• Title/Summary/Keyword: learning pattern

Search Result 1,293, Processing Time 0.029 seconds

Target Classification Algorithm Using Complex-valued Support Vector Machine (복소수 SVM을 이용한 목표물 식별 알고리즘)

  • Kang, Youn Joung;Lee, Jaeil;Bae, Jinho;Lee, Chong Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.182-188
    • /
    • 2013
  • In this paper, we propose a complex-valued support vector machine (SVM) classifier which process the complex valued signal measured by pulse doppler radar (PDR) to identify moving targets from the background. SVM is widely applied in the field of pattern recognition, but features which used to classify are almost real valued data. Proposed complex-valued SVM can classify the moving target using real valued data, imaginary valued data, and cross-information data. To design complex-valued SVM, we consider slack variables of real and complex axis, and use the KKT (Karush-Kuhn-Tucker) conditions for complex data. Also we apply radial basis function (RBF) as a kernel function which use a distance of complex values. To evaluate the performance of the complex-valued SVM, complex valued data from PDR were classified using real-valued SVM and complex-valued SVM. The proposed complex-valued SVM classification was improved compared to real-valued SVM for dog and human, respectively 8%, 10%, have been improved.

A Study on User Authentication with Smartphone Accelerometer Sensor (스마트폰 가속도 센서를 이용한 사용자 인증 방법 연구)

  • Seo, Jun-seok;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1477-1484
    • /
    • 2015
  • With the growth of financial industry with smartphone, interest on user authentication using smartphone has been arisen in these days. There are various type of biometric user authentication techniques, but gait recognition using accelerometer sensor in smartphone does not seem to develop remarkably. This paper suggests the method of user authentication using accelerometer sensor embedded in smartphone. Specifically, calibrate the sensor data from smartphone with 3D-transformation, extract features from transformed data and do principle component analysis, and learn model with using gaussian mixture model. Next, authenticate user data with confidence interval of GMM model. As result, proposed method is capable of user authentication with accelerometer sensor on smartphone as a high degree of accuracy(about 96%) even in the situation that environment control and limitation are minimum on the research.

Students' Experience and Changes in Perception Regarding Portfolio Based on Learning in Fourth Grade Science Classes (초등학교 4학년 과학 수업에서 학생들의 포트폴리오 학습 경험 및 인식 변화)

  • Kim, Chan-Jong;Im, In-Suk;Park, Young-Shin;Park, Hyun-Ju
    • Journal of Korean Elementary Science Education
    • /
    • v.26 no.4
    • /
    • pp.372-384
    • /
    • 2007
  • The purposes of this study was to analyze qualitatively changes in students' experience and perceptions in relation to studying science using portfolios and any resultant effects on the portfolio itself. Five fourth-grade elementary students from one small city participated in this study. Data was collected through interviews as well as through student portfolios containing the science content matter of two units over two weeks. Observational diaries recorded by a teacher were also used to test the reliability of data collection. All interviews with students were transcribed to develop a suitable network to categorize students' responses. Students' portfolios were analyzed in order to reveal their essential characteristics in combination with their teacher's observational diaries. The results were as follows. First, student perceptions of their portfolios were categorized into three different levels; superficial, extended, and moderate perceptions. The changes in perception could also be divided into three levels; consistent-superficial, unstable, and a progressive-extended pattern. Second, the experience of students with their portfolio were investigated in terms of the following; successfully completing the elements of the portfolio, development of evidence, interaction with peers, teachers, and parents, and the standards of evaluation used for the portfolios. Third, the perceptions and experience of working on the portfolio by students had a number of direct effects on the way in which students actually created and developed their portfolios. Finally, students with positive attitudes towards their portfolios actively participated in the portfolio experience and finally understood what it meant completely. However, students with negative attitudes regarding portfolio based work, did not leave the experience with any heightened awareness of the utility or indeed, purpose of portfolio based work.

