• Title/Summary/Keyword: artificial intelligence techniques

Search Result 689, Processing Time 0.028 seconds

Data Mining using Instance Selection in Artificial Neural Networks for Bankruptcy Prediction (기업부도예측을 위한 인공신경망 모형에서의 사례선택기법에 의한 데이터 마이닝)

  • Kim, Kyoung-jae
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.109-123
    • /
    • 2004
  • Corporate financial distress and bankruptcy prediction is one of the major application areas of artificial neural networks (ANNs) in finance and management. ANNs have showed high prediction performance in this area, but sometimes are confronted with inconsistent and unpredictable performance for noisy data. In addition, it may not be possible to train ANN or the training task cannot be effectively carried out without data reduction when the amount of data is so large because training the large data set needs much processing time and additional costs of collecting data. Instance selection is one of popular methods for dimensionality reduction and is directly related to data reduction. Although some researchers have addressed the need for instance selection in instance-based learning algorithms, there is little research on instance selection for ANN. This study proposes a genetic algorithm (GA) approach to instance selection in ANN for bankruptcy prediction. In this study, we use ANN supported by the GA to optimize the connection weights between layers and select relevant instances. It is expected that the globally evolved weights mitigate the well-known limitations of gradient descent algorithm of backpropagation algorithm. In addition, genetically selected instances will shorten the learning time and enhance prediction performance. This study will compare the proposed model with other major data mining techniques. Experimental results show that the GA approach is a promising method for instance selection in ANN.

  • PDF

Predicting Corporate Bankruptcy using Simulated Annealing-based Random Fores (시뮬레이티드 어니일링 기반의 랜덤 포레스트를 이용한 기업부도예측)

  • Park, Hoyeon;Kim, Kyoung-jae
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.155-170
    • /
    • 2018
  • Predicting a company's financial bankruptcy is traditionally one of the most crucial forecasting problems in business analytics. In previous studies, prediction models have been proposed by applying or combining statistical and machine learning-based techniques. In this paper, we propose a novel intelligent prediction model based on the simulated annealing which is one of the well-known optimization techniques. The simulated annealing is known to have comparable optimization performance to the genetic algorithms. Nevertheless, since there has been little research on the prediction and classification of business decision-making problems using the simulated annealing, it is meaningful to confirm the usefulness of the proposed model in business analytics. In this study, we use the combined model of simulated annealing and machine learning to select the input features of the bankruptcy prediction model. Typical types of combining optimization and machine learning techniques are feature selection, feature weighting, and instance selection. This study proposes a combining model for feature selection, which has been studied the most. In order to confirm the superiority of the proposed model in this study, we apply the real-world financial data of the Korean companies and analyze the results. The results show that the predictive accuracy of the proposed model is better than that of the naïve model. Notably, the performance is significantly improved as compared with the traditional decision tree, random forests, artificial neural network, SVM, and logistic regression analysis.

The Malware Detection Using Deep Learning based R-CNN (딥러닝 기반의 R-CNN을 이용한 악성코드 탐지 기법)

  • Cho, Young-Bok
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1177-1183
    • /
    • 2018
  • Recent developments in machine learning have attracted a lot of attention for techniques such as machine learning and deep learning that implement artificial intelligence. In this paper, binary malicious code using deep learning based R-CNN is imaged and the feature is extracted from the image to classify the family. In this paper, two steps are used in deep learning to image malicious code using CNN. And classify the characteristics of the family of malicious codes using R-CNN. Generate malicious code as an image, extract features, classify the family, and automatically classify the evolution of malicious code. The detection rate of the proposed method is 93.4% and the accuracy is 98.6%. In addition, the CNN processing speed for image processing of malicious code is 23.3 ms, and the R-CNN processing speed is 4ms to classify one sample.

Study on object detection and distance measurement functions with Kinect for windows version 2 (키넥트(Kinect) 윈도우 V2를 통한 사물감지 및 거리측정 기능에 관한 연구)

  • Niyonsaba, Eric;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1237-1242
    • /
    • 2017
  • Computer vision is coming more interesting with new imaging sensors' new capabilities which enable it to understand more its surrounding environment by imitating human vision system with artificial intelligence techniques. In this paper, we made experiments with Kinect camera, a new depth sensor for object detection and distance measurement functions, most essential functions in computer vision such as for unmanned or manned vehicles, robots, drones, etc. Therefore, Kinect camera is used here to estimate the position or the location of objects in its field of view and measure the distance from them to its depth sensor in an accuracy way by checking whether that the detected object is real object or not to reduce processing time ignoring pixels which are not part of real object. Tests showed promising results with such low-cost range sensor, Kinect camera which can be used for object detection and distance measurement which are fundamental functions in computer vision applications for further processing.

Mutual Authentication Scheme between Multiple Instances for Secure Data Share of Virtualized Environment (가상화 환경의 안전한 데이터 공유를 위한 다중 인스턴스간 상호인증 기법)

  • Choi, Dohyeon;Kim, Sangkun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.83-94
    • /
    • 2016
  • Recent cloud, big data, there is a problem for the architectural security vulnerability to the server platforms of various fields such as artificial intelligence occurs consistently, but using the virtualization technology. In addition, most secure virtualization technology is known to be dependent on the type is limited and the platform provider. This paper presents a method for mutual authentication for secure data between multiple instances of a shared virtualized environment. The proposed method was designing a security architecture in consideration of the mutual authentication between multiple independent instances, and enhance the safety of a security protocol for sharing data by applying a key chain techniques. Performance analysis results and the existing security architecture demonstrated that protect each virtualized instances of the session and the other way, a compliance effectiveness for each instance of the mutual authentication process.

