system that considers multi-user preference in mobile environment and attempted to apply it to restaurant recommendation. To model the preference of individual users in mobile environment, we have used Bayesian network, and restaurant recommendation mostly should consider not an individual user but several users, so this paper has used AHP of multi-criteria decision making process to obtain the preference of several users based on one of individual users. For experiments, we conducted recommendation in 10 different situations, and finally, we confirmed that the proposed system was evaluated as a good one using a usability test of SUS.

Crowd Activity Recognition using Optical Flow Orientation Distribution

  • Kim, Jinpyung;Jang, Gyujin;Kim, Gyujin;Kim, Moon-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2948-2963
    • /
    • 2015
  • In the field of computer vision, visual surveillance systems have recently become an important research topic. Growth in this area is being driven by both the increase in the availability of inexpensive computing devices and image sensors as well as the general inefficiency of manual surveillance and monitoring. In particular, the ultimate goal for many visual surveillance systems is to provide automatic activity recognition for events at a given site. A higher level of understanding of these activities requires certain lower-level computer vision tasks to be performed. So in this paper, we propose an intelligent activity recognition model that uses a structure learning method and a classification method. The structure learning method is provided as a K2-learning algorithm that generates Bayesian networks of causal relationships between sensors for a given activity. The statistical characteristics of the sensor values and the topological characteristics of the generated graphs are learned for each activity, and then a neural network is designed to classify the current activity according to the features extracted from the multiple sensor values that have been collected. Finally, the proposed method is implemented and tested by using PETS2013 benchmark data.

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment

  • Liu, Zhiquan;Ma, Jianfeng;Jiang, Zhongyuan;Miao, Yinbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.914-934
    • /
    • 2016
  • In the mobile distributed environment, an entity may move across domains with great frequency. How to utilize the trust information in the previous domains and quickly establish trust relationships with others in the current domain remains a challenging issue. The classic trust models do not support cross-domain and the existing cross-domain trust models are not in a fully distributed way. This paper improves the outstanding Certified Reputation (CR) model and proposes a Lightweight Cross-domain Trust (LCT) model for the mobile distributed environment in a fully distributed way. The trust certifications, in which the trust ratings contain various trust aspects with different interest preference weights, are collected and provided by the trustees. Furthermore, three factors are comprehensively considered to ease the issue of collusion attacks and make the trust certifications more accurate. Finally, a cross-domain scenario is deployed and implemented, and the comprehensive experiments and analysis are conducted. The results demonstrate that our LCT model obviously outperforms the Bayesian Network (BN) model and the CR model in our cross-domain scenario, and significantly improves the successful interaction rates of the honest entities without increasing the risks of interacting with the malicious entities.

Operational Availability Improvement through Online Monitoring and Advice For Emergency Diesel Generator

  • Lee, Jong-Beom;Kim, han-Gon;Kim, Byong-Sub;M. Golay;C.W. Kang;Y. Sui
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1998.05a
    • /
    • pp.264-270
    • /
    • 1998
  • This research broadens the prime concern of nuclear power plant operations from safe performance to both economic and safe performance. First emergency diesel generator is identified as one of main contributors for the lost plant availability through the review of plants forced outage records. The framework of an integrated architecture for performing modern on-line condition for operational availability improvement is configured in this work. For the development of the comprehensive sensor networks for complex target systems, an integrated methodology incorporating a structural hierarchy, a functional hierarchy, and a fault-system matrix is formulated. The second part of our research is development of intelligent diagnosis and maintenance advisory system, which employs Bayesian Belief networks (BBNs) as a high level reasoning tool incorporating inherent uncertainty use in probabilistic inference. Our prototype diagnosis algorithms are represented explicitly through topological symbols and links between them in a causal direction. As new evidence from sensor network development is entered into the model especially, our advisory of system provides operational advice concerning both availability and safety, so that the operator is able to determine the likely modes, diagnose the system state, locate root causes, and take the most advantageous action. Thereby, this advice improves operational availability

  • PDF

Review On the Identification and Evaluation of Unrecognized Risks for Passenger Ships (인식되지 않은 여객선 위기의 식별과 평가에 관한 고찰)

  • Park, Seong-Bug;Jeong, Jae-Yong;Yim, Jeong-Bin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.190-192
    • /
    • 2015
  • 여객선 관련 해양사고는 발생 가능한 빈도는 낮지만 사고 발생 시 심각성은 대단히 큰 것이 특징이다. 이에, 여객선 안전에 관해서는 대규모 사고 발생 후 사건의 심각성을 인식하는 경향이 크다. 코스타 콘코디아 사고와 세월호 사고 이후 전세계는 여객선 안전에 관해서 새로운 인식을 갖게 되었으나 근본적인 위기 제거나 감소 방안이 미흡하여 아직도 동남아시아에서는 크고 작은 사고가 지속 발생하고 있다. 사전에 발생 가능한 위기를 식별하여 이에 대한 대응방안을 선제적으로 마련하는 것이 최적으로 고려된다. 본 연구의 목적은 현재까지 인식되었으나 이에 대한 대응방안이 수립되지 않았거나 아직까지 인식하지 못한 위기를 식별한 후 이에 대한 해결 방안으로 RCO(Risk Control Option)을 마련하기 위한 것이다. 본 연구에서는 다양한 국내외 자료를 통해 위기를 식별하고 이에 대한 분석 평가 방법을 수립하고자 한다. 연구 검토결과, 해양사고 연계 체인을 바탕으로 위기를 식별하고 이에 대한 시나리오를 구축하여 베이지안 네트워크(Bayesian Network, BN)를 이용해서 확률적으로 위기를 분석 및 평가할 수 있음을 알았다. 향후 BN을 이용한 위기 순위 결정과 RCO 구축을 진행할 예정이다.

  • PDF