• Title/Summary/Keyword: support vector machine(SVM)

Search Result 1,254, Processing Time 0.04 seconds

Predicting the compressive strength of SCC containing nano silica using surrogate machine learning algorithms

  • Neeraj Kumar Shukla;Aman Garg;Javed Bhutto;Mona Aggarwal;Mohamed Abbas;Hany S. Hussein;Rajesh Verma;T.M. Yunus Khan
    • Computers and Concrete
    • /
    • v.32 no.4
    • /
    • pp.373-381
    • /
    • 2023
  • Fly ash, granulated blast furnace slag, marble waste powder, etc. are just some of the by-products of other sectors that the construction industry is looking to include into the many types of concrete they produce. This research seeks to use surrogate machine learning methods to forecast the compressive strength of self-compacting concrete. The surrogate models were developed using Gradient Boosting Machine (GBM), Support Vector Machine (SVM), Random Forest (RF), and Gaussian Process Regression (GPR) techniques. Compressive strength is used as the output variable, with nano silica content, cement content, coarse aggregate content, fine aggregate content, superplasticizer, curing duration, and water-binder ratio as input variables. Of the four models, GBM had the highest accuracy in determining the compressive strength of SCC. The concrete's compressive strength is worst predicted by GPR. Compressive strength of SCC with nano silica is found to be most affected by curing time and least by fine aggregate.

Risk Assessment of Pine Tree Dieback in Sogwang-Ri, Uljin (울진 소광리 금강소나무 고사발생 특성 분석 및 위험지역 평가)

  • Kim, Eun-Sook;Lee, Bora;Kim, Jaebeom;Cho, Nanghyun;Lim, Jong-Hwan
    • Journal of Korean Society of Forest Science
    • /
    • v.109 no.3
    • /
    • pp.259-270
    • /
    • 2020
  • Extreme weather events, such as heat and drought, have occurred frequently over the past two decades. This has led to continuous reports of cases of forest damage due to physiological stress, not pest damage. In 2014, pine trees were collectively damaged in the forest genetic resources reserve of Sogwang-ri, Uljin, South Korea. An investigation was launched to determine the causes of the dieback, so that a forest management plan could be prepared to deal with the current dieback, and to prevent future damage. This study aimedto 1) understand the topographic and structural characteristics of the area which experienced pine tree dieback, 2) identify the main causes of the dieback, and 3) predict future risk areas through the use of machine-learning techniques. A model for identifying risk areas was developed using 14 explanatory variables, including location, elevation, slope, and age class. When three machine-learning techniques-Decision Tree, Random Forest (RF), and Support Vector Machine (SVM) were applied to the model, RF and SVM showed higher predictability scores, with accuracies over 93%. Our analysis of the variable set showed that the topographical areas most vulnerable to pine dieback were those with high altitudes, high daily solar radiation, and limited water availability. We also found that, when it came to forest stand characteristics, pine trees with high vertical stand densities (5-15 m high) and higher age classes experienced a higher risk of dieback. The RF and SVM models predicted that 9.5% or 115 ha of the Geumgang Pine Forest are at high risk for pine dieback. Our study suggests the need for further investigation into the vulnerable areas of the Geumgang Pine Forest, and also for climate change adaptive forest management steps to protect those areas which remain undamaged.

People Tracking and Accompanying Algorithm for Mobile Robot Using Kinect Sensor and Extended Kalman Filter (키넥트센서와 확장칼만필터를 이용한 이동로봇의 사람추적 및 사람과의 동반주행)

  • Park, Kyoung Jae;Won, Mooncheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.4
    • /
    • pp.345-354
    • /
    • 2014
  • In this paper, we propose a real-time algorithm for estimating the relative position and velocity of a person with respect to a robot using a Kinect sensor and an extended Kalman filter (EKF). Additionally, we propose an algorithm for controlling the robot in the proximity of a person in a variety of modes. The algorithm detects the head and shoulder regions of the person using a histogram of oriented gradients (HOG) and a support vector machine (SVM). The EKF algorithm estimates the relative positions and velocities of the person with respect to the robot using data acquired by a Kinect sensor. We tested the various modes of proximity movement for a human in indoor situations. The accuracy of the algorithm was verified using a motion capture system.

A Study on Automatic Text Categorization of Web-Based Query Using Synonymy List (유사어 사전을 이용한 웹기반 질의문의 자동 범주화에 관한 연구)

  • Nam, Young-Joon;Kim, Gyu-Hwan
    • Journal of Information Management
    • /
    • v.35 no.4
    • /
    • pp.81-105
    • /
    • 2004
  • In this study, the way of the automatic text categorization on web-based query was implemented. X2 methods based on the Supported Vector Machine were used to test the efficiency of text categorization on queries. This test is carried out by the model using the Synonymy List. 713 synonyms were extracted manually from the tested documents. As the result of this test, the precision ratio and the recall ratio were decreased by -0.01% and by 8.53%, respectively whether the synonyms were assigned or not. It also shows that the Value of F1 Measure was increased by 4.58%. The standard deviation between the recall and precision ratio was improve by 18.39%.

Development and Application of Convergence Education about Support Vector Machine for Elementary Learners (초등 학습자를 위한 서포트 벡터 머신 융합 교육 프로그램의 개발과 적용)

  • Yuri Hwang;Namje Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.95-103
    • /
    • 2023
  • This paper proposes an artificial intelligence convergence education program for teaching the main concept and principle of Support Vector Machines(SVM) at elementary schools. The developed program, based on Jeju's natural environment theme, explains the decision boundary and margin of SVM by vertical and parallel from 4th grade mathematics curriculum. As a result of applying the developed program to 3rd and 5th graders, most students intuitively inferred the location of the decision boundary. The overall performance accuracy and rate of reasonable inference of 5th graders were higher. However, in the self-evaluation of understanding, the average value was higher in the 3rd grade, contrary to the actual understanding. This was due to the fact that junior learners had a greater tendency to feel satisfaction and achievement. On the other hand, senior learners presented more meaningful post-class questions based on their motivation for further exploration. We would like to find effective ways for artificial intelligence convergence education for elementary school students.

