• Title/Summary/Keyword: 함수 예측 기법

Search Result 489, Processing Time 0.032 seconds

Time-series Mapping and Uncertainty Modeling of Environmental Variables: A Case Study of PM10 Concentration Mapping (시계열 환경변수 분포도 작성 및 불확실성 모델링: 미세먼지(PM10) 농도 분포도 작성 사례연구)

  • Park, No-Wook
    • Journal of the Korean earth science society
    • /
    • v.32 no.3
    • /
    • pp.249-264
    • /
    • 2011
  • A multi-Gaussian kriging approach extended to space-time domain is presented for uncertainty modeling as well as time-series mapping of environmental variables. Within a multi-Gaussian framework, normal score transformed environmental variables are first decomposed into deterministic trend and stochastic residual components. After local temporal trend models are constructed, the parameters of the models are estimated and interpolated in space. Space-time correlation structures of stationary residual components are quantified using a product-sum space-time variogram model. The ccdf is modeled at all grid locations using this space-time variogram model and space-time kriging. Finally, e-type estimates and conditional variances are computed from the ccdf models for spatial mapping and uncertainty analysis, respectively. The proposed approach is illustrated through a case of time-series Particulate Matter 10 ($PM_{10}$) concentration mapping in Incheon Metropolitan city using monthly $PM_{10}$ concentrations at 13 stations for 3 years. It is shown that the proposed approach would generate reliable time-series $PM_{10}$ concentration maps with less mean bias and better prediction capability, compared to conventional spatial-only ordinary kriging. It is also demonstrated that the conditional variances and the probability exceeding a certain thresholding value would be useful information sources for interpretation.

Back Analysis of Field Measurements Around the Tunnel with the Application of Genetic Algorithms (유전자 알고리즘을 이용한 터널 현장 계측 결과의 역해석)

  • Kim Sun-Myung;Yoon Ji-Sun;Jun Duk-Chan;Yoon Sang-Gil
    • Journal of the Korean Geotechnical Society
    • /
    • v.20 no.7
    • /
    • pp.69-78
    • /
    • 2004
  • In this study, the back analysis program was developed by applying the genetic algorithm, one of artificial intelligence fields, to the direct method. The optimization process which has influence on the efficiency of the direct method was modulated with genetic algorithm. On conditions that the displacement computed by forward analysis for a certain rock mass model was the same as the displacement measured at the tunnel section, back analysis was executed to verify the validity of the program. Usefulness of the program was confirmed by comparing relative errors calculated by back analysis, which is carried out under the same rock mass conditions as analysis model of Gens et at (1987), one of back analysis case in the past. We estimated the total displacement occurring by tunnelling with the crown settlement and convergence measured at the working faces in three tunnel sites of Kyungbu Express railway. Those data measured at the working face are used for back analysis as the input data after confidence test. As the results of the back analysis, we comprehended the tendency of tunnel behaviors with comparing the respective deformation characteristics obtained by the measurement at the working face and by back analysis. Also the usefulness and applicability of the back analysis program developed in this study were verified.

Sound event detection model using self-training based on noisy student model (잡음 학생 모델 기반의 자가 학습을 활용한 음향 사건 검지)

  • Kim, Nam Kyun;Park, Chang-Soo;Kim, Hong Kook;Hur, Jin Ook;Lim, Jeong Eun
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.5
    • /
    • pp.479-487
    • /
    • 2021
  • In this paper, we propose an Sound Event Detection (SED) model using self-training based on a noisy student model. The proposed SED model consists of two stages. In the first stage, a mean-teacher model based on an Residual Convolutional Recurrent Neural Network (RCRNN) is constructed to provide target labels regarding weakly labeled or unlabeled data. In the second stage, a self-training-based noisy student model is constructed by applying different noise types. That is, feature noises, such as time-frequency shift, mixup, SpecAugment, and dropout-based model noise are used here. In addition, a semi-supervised loss function is applied to train the noisy student model, which acts as label noise injection. The performance of the proposed SED model is evaluated on the validation set of the Detection and Classification of Acoustic Scenes and Events (DCASE) 2020 Challenge Task 4. The experiments show that the single model and ensemble model of the proposed SED based on the noisy student model improve F1-score by 4.6 % and 3.4 % compared to the top-ranked model in DCASE 2020 challenge Task 4, respectively.

