• Title/Summary/Keyword: decision algorithm

Search Result 2,359, Processing Time 0.027 seconds

Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain

  • Liu, Jinhua;Rao, Yunbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.452-472
    • /
    • 2019
  • Most existing wavelet-based multiplicative watermarking methods are affected by geometric attacks to a certain extent. A serious limitation of wavelet-based multiplicative watermarking is its sensitivity to rotation, scaling, and translation. In this study, we propose an image watermarking method by using dual-tree complex wavelet transform with a multi-objective optimization approach. We embed the watermark information into an image region with a high entropy value via a multiplicative strategy. The major contribution of this work is that the trade-off between imperceptibility and robustness is simply solved by using the multi-objective optimization approach, which applies the watermark error probability and an image quality metric to establish a multi-objective optimization function. In this manner, the optimal embedding factor obtained by solving the multi-objective function effectively controls watermark strength. For watermark decoding, we adopt a maximum likelihood decision criterion. Finally, we evaluate the performance of the proposed method by conducting simulations on benchmark test images. Experiment results demonstrate the imperceptibility of the proposed method and its robustness against various attacks, including additive white Gaussian noise, JPEG compression, scaling, rotation, and combined attacks.

Analysis on Time Performance of Intercept System for Engagement Plan of Missile Defense System (미사일방어체계의 교전계획 수립을 위한 요격체계의 시간성능인자 분석)

  • Hong, Seong-Wan;Song, Jin-Young;Chang, Young-Keun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.1
    • /
    • pp.93-105
    • /
    • 2019
  • In order to establish an effective engagement plan of the missile defense system, both spatial and temporal performance analysis of the intercept system should be performed. However, research on existing missile defense systems has been mainly focused on spatial performance. In this study, time performance factors are defined through the composition and operational concept of missile defense system, and the target ballistic missile interception process is presented as integrated timeline through ballistic missile model and radar model. We also proposed an algorithm for deriving time performance. Simulation results confirm that the time performance factors can be used in the engagement planning for multi-engagement through the example of engagement planning.

Traffic Emission Modelling Using LiDAR Derived Parameters and Integrated Geospatial Model

  • Azeez, Omer Saud;Pradhan, Biswajeet;Jena, Ratiranjan;Jung, Hyung-Sup;Ahmed, Ahmed Abdulkareem
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.1
    • /
    • pp.137-149
    • /
    • 2019
  • Traffic emissions are the main cause of environmental pollution in cities and respiratory problems amongst people. This study developed a model based on an integration of support vector regression (SVR) algorithm and geographic information system (GIS) to map traffic carbon monoxide (CO) concentrations and produce prediction maps from micro level to macro level at a particular time gap in a day in a very densely populated area (Utara-Selatan Expressway-NKVE, Kuala Lumpur, Malaysia). The proposed model comprised two models: the first model was implemented to estimate traffic CO concentrations using the SVR model, and the second model was applied to create prediction maps at different times a day using the GIS approach. The parameters for analysis were collected from field survey and remote sensing data sources such as very-high-resolution aerial photos and light detection and ranging point clouds. The correlation coefficient was 0.97, the mean absolute error was 1.401 ppm and the root mean square error was 2.45 ppm. The proposed models can be effectively implemented as decision-making tools to find a suitable solution for mitigating traffic jams near tollgates, highways and road networks.

Incomplete Cholesky Decomposition based Kernel Cross Modal Factor Analysis for Audiovisual Continuous Dimensional Emotion Recognition

  • Li, Xia;Lu, Guanming;Yan, Jingjie;Li, Haibo;Zhang, Zhengyan;Sun, Ning;Xie, Shipeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.810-831
    • /
    • 2019
  • Recently, continuous dimensional emotion recognition from audiovisual clues has attracted increasing attention in both theory and in practice. The large amount of data involved in the recognition processing decreases the efficiency of most bimodal information fusion algorithms. A novel algorithm, namely the incomplete Cholesky decomposition based kernel cross factor analysis (ICDKCFA), is presented and employed for continuous dimensional audiovisual emotion recognition, in this paper. After the ICDKCFA feature transformation, two basic fusion strategies, namely feature-level fusion and decision-level fusion, are explored to combine the transformed visual and audio features for emotion recognition. Finally, extensive experiments are conducted to evaluate the ICDKCFA approach on the AVEC 2016 Multimodal Affect Recognition Sub-Challenge dataset. The experimental results show that the ICDKCFA method has a higher speed than the original kernel cross factor analysis with the comparable performance. Moreover, the ICDKCFA method achieves a better performance than other common information fusion methods, such as the Canonical correlation analysis, kernel canonical correlation analysis and cross-modal factor analysis based fusion methods.

A Method for Deciding Permission of the ATM Using Face Detection (사용자 얼굴 검출을 이용한 ATM 사용 허가 판별 방법)

  • Lee, Jung-hwa;Kim, Tae-hyung;Cha, Eui-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.403-406
    • /
    • 2009
  • In this paper, we propose a method for deciding permission from the ATM(Automated Teller Machine) using face detection. First, we extract skin areas and make candidate face images from an input image, and then detect a face using Adaboost(Adaptive Boosting) algorithm. Next, proposed method executes a template matching for making a decision on whether to wear accessories like sunglasses or a mask in detected face image. Finally, this method decides whether to permit ATM service using this result. Experimental results show that proposed method performed well at indoors ATM environment for detecting whether to wear accessories.

