• Title/Summary/Keyword: SEED algorithm

Search Result 198, Processing Time 0.026 seconds

A Non-linear Variant of Global Clustering Using Kernel Methods (커널을 이용한 전역 클러스터링의 비선형화)

  • Heo, Gyeong-Yong;Kim, Seong-Hoon;Woo, Young-Woon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.11-18
    • /
    • 2010
  • Fuzzy c-means (FCM) is a simple but efficient clustering algorithm using the concept of a fuzzy set that has been proved to be useful in many areas. There are, however, several well known problems with FCM, such as sensitivity to initialization, sensitivity to outliers, and limitation to convex clusters. In this paper, global fuzzy c-means (G-FCM) and kernel fuzzy c-means (K-FCM) are combined to form a non-linear variant of G-FCM, called kernel global fuzzy c-means (KG-FCM). G-FCM is a variant of FCM that uses an incremental seed selection method and is effective in alleviating sensitivity to initialization. There are several approaches to reduce the influence of noise and accommodate non-convex clusters, and K-FCM is one of them. K-FCM is used in this paper because it can easily be extended with different kernels. By combining G-FCM and K-FCM, KG-FCM can resolve the shortcomings mentioned above. The usefulness of the proposed method is demonstrated by experiments using artificial and real world data sets.

Real-time Hand Region Detection and Tracking using Depth Information (깊이정보를 이용한 실시간 손 영역 검출 및 추적)

  • Joo, SungIl;Weon, SunHee;Choi, HyungIl
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.3
    • /
    • pp.177-186
    • /
    • 2012
  • In this paper, we propose a real-time approach for detecting and tracking a hand region by analyzing depth images. We build a hand model in advance. The model has the shape information of a hand. The detecting process extracts out moving areas in an image, which are possibly caused by moving a hand in front of a camera. The moving areas can be identified by analyzing accumulated difference images and applying the region growing technique. The extracted moving areas are compared against a hand model to get justified as a hand region. The tracking process keeps the track of center points of hand regions of successive frames. For this purpose, it involves three steps. The first step is to determine a seed point that is the closest point to the center point of a previous frame. The second step is to perform region growing to form a candidate region of a hand. The third step is to determine the center point of a hand to be tracked. This point is searched by the mean-shift algorithm within a confined area whose size varies adaptively according to the depth information. To verify the effectiveness of our approach, we have evaluated the performance of our approach while changing the shape and position of a hand as well as the velocity of hand movement.

A Study on the Automatic Detection of Railroad Power Lines Using LiDAR Data and RANSAC Algorithm (LiDAR 데이터와 RANSAC 알고리즘을 이용한 철도 전력선 자동탐지에 관한 연구)

  • Jeon, Wang Gyu;Choi, Byoung Gil
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.31 no.4
    • /
    • pp.331-339
    • /
    • 2013
  • LiDAR has been one of the widely used and important technologies for 3D modeling of ground surface and objects because of its ability to provide dense and accurate range measurement. The objective of this research is to develop a method for automatic detection and modeling of railroad power lines using high density LiDAR data and RANSAC algorithms. For detecting railroad power lines, multi-echoes properties of laser data and shape knowledge of railroad power lines were employed. Cuboid analysis for detecting seed line segments, tracking lines, connecting and labeling are the main processes. For modeling railroad power lines, iterative RANSAC and least square adjustment were carried out to estimate the lines parameters. The validation of the result is very challenging due to the difficulties in determining the actual references on the ground surface. Standard deviations of 8cm and 5cm for x-y and z coordinates, respectively are satisfactory outcomes. In case of completeness, the result of visual inspection shows that all the lines are detected and modeled well as compare with the original point clouds. The overall processes are fully automated and the methods manage any state of railroad wires efficiently.

Cataloguing of Anther Expressed Genes through Differential Slot Blot in Oriental Lily (Lilium Oriental Hybrid 'Acapulco') (아카풀코나리에서 Differential Slot Blot을 이용한 약발현 유전자 목록작성)

  • Suh, Eun-Jung;Yu, Hee Ju;Han, Bong Hee;Lim, Yong Pyo;Jeong, Mi-Jeong;Lee, Seong-Kon;Kim, Dong-Hern;Chang, An-Cheol;Yae, Byeong Woo
    • Horticultural Science & Technology
    • /
    • v.31 no.5
    • /
    • pp.598-606
    • /
    • 2013
  • Anther is the major organ of flower in responsible to reproduction and outward appearance. From anther-specific cDNA library of Lilium Oriental Hybrid 'Acapulco', 2000 expressed sequence tags were selected randomly. Differential slot blot analysis with cDNA probes from the anther and leaf was used to get anther-expressed clone and 570 non-redundant ESTs were obtained and sequenced. Compared to the GenBank database using BLASTX algorithm, 191 clones showed significant similarity but others (66.5%) did not measured to known sequence. Functional categories according to gene ontology (GO) annotation included sequence representing a significant portion of protein in cell and cell part respectively. A transcriptional analysis at 7 different organs and developmental stage was performed using northern blot with thirty ESTs as putative anther specific gene. This report suggest that selection of anther expressed clone using differential slot blot was considered as very effective tool and our current study can provide fundamental information on the lily anther including pollen furthermore.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

