• Title/Summary/Keyword: Improved classification system

Search Result 363, Processing Time 0.118 seconds

Verifying the Classification Accuracy for Korea's Standardized Classification System of Research F&E by using LDA(Linear Discriminant Analysis) (선형판별분석(LDA)기법을 적용한 국가연구시설장비 표준분류체계의 분류 정확도 검증)

  • Joung, Seokin;Sawng, Yeongwha;Jeong, Euhduck
    • Management & Information Systems Review
    • /
    • v.39 no.1
    • /
    • pp.35-57
    • /
    • 2020
  • Recently, research F&E(Facilities and Equipment) have become very important as tools and means to lead the development of science and technology. The government has been continuously expanding investment budgets for R&D and research F&E, and the need for efficient operation and systematic management of research F&E built up nationwide has increased. In December 2010, The government developed and completed a standardized classification system for national research F&E. However, accuracy and trust of information classification are suspected because information is collected by a method in which a user(researcher) directly selects and registers a classification code in NTIS. Therefore, in the study, we analyzed linearly using linear discriminant analysis(LDA) and analysis of variance(ANOVA), to measure the classification accuracy for the standardized classification system(8 major-classes, 54 sub-classes, 410 small-classes) of the national research facilities and equipment established in 2010, and revised in 2015. For the analysis, we collected and used the information data(50,271 cases) cumulatively registered in NTIS(National Science and Technology Service) for the past 10 years. This is the first case of scientifically verifying the standardized classification system of the national research facilities and equipment, which is based on information of similar classification systems and a few expert reviews in the in-outside of the country. As a result of this study, the discriminant accuracy of major-classes organized hierarchically by sub-classes and small-classes was 92.2 %, which was very high. However, in post hoc verification through analysis of variance, the discrimination power of two classes out of eight major-classes was rather low. It is expected that the standardized classification system of the national research facilities and equipment will be improved through this study.

A Novel CNN and GA-Based Algorithm for Intrusion Detection in IoT Devices

  • Ibrahim Darwish;Samih Montser;Mohamed R. Saadi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.55-64
    • /
    • 2023
  • The Internet of Things (IoT) is the combination of the internet and various sensing devices. IoT security has increasingly attracted extensive attention. However, significant losses appears due to malicious attacks. Therefore, intrusion detection, which detects malicious attacks and their behaviors in IoT devices plays a crucial role in IoT security. The intrusion detection system, namely IDS should be executed efficiently by conducting classification and efficient feature extraction techniques. To effectively perform Intrusion detection in IoT applications, a novel method based on a Conventional Neural Network (CNN) for classification and an improved Genetic Algorithm (GA) for extraction is proposed and implemented. Existing issues like failing to detect the few attacks from smaller samples are focused, and hence the proposed novel CNN is applied to detect almost all attacks from small to large samples. For that purpose, the feature selection is essential. Thus, the genetic algorithm is improved to identify the best fitness values to perform accurate feature selection. To evaluate the performance, the NSL-KDDCUP dataset is used, and two datasets such as KDDTEST21 and KDDTEST+ are chosen. The performance and results are compared and analyzed with other existing models. The experimental results show that the proposed algorithm has superior intrusion detection rates to existing models, where the accuracy and true positive rate improve and the false positive rate decrease. In addition, the proposed algorithm indicates better performance on KDDTEST+ than KDDTEST21 because there are few attacks from minor samples in KDDTEST+. Therefore, the results demonstrate that the novel proposed CNN with the improved GA can identify almost every intrusion.

A Study on the Improvement Method on Calculating the Damages Caused by the Bid Rigging in the Construction Work (건설공사 입찰담합으로 인한 손해액 산정 개선방안 연구)

  • Min, Byeong-Uk;Park, Hyung-Keun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.6
    • /
    • pp.1053-1061
    • /
    • 2017
  • The study is concerned with providing the improvement method on making a reasonable and scientific decision on the damages accrued from the bid rigging in the construction work. According to the review on the precedent studies and decision cases on the damages caused by bid rigging, the representative problems include the insufficiency of the classification system on the damage calculation method and the omission of the necessary stage in the damage determination process. First, the improved classification system on calculating the damages caused by bid rigging is presented with the application to the bid rigging in the construction work by adding the ratio factor in addition to the damage calculation parameters such as price and cost. Second, the standard procedures organized with six stages is presented as the process required for determining the damages if the indemnification for bid rigging is claimed. The study becomes the foundation for resolving the problem with the undue burden on a party and for preventing the opportunity loss by resolving a dispute early through the improvement classification system and standard procedures presented in the study.

