• Title/Summary/Keyword: 희소데이터

Search Result 85, Processing Time 0.016 seconds

A time delay estimation method using canonical correlation analysis and log-sum regularization (로그-합 규준화와 정준형 상관 분석을 이용한 시간 지연 추정에 관한 연구)

  • Lim, Jun-Seok;Pyeon, Yong-Gook;Lee, Seokjin;Cheong, MyoungJun
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.4
    • /
    • pp.279-284
    • /
    • 2017
  • The localization of sources has a numerous number of applications. To estimate the position of sources, the relative time delay between two or more received signals for the direct signal must be determined. Although the GCC (Generalized Cross-Correlation) method is the most popular technique, an approach based on CCA (Canonical Correlation Analysis) was also proposed for the TDE (Time Delay Estimation). In this paper, we propose a new adaptive algorithm based on CCA in order to utilized the sparsity in the eigenvector of CCA based time delay estimator. The proposed algorithm uses the eigenvector corresponding to the maximum eigenvalue with log-sum regularization in order to utilize the sparsity in the eigenvector. We have performed simulations for several SNR(signal to noise ratio)s, showing that the new CCA based algorithm can estimate the time delays more accurately than the conventional CCA and GCC based TDE algorithms.

Rare Malware Classification Using Memory Augmented Neural Networks (메모리 추가 신경망을 이용한 희소 악성코드 분류)

  • Kang, Min Chul;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.847-857
    • /
    • 2018
  • As the number of malicious code increases steeply, cyber attack victims targeting corporations, public institutions, financial institutions, hospitals are also increasing. Accordingly, academia and security industry are conducting various researches on malicious code detection. In recent years, there have been a lot of researches using machine learning techniques including deep learning. In the case of research using Convolutional Neural Network, ResNet, etc. for classification of malicious code, it can be confirmed that the performance improvement is higher than the existing classification method. However, one of the characteristics of the target attack is that it is custom malicious code that makes it operate only for a specific company, so it is not a form spreading widely to a large number of users. Since there are not many malicious codes of this kind, it is difficult to apply the previously studied machine learning or deep learning techniques. In this paper, we propose a method to classify malicious codes when the amount of samples is insufficient such as targeting type malicious code. As a result of the study, we confirmed that the accuracy of 97% can be achieved even with a small amount of data by applying the Memory Augmented Neural Networks model.

Linear programming models using a Dantzig type risk for portfolio optimization (Dantzig 위험을 사용한 포트폴리오 최적화 선형계획법 모형)

  • Ahn, Dayoung;Park, Seyoung
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.2
    • /
    • pp.229-250
    • /
    • 2022
  • Since the publication of Markowitz's (1952) mean-variance portfolio model, research on portfolio optimization has been conducted in many fields. The existing mean-variance portfolio model forms a nonlinear convex problem. Applying Dantzig's linear programming method, it was converted to a linear form, which can effectively reduce the algorithm computation time. In this paper, we proposed a Dantzig perturbation portfolio model that can reduce management costs and transaction costs by constructing a portfolio with stable and small (sparse) assets. The average return and risk were adjusted according to the purpose by applying a perturbation method in which a certain part is invested in the existing benchmark and the rest is invested in the assets proposed as a portfolio optimization model. For a covariance estimation, we proposed a Gaussian kernel weight covariance that considers time-dependent weights by reflecting time-series data characteristics. The performance of the proposed model was evaluated by comparing it with the benchmark portfolio with 5 real data sets. Empirical results show that the proposed portfolios provide higher expected returns or lower risks than the benchmark. Further, sparse and stable asset selection was obtained in the proposed portfolios.

A Study on the Concept and Characteristics of Metaverse based NFT Art - Focused on <Hybrid Nature> (메타버스 기반 NFT 아트 작품 사례 연구 - <하이브리드 네이처>를 중심으로)

  • Bosul Kim;Min Ji Kim
    • Trans-
    • /
    • v.14
    • /
    • pp.1-33
    • /
    • 2023
  • In the Web 3.0 era, the third generation of web technologies that uses blockchain technology to give creators ownership of data, metaverse is a crucial trend for developing a creator economy. Web 3.0 aims for a value in which content creators are compensated from participation without being dependent on the platform. Blockchain NFT technology is crucial in metaverse, a vital component of Web 3.0, to ensure the ownership of digital assets. Based on the theory that investigates the concept and characteristics of metaverse, this study identifies five features of the metaverse based NFT art ①'Continuity', ②'Presence', ③ 'Concurrency', ④'Economy', ⑤ 'Application of technology'. By focusing on metaverse based NFT art <Hybrid Nature> case study, we analyzed how the concepts and characteristics of the metaverse and NFT art were reflected in the work. This study focuses on the concept of NFT art, which is emerging at the intersection of art, technology and industry, and emphasizes the importance of finding creative, aesthetic, and cultural values rather than the NFT art's potential for financial gain. It is still in its early stage for academic studies to focus on the aesthetic qualities of NFT art. Future academics and researchers can find this study to gain deeper understanding of the traits and artistic, creative aspects of metaverse based NFT art.

Attention based Feature-Fusion Network for 3D Object Detection (3차원 객체 탐지를 위한 어텐션 기반 특징 융합 네트워크)

  • Sang-Hyun Ryoo;Dae-Yeol Kang;Seung-Jun Hwang;Sung-Jun Park;Joong-Hwan Baek
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.190-196
    • /
    • 2023
  • Recently, following the development of LIDAR technology which can detect distance from the object, the interest for LIDAR based 3D object detection network is getting higher. Previous networks generate inaccurate localization results due to spatial information loss during voxelization and downsampling. In this study, we propose an attention-based convergence method and a camera-LIDAR convergence system to acquire high-level features and high positional accuracy. First, by introducing the attention method into the Voxel-RCNN structure, which is a grid-based 3D object detection network, the multi-scale sparse 3D convolution feature is effectively fused to improve the performance of 3D object detection. Additionally, we propose the late-fusion mechanism for fusing outcomes in 3D object detection network and 2D object detection network to delete false positive. Comparative experiments with existing algorithms are performed using the KITTI data set, which is widely used in the field of autonomous driving. The proposed method showed performance improvement in both 2D object detection on BEV and 3D object detection. In particular, the precision was improved by about 0.54% for the car moderate class compared to Voxel-RCNN.