• Title/Summary/Keyword: goal detection

Search Result 292, Processing Time 0.031 seconds

Classification of Unstructured Customer Complaint Text Data for Potential Vehicle Defect Detection (잠재적 차량 결함 탐지를 위한 비정형 고객불만 텍스트 데이터 분류)

  • Ju Hyun Jo;Chang Su Ok;Jae Il Park
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.2
    • /
    • pp.72-81
    • /
    • 2023
  • This research proposes a novel approach to tackle the challenge of categorizing unstructured customer complaints in the automotive industry. The goal is to identify potential vehicle defects based on the findings of our algorithm, which can assist automakers in mitigating significant losses and reputational damage caused by mass claims. To achieve this goal, our model uses the Word2Vec method to analyze large volumes of unstructured customer complaint data from the National Highway Traffic Safety Administration (NHTSA). By developing a score dictionary for eight pre-selected criteria, our algorithm can efficiently categorize complaints and detect potential vehicle defects. By calculating the score of each complaint, our algorithm can identify patterns and correlations that can indicate potential defects in the vehicle. One of the key benefits of this approach is its ability to handle a large volume of unstructured data, which can be challenging for traditional methods. By using machine learning techniques, we can extract meaningful insights from customer complaints, which can help automakers prioritize and address potential defects before they become widespread issues. In conclusion, this research provides a promising approach to categorize unstructured customer complaints in the automotive industry and identify potential vehicle defects. By leveraging the power of machine learning, we can help automakers improve the quality of their products and enhance customer satisfaction. Further studies can build upon this approach to explore other potential applications and expand its scope to other industries.

Detection of Abnormal Traffic by Pre-Inflow Agent (사전유입 에이전트가 발생하는 이상트래픽 탐지 방안)

  • Cho, Young Min;Kwon, Hun Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1169-1177
    • /
    • 2018
  • Modern society is a period of rapid digital transformation. This digital-centric business proliferation offers convenience and efficiency to businesses and individuals, but cyber threats are increasing. In particular, cyber attacks are becoming more and more intelligent and precise, and various attempts have been made to prevent these attacks from being discovered. Therefore, it is increasingly difficult to respond to such attacks. According to the cyber kill chain concept, the attacker penetrates to achieve the goal in several stages. We aim to detect one of these stages and neutralize the attack. In this paper, we propose a method to detect anomalous traffic caused by an agent attacking an external attacker, assuming that an agent executing a malicious action has been introduced in advance due to various reasons such as a system error or a user's mistake.

Adaptive Intrusion Detection Algorithm based on Artificial Immune System (인공 면역계를 기반으로 하는 적응형 침입탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.169-174
    • /
    • 2003
  • The trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online, or an offline internet, so it is expected to make a problem more and more. The goal of intrusion detection is to identify unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators in real time. In fact, the general security system based on Internet couldn't cope with the attack properly, if ever. other regular systems have depended on common vaccine softwares to cope with the attack. But in this paper, we will use the positive selection and negative selection mechanism of T-cell, which is the biologically distributed autonomous system, to develop the self/nonself recognition algorithm and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. For making it come true, we will apply AIS to the network environment, which is a computer security system.

Quick Diagnosis of Short Circuit Faults in Cascaded H-Bridge Multilevel Inverters using FPGA

  • Ouni, Saeed;Zolghadri, Mohammad Reza;Rodriguez, Jose;Shahbazi, Mahmoud;Oraee, Hashem;Lezana, Pablo;Schmeisser, Andres Ulloa
    • Journal of Power Electronics
    • /
    • v.17 no.1
    • /
    • pp.56-66
    • /
    • 2017
  • Fast and accurate fault detection is the primary step and one of the most important tasks in fault tolerant converters. In this paper, a fast and simple method is proposed to detect and diagnosis the faulty cell in a cascaded H-bridge multilevel inverter under a short circuit fault. In this method, the reference voltage is calculated using switching control pulses and DC-Link voltages. The comparison result of the output voltage and the reference voltage is used in conjunction with active cell pulses to detect the faulty cell. To achieve this goal, the cell which is active when the Fault signal turns to "0" is detected as the faulty cell. Furthermore, consideration of generating the active cell pulses is completely described. Since the main advantage of this method is its simplicity, it can be easily implemented in a programmable digital device. Experimental results obtained with an 11-level inverter prototype confirm the effectiveness of the proposed fault detection technique. In addition, they show that the diagnosis method is unaffected by variations of the modulation index.

