• Title/Summary/Keyword: 분류트리

Search Result 435, Processing Time 0.028 seconds

Cause Analysis and Development of Root Cause Analysis Map using Data of Chemical Laboratory Accidents (화학실험실 사고 Data를 이용한 근본원인분석 Map 개발 및 원인 분석)

  • Lee, Su-Kyung;Yoon, Yeo-Song;Eom, Seok Hwa
    • Journal of the Korean Institute of Gas
    • /
    • v.18 no.4
    • /
    • pp.86-94
    • /
    • 2014
  • To develop a Root Cause Analysis Map which determines the cause of the accident in chemical laboratory, The Root Cause Analysis(RCA) Map for the laboratory areas was sketched from Phase 1 of the accident element to Phase 3 of the accident element, based on the RCA Map which is applied in the petrochemical industry. On the basis of laboratory RCA Map which was classified by using such method. The root causes of the 211 accident cases in laboratories were classified from Phase 4 to Phase 5 by the Cause Factor Charting technique and The cause of the accident data were inputted to EXCEL program. After that, The causes of the accident data were sorted and classified by type and each step. So 'Approximate Primary RCA Map Draft' was written. In addition, it was reaffirmed whether the root causes of 211 accidents of laboratory were appropriate to 'Primary RCA Map Draft'. By complementing the cause which was expected to cause future accidents, the RCA Map for chemical laboratories was developed. Based on 'RCA Map' proposed in this study, the causes of accidents were analysed management systems 35%, monitoring 12.2%, Human Factor Eng. 15.1% and education training 12.1% by the size of the frequency from Phase 1 to Phase 5.

A Design Solution for a Railway Switch Monitoring System (분기기 진단 시스템 설계에 관한 연구)

  • Choo, Eun-Sang;Kim, Min-Seong;Yoo, Heung-Yeol;Mo, Choong-Seon;Son, Eui-Sik;Park, Seongguen;Lee, Jong-Woo
    • Journal of the Korean Society for Railway
    • /
    • v.18 no.5
    • /
    • pp.439-446
    • /
    • 2015
  • The turnout system, which determines the direction of the train, is not only a key system but also a vulnerable system. Failure of this system may lead to a delay of the train or even casualties. In this light, it is necessary to precisely the conditions of the turnout system. Currently, ROADMASTER of Germany is used as a diagnostic system in Korea. However, a new diagnostic system should be developed for optimized operation of the turnout system with maintenance that is suitable for the Korean railway environment. In this paper, a Fault Tree Analysis for the representative faults of the turnout system is conducted and physical quantities, which can be the cause of the fault, are classified according to the component and function. Also, the measuring factors for the monitoring are derived and a decision making theory is suggested. On the basis of the results, we propose a new turnout diagnostic system that can provide more driverse and precise information than the conventional system.

Wavelet Image Coding according to the Activity Regions (활성 영역에 따른 웨이브렛 영상 부호화)

  • Park, Jeong-Ho;Kim, Dae-Jung;Gwak, Hun-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.2
    • /
    • pp.30-38
    • /
    • 2002
  • In this paper, we propose a new method for image coding which efficiently use the relationship between the properties of spatial image and its wavelet transform. Firstly, an original image is decomposed into several layers by the wavelet transform, and simultaneously decomposed into 2$^n$$\times$2$^n$blocks. Each block is classified into two regions according to their standard deviation, i.e., low activity region(LAR) and high activity region(HAR). The region with low frequency in spatial domain does not only appears as zero regions in wavelet frequency domain like HL, LH, and HH but also gives little influence to the quality of reconstructed image. The other side, the high frequency regions are related to significant coefficients which gives much influence to image reconstruction. In this paper, we propose a image coding method to obtain high compression rate at low bit rate by these properties. The LAR region is encoded by LAR coding method which is proposed in this paper, the HAR by a technique similar to bitplane coding in hierarchical tree. Simulation results show that th,$\boxUl$ proposed coding method has better performance than EZW and SPIHT schemes in terms of image quality and transmitted bit rates, can be successfully applied to the application areas that require of progressive transmission.