Analysis of Correlation between Marine Traffic Congestion and Waterway Risk based on IWRAP Mk2 (해상교통혼잡도와 IWRAP Mk2 기반의 항로 위험도 연관성 분석에 관한 연구)

  • Lee, Euijong;Lee, Yun-sok
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.5
    • /
    • pp.527-534
    • /
    • 2019
  • Several types of mathematical analysis methods are used for port waterway risk assessment based on marine traffic volume. In Korea, a marine traffic congestion model that standardizes the size of the vessels passing through the port waterway is applied to evaluate the risk of the waterway. For example, when marine traffic congestion is high, risk situations such as collisions are likely to occur. However, a scientific review is required to determine if there is a correlation between high density of maritime traffic and a high risk of waterway incidents. In this study, IWRAP Mk2(IALA official recommendation evaluation model) and a marine traffic congestion model were used to analyze the correlation between port waterway risk and marine traffic congestion in the same area. As a result, the linear function of R2 was calculated as 0.943 and it was determined to be significant. The Pearson correlation coefficient was calculated as 0.971, indicating a strong positive correlation. It was confirmed that the port waterway risk and the marine traffic congestion have a strong correlation due to the influence of the common input variables of each model. It is expected that these results will be used in the development of advanced models for the prediction of port waterway risk assessment.

Extraction of Snowmelt Parameters using NOAA AVHRR and GIS Technique for 7 Major Dam Watersheds in South Korea (NOAA AVHRR 영상 및 GIS 기법을 이용한 국내 주요 7개 댐 유역의 융설 매개변수 추출)

  • Shin, Hyung Jin;Kim, Seong Joon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.2B
    • /
    • pp.177-185
    • /
    • 2008
  • Accurate monitoring of snow cover is a key component for studying climate and global as well as for daily weather forecasting and snowmelt runoff modelling. The few observed data related to snowmelt was the major cause of difficulty in extracting snowmelt factors such as snow cover area, snow depth and depletion curve. Remote sensing technology is very effective to observe a wide area. Although many researchers have used remote sensing for snow observation, there were a few discussions on the characteristics of spatial and temporal variation. Snow cover maps were derived from NOAA AVHRR images for the winter seasons from 1997 to 2006. Distributed snow depth was mapped by overlapping between snow cover maps and interpolated snowfall maps from 69 meteorological observation stations. Model parameters (Snow Cover Area: SCA, snow depth, Snow cover Depletion Curve: SDC) were built for 7 major watersheds in South Korea. The decrease pattern of SCA for time (day) was expressed as exponentially decay function, and the determination coefficient was ranged from 0.46 to 0.88. The SCA decreased 70% to 100% from the maximum SCA when 10 days passed.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Dynamic Traffic Assignment Using Genetic Algorithm (유전자 알고리즘을 이용한 동적통행배정에 관한 연구)

  • Park, Kyung-Chul;Park, Chang-Ho;Chon, Kyung-Soo;Rhee, Sung-Mo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.8 no.1 s.15
    • /
    • pp.51-63
    • /
    • 2000
  • Dynamic traffic assignment(DTA) has been a topic of substantial research during the past decade. While DTA is gradually maturing, many aspects of DTA still need improvement, especially regarding its formulation and solution algerian Recently, with its promise for In(Intelligent Transportation System) and GIS(Geographic Information System) applications, DTA have received increasing attention. This potential also implies higher requirement for DTA modeling, especially regarding its solution efficiency for real-time implementation. But DTA have many mathematical difficulties in searching process due to the complexity of spatial and temporal variables. Although many solution algorithms have been studied, conventional methods cannot iud the solution in case that objective function or constraints is not convex. In this paper, the genetic algorithm to find the solution of DTA is applied and the Merchant-Nemhauser model is used as DTA model because it has a nonconvex constraint set. To handle the nonconvex constraint set the GENOCOP III system which is a kind of the genetic algorithm is used in this study. Results for the sample network have been compared with the results of conventional method.

  • PDF

Anomaly Detection for User Action with Generative Adversarial Networks (적대적 생성 모델을 활용한 사용자 행위 이상 탐지 방법)

