• Title/Summary/Keyword: Knn

Search Result 255, Processing Time 0.026 seconds

Interpolation of Color Image Scales (칼라 이미지 스케일의 보간)

  • Kim, Sung-Hwan;Jeong, Sung-Hwan;Lee, Joon-Whoan
    • Science of Emotion and Sensibility
    • /
    • v.10 no.3
    • /
    • pp.289-297
    • /
    • 2007
  • Color image scale captures the knowledge of colorists and represents both adjectives and colors in the same adjective image scales in order to select color(s) corresponding to an adjective. Due to the difficulty of psychological experiment and statistical analysis, in general, only a limited number of colors are located in the color image scales. This can make color selection process hard especially to non-expert. In this paper, we propose an interpolation of color image scale based on the fuzzy K-nearest neighbor method, which provides continuous colors according to the coordinates of the image scales. The experimental results show that the interpolated image scales can be practically useful for color selection process.

  • PDF

A Feature-Based Malicious Executable Detection Approach Using Transfer Learning

  • Zhang, Yue;Yang, Hyun-Ho;Gao, Ning
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.57-65
    • /
    • 2020
  • At present, the existing virus recognition systems usually use signature approach to detect malicious executable files, but these methods often fail to detect new and invisible malware. At the same time, some methods try to use more general features to detect malware, and achieve some success. Moreover, machine learning-based approaches are applied to detect malware, which depend on features extracted from malicious codes. However, the different distribution of features oftraining and testing datasets also impacts the effectiveness of the detection models. And the generation oflabeled datasets need to spend a significant amount time, which degrades the performance of the learning method. In this paper, we use transfer learning to detect new and previously unseen malware. We first extract the features of Portable Executable (PE) files, then combine transfer learning training model with KNN approachto detect the new and unseen malware. We also evaluate the detection performance of a classifier in terms of precision, recall, F1, and so on. The experimental results demonstrate that proposed method with high detection rates andcan be anticipated to carry out as well in the real-world environment.

A Moving Terminal's Coordinates Prediction Algorithm and an IoT Application

  • Kim, Daewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.63-74
    • /
    • 2017
  • Recently in the area of ICT, the M2M and IoT are in the spotlight as a cutting edge technology with the help of advancement of internet. Among those fields, the smart home is the closest area to our daily lives. Smart home has the purpose to lead a user more convenient living in the house with WLAN (Wireless Local Area Network) or other short-range communication environments using automated appliances. With an arrival of the age of IoT, this can be described as one axis of a variety of applications as for the M2H (Machine to Home) field in M2M. In this paper, we propose a novel technique for estimating the location of a terminal that freely move within a specified area using the RSSI (Received Signal Strength Indication) in the WLAN environment. In order to perform the location estimation, the Fingerprint and KNN methods are utilized and the LMS with the gradient descent method and the proposed algorithm are also used through the error correction functions for locating the real-time position of a moving user who is keeping a smart terminal. From the estimated location, the nearest fixed devices which are general electric appliances were supposed to work appropriately for self-operating of virtual smart home. Through the experiments, connection and operation success rate, and the performance results are analyzed, presenting the verification results.

A Design and Implement Vessel USN Risk Context Aware System using Case Based Reasoning (사례 기반 추론을 이용한 선박 USN 위험 상황 인식 시스템 구현 및 설계)

  • Song, Byoung-Ho;Lee, Seong-Ro
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.3
    • /
    • pp.42-50
    • /
    • 2010
  • It is necessary to implementation of system contain intelligent decision making algorithm considering marine feature because existing vessel USN system is simply monitoring obtained data from vessel USN. In this paper, we designed inference system using case based reasoning method and implemented knowledge base that case for fire and demage of digital marine vessel. We used K-Nearest Neighbor algorithm for recommend best similar case and input 3.000 EA by case for fire and demage context case base. As a result, we obtained about 82.5% average accuracy for fire case and about 80.1% average accuracy for demage case. We implemented digital marine vessel monitoring system using inference result.

