• 제목/요약/키워드: frequent pattern

검색결과 610건 처리시간 0.025초

음향적 요소분석과 DRNN을 이용한 음성신호의 감성 인식 (Analyzing the Acoustic Elements and Emotion Recognition from Speech Signal Based on DRNN)

  • 심귀보;박창현;주영훈
    • 한국지능시스템학회논문지
    • /
    • 제13권1호
    • /
    • pp.45-50
    • /
    • 2003
  • 최근 인간형 로봇에 대한 개발이 괄목할 만한 성장을 이루고 있고, 친근한 로봇의 개발에 중요한 역할을 담당하는 것으로써 감성/감정의 인식이 필수적이라는 인식이 확산되고 있나. 본 논문은 음성의 감정인식에 있어 가장 큰 부분을 차지하는 피치의 패턴을 인식하여 감정을 분류/인식하는 시뮬레이터의 개발과 시뮬레이션 결과를 나타낸다. 또한, 피치뿐 아니라 음향학적으로 날카로움, 낮음 등의 요소를 분류의 기준으로 포함시켜서 좀더 신뢰성 있는 인식을 할 수 있음을 보인다. 주파수와 음성의 다양한 분석을 통하여, 음향적 요소와 감성의 상관관계에 대한 분석이 선행되어야 하므로, 본 논문은 사람들의 음성을 녹취하여 분석하였다 시뮬레이터의 내부 구조로는 음성으로부터 피치를 추출하는 부분과 피치의 패턴을 학습시키는 DRNN 부분으로 이루어져 있다.

부산지역 청소년의 스트리트 패션 경향 분석 (An Analysis on the Street Fashion Trend of the Adolescent in Pusan)

  • 노경혜;이경희
    • 한국의류산업학회지
    • /
    • 제4권2호
    • /
    • pp.176-187
    • /
    • 2002
  • The aim of this research is to establish basic materials for fashion merchandising by observing the street fashion of the juveniles and by analyzing their wearing, coordination and fashion trend. We have taken the photograph of the street fashion of 202 male teenagers and 265 female teenagers in Busan, and analyzed in the category of style, item, color, pattern, materials, hair style, shoes and accessories. We have concluded that the most frequent items were shirts (male), turtle neck (female) and jeans. The main style was casual just as jumper-look, sweater-look, gardigan-look. The typical female fashions that were hip-hop-look, twin neat-look, trench coat-look, were more various than male. For the color coordination, contrast color coordination was more dominant than similarity color coordination. Dominant patterns were solid, and also check and stripe patterns were frequently found in upper garment. The representative materials were soft for upper garment, and hard for trousers. Male teenagers prefer middle-length hair style and female teenagers prefer long hair style. The juveniles in Busan are wearing sports shoes and leather shoes in similar frequency. Their favorite accessories are bag, muffler and hat.

세침흡인 검사로 진단된 갑상선 유두상 암종의 세포학적 소견 (Cytologic Feature of Papillary Carcinoma of the Thyroid)

  • 박정희;장희진;강경하;손진희;서정일
    • 대한세포병리학회지
    • /
    • 제2권2호
    • /
    • pp.111-118
    • /
    • 1991
  • Fine needle aspiration biopsy cytology (FNA) is an important diagnostic tool in the management of thyroid nodule. Especially, papillary carcinoma of the thyroid has distinct morphologic features that allow a definite cytologic diagnosis with high degree of accuracy. We examined the characteristic cytologic features of 57 cases of papillary carcinoma of the thyroid, and their frequency and diagnostic significance were evaluated. The results obtained are summerized as follows; 1. In pattern of cellular arrangement, papillary structure with or without stroma is predominant feature (96%). 2. In individual cell morphology, grooved nuclei (95%), intranuclear cytoplasmic invagination (89%) and nuclear lobulation (74%) are most frequent and important cytologic findings. 3. Chromatin pattern is usually fine. Coarse chromatin is infrequent finding (37%). Nucleoli are inconspicuous. Cytoplasm us plump and distinctly eosinophilic. 4. Psammoma bodies are identified only in 4 cases (7%), but they are considered as helpful diagnostic features. 5. There are other associated findings including multinucleated giant cells (51%), macrophages (37%) and cystic degeneration (16%).

