• 제목/요약/키워드: data detection error

검색결과 727건 처리시간 0.024초

균형상살 검출 알고리즘에서 검출과 관련된 설계변수의 민감도 해석 몇 최적화 (Sensitivity Analysis and Optimization of Design Variables Related to an Algorithm for Loss of Balance Detection)

  • 고병규;김광훈;손권
    • 대한의용생체공학회:의공학회지
    • /
    • 제32권1호
    • /
    • pp.7-14
    • /
    • 2011
  • This study suggested an optimized algorithm for detecting the loss of balance(LOB) in the seated position. And the sensitivity analysis was performed in order to identify the role of each design variable in the algorithm. The LOB algorithm consisted of data processing of measured signals, an internal model of the central nervous system and a control error anomaly(CEA) detector. This study optimized design variables of a CEA detector to obtain improved values of the success rate(SR) of detecting the LOB and the margin time(MT) provided for preventing the falling. Nine healthy adult volunteers were involved in the experiments. All the subjects were asked to balance their body in a predescribed seated posture with the rear legs of a four-legged wooden chair. The ground reaction force from the right leg was measured from the force plate while the accelerations of the chair and the head were measured from a couple of piezoelectric accelerometers. The measured data were processed to predict the LOB using a detection algorithm. Variables S2, h2 and hd are related to the detector: S2 represents a data selecting window, h2 a time shift and hd an operating period of the LOB detection algorithm. S2 was varied from 0.1 to 10 sec with an increment of 0.1 sec, and both h2 and hd were varied from 0.01 to 1.0 sec with an increment of 0.01 sec. It was found that the SR and MT were increased by up to 9.7% and 0.497 sec comparing with the previously published case when the values of S2, h2 and hd were set to 4.5, 0.3 and 0.2 sec, respectively. Also the results of sensitivity analysis showed that S2 and h2 had considerable influence on the SR while these variables were not so sensitive to the MT.

신용카드 사기 검출을 위한 신경망 분류기의 진화 학습 (Evolutionary Learning of Neural Networks Classifiers for Credit Card Fraud Detection)

  • 박래정
    • 한국지능시스템학회논문지
    • /
    • 제11권5호
    • /
    • pp.400-405
    • /
    • 2001
  • This paper addresses an effective approach of training neural networks classifiers for credit card fraud detection. The proposed approach uses evolutionary programming to trails the neural networks classifiers based on maximization of the detection rate of fraudulent usages on some ranges of the rejection rate, loot minimization of mean square error(MSE) that Is a common criterion for neural networks learning. This approach enables us to get classifier of satisfactory performance and to offer a directive method of handling various conditions and performance measures that are required for real fraud detection applications in the classifier training step. The experimental results on "real"credit card transaction data indicate that the proposed classifiers produces classifiers of high quality in terms of a relative profit as well as detection rate and efficiency.

  • PDF

Snapping shrimp noise detection and mitigation for underwater acoustic orthogonal frequency division multiple communication using multilayer frequency

  • Ahn, Jongmin;Lee, Hojun;Kim, Yongcheol;Chung, Jeahak
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • 제12권1호
    • /
    • pp.258-269
    • /
    • 2020
  • This paper proposes Snapping Shrimp Noise (SSN) detection and corrupted Orthogonal Frequency Division Multiplexing (OFDM) reconstruction methods to increase Bit Error Rate (BER) performance when OFDM transmitted signal is corrupted by impulsive SSNs in underwater acoustic communications. The proposed detection method utilizes multilayer wavelet packet decomposition for detecting impulsive and irregularly concentrated and SSN energy in specific frequency bands of SSN, and the proposed reconstruction scheme uses iterative decision directed-subcarrier reconstruction to recover corrupted OFDM signals using multiple carrier characteristics. Computer simulations were executed to show receiver operating characteristics curve for the detection performance and BER for the reconstruction. The practical ocean experiment of SAVEX 15 demonstrated that the proposed method exhibits a better detection performance compared with conventional detection method and improves BER by 250% and 1230% for uncoded and coded data, respectively, compared with the conventional reconstruction scheme.

