• Title/Summary/Keyword: Kernel Method

Search Result 993, Processing Time 0.027 seconds

A Study on Management Method of Infectious Wastes Applying RFID (감염성 폐기물 관리를 위한 RFID 적용에 관한 연구)

  • Joung, Lyang-Jae;Sung, Nak-Chang;Kang, Hean-Chan;Kang, Dae-Seong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.63-72
    • /
    • 2007
  • Recently, as recognizing the risk about the infection of an infectious wastes, the problems about the management and treatment of the infectious wastes stand out socially. In this paper, as being possible monitoring whole processing from the origin of the infectious waste to the processing plant, using the RFID which is the kernel technology of the next generation, we tried to solve the second infection problem by inefficient treatment of the infectious wastes. Through the research suggesting in this paper, as storing and monitoring the procedural business articles and the problem about miss-writing and input error being found in management system like documentary writing by the existing manager and computation input by the web application, we can understand the management state, immediately. And the Bio information for the personal authentication is carried out through storing the feature vector calculation by the PCA algorithm, into the tag. It suggested more systematic and safer management plan than previous thing, as giving attention about the wastes to manager.

  • PDF

Intrusion Detection System Based on Multi-Class SVM (다중 클래스 SVM기반의 침입탐지 시스템)

  • Lee Hansung;Song Jiyoung;Kim Eunyoung;Lee Chulho;Park Daihee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.282-288
    • /
    • 2005
  • In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This new intrusion detection system, named to MMIDS, was designed to satisfy all the following requirements : 1) Fast detection of new types of attack unknown to the system; 2) Provision of detail information about the detected types of attack; 3) cost-effective maintenance due to fast and efficient learning and update; 4) incrementality and scalability of system. The fast and efficient training and updating faculties of proposed novel multi-class SVM which is a core component of MMIDS provide cost-effective maintenance of intrusion detection system. According to the experimental results, our method can provide superior performance in separating similar patterns and detailed separation capability of MMIDS is relatively good.

Self-diagnostic system for smartphone addiction using multiclass SVM (다중 클래스 SVM을 이용한 스마트폰 중독 자가진단 시스템)

  • Pi, Su Young
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.1
    • /
    • pp.13-22
    • /
    • 2013
  • Smartphone addiction has become more serious than internet addiction since people can download and run numerous applications with smartphones even without internet connection. However, smartphone addiction is not sufficiently dealt with in current studies. The S-scale method developed by Korea National Information Society Agency involves so many questions that respondents are likely to avoid the diagnosis itself. Moreover, since S-scale is determined by the total score of responded items without taking into account of demographic variables, it is difficult to get an accurate result. Therefore, in this paper, we have extracted important factors from all data, which affect smartphone addiction, including demographic variables. Then we classified the selected items with a neural network. The result of a comparative analysis with backpropagation learning algorithm and multiclass support vector machine shows that learning rate is slightly higher in multiclass SVM. Since multiclass SVM suggested in this paper is highly adaptable to rapid changes of data, we expect that it will lead to a more accurate self-diagnosis of smartphone addiction.

Study on the K-scale reflecting the confidence of survey responses (설문 응답에 대한 신뢰도를 반영한 K-척도에 관한 연구)

  • Park, Hye Jung;Pi, Su Young
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.1
    • /
    • pp.41-51
    • /
    • 2013
  • In the Information age, internet addiction has been a big issue in a modern society. The adverse effects of the internet addiction have been increasing at an exponential speed. Along with a great variety of internet-connected device supplies, K-scale diagnostic criteria have been used for the internet addiction self-diagnose tests in the high-speed wireless Internet service, netbooks, and smart phones, etc. The K-scale diagnostic criteria needed to be changed to meet the changing times, and the diagnostic criteria of K-scale was changed in March, 2012. In this paper, we analyze the internet addiction and K-scale features on the actual condition of Gyeongbuk collegiate areas using the revised K-scale diagnostic criteria in 2012. The diagnostic method on internet addiction is measured by the respondents' subjective estimation. Willful error of the respondents can be occurred to hide their truth. In this paper, we add the survey response to the trusted reliability values to reduce response errors on the K-scale on the K-scale, and enhance the reliability of the analysis.

Human Activity Recognition Using Sensor Fusion and Kernel Discriminant Analysis on Smartphones (스마트폰에서 센서 융합과 커널 판별 분석을 이용한 인간 활동 인식)

  • Cho, Jung-Gil
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.9-17
    • /
    • 2020
  • Human activity recognition(HAR) using smartphones is a hot research topic in computational intelligence. Smartphones are equipped with a variety of sensors. Fusing the data of these sensors could enable applications to recognize a large number of activities. However, these devices have fewer resources because of the limited number of sensors available, and feature selection and classification methods are required to achieve optimal performance and efficient feature extraction. This paper proposes a smartphone-based HAR scheme according to these requirements. The proposed method in this paper extracts time-domain features from acceleration sensors, gyro sensors, and barometer sensors, and recognizes activities with high accuracy by applying KDA and SVM. This approach selects the most relevant feature of each sensor for each activity. Our comparison results shows that the proposed system outperforms previous smartphone-based HAR systems.

