• Title/Summary/Keyword: Vector analysis

Search Result 3,508, Processing Time 0.038 seconds

Driver Verification System Using Biometrical GMM Supervector Kernel (생체기반 GMM Supervector Kernel을 이용한 운전자검증 기술)

  • Kim, Hyoung-Gook
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.3
    • /
    • pp.67-72
    • /
    • 2010
  • This paper presents biometrical driver verification system in car experiment through analysis of speech, and face information. We have used Mel-scale Frequency Cesptral Coefficients (MFCCs) for speaker verification using speech information. For face verification, face region is detected by AdaBoost algorithm and dimension-reduced feature vector is extracted by using principal component analysis only from face region. In this paper, we apply the extracted speech- and face feature vectors to an SVM kernel with Gaussian Mixture Models(GMM) supervector. The experimental results of the proposed approach show a clear improvement compared to a simple GMM or SVM approach.

Analysis of the Biological Function of ELDF15 Using an Antisense Recombinant Expression Vector

  • Liu, Yan;Wang, Long;Wang, Zi-Jun
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.21
    • /
    • pp.9131-9136
    • /
    • 2014
  • ELDF15, homologous with AT2 receptor-interaction protein 1 (ATIP1), may play an important role in cell differentiation, proliferation, and carcinogenesis. We aimed to understand the biological function of ELDF15 via construction and transfection of a recombinant expression vector containing antisense ELDF15. Recombinant expression vectors were successfully constructed and transfected into K562 cells. A stable transfectant, known as pXJ41-asELDF15, stably produced antisense ELDF15. Compared with K562 and K562-zeo cells, K562-pXJ41-asELDF15 cells showed inhibition of cell proliferation. RT-PCR analysis showed that the expression and protein level of ELDF15 decreased significantly in K562 cells transfected with pXJ41-asELDF15. Expression of hemoglobin increased in K562 cells transfected with pXJ41-asELDF15 by benzidine staining. increases NBT reduction activity in K562 cells transfected with pXJ41-asELDF15.Colony forming efficiency in two-layer soft agar was clearly inhibited as assessed by electron microscopy. These results suggest that ELDF15 plays a potential role in cell differentiation, proliferation and carcinogenesis.

A Study on Efficient Topography Classification of High Resolution Satelite Image (고해상도 위성영상의 효율적 지형분류기법 연구)

  • Lim, Hye-Young;Kim, Hwang-Soo;Choi, Joon-Seog;Song, Seung-Ho
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.13 no.3 s.33
    • /
    • pp.33-40
    • /
    • 2005
  • The aim of remotely sensed data classification is to produce the best accuracy map of the earth surface assigning each pixel to its appropriate category of the real-world. The classification of satellite multi-spectral image data has become tool for generating ground cover map. Many classification methods exist. In this study, MLC(Maximum Likelihood Classification), ANN(Artificial neural network), SVM(Support Vector Machine), Naive Bayes classifier algorithms are compared using IKONOS image of the part of Dalsung Gun, Daegu area. Two preprocessing methods are performed-PCA(Principal component analysis), ICA(Independent Component Analysis). Boosting algorithms also performed. By the combination of appropriate feature selection pre-processing and classifier, the best results were obtained.

  • PDF

Automated Analysis Approach for the Detection of High Survivable Ransomware

  • Ahmed, Yahye Abukar;Kocer, Baris;Al-rimy, Bander Ali Saleh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2236-2257
    • /
    • 2020
  • Ransomware is malicious software that encrypts the user-related files and data and holds them to ransom. Such attacks have become one of the serious threats to cyberspace. The avoidance techniques that ransomware employs such as obfuscation and/or packing makes it difficult to analyze such programs statically. Although many ransomware detection studies have been conducted, they are limited to a small portion of the attack's characteristics. To this end, this paper proposed a framework for the behavioral-based dynamic analysis of high survivable ransomware (HSR) with integrated valuable feature sets. Term Frequency-Inverse document frequency (TF-IDF) was employed to select the most useful features from the analyzed samples. Support Vector Machine (SVM) and Artificial Neural Network (ANN) were utilized to develop and implement a machine learning-based detection model able to recognize certain behavioral traits of high survivable ransomware attacks. Experimental evaluation indicates that the proposed framework achieved an area under the ROC curve of 0.987 and a few false positive rates 0.007. The experimental results indicate that the proposed framework can detect high survivable ransomware in the early stage accurately.

Classification of Sitting Position by IMU Built in Neckband for Preventing Imbalance Posture (불균형 자세 예방용 IMU 내장 넥밴드를 이용한 앉은 자세 분류)

  • Ma, S.Y.;Shim, H.M.;Lee, S.M.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.9 no.4
    • /
    • pp.285-291
    • /
    • 2015
  • In this paper, we propose a classification algorithm for postures of sitting person by using IMU(inertial measurement unit). This algorithm uses PCA(principle component analysis) for decreasing the number of feature vectors to three and SVM(support vector machine) with RBF(radial basis function) kernel for classifying posture types. In order to collect the data, we designed neckband-shaped earphones with IMU, and applied it to three subjects who are healthy adults. Subjects were experimented three sitting postures, which are neutral posture, smartphoning, and writing. As the result, our PCA-SVM algorithm showed 95% confidence while the dimension of the feature vectors was reduced to 25%.