Classification Tree Analysis to Assess Contributing Factors Influencing Biosecurity Level on Farrow-to-Finish Pig Farms in Korea (분류 트리 기법을 이용한 국내 일괄사육 양돈장의 차단방역 수준에 영향을 미치는 기여 요인 평가)

  • Kim, Kyu-Wook;Pak, Son-Il
    • Journal of Veterinary Clinics
    • /
    • v.33 no.2
    • /
    • pp.107-112
    • /
    • 2016
  • The objective of this study was to determine potential contributing factors associated with biosecurity level of farrow-to-finish pig farms and to develop a classification tree model to explore how these factors related to each other based on prediction model. To this end, the author analyzed data (n = 193) extracted from a cross-sectional study of 344 farrow-to-finish farms which was conducted between March and September 2014 aimed to explore swine disease status at farm level. Standardized questionnaires with information about basic demographical data and management practices were collected in each farm by on-site visit of trained veterinarians. For the classification of the data sets regarding biosecurity level as a dependent variable and predictor variables, Chi-squared Automatic Interaction Detection (CHAID) algorithm was applied for modeling classification tree. The statistics of misclassification risk was used to evaluate the fitness of the model in terms of prediction results. Categorical multivariate input data (40 variables) was used to construct a classification tree, and the target variable was biosecurity level dichotomized into low versus high. In general, the level of biosecurity was lower in the majority of farms studied, mainly due to the limited implementation of on-farm basic biosecurity measures aimed at controlling the potential introduction and transmission of swine diseases. The CHAID model illustrated the relative importance of significant predictors in explaining the level of biosecurity; maintenance of medical records of treatment and vaccination, use of dedicated clothing to enter the farm, installing fence surrounding the farm perimeter, and periodic monitoring of the herd using written biosecurity plan in place. The misclassification risk estimate of the prediction model was 0.145 with the standard error of 0.025, indicating that 85.5% of the cases could be classified correctly by using the decision rule based on the current tree. Although CHAID approach could provide detailed information and insight about interactions among factors associated with biosecurity level, further evaluation of potential bias intervened in the course of data collection should be included in future studies. In addition, there is still need to validate findings through the external dataset with larger sample size to improve the external validity of the current model.

Using Text-mining Method to Identify Research Trends of Freshwater Exotic Species in Korea (텍스트마이닝 (text-mining) 기법을 이용한 국내 담수외래종 연구동향 파악)

  • Do, Yuno;Ko, Eui-Jeong;Kim, Young-Min;Kim, Hyo-Gyeom;Joo, Gea-Jae;Kim, Ji Yoon;Kim, Hyun-Woo
    • Korean Journal of Ecology and Environment
    • /
    • v.48 no.3
    • /
    • pp.195-202
    • /
    • 2015
  • We identified research trends for freshwater exotic species in South Korea using text mining methods in conjunction with bibliometric analysis. We searched scientific and common names of freshwater exotic species as searching keywords including 1 mammal species, 3 amphibian-reptile species, 11 fish species, 2 aquatic plant species. A total of 245 articles including research articles and abstracts of conference proceedings published by 56 academic societies and institutes were collected from scientific article databases. The search keywords used were the common names for the exotic species. The $20^{th}$ century (1900's) saw the number of articles increase; however, during the early $21^{st}$ century (2000's) the number of published articles decreased slowly. The number of articles focusing on physiological and embryological research was significantly greater than taxonomic and ecological studies. Rainbow trout and Nile tilapia were the main research topic, specifically physiological and embryological research associated with the aquaculture of these species. Ecological studies were only conducted on the distribution and effect of large-mouth bass and nutria. The ecological risk associated with freshwater exotic species has been expressed yet the scientific information might be insufficient to remove doubt about ecological issues as expressed by interested by individuals and policy makers due to bias in research topics with respect to freshwater exotic species. The research topics of freshwater exotic species would have to diversify to effectively manage freshwater exotic species.

3D Building Modeling Using Aerial LiDAR Data (항공 LiDAR 데이터를 이용한 3차원 건물모델링)

  • Cho, Hong-Beom;Cho, Woo-Sug;Park, Jun-Ku;Song, Nak-Hyun
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.2
    • /
    • pp.141-152
    • /
    • 2008
  • The 3D building modeling is one of crucial components in constructing 3D geospatial information. The existing methods for 3D building modeling depend mainly on manual photogrammetric processes, which indeed take great amount of time and efforts. In recent years, many researches on 3D building modeling using aerial LiDAR data have been actively performed to aim at overcoming the limitations of existing 3D building modeling methods. Either techniques with interpolated grid data or data fusion with digital map and images have been investigated in most of existing researches on 3D building modeling with aerial LiDAR data. The paper proposed a method of 3D building modeling with LiDAR data only. Firstly, octree-based segmentation is applied recursively to LiDAR data classified as buildings in 3D space until there are no more LiDAR points to be segmented. Once octree-based segmentation is completed, each segmented patch is thereafter merged together based on its geometric spatial characteristics. Secondly, building model components are created with merged patches. Finally, a 3D building model is generated and composed with building model components. The experimental results with real LiDAR data showed that the proposed method was capable of modeling various types of 3D buildings.