  • PDF

On Robust Principal Component using Analysis Neural Networks (신경망을 이용한 로버스트 주성분 분석에 관한 연구)

  • Kim, Sang-Min;Oh, Kwang-Sik;Park, Hee-Joo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.7 no.1
    • /
    • pp.113-118
    • /
    • 1996
  • Principal component analysis(PCA) is an essential technique for data compression and feature extraction, and has been widely used in statistical data analysis, communication theory, pattern recognition, and image processing. Oja(1992) found that a linear neuron with constrained Hebbian learning rule can extract the principal component by using stochastic gradient ascent method. In practice real data often contain some outliers. These outliers will significantly deteriorate the performances of the PCA algorithms. In order to make PCA robust, Xu & Yuille(1995) applied statistical physics to the problem of robust principal component analysis(RPCA). Devlin et.al(1981) obtained principal components by using techniques such as M-estimation. The propose of this paper is to investigate from the statistical point of view how Xu & Yuille's(1995) RPCA works under the same simulation condition as in Devlin et.al(1981).

  • PDF

The System Dynamics Model for Assessment of Organizational and Human Factor in Nuclear Power Plant (시스템 다이나믹스를 활용한 원전 조직 및 인적인자 평가)

  • 안남성;곽상만;유재국
    • Proceedings of the Korean System Dynamics Society
    • /
    • 2002.02a
    • /
    • pp.19-40
    • /
    • 2002
  • The intent of this study is to develop system dynamics model for assessment of organizational and human factors in nuclear power plant which can contribute to secure the nuclear safety. Previous studies are classified into two major approaches. One is engineering approach such as ergonomics and probability safety assessment(PSA). The other is social science approach such like sociology, organization theory and psychology. Both have contributed to find organization and human factors and to present guideline to lessen human error in NPP. But, since these methodologies assume that relationship among factors is independent they don't explain the interactions among factors or variables in NPP. To overcome these limits, we have developed system dynamics model which can show cause and effect among factors and quantify organizational and human factors. The model we developed is composed of 16 functions of job process in nuclear power, and shows interactions among various factors which affects employees' productivity and job quality. Handling variables such like degree of leadership, adjustment of number of employee, and workload in each department, users can simulate various situations in nuclear power plant in the organization side. Through simulation, user can get insight to improve safety in plants and to find managerial tools in the organization and human side. Analyzing pattern of variables, users can get knowledge of their organization structure, and understand stands of other departments or employees. Ultimately they can build learning organization to secure optimal safety in nuclear power plant.

  • PDF

Real-time Identification of Skype Application Traffic using Behavior Analysis (동작형태 분석을 통한 Skype 응용 트래픽의 실시간 탐지 방법)

  • Lee, Sang-Woo;Lee, Hyun-Shin;Choi, Mi-Jung;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.131-140
    • /
    • 2011
  • As the number of Internet users and applications is increasing, the importance of application traffic classification is growing more and more for efficient network management. While a number of methods for traffic classification have been introduced, such as signature-based and machine learning-based methods, Skype application, which uses encrypted communication on its own P2P network, is known as one of the most difficult traffic to identify. In this paper we propose a novel method to identify Skype application traffic on the fly. The main idea is to setup a list of Skype host information {IP, port} by examining the packets generated in the Skype login process and utilizes the list to identify other Skype traffic. By implementing the identification system and deploying it on our campus network, we proved the performance and feasibility of the proposed method.

