• Title/Summary/Keyword: machine learning applications

Search Result 538, Processing Time 0.036 seconds

Fault Diagnosis of Drone Using Machine Learning (머신러닝을 이용한 드론의 고장진단에 관한 연구)

  • Park, Soo-Hyun;Do, Jae-Seok;Choi, Seong-Dae;Hur, Jang-Wook
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.20 no.9
    • /
    • pp.28-34
    • /
    • 2021
  • The Fourth Industrial Revolution has led to the development of drones for commercial and private applications. Therefore, the malfunction of drones has become a prominent problem. Failure mode and effect analysis was used in this study to analyze the primary cause of drone failure, and blade breakage was observed to have the highest frequency of failure. This was tested using a vibration sensor placed on drones along the breakage length of the blades. The data exhibited a significant increase in vibration within the drone body for blade fracture length. Principal component analysis was used to reduce the data dimension and classify the state with machine learning algorithms such as support vector machine, k-nearest neighbor, Gaussian naive Bayes, and random forest. The performance of machine learning was higher than 0.95 for the four algorithms in terms of accuracy, precision, recall, and f1-score. A follow-up study on failure prediction will be conducted based on the results of fault diagnosis.

Role of Machine Learning in Intrusion Detection System: A Systematic Review

  • Alhasani, Areej;Al omrani, Faten;Alzahrani, Taghreed;alFahhad, Rehab;Alotaibi, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.155-162
    • /
    • 2022
  • Over the last 10 years, there has been rapid growth in the use of Machine Learning (ML) techniques to automate the process of intrusion threat detection at a scale never imagined before. This has prompted researchers, software engineers, and network specialists to rethink the applications of machine ML techniques particularly in the area of cybersecurity. As a result there exists numerous research documentations on the use ML techniques to detect and block cyber-attacks. This article is a systematic review involving the identification of published scholarly articles as found on IEEE Explore and Scopus databases. The articles exclusively related to the use of machine learning in Intrusion Detection Systems (IDS). Methods, concepts, results, and conclusions as found in the texts are analyzed. A description on the process taken in the identification of the research articles included: First, an introduction to the topic which is followed by a methodology section. A table is used to list identified research articles in the form of title, authors, methodology, and key findings.

Evaluating Efficiency of Life Insurance Companies Utilizing DEA and Machine Learning

  • Han Kook;Kim, Jae-Kyung
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.04a
    • /
    • pp.365-373
    • /
    • 2000
  • Data Envelopment Analysis (DEA), a non-parametric productivity analysis tool, has become an accepted approach for assessing efficiency in a wide range of fields. Despite of its extensive applications and merits, some features of DEA remain bothersome. DEA offers no guideline about to which direction relatively inefficient DMUs improve since a reference set of an inefficient DMU, several efficient DMUs, hardly provides a stepwise path for improving the efficiency of the inefficient DMU.In this paper, we aim to show that DEA can be used to evaluate the efficiency of life insurance companies while overcoming its limitation with the aids of machine learning methods.

  • PDF

Applications of machine learning methods in KMTNet data quality assurance and detecting microlensing events

  • Shin, Min-Su;Lee, Chung-Uk;Kim, Hyoun-Woo
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.1
    • /
    • pp.40.3-40.3
    • /
    • 2018
  • We present results from our two experiments of using machine learning algorithms in processing and analyzing the KMTNet imaging data. First, density estimation and clustering methods find meaningful structures in the metric space of imaging quality measurements described by photometric quantities. Second, we also develop a method to separate out light curves of reliable microlensing event candidates from spurious events, estimating reliability scores of the candidates.

  • PDF

Semi-supervised regression based on support vector machine

  • Seok, Kyungha
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.2
    • /
    • pp.447-454
    • /
    • 2014
  • In many practical machine learning and data mining applications, unlabeled training examples are readily available but labeled ones are fairly expensive to obtain. Therefore semi-supervised learning algorithms have attracted much attentions. However, previous research mainly focuses on classication problems. In this paper, a semi-supervised regression method based on support vector regression (SVR) formulation that is proposed. The estimator is easily obtained via the dual formulation of the optimization problem. The experimental results with simulated and real data suggest superior performance of the our proposed method compared with standard SVR.

An Overview of Learning Control in Robot Applications

  • Ryu, Yeong-Soon
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1996.10a
    • /
    • pp.6-10
    • /
    • 1996
  • This paper presents an overview of research results obtained by the authors in a series of publications. Methods are developed both for time-varying and time-invariant for linear and nonlinear. for time domain and frequency domain . and for discrete-time and continuous-time systems. Among the topics presented are: 1. Learning control based on integral control concepts applied in the repetition domain. 2. New algorithms that give improved transient response of the indirect adaptive control ideas. 4. Direct model reference learning control. 5 . Learning control based frequency domain. 6. Use of neural networks in learning control. 7. Decentralized learning controllers. These learning algorithms apply to robot control. The decentralized learning control laws are important in such applications becaused of the usual robot decentralized controller structured.

