• Title/Summary/Keyword: LDA기법

Search Result 213, Processing Time 0.025 seconds

On-line Signature Verification using Segment Matching and LDA Method (구간분할 매칭방법과 선형판별분석기법을 융합한 온라인 서명 검증)

  • Lee, Dae-Jong;Go, Hyoun-Joo;Chun, Myung-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.12
    • /
    • pp.1065-1074
    • /
    • 2007
  • Among various methods to compare reference signatures with an input signature, the segment-to-segment matching method has more advantages than global and point-to-point methods. However, the segment-to-segment matching method has the problem of having lower recognition rate according to the variation of partitioning points. To resolve this drawback, this paper proposes a signature verification method by considering linear discriminant analysis as well as segment-to-segment matching method. For the final decision step, we adopt statistical based Bayesian classifier technique to effectively combine two individual systems. Under the various experiments, the proposed method shows better performance than segment-to-segment based matching method.

Topic Modeling on Fine Dust Issues Using LDA Analysis (LDA 기법을 이용한 미세먼지 이슈의 토픽모델링 분석)

  • Yoon, soonuk;Kim, Minchul
    • Journal of Energy Engineering
    • /
    • v.29 no.2
    • /
    • pp.23-29
    • /
    • 2020
  • In this study, the last 10 years of news data on fine dust was collected and 80 topics are selected through LDA analysis. As a result, weather-related information made up the main words for the topic, and we can see that fine dust becomes a big issue below 10 degrees Celsius. The frequency of exposure to the media and the maximum concentration of fine dust are correlated with positive. Topics related to fine dust reduction measures and the government's comprehensive measures over the past decade, topics related to products such as air purifiers related to fine dust, topics related to policies protecting vulnerable people from fine dust, and topics on fine dust reduction through R&D were found to be major topics. Measures against fine dust as a social issue can be seen to be closely related to the government's policy.

Analysis of whether the feeling of relative deprivation is shown in the comments of the Luxury Howl YouTube video - Focusing on modern sentiment analysis using TF-IDF, Word2vec, LDA and LSTM - (명품 하울 유튜브 영상 댓글에 나타난 상대적 박탈감 여부와 특징 분석 - TF-IDF, Word2vec, LDA, LSTM을 이용한 현대인의 감정 분석을 중심으로 -)

  • Choi, Jung Min;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.355-360
    • /
    • 2021
  • Recently Youtube has been more popular. As many studies show the comparative deprivation of the Social Medeia, this study looks into whether the comparative deprivation is expressed on the YouTube comments. It focuses on the Luxury Haul contents, videos about huge amounts of luxurious products, of which Youtubers'economic feature are demonstrative. The comments of the videos are analyzed with LDA TF-IDF and Word2Vec. Additionally, the comments were classified into positive and negative groups by the LSTM model as well. As a result of the study, even though many comments turned out positive, the negative keywords were indicated related to comparative deprivation. Also it was found that the viewers compared themselves with Youtubers. In particular, some YouTubers are more criticized if they are younger or does not seem to afford the luxurious products themselves. This study suggests that the users express the comparative deprivation on YouTube as well like on the other Social Media.

Study on Potential Topics of the MyData and Data Transactions Using LDA Topic Modeling (국내 마이데이터 태동과 데이터 거래에 관한 잠재적 주제 분석)

  • Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.221-229
    • /
    • 2022
  • With the recent full-fledged MyData service, interest in the use of personal data is increasing. However, studies on MyData are still in the early stages, focusing on legal and institutional discussions, and studies from a comprehensive perspective are insufficient. Therefore, this study aimed at finding the potential topics formed by social discussions by analyzing news data from 2018 to the present. News data analysis using LDA topic modeling were conducted and 6 potential topics including digital transformation in finance, scope of Mydata business license, amendments and data-related laws, safe use of big data, data economy promotion policy and strategy of the financial industry were derived. This study has significance in that it comprehensively viewed the issues that emerged with the MyData and deriving gaps in previous discussion. Future research is expected to identify changes after the launch of MyData service and provide specific implications through research by specific industries.

