• Title/Summary/Keyword: LDA algorithm

Search Result 159, Processing Time 0.047 seconds

Improved Feature Extraction of Hand Movement EEG Signals based on Independent Component Analysis and Spatial Filter

  • Nguyen, Thanh Ha;Park, Seung-Min;Ko, Kwang-Eun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.4
    • /
    • pp.515-520
    • /
    • 2012
  • In brain computer interface (BCI) system, the most important part is classification of human thoughts in order to translate into commands. The more accuracy result in classification the system gets, the more effective BCI system is. To increase the quality of BCI system, we proposed to reduce noise and artifact from the recording data to analyzing data. We used auditory stimuli instead of visual ones to eliminate the eye movement, unwanted visual activation, gaze control. We applied independent component analysis (ICA) algorithm to purify the sources which constructed the raw signals. One of the most famous spatial filter in BCI context is common spatial patterns (CSP), which maximize one class while minimize the other by using covariance matrix. ICA and CSP also do the filter job, as a raw filter and refinement, which increase the classification result of linear discriminant analysis (LDA).

Numerical Analysis for the Piston-Driven Intake Flows using the Finite Element Method (피스톤에 의해 유입되는 유동에 대한 유한요소법을 이용한 수치해석)

  • Choi J. W.;Park C. K.
    • Journal of computational fluids engineering
    • /
    • v.4 no.2
    • /
    • pp.39-46
    • /
    • 1999
  • The FVM(Finite Volume Method) have been used mainly for the flow analyses in the piston-cylinder. The objective of the present study is to analyze numerically the piston-driven intake flows using the FEM(Finite Element Method). The FEM algorithm used in this study is 4-step time-splitting method which requires much less execution time and computer storage than the velocity-pressure integrated method and the penalty method. And the explicit Lax-Wendroff scheme is applied to nonlinear convective term in the momentum equations to prevent checkerboard pressure oscillations. Also, the ALE(arbitrary Lagrangian Eulerian) method is adopted for the moving grids. The calculated results show good agreement in comparison with those by the FVM and the experimental results by the LDA.

  • PDF

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF

Lie Detection Technique using Video from the Ratio of Change in the Appearance

  • Hossain, S.M. Emdad;Fageeri, Sallam Osman;Soosaimanickam, Arockiasamy;Kausar, Mohammad Abu;Said, Aiman Moyaid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.165-170
    • /
    • 2022
  • Lying is nuisance to all, and all liars knows it is nuisance but still keep on lying. Sometime people are in confusion how to escape from or how to detect the liar when they lie. In this research we are aiming to establish a dynamic platform to identify liar by using video analysis especially by calculating the ratio of changes in their appearance when they lie. The platform will be developed using a machine learning algorithm along with the dynamic classifier to classify the liar. For the experimental analysis the dataset to be processed in two dimensions (people lying and people tell truth). Both parameter of facial appearance will be stored for future identification. Similarly, there will be standard parameter to be built for true speaker and liar. We hope this standard parameter will be able to diagnosed a liar without a pre-captured data.

Literature Review of Extended Reality Research in Consumer Experience: Insight From Semantic Network Analysis and Topic Modeling

  • Hansol Choi;Hyemi Lee
    • Asia Marketing Journal
    • /
    • v.26 no.1
    • /
    • pp.45-59
    • /
    • 2024
  • Extended Reality (XR) technology, the umbrella term covering hyper-realistic technologies, is known to enhance consumer experience and is therefore developing rapidly and being utilized across various industries. Growing studies have examined XR technology and consumer experience; however, the literature has failed to fully explore hyper-realistic technology through a holistic perspective. To fill this gap, we analyzed 720 Korean and international articles through semantic network analysis and topic modeling and identified the literature on XR research in consumer experience. As a result, we extracted six main topics: "Tourism," "Buying Behavior," "XR Technology Acceptance," "Virtual Space," "Game," and "XR Environment." The results provide comprehensive insight on XR technology in consumer experience, whereas the literature is bounded on the production side as revealing a lack of academic discourse on consumer rights and responsibilities. Research reflecting the consumer welfare perspective is, therefore, recommended for future studies.

Classification of Network Traffic using Machine Learning for Software Defined Networks

  • Muhammad Shahzad Haroon;Husnain Mansoor
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.91-100
    • /
    • 2023
  • As SDN devices and systems hit the market, security in SDN must be raised on the agenda. SDN has become an interesting area in both academics and industry. SDN promises many benefits which attract many IT managers and Leading IT companies which motivates them to switch to SDN. Over the last three decades, network attacks becoming more sophisticated and complex to detect. The goal is to study how traffic information can be extracted from an SDN controller and open virtual switches (OVS) using SDN mechanisms. The testbed environment is created using the RYU controller and Mininet. The extracted information is further used to detect these attacks efficiently using a machine learning approach. To use the Machine learning approach, a dataset is required. Currently, a public SDN based dataset is not available. In this paper, SDN based dataset is created which include legitimate and non-legitimate traffic. Classification is divided into two categories: binary and multiclass classification. Traffic has been classified with or without dimension reduction techniques like PCA and LDA. Our approach provides 98.58% of accuracy using a random forest algorithm.