  • Choi, Nam woong;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.43-62
    • /
    • 2019
  • At one time, the anomaly detection sector dominated the method of determining whether there was an abnormality based on the statistics derived from specific data. This methodology was possible because the dimension of the data was simple in the past, so the classical statistical method could work effectively. However, as the characteristics of data have changed complexly in the era of big data, it has become more difficult to accurately analyze and predict the data that occurs throughout the industry in the conventional way. Therefore, SVM and Decision Tree based supervised learning algorithms were used. However, there is peculiarity that supervised learning based model can only accurately predict the test data, when the number of classes is equal to the number of normal classes and most of the data generated in the industry has unbalanced data class. Therefore, the predicted results are not always valid when supervised learning model is applied. In order to overcome these drawbacks, many studies now use the unsupervised learning-based model that is not influenced by class distribution, such as autoencoder or generative adversarial networks. In this paper, we propose a method to detect anomalies using generative adversarial networks. AnoGAN, introduced in the study of Thomas et al (2017), is a classification model that performs abnormal detection of medical images. It was composed of a Convolution Neural Net and was used in the field of detection. On the other hand, sequencing data abnormality detection using generative adversarial network is a lack of research papers compared to image data. Of course, in Li et al (2018), a study by Li et al (LSTM), a type of recurrent neural network, has proposed a model to classify the abnormities of numerical sequence data, but it has not been used for categorical sequence data, as well as feature matching method applied by salans et al.(2016). So it suggests that there are a number of studies to be tried on in the ideal classification of sequence data through a generative adversarial Network. In order to learn the sequence data, the structure of the generative adversarial networks is composed of LSTM, and the 2 stacked-LSTM of the generator is composed of 32-dim hidden unit layers and 64-dim hidden unit layers. The LSTM of the discriminator consists of 64-dim hidden unit layer were used. In the process of deriving abnormal scores from existing paper of Anomaly Detection for Sequence data, entropy values of probability of actual data are used in the process of deriving abnormal scores. but in this paper, as mentioned earlier, abnormal scores have been derived by using feature matching techniques. In addition, the process of optimizing latent variables was designed with LSTM to improve model performance. The modified form of generative adversarial model was more accurate in all experiments than the autoencoder in terms of precision and was approximately 7% higher in accuracy. In terms of Robustness, Generative adversarial networks also performed better than autoencoder. Because generative adversarial networks can learn data distribution from real categorical sequence data, Unaffected by a single normal data. But autoencoder is not. Result of Robustness test showed that he accuracy of the autocoder was 92%, the accuracy of the hostile neural network was 96%, and in terms of sensitivity, the autocoder was 40% and the hostile neural network was 51%. In this paper, experiments have also been conducted to show how much performance changes due to differences in the optimization structure of potential variables. As a result, the level of 1% was improved in terms of sensitivity. These results suggest that it presented a new perspective on optimizing latent variable that were relatively insignificant.

Instrumental Seismic Intensity based on Fourier Acceleration Spectra of the earthquake ground-motion (지진파의 가속도 푸리에스펙트럼 크기를 이용한 계측진도 평가)

  • Yun, Kwan-Hee;Park, Dong-Hee;Park, Se-Moon
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.13 no.6
    • /
    • pp.27-37
    • /
    • 2009
  • A method of instrumentally estimating seismic intensity (MMI) based on the Fourier Acceleration Spectrum of earthquake ground-motion, the so-called 'FAS MMI method' of Sokolov and Wald (2002), was evaluated for its applicability to Korea based on the empirical models of mean (m) and standard deviation (${\sigma}$) for Korea according to individual seismic intensity for MMI ${\leq}$ IV (Yun et al., 2009). This evaluation showed that the error in estimating the seismic intensity using the FAS MMI method is ${\sigma}$ = 0.74 MMI, and was further reduced to ${\sigma}$ = 0.61 MMI if the dependency of the error on earthquake magnitude and distance is additionally corrected. It is also shown that FAS MMI based on the FAS semi-empirically evaluated from small earthquakes for damaging earthquakes in Korea with maximum MMI ${\geq}$ VI could predict the observed MMI with the maximum error of 0.63 by using the combined FAS m-${\sigma}$ models of Korea for MMI ${\leq}$ IV and global region for MMI ${\geq}$ V.

Adsorption Characteristics Analysis of 2,4-Dichlorophenol in Aqueous Solution with Activated Carbon Prepared from Waste Citrus Peel using Response Surface Modeling Approach (반응표면분석법을 이용한 폐감귤박 활성탄에 의한 수중의 2,4-Dichlorophenol 흡착특성 해석)

  • Lee, Chang-Han;Kam, Sang-Kyu;Lee, Min-Gyu
    • Korean Chemical Engineering Research
    • /
    • v.55 no.5
    • /
    • pp.723-730
    • /
    • 2017
  • The batch experiments by response surface methodology (RSM) have been applied to investigate the influences of operating parameters such as temperature, initial concentration, contact time and adsorbent dosage on 2,4-dichlorophenol (2,4-DCP) adsorption with an activated carbon prepared from waste citrus peel (WCAC). Regression equation formulated for the 2,4-DCP adsorption was represented as a function of response variables. Adequacy of the model was tested by the correlation between experimental and predicted values of the response. A fairly high value of $R^2$ (0.9921) indicated that most of the data variation was explained by the regression model. The significance of independent variables and their interactions were tested by the analysis of variance (ANOVA) and t-test statistics. These results showed that the model used to fit response variables was significant and adequate to represent the relationship between the response and the independent variables. The kinetics and isotherm experiment data can be well described with the pseudo-second order model and the Langmuir isotherm model, respectively. The maximum adsorption capacity of 2,4-DCP on WCAC calculated from the Langmuir isotherm model was 345.49 mg/g. The rate controlling mechanism study revealed that film diffusion and intraparticle diffusion were simultaneously occurring during the adsorption process. The thermodynamic parameters indicated that the adsorption reaction of 2,4-DCP on WCAC was an endothermic and spontaneous process.