Quantitative Evaluation of the Corticospinal Tract Segmented by Using Co-registered Functional MRI and Diffusion Tensor Tractography (정상인에서 기능적 뇌 자기공명영상과 확산텐서영상 합성기법을 이용한 피질척수로의 위치에 따른 정량적 분석)

  • Jang, Sung-Ho;Hong, Ji-Heon;Byun, Woo-Mok;Hwang, Chang-Ho;Yang, Dong-Seok
    • Investigative Magnetic Resonance Imaging
    • /
    • v.13 no.1
    • /
    • pp.40-46
    • /
    • 2009
  • Purpose : The purpose of this study was to investigate the quantitative evaluation of the corticospinal tract (CST) at the multiple levels by using functional MRI (fMRI) co-registered to diffusion tensor tractography (DTT). Materials and Methods : Ten normal subjects without any history of neurological disorder participated in this study. fMRI was performed at 1.5 T MR scanner using hand grasp-release movement paradigm. DTT was performed by using DtiStudio on the basis of fiber assignment continuous tracking algorithm (FACT). The seed region of interest (ROI) was drawn in the area of maximum fMRI activation during the motor task of hand grasp-release movement on a 2-D fractional anisotropy (FA) color map, and the target ROI was drawn in the cortiocospinal portion of anterior lower pons. We have drawn five ROIs for the measurement of FA and apparent diffusion coefficient (ADC) along the corona radiata (CR) down to the medulla. Results : The contralateral primary sensorimotor cortex (SM1) was mainly found to be activated in all subjects. DTT showed that tracts originated from SM1 and ran to the medulla along the known pathway of the CST. In all subjects, FA values of the CST were higher at the level of the midbrain and posterior limb of internal capsule (PLIC) than the level of others. Conclusion : Our study showed that co-registered fMRI and DTT has elucidated the state of CST on 3-D and analyzed the quantitative values of FA and ADC at the multiple levels. We conclude that co-registered fMRI and DTT may be applied as a useful tool for clarifying and investigating the state of CST in the patients with brain injury.

  • PDF

The Effect of Start-up Accelerating Manager's Enabling Characteristics on Their Full Commitment & Performance to Start-up Support Groups: In The Center of Manager's Self-Efficacy (창업지원 매니저의 역량 특성이 창업지원단 몰입도와 업무성과에 미치는 영향: 매니저의 자기효능감을 중심으로)

  • Kang, Hye Jung;Yang, Young Seok;Kim, Myung Seuk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.1
    • /
    • pp.13-28
    • /
    • 2022
  • Korean Government Budget Supports for startups have been spiked and resulted in increasing the number and scaling up Startup Accelerating managers. It have skyrocketed the strong demand for their qualified roles. However, unclear role description and gap between required role and their capability have discouraged startup manager's self-efficacy resulted in declining their full commitment and causing poor role performance. The focus of this research falls on empirical analysis to the effect of startup accelerating manager's capability characteristics on their full commitment and performance to start-up support groups. This research is expected to deliver diverse policy alternatives to build up manager's core competencies to accelerate their self-efficacy leading their full role commitments and finally pushing up policy performance. In addition, this research will found more strong literature review for the following researches in this emerging fields. This research is brought four highlighting results with respect to four research problems. First, it propose proper concept of startup accelerating manager based upon its legal entitlement. Second, it drive required core competencies of manager for successful their accountability. Third, it analyze the unique features of startup accelerating manger's capabilities against business incubation manger. Fourth, it empirically analyze in coming with government startup funding, the effect of self-efficacy including employment status, job environment, etc. on their organizational commitment and job performance. This research reveal the required unique core competencies of manger into founder sourcing ability, project managing ability, startup proving and pivoting ability, consulting ability for successful investment raising. As of this empirical research results, First, manager's ability have positively effect on their job performance, full commitment, and self-efficacy. Second, self-efficacy have a mediating effect on manager's ability, job performance, full commitment. This research derive key policy implication of requiring to build up more accelerating ability, of manager from the basics to advance level by customized and algorithm based traing program. This accelerating ability buildup program will not only surge self-efficacy of manger resulting in making full commitment and better job performance, but also devote to categorizing the unique new feature and position of manger as seed investment and supporter.