스트리밍 데이터에서 확률 예측치를 이용한 효과적인 개념 변화 탐지 방법 (An Effective Concept Drift Detection Method on Streaming Data Using Probability Estimates)

  • 김영인;박정희
    • 정보과학회 논문지
    • /
    • 제43권6호
    • /
    • pp.718-723
    • /
    • 2016
  • 스트리밍 데이터 분석에서 개념 변화가 일어나는 시점을 정확히 탐지하는 것은 분류 모델의 성능을 유지하는 데 있어서 매우 중요한 작업이다. 오류율은 스트리밍 데이터에서 개념 변화 탐지를 위해 많이 사용되는 척도이다. 그러나 0과 1로 이루어진 이진 값만으로 예측 결과를 묘사하는 것은 분류 모델의 행동 패턴을 나타내는 유용한 정보의 손실을 초래할 수 있다. 이 논문에서는 오류율을 이용하는 대신에 확률 예측치를 사용하여 분류기의 성능 패턴을 묘사하고 급격한 변화를 탐지하는 효과적인 개념 변화 탐지 방법을 제안한다. 합성데이터와 실제 스트리밍 데이터를 이용한 실험 결과는 제안한 방법이 개념 변화 시점을 탐지하는데 뛰어난 성능을 가짐을 보여준다.

SVDD를 활용한 상업용 건물에너지 소비패턴의 이상현상 감지 (Anomaly Detection and Diagnostics (ADD) Based on Support Vector Data Description (SVDD) for Energy Consumption in Commercial Building)

  • 채영태
    • 한국건축친환경설비학회 논문집
    • /
    • 제12권6호
    • /
    • pp.579-590
    • /
    • 2018
  • Anomaly detection on building energy consumption has been regarded as an effective tool to reduce energy saving on building operation and maintenance. However, it requires energy model and FDD expert for quantitative model approach or large amount of training data for qualitative/history data approach. Both method needs additional time and labors. This study propose a machine learning and data science approach to define faulty conditions on hourly building energy consumption with reducing data amount and input requirement. It suggests an application of Support Vector Data Description (SVDD) method on training normal condition of hourly building energy consumption incorporated with hourly outdoor air temperature and time integer in a week, 168 data points and identifying hourly abnormal condition in the next day. The result shows the developed model has a better performance when the ${\nu}$ (probability of error in the training set) is 0.05 and ${\gamma}$ (radius of hyper plane) 0.2. The model accuracy to identify anomaly operation ranges from 70% (10% increase anomaly) to 95% (20% decrease anomaly) for daily total (24 hours) and from 80% (10% decrease anomaly) to 10%(15% increase anomaly) for occupied hours, respectively.

Simple Signal Detection Algorithm for 4+12+16 APSK in Satellite and Space Communications

  • Lee, Jae-Yoon;Yoon, Dong-Weon;Hyun, Kwang-Min
    • Journal of Astronomy and Space Sciences
    • /
    • 제27권3호
    • /
    • pp.221-230
    • /
    • 2010
  • A 4+12+16 amplitude phase shift keying (APSK) modulation outperforms other 32-APSK modulations in a nonlinear additive white Gaussian noise (AWGN) channel because of its intrinsic robustness against AM/AM and AM/PM distortions caused by the nonlinear characteristics of a high-power amplifier. Thus, this modulation scheme has been adopted in the digital video broadcasting-satellite2 European standard. And it has been considered for high rate transmission of telemetry data on deep space communications in consultative committee for space data systems which provides a forum for discussion of common problems in the development and operation of space data systems. In this paper, we present an improved bits-to-symbol mapping scheme with a better bit error rate for a 4+12+16 APSK signal in a nonlinear AWGN channel and propose a simple signal detection algorithm for the 4+12+16 APSK from the presented bit mapping.