  • PDF

Product Adoption Maximization Leveraging Social Influence and User Interest Mining

  • Ji, Ping;Huang, Hui;Liu, Xueliang;Hu, Xueyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2069-2085
    • /
    • 2021
  • A Social Networking Service (SNS) platform provides digital footprints to discover users' interests and track the social diffusion of product adoptions. How to identify a small set of seed users in a SNS who is potential to adopt a new promoting product with high probability, is a key question in social networks. Existing works approached this as a social influence maximization problem. However, these approaches relied heavily on text information for topic modeling and neglected the impact of seed users' relation in the model. To this end, in this paper, we first develop a general product adoption function integrating both users' interest and social influence, where the user interest model relies on historical user behavior and the seed users' evaluations without any text information. Accordingly, we formulate a product adoption maximization problem and prove NP-hardness of this problem. We then design an efficient algorithm to solve this problem. We further devise a method to automatically learn the parameter in the proposed adoption function from users' past behaviors. Finally, experimental results show the soundness of our proposed adoption decision function and the effectiveness of the proposed seed selection method for product adoption maximization.

A Countermeasure Resistant to Fault Attacks on CRT-RSA using Fault Infective Method (오류 확산 기법을 이용한 CRT-RSA 오류 주입 공격 대응 방안)

  • Ha, Jae-Cheol;Park, Jea-Hoon;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.75-84
    • /
    • 2008
  • Recently, the straightforward CRT-RSA was shown to be broken by fault attacks through many experimental results. In this paper, we analyze the fault attacks against CRT-RSA and their countermeasures, and then propose a new fault infective method resistant to the various fault attacks on CRT-RSA. In our CRT-RSA algorithm, if an error is injected in exponentiation with modulo p or q, then the error is spreaded by fault infective computation in CRT recombination operation. Our countermeasure doesn't have extra error detection procedure based on decision tests and doesn't use public parameter such as e. Also, the computational cost is effective compared to the previous secure countermeasures.

Condition assessment of bridge pier using constrained minimum variance unbiased estimator

  • Tamuly, Pranjal;Chakraborty, Arunasis;Das, Sandip
    • Structural Monitoring and Maintenance
    • /
    • v.7 no.4
    • /
    • pp.319-344
    • /
    • 2020
  • Inverse analysis of non-linear reinforced concrete bridge pier using recursive Gaussian filtering for in-situ condition assessment is the main theme of this work. For this purpose, minimum variance unbiased estimation using unscented sigma points is adopted here. The uniqueness of this inverse analysis lies in its approach for strain based updating of engineering demand parameters, where appropriate bound and constrained conditions are introduced to ensure numerical stability and convergence. In this analysis, seismic input is also identified, which is an added advantage for the structures having no dedicated sensors for earthquake measurement. First, the proposed strategy is tested with a simulated example whose hysteretic properties are obtained from the slow-cyclic test of a frame to investigate its efficiency and accuracy. Finally, the experimental test data of a full-scale bridge pier is used to study its in-situ condition in terms of Park & Ang damage index. Overall the study shows the ability of the augmented minimum variance unbiased estimation based recursive time-marching algorithm for non-linear system identification with the aim to estimate the engineering damage parameters that are the fundamental information necessary for any future decision making for retrofitting/rehabilitation.

An Intelligent Framework for Feature Detection and Health Recommendation System of Diseases

  • Mavaluru, Dinesh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.177-184
    • /
    • 2021
  • All over the world, people are affected by many chronic diseases and medical practitioners are working hard to find out the symptoms and remedies for the diseases. Many researchers focus on the feature detection of the disease and trying to get a better health recommendation system. It is necessary to detect the features automatically to provide the most relevant solution for the disease. This research gives the framework of Health Recommendation System (HRS) for identification of relevant and non-redundant features in the dataset for prediction and recommendation of diseases. This system consists of three phases such as Pre-processing, Feature Selection and Performance evaluation. It supports for handling of missing and noisy data using the proposed Imputation of missing data and noise detection based Pre-processing algorithm (IMDNDP). The selection of features from the pre-processed dataset is performed by proposed ensemble-based feature selection using an expert's knowledge (EFS-EK). It is very difficult to detect and monitor the diseases manually and also needs the expertise in the field so that process becomes time consuming. Finally, the prediction and recommendation can be done using Support Vector Machine (SVM) and rule-based approaches.

Real-Time Path Planning for Mobile Robots Using Q-Learning (Q-learning을 이용한 이동 로봇의 실시간 경로 계획)

  • Kim, Ho-Won;Lee, Won-Chang
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.991-997
    • /
    • 2020
  • Reinforcement learning has been applied mainly in sequential decision-making problems. Especially in recent years, reinforcement learning combined with neural networks has brought successful results in previously unsolved fields. However, reinforcement learning using deep neural networks has the disadvantage that it is too complex for immediate use in the field. In this paper, we implemented path planning algorithm for mobile robots using Q-learning, one of the easy-to-learn reinforcement learning algorithms. We used real-time Q-learning to update the Q-table in real-time since the Q-learning method of generating Q-tables in advance has obvious limitations. By adjusting the exploration strategy, we were able to obtain the learning speed required for real-time Q-learning. Finally, we compared the performance of real-time Q-learning and DQN.