Rule-based and Probabilistic Event Recognition of Independent Objects for Interpretation of Emergency Scenarios (긴급 상황 시나리오 해석을 위한 독립 객체의 규칙 기반 및 확률적 이벤트 인식)

  • Lee, Jun-Cheol;Choi, Chang-Gyu
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.301-314
    • /
    • 2008
  • The existing event recognition is accomplished with the limited systematic foundation, and thus much longer learning time is needed for emergency scenario interpretation due to large scale of probability data. In this paper, we propose a method for nile-based event recognition of an independent object(human) which extract a feature vectors from the object and analyze the behavior pattern of each object and interpretation of emergency scenarios using a probability and object's events. The event rule of an independent object is composed of the Primary-event, Move-event, Interaction-event, and 'FALL DOWN' event and is defined through feature vectors of the object and the segmented motion orientated vector (SMOV) in which the dynamic Bayesian network is applied. The emergency scenario is analyzed using current state of an event and its post probability. In this paper, we define diversified events compared to that of pre-existing method and thus make it easy to expand by increasing independence of each events. Accordingly, semantics information, which is impossible to be gained through an.

  • PDF

An Analysis on the State of Adjustment on Mathematical Education for Adolescent North Korean Defectors (새터민 청소년의 수학학습 실태 및 적응 요인 분석)

  • Yeon, Bo-Ra;Kim, Hong-Chan
    • Journal of the Korean School Mathematics Society
    • /
    • v.15 no.3
    • /
    • pp.467-486
    • /
    • 2012
  • By identifying the state of adjustment regarding mathematical education for adolescents who escaped from North Korea and analyzing the relevant factors from multiple perspectives, this study is aimed at finding improvement methods for their math education adoptability. To fulfill such objective, this paper-reviewed the existing literature and research, conducted participatory observation, collected and analyzed survey research on math education adoptability for 43 students who are currently attending an alternative school for North Korean defectors. The results of this research are as follows: There is a serious pattern of maladjustment concerning math education of adolescents who defected from North Korea. The lack of basic skills in mathematical principles due to the gap in their studies results in poor academic performance, particularly in the advanced stages of learning. In the process of defection, environmental challenges, such as the loss of basic study skills which naturally results from the gap in their studies and differences in the educational curriculum between North and South Korea, are posing difficulties for these students.

  • PDF

Meaning of Co-existing with A.I. and Human in the Movie (영화 <그녀>를 통해 본 인공지능과 인간의 공존이 주는 의미)

  • Kim, Mi-Hye
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.636-644
    • /
    • 2016
  • The actress of the movie is an operating system called Samantha. She only has a voice in the movie. Theodore, the main actor writes letters for his clients. He got married Katherin after dating for years but they failed to maintain their relationship. It was hard for them to grow with distance. On the contrary, the learning OS doesn't have any fixed pattern and any limits, so it becomes the ideal partner for him. Since she was accessed by him, Samantha has expanded her ability rhizomatically. She could have sex with human and philosophical debates with a departed philosopher. While they have relationship, Theodore experiences the expansion of his conscience. Love cannot be confined in a small box. After realizing how to love people around him, he sends a love letter to Katherine with all his heart. The meaning of co-existing with A.I. and human is to have a chance to introspect our inner side of mind more deeply.

A study on technology diffusion trend considering technological performance enhancement and economics : case of technology evolution of 32nm, 22nm, 14nm logic semiconductors (기술적 성능향상 및 경제성을 고려한 기술 확산(Technology Diffusion) 추세에 대한 연구 : 32nm, 22nm, 14nm 로직 반도체의 기술진화 사례)

  • Park, Changhyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.177-184
    • /
    • 2017
  • Understanding trends and drivers of technology diffusion is imperative to forecast new technology adoption and understand the process of technological innovation. Our research utilizes a quantitative trend analysis considering both technological and economic indicators for trends and drivers of technology diffusion for 32nm, 22nm, and 14nm logic semiconductor technology. In terms of technological performance, the technology diffusion curve showed an S-curve pattern during the stages of maturity and decline, and the diffusion curve showed evidence supporting the learning curve. The diffusion curve showed the life cycle duration of 2 years, and the rate of technological performance and obsolescence are observed quantitatively between generations. Architectural innovation is affected by technological drivers more significantly than economic drivers. This research has implications as empirical research on the trends and drivers of technology diffusion in the high-tech semiconductor industry, and is meaningful in forecasting new technology adoption or build technology strategy.