Analyzing the discriminative characteristic of cover letters using text mining focused on Air Force applicants (텍스트 마이닝을 이용한 공군 부사관 지원자 자기소개서의 차별적 특성 분석)

  • Kwon, Hyeok;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.75-94
    • /
    • 2021
  • The low birth rate and shortened military service period are causing concerns about selecting excellent military officers. The Republic of Korea entered a low birth rate society in 1984 and an aged society in 2018 respectively, and is expected to be in a super-aged society in 2025. In addition, the troop-oriented military is changed as a state-of-the-art weapons-oriented military, and the reduction of the military service period was implemented in 2018 to ease the burden of military service for young people and play a role in the society early. Some observe that the application rate for military officers is falling due to a decrease of manpower resources and a preference for shortened mandatory military service over military officers. This requires further consideration of the policy of securing excellent military officers. Most of the related studies have used social scientists' methodologies, but this study applies the methodology of text mining suitable for large-scale documents analysis. This study extracts words of discriminative characteristics from the Republic of Korea Air Force Non-Commissioned Officer Applicant cover letters and analyzes the polarity of pass and fail. It consists of three steps in total. First, the application is divided into general and technical fields, and the words characterized in the cover letter are ordered according to the difference in the frequency ratio of each field. The greater the difference in the proportion of each application field, the field character is defined as 'more discriminative'. Based on this, we extract the top 50 words representing discriminative characteristics in general fields and the top 50 words representing discriminative characteristics in technology fields. Second, the number of appropriate topics in the overall cover letter is calculated through the LDA. It uses perplexity score and coherence score. Based on the appropriate number of topics, we then use LDA to generate topic and probability, and estimate which topic words of discriminative characteristic belong to. Subsequently, the keyword indicators of questions used to set the labeling candidate index, and the most appropriate index indicator is set as the label for the topic when considering the topic-specific word distribution. Third, using L-LDA, which sets the cover letter and label as pass and fail, we generate topics and probabilities for each field of pass and fail labels. Furthermore, we extract only words of discriminative characteristics that give labeled topics among generated topics and probabilities by pass and fail labels. Next, we extract the difference between the probability on the pass label and the probability on the fail label by word of the labeled discriminative characteristic. A positive figure can be seen as having the polarity of pass, and a negative figure can be seen as having the polarity of fail. This study is the first research to reflect the characteristics of cover letters of Republic of Korea Air Force non-commissioned officer applicants, not in the private sector. Moreover, these methodologies can apply text mining techniques for multiple documents, rather survey or interview methods, to reduce analysis time and increase reliability for the entire population. For this reason, the methodology proposed in the study is also applicable to other forms of multiple documents in the field of military personnel. This study shows that L-LDA is more suitable than LDA to extract discriminative characteristics of Republic of Korea Air Force Noncommissioned cover letters. Furthermore, this study proposes a methodology that uses a combination of LDA and L-LDA. Therefore, through the analysis of the results of the acquisition of non-commissioned Republic of Korea Air Force officers, we would like to provide information available for acquisition and promotional policies and propose a methodology available for research in the field of military manpower acquisition.

A Study on Fingerprint-Based Coil Alignment Improvement Technique for Magnetic Resonant Wireless Power Transfer System (핑거프린트 방식의 자기 공진형 무선전력전송 코일 정렬 상태 개선 기법 연구)

  • Kim, Sungjae;Lee, Euibum;Ku, Hyunchul
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.1
    • /
    • pp.38-44
    • /
    • 2019
  • This paper proposes fingerprint-based positioning methods which can be used in a magnetic resonant wireless power transfer(WPT) system and verifies their performance. A new receiver coil with small orthogonal auxiliary coils is proposed to measure magnetic field signals in three axial directions. The magnitude and phase characteristics of the three-axis electromotive force can be obtained by using the proposed coil. To predict a position with the measured values, we propose a lookup table-based method and linear discriminant analysis-based method. For verification, the proposed methods are applied to predict 75 positions of the 6.78 MHz WPT system, and the performances such as accuracy and computation time are compared.

Robust Speech Recognition for Application to Mobile Phone (휴대폰 단말기에 적용을 위한 강인한 음성인식)

  • 손종목;정성윤;배건성
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.495-498
    • /
    • 2001
  • 최근 음싱인식이 인간과 기계 사이의 자연스러운 통신을 위한 가장 중요한 수단으로 인식되어 이와 관련된 연구가 구준히 이루어져 왔으며, 일부 응용 분야에서는 성공적으로 적용되고 있다. 하지만, 좀 더 다양한 응용분야에 적용하기 위해서는 실제 환경에 존재하는 여러가지 주변잡음에 강인한 특성을 가지는 인식 시스템이 요구된다. 본 연구에서는 음성인식 시스템을 휴대전화에 적용하기 위해 도메인 적응 기법, LDA (Linear Discriminant Analysis) 기법 등을 도입하여 시스템 DB의 크기를 줄이고 잡음에 대한 강인성을 높이고자 하였으며, HMM (Hidden Markov Model)에 기반한 음싱인식 시스템을 사용하여 각 기법의 적용에 따른 인식성능을 평가하였다.