A Study on a Historical Context of the Design Methodology Movement With an Emphasis on Its relations to Cyborg Sciences (디자인 방법론의 역사적 맥락에 대한 연구 - 사이보그 과학과의 관계를 중심으로 -)

  • Park, Hae-Cheon
    • Archives of design research
    • /
    • v.19 no.5 s.67
    • /
    • pp.105-118
    • /
    • 2006
  • From a general perspective of design history, the design methodology movement is interpreted in relations to the rationalistic and universal characteristics of modernism. This essay explores a historical context of the movement, focusing on its discursive and practical relations to cyborg sciences that has been shaped by the research and development of military technology in Cold War America. The formation of such relations could be largely devided into two processes: One is the process in which methods and techniques of system science that included operation research, system analysis, and system engineering, were appropriated by the first generation methodologists who had tried to establish "the science of design", and the other is the one in which Herbert Simon's studies on problem solving and artificial intelligence became profoundly embedded in theoretical frameworks of design methodology after the first generation. Examining such processes critically, this essay argues that a design process became finally redefined by the third generation methodology, as a 'feedback loop' of circulation of production and consumption, that is, an apparatus of information-processing which gives a concrete form to the "invisible hand" of markets.

  • PDF

Comparison of Learning Techniques of LSTM Network for State of Charge Estimation in Lithium-Ion Batteries (리튬 이온 배터리의 충전 상태 추정을 위한 LSTM 네트워크 학습 방법 비교)

  • Hong, Seon-Ri;Kang, Moses;Kim, Gun-Woo;Jeong, Hak-Geun;Beak, Jong-Bok;Kim, Jong-Hoon
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1328-1336
    • /
    • 2019
  • To maintain the safe and optimal performance of batteries, accurate estimation of state of charge (SOC) is critical. In this paper, Long short-term memory network (LSTM) based on the artificial intelligence algorithm is applied to address the problem of the conventional coulomb-counting method. Different discharge cycles are concatenated to form the dataset for training and verification. In oder to improve the quality of input data for learning, preprocessing was performed. In addition, we compared learning ability and SOC estimation performance according to the structure of LSTM model and hyperparameter setup. The trained model was verified with a UDDS profile and achieved estimated accuracy of RMSE 0.82% and MAX 2.54%.

Intelligent System Design for Knowledge Representation and Interpretation of Human Cognition (인간 인지 지식의 표현과 해석을 위한 지능형 시스템 설계 방법)

  • Joo, Young-Do
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.3
    • /
    • pp.11-21
    • /
    • 2011
  • The development of computer-based modeling system has allowed the operationalization of cognitive science issues. Human cognition has become one of most interesting research subjects in artificial intelligence to emulate human mentality and behavior. This paper introduces a methodology well-suited for designing the intelligent system of human cognition. The research investigates how to elicit and represent cognitive knowledge obtained from individual city-dwellers through the application of fuzzy relational theory to personal construct theory. Crucial to this research is to implement formally and process interpretatively the psychological cognition of urbanites who interact with their environment in order to offer useful advice on urban problem. What is needed is a techniques to analyze cognitive structures which are embodiments of this perceptive knowledge for human being.

A Study on the Priority of 『Personal Information Safety Measure』 Using AHP Method: Focus on the Defferences between Financial Company and Consignee (AHP 기법을 이용한 금융회사 『개인정보의 안전성 확보조치 기준』 우선순위에 관한 연구: 금융회사 위·수탁자 간 인식 차이를 중심으로)

  • KIM, Seyoung;KIM, Inseok
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.4
    • /
    • pp.31-48
    • /
    • 2019
  • To survive in the trend of the fourth industrial revolution, companies are putting a lot of attention and effort into personalization services using the latest technologies such as big data, artificial intelligence and the Internet of Things, while entrusting third parties to handle personal information on the grounds of work efficiency, expertise and cost reduction. In such an environment, consignors need to check trustees on a more effective and reasonable basis to ensure personal information safety for trustees. This study used AHP techniques to derive the importance and priority of each item of "Personal Information Safety Assurance Measures" for financial companies and trustees, and objectively compared and analyzed differences in perceptions of importance between financial institutions and trustees. Based on this, the company recognizes the difference between self-inspection of financial institutions and inspection of trustees and presents policy grounds and implications for applying differentiated inspection standards that reflect the weights appropriate for the purpose.

An Experimental Evaluation of Box office Revenue Prediction through Social Bigdata Analysis and Machine Learning (소셜 빅데이터 분석과 기계학습을 이용한 영화흥행예측 기법의 실험적 평가)

  • Chang, Jae-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.167-173
    • /
    • 2017
  • With increased interest in the fourth industrial revolution represented by artificial intelligence, it has been very active to utilize bigdata and machine learning techniques in almost areas of society. Also, such activities have been realized by development of forecasting systems in various applications. Especially in the movie industry, there have been numerous attempts to predict whether they would be success or not. In the past, most of studies considered only the static factors in the process of prediction, but recently, several efforts are tried to utilize realtime social bigdata produced in SNS. In this paper, we propose the prediction technique utilizing various feedback information such as news articles, blogs and reviews as well as static factors of movies. Additionally, we also experimentally evaluate whether the proposed technique could precisely forecast their revenue targeting on the relatively successful movies.