신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출 (Detection of Colluded Multimedia Fingerprint by Neural Network)

  • 노진수;이강현
    • 전자공학회논문지CI
    • /
    • 제43권4호
    • /
    • pp.80-87
    • /
    • 2006
  • 최근 인터넷 응용 프로그램과 관련 기술의 발전에 따라 디지털 멀티미디어 콘텐츠의 보급과 사용이 쉬워지고 있다. 디지털 신호는 복제가 용이하고 복제된 신호는 원신호와 동일한 품질을 갖는다. 이러한 문제점을 해결하고 저작권 보호를 위해 멀티 미디어 핑거프린트가 연구되어지고 있다. 핑거프린팅 기법은 암호학적인 기법들을 이용하여 디지털 데이타를 불법적으로 재배포한 사용자를 찾아냄으로써 디지털 데이타의 저작권을 보호한다. 핑거프린팅 기법은 대칭적이나 비대칭적인 기법과 달리 사용자만이 핑거프린트가 삽입된 데이타를 알 수 있고 데이타가 재배포되기 전에는 사용자의 익명성이 보장되는 기법이다. 본 논문에서는 신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출 알고리즘을 제안한다. 제안된 알고리즘은 불법공모방지 코드 생성과 에러정정을 위한 신경회로망으로 구성되어 있다. BIBD(Balance Incomplete Block Design) 기반의 불법공모방지 코드는 평균화 선형 공모공격에 대해 100% 공모코드 검출이 이루어졌으며, 에러비트 정정을 위해 (n,k)코드를 사용한 홉필드 신경회로망은 2비트 이내의 에러비트를 정정할 수 있음을 확인하였다.

Weibull-3 분포모형의 모멘트법 및 L-모멘트법에 의한 홍수빈도비교분석 (Comparative Analysis of Flood Frequncy by Moment and L-moment in Weibull-3 distribution)

  • 이순혁;맹승진;송기헌;류경식;지호근
    • 한국농공학회:학술대회논문집
    • /
    • 한국농공학회 1998년도 학술발표회 발표논문집
    • /
    • pp.331-337
    • /
    • 1998
  • This study was carried out to derive optimal design floods by Weibull-3 distribution with the annual maximum series at seven watersheds along Man, Nagdong, Geum, Yeongsan and Seomjin river systems. Adequacy for the analysis of flood data used in this study was acknowledged by the tests of Independence, Homogeneity, detection of Outliers. Parameters were estimated by the Methods of Moments and L-Moments. Design floods obtained by Methods of Moments and L-Moments using different methods for plotting positions in Weibull-3 distribution were compared by the rotative mean error and relative absolute error. It has shown that design floods derived by the method of L-moments using Weibull plotting position formula in Weibull-3 distribution are much closer to those of the observed data in comparison with those obtained by method of moments using different formulas for plotting positions in view of relative mean and relative absolute error.

  • PDF

내잡음성 저속 전력선 모뎀의 구현 (Embodiment of the Power-Line Modem for high noise environment)

  • 여진기;이승민;이흥호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 합동 추계학술대회 논문집 정보 및 제어부문
    • /
    • pp.558-561
    • /
    • 2002
  • In the embodiment of power line modem, the important elements are selection of a suitable line-coupler, choice of a modulation method good for channel environments, and an efficient data coding method etc. In this paper an appropriate modulation method was implemented their results in details and verified by the simulations. The data compensation request techniques that uses error checking was discussed. Finally, application of other modulation method by detection of error rate per bit according to vary of channel error caused by electric equipment that is connected to power line was studied.

  • PDF

지수형과 로그형 위험함수 학습효과에 근거한 NHPP 소프트웨어 신뢰성장모형에 관한 비교연구 (The Comparative Study of NHPP Software Reliability Model Exponential and Log Shaped Type Hazard Function from the Perspective of Learning Effects)

  • 김희철
    • 디지털산업정보학회논문지
    • /
    • 제8권2호
    • /
    • pp.1-10
    • /
    • 2012
  • In this study, software products developed in the course of testing, software managers in the process of testing software test and test tools for effective learning effects perspective has been studied using the NHPP software. The finite failure nonhomogeneous Poisson process models presented and the life distribution applied exponential and log shaped type hazard function. Software error detection techniques known in advance, but influencing factors for considering the errors found automatically and learning factors, by prior experience, to find precisely the error factor setting up the testing manager are presented comparing the problem. As a result, the learning factor is greater than autonomous errors-detected factor that is generally efficient model could be confirmed. This paper, a failure data analysis of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection were efficient using the mean square error and coefficient of determination.