• Title/Summary/Keyword: Feature Analysis

Search Result 4,072, Processing Time 0.029 seconds

Derivation of EEG Spectrum-based Feature Parameters for Mental Fatigue Determination (정신적 피로 판별을 위한 뇌파 스펙트럼 기반 특징 파라미터 도출)

  • Seo, Ssang-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.10-19
    • /
    • 2021
  • In this paper, we tried to derive characteristic parameters that reflect mental fatigue through EEG measurement and analysis. For this purpose, mental fatigue was induced through a resting state with eyes closed and performing subtraction operations in mental arithmetic for 30 minutes. Five subjects participated in the experiment, and all subjects were right-handed male students in university, with an average age of 25.5 years. Spectral analysis was performed on the EEG collected at the beginning and the end of the experiment to derive feature parameters reflecting mental fatigue. As a result of the analysis, the absolute power of the alpha band in the occipital lobe and the temporal lobe increased as the mental fatigue increased, while the relative power decreased. Also, the difference in power between resting state and task state showed that the relative power was larger than the absolute power. These results indicate that alpha relative power in the occipital lobe and temporal lobe is a feature parameter reflecting mental fatigue. The results of this study can be utilized as feature parameters for the development of an automated system for mental fatigue determination such as fatigue and drowsiness while driving.

Feature analysis for competency and representation type of mathematics assessment (수학과 평가 문항의 역량 및 표현 형식 특성 분석)

  • Park, Ji Hyun
    • The Mathematical Education
    • /
    • v.60 no.2
    • /
    • pp.209-228
    • /
    • 2021
  • The purpose of this study is developed the Item Feature Analysis (IFA) frameworks for curriculum-based assessments, focusing on Math competency and representation in secondary schools and implemented the IFA in National Assessment of Educational Achievement. To conduct the study, previous studies were analyzed, and feasibility studies were conducted twice. As a result of the study, we structured the IFA framework based on the 2015 revised mathematics curriculum in Korea and developed a method to analyze the characteristics of the math items. The results of structuring the framework for math included two categories: math competency in the content aspects, and representation type in the formal aspects. Specifically, 12 features of math competency and 8 features of representation type were identified, and an item feature analysis framework composed of these features was developed. The math competency was developed based on the subject competency of 2015 national curriculum. Math assessments in high schools, which have been changed to the competency-based assessments, had more frequency of the feature of math competency compared to middle schools. In this study, implemented the IFA in National Assessment of Educational Achievement and explored the way of ensuring the validity. These have been proved as critical applications for ensuring the validity of curriculum-based student assessment as well as building a tool for assessment.

Fast fractal coding based on LMSE analysis and subblock feature (LMSE 해석 및 부블록 특징에 근거한 고속 프랙탈 부호화)

  • 김상현;김남철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1279-1288
    • /
    • 1997
  • In this paper, we propose a fast fractal coding method based on LMSE analysis and subblock feature. In the proposed method, scaling paarameter is calculated and whether search for each domain block should be done or not is determined based on the LMSE analysis of fractal approximation, and isometry parameter is chosen based on subblock feature. To investigate the efficiency of the proposed method, we compared it with Jacquin's method on image quality and encoding time. Experimental results show the proposed method yields nearly the same performance as that of Jacquin method in PSNR, and its encoding time is reduced by about 1/7 times.

  • PDF

Comparing Machine Learning Classifiers for Movie WOM Opinion Mining

  • Kim, Yoosin;Kwon, Do Young;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3169-3181
    • /
    • 2015
  • Nowadays, online word-of-mouth has become a powerful influencer to marketing and sales in business. Opinion mining and sentiment analysis is frequently adopted at market research and business analytics field for analyzing word-of-mouth content. However, there still remain several challengeable areas for 1) sentiment analysis aiming for Korean word-of-mouth content in film market, 2) availability of machine learning models only using linguistic features, 3) effect of the size of the feature set. This study took a sample of 10,000 movie reviews which had posted extremely negative/positive rating in a movie portal site, and conducted sentiment analysis with four machine learning algorithms: naïve Bayesian, decision tree, neural network, and support vector machines. We found neural network and support vector machine produced better accuracy than naïve Bayesian and decision tree on every size of the feature set. Besides, the performance of them was boosting with increasing of the feature set size.

Hybrid Pattern Recognition Using a Combination of Different Features

  • Choi, Sang-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.11
    • /
    • pp.9-16
    • /
    • 2015
  • We propose a hybrid pattern recognition method that effectively combines two different features for improving data classification. We first extract the PCA (Principal Component Analysis) and LDA (Linear Discriminant Analysis) features, both of which are widely used in pattern recognition, to construct a set of basic features, and then evaluate the separability of each basic feature. According to the results of evaluation, we select only the basic features that contain a large amount of discriminative information for construction of the combined features. The experimental results for the various data sets in the UCI machine learning repository show that using the proposed combined features give better recognition rates than when solely using the PCA or LDA features.

