• Title/Summary/Keyword: Machine Learning Procedure

Search Result 116, Processing Time 0.027 seconds

Performance Evaluation of Machine Learning Algorithms for Cloud Removal of Optical Imagery: A Case Study in Cropland (광학 영상의 구름 제거를 위한 기계학습 알고리즘의 예측 성능 평가: 농경지 사례 연구)

  • Soyeon Park;Geun-Ho Kwak;Ho-Yong Ahn;No-Wook Park
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_1
    • /
    • pp.507-519
    • /
    • 2023
  • Multi-temporal optical images have been utilized for time-series monitoring of croplands. However, the presence of clouds imposes limitations on image availability, often requiring a cloud removal procedure. This study assesses the applicability of various machine learning algorithms for effective cloud removal in optical imagery. We conducted comparative experiments by focusing on two key variables that significantly influence the predictive performance of machine learning algorithms: (1) land-cover types of training data and (2) temporal variability of land-cover types. Three machine learning algorithms, including Gaussian process regression (GPR), support vector machine (SVM), and random forest (RF), were employed for the experiments using simulated cloudy images in paddy fields of Gunsan. GPR and SVM exhibited superior prediction accuracy when the training data had the same land-cover types as the cloud region, and GPR showed the best stability with respect to sampling fluctuations. In addition, RF was the least affected by the land-cover types and temporal variations of training data. These results indicate that GPR is recommended when the land-cover type and spectral characteristics of the training data are the same as those of the cloud region. On the other hand, RF should be applied when it is difficult to obtain training data with the same land-cover types as the cloud region. Therefore, the land-cover types in cloud areas should be taken into account for extracting informative training data along with selecting the optimal machine learning algorithm.

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

  • Gadde, Swetha;Amutharaj, J.;Usha, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.342-347
    • /
    • 2022
  • On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.

R-to-R Extraction and Preprocessing Procedure for an Automated Diagnosis of Various Diseases from ECG Data

  • Timothy, Vincentius;Prihatmanto, Ary Setijadi;Rhee, Kyung-Hyune
    • Journal of Multimedia Information System
    • /
    • v.3 no.2
    • /
    • pp.1-8
    • /
    • 2016
  • In this paper, we propose a method to automatically diagnose various diseases. The input data consists of electrocardiograph (ECG) recordings. We extract R-to-R interval (RRI) signals from ECG recordings, which are preprocessed to remove trends and ectopic beats, and to keep the signal stationary. After that, we perform some prospective analysis to extract time-domain parameters, frequency-domain parameters, and nonlinear parameters of the signal. Those parameters are unique for each disease and can be used as the statistical symptoms for each disease. Then, we perform feature selection to improve the performance of the diagnosis classifier. We utilize the selected features to diagnose various diseases using machine learning. We subsequently measure the performance of the machine learning classifier to make sure that it will not misdiagnose the diseases. The first two steps, which are R-to-R extraction and preprocessing, have been successfully implemented with satisfactory results.

Estimating multiplicative competitive interaction model using kernel machine technique

  • Shim, Joo-Yong;Kim, Mal-Suk;Park, Hye-Jung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.4
    • /
    • pp.825-832
    • /
    • 2012
  • We propose a novel way of forecasting the market shares of several brands simultaneously in a multiplicative competitive interaction model, which uses kernel regression technique incorporated with kernel machine technique applied in support vector machines and other machine learning techniques. Traditionally, the estimations of the market share attraction model are performed via a maximum likelihood estimation procedure under the assumption that the data are drawn from a normal distribution. The proposed method is shown to be a good candidate for forecasting method of the market share attraction model when normal distribution is not assumed. We apply the proposed method to forecast the market shares of 4 Korean car brands simultaneously and represent better performances than maximum likelihood estimation procedure.

Design Research of Blockchain, Machine Learning for the management of financing fund (융자성 기금관리를 위한 블록체인, 머신러닝 설계 연구)

  • Oh, Rag-seong;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1201-1208
    • /
    • 2019
  • The government has operated financing fund under the National Finance Act for the smooth conduct of national policy. But, It is exposed to problems such as the possibility of abuse of fund and the lack of after-loan management. In this paper, It uses fintech such as the blockchain and machine learning to solve these problems. The fund operation procedure is designed as a consortium blockchain, and it suggests the application of PBFT negotiation algorithm and the smart contract. In case of the fund management, it suggests utilizing multilayer artificial neural network model of machine learning and a module of result interpretation. The introduction of this research approach will improve the transparency and efficiency of the financing fund, ensure the credibility and also contribute to the improvement of the fund management and the establishment of the fund policy.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

A Spatial Adaptation Procedure for Determining Robust Dispatching Rule in Wafer Fabrication (공간적응절차를 통한 웨이퍼 가공 공정의 로버스트한 작업배정규칙 결정)