Binary Tree Architecture Design for Support Vector Machine Using Dynamic Time Warping (DTW를 이용한 SVM 기반 이진트리 구조 설계)

  • Kang, Youn Joung;Lee, Jaeil;Bae, Jinho;Lee, Seung Woo;Lee, Chong Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.6
    • /
    • pp.201-208
    • /
    • 2014
  • In this paper, we propose the classifier structure design algorithm using DTW. Proposed algorithm uses DTW result to design the binary tree architecture based on the SVM which classify the multi-class data. Design the binary tree architecture for Support Vector Machine(SVM-BTA) using the threshold criterion calculated by the sum columns in square matrix which components are the reference data from each class. For comparison the performance of the proposed algorithm, compare the results of classifiers which binary tree structure are designed based on database and k-means algorithm. The data used for classification is 333 signals from 18 classes of underwater transient noise. The proposed classifier has been improved classification performance compared with classifier designed by database system, and probability of detection for non-biological transient signal has improved compare with classifiers using k-means algorithm. The proposed SVM-BTA classified 68.77% of biological sound(BO), 92.86% chain(CHAN) the mechanical sound, and 100% of the 6 kinds of the other classes.

An Extended Faceted Classification Scheme and Hybrid Retrieval Model to Support Software Reuse (소프트웨어 재사용을 지원하는 확장된 패싯 분류 방식과 혼합형 검색 모델)

  • Gang, Mun-Seol;Kim, Byeong-Gi
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 1994
  • In this paper, we design and implement the prototype system, and propose the Extended Faceted Classification. Scheme and the Hybrid Retrieval Method that support classifying the software components, storing in library, and efficient retrieval according to user's request. In order to designs the classification scheme, we identify several necessary items by analyzing basic classes of software components that are to be classified. Then, we classify the items by their characteristics, decide the facets, and compose the component descriptors. According to their basic characteristics, we store software components in the library by clustering their application domains and are assign weights to the facets and its items to describe the component characteristics. In order to retrieve the software components, we use the retrieval-by-query model, and the weights and similarity for easy retrieval of similar software components. As the result of applying proposed classification scheme and retrieval model, we can easily identify similar components and the process of classification become simple. Also, the construction of queries becomes simple, the control of the size and order of the components to be retrieved possible, and the retrieval effectiveness is improved.

  • PDF

End-of-Life Vehicle Rating Classification for Remanufacturing Core Collection (재제조 코어 회수를 위한 폐자동차 등급 분류)

  • Son, Woo Hyun;Li, Wen Hao;Mok, Hak Soo
    • Resources Recycling
    • /
    • v.27 no.2
    • /
    • pp.11-23
    • /
    • 2018
  • The need for remanufacturing automotive parts is required due to the depletion of resources, rising raw material prices and strengthening environmental regulations. For remanufacturing, stable supply and demand of core must be accompanied. At present, remanufacturing companies collect cores through various routes, but the recovery rate of cores from the End-of-Life Vehicles is low. If we can systematically collect cores from hundreds of thousands of ELVs that were generated each year, the recovery rate of the core for remanufacturing will be further improved. Therefore, in this paper, we tried to establish a classification system for the ELV as a method for collecting the cores from the ELV. First, we selected the elements affecting the classification and determined the scope for the evaluation. The final rating classification is established by calculating the weights among the influence elements. Finally, through the case study, the dismantling grade of the actual ELV was evaluated to derive the second grade.

Deep Learning based Image Recognition Models for Beef Sirloin Classification (딥러닝 이미지 인식 기술을 활용한 소고기 등심 세부 부위 분류)

  • Han, Jun-Hee;Jung, Sung-Hun;Park, Kyungsu;Yu, Tae-Sun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.1-9
    • /
    • 2021
  • This research examines deep learning based image recognition models for beef sirloin classification. The sirloin of beef can be classified as the upper sirloin, the lower sirloin, and the ribeye, whereas during the distribution process they are often simply unified into the sirloin region. In this work, for detailed classification of beef sirloin regions we develop a model that can learn image information in a reasonable computation time using the MobileNet algorithm. In addition, to increase the accuracy of the model we introduce data augmentation methods as well, which amplifies the image data collected during the distribution process. This data augmentation enables to consider a larger size of training data set by which the accuracy of the model can be significantly improved. The data generated during the data proliferation process was tested using the MobileNet algorithm, where the test data set was obtained from the distribution processes in the real-world practice. Through the computational experiences we confirm that the accuracy of the suggested model is up to 83%. We expect that the classification model of this study can contribute to providing a more accurate and detailed information exchange between suppliers and consumers during the distribution process of beef sirloin.

