• Title/Summary/Keyword: Intelligent Data Analysis

Search Result 1,456, Processing Time 0.032 seconds

Verification of Entertainment Utilization of UAS FC Data Using Machine Learning (머신러닝 기법을 이용한 무인항공기의 FC 데이터의 엔터테인먼트 드론 활용 검증)

  • Lee, Jae-Yong;Lee, Kwang-Jae
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.349-357
    • /
    • 2021
  • Recently, drones are rapidly becoming common and expanding. There is a great need for diversity in whether drone flight data can be used as entertainment technology analysis data. In particular, it is necessary to check whether it is possible to analyze and utilize the flight and operation process of entertainment drones, which are developing through autonomous and intelligent methods, through data analysis and machine learning. In this paper, it was confirmed whether it can be used as a machine learning technology by using FC data in the evaluation of drones for entertainment. As a result, FC data from DJI and Parrot such as Mavic2 and Anafi were unable to analyze machine learning for entertainment. It is because data is collected at intervals of 0.1 second or more, so that it is impossible to find correlation with other data with GCS. On the other hand, it was found that machine learning technologies can be applied in the case of Fixhawk, which used an ARM processor and operates with the Nuttx OS. In the future, it is necessary to develop technologies capable of analyzing the characteristics of entertainment by dividing fixed-wing and rotary-wing flight information. For this, a model shoud be developed, and systematic big data collection and research should be conducted.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

The Research on Location Monitoring Device using Exploratory Spatial Data Analysis (공간종속성 분석기반 모니터링 장비위치결정 기법)

  • Kim, Joo Hwan;Nam, Doohee;Jung, Jum Lae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.4
    • /
    • pp.124-137
    • /
    • 2018
  • The main purpose of this study is to find the hotspots of crimes that occur frequently in the space and to derive the appropriate CCTV installation location. One of the characteristics of crime is clustered around past occurrence area, and these crimes are strongly correlated. It is also possible to find the cause of the clusters and the variables that affect the crime through the history of the crime. In addition to the traditional OLS model, spatial differential model including spatial autocorrelation and spatial error model were used to select the variables influencing the five major crime rate, the theft rate and the foreign resident rate. The variables affecting the Five major crimes were positive (+) sign for the welfare and the rate of the bar cluster rate, and negative (-) for the street density. The CCTV area occupies 46% of the hotspots based on the overlapping of the areas where the elderly people are crowded, the bar cluster, many multicultural families, and the areas with low density of street lamps. It turned out. Taking into account the current CCTV operation, the total number of new cases to cover the risk point was 89.

Designation of Logical Bicycle Accident Dangerous Zone by Digital Map-Based Accident Characteristics Analysis (디지털 맵 기반 사고특성 분석을 통한 자전거 사고 논리 위험존 설정 연구)

  • Sung, Kwang-mo;Kim, Ki-cheol;Lee, Choul-ki;Kim, Sung-jin;Lee, Jung-uck
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.1
    • /
    • pp.117-130
    • /
    • 2017
  • Bicycles are leading to serious accidents in the event of a side collision, and it is very important to prevent accidents in advance because it is difficult to actively deal with them in a dangerous situation. As a part of the bicycle safety driving support technology, this study establishes bicycle accidents dangerous zone based on bicycle accident data and road property information of digital map nationwide and provides timely safety information to cyclists. The point selected by using actual accident data was called 'dangerous zone', and the potential accident occurrence point generated by modeling based on this 'dangerous zone' was called 'logical dangerous zone'. As a result of the research on the Designation of Logical Bicycle Accident Dangerous Zone, the regional specificity of the bicycle accident points across the nation was generalized to the form of the logical dangerous zone through the network data.

Design Hourly Factor Estimation with Railway Passenger Data (철도이용객데이터를 이용한 철도역사 설계시간계수 산정연구)

  • Oh, Tae ho;Lee, Seon ha;Cheon, Choon keun;Yu, Byung young;Lee, Sang Jae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.1
    • /
    • pp.64-77
    • /
    • 2017
  • Domestic railway station calculates average number of passenger per day by considering future regional society and development of industrial economy etc, is carrying out designs on railway station scale. However, problems are being suggested situationally because selected average passenger data does not consider passengers having been diversified for a year. For representative example, confusion of Gwangju-Songjeong Railway Station got worse due to passengers whose number is more than original plan since the opening. Therefore, this study quotes the concept of design hourly factor using in designing roads to consider passengers having been diversified for a year in railway field. In order to calculate factor, collecting railway passenger data and also estimate, reliability verification were executed by using exponential model and 3rd equation model. As a result of deducing design hourly factor through inflection point calculation, utilizing exponen tial model is analyzed to well reflect the value of design hourly factor on railway passengers.

Detour Behavior on the Expressway using Route Travel Data (경로형 통행데이터 기반 고속도로 우회행태 분석)

  • Lee, Sujin;Son, Sanghoon;Kim, Hyungjoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.1
    • /
    • pp.58-70
    • /
    • 2020
  • Detour behavior on the expressway means that the driver uses the local road by passing the part of the expressway which is stagnant at the time of the traffic demand such as holidays. Since the detour rate was estimated through the survey at toll gate in the past, there was a difficulty in estimating the actual detour rate due to the small sample of the survey. In this study, we use DSRC-based route travel data to conduct empirical studies on detour patterns such as the estimation of actual detour rate, the improvement of travel time using detour road, and the correlation between traffic conditions on the expressway and detour rate. On the day of Chuseok and the day before Chuseok, the analysis of Giheung-DongtanIC→OsanIC and Seopyeongtaek IC→Walgott JC showed that the use of detour roads increased gradually during the congestion of the main line and travel time reduced when using detour roads, However, when the traffic congestion of the main line is not severe, the travel time increases when using the detour roads. The correlation between the traffic condition of the expressway and the actual detour rate has a negative correlation, which is consistent with the congestion pattern of the main line. The results of this study can be used to overcome limitations of detour pattern research based on surveys in the past and to establish a detour strategy for expressway sections where traffic demand is concentrated.