Sleep Deprivation Attack Detection Based on Clustering in Wireless Sensor Network (무선 센서 네트워크에서 클러스터링 기반 Sleep Deprivation Attack 탐지 모델)

  • Kim, Suk-young;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.83-97
    • /
    • 2021
  • Wireless sensors that make up the Wireless Sensor Network generally have extremely limited power and resources. The wireless sensor enters the sleep state at a certain interval to conserve power. The Sleep deflation attack is a deadly attack that consumes power by preventing wireless sensors from entering the sleep state, but there is no clear countermeasure. Thus, in this paper, using clustering-based binary search tree structure, the Sleep deprivation attack detection model is proposed. The model proposed in this paper utilizes one of the characteristics of both attack sensor nodes and normal sensor nodes which were classified using machine learning. The characteristics used for detection were determined using Long Short-Term Memory, Decision Tree, Support Vector Machine, and K-Nearest Neighbor. Thresholds for judging attack sensor nodes were then learned by applying the SVM. The determined features were used in the proposed algorithm to calculate the values for attack detection, and the threshold for determining the calculated values was derived by applying SVM.Through experiments, the detection model proposed showed a detection rate of 94% when 35% of the total sensor nodes were attack sensor nodes and improvement of up to 26% in power retention.

Comparative analysis of Machine-Learning Based Models for Metal Surface Defect Detection (머신러닝 기반 금속외관 결함 검출 비교 분석)

  • Lee, Se-Hun;Kang, Seong-Hwan;Shin, Yo-Seob;Choi, Oh-Kyu;Kim, Sijong;Kang, Jae-Mo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.834-841
    • /
    • 2022
  • Recently, applying artificial intelligence technologies in various fields of production has drawn an upsurge of research interest due to the increase for smart factory and artificial intelligence technologies. A great deal of effort is being made to introduce artificial intelligence algorithms into the defect detection task. Particularly, detection of defects on the surface of metal has a higher level of research interest compared to other materials (wood, plastics, fibers, etc.). In this paper, we compare and analyze the speed and performance of defect classification by combining machine learning techniques (Support Vector Machine, Softmax Regression, Decision Tree) with dimensionality reduction algorithms (Principal Component Analysis, AutoEncoders) and two convolutional neural networks (proposed method, ResNet). To validate and compare the performance and speed of the algorithms, we have adopted two datasets ((i) public dataset, (ii) actual dataset), and on the basis of the results, the most efficient algorithm is determined.

A Study of Influencing Factors on World Handball Win-Loss using the Decision Tree Analysis (의사결정나무 분석을 통한 세계핸드볼 승패결정요인 분석)

  • Kim, Hyunchul
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.461-468
    • /
    • 2021
  • The purpose of this study is to collect official records of the 2019 Men's and Women's Handball World Championships to identify important shooting variables that determine the team's record of winning or losing. After collecting 192 games of men's and women's national teams from 24 countries and verifying the difference in competition records according to the winning and losing groups, the decision tree method, one of the data mining techniques, is analyzed. According to the analysis, the 9m shooting success rate and Near shooting success rate were the most important factors for both men and women. Men win 83.3% if the 9m shooting success rate is 32.5% or higher and the Near shooting success rate is 67.5%, and women win 75% if the 9m shooting success rate is 75% or more and the Near shooting success rate is 51%. Also, the women's yellow cards are considered important variables that determine victory or defeat. In conclusion, both men and women were able to identify the factors of winning and losing decision shooting, but follow-up studies are needed considering the relativity of various record variables and performance in future handball.

Managing the Reverse Extrapolation Model of Radar Threats Based Upon an Incremental Machine Learning Technique (점진적 기계학습 기반의 레이더 위협체 역추정 모델 생성 및 갱신)

  • Kim, Chulpyo;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.29-39
    • /
    • 2017
  • Various electronic warfare situations drive the need to develop an integrated electronic warfare simulator that can perform electronic warfare modeling and simulation on radar threats. In this paper, we analyze the components of a simulation system to reversely model the radar threats that emit electromagnetic signals based on the parameters of the electronic information, and propose a method to gradually maintain the reverse extrapolation model of RF threats. In the experiment, we will evaluate the effectiveness of the incremental model update and also assess the integration method of reverse extrapolation models. The individual model of RF threats are constructed by using decision tree, naive Bayesian classifier, artificial neural network, and clustering algorithms through Euclidean distance and cosine similarity measurement, respectively. Experimental results show that the accuracy of reverse extrapolation models improves, while the size of the threat sample increases. In addition, we use voting, weighted voting, and the Dempster-Shafer algorithm to integrate the results of the five different models of RF threats. As a result, the final decision of reverse extrapolation through the Dempster-Shafer algorithm shows the best performance in its accuracy.