Measurement of inconvenience, human errors, and mental workload of simulated nuclear power plant control operations

  • Oh, I.S.;Sim, B.S.;Lee, H.C.;Lee, D.H.
    • Proceedings of the ESK Conference
    • /
    • 1996.10a
    • /
    • pp.47-55
    • /
    • 1996
  • This study developed a comprehensive and easily applicable nuclear reactor control system evaluation method using reactor operators behavioral and mental workload database. A proposed control panel design cycle consists of the 5 steps: (1) finding out inconvenient, erroneous, and mentally stressful factors for the proposed design through evaluative experiments, (2) drafting improved design alternatives considering detective factors found out in the step (1), (3) comparative experiements for the design alternatives, (4) selecting a best design alternative, (5) returning to the step (1) and repeating the design cycle. Reactor operators behavioral and mental workload database collected from evaluative experiments in the step (1) and comparative experiments in the step (3) of the design cycle have a key roll in finding out defective factors and yielding the criteria for selection of the proposed reactor control systems. The behavioral database was designed to include the major informations about reactor operators' control behaviors: beginning time of operations, involved displays, classification of observational behaviors, dehaviors, decisions, involved control devices, classification of control behaviors, communications, emotional status, opinions for man-machine interface, and system event log. The database for mental workload scored from various physiological variables-EEG, EOG, ECG, and respir- ation pattern-was developed to indicate the most stressful situation during reactor control operations and to give hints for defective design factors. An experimental test for the evaluation method applied to the Compact Nuclear Simulator (CNS) installed in Korea Atomic Energy Research Institute (KAERI) suggested that some defective design factors of analog indicators should be improved and that automatization of power control to a target level would give relaxation to the subject operators in stressful situation.

  • PDF

Malware Application Classification based on Feature Extraction and Machine Learning for Malicious Behavior Analysis in Android Platform (안드로이드 플랫폼에서 악성 행위 분석을 통한 특징 추출과 머신러닝 기반 악성 어플리케이션 분류)

  • Kim, Dong-Wook;Na, Kyung-Gi;Han, Myung-Mook;Kim, Mijoo;Go, Woong;Park, Jun Hyung
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.27-35
    • /
    • 2018
  • This paper is a study to classify malicious applications in Android environment. And studying the threat and behavioral analysis of malicious Android applications. In addition, malicious apps classified by machine learning were performed as experiments. Android behavior analysis can use dynamic analysis tools. Through this tool, API Calls, Runtime Log, System Resource, and Network information for the application can be extracted. We redefined the properties extracted for machine learning and evaluated the results of machine learning classification by verifying between the overall features and the main features. The results show that key features have been improved by 1~4% over the full feature set. Especially, SVM classifier improved by 10%. From these results, we found that the application of the key features as a key feature was more effective in the performance of the classification algorithm than in the use of the overall features. It was also identified as important to select meaningful features from the data sets.

Study on Implementation of a Handwritten-Character Recognition System in a PDA Using a Neural Hardware (신경망 하드웨어를 이용한 PDA 펜입력 인식시스템의 구현 연구)

  • Kim, Kwang-Hyun;Kang, Deung-Gu;Lee, Tae-Won;Park, Jin;Kim, Young-Chul
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.492-495
    • /
    • 1999
  • In this paper, a research is focused on implementation of the handwritten Korean-character recognition system using a neural coprocessor for PDA application. The proposed coprocessor is composed of a digital neural network called DMNN and a RISC-based dedicated controller in order to achieve high speed as well as compactness. Two neural networks are used for recognition, one for stroke classification out of extended 11 strokes and the other for grapheme classification. Our experimental result shows that the successful recognition rate of 92.1% over 3,000 characters written by 10 persons can be obtained. Moreover, it can be improved to 95.3% when four candidates are considered. The design verification of tile proposed neural coprocessor is conducted using the ASIC emulator for further hardware implementation.

  • PDF