Fault Detection and Classification of Faulty Induction Motors using Z-index and Frequency Analysis (Z-index와 주파수 분석을 이용한 유도전동기 고장진단과 분류)

  • Lee, Sang-Hyuk
    • Journal of the Korean Society of Safety
    • /
    • v.20 no.3 s.71
    • /
    • pp.64-70
    • /
    • 2005
  • In this literature, fault detection and classification of faulty induction motors are carried out through Z-index and frequency analysis. Above frequency analysis refer Fourier transformation and Wavelet transformation. Z-index is defined as the similar form of energy function, also the faulty and healthy conditions are classified through Z-index. For the detection and classification feature extraction for the fault detection of an induction motor is carried out using the information from stator current. Fourier and Wavelet transforms are applied to detect the characteristics under the healthy and various faulty conditions. We can obtain feature vectors from two transformations, and the results illustrate that the feature vectors are complementary each other.

Feature Extraction and Statistical Pattern Recognition for Image Data using Wavelet Decomposition

  • Kim, Min-Soo;Baek, Jang-Sun
    • Communications for Statistical Applications and Methods
    • /
    • v.6 no.3
    • /
    • pp.831-842
    • /
    • 1999
  • We propose a wavelet decomposition feature extraction method for the hand-written character recognition. Comparing the recognition rates of which methods with original image features and with selected features by the wavelet decomposition we study the characteristics of the proposed method. LDA(Linear Discriminant Analysis) QDA(Quadratic Discriminant Analysis) RDA(Regularized Discriminant Analysis) and NN(Neural network) are used for the calculation of recognition rates. 6000 hand-written numerals from CENPARMI at Concordia University are used for the experiment. We found that the set of significantly selected wavelet decomposed features generates higher recognition rate than the original image features.

  • PDF

FAFS: A Fuzzy Association Feature Selection Method for Network Malicious Traffic Detection

  • Feng, Yongxin;Kang, Yingyun;Zhang, Hao;Zhang, Wenbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.240-259
    • /
    • 2020
  • Analyzing network traffic is the basis of dealing with network security issues. Most of the network security systems depend on the feature selection of network traffic data and the detection ability of malicious traffic in network can be improved by the correct method of feature selection. An FAFS method, which is short for Fuzzy Association Feature Selection method, is proposed in this paper for network malicious traffic detection. Association rules, which can reflect the relationship among different characteristic attributes of network traffic data, are mined by association analysis. The membership value of association rules are obtained by the calculation of fuzzy reasoning. The data features with the highest correlation intensity in network data sets are calculated by comparing the membership values in association rules. The dimension of data features are reduced and the detection ability of malicious traffic detection algorithm in network is improved by FAFS method. To verify the effect of malicious traffic feature selection by FAFS method, FAFS method is used to select data features of different dataset in this paper. Then, K-Nearest Neighbor algorithm, C4.5 Decision Tree algorithm and Naïve Bayes algorithm are used to test on the dataset above. Moreover, FAFS method is also compared with classical feature selection methods. The analysis of experimental results show that the precision and recall rate of malicious traffic detection in the network can be significantly improved by FAFS method, which provides a valuable reference for the establishment of network security system.

Robust Feature Selection and Shot Change Detection Method Using the Neural Networks (강인한 특징 변수 선별과 신경망을 이용한 장면 전환점 검출 기법)

  • Hong, Seung-Bum;Hong, Gyo-Young
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.877-885
    • /
    • 2004
  • In this paper, we propose an enhancement shot change detection method using the neural net and the robust feature selection out of multiple features. The previous shot change detection methods usually used single feature and fixed threshold between consecutive frames. However, contents such as color, shape, background, and texture change simultaneously at shot change points in a video sequence. Therefore, in this paper, we detect the shot changes effectively using robust features, which are supplementary each other, rather than using single feature. In this paper, we use the typical CART (classification and regression tree) of data mining method to select the robust features, and the backpropagation neural net to determine the threshold of the each selected features. And to evaluation the performance of the robust feature selection, we compare the proposed method to the PCA(principal component analysis) method of the typical feature selection. According to the experimental result. it was revealed that the performance of our method had better that than the PCA method.

  • PDF

Stacked Autoencoder Based Malware Feature Refinement Technology Research (Stacked Autoencoder 기반 악성코드 Feature 정제 기술 연구)

  • Kim, Hong-bi;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.593-603
    • /
    • 2020
  • The advent of malicious code has increased exponentially due to the spread of malicious code generation tools in accordance with the development of the network, but there is a limit to the response through existing malicious code detection methods. According to this situation, a machine learning-based malicious code detection method is evolving, and in this paper, the feature of data is extracted from the PE header for machine-learning-based malicious code detection, and then it is used to automate the malware through autoencoder. Research on how to extract the indicated features and feature importance. In this paper, 549 features composed of information such as DLL/API that can be identified from PE files that are commonly used in malware analysis are extracted, and autoencoder is used through the extracted features to improve the performance of malware detection in machine learning. It was proved to be successful in providing excellent accuracy and reducing the processing time by 2 times by effectively extracting the features of the data by compressively storing the data. The test results have been shown to be useful for classifying malware groups, and in the future, a classifier such as SVM will be introduced to continue research for more accurate malware detection.