Shape Based Framework for Recognition and Tracking of Texture-free Objects for Submerged Robots in Structured Underwater Environment (수중로봇을 위한 형태를 기반으로 하는 인공표식의 인식 및 추종 알고리즘)

  • Han, Kyung-Min;Choi, Hyun-Taek
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.6
    • /
    • pp.91-98
    • /
    • 2011
  • This paper proposes an efficient and accurate vision based recognition and tracking framework for texture free objects. We approached this problem with a two phased algorithm: detection phase and tracking phase. In the detection phase, the algorithm extracts shape context descriptors that used for classifying objects into predetermined interesting targets. Later on, the matching result is further refined by a minimization technique. In the tracking phase, we resorted to meanshift tracking algorithm based on Bhattacharyya coefficient measurement. In summary, the contributions of our methods for the underwater robot vision are four folds: 1) Our method can deal with camera motion and scale changes of objects in underwater environment; 2) It is inexpensive vision based recognition algorithm; 3) The advantage of shape based method compared to a distinct feature point based method (SIFT) in the underwater environment with possible turbidity variation; 4) We made a quantitative comparison of our method with a few other well-known methods. The result is quite promising for the map based underwater SLAM task which is the goal of our research.

A Fuzzy Logic-Based False Report Detection Method in Wireless Sensor Networks (무선 센서 네트워크에서 퍼지 로직 기반의 허위 보고서 탐지 기법)

  • Kim, Mun-Su;Lee, Hae-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.27-34
    • /
    • 2008
  • Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in the sensor network without adequate protection may be compromised by adversaries. Such compromised nodes are vulnerable to the attacks like false reports injection attacks and false data injection attacks on legitimate reports. In false report injection attacks, an adversary injects false report into the network with the goal of deceiving the sink or the depletion of the finite amount of energy in a battery powered network. In false data injection attacks on legitimate reports, the attacker may inject a false data for every legitimate report. To address such attacks, the probabilistic voting-based filtering scheme (PVFS) has been proposed by Li and Wu. However, each cluster head in PVFS needs additional transmission device. Therefore, this paper proposes a fuzzy logic-based false report detection method (FRD) to mitigate the threat of these attacks. FRD employs the statistical en-route filtering scheme as a basis and improves upon it. We demonstrate that FRD is efficient with respect to the security it provides, and allows a tradeoff between security and energy consumption, as shown in the simulation.

  • PDF

A New Depth and Disparity Visualization Algorithm for Stereoscopic Camera Rig

  • Ramesh, Rohit;Shin, Heung-Sub;Jeong, Shin-Il;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.6
    • /
    • pp.645-650
    • /
    • 2010
  • In this paper, we present the effect of binocular cues which plays crucial role for the visualization of a stereoscopic or 3D image. This study is useful in extracting depth and disparity information by image processing technique. A linear relation between the object distance and the image distance is presented to discuss the cause of cybersickness. In the experimental results, three dimensional view of the depth map between the 2D images is shown. A median filter is used to reduce the noises available in the disparity map image. After the median filter, two filter algorithms such as 'Gabor' filter and 'Canny' filter are tested for disparity visualization between two images. The 'Gabor' filter is to estimate the disparity by texture extraction and discrimination methods of the two images, and the 'Canny' filter is used to visualize the disparity by edge detection of the two color images obtained from stereoscopic cameras. The 'Canny' filter is better choice for estimating the disparity rather than the 'Gabor' filter because the 'Canny' filter is much more efficient than 'Gabor' filter in terms of detecting the edges. 'Canny' filter changes the color images directly into color edges without converting them into the grayscale. As a result, more clear edges of the stereo images as compared to the edge detection by 'Gabor' filter can be obtained. Since the main goal of the research is to estimate the horizontal disparity of all possible regions or edges of the images, thus the 'Canny' filter is proposed for decipherable visualization of the disparity.

