• Title/Summary/Keyword: Scoring algorithm

Search Result 66, Processing Time 0.034 seconds

A Matrix-Based Genetic Algorithm for Structure Learning of Bayesian Networks

  • Ko, Song;Kim, Dae-Won;Kang, Bo-Yeong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.3
    • /
    • pp.135-142
    • /
    • 2011
  • Unlike using the sequence-based representation for a chromosome in previous genetic algorithms for Bayesian structure learning, we proposed a matrix representation-based genetic algorithm. Since a good chromosome representation helps us to develop efficient genetic operators that maintain a functional link between parents and their offspring, we represent a chromosome as a matrix that is a general and intuitive data structure for a directed acyclic graph(DAG), Bayesian network structure. This matrix-based genetic algorithm enables us to develop genetic operators more efficient for structuring Bayesian network: a probability matrix and a transpose-based mutation operator to inherit a structure with the correct edge direction and enhance the diversity of the offspring. To show the outstanding performance of the proposed method, we analyzed the performance between two well-known genetic algorithms and the proposed method using two Bayesian network scoring measures.

An Algorithm for Pattern Classification of ECG Signals Using Frame Knowledge Representation Technique (게임 지식 표현 기법을 이용한 심전도 신호의 패턴해석 알고리즘에 관한 연구)

  • 신건수;이병채;정희교;이명호
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.41 no.4
    • /
    • pp.433-441
    • /
    • 1992
  • This paper describes an algorithm that can efficiently analyze the ECG signal using frame knowledge representation technique. Input to the analysis process is a set of significant points which have been extracted from an original sampled signal(lead II) by the syntactic peak recognition algorithm. The hierarchical property of ECG signal is represented by hierarchical AND/OR graph. The semantic information and constraints of the ECG signal are desctibed by frame. As the control mechanism for labeling points, the search mechanism with the mixed paradigms of data-driven and model driven hypothesis formation, scoring function, hypothesis modification network and instance inheritance are used. We used the CSE database in order to evaluate the performance of the proposed algorithm.

Access Point Selection Algorithm for Densely Deployed IEEE 802.11 WLANs (IEEE 802.11 무선랜 환경에서의 AP 선택 알고리즘)

  • Kim, Gyul;Lee, SuKyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.707-713
    • /
    • 2016
  • In the IEEE 802.11 Wireless LAN environment, the common Access Point (AP) selection of the existing terminal is based on signal strength. However, the signal strength-based AP selection method does not ensure an optimal data rate. Recently, several AP selection methods to solve this problem have been suggested. However, when we select AP, these have a latency problem and don't consider dense environments of AP. In this paper, we confirm the problem of the conventional AP selection about the signal strength and the throughput through the actual measurement, and propose algorithm that selects AP by scoring link speed and wireless round trip time to compensate the problem. Furthermore, the proposed AP selection algorithm through the actual experiment proves the improved performance as compared with the existing methods.

Design and Implementation of Autonomic De-fragmentation for File System Aging (파일 시스템 노화를 해소하기 위한 자동적인 단편화 해결 시스템의 설계와 구현)

  • Lee, Jun-Seok;Park, Hyun-Chan;Yoo, Chuck
    • The KIPS Transactions:PartA
    • /
    • v.16A no.2
    • /
    • pp.101-112
    • /
    • 2009
  • Existing techniques for defragmentation of the file system need intensive disk operation for some periods at specific time such as disk defragmentation program. In this paper, for solving this problem, we design and implement the automatic and continuous defragmentation free system by distributing the disk operation. We propose the Automatic Layout Scoring(ALS) mechanism for measuring defragmentation degree and suggest the Lazy Copy mechanism that copies the defragmented data at idle time for scattering the disk operation. We search the defragmented file by Automatic Layout Scoring mechanism and then find for empty spaces for that searched file. After lazy copy of searched fils to empty space for preventing that file from being lost, the algorithm solves the defragmentation problem by updating the I-node of that file. We implement these algorithms in Linux and evaluate them for small and defragmented file to get the layout scoring. We outperform the Linux EXT2 file system by $2.4%{\sim}10.4%$ in layout scoring evaluation. And the performance of read and write for various file size is better than the EXT2 by $1%{\sim}8.5%$ for write performance and by $1.2%{\sim}7.5%$ for read performance. We suggest this system for solving the problem of defragmentation automatically without disturbing the I/O task and manual management.