A TRUS Prostate Segmentation using Gabor Texture Features and Snake-like Contour

  • Kim, Sung Gyun;Seo, Yeong Geon
    • Journal of Information Processing Systems
    • /
    • v.9 no.1
    • /
    • pp.103-116
    • /
    • 2013
  • Prostate cancer is one of the most frequent cancers in men and is a major cause of mortality in the most of countries. In many diagnostic and treatment procedures for prostate disease accurate detection of prostate boundaries in transrectal ultrasound(TRUS) images is required. This is a challenging and difficult task due to weak prostate boundaries, speckle noise and the short range of gray levels. In this paper a method for automatic prostate segmentation in TRUS images using Gabor feature extraction and snake-like contour is presented. This method involves preprocessing, extracting Gabor feature, training, and prostate segmentation. The speckle reduction for preprocessing step has been achieved by using stick filter and top-hat transform has been implemented for smoothing the contour. A Gabor filter bank for extraction of rotation-invariant texture features has been implemented. A support vector machine(SVM) for training step has been used to get each feature of prostate and nonprostate. Finally, the boundary of prostate is extracted by the snake-like contour algorithm. A number of experiments are conducted to validate this method and results showed that this new algorithm extracted the prostate boundary with less than 10.2% of the accuracy which is relative to boundary provided manually by experts.

Intrusion Detection Using Log Server and Support Vector Machines

  • Donghai Guan;Donggyu Yeo;Lee, Juwan;Dukwhan Oh
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.682-684
    • /
    • 2003
  • With the explosive rapid expansion of computer using during the past few years, security has become a crucial issue for modem computer systems. Today, there are many intrusion detection systems (IDS) on the Internet. A variety of intrusion detection techniques and tools exist in the computer security community such as enterprise security management system (ESM) and system integrity checking tools. However, there is a potential problem involved with intrusion detection systems that are installed locally on the machines to be monitored. If the system being monitored is compromised, it is quite likely that the intruder will after the system logs and the intrusion logs while the intrusion remains undetected. In this project KIT-I, we adopt remote logging server (RLS) mechanism, which is used to backup the log files to the server. Taking into account security, we make use of the function of SSL of Java and certificate authority (CA) based key management. Furthermore, Support Vector Machine (SVM) is applied in our project to detect the intrusion activities.

  • PDF

Color Image Splicing Detection using Benford's Law and color Difference (밴포드 법칙과 색차를 이용한 컬러 영상 접합 검출)

  • Moon, Sang-Hwan;Han, Jong-Goo;Moon, Yong-Ho;Eom, Il-Kyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.160-167
    • /
    • 2014
  • This paper presents a spliced color image detection method using Benford' Law and color difference. For a suspicious image, after color conversion, the discrete wavelet transform and the discrete cosine transform are performed. We extract the difference between the ideal Benford distribution and the empirical Benford distribution of the suspicious image as features. The difference between Benford distributions for each color component were also used as features. Our method shows superior splicing detection performance using only 13 features. After training the extracted feature vector using SVM classifier, we determine whether the presence of the image splicing forgery. Experimental results show that the proposed method outperforms the existing methods with smaller number of features in terms of splicing detection accuracy.

A Hybrid Under-sampling Approach for Better Bankruptcy Prediction (부도예측 개선을 위한 하이브리드 언더샘플링 접근법)

  • Kim, Taehoon;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.173-190
    • /
    • 2015
  • The purpose of this study is to improve bankruptcy prediction models by using a novel hybrid under-sampling approach. Most prior studies have tried to enhance the accuracy of bankruptcy prediction models by improving the classification methods involved. In contrast, we focus on appropriate data preprocessing as a means of enhancing accuracy. In particular, we aim to develop an effective sampling approach for bankruptcy prediction, since most prediction models suffer from class imbalance problems. The approach proposed in this study is a hybrid under-sampling method that combines the k-Reverse Nearest Neighbor (k-RNN) and one-class support vector machine (OCSVM) approaches. k-RNN can effectively eliminate outliers, while OCSVM contributes to the selection of informative training samples from majority class data. To validate our proposed approach, we have applied it to data from H Bank's non-external auditing companies in Korea, and compared the performances of the classifiers with the proposed under-sampling and random sampling data. The empirical results show that the proposed under-sampling approach generally improves the accuracy of classifiers, such as logistic regression, discriminant analysis, decision tree, and support vector machines. They also show that the proposed under-sampling approach reduces the risk of false negative errors, which lead to higher misclassification costs.

A Study on Performance of ML Algorithms and Feature Extraction to detect Malware (멀웨어 검출을 위한 기계학습 알고리즘과 특징 추출에 대한 성능연구)

  • Ahn, Tae-Hyun;Park, Jae-Gyun;Kwon, Young-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.211-216
    • /
    • 2018
  • In this paper, we studied the way that classify whether unknown PE file is malware or not. In the classification problem of malware detection domain, feature extraction and classifier are important. For that purpose, we studied what the feature is good for classifier and the which classifier is good for the selected feature. So, we try to find the good combination of feature and classifier for detecting malware. For it, we did experiments at two step. In step one, we compared the accuracy of features using Opcode only, Win. API only, the one with both. We founded that the feature, Opcode and Win. API, is better than others. In step two, we compared AUC value of classifiers, Bernoulli Naïve Bayes, K-nearest neighbor, Support Vector Machine and Decision Tree. We founded that Decision Tree is better than others.