• Title/Summary/Keyword: concept-based detection

Search Result 249, Processing Time 0.029 seconds

Neural Network Modeling supported by Change-Point Detection for the Prediction of the U.S. Treasury Securities

  • Oh, Kyong-Joo;Ingoo Han
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.37-39
    • /
    • 2000
  • The purpose of this paper is to present a neural network model based on change-point detection for the prediction of the U.S. Treasury Securities. Interest rates have been studied by a number of researchers since they strongly affect other economic and financial parameters. Contrary to other chaotic financial data, the movement of interest rates has a series of change points due to the monetary policy of the U.S. government. The basic concept of this proposed model is to obtain intervals divided by change points, to identify them as change-point groups, and to use them in interest rates forecasting. The proposed model consists of three stages. The first stage is to detect successive change points in the interest rates dataset. The second stage is to forecast the change-point group with the backpropagation neural network (BPN). The final stage is to forecast the output with BPN. This study then examines the predictability of the integrated neural network model for interest rates forecasting using change-point detection.

  • PDF

Truss structure damage identification using residual force vector and genetic algorithm

  • Nobahari, Mehdi;Ghasemi, Mohammad Reza;Shabakhty, Naser
    • Steel and Composite Structures
    • /
    • v.25 no.4
    • /
    • pp.485-496
    • /
    • 2017
  • In this paper, damage detection has been introduced as an optimization problem and a two-step method has been proposed that can detect the location and severity of damage in truss structures precisely and reduce the volume of computations considerably. In the first step, using the residual force vector concept, the suspected damaged members are detected which will result in a reduction in the number of variables and hence a decrease in the search space dimensions. In the second step, the precise location and severity of damage in the members are identified using the genetic algorithm and the results of the first step. Considering the reduced search space, the algorithm can find the optimal points (i.e. the solution for the damage detection problem) with less computation cost. In this step, the Efficient Correlation Based Index (ECBI), that considers the structure's first few frequencies in both damaged and healthy states, is used as the objective function and some examples have been provided to check the efficiency of the proposed method; results have shown that the method is innovatively capable of detecting damage in truss structures.

Fixed Decision Delay Detector for Intersymbol Interference Channel (심볼간 간섭 채널을 위한 고정 지연 신호 검출기)

  • Taehyun, Jeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.9
    • /
    • pp.39-45
    • /
    • 2004
  • A design method is proposed for the sequence detection with fixed decision delay with less hardware complexity using the concept of the Voronoi diagram and its dual, the Delaunay tessellation. This detector design is based on the Fixed Delay Tree Search (FDTS) detection. The FDTS is a computationally efficient sequence detection algerian and has been shown to achieve near-optimal performance in the severe Intersymbol Interference (ISI) channels when combined with decision feedback equalization and the appropriate channel coding. In this approach, utilizing the information contained in the Voronoi diagram or equivalently the Delaunay tessellation, the relative location of the detector input sequence in the multi-dimensional Euclidean space is found without any computational redundancy, which leads to a reduced complexity implementation of the detector.

A Single-Phase Quasi Z-Source Dynamic Voltage Restorer(DVR) (단상 Quasi Z-소스 동적전압보상기(DVR))

  • Lee, Ki-Taeg;Jung, Young-Gook;Lim, Young-Cheol
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.15 no.4
    • /
    • pp.327-334
    • /
    • 2010
  • This paper deals with a single-phase dynamic voltage restorer(DVR) with a quasi Z-source topology. The proposed system based on a single-phase quasi Z-source PWM ac-ac converter which have features such as the input voltage and output voltage are sharing ground, and input current operates in continuous current mode(CCM). For the detection of voltage sag-swell, peak voltage detection method is applied. Also, the circuit principles of the proposed system are described. During the 60% severe voltage sag and 30% voltage swell, the proposed system controls the adding or missing voltage and maintains the rated voltage of sinusoidal waveform at the terminals of the critical loads. Finally, PSIM simulation and experimental results are presented to verify the proposed concept and theoretical analysis.

Anomaly Detection Model based on Network using the Session Patterns (세션 패턴을 이용한 네트워크기반의 비정상 탐지 모델)

  • Park Soo-Jin;Choi Yong-Rak
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.719-724
    • /
    • 2004
  • Recently, since the number of internet users is increasing rapidly and, by using the public hacking tools, general network users can intrude computer systems easily, the hacking problem is getting more serious. In order to prevent the intrusion, it is needed to detect the sign in advance of intrusion in a positive prevention by detecting the various foms of hackers' intrusion trials to know the vulnerability of systems. The existing network-based anomaly detection algorithms that cope with port- scanning and the network vulnerability scans have some weakness in intrusion detection. they can not detect slow scans and coordinated scans. therefore, the new concept of algorithm is needed to detect effectively the various forms of abnormal accesses for intrusion regardless of the intrusion methods. In this paper, SPAD(Session Pattern Anomaly Detector) is presented, which detects the abnormal service patterns by comparing them with the ordinary normal service patterns.