Estimation of Carbon Dioxide Stocks in Forest Using Airborne LiDAR Data (항공 LiDAR 데이터를 이용한 산림의 이산화탄소 고정량 추정)

  • Lee, Sang-Jin;Choi, Yun-Soo;Yoon, Ha-Su
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.3
    • /
    • pp.259-268
    • /
    • 2012
  • This paper aims to estimate the carbon dioxide stocks in forests using airborne LiDAR data with a density of approximate 4.4 points per meter square. To achieve this goal, a processing chain consisting of bare earth Digital Terrain Model(DTM) extraction and individual tree top detection has been developed. As results of this experiment, the reliable DTM with type-II errors of 3.32% and tree positions with overall accuracy of 66.26% were extracted in the study area. The total estimated carbon dioxide stocks in the study area using extracted 3-D forests structures well suited with the traditional method by field measurements upto 7.2% error level. This results showed that LiDAR technology is highly valuable for replacing the existing forest resources inventory.

A New Efficient Group-wise Spatial Multiplexing Design for Closed-Loop MIMO Systems (폐루프 다중입출력 시스템을 위한 효율적인 그룹별 공간 다중화 기법 설계)

  • Moon, Sung-Myun;Lee, Heun-Chul;Kim, Young-Tae;Lee, In-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4A
    • /
    • pp.322-331
    • /
    • 2010
  • This paper introduces a new efficient design scheme for spatial multiplexing (SM) systems over closed loop multiple-input multiple-output (MIMO) wireless channels. Extending the orthogonalized spatial multiplexing (OSM) scheme which was developed recently for transmitting two data streams, we propose a new SM scheme where a larger number of data streams can be supported. To achieve this goal, we partition the data streams into several subblocks and execute the block-diagonalization process at the receiver. The proposed scheme still guarantees single-symbol maximum likelihood (ML) detection with small feedback information. Simulation results verify that the proposed scheme achieves a huge performance gain at a bit error rate (BER) of $10^{-4}$ over conventional closed-loop schemes based on minimum mean-square error (MSE) or bit error rate (BER) criterion. We also show that an additional 2.5dB gain can be obtained by optimizing the group selection with extra feedback information.

The efficacy of the reverse contrast mode in digital radiography for the detection of proximal dentinal caries

  • Miri, Shimasadat;Mehralizadeh, Sandra;Sadri, Donya;Motamedi, Mahmood Reza Kalantar;Soltani, Parisa
    • Imaging Science in Dentistry
    • /
    • v.45 no.3
    • /
    • pp.141-145
    • /
    • 2015
  • Purpose: This study evaluated the diagnostic accuracy of the reverse contrast mode in intraoral digital radiography for the detection of proximal dentinal caries, in comparison with the original digital radiographs. Materials and Methods: Eighty extracted premolars with no clinically apparent caries were selected, and digital radiographs of them were taken separately in standard conditions. Four observers examined the original radiographs and the same radiographs in the reverse contrast mode with the goal of identifying proximal dentinal caries. Microscopic sections $5{\mu}m$ in thickness were prepared from the teeth in the mesiodistal direction. Four slides prepared from each sample used as the diagnostic gold standard. The data were analyzed using SPSS (${\alpha}=0.05$). Results: Our results showed that the original radiographs in order to identify proximal dentinal caries had the following values for sensitivity, specificity, positive predictive value, negative predictive value, and accuracy, respectively: 72.5%, 90%, 87.2%, 76.5%, and 80.9%. For the reverse contrast mode, however, the corresponding values were 63.1%, 89.4%, 87.1%, 73.5%, and 78.8%, respectively. The sensitivity of original digital radiograph for detecting proximal dentinal caries was significantly higher than that of reverse contrast mode (p<0.05). However, no statistically significant differences were found regarding specificity, positive predictive value, negative predictive value, or accuracy (p>0.05). Conclusion: The sensitivity of the original digital radiograph for detecting proximal dentinal caries was significantly higher than that of the reversed contrast images. However, no statistically significant differences were found between these techniques regarding specificity, positive predictive value, negative predictive value, or accuracy.