• Title/Summary/Keyword: False Set

Search Result 202, Processing Time 0.026 seconds

Multivariate Control Chart for Autocorrelated Process (자기상관자료를 갖는 공정을 위한 다변량 관리도)

  • Nam, Gook-Hyun;Chang, Young-Soon;Bai, Do-Sun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.27 no.3
    • /
    • pp.289-296
    • /
    • 2001
  • This paper proposes multivariate control chart for autocorrelated data which are common in chemical and process industries and lead to increase in the number of false alarms when conventional control charts are applied. The effect of autocorrelated data is modeled as a vector autoregressive process, and canonical analysis is used to reduce the dimensionality of the data set and find the canonical variables that explain as much of the data variation as possible. Charting statistics are constructed based on the residual vectors from the canonical variables which are uncorrelated over time, and therefore the control charts for these statistics can attenuate the autocorrelation in the process data. The charting procedures are illustrated with a numerical example and Monte Carlo simulation is conducted to investigate the performances of the proposed control charts.

  • PDF

A Simple Speech/Non-speech Classifier Using Adaptive Boosting

  • Kwon, Oh-Wook;Lee, Te-Won
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.3E
    • /
    • pp.124-132
    • /
    • 2003
  • We propose a new method for speech/non-speech classifiers based on concepts of the adaptive boosting (AdaBoost) algorithm in order to detect speech for robust speech recognition. The method uses a combination of simple base classifiers through the AdaBoost algorithm and a set of optimized speech features combined with spectral subtraction. The key benefits of this method are the simple implementation, low computational complexity and the avoidance of the over-fitting problem. We checked the validity of the method by comparing its performance with the speech/non-speech classifier used in a standard voice activity detector. For speech recognition purpose, additional performance improvements were achieved by the adoption of new features including speech band energies and MFCC-based spectral distortion. For the same false alarm rate, the method reduced 20-50% of miss errors.

Collision-free tool orientation optimization in five-axis machining of bladed disk

  • Chen, Li;Xu, Ke;Tang, Kai
    • Journal of Computational Design and Engineering
    • /
    • v.2 no.4
    • /
    • pp.197-205
    • /
    • 2015
  • Bladed disk (BLISK) is a vital part in jet engines with a complicated shape which is exclusively machined on a five-axis machine and requires high accuracy of machining. Poor quality of tool orientation (e.g., false tool positioning and unsmooth tool orientation transition) during the five-axis machining may cause collision and machine vibration, which will debase the machining quality and in the worst case sabotage the BLISK. This paper presents a reference plane based algorithm to generate a set of smoothly aligned tool orientations along a tool path. The proposed method guarantees that no collision would occur anywhere along the tool path, and the overall smoothness is globally optimized. A preliminary simulation verification of the proposed algorithm is conducted on a BLISK model and the tool orientation generated is found to be stable, smooth, and well-formed.

Patch-wise Robust Active Shape Model using Point Reliance Measurement

  • Hong, Sungmin;Park, Sanghyun;Yun, Il Dong;Lee, Sang Uk
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.471-472
    • /
    • 2012
  • The active shape model(ASM) is one of the most popular methods among the shape prior based segmentation methods based on its strong shape constraints using the statistic of shape information which is acquired from the training set. ASM has a few drawbacks, such as, the lack of shape variability, and the sensitivity for false locally searched points. In this paper, we suggest the patch-wise robust ASM to overcome the limitations of the ASM. In addition to the SSM, we introduce the patch-wise SSM, to reduce the shape inflexibility and to search reliable points with the point reliance measurement. The quantitative and qualitative results show the robustmness and the accuracy of the proposed method.

  • PDF

RETRACTED: Double-Dwell Hybrid Acquisition in a DS-UWB System

  • Wang, Yupeng;Chang, Kyung-Hi
    • ETRI Journal
    • /
    • v.29 no.1
    • /
    • pp.1-7
    • /
    • 2007
  • In this paper, we analyze the performance of double-dwell hybrid initial acquisition in a direct sequence ultra-wideband (DS-UWB) system via detection, miss, false alarm probabilities, and mean acquisition time. In the analysis, we consider the effect of the acquisition sequence as well as the deployment scenario of the abundant multipath components over small coverage of the piconet in the DS-UWB system. Based on the simulation, we obtain various performance measures for the mean acquisition time by varying parameters such as the total number of hypotheses to be searched, subgroup size, and dwell time. We thereupon suggest the optimum parameter set for the initial acquisition in the DS-UWB system.

