• Title/Summary/Keyword: intelligent classification

Search Result 915, Processing Time 0.021 seconds

Movement Pattern Recognition of Medaka for an Insecticide: A Comparison of Decision Tree and Neural Network

  • Kim, Youn-Tae;Park, Dae-Hoon;Kim, Sung-Shin
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.1
    • /
    • pp.58-65
    • /
    • 2007
  • Behavioral sequences of the medaka (Oryzias latipes) were continuously investigated through an automatic image recognition system in response to medaka treated with the insecticide and medaka not treated with the insecticide, diazinon (0.1 mg/l) during a 1 hour period. The observation of behavior through the movement tracking program showed many patterns of the medaka. After much observation, behavioral patterns were divided into four basic patterns: active-smooth, active-shaking, inactive-smooth, and inactive-shaking. The "smooth" and "shaking" patterns were shown as normal movement behavior. However, the "shaking" pattern was more frequently observed than the "smooth" pattern in medaka specimens that were treated with insecticide. Each pattern was classified using classification methods after the feature choice. It provides a natural way to incorporate prior knowledge from human experts in fish behavior and contains the information in a logical expression tree. The main focus of this study was. to determine whether the decision tree could be useful for interpreting and classifying behavior patterns of the medaka.

A Systematic Approach to Improve Fuzzy C-Mean Method based on Genetic Algorithm

  • Ye, Xiao-Yun;Han, Myung-Mook
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.13 no.3
    • /
    • pp.178-185
    • /
    • 2013
  • As computer technology continues to develop, computer networks are now widely used. As a result, there are many new intrusion types appearing and information security is becoming increasingly important. Although there are many kinds of intrusion detection systems deployed to protect our modern networks, we are constantly hearing reports of hackers causing major disruptions. Since existing technologies all have some disadvantages, we utilize algorithms, such as the fuzzy C-means (FCM) and the support vector machine (SVM) algorithms to improve these technologies. Using these two algorithms alone has some disadvantages leading to a low classification accuracy rate. In the case of FCM, self-adaptability is weak, and the algorithm is sensitive to the initial value, vulnerable to the impact of noise and isolated points, and can easily converge to local extrema among other defects. These weaknesses may yield an unsatisfactory detection result with a low detection rate. We use a genetic algorithm (GA) to help resolve these problems. Our experimental results show that the combined GA and FCM algorithm's accuracy rate is approximately 30% higher than that of the standard FCM thereby demonstrating that our approach is substantially more effective.

A Research on the Intelligent E-mail System Using User Patterns (사용자 패턴을 이용한 지능형 e-메일 시스템의 연구)

  • Lim Yang-Won;Lim Han-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.64-71
    • /
    • 2006
  • Electronic mail (E-mail) is an integral part of communication for the recent Internet users. However, e-mail has also come to serve as a means to support flood of unwanted spam mails and junk mails having bad purposes. This paper was conducted in order to develop an intelligent e-mail system using user behavior pattern that can prevent these unnecessary information and enable the user to enjoy communication via e-mail in a cleaner environment. The concentrated analysis of the user behavior in terms of using e-mail functions has resulted in better classification between unnecessary and necessary information, thereby facilitating faster disposal of spam mails.

  • PDF

Kernelized Structure Feature for Discriminating Meaningful Table from Decorative Table (장식 테이블과 의미 있는 테이블 식별을 위한 커널 기반의 구조 자질)

  • Son, Jeong-Woo;Go, Jun-Ho;Park, Seong-Bae;Kim, Kweon-Yang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.5
    • /
    • pp.618-623
    • /
    • 2011
  • This paper proposes a novel method to discriminate meaningful tables from decorative one using a composite kernel for handling structural information of tables. In this paper, structural information of a table is extracted with two types of parse trees: context tree and table tree. A context tree contains structural information around a table, while a table tree presents structural information within a table. A composite kernel is proposed to efficiently handle these two types of trees based on a parse tree kernel. The support vector machines with the proposed kernel dised kuish meaningful tables from the decorative ones with rich structural information.

Learning Tagging Ontology from Large Tagging Data (대규모 태깅 데이터를 이용한 태깅 온톨로지 학습)

  • Kang, Sin-Jae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.157-162
    • /
    • 2008
  • This paper presents a learning method of tagging ontology using large tagging data such as a folksonomy, which stands for classification structure informally created by the people. There is no common agreement about the semantics of a tagging, and most social web sites internally use different methods to represent tagging information, obstructing interoperability between sites and the automated processing by software agents. To solve this problem, we need a tagging ontology, defined by analyzing intrinsic attributes of a tagging. Through several machine learning for tagging data, tag groups and similar user groups are extracted, and then used to learn the tagging ontology. A recommender system adopting the tagging ontology is also suggested as an applying field.

