• Title/Summary/Keyword: 문자패턴

Search Result 297, Processing Time 0.027 seconds

A Hybrid RBF Network based on Fuzzy Dynamic Learning Rate Control (퍼지 동적 학습률 제어 기반 하이브리드 RBF 네트워크)

  • Kim, Kwang-Baek;Park, Choong-Shik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.33-38
    • /
    • 2014
  • The FCM based hybrid RBF network is a heterogeneous learning network model that applies FCM algorithm between input and middle layer and applies Max_Min algorithm between middle layer and output. The Max-Min neural network uses winner nodes of the middle layer as input but shows inefficient learning in performance when the input vector consists of too many patterns. To overcome this problem, we propose a dynamic learning rate control based on fuzzy logic. The proposed method first classifies accurate/inaccurate class with respect to the difference between target value and output value with threshold and then fuzzy membership function and fuzzy decision logic is designed to control the learning rate dynamically. We apply this proposed RBF network to the character recognition problem and the efficacy of the proposed method is verified in the experiment.

A Study on the Recognition of Car Plate using an Enhanced Fuzzy ART Algorithm (개선된 퍼지 ART 알고리즘을 이용한 차량 번호판 인식에 관한 연구)

  • 임은경;김광백
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.5
    • /
    • pp.433-444
    • /
    • 2000
  • The recognition of car plate was investigated by means of the enhanced fuzzy ART algorithm. The morphological information of horizontal and vertical edges was used to extract a plate area from a car image. In addition, the contour tracking algorithm by utilizing the SOFM was applied to extract the specific area which includes characters from an extracted plate area. The extracted characteristic area was recognized by using the enhanced fuzzy ART algorithm. In this study we propose the novel fuzzy ART algorithm different from the conventional fuzzy ART algorithm by the dynamical establishment of the vigilance threshold which shows a tolerance limit of unbalance between voluntary and saved patterns for clustering. The extraction rate obtained by using the morphological information of horizontal and vertical edges showed better results than that from the color information of RGB and HSI. Furthermore, the recognition rate of the enhanced fuzzy ART algorithm was improved much more than that of the conventional fuzzy ART and SOFM algorithms.

  • PDF

English Bible Text Visualization Using Word Clouds and Dynamic Graphics Technology (단어 구름과 동적 그래픽스 기법을 이용한 영어성경 텍스트 시각화)

  • Jang, Dae-Heung
    • The Korean Journal of Applied Statistics
    • /
    • v.27 no.3
    • /
    • pp.373-386
    • /
    • 2014
  • A word cloud is a visualization of word frequency in a given text. The importance of each word is shown in font size or color. This plot is useful for quickly perceiving the most prominent words and for locating a word alphabetically to determine its relative prominence. With dynamic graphics, we can find the changing pattern of prominent words and their frequencies according to the changing selection of chapters in a given text. We can define the word frequency matrix. In this matrix, rows are chapters in text and columns are ranks corresponding to word frequency about the words in the text. We can draw the word frequency matrix plot with this matrix. Dynamic graphic can indicate the changing pattern of the word frequency matrix according to the changing selection of the range of ranks of words. We execute an English Bible text visualization using word clouds and dynamic graphics technology.

A Method for Spam Message Filtering Based on Lifelong Machine Learning (Lifelong Machine Learning 기반 스팸 메시지 필터링 방법)

  • Ahn, Yeon-Sun;Jeong, Ok-Ran
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1393-1399
    • /
    • 2019
  • With the rapid growth of the Internet, millions of indiscriminate advertising SMS are sent every day because of the convenience of sending and receiving data. Although we still use methods to block spam words manually, we have been actively researching how to filter spam in a various ways as machine learning emerged. However, spam words and patterns are constantly changing to avoid being filtered, so existing machine learning mechanisms cannot detect or adapt to new words and patterns. Recently, the concept of Lifelong Learning emerged to overcome these limitations, using existing knowledge to keep learning new knowledge continuously. In this paper, we propose a method of spam filtering system using ensemble techniques of naive bayesian which is most commonly used in document classification and LLML(Lifelong Machine Learning). We validate the performance of lifelong learning by applying the model ELLA and the Naive Bayes most commonly used in existing spam filters.