  • PDF

Corrigendum to "On Soft Topological Space via Semi-open and Semi-closed Soft Sets, Kyungpook Mathematical Journal, 54(2014), 221-236"

  • Al-shami, Tareq Mohammed
    • Kyungpook Mathematical Journal
    • /
    • v.58 no.3
    • /
    • pp.583-588
    • /
    • 2018
  • In this manuscript, we show that the equality relations of the two assertions (ix) and (x) of [Theorem 2.11, p.p.224] in [3] do not hold in general, by giving a concrete example. Also, we illustrate that Example 6.3, Example 6.7, Example 6.11, Example 6.15 and Example 6.20 do not satisfy a soft semi $T_0$-space, a soft semi $T_1$-space, a soft semi $T_2$-space, a soft semi $T_3$-space and a soft semi $T_4$-space, respectively. Moreover, we point out that the three results obtained in [3] which related to soft subspaces are false, by presenting two examples. Finally, we construct an example to illuminate that Theorem 6.18 and Remark 6.21 made in [3] are not valid in general.

Clinical Aspect of MicroRNA in Lung Cancer

  • Jeong, Hye Cheol
    • Tuberculosis and Respiratory Diseases
    • /
    • v.77 no.2
    • /
    • pp.60-64
    • /
    • 2014
  • MicroRNAs (miRNAs) are a class of small noncoding RNAs that modulate target gene activity, and are aberrantly expressed in most types of cancer as well in lung cancer. A miRNA can potentially target a diverse set of mRNAs; further, it plays a critical role in lung tumorigenesis as well as affects patient outcome. Previous studies focused mainly on abnormal miRNAs expressions in lung cancer tissues. Interestingly, circulating miRNAs were identified in human plasma and serum in 2008. Since then, considerable effort has been directed to the study of circulating miRNAs as one of the biomarkers of lung cancer. miRNAs expression of tissues and blood in lung cancer patients is being analyzed by more researchers. Recently, to overcome the high false-positivity of low-dose chest computed tomography scan, miRNAs in lung cancer screening are being investigated. This article summarizes the recent researches regarding clinical applications of miRNAs in the diagnosis and management of lung cancer.

A New Formula to Predict the Exact Detection Probability of a Generalized Order Statistics CFAR Detector for a Correlated Rayleigh Target

  • Kim, Chang-Joo
    • ETRI Journal
    • /
    • v.16 no.2
    • /
    • pp.15-25
    • /
    • 1994
  • In this paper we present a new formula which can predict the exact detection probability of a generalized order statistics (GOS) constant false alarm rate (DFAR) detector for a partially correlated Rayleigh target model (0 < $ \rho$< 1) in a closed form, where $\rho$ is the correlation coefficient between returned pulses. By simply substituting a set of specific coefficient into the derived formula, one can obtain the detection probability of any kind of CFAR detector. Detectors may include the order statistics CFAR detector, the censored mean level detector, and the trimmed mean CFAR detector, but are not necessarily restricted to them. The numerical result for the first order Markov correlation model as applied to some of the detectors shows that as $\rho$ increases from zero to one, higher signal-to-noise ratio is required to achieve the same detection probability.

  • PDF

A determination of economic control limits considering process deterioration (공정의 열화를 고려한 경제적 관리한계 결정)

  • 심윤보;김성집
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.21 no.45
    • /
    • pp.237-246
    • /
    • 1998
  • In most statistical process control(SPC), control charts are used in which samples are taken and a suitable statistic is determined and plotted. In these control charts, control limits, ${\mu}{\pm}textsc{k{\sigma}}$, from which a decision is made are mostly ${\mu}{\pm}3{\sigma}$ and current literature in control charts are mainly concerned with detecting a shift in the mean. Therefore, when $\sigma$ is increased considerably after a long time, using control limits set at the first time causes a great deal of economic loss. In this paper the solutions to determine new control limits which maximizes the profit per unit produced and reduce $\sigma$ to economically optimal level for a certain cost when $\sigma$ is increased due to process deterioration are proposed. By applying new control limits, $\alpha$ error decreases considerably compared to apply initial control limits when $\sigma$ is increased due to process deterioration. Therefore, false alarm investigation cost drops down to the level of initial a error. And also this solution provides useful information regarding replacement of a process when the process is reviewed regularly.

  • PDF

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs

  • Chen, Yi-Ming;Wei, Yu-Chih
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.153-163
    • /
    • 2013
  • In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.