• Title/Summary/Keyword: LDA algorithm

Search Result 157, Processing Time 0.025 seconds

A Study on the RFID Biometrics System Based on Hippocampal Learning Algorithm Using NMF and LDA Mixture Feature Extraction (NMF와 LDA 혼합 특징추출을 이용한 해마 학습기반 RFID 생체 인증 시스템에 관한 연구)

  • Oh Sun-Moon;Kang Dae-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.46-54
    • /
    • 2006
  • Recently, the important of a personal identification is increasing according to expansion using each on-line commercial transaction and personal ID-card. Although a personal ID-card embedded RFID(Radio Frequency Identification) tag is gradually increased, the way for a person's identification is deficiency. So we need automatic methods. Because RFID tag is vary small storage capacity of memory, it needs effective feature extraction method to store personal biometrics information. We need new recognition method to compare each feature. In this paper, we studied the face verification system using Hippocampal neuron modeling algorithm which can remodel the hippocampal neuron as a principle of a man's brain in engineering, then it can learn the feature vector of the face images very fast. and construct the optimized feature each image. The system is composed of two parts mainly. One is feature extraction using NMF(Non-negative Matrix Factorization) and LDA(Linear Discriminants Analysis) mixture algorithm and the other is hippocampal neuron modeling and recognition simulation experiments confirm the each recognition rate, that are face changes, pose changes and low-level quality image. The results of experiments, we can compare a feature extraction and learning method proposed in this paper of any other methods, and we can confirm that the proposed method is superior to the existing method.

Technology Development Strategy of Piggyback Transportation System Using Topic Modeling Based on LDA Algorithm

  • Jun, Sung-Chan;Han, Seong-Ho;Kim, Sang-Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.261-270
    • /
    • 2020
  • In this study, we identify promising technologies for Piggyback transportation system by analyzing the relevant patent information. In order for this, we first develop the patent database by extracting relevant technology keywords from the pioneering research papers for the Piggyback flactcar system. We then employed textmining to identify the frequently referred words from the patent database, and using these words, we applied the LDA (Latent Dirichlet Allocation) algorithm in order to identify "topics" that are corresponding to "key" technologies for the Piggyback system. Finally, we employ the ARIMA model to forecast the trends of these "key" technologies for technology forecasting, and identify the promising technologies for the Piggyback system. with keyword search method the patent analysis. The results show that data-driven integrated management system, operation planning system and special cargo (especially fluid and gas) handling/storage technologies are identified to be the "key" promising technolgies for the future of the Piggyback system, and data reception/analysis techniques must be developed in order to improve the system performance. The proposed procedure and analysis method provides useful insights to develop the R&D strategy and the technology roadmap for the Piggyback system.

Interaction Between TCP and MAC-layer to Improve TCP Flow Performance over WLANs (유무선랜 환경에서 TCP Flow의 성능향상을 위한 MAC 계층과 TCP 계층의 연동기법)

  • Kim, Jae-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.99-111
    • /
    • 2008
  • In recent years, the needs for WLANs(Wireless Local Area Networks) technology which can access to Internet anywhere have been dramatically increased particularly in SOHO(Small Office Home Office) and Hot Spot. However, unlike wired networks, there are some unique characteristics of wireless networks. These characteristics include the burst packet losses due to unreliable wireless channel. Note that burst packet losses, which occur when the distance between the wireless station and the AP(Access Point) increase or when obstacles move temporarily between the station and AP, are very frequent in 802.11 networks. Conversely, due to burst packet losses, the performance of 802.11 networks are not always as sufficient as the current application require, particularly when they use TCP at the transport layer. The high packet loss rate over wireless links can trigger unnecessary execution of TCP congestion control algorithm, resulting in performance degradation. In order to overcome the limitations of WLANs environment, MAC-layer LDA(Loss Differentiation Algorithm)has been proposed. MAC-layer LDA prevents TCP's timeout by increasing CRD(Consecutive Retry Duration) higher than burst packet loss duration. However, in the wireless channel with high packet loss rate, MAC-layer LDA does not work well because of two reason: (a) If the CRD is lower than burst packet loss duration due to the limited increase of retry limit, end-to-end performance is degraded. (b) energy of mobile device and bandwidth utilization in the wireless link are wasted unnecessarily by Reducing the drainage speed of the network buffer due to the increase of CRD. In this paper, we propose a new retransmission module based on Cross-layer approach, called BLD(Burst Loss Detection) module, to solve the limitation of previous link layer retransmission schemes. BLD module's algorithm is retransmission mechanism at IEEE 802.11 networks and performs retransmission based on the interaction between retransmission mechanisms of the MAC layer and TCP. From the simulation by using ns-2(Network Simulator), we could see more improved TCP throughput and energy efficiency with the proposed scheme than previous mechanisms.

Design of a Real-time Algorithm for the Recognition of Speed Limit Signs Using DCT Coefficients (DCT 계수를 이용한 속도 제한 표지판 인식 실시간 알고리듬의 설계)

  • Kang, Byoung-Hwi;Cho, Han-Min;Kim, Jae-Young;Hwang, Sun-Young;Kim, Kwang-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1766-1774
    • /
    • 2010
  • This paper proposes a real-time algorithm of recognizing speed limit signs for intelligent vehicles. Contrary to previous works which use all the pixel values in the ROI (Region Of Interest) after preprocessing image at ROI and need a lot of operations, the proposed algorithm uses fewer DCT coefficients in the ROI as features of each image to reduce the number of operations. Choosing a portion of DCT coefficients which satisfy discriminant criteria for recognition, the proposed algorithm recognizes the speed limit signs using the information obtained in the selected features through LDA and MD. It selects one having the highest probability among the recognition results calculated by accumulating the classification results of consecutive individual frames. Experimental results show that the recognition rate for consecutive frames reaches to 100% with test images. When compared with the previous algorithm, the numbers of multiply and add operations are reduced by 58.6% and 38.3%, respectively.