An Improved Bayesian Spam Mail Filter based on Ch-square Statistics (카이제곱 통계량을 이용한 개선된 베이지안 스팸메일 필터)

  • Kim Jin-Sang;Choe Sang-Yeol
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.04a
    • /
    • pp.403-414
    • /
    • 2005
  • Most of the currently used spam-filters are based on a Bayesian classification technique, where some serious problems occur such as a limited precision/recall rate and the false positive error. This paper addresses a solution to the problems using a modified Bayesian classifier based on chi-square statistics. The resulting spam-filter is more accurate and flexible than traditional Bayesian spam-filters and can be a personalized one providing some parameters when the filter is teamed from training data.

  • PDF

Bayesian Model for Probabilistic Unsupervised Learning (확률적 자율 학습을 위한 베이지안 모델)

  • 최준혁;김중배;김대수;임기욱
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.9
    • /
    • pp.849-854
    • /
    • 2001
  • GTM(Generative Topographic Mapping) model is a probabilistic version of the SOM(Self Organizing Maps) which was proposed by T. Kohonen. The GTM is modelled by latent or hidden variables of probability distribution of data. It is a unique characteristic not implemented in SOM model, and, therefore, it is possible with GTM to analyze data accurately, thereby overcoming the limits of SOM. In the present investigation we proposed a BGTM(Bayesian GTM) combined with Bayesian learning and GTM model that has a small mis-classification ratio. By combining fast calculation ability and probabilistic distribution of data of GTM with correct reasoning based on Bayesian model, the BGTM model provided improved results, compared with existing models.

  • PDF

A Design of GA-based TSK Fuzzy Classifier and Its Application (GA 기반 TSK 퍼지 분류기의 설계와 응용)

  • 곽근창;김승석;유정웅;김승석
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.8
    • /
    • pp.754-759
    • /
    • 2001
  • In this paper, we propose a TSK(Takagi-Sugeno-Kang)-type fuzzy classifier using PCA(Principal Component Analysis), FCM(Fuzzy c-Means) clustering, ANFIS(Adaptive Neuro-Fuzzy Inference System) and hybrid GA(Genetic Algorithm). First, input data is transformed to reduce correlation among the data components by PCA. FCM clustering is applied to obtain a initial TSK-type fuzzy classifier. Parameter identification is performed by AGA(Adaptive GA) and RLSE(Recursive Least Square Estimate). Finally, we applied the proposed method to Iris data classificationl problems and obtained a better performance than previous works.

  • PDF

Feature Selection for Multiple K-Nearest Neighbor classifiers using GAVaPS (GAVaPS를 이용한 다수 K-Nearest Neighbor classifier들의 Feature 선택)

  • Lee, Hee-Sung;Lee, Jae-Hun;Kim, Eun-Tai
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.871-875
    • /
    • 2008
  • This paper deals with the feature selection for multiple k-nearest neighbor (k-NN) classifiers using Genetic Algorithm with Varying reputation Size (GAVaPS). Because we use multiple k-NN classifiers, the feature selection problem for them is vary hard and has large search region. To solve this problem, we employ the GAVaPS which outperforms comparison with simple genetic algorithm (SGA). Further, we propose the efficient combining method for multiple k-NN classifiers using GAVaPS. Experiments are performed to demonstrate the efficiency of the proposed method.

A Framework for Universal Cross Layer Networks

  • Khalid, Murad;Sankar, Ravi;Joo, Young-Hoon;Ra, In-Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.239-247
    • /
    • 2008
  • In a resource-limited wireless communication environment, various approaches to meet the ever growing application requirements in an efficient and transparent manner, are being researched and developed. Amongst many approaches, cross layer technique is by far one of the significant contributions that has undoubtedly revolutionized the way conventional layered architecture is perceived. In this paper, we propose a Universal Cross Layer Framework based on vertical layer architecture. The primary contribution of this paper is the functional architecture of the vertical layer which is primarily responsible for cross layer interaction management and optimization. The second contribution is the use of optimization cycle that comprises awareness parameters collection, mapping, classification and the analysis phases. The third contribution of the paper is the decomposition of the parameters into local and global network perspective for opportunistic optimization. Finally, we have shown through simulations how parameters' variations can represent local and global views of the network and how we can set local and global thresholds to perform opportunistic optimization.