An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm (선형 판별 분석 및 k-means 알고리즘을 이용한 적대적 공격 유형 분류 방안)

  • Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1215-1225
    • /
    • 2021
  • Although Artificial Intelligence (AI) techniques have shown impressive performance in various fields, they are vulnerable to adversarial examples which induce misclassification by adding human-imperceptible perturbations to the input. Previous studies to defend the adversarial examples can be classified into three categories: (1) model retraining methods; (2) input transformation methods; and (3) adversarial examples detection methods. However, even though the defense methods against adversarial examples have constantly been proposed, there is no research to classify the type of adversarial attack. In this paper, we proposed an adversarial attack family classification method based on dimensionality reduction and clustering. Specifically, after extracting adversarial perturbation from adversarial example, we performed Linear Discriminant Analysis (LDA) to reduce the dimensionality of adversarial perturbation and performed K-means algorithm to classify the type of adversarial attack family. From the experimental results using MNIST dataset and CIFAR-10 dataset, we show that the proposed method can efficiently classify five tyeps of adversarial attack(FGSM, BIM, PGD, DeepFool, C&W). We also show that the proposed method provides good classification performance even in a situation where the legitimate input to the adversarial example is unknown.

Unsupervised Motion Learning for Abnormal Behavior Detection in Visual Surveillance (영상감시시스템에서 움직임의 비교사학습을 통한 비정상행동탐지)

  • Jeong, Ha-Wook;Chang, Hyung-Jin;Choi, Jin-Young
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.5
    • /
    • pp.45-51
    • /
    • 2011
  • In this paper, we propose an unsupervised learning method for modeling motion trajectory patterns effectively. In our approach, observations of an object on a trajectory are treated as words in a document for latent dirichlet allocation algorithm which is used for clustering words on the topic in natural language process. This allows clustering topics (e.g. go straight, turn left, turn right) effectively in complex scenes, such as crossroads. After this procedure, we learn patterns of word sequences in each cluster using Baum-Welch algorithm used to find the unknown parameters in a hidden markov model. Evaluation of abnormality can be done using forward algorithm by comparing learned sequence and input sequence. Results of experiments show that modeling of semantic region is robust against noise in various scene.

Combination and evaluation to multiplex-biomarkers for check of ovarian cancer (난소암 조기진단을 위한 다중 바이오마커 선택 알고리즘 성능 비교)

  • Choi, Kwang-Won;Kim, Seung-Il;Cho, Sang-Yeun;Song, Hae-Jung;Kim, Jong-Dae;Kim, Yu-Seop;Park, Chan-Young;Kim, Young-Mog;Park, Hyung-Ki;Lee, Eun-Young;Lee, Myung-Sun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06c
    • /
    • pp.176-179
    • /
    • 2011
  • 본 연구에서는 T-Test와 Genetic Algorithm을 사용해 Luminex 사용 환경에서 난소암을 진단할 수 있는 바이오마커의 조합을 찾고 Cancer와 Normal간의 분류 성능을 평가해 보았다. 바이오마커는 혈액, 체액 내의 특정 질환 여부나 상태를 나타내는 단백질, DNA들의 지표 물질이다. 정상인과는 다른 분포를 가진 성분이 환자의 혈액이나 체액에서 발견되면 이를 토대로 질병유무와 상태를 판단할 수 있다. 난소암을 진단할 수 있는 바이오마커 조합을 찾기 위해 T-Test와 Genetic Algorithm를 사용하여 분류성능이 좋은 바이오마커 조합을 각각 선별해 보았고, 선별된 각각의 마커조합을 선형분류기(LDA)를 사용해 평균 민감도, 특이도, 정확도를 비교해 보았다. 실험데이터는 두 곳의 병원에서 제공받은 총 58명(Cancer 27명, Normal 31명)의 혈청에서 21 종류의 바이오마커 데이터를 Luminex-PRA를 통해 얻었다. 본 연구에서는 T-Test로 만들어진 마커조합이 Genetic algorithm으로 만들어진 마커조합 보다 더 좋은 민감도, 특이도, 분류정확도를 보여주었다.

A Gaussian Mixture Model Based Surface Electromyogram Pattern Classification Algorithm for Estimation of Wrist Motions (손목 움직임 추정을 위한 Gaussian Mixture Model 기반 표면 근전도 패턴 분류 알고리즘)

  • Jeong, Eui-Chul;Yu, Song-Hyun;Lee, Sang-Min;Song, Young-Rok
    • Journal of Biomedical Engineering Research
    • /
    • v.33 no.2
    • /
    • pp.65-71
    • /
    • 2012
  • In this paper, the Gaussian Mixture Model(GMM) which is very robust modeling for pattern classification is proposed to classify wrist motions using surface electromyograms(EMG). EMG is widely used to recognize wrist motions such as up, down, left, right, rest, and is obtained from two electrodes placed on the flexor carpi ulnaris and extensor carpi ulnaris of 15 subjects under no strain condition during wrist motions. Also, EMG-based feature is derived from extracted EMG signals in time domain for fast processing. The estimated features based in difference absolute mean value(DAMV) are used for motion classification through GMM. The performance of our approach is evaluated by recognition rates and it is found that the proposed GMM-based method yields better results than conventional schemes including k-Nearest Neighbor(k-NN), Quadratic Discriminant Analysis(QDA) and Linear Discriminant Analysis(LDA).