  • PDF

동적 가중치 기반의 연관 서비스 탐사 기법 (An associative service mining based on dynamic weight)

  • 황정희
    • 디지털콘텐츠학회 논문지
    • /
    • 제17권5호
    • /
    • pp.359-366
    • /
    • 2016
  • 유비쿼터스 환경에서 사용자에게 유용한 서비스를 제공하기 위해서는 시간과 공간을 기반으로 사용자의 행동과 선호 패턴을 고려하여 가장 적합한 데이터를 처리할 수 있는 방법이 필요하다. 실세계에서 사용자의 관심은 시간이 지남에 따라 변화할 수 있다. 그러므로 서비스 관심도의 변화를 중요도에 반영하여 정보를 추출할 수 있는 방법이 필요하다. 이 논문에서는 사용자에게 필요한 서비스 정보를 온톨로지로 설계하고 시간에 따라 동적으로 변화하는 사용자의 서비스 이용 패턴이나 데이터의 중요도를 동적 가중치로 표현하여 빈발 패턴을 찾는 방법을 제안한다. 이 논문에서 제안하는 동적 가중치를 고려하는 빈발 서비스 패턴 마이닝 기법은 시간의 변화에 따라 필요로 하는 사용자의 관심을 서비스의 중요도로 반영하므로 실시간의 최적화된 서비스 제공이 가능하다.

여성복 텍스타일디자인의 특성과 감성에 관한 연구 (Characteristics of Domestic Textile Deigns and Trend Sensibility for Women's Apparel)

  • 나영주;권오경
    • 한국의류산업학회지
    • /
    • 제2권3호
    • /
    • pp.198-204
    • /
    • 2000
  • This study aimed to analyze the characteristics of domestic textile designs for miss and madam apparel and to find out the trend sensibility felt by young female judge according to the product year and apparel target age. Textile designs of 170 pictures of 1999 and 1994-1995 were collected at 4 shopping malls and from consumers, and results are as follows; As the sources of textile design were 'nature', 'imagination', and 'combination' used in the order of frequence, but the sources appeared more diverse in 1999 than in 1994-1995. The interpretation techniques expressed most often were 'stylized', 'geometry', and the mast frequent arrangements were 'all over', and the second was '4-way' in 19941995, '2-way' in 1999, that is, the arrangement were different according to product year. The trend sensibility were varying to the target age and product year.1999 apparel products were felt more 'sophisticated', 'contemporary', and 'sporty' if they were the textile designs for miss, while 1994-1995 products were more 'sophisticated', 'contemparary', and 'sporty' if for madam.

  • PDF

제어데이터 중복전송기법에 관한 연구 (The Research about a Control Data Duplication Transmission Technique)

  • 이영주;강순덕
    • 정보학연구
    • /
    • 제9권4호
    • /
    • pp.57-63
    • /
    • 2006
  • The intelligent elder brother groove network robot service the new broadband presence line is conversionce application service. Robot control data transmission hazard UDP packet of the remote control data which stands duplication necessary to transmit. TCP the error ratio to be high qualitative recording transmission pattern it of the transmission unit and is irregular the distance is distant to show and also the transmission lag is visible increases. The recording packet drop whose UDP degree error ratio will be high is frequent and does not arrive packet little by little increases is a possibility of knowing in the transmission unit. The technique which it proposes with traffic pattern of the transmission unit is visible the transfer characteristic of the same shape from 1% packet error ratio degree. The effective transmission technique of the robot control data which puts a base in UDP protocols was proposed from the present paper. Following research it leads and it follows the duplication transmission number of time in error rate of radio link and it was thought all that controls petty the research of the mechanism which progresses is necessary.