  • PDF

LSTM Android Malicious Behavior Analysis Based on Feature Weighting

  • Yang, Qing;Wang, Xiaoliang;Zheng, Jing;Ge, Wenqi;Bai, Ming;Jiang, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2188-2203
    • /
    • 2021
  • With the rapid development of mobile Internet, smart phones have been widely popularized, among which Android platform dominates. Due to it is open source, malware on the Android platform is rampant. In order to improve the efficiency of malware detection, this paper proposes deep learning Android malicious detection system based on behavior features. First of all, the detection system adopts the static analysis method to extract different types of behavior features from Android applications, and extract sensitive behavior features through Term frequency-inverse Document Frequency algorithm for each extracted behavior feature to construct detection features through unified abstract expression. Secondly, Long Short-Term Memory neural network model is established to select and learn from the extracted attributes and the learned attributes are used to detect Android malicious applications, Analysis and further optimization of the application behavior parameters, so as to build a deep learning Android malicious detection method based on feature analysis. We use different types of features to evaluate our method and compare it with various machine learning-based methods. Study shows that it outperforms most existing machine learning based approaches and detects 95.31% of the malware.

Exploring modern machine learning methods to improve causal-effect estimation

  • Kim, Yeji;Choi, Taehwa;Choi, Sangbum
    • Communications for Statistical Applications and Methods
    • /
    • v.29 no.2
    • /
    • pp.177-191
    • /
    • 2022
  • This paper addresses the use of machine learning methods for causal estimation of treatment effects from observational data. Even though conducting randomized experimental trials is a gold standard to reveal potential causal relationships, observational study is another rich source for investigation of exposure effects, for example, in the research of comparative effectiveness and safety of treatments, where the causal effect can be identified if covariates contain all confounding variables. In this context, statistical regression models for the expected outcome and the probability of treatment are often imposed, which can be combined in a clever way to yield more efficient and robust causal estimators. Recently, targeted maximum likelihood estimation and causal random forest is proposed and extensively studied for the use of data-adaptive regression in estimation of causal inference parameters. Machine learning methods are a natural choice in these settings to improve the quality of the final estimate of the treatment effect. We explore how we can adapt the design and training of several machine learning algorithms for causal inference and study their finite-sample performance through simulation experiments under various scenarios. Application to the percutaneous coronary intervention (PCI) data shows that these adaptations can improve simple linear regression-based methods.

Water Detection in an Open Environment: A Comprehensive Review

  • Muhammad Abdullah, Sandhu;Asjad, Amin;Muhammad Ali, Qureshi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2023
  • Open surface water body extraction is gaining popularity in recent years due to its versatile applications. Multiple techniques are used for water detection based on applications. Different applications of Radar as LADAR, Ground-penetrating, synthetic aperture, and sounding radars are used to detect water. Shortwave infrared, thermal, optical, and multi-spectral sensors are widely used to detect water bodies. A stereo camera is another way to detect water and different methods are applied to the images of stereo cameras such as deep learning, machine learning, polarization, color variations, and descriptors are used to segment water and no water areas. The Satellite is also used at a high level to get water imagery and the captured imagery is processed using various methods such as features extraction, thresholding, entropy-based, and machine learning to find water on the surface. In this paper, we have summarized all the available methods to detect water areas. The main focus of this survey is on water detection especially in small patches or in small areas. The second aim of this survey is to detect water hazards for unmanned vehicles and off-sure navigation.

Instance Based Learning Revisited: Feature Weighting and its Applications

  • Song Doo-Heon;Lee Chang-Hun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.6
    • /
    • pp.762-772
    • /
    • 2006
  • Instance based learning algorithm is the best known lazy learner and has been successfully used in many areas such as pattern analysis, medical analysis, bioinformatics and internet applications. However, its feature weighting scheme is too naive that many other extensions are proposed. Our version of IB3 named as eXtended IBL (XIBL) improves feature weighting scheme by backward stepwise regression and its distance function by VDM family that avoids overestimating discrete valued attributes. Also, XIBL adopts leave-one-out as its noise filtering scheme. Experiments with common artificial domains show that XIBL is better than the original IBL in terms of accuracy and noise tolerance. XIBL is applied to two important applications - intrusion detection and spam mail filtering and the results are promising.

  • PDF