Facial Expression Recognition using ICA-Factorial Representation Method (ICA-factorial 표현법을 이용한 얼굴감정인식)

  • Han, Su-Jeong;Kwak, Keun-Chang;Go, Hyoun-Joo;Kim, Sung-Suk;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.3
    • /
    • pp.371-376
    • /
    • 2003
  • In this paper, we proposes a method for recognizing the facial expressions using ICA(Independent Component Analysis)-factorial representation method. Facial expression recognition consists of two stages. First, a method of Feature extraction transforms the high dimensional face space into a low dimensional feature space using PCA(Principal Component Analysis). And then, the feature vectors are extracted by using ICA-factorial representation method. The second recognition stage is performed by using the Euclidean distance measure based KNN(K-Nearest Neighbor) algorithm. We constructed the facial expression database for six basic expressions(happiness, sadness, angry, surprise, fear, dislike) and obtained a better performance than previous works.

The ConvexHull using Outline Extration Algorithm in Gray Scale Image (이진 영상에서 ConvexHull을 이용한 윤곽선 추출 알고리즘)

  • Cho, Young-bok;Kim, U-ju;Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.162-165
    • /
    • 2017
  • The proposed paper extracts the region of interest from the x-lay input image and compares it with the reference image. The x-ray image has the same shape, but the size, direction and position of the object are photographed differently. In this way, we measure the erection difference of darkness and darkness using the similarity measurement method for the same object. Distance measurement also calculates the distance between two points with vector coordinates (x, y, z) of x-lay data. Experimental results show that the proposed method improves the accuracy of ROI extraction and the reference image matching time is more efficient than the conventional method.

  • PDF

Performance Evaluation between Models for Smoker Classification Based on Health Examination Data (건강검진 데이터 기반 흡연자 분류를 위한 모형별 성능 분석)

  • Yun, Jisun;Yu, Heonchang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.648-651
    • /
    • 2018
  • 흡연여부를 감별하는 지표가 있지만 반감기 등 여러 가지 요인에 따라 결과가 변한다는 단점이 있다. 그렇기 때문에 흡연여부 감별 시 외부요인에 영향을 덜 받는 지표가 필요하게 되었다. 그래서 흡연 여부 감별하는데 적합한 모형을 찾아 외부요인에 영향이 적은 지표를 개발에 도움이 될 것을 기대하며 연구를 진행하였다. 실험은 국민건강보험공단에서 제공한 건강검진정보데이터를 기반으로, SVM, Logistic Regression, KNN 등의 머신러닝 모델을 이용하여 흡연 여부를 감별하는 것을 진행한다. 이 실험은 속성에 따른 모형의 성능변화와 학습데이터 수에 따른 모형의 성능변화에 대한 2가지 측면에서 모델의 성능을 측정하였다. 모델의 평가는 정확도(accuracy), 정밀도(precision), 재현율(recall), 조화 평균(f1-score)으로 진행하였으며, 약 70퍼센트 정도의 정확도와, 60퍼센트 대의 재현율을 보인다. 실험 결과, SVM이 속성에 따른 모형의 성능 변화 실험에서는 63%의 재현율, 학습데이터 수에 따른 성능 변화 실험에서는 68%의 재현율을 보여, 흡연자 판별에 가장 좋은 성능을 보였다. 또한 재현율을 기준으로 실험 차수별로 가장 좋은 성능을 보인 모델과 가장 저조한 성능을 보인 모델의 차이를 비교한 결과, '속성에 따른 모형의 성능 변화 실험'에서는 최고 36%의 차이를 보였으며, '학습데이터 수에 따른 성능 변화 실험'에서 최고 42%의 차이를 보여 주었다. 이에 판별을 위한 속성도 중요하지만, 적합한 모형 선택 또한 중요하다는 것을 확인하였다.

