• Title/Summary/Keyword: data validation

Search Result 3,281, Processing Time 0.032 seconds

Preliminary Results of Surveillance Data Processing for Design of Prototype ADS-B/TIS-B Validation Testbed (연구용 ADS-B/TIS-B Validation Testbed 설계를 위한 항공감시데이터 처리의 예비 결과)

  • Song, Jae-Hoon;Oh, Kyung-Ryoon;Kim, In-Kyu;Lee, Jang-Yeon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.539-547
    • /
    • 2008
  • In this paper, preliminary results for design of prototype ADS-ADS-B/TIS-B Validation Testbed (AVT) are described. Automatic Dependent Surveillance (ADS-B) is a novel surveillance concept using the Global Navigation Satellite System (GNSS) and a digital datalink. Air traffic information from ADS-B non-equipped aircraft is not acquired since ADS-B is a dependent surveillance. Traffic Information Service-Broadcast (TIS-B) provides surveillance data from Secondary surveillance Radar (SSR) for ADS-B non-equipped aircraft. AVT is based on ADS-B and TIS-B as an integrated platform for air traffic surveillance system for CNS/ATM.

  • PDF

Setting an Initial Validation Gate based on Signal Intensity for Target Tracking in IR Image Sequences (적외선 영상에서 표적 추적을 위한 신호세기 기반 초기 유효게이트 설정 방법)

  • Yang, Yu Kyung;Kim, Jieun;Lee, Boohwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.108-114
    • /
    • 2014
  • This paper describes a method to set an intensity-based initial validation gate for tracking filter while preserves the ability of tracking a target with maximum speed. First, we collected real data set of signal versus distance of an airplane target. And at each data point, we computed maximum distance the target can move. And a function is modeled to expect the maximum moving pixels on the lateral direction based on the intensity of the detected target in IR image sequence. The initial prediction error covariance can be computed using this function to decide the size of the initial validation gate. The simulation results show the proposed method can set the appropriate initial validation gates to track the targets with the maximum speed.

Semi-supervised learning using similarity and dissimilarity

  • Seok, Kyung-Ha
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.1
    • /
    • pp.99-105
    • /
    • 2011
  • We propose a semi-supervised learning algorithm based on a form of regularization that incorporates similarity and dissimilarity penalty terms. Our approach uses a graph-based encoding of similarity and dissimilarity. We also present a model-selection method which employs cross-validation techniques to choose hyperparameters which affect the performance of the proposed method. Simulations using two types of dat sets demonstrate that the proposed method is promising.

Cox proportional hazard model with L1 penalty

  • Hwang, Chang-Ha;Shim, Joo-Yong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.3
    • /
    • pp.613-618
    • /
    • 2011
  • The proposed method is based on a penalized log partial likelihood of Cox proportional hazard model with L1-penalty. We use the iteratively reweighted least squares procedure to solve L1 penalized log partial likelihood function of Cox proportional hazard model. It provide the ecient computation including variable selection and leads to the generalized cross validation function for the model selection. Experimental results are then presented to indicate the performance of the proposed procedure.

Mixed Effects Kernel Binomial Regression

  • Hwang, Chang-Ha
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.4
    • /
    • pp.1327-1334
    • /
    • 2008
  • Mixed effect binomial regression models are widely used for analysis of correlated count data in which the response is the result of a series of one of two possible disjoint outcomes. In this paper, we consider kernel extensions with nonparametric fixed effects and parametric random effects. The estimation is through the penalized likelihood method based on kernel trick, and our focus is on the efficient computation and the effective hyperparameter selection. For the selection of hyperparameters, cross-validation techniques are employed. Examples illustrating usage and features of the proposed method are provided.

  • PDF

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

Validation of Mathematical Models of UAV by Using the Parameter Estimation for Nonlinear System (비선형 시스템식별에 의한 무인비행기의 수학적 모델 적합성)

  • Lee, Hwan;Choi, Hyoung-Sik;Seong, Kie-Jeong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.10
    • /
    • pp.927-932
    • /
    • 2007
  • The sophisticated mathematical model is required for the design and the database construction of the advanced flight control system of UAV. In this paper, flight test of KARI's research UAV, often called DURUMI-II, is implemented for the data acquisition from the maneuver flight. The flight path reconstruction is implemented to ensure that the measured data is consistent and error free. The nonlinear system identification for the refined mathematical modeling is implemented with the verified measurements from the flight path reconstruction. The simulation with the identified results have a good validation when the simulated responses were compared to the flight tested data.

A Study on Accuracy Estimation of Service Model by Cross-validation and Pattern Matching

  • Cho, Seongsoo;Shrestha, Bhanu
    • International journal of advanced smart convergence
    • /
    • v.6 no.3
    • /
    • pp.17-21
    • /
    • 2017
  • In this paper, the service execution accuracy was compared by ontology based rule inference method and machine learning method, and the amount of data at the point when the service execution accuracy of the machine learning method becomes equal to the service execution accuracy of the rule inference was found. The rule inference, which measures service execution accuracy and service execution accuracy using accumulated data and pattern matching on service results. And then machine learning method measures service execution accuracy using cross validation data. After creating a confusion matrix and measuring the accuracy of each service execution, the inference algorithm can be selected from the results.

Development of On-Line Diagnostic Expert System : Heuristics and Influence Diagrams (현장진단 전문가 시스템의 개발 : 휴리스틱과 인플루언스 다이아그램)

  • Kim, Young-Jin
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.23 no.1
    • /
    • pp.95-113
    • /
    • 1997
  • This paper outlines a framework for a diagnosis of a complex system with uncertain information. Sensor validation ploys a vital role in the ability of the overall system to correctly determine the state of a system monitored by imperfect sensors. Here, emphases are put on the heuristic technology and post-processor for reasoning. Heuristic Sensor Validation (HSV) exploits deeper knowledge about parameter interaction within the plant to cull sensor faults from the data stream. Finally the modified probability distributions and validated data are used as input to the reasoning scheme which is the runtime version of the influence diagram. The output of the influence diagram is a diagnostic mapping from the symptoms or sensor readings to a determination of likely failure modes. Once likely failure modes are identified, a detailed diagnostic knowledge base suggests corrective actions to improve performance. This framework for a diagnostic expert system with sensor validation and reasoning under uncertainty applies in $HEATXPRT^{TM}$ a data-driven on-line expert system for diagnosing heat rate degradation problems in fossil power plants [1].

  • PDF

A convenient approach for penalty parameter selection in robust lasso regression

  • Kim, Jongyoung;Lee, Seokho
    • Communications for Statistical Applications and Methods
    • /
    • v.24 no.6
    • /
    • pp.651-662
    • /
    • 2017
  • We propose an alternative procedure to select penalty parameter in $L_1$ penalized robust regression. This procedure is based on marginalization of prior distribution over the penalty parameter. Thus, resulting objective function does not include the penalty parameter due to marginalizing it out. In addition, its estimating algorithm automatically chooses a penalty parameter using the previous estimate of regression coefficients. The proposed approach bypasses cross validation as well as saves computing time. Variable-wise penalization also performs best in prediction and variable selection perspectives. Numerical studies using simulation data demonstrate the performance of our proposals. The proposed methods are applied to Boston housing data. Through simulation study and real data application we demonstrate that our proposals are competitive to or much better than cross-validation in prediction, variable selection, and computing time perspectives.