  • PDF

아토피 환자의 치료선택 경향에 대한 설문연구 (Pattern of Treatment Choice for Atopic Dermatitis by Child's Parents)

  • 손창규
    • 한방안이비인후피부과학회지
    • /
    • 제27권1호
    • /
    • pp.37-44
    • /
    • 2014
  • Objective : This study aimed to survey the pattern of the treatment choice for atopic dermatitis. Methods : The questionnaire-based survey was conducted from the parents of 310 patients (median age 9 years, range 2 to 21 year, 158 male and 152 female) with atopic dermatitis. The questionnaire was consisted of 11 questions for the demographic information including treatment choice for atopic dermatitis. Results : The most agonizing factor of atopic dermatitis was pruritus, while the most frequent regions were arms and legs. Conventional therapy (60.3%), folk-remedy (23.9%) and treatment of Korean medicine (15.8%) were the preference of treatment by patients. Over half answers (58.4%) were negative for the current treatments, and the main complains was the absence of radical therapy (26.5%), insufficient information (20.6%), and expensive cost of treatments (19.0%), respectively. Conclusion : This study may provide the important information for the general prospective of parents of patients with atopic dermatitis, which is helpful to develop the Korean medicine-derived therapeutics for atopic dermatitis.

A Review of Machine Learning Algorithms for Fraud Detection in Credit Card Transaction

  • Lim, Kha Shing;Lee, Lam Hong;Sim, Yee-Wai
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.31-40
    • /
    • 2021
  • The increasing number of credit card fraud cases has become a considerable problem since the past decades. This phenomenon is due to the expansion of new technologies, including the increased popularity and volume of online banking transactions and e-commerce. In order to address the problem of credit card fraud detection, a rule-based approach has been widely utilized to detect and guard against fraudulent activities. However, it requires huge computational power and high complexity in defining and building the rule base for pattern matching, in order to precisely identifying the fraud patterns. In addition, it does not come with intelligence and ability in predicting or analysing transaction data in looking for new fraud patterns and strategies. As such, Data Mining and Machine Learning algorithms are proposed to overcome the shortcomings in this paper. The aim of this paper is to highlight the important techniques and methodologies that are employed in fraud detection, while at the same time focusing on the existing literature. Methods such as Artificial Neural Networks (ANNs), Support Vector Machines (SVMs), naïve Bayesian, k-Nearest Neighbour (k-NN), Decision Tree and Frequent Pattern Mining algorithms are reviewed and evaluated for their performance in detecting fraudulent transaction.

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

  • Goo, Young-Hoon;Shim, Kyu-Seok;Baek, Ui-Jun;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4310-4330
    • /
    • 2020
  • With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command-oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.

High Utility Itemset Mining by Using Binary PSO Algorithm with V-shaped Transfer Function and Nonlinear Acceleration Coefficient Strategy

  • Tao, Bodong;Shin, Ok Keun;Park, Hyu Chan
    • Journal of information and communication convergence engineering
    • /
    • 제20권2호
    • /
    • pp.103-112
    • /
    • 2022
  • The goal of pattern mining is to identify novel patterns in a database. High utility itemset mining (HUIM) is a research direction for pattern mining. This is different from frequent itemset mining (FIM), which additionally considers the quantity and profit of the commodity. Several algorithms have been used to mine high utility itemsets (HUIs). The original BPSO algorithm lacks local search capabilities in the subsequent stage, resulting in insufficient HUIs to be mined. Compared to the transfer function used in the original PSO algorithm, the V-shaped transfer function more sufficiently reflects the probability between the velocity and position change of the particles. Considering the influence of the acceleration factor on the particle motion mode and trajectory, a nonlinear acceleration strategy was used to enhance the search ability of the particles. Experiments show that the number of mined HUIs is 73% higher than that of the original BPSO algorithm, which indicates better performance of the proposed algorithm.