Design and Analysis of Multiple Mobile Router Architecture for In-Vehicle IPv6 Networks (차량 내 IPv6 네트워크를 위한 다중 이동 라우터 구조의 설계와 분석)

  • Paik Eun-Kyoung;Cho Ho-Sik;Choi Yang-Hee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.2 s.3
    • /
    • pp.43-54
    • /
    • 2003
  • As the demand for ubiquitous mobile wireless Internet grows, vehicles are receiving a lot of attention as new networking platforms. The demand for 4G all-IP networks encourages vehicle networks to be connected using IPv6. By means of network mobility (NEMO) support, we can connect sensors, controllers, local ,servers as well as passengers' devices of a vehicle to the Internet through a mobile router. The mobile router provides the connectivity to the Internet and mobility transparency for the rest of the mobile nodes of an in-vehicle nv6 network. So, it is .important for the mobile router to assure reliable connection and a sufficient data rate for the group of nodes behind it. To provide reliability, this paper proposes an adaptive multihoming architecture of multiple mobile routers. Proposed architecture makes use of different mobility characteristics of different vehicles. Simulation results with different configurations show that the proposed architecture increases session preservation thus increases reliability and reduces packet loss. We also show that the proposed architecture is adaptive to heterogeneous access environment which provide different access coverage areas and data rates. The result shows that our architecture achieves sufficient data rates as well as session preservation.

  • PDF

Design of Digit Recognition System Realized with the Aid of Fuzzy RBFNNs and Incremental-PCA (퍼지 RBFNNs와 증분형 주성분 분석법으로 실현된 숫자 인식 시스템의 설계)

  • Kim, Bong-Youn;Oh, Sung-Kwun;Kim, Jin-Yul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.56-63
    • /
    • 2016
  • In this study, we introduce a design of Fuzzy RBFNNs-based digit recognition system using the incremental-PCA in order to recognize the handwritten digits. The Principal Component Analysis (PCA) is a widely-adopted dimensional reduction algorithm, but it needs high computing overhead for feature extraction in case of using high dimensional images or a large amount of training data. To alleviate such problem, the incremental-PCA is proposed for the computationally efficient processing as well as the incremental learning of high dimensional data in the feature extraction stage. The architecture of Fuzzy Radial Basis Function Neural Networks (RBFNN) consists of three functional modules such as condition, conclusion, and inference part. In the condition part, the input space is partitioned with the use of fuzzy clustering realized by means of the Fuzzy C-Means (FCM) algorithm. Also, it is used instead of gaussian function to consider the characteristic of input data. In the conclusion part, connection weights are used as the extended diverse types in polynomial expression such as constant, linear, quadratic and modified quadratic. Experimental results conducted on the benchmarking MNIST handwritten digit database demonstrate the effectiveness and efficiency of the proposed digit recognition system when compared with other studies.

Design of Classifier for Sorting of Black Plastics by Type Using Intelligent Algorithm (지능형 알고리즘을 이용한 재질별 검정색 플라스틱 분류기 설계)

  • Park, Sang Beom;Roh, Seok Beom;Oh, Sung Kwun;Park, Eun Kyu;Choi, Woo Zin
    • Resources Recycling
    • /
    • v.26 no.2
    • /
    • pp.46-55
    • /
    • 2017
  • In this study, the design methodology of Radial Basis Function Neural Networks is developed with the aid of Laser Induced Breakdown Spectroscopy and also applied to the practical plastics sorting system. To identify black plastics such as ABS, PP, and PS, RBFNNs classifier as a kind of intelligent algorithms is designed. The dimensionality of the obtained input variables are reduced by using PCA and divided into several groups by using K-means clustering which is a kind of clustering techniques. The entire data is split into training data and test data according to the ratio of 4:1. The 5-fold cross validation method is used to evaluate the performance as well as reliability of the proposed classifier. In case of input variables and clusters equal to 5 respectively, the classification performance of the proposed classifier is obtained as 96.78%. Also, the proposed classifier showed superiority in the viewpoint of classification performance where compared to other classifiers.

Prediction of Traffic Congestion in Seoul by Deep Neural Network (심층인공신경망(DNN)과 다각도 상황 정보 기반의 서울시 도로 링크별 교통 혼잡도 예측)

  • Kim, Dong Hyun;Hwang, Kee Yeon;Yoon, Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.4
    • /
    • pp.44-57
    • /
    • 2019
  • Various studies have been conducted to solve traffic congestions in many metropolitan cities through accurate traffic flow prediction. Most studies are based on the assumption that past traffic patterns repeat in the future. Models based on such an assumption fall short in case irregular traffic patterns abruptly occur. Instead, the approaches such as predicting traffic pattern through big data analytics and artificial intelligence have emerged. Specifically, deep learning algorithms such as RNN have been prevalent for tackling the problems of predicting temporal traffic flow as a time series. However, these algorithms do not perform well in terms of long-term prediction. In this paper, we take into account various external factors that may affect the traffic flows. We model the correlation between the multi-dimensional context information with temporal traffic speed pattern using deep neural networks. Our model trained with the traffic data from TOPIS system by Seoul, Korea can predict traffic speed on a specific date with the accuracy reaching nearly 90%. We expect that the accuracy can be improved further by taking into account additional factors such as accidents and constructions for the prediction.