  • Baek, Dong-Hyun;Yoon, Wan-Chul;Park, Sang-Chan
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.23 no.1
    • /
    • pp.129-146
    • /
    • 1997
  • In traditional approaches to scheduling problems, a single dispatching rule was used by all machines in a system. However, since the situation of each machine generally differs from those of other machines, it is reasonable to apply a different dispatching rule to each machine responding to its given situation. In this regard, we introduce the concept of spatial adaptation and examine its effectiveness by simulation. In the spatial adaptation, each machine in a system selects an appropriate dispatching rule in order to improve productivity while it strives to be in harmony with other machines. This study proposes an adaptive procedure which produces a reliable dispatching rule for each machine beginning with the bottleneck machine. The dispatching rule is composed of several criteria of which priorities are adaptively weighted. The weights are learned for each machine through systematic simulations. The simulations are conducted according to a Taguchi experimental design in order to find appropriate sets of criteria weights in an efficient and robust way in the context of environmental variations. The proposed method was evaluated in an application to a semiconductor wafer fabrication system. The method achieved reliable performance compared to traditional dispatching rules, and the performance quickly approached the peak after learning for only a few bottleneck machines.

  • PDF

A Study on the Prediction Diagnosis System Improvement by Error Terms and Learning Methodologies Application (오차항과 러닝 기법을 활용한 예측진단 시스템 개선 방안 연구)

  • Kim, Myung Joon;Park, Youngho;Kim, Tai Kyoo;Jung, Jae-Seok
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.4
    • /
    • pp.783-793
    • /
    • 2019
  • Purpose: The purpose of this study is to apply the machine and deep learning methodology on error terms which are continuously auto-generated on the sensors with specific time period and prove the improvement effects of power generator prediction diagnosis system by comparing detection ability. Methods: The SVM(Support Vector Machine) and MLP(Multi Layer Perception) learning procedures were applied for predicting the target values and sequentially producing the error terms for confirming the detection improvement effects of suggested application. For checking the effectiveness of suggested procedures, several detection methodologies such as Cusum and EWMA were used for the comparison. Results: The statistical analysis result shows that without noticing the sequential trivial changes on current diagnosis system, suggested approach based on the error term diagnosis is sensing the changes in the very early stages. Conclusion: Using pattern of error terms as a diagnosis tool for the safety control process with SVM and MLP learning procedure, unusual symptoms could be detected earlier than current prediction system. By combining the suggested error term management methodology with current process seems to be meaningful for sustainable safety condition by early detecting the symptoms.

Predicting the maximum lateral load of reinforced concrete columns with traditional machine learning, deep learning, and structural analysis software

  • Pelin Canbay;Sila Avgin;Mehmet M. Kose
    • Computers and Concrete
    • /
    • v.33 no.3
    • /
    • pp.285-299
    • /
    • 2024
  • Recently, many engineering computations have realized their digital transformation to Machine Learning (ML)-based systems. Predicting the behavior of a structure, which is mainly computed with structural analysis software, is an essential step before construction for efficient structural analysis. Especially in the seismic-based design procedure of the structures, predicting the lateral load capacity of reinforced concrete (RC) columns is a vital factor. In this study, a novel ML-based model is proposed to predict the maximum lateral load capacity of RC columns under varying axial loads or cyclic loadings. The proposed model is generated with a Deep Neural Network (DNN) and compared with traditional ML techniques as well as a popular commercial structural analysis software. In the design and test phases of the proposed model, 319 columns with rectangular and square cross-sections are incorporated. In this study, 33 parameters are used to predict the maximum lateral load capacity of each RC column. While some traditional ML techniques perform better prediction than the compared commercial software, the proposed DNN model provides the best prediction results within the analysis. The experimental results reveal the fact that the performance of the proposed DNN model can definitely be used for other engineering purposes as well.

Development of Semi-Active Control Algorithm Using Deep Q-Network (Deep Q-Network를 이용한 준능동 제어알고리즘 개발)

  • Kim, Hyun-Su;Kang, Joo-Won
    • Journal of Korean Association for Spatial Structures
    • /
    • v.21 no.1
    • /
    • pp.79-86
    • /
    • 2021
  • Control performance of a smart tuned mass damper (TMD) mainly depends on control algorithms. A lot of control strategies have been proposed for semi-active control devices. Recently, machine learning begins to be applied to development of vibration control algorithm. In this study, a reinforcement learning among machine learning techniques was employed to develop a semi-active control algorithm for a smart TMD. The smart TMD was composed of magnetorheological damper in this study. For this purpose, an 11-story building structure with a smart TMD was selected to construct a reinforcement learning environment. A time history analysis of the example structure subject to earthquake excitation was conducted in the reinforcement learning procedure. Deep Q-network (DQN) among various reinforcement learning algorithms was used to make a learning agent. The command voltage sent to the MR damper is determined by the action produced by the DQN. Parametric studies on hyper-parameters of DQN were performed by numerical simulations. After appropriate training iteration of the DQN model with proper hyper-parameters, the DQN model for control of seismic responses of the example structure with smart TMD was developed. The developed DQN model can effectively control smart TMD to reduce seismic responses of the example structure.