Daily rainfall simulation considering distribution of rainfall events in each duration (강우사상의 지속기간별 분포 특성을 고려한 일강우 모의)

  • Jung, Jaewon;Bae, Younghye;Kim, Kyunghun;Han, Daegun;Kim, Hung Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.361-361
    • /
    • 2019
  • 기존의 Markov Chain 모형으로 일강우량 모의시에 강우의 발생여부를 모의하고 강우일의 강우량은 Monte Carlo 시뮬레이션을 통해 일강우 분포 특성에 맞는 분포형에서 랜덤으로 강우량을 추정하는 것이 일반적이다. 이때 강우 지속기간에 따른 강도 및 강우의 시간별 분포 등의 강우 사상의 특성을 반영할 수 없다는 한계가 있다. 본 연구에서는 이를 개선하기 위해 강우 사상을 지속기간에 따라 강우량을 추정하였다. 즉 강우 사상의 강우 지속일별로 총강우량의 분포형을 비매개변수 추정이 가능한 핵밀도추정(Kernel Density Estimation, KDE)를 적용하여 각각 추정하고, 강우가 지속될 경우에 지속일별로 해당하는 분포형에서 강우량을 구하였다. 각 강우사상에 대해 추정된 총 강우량은 k-최근접 이웃 알고리즘(k-Nearest Neighbor algorithm, KNN)을 통해 관측 강우자료에서 가장 유사한 강우량을 가지는 강우사상의 강우량 일분포 형태에 따라 각 일강우량으로 분배하였다. 본 연구는 기존의 강우량 추정 방법의 한계점을 개선하고자 하였으며, 연구 결과는 미래 강우에 대한 예측에도 활용될 수 있으며 수자원 설계에 있어서 기초자료로 활용될 수 있을 것으로 기대된다.

  • PDF

Emotion Recognition of Low Resource (Sindhi) Language Using Machine Learning

  • Ahmed, Tanveer;Memon, Sajjad Ali;Hussain, Saqib;Tanwani, Amer;Sadat, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.369-376
    • /
    • 2021
  • One of the most active areas of research in the field of affective computing and signal processing is emotion recognition. This paper proposes emotion recognition of low-resource (Sindhi) language. This work's uniqueness is that it examines the emotions of languages for which there is currently no publicly accessible dataset. The proposed effort has provided a dataset named MAVDESS (Mehran Audio-Visual Dataset Mehran Audio-Visual Database of Emotional Speech in Sindhi) for the academic community of a significant Sindhi language that is mainly spoken in Pakistan; however, no generic data for such languages is accessible in machine learning except few. Furthermore, the analysis of various emotions of Sindhi language in MAVDESS has been carried out to annotate the emotions using line features such as pitch, volume, and base, as well as toolkits such as OpenSmile, Scikit-Learn, and some important classification schemes such as LR, SVC, DT, and KNN, which will be further classified and computed to the machine via Python language for training a machine. Meanwhile, the dataset can be accessed in future via https://doi.org/10.5281/zenodo.5213073.

Deep Learning in Drebin: Android malware Image Texture Median Filter Analysis and Detection

  • Luo, Shi-qi;Ni, Bo;Jiang, Ping;Tian, Sheng-wei;Yu, Long;Wang, Rui-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3654-3670
    • /
    • 2019
  • This paper proposes an Image Texture Median Filter (ITMF) to analyze and detect Android malware on Drebin datasets. We design a model of "ITMF" combined with Image Processing of Median Filter (MF) to reflect the similarity of the malware binary file block. At the same time, using the MAEVS (Malware Activity Embedding in Vector Space) to reflect the potential dynamic activity of malware. In order to ensure the improvement of the classification accuracy, the above-mentioned features(ITMF feature and MAEVS feature)are studied to train Restricted Boltzmann Machine (RBM) and Back Propagation (BP). The experimental results show that the model has an average accuracy rate of 95.43% with few false alarms. to Android malicious code, which is significantly higher than 95.2% of without ITMF, 93.8% of shallow machine learning model SVM, 94.8% of KNN, 94.6% of ANN.