• Title/Summary/Keyword: K-SVD

Search Result 179, Processing Time 0.026 seconds

Web Log Analysis for Recommendation Systems (추천 시스템을 위한 웹 로그 분석)

  • Kang, Tae-Ki;Kim, Jun-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.527-530
    • /
    • 2002
  • 협동적 추천은 사용자의 상품에 대한 구매 데이터를 이용하여 상품을 추천하는 방법이다. 그러나 구매 데이터가 희소한 경우 추천의 정확도가 떨어지는 문제점이 있다. 이러한 희소성 문제를 해결하기 위해서 클러스터링, SVD 등 다양한 방법이 제시되었으나, 근본적으로 사용자의 성향을 파악하기에는 부족한 점이 있다. 구매 데이터만을 이용했을 때의 문제점을 해결하기 위해서는 이를 보완할 수 있는 데이터의 활용이 필요하다. 웹 로그 분석을 통해서 구매 데이터의 희소성을 보완할 수 있으며, 사용자의 상품에 대한 부정적 반응을 구매 데이터에 반영할 수 있다. 본 논문에서는 웹 사이트에 접근하는 사용자들에 의해서 만들어진 웹 로그를 분석하여 추천 시스템의 성능을 개선하였다.

  • PDF

Tracking control for linear systems with actuator saturation (포화구동기를 갖는 선형시스템의 추종제어)

  • Yi, Yearn-Gui;Kim, Jin-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.53-54
    • /
    • 2007
  • 이 논문에서는 구동기 용량제한을 갖는 선형시스템에 대한 저이득 추종 제어기 설계 문제를 다룬다. 주어진 시스템에 대한 추종 기준입력은 크기와 변화율에 제한을 갖는 시간에 따라 변화하는 일반적인 입력을 고려하며 제어기 설계 과정은 추종성능을 향상시키기 위한 2단계의 시스템 등가변환으로 구성된다. 먼저 제1단계에서는 잘 알려진 SVD(Singular Value Decomposition)의 원리를 활용하여 추종출력과 관련된 상태를 효율적으로 분리한 후 추종에러를 상태방정식 내에 포함하는 제2단계의 시스템 변환을 통하여 추종성능의 향상을 꾀한다. 제안된 추종 제어기의 설계 조건은 모두 LMI 형태로 표현 가능하며 잘 알려진 수치예제를 통하여 제안된 설계 기법의 효용성을 예시한다.

  • PDF

Multivariable constrained model-based predictive control with application to boiler systems (제약조건을 갖는 다변수 모델 예측제어기의 보일러 시스템 적용)

  • Son, Won-Gi;Gwon, O-Gyu
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.3 no.6
    • /
    • pp.582-587
    • /
    • 1997
  • This paper deals with the control problem under nonlinear boiler systems with noise, and input constraints. MCMBPC(Multivariable Constrained Model-Based Predictive Controller) proposed by Wilkinson et al.[10,11] is used and nominal model is modified in this paper in order to applied to nonlinear boiler systems with feed-forward terms. The solution of the cost function optimization constrained on input and/or output variables is achieved using quadratic programming, via singular value decomposition(SVD). The controller designed is shown to satisfy the constraints and to have excellent tracking performance via simulation applied to nonlinear dynamic drum boiler turbine model for 16OMW unit.

  • PDF

Singular Value Decomposition Approach to Observability Analysis of GPS/INS

  • Hong, Sin-Pyo;Chun, Ho-Hwan
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.133-138
    • /
    • 2006
  • Singular value decomposition (SDV) approach is applied to the observability analysis of GPS/INS in this paper. A measure of observability for a subspace is introduced. It indicates the minimum size of perturbation in the information matrix that makes the subspace unobservable. It is shown that the measure has direct connections with observability of systems, error covariance, and singular structure of the information matrix. The observability measure given in this paper is applicable to the multi-input/multi-output time-varying systems. An example on the observability analysis of GPS/INS is given. The measure of observability is confirmed to be less sensitive to system model perturbation. It is also shown that the estimation error for the vertical component of gyro bias can be considered unobservable for small initial error covariance for a constant velocity horizontal motion.

  • PDF

Nonlinear Traveltime Tomography Method Using Fresnel Zone (Fresnel 영역을 고려한 비선헝 주시 토모그래피)

  • Cho, Chang-Soo;Ji, Jun;Lee, Doo-Sung
    • Geophysics and Geophysical Exploration
    • /
    • v.1 no.1
    • /
    • pp.43-48
    • /
    • 1998
  • Recently seismic tomography has been widely used to visualize subsurface structure for resource explorations and construction site evaluation. We studied a way to include fresnel zone concept in the conventional ray-based traveltime tomography. The algorithm developed uses the same order of computing time as the conventional traveltime to mography but incorporates the rigorous wavepath concept of wave-equation tomography. Some experiments to synthetic and real data show reasonable results compared to conventional ray-based traveltime tomography.