Iris Recognition using Gabor Wavelet and Fuzzy LDA Method (가버 웨이블릿과 퍼지 선형 판별분석 기법을 이용한 홍채 인식)

  • Go Hyoun-Joo;Kwon Mann-Jun;Chun Myung-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1147-1155
    • /
    • 2005
  • This paper deals with Iris recognition as one of biometric techniques which is applied to identify a person using his/her behavior or congenital characteristics. The Iris of a human eye has a texture that is unique and time invariant for each individual. First, we obtain the feature vector from the 2D Iris pattern having a property of size invariant and using the fuzzy LDA which is further through four types of 2D Gabor wavelet. At the recognition process, we compute the similarity measure based on the correlation values. Here, since we use four different matching values obtained from four different directional Gabor wavelet and select the maximum value, it is possible to minimize the recognition error rate. To show the usefulness of the proposed algorithm, we applied it to a biometric database consisting of 300 Iris Patterns extracted from 50 subjects and finally got more higher than $90\%$ recognition rate.

Patents and Papers Trends of Solar-Photovoltaic(PV) Technology using LDA Algorithm (LDA알고리즘을 활용한 태양광 에너지 기술 특허 및 논문 동향 연구)

  • Lee, Jong-Ho;Lee, In-Soo;Jung, Kyeong-Soo;Chae, Byeong-Hoon;Lee, Joo-Yeoun
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.231-239
    • /
    • 2017
  • Solar energy is attracting attention as an alternative to fossil fuels. However, there was a lack of discussion on the overall research direction and future direction of research in technology development. In order to develop more effective technology, we analyzed and discussed the technology trend of solar energy using patent data and thesis data. As an analysis method, topics were selected by using topic modeling and text mining, the increase of included keywords was analyzed, and the direction of development of solar technology was analyzed. Research on solar power generation technology is expected to proceed steadily, and it is analyzed that intensive research will be done especially on high efficiency and high performance technology. Future studies could be conducted by adding overseas patent data and various paper data.

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

Improvement of recommendation system using attribute-based opinion mining of online customer reviews

  • Misun Lee;Hyunchul Ahn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.259-266
    • /
    • 2023
  • In this paper, we propose an algorithm that can improve the accuracy performance of collaborative filtering using attribute-based opinion mining (ABOM). For the experiment, a total of 1,227 online consumer review data about smartphone apps from domestic smartphone users were used for analysis. After morpheme analysis using the KKMA (Kkokkoma) analyzer and emotional word analysis using KOSAC, attribute extraction is performed using LDA topic modeling, and the topic modeling results for each weighted review are used to add up the ratings of collaborative filtering and the sentiment score. MAE, MAPE, and RMSE, which are statistical model performance evaluations that calculate the average accuracy error, were used. Through experiments, we predicted the accuracy of online customers' app ratings (APP_Score) by combining traditional collaborative filtering among the recommendation algorithms and the attribute-based opinion mining (ABOM) technique, which combines LDA attribute extraction and sentiment analysis. As a result of the analysis, it was found that the prediction accuracy of ratings using attribute-based opinion mining CF was better than that of ratings implementing traditional collaborative filtering.

Face Pose Transformation for Pose Invariant Face Recognition (포즈에 독립적인 얼굴 인식을 위한 얼굴 포즈 변환)

  • Park Hyun-Sun;Park Jong-Il;Kim Whoi-Yul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.570-576
    • /
    • 2005
  • Recognition of posed face is one of the most challenging problems in the field of face recognition. In this paper, as a preprocessing step for recognizing such faces, a method to transform non-frontal face images into frontal face images is proposed. The linear relationship between eigenfaces is utilized to obtain a pose transform matrix. The proposed method is verified with a well-known face recognition algorithm based on PCA/LDA. Compared to the conventional algorithm applied to the original posed face images, our experimental results indicated that the proposed method contributes to improve the recognition rate of such faces by $20\%$.

Boosting the Face Recognition Performance of Ensemble Based LDA for Pose, Non-uniform Illuminations, and Low-Resolution Images

  • Haq, Mahmood Ul;Shahzad, Aamir;Mahmood, Zahid;Shah, Ayaz Ali;Muhammad, Nazeer;Akram, Tallha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3144-3164
    • /
    • 2019
  • Face recognition systems have several potential applications, such as security and biometric access control. Ongoing research is focused to develop a robust face recognition algorithm that can mimic the human vision system. Face pose, non-uniform illuminations, and low-resolution are main factors that influence the performance of face recognition algorithms. This paper proposes a novel method to handle the aforementioned aspects. Proposed face recognition algorithm initially uses 68 points to locate a face in the input image and later partially uses the PCA to extract mean image. Meanwhile, the AdaBoost and the LDA are used to extract face features. In final stage, classic nearest centre classifier is used for face classification. Proposed method outperforms recent state-of-the-art face recognition algorithms by producing high recognition rate and yields much lower error rate for a very challenging situation, such as when only frontal ($0^{\circ}$) face sample is available in gallery and seven poses ($0^{\circ}$, ${\pm}30^{\circ}$, ${\pm}35^{\circ}$, and ${\pm}45^{\circ}$) as a probe on the LFW and the CMU Multi-PIE databases.