Development of a Smart Application for Protecting Dementia Patients (치매환자의 보호를 위한 스마트 앱 개발)

  • Hwang, Hyun Suk;Ko, Yun Seong;Ban, Ga Un;Kim, Chang Soo
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.9
    • /
    • pp.1089-1097
    • /
    • 2013
  • The applications for considering their position and daily patterns of dementia patients have been developed in an early stage even if the older patients who have weaker or serious symptoms has increased in various forms. In this paper, we develop an android-based application which displays positions and pathways of patients on maps and provide messages in the cases of dangerous situations. Guardians need to register schedules including safe areas and personal information of their patients. This system registers behavior status categorized as normal or abnormal each position which is sent to a database. In particular, the deviation status is assigned in case the patients are not within the safe areas that their guardians registered on their schedule. The wandering status is assigned in case the patients are repeatedly passed by their pathways. This smart application contains the modules such as patient position sending, guardian and patient information, patient schedule and safe zone registration, position and behavior status registration, pathway display and message sending, and rescue request. This system sends the notification and alarm service providing normal and abnormal behavior with deviation and wandering status of patients respectively.

A Data Embedding Technique for Image Watermarking using Fresnel Transform (이미지 워터마킹을 위한 Fresnel 변환을 이용한 데이타 삽입 기법)

  • Seok Kang;Yoshinao Aoki
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.70-76
    • /
    • 2003
  • Digital watermarking is a technique embedding hidden information into multimedia data imperceptibly such as images and sounds. Generally an original image is transformed and coded watermark data is embedded in frequency domain watermarking models. In this paper, We propose a new data embedding method using Fresnel transform. A watermark image is fresnel-transformed and the intensity of transformed pattern is embedded into original image. Our watermarking model has the flexibility In data embedding. It is possible to get many embedding patterns from a single watermark image by using various distance parameters with Fresnel transform. All kinds of image models such af shape, letter and photo ran be used as a watermark data. The watermarking experiments were conducted to show the validity of the proposed method, and the results show that our method has the robustness against lossy compression, filtering and geometric transformation.

Inference of Context-Free Grammars using Binary Third-order Recurrent Neural Networks with Genetic Algorithm (이진 삼차 재귀 신경망과 유전자 알고리즘을 이용한 문맥-자유 문법의 추론)

  • Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.11-25
    • /
    • 2012
  • We present the method to infer Context-Free Grammars by applying genetic algorithm to the Binary Third-order Recurrent Neural Networks(BTRNN). BTRNN is a multiple-layered architecture of recurrent neural networks, each of which is corresponding to an input symbol, and is combined with external stack. All parameters of BTRNN are represented as binary numbers and each state transition is performed with any stack operation simultaneously. We apply Genetic Algorithm to BTRNN chromosomes and obtain the optimal BTRNN inferring context-free grammar of positive and negative input patterns. This proposed method infers BTRNN, which includes the number of its states equal to or less than those of existing methods of Discrete Recurrent Neural Networks, with less examples and less learning trials. Also BTRNN is superior to the recent method of chromosomes representing grammars at recognition time complexity because of performing deterministic state transitions and stack operations at parsing process. If the number of non-terminals is p, the number of terminals q, the length of an input string k, and the max number of BTRNN states m, the parallel processing time is O(k) and the sequential processing time is O(km).