  • PDF

Improvements of Multi-features Extraction for EMG for Estimating Wrist Movements (근전도 신호기반 손목 움직임의 추정을 위한 다중 특징점 추출 기법 알고리즘)

  • Kim, Seo-Jun;Jeong, Eui-Chul;Lee, Sang-Min;Song, Young-Rok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.5
    • /
    • pp.757-762
    • /
    • 2012
  • In this paper, the multi feature extraction algorithm for estimation of wrist movements based on Electromyogram(EMG) is proposed. For the extraction of precise features from the EMG signals, the difference absolute mean value(DAMV), the mean absolute value(MAV), the root mean square(RMS) and the difference absolute standard deviation value(DASDV) to consider amplitude characteristic of EMG signals are used. We figure out a more accurate feature-set by combination of two features out of these, because of multi feature extraction algorithm is more precise than single feature method. Also, for the motion classification based on EMG, the linear discriminant analysis(LDA), the quadratic discriminant analysis(QDA) and k-nearest neighbor(k-NN) are used. We implemented a test targeting twenty adult male to identify the accuracy of EMG pattern classification of wrist movements such as up, down, right, left and rest. As a result of our study, the LDA, QDA and k-NN classification method using feature-set with MAV and DASDV showed respectively 87.59%, 89.06%, 91.75% accuracy.

Design of Robust Face Recognition Pattern Classifier Using Interval Type-2 RBF Neural Networks Based on Census Transform Method (Interval Type-2 RBF 신경회로망 기반 CT 기법을 이용한 강인한 얼굴인식 패턴 분류기 설계)

  • Jin, Yong-Tak;Oh, Sung-Kwun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.5
    • /
    • pp.755-765
    • /
    • 2015
  • This paper is concerned with Interval Type-2 Radial Basis Function Neural Network classifier realized with the aid of Census Transform(CT) and (2D)2LDA methods. CT is considered to improve performance of face recognition in a variety of illumination variations. (2D)2LDA is applied to transform high dimensional image into low-dimensional image which is used as input data to the proposed pattern classifier. Receptive fields in hidden layer are formed as interval type-2 membership function. We use the coefficients of linear polynomial function as the connection weights of the proposed networks, and the coefficients and their ensuing spreads are learned through Conjugate Gradient Method(CGM). Moreover, the parameters such as fuzzification coefficient and the number of input variables are optimized by Artificial Bee Colony(ABC). In order to evaluate the performance of the proposed classifier, Yale B dataset which consists of images obtained under diverse state of illumination environment is applied. We show that the results of the proposed model have much more superb performance and robust characteristic than those reported in the previous studies.

Extraction of Network Threat Signatures Using Latent Dirichlet Allocation (LDA를 활용한 네트워크 위협 시그니처 추출기법)

  • Lee, Sungil;Lee, Suchul;Lee, Jun-Rak;Youm, Heung-youl
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2018
  • Network threats such as Internet worms and computer viruses have been significantly increasing. In particular, APTs(Advanced Persistent Threats) and ransomwares become clever and complex. IDSes(Intrusion Detection Systems) have performed a key role as information security solutions during last few decades. To use an IDS effectively, IDS rules must be written properly. An IDS rule includes a key signature and is incorporated into an IDS. If so, the network threat containing the signature can be detected by the IDS while it is passing through the IDS. However, it is challenging to find a key signature for a specific network threat. We first need to analyze a network threat rigorously, and write a proper IDS rule based on the analysis result. If we use a signature that is common to benign and/or normal network traffic, we will observe a lot of false alarms. In this paper, we propose a scheme that analyzes a network threat and extracts key signatures corresponding to the threat. Specifically, our proposed scheme quantifies the degree of correspondence between a network threat and a signature using the LDA(Latent Dirichlet Allocation) algorithm. Obviously, a signature that has significant correspondence to the network threat can be utilized as an IDS rule for detection of the threat.