Knowledge Graph-based Korean New Words Detection Mechanism for Spam Filtering (스팸 필터링을 위한 지식 그래프 기반의 신조어 감지 매커니즘)

  • Kim, Ji-hye;Jeong, Ok-ran
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.79-85
    • /
    • 2020
  • Today, to block spam texts on smartphone, a simple string comparison between text messages and spam keywords or a blocking spam phone numbers is used. As results, spam text is sent in a gradually hanged way to prevent if from being automatically blocked. In particular, for words included in spam keywords, spam texts are sent to abnormal words using special characters, Chinese characters, and whitespace to prevent them from being detected by simple string match. There is a limit that traditional spam filtering methods can't block these spam texts well. Therefore, new technologies are needed to respond to changing spam text messages. In this paper, we propose a knowledge graph-based new words detection mechanism that can detect new words frequently used in spam texts and respond to changing spam texts. Also, we show experimental results of the performance when detected Korean new words are applied to the Naive Bayes algorithm.

An Exploratory Study of Collective E-Petitions Estimation Methodology Using Anomaly Detection: Focusing on the Voice of Citizens of Changwon City (이상탐지 활용 전자집단민원 추정 방법론에 관한 탐색적 연구: 창원시 시민의 소리 사례를 중심으로)

  • Jeong, Ha-Yeong
    • Informatization Policy
    • /
    • v.26 no.4
    • /
    • pp.85-106
    • /
    • 2019
  • Recently, there have been increasing cases of collective petitions filed in the electronic petitions system. However, there is no efficient management system, raising concerns on side effects such as increased administrative workload and mass production of social conflicts. Aimed at suggesting a methodology for estimating electronic collective petitions using anomaly detection and corpus linguistics-based content analysis, this study conducted the followings: i) a theoretical review of the concept of collective petitions, ii) estimation of electronic collective petitions using anomaly detection based on nonparametric unsupervised learning, iii) a content similarity analysis on petitions using n-gram cosine angle distance, and iv) a case study on the Voice of Citizens of Changwon City, through which the utility of the proposed methodology, policy implications and future tasks were reviewed.

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

Operational Concept Design and Verification for Airborne SAR System (항공탑재 SAR 시스템 운용개념 설계 및 검증)

  • Lee, Hyon-Ik;Kim, Se-Young;Jeon, Byeong-Tae;Sung, Jin-Bong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.7
    • /
    • pp.588-595
    • /
    • 2013
  • Airborne SAR system is the imaging Radar system that is loaded on a manned or unmanned aircraft, which is in charge of high quality image acquisition and moving target detection. This paper describes the operational requirements for the Airborne SAR system and suggests the operational concept to satisfy the requirements. To be specific, it describes the interface with airborne system, state definition and transition, operation mode based on mission definition file, fault management, and data storing and transmission concept. Finally, it gives the ground test results to verify the SAR system operational concept.

WAVELET-BASED FOREST AREAS CLASSIFICATION BY USING HIGH RESOLUTION IMAGERY

  • Yoon Bo-Yeol;Kim Choen
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.698-701
    • /
    • 2005
  • This paper examines that is extracted certain information in forest areas within high resolution imagery based on wavelet transformation. First of all, study areas are selected one more species distributed spots refer to forest type map. Next, study area is cut 256 x 256 pixels size because of image processing problem in large volume data. Prior to wavelet transformation, five texture parameters (contrast, dissimilarity, entropy, homogeneity, Angular Second Moment (ASM≫ calculated by using Gray Level Co-occurrence Matrix (GLCM). Five texture images are set that shifting window size is 3x3, distance .is 1 pixel, and angle is 45 degrees used. Wavelet function is selected Daubechies 4 wavelet basis functions. Result is summarized 3 points; First, Wavelet transformation images derived from contrast, dissimilarity (texture parameters) have on effect on edge elements detection and will have probability used forest road detection. Second, Wavelet fusion images derived from texture parameters and original image can apply to forest area classification because of clustering in Homogeneous forest type structure. Third, for grading evaluation in forest fire damaged area, if data fusion of established classification method, GLCM texture extraction concept and wavelet transformation technique effectively applied forest areas (also other areas), will obtain high accuracy result.

  • PDF