  • PDF

Image Reconstruction of Eigenvalue of Diffusion Principal Axis Using Diffusion Tensor Imaging (확산텐서영상을 이용한 확산 주축의 고유치 영상 재구성)

  • Kim, In-Seong;Kim, Joo-Hyun;Yeon, Gun;Suh, Kyung-Jin;Yoo, Don-Sik;Kang, Duk-Sik;Bae, Sung-Jin;Chang, Yong-Min
    • Investigative Magnetic Resonance Imaging
    • /
    • v.11 no.2
    • /
    • pp.110-118
    • /
    • 2007
  • Purpose: The objective of this work to construct eigenvalue maps that have information of magnitude of three primary diffusion directions using diffusion tensor images. Materials and Methods: To construct eigenvalue maps, we used a 3.0T MRI scanner. We also compared the Moore-Penrose pseudo-inverse matrix method and the SVD (single value decomposition) method to calculate magnitude of three primary diffusion directions. Eigenvalue maps were constructed by calculating of magnitude of three primary diffusion directions. We did investigate the relationship between eigenvalue maps and fractional anisotropy map. Results: Using Diffusion Tensor Images by diffusion tensor imaging sequence, we did construct eigenvalue maps of three primary diffusion directions. Comparison between eigenvalue maps and Fractional Anisotropy map shows what is difference of Fractional Anisotropy value in brain anatomy. Furthermore, through the simulation of variable eigenvalues, we confirmed changes of Fractional Anisotropy values by variable eigenvalues. And Fractional anisotropy was not determined by magnitude of each primary diffusion direction, but it was determined by combination of each primary diffusion direction. Conclusion: By construction of eigenvalue maps, we can confirm what is the reason of fractional anisotropy variation by measurement the magnitude of three primary diffusion directions on lesion of brain white matter, using eigenvalue maps and fractional anisotropy map.

  • PDF

Color-Texture Image Watermarking Algorithm Based on Texture Analysis (텍스처 분석 기반 칼라 텍스처 이미지 워터마킹 알고리즘)

  • Kang, Myeongsu;Nguyen, Truc Kim Thi;Nguyen, Dinh Van;Kim, Cheol-Hong;Kim, Jong-Myon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.4
    • /
    • pp.35-43
    • /
    • 2013
  • As texture images have become prevalent throughout a variety of industrial applications, copyright protection of these images has become important issues. For this reason, this paper proposes a color-texture image watermarking algorithm utilizing texture properties inherent in the image. The proposed algorithm selects suitable blocks to embed a watermark using the energy and homogeneity properties of the grey level co-occurrence matrices as inputs for the fuzzy c-means clustering algorithm. To embed the watermark, we first perform a discrete wavelet transform (DWT) on the selected blocks and choose one of DWT subbands. Then, we embed the watermark into discrete cosine transformed blocks with a gain factor. In this study, we also explore the effects of the DWT subbands and gain factors with respect to the imperceptibility and robustness against various watermarking attacks. Experimental results show that the proposed algorithm achieves higher peak signal-to-noise ratio values (47.66 dB to 48.04 dB) and lower M-SVD values (8.84 to 15.6) when we embedded a watermark into the HH band with a gain factor of 42, which means the proposed algorithm is good enough in terms of imperceptibility. In addition, the proposed algorithm guarantees robustness against various image processing attacks, such as noise addition, filtering, cropping, and JPEG compression yielding higher normalized correlation values (0.7193 to 1).

Discrete Wavelet Transform and a Singular Value Decomposition Technique for Watermarking Based on an Adaptive Fuzzy Inference System

  • Lalani, Salima;Doye, D.D.
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.340-347
    • /
    • 2017
  • A watermark is a signal added to the original signal in order to preserve the copyright of the owner of the digital content. The basic challenge for designing a watermarking system is a dilemma between transparency and robustness. If we want a higher rate of transparency, there has to be a compromise in terms of its robustness and vice versa. Also, until now, watermarking is generalized, resulting in the need for a specialized algorithm to work for a specialized image processing application domain. Our proposed technique takes into consideration the image characteristics for watermark insertion and it optimizes transparency and robustness. It achieved a 99.98% retrieval efficiency for an image blurring attack and counterfeits other attacks. Our proposed technique counterfeits almost all of the image processing attacks.

An Identification Technique Based on Adaptive Radial Basis Function Network for an Electronic Odor Sensing System

  • Byun, Hyung-Gi
    • Journal of Sensor Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.151-155
    • /
    • 2011
  • A variety of pattern recognition algorithms including neural networks may be applicable to the identification of odors. In this paper, an identification technique for an electronic odor sensing system applicable to wound state monitoring is presented. The performance of the radial basis function(RBF) network is highly dependent on the choice of centers and widths in basis function. For the fine tuning of centers and widths, those parameters are initialized by an ill-conditioned genetic fuzzy c-means algorithm, and the distribution of input patterns in the very first stage, the stochastic gradient(SG), is adapted. The adaptive RBF network with singular value decomposition(SVD), which provides additional adaptation capabilities to the RBF network, is used to process data from array-based gas sensors for early detection of wound infection in burn patients. The primary results indicate that infected patients can be distinguished from uninfected patients.

A Novel DWT-SVD Canny-Based Watermarking Using a Modified Torus Technique

  • Lalani, Salima;Doye, D.D.
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.681-687
    • /
    • 2016
  • Today's modern world requires a digital watermarking technique that takes the redundancy of an image into consideration for embedding a watermark. The novel algorithm used in this paper takes into consideration the redundancies of spatial domain and wavelet domain for embedding a watermark. Also, the cryptography-based secret key makes the algorithm difficult to hack and help protect ownership. Watermarking is blind, as it does not require the original image. Few coefficient matrices and secret keys are essential to retrieve the original watermark, which makes it redundant to various intentional attacks. The proposed technique resolves the challenge of optimizing transparency and robustness using a Canny-based edge detector technique. Improvements in the transparency of the cover image can be seen in the computed PSNR value, which is 44.20 dB.