• Title/Summary/Keyword: False Set

Search Result 201, Processing Time 0.03 seconds

A Design for Efficient Similar Subsequence Search with a Priority Queue and Suffix Tree in Image Sequence Databases (이미지 시퀀스 데이터베이스에서 우선순위 큐와 접미어 트리를 이용한 효율적인 유사 서브시퀀스 검색의 설계)

  • 김인범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.613-624
    • /
    • 2003
  • This paper proposes a design for efficient and accurate retrieval of similar image subsequences using the multi-dimensional time warping distance as similarity evaluation tool in image sequence database after building of two indexing structures implemented with priority queue and suffix tree respectively. Receiving query image sequence, at first step, the proposed method searches the candidate set of similar image subsequences in priory queue index structure. If it can not get satisfied results, it retrieves another candidate set in suffix tree index structure at second step. The using of the low-bound distance function can remove the dissimilar subsequence without false dismissals during similarity evaluating process between query image sequence and stored sequences in two index structures.

  • PDF

An Anomaly Detection Method for the Security of VANETs (VANETs의 보안을 위한 비정상 행위 탐지 방법)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.77-83
    • /
    • 2010
  • Vehicular Ad Hoc Networks are self-organizing Peer-to-Peer networks that typically have highly mobile vehicle nodes, moving at high speeds, very short-lasting and unstable communication links. VANETs are formed without fixed infrastructure, central administration, and dedicated routing equipment, and network nodes are mobile, joining and leaving the network over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connect, without centralized control. In this paper, we propose a rough set based anomaly detection method that efficiently identify malicious behavior of vehicle node activities in these VANETs, and the performance of a proposed scheme is evaluated by a simulation in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

Fuzzy PID Control by Grouping of Membership Functions of Fuzzy Antecedent Variables with Neutrosophic Set Approach and 3-D Position Tracking Control of a Robot Manipulator

  • Can, Mehmet Serhat;Ozguven, Omerul Faruk
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.969-980
    • /
    • 2018
  • This paper aims to design of the neutrosophic fuzzy-PID controller and it has been compared with the conventional fuzzy-PID controller for position tracking control in terms of robustness. In the neutrosophic fuzzy-PID controller, error (e) and change of error (ce) were assessed separately on two fuzzy inference systems (FISs). In this study, the designed method is different from the conventional fuzzy logic controller design, membership degrees of antecedent variables were determined by using the T(true), I(indeterminacy), and F(false) membership functions. These membership functions are grouped on the universe of discourse with the neutrosophic set approach. These methods were tested on three-dimensional (3-D) position-tracking control application of a spherical robot manipulator in the MATLAB Simulink. In all tests, reference trajectory was defined for movements of all axes of the robot manipulator. According to the results of the study, when the moment of inertia of the rotor is changed, less overshoot ratio and less oscillation are obtained in the neutrosophic fuzzy-PID controller. Thus, our suggested method is seen to be more robust than the fuzzy-PID controllers.

Tree-Pattern-Based Clone Detection with High Precision and Recall

  • Lee, Hyo-Sub;Choi, Myung-Ryul;Doh, Kyung-Goo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.1932-1950
    • /
    • 2018
  • The paper proposes a code-clone detection method that gives the highest possible precision and recall, without giving much attention to efficiency and scalability. The goal is to automatically create a reliable reference corpus that can be used as a basis for evaluating the precision and recall of clone detection tools. The algorithm takes an abstract-syntax-tree representation of source code and thoroughly examines every possible pair of all duplicate tree patterns in the tree, while avoiding unnecessary and duplicated comparisons wherever possible. The largest possible duplicate patterns are then collected in the set of pattern clusters that are used to identify code clones. The method is implemented and evaluated for a standard set of open-source Java applications. The experimental result shows very high precision and recall. False-negative clones missed by our method are all non-contiguous clones. Finally, the concept of neighbor patterns, which can be used to improve recall by detecting non-contiguous clones and intertwined clones, is proposed.

Development of PCR Assay for Identification of Buffalo Meat

  • Rajapaksha, W.R.A.K.J.S.;Thilakaratne, I.D.S.I.P.;Chandrasiri, A.D.N.;Niroshan, T.D.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.16 no.7
    • /
    • pp.1046-1048
    • /
    • 2003
  • A polymerase chain reaction (PCR) assay was developed to differentiate buffalo meat from the meat of Ceylon spotted deer (Axis axis ceylonensis), Ceylon sambhur (Cervus unicolor unicolor), cattle (Bovine), goat (Caprine), pig (Porcine), and sheep (Ovine). A set of primers were designed according to the sequence of the mitochondrial cytochrome b gene of bubalus bubalis and by PCR amplification a band of approximately 242 bp band was observed with buffalo DNA. These primers did not cross-react with DNA of other animal species tested in the study under the specified reaction conditions. A band of 649 bp was observed for all animal species tested when DNA was amplified with the universal primers indicating the presence of mitochondrial DNA in the samples. The technique was sensitive enough to identify rotten (10 days post slaughter), dried and cooked buffalo meat. The absence of a cross reaction with human DNA using the buffalo specific primers eliminates possible false positive reactions.