An Improved algorithm for RNA secondary structure prediction based on dynamic programming algorithm (향상된 다이내믹 프로그래밍 기반 RNA 이차구조 예측)

  • Namsrai, Oyun-Erdene;Jung, Kwang-Su;Kim, Sun-Shin;Ryu, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.15-18
    • /
    • 2005
  • A ribonucleic acid (RNA) is one of the two types of nucleic acids found in living organisms. An RNA molecule represents a long chain of monomers called nucleotides. The sequence of nucleotides of an RNA molecule constitutes its primary structure, and the pattern of pairing between nucleotides determines the secondary structure of an RNA. Non-coding RNA genes produce transcripts that exert their function without ever producing proteins. Predicting the secondary structure of non-coding RNAs is very important for understanding their functions. We focus on Nussinov's algorithm as useful techniques for predicting RNA secondary structures. We introduce a new traceback matrix and scoring table to improve above algorithm. And the improved prediction algorithm provides better levels of performance than the originals.

  • PDF

Recent Development of Search Algorithm on Small Molecule Docking (소분자 도킹에서의 탐색알고리듬의 현황)

  • Chung, Hwan Won;Cho, Seung Joo
    • Journal of Integrative Natural Science
    • /
    • v.2 no.2
    • /
    • pp.55-58
    • /
    • 2009
  • A ligand-receptor docking program is an indispensible tool in modern pharmaceutical design. An accurate prediction of small molecular docking pose to a receptor is essential in drug design as well as molecular recognition. An effective docking program requires the ability to locate a correct binding pose in a surprisingly complex conformational space. However, there is an inherent difficulty to predict correct binding pose. The odds are more demanding than finding a needle in a haystack. This mainly comes from the flexibility of both ligand and receptor. Because the searching space to consider is so vast, receptor rigidity has been often applied in docking programs. Even nowadays the receptor may not be considered to be fully flexible although there have been some progress in search algorithm. Improving the efficiency of searching algorithm is still in great demand to explore other applications areas with inherently flexible ligand and/or receptor. In addition to classical search algorithms such as molecular dynamics, Monte Carlo, genetic algorithm and simulated annealing, rather recent algorithms such as tabu search, stochastic tunneling, particle swarm optimizations were also found to be effective. A good search algorithm would require a good balance between exploration and exploitation. It would be a good strategy to combine algorithms already developed. This composite algorithms can be more effective than an individual search algorithms.

  • PDF

Approximated Posterior Probability for Scoring Speech Recognition Confidence

  • Kim Kyuhong;Kim Hoirin
    • MALSORI
    • /
    • no.52
    • /
    • pp.101-110
    • /
    • 2004
  • This paper proposes a new confidence measure for utterance verification with posterior probability approximation. The proposed method approximates probabilistic likelihoods by using Viterbi search characteristics and a clustered phoneme confusion matrix. Our measure consists of the weighted linear combination of acoustic and phonetic confidence scores. The proposed algorithm shows better performance even with the reduced computational complexity than those utilizing conventional confidence measures.

  • PDF

Efficient Keyword Extraction from Social Big Data Based on Cohesion Scoring

  • Kim, Hyeon Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.87-94
    • /
    • 2020
  • Social reviews such as SNS feeds and blog articles have been widely used to extract keywords reflecting opinions and complaints from users' perspective, and often include proper nouns or new words reflecting recent trends. In general, these words are not included in a dictionary, so conventional morphological analyzers may not detect and extract those words from the reviews properly. In addition, due to their high processing time, it is inadequate to provide analysis results in a timely manner. This paper presents a method for efficient keyword extraction from social reviews based on the notion of cohesion scoring. Cohesion scores can be calculated based on word frequencies, so keyword extraction can be performed without a dictionary when using it. On the other hand, their accuracy can be degraded when input data with poor spacing is given. Regarding this, an algorithm is presented which improves the existing cohesion scoring mechanism using the structure of a word tree. Our experiment results show that it took only 0.008 seconds to extract keywords from 1,000 reviews in the proposed method while resulting in 15.5% error ratio which is better than the existing morphological analyzers.

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

Development of a Synthetic Multi-Agent System;The KMITL Cadence 2003 Robotic Soccer Simulation Team, Intelligent and AI Based Control

  • Chitipalungsri, Thunyawat;Jirawatsiwaporn, Chawit;Tangchupong, Thanapon;Kittitornkun, Surin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.879-884
    • /
    • 2004
  • This paper describes the development of a synthetic multi-agent called KMITL Cadence 2003. KMITL Cadence 2003 is a robotic soccer simulation team consisting of eleven autonomous software agents. Each agent operates in a physical soccer simulation model called Robocup Soccer Server which provides fully distributed and real-time multi-agent system environment. All teammates have to cooperate to achieve the common goal of winning the game. The simulation models many aspects of the football field such as noise in ball movements, noisy sensors, unreliable communication channel between teammates and actuators, limited physical abilities and restricted communication. This paper addresses the algorithm to develop the soccer agents to perform basic actions which are scoring, passing ball and blocking the opponents effectively. The result of this development is satisfactory because the successful scoring attempts is increased from 11.1% to 33.3%, successful passing ball attempts is increased from 22.08% to 63.64%, and also, successful intercepting attempts is increased from 88% to 97.73%.

  • PDF