Toward a Possibility of the Unified Model of Cognition (통합적 인지 모형의 가능성)

  • Rhee Young-Eui
    • Journal of Science and Technology Studies
    • /
    • v.1 no.2 s.2
    • /
    • pp.399-422
    • /
    • 2001
  • Models for human cognition currently discussed in cognitive science cannot be appropriate ones. The symbolic model of the traditional artificial intelligence works for reasoning and problem-solving tasks, but doesn't fit for pattern recognition such as letter/sound cognition. Connectionism shows the contrary phenomena to those of the traditional artificial intelligence. Connectionist systems has been shown to be very strong in the tasks of pattern recognition but weak in most of logical tasks. Brooks' situated action theory denies the. notion of representation which is presupposed in both the traditional artificial intelligence and connectionism and suggests a subsumption model which is based on perceptions coming from real world. However, situated action theory hasn't also been well applied to human cognition so far. In emphasizing those characteristics of models I refer those models 'left-brain model', 'right-brain model', and 'robot model' respectively. After I examine those models in terms of substantial items of cognitions- mental state, mental procedure, basic element of cognition, rule of cognition, appropriate level of analysis, architecture of cognition, I draw three arguments of embodiment. I suggest a way of unifying those existing models by examining their theoretical compatability which is found in those arguments.

  • PDF

Development of gap filling technique for statistical downscaling of cimate change scenario data (기후변화 시나리오 자료의 통계적 상세화를 위한 결측자료 보정 기법 개발)

  • Cho, Jaepil;Kim, Kwang-Hyung;Park, Jihoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.16-16
    • /
    • 2019
  • 기후변화 시나리오 및 계절예측 자료를 포함한 기후정보를 수자원 분야에 활용하기 위해서는 기후정보의 시 공간적인 상세화(donwscaling)을 필요로 한다. 상세화의 경우 역학적 상세화와 통계학적 상세화로 구분될 수 있으며, 통계학적 상세화를 위해서는 대상 지역의 기후특성을 대표할 수 있는 장기 관측 자료의 확보가 중요하다. 국내의 경우에는 자동기상관측장비(Automatic Weather System, AWS)와 종관기상관측장비(Automatic Synoptic Observation System, ASOS)로 부터 수집된 기상관측자료를 사용할 수 있으나 기후변화 시나리오의 통계적 상세화를 위해서는 30년 이상의 자료 기간을 포함하는 ASOS 자료가 적합하다. 하지만 개발도상국과 같이 기상관측기반이 열악한 지역에서는 잦은 결측 등으로 인하여 품질이 좋은 관측자료의 획득이 어려운 상황이다. 따라서 본 연구에서는 측이 포함된 장기 기상관측 자료로부터 대상 지역의 기후특성을 재현할 수 있도록 기본적인 QC(Quality Control)을 거쳐 결측 자료를 보완할 수 있는 기법 및 R 기반패키지를 개발하여 적용성을 평가하였다. 개발된 기법의 적용성 평가를 위해서 기상청에서 QC를 통해 제공하고 있는 60개 ASOS 지점의 관측자료 중 강수량과 기온 변수를 사용하였다. 최대 50%까지의 현실적인 결측 패턴을 임의로 생성하기 위해 실제 개발도상국 관측자료의 일단위 결측 패턴을 이용하였다. 자료의 QC는 관측일 누락/중복 및 문자형 관측값 등 기본적인 오류 검사, 기온의 경우 물리적 허용 범위에 대한 검사, 최고기온과 최저기온의 비교 및 계측기 오작동에 의한 동일한 값의 반복 등을 포함한 내적 일치성 검사를 우선적으로 수행한다. 이후 결측값에 대해서 인근 기상관측소와의 상관성 분석 결과를 기반으로 결측값을 채우고, 최종적으로는 다양한 위성자료 및 재분석 자료 중에서 일단위 기후특성의 재현성 평가를 통해 선정된 격자형 자료와의 상관성 분석 결과를 기반으로 결측값을 보정하였다. 기온의 경우는 결측률이 높더라도 월평균 기후특성에 큰 영향을 미치지 않았지만 강수의 경우에는 5% 이상의 결측이 발생하는 경우 월평균 강수량에 영향을 미쳐 지역의 강수량을 과소 추정하는 결과를 보였다. 개발된 QC 기법을 강수 자료에 적용한 결과 월평균 기후특성을 잘 복원하는 결과를 보였지만, 일단위 강우 사상의 재현에 있어서는 미흡한 결과를 보였다.

  • PDF

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.