  • PDF

Efficient Speaker Identification based on Robust VQ-PCA (강인한 VQ-PCA에 기반한 효율적인 화자 식별)

  • Lee Ki-Yong
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.57-62
    • /
    • 2004
  • In this paper, an efficient speaker identification based on robust vector quantizationprincipal component analysis (VQ-PCA) is proposed to solve the problems from outliers and high dimensionality of training feature vectors in speaker identification, Firstly, the proposed method partitions the data space into several disjoint regions by roust VQ based on M-estimation. Secondly, the robust PCA is obtained from the covariance matrix in each region. Finally, our method obtains the Gaussian Mixture model (GMM) for speaker from the transformed feature vectors with reduced dimension by the robust PCA in each region, Compared to the conventional GMM with diagonal covariance matrix, under the same performance, the proposed method gives faster results with less storage and, moreover, shows robust performance to outliers.

  • PDF

Numerical Analysis for Supersonic Off-Design Turbulent Jet Flow (초음속 불완전 팽창 난류 제트 유동에 관한 수치적 연구)

  • Kim Jae-Soo
    • Journal of computational fluids engineering
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 1999
  • Numerical Analysis has been done for the supersonic off-design jet flow due to the pressure difference between the jet and the ambient fluid. The difference of pressure generates an oblique shock or an expansion wave at the nozzle exit. The waves reflect repeatedly on the center axis and the sonic surface in the shear layer. The pressure difference is resolved across these reflected waves. In this paper, the axi-symmetric Navier-Stokes equation has been used with the κ-ε turbulence model. The second order TVD scheme with flux limiters, based on the flux vector split with the smooth eigenvalue split, has been used to capture internal shocks and other discontinuities. Numerical calculations have been done to analyze the off-design jet flow due to the pressure difference. The variation of pressure along the flow axis is compared with an experimental result and other numerical result. The characteristics of the interaction between the shock cell and the turbulence mixing layer have been analyzed.

  • PDF

Competition between Online Stock Message Boards in Predictive Power: Focused on Multiple Online Stock Message Boards

  • Kim, Hyun Mo;Park, Jae Hong
    • Asia pacific journal of information systems
    • /
    • v.26 no.4
    • /
    • pp.526-541
    • /
    • 2016
  • This research aims to examine the predictive power of multiple online stock message boards, namely, NAVER Finance and PAXNET, which are the most popular stock message boards in South Korea, in stock market activities. If predictive power exists, we then compare the predictive power of multiple online stock message boards. To accomplish the research purpose, we constructed a panel data set with close price, volatility, Spell out acronyms at first mention.PER, and number of posts in 40 companies in three months, and conducted a panel vector auto-regression analysis. The analysis results showed that the number of posts could predict stock market activities. In NAVER Finance, previous number of posts positively influenced volatility on the day. In PAXNET, previous number of posts positively influenced close price, volatility, and PER on the day. Second, we confirmed a difference in the prediction power for stock market activities between multiple online stock message boards. This research is limited by the fact that it only considered 40 companies and three stock market activities. Nevertheless, we found correlation between online stock message board and stock market activities and provided practical implications. We suggest that investors need to focus on specific online message boards to find interesting stock market activities.

Face Detection and Recognition for Video Retrieval (비디오 검색을 위한 얼굴 검출 및 인식)

  • lslam, Mohammad Khairul;Lee, Hyung-Jin;Paul, Anjan Kumar;Baek, Joong-Hwan
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.691-698
    • /
    • 2008
  • We present a novel method for face detection and recognition methods applicable to video retrieval. The person matching efficiency largely depends on how robustly faces are detected in the video frames. Face regions are detected in video frames using viola-jones features boosted with the Adaboost algorithm After face detection, PCA (Principal Component Analysis) follows illumination compensation to extract features that are classified by SVM (Support Vector Machine) for person identification. Experimental result shows that the matching efficiency of the ensembled architecture is quit satisfactory.

  • PDF

Topic Extraction and Classification Method Based on Comment Sets

  • Tan, Xiaodong
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.329-342
    • /
    • 2020
  • In recent years, emotional text classification is one of the essential research contents in the field of natural language processing. It has been widely used in the sentiment analysis of commodities like hotels, and other commentary corpus. This paper proposes an improved W-LDA (weighted latent Dirichlet allocation) topic model to improve the shortcomings of traditional LDA topic models. In the process of the topic of word sampling and its word distribution expectation calculation of the Gibbs of the W-LDA topic model. An average weighted value is adopted to avoid topic-related words from being submerged by high-frequency words, to improve the distinction of the topic. It further integrates the highest classification of the algorithm of support vector machine based on the extracted high-quality document-topic distribution and topic-word vectors. Finally, an efficient integration method is constructed for the analysis and extraction of emotional words, topic distribution calculations, and sentiment classification. Through tests on real teaching evaluation data and test set of public comment set, the results show that the method proposed in the paper has distinct advantages compared with other two typical algorithms in terms of subject differentiation, classification precision, and F1-measure.