Bilateral Filtering-based Mean-Shift for Robust Face Tracking (양방향 필터 기반 Mean-Shift 기법을 이용한 강인한 얼굴추적)

  • Choi, Wan-Yong;Lee, Yoon-Hyung;Jeong, Mun-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.9
    • /
    • pp.1319-1324
    • /
    • 2013
  • The mean shift algorithm has achieved considerable success in object tracking due to its simplicity and robustness. It finds local minima of a similarity measure between the color histograms or kernel density estimates of the target and candidate image. However, it is sensitive to the noises due to objects or background having similar color distributions. In addition, occlusion by another object often causes a face region to change in size and position although a face region is a critical clue to perform face recognition or compute face orientation. We assume that depth and color are effective to separate a face from a background and a face from objects, respectively. From the assumption we devised a bilateral filter using color and depth and incorporate it into the mean-shift algorithm. We demonstrated the proposed method by some experiments.

Testing the Existence of a Discontinuity Point in the Variance Function

  • Huh, Jib
    • Journal of the Korean Data and Information Science Society
    • /
    • v.17 no.3
    • /
    • pp.707-716
    • /
    • 2006
  • When the regression function is discontinuous at a point, the variance function is usually discontinuous at the point. In this case, we had better propose a test for the existence of a discontinuity point with the regression function rather than the variance function. In this paper we consider that the variance function only has a discontinuity point. We propose a nonparametric test for the existence of a discontinuity point with the second moment function since the variance function and the second moment function have the same location and jump size of the discontinuity point. The proposed method is based on the asymptotic distribution of the estimated jump size.

  • PDF

Estimation methods of fuel consumption using distance traveled: Focused on Monte Carlo method (주행거리를 이용한 연료소비량 산정방법: 몬테카를로 기법 중심으로)

  • Park, Chun-Gun;Soh, Jin-Young;Lee, Yung-Seop
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.2
    • /
    • pp.247-256
    • /
    • 2012
  • Recently, estimation of greenhouse gas (GHG) emission has continuously emerged as an important global issue. This study compares various statistical methods for estimation of fuel consumption, which is necessary for calculation of GHG emission in road transportation sector. Existing methods have focused on using merely transportation fuel supply or distance traveled for calculation of fuel consumption. Estimates of GHG emission based on fuel supply, however, cannot reflect various vehicle types or model year. This study suggests and compares, from statistical point of view, several methods, which can be applied to estimate fuel consumption of each vehicle, by combining distance traveled and fuel efficiency (mileage), and total fuel consumption of all vehicles. It also suggests practical measures that can reflect vehicle types and model year to suggested methods for future research.

Optimal sensor placement for cable force monitoring using spatial correlation analysis and bond energy algorithm

  • Li, Shunlong;Dong, Jialin;Lu, Wei;Li, Hui;Xu, Wencheng;Jin, Yao
    • Smart Structures and Systems
    • /
    • v.20 no.6
    • /
    • pp.769-780
    • /
    • 2017
  • Cable force monitoring is an essential and critical part of the safety evaluation of cable-supported bridges. A reasonable cable force monitoring scheme, particularly, sensor placement related to accurate safety assessment and budget cost-saving becomes a major concern of bridge administrative authorities. This paper presents optimal sensor placement for cable force monitoring by selecting representative sensor positions, which consider the spatial correlativeness existing in the cable group. The limited sensors would be utilized for maximizing useful information from the monitored bridges. The maximum information coefficient (MIC), mutual information (MI) based kernel density estimation, as well as Pearson coefficients, were all employed to detect potential spatial correlation in the cable group. Compared with the Pearson coefficient and MIC, the mutual information is more suitable for identifying the association existing in cable group and thus, is selected to describe the spatial relevance in this study. Then, the bond energy algorithm, which collects clusters based on the relationship of surrounding elements, is used for the optimal placement of cable sensors. Several optimal placement strategies are discussed with different correlation thresholds for the cable group of Nanjing No.3 Yangtze River Bridge, verifying the effectiveness of the proposed method.

Blocking artifacts reduction for improving visual quality of highly compressed images (압축영상의 화질향상을 위한 블록킹 현상 제거에 관한 연구)

  • 이주홍;김민구;정제창;최병욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1677-1690
    • /
    • 1997
  • Block-transform coding is one of the most popular approaches for image compression. For example, DCT is widely used in the internaltional standards standards such as MPEG-1, MPEG-2, JPEG, and H.261. In the block-based transform coding, blocking artifacts may appear along block boundaries, and they can cause severe image degradation eqpecially when the transform coefficients are coarsely quantized. In this paper, we propose a new method for blocking artifacts reduction in transform-coded images. For blocking artifacts reduction, we add a correction term, on a block basis, composed of a linear combination of 28 basis images that are orthonormal on block boundaries. We select 28 DCT kernel functions of which boundary values are linearly independent, and Gram-Schmidt process is applied to the boundary values in order to obtain 28 boundary-orthonormal basis images. A threshold of bolock discontinuity is introduced for improvement of visual quality by reducing image blurring. We also investigate the number of basis images needed for efficient blocking artifacts reduction when the compression ratio changes.

  • PDF