The Efficient Dissolve Detection using Edge Elements on DWT Domain (DWT영역에서 에지 성분을 이용한 효과적인 Dissolve 검출)

  • Kim, Woon;Lee, Bae-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2000.06d
    • /
    • pp.7-10
    • /
    • 2000
  • There are many Problems such as low detection ratio, velocity and increase of false hit ratio on the detection of gradual scene changes with the previous shot transition detection algorithms. In this paper, we Propose an improved dissolve detection method using color information on low-frequency subband and edge elements on high-frequency subband. The Possible dissolve transition are found by analyzing the edge change ratio in the high-frequency subband with edge elements of each direction. Using the double chromatic difference on the lowest frequency subband, we have the improvement of the dissolve detection ratio. The simulation results show that the performance of the proposed algorithm is better than the conventional one for dissolve detection on a diverse set of uncompressed video sequences.

  • PDF

Pupil Detection using PCA and Hough Transform

  • Jang, Kyung-Shik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.21-27
    • /
    • 2017
  • In this paper, we propose a pupil detection method using PCA(principal component analysis) and Hough transform. To reduce error to detect eyebrows as pupil, eyebrows are detected using projection function in eye region and eye region is set to not include the eyebrows. In the eye region, pupil candidates are detected using rank order filter. False candidates are removed by using symmetry. The pupil candidates are grouped into pairs based on geometric constraints. A similarity measure is obtained for two eye of each pair using PCA and hough transform, we select a pair with the smallest similarity measure as final two pupils. The experiments have been performed for 1000 images of the BioID face database. The results show that it achieves the higher detection rate than existing method.

Multivariate Control Charts for Autocorrelated Process

  • Cho, Gyo-Young;Park, Mi-Ra
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.2
    • /
    • pp.289-301
    • /
    • 2003
  • In this paper, we propose Shewhart control chart and EWMA control chart using the autocorrelated data which are common in chemical and process industries and lead to increase the number of false alarms when conventional control charts are applied. The effect of autocorrelated data is modeled as a autoregressive process, and canonical analysis is used to reduce the dimensionality of the data set and find the canonical variables that explain as much of the data variation as possible. Charting statistics are constructed based on the residual vectors from the canonical variables which are uncorrelated over time, and the control charts for these statistics can attenuate the autocorrelation in the process data. The charting procedures are illustrated with a numerical example and simulation is conducted to investigate the performances of the proposed control charts.

  • PDF

A Method for Identifying Splice Sites and Translation Start Sites in Human Genomic Sequences

  • Kim, Ki-Bong;Park, Kie-Jung;Kong, Eun-Bae
    • BMB Reports
    • /
    • v.35 no.5
    • /
    • pp.513-517
    • /
    • 2002
  • We describe a new method for identifying the sequences that signal the start of translation, and the boundaries between exons and introns (donor and acceptor sites) in human mRNA. According to the mandatory keyword, ORGANISM, and feature key, CDS, a large set of standard data for each signal site was extracted from the ASCII flat file, gbpri.seq, in the GenBank release 108.0. This was used to generate the scoring matrices, which summarize the sequence information for each signal site. The scoring matrices take into account the independent nucleotide frequencies between adjacent bases in each position within the signal site regions, and the relative weight on each nucleotide in proportion to their probabilities in the known signal sites. Using a scoring scheme that is based on the nucleotide scoring matrices, the method has great sensitivity and specificity when used to locate signals in uncharacterized human genomic DNA. These matrices are especially effective at distinguishing true and false sites.

Development of Robust Feature Detector Using Sonar Data (초음파 데이터를 이용한 강인한 형상 검출기 개발)

  • Lee, Se-Jin;Lim, Jong-Hwan;Cho, Dong-Woo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.25 no.2
    • /
    • pp.35-42
    • /
    • 2008
  • This study introduces a robust feature detector for sonar data from a general fixed-type of sonar ring. The detector is composed of a data association filter and a feature extractor. The data association filter removes false returns provided frequently from sonar sensors, and classifies set of data from various objects and robot positions into a group in which all the data are from the same object. The feature extractor calculates the geometries of the feature for the group. We show the possibility of extracting circle feature as well as a line and a point features. The proposed method was applied to a real home environment with a real robot.