• Title/Summary/Keyword: neural network techniques

Search Result 1,051, Processing Time 0.026 seconds

Development of Artificial Neural Network Techniques for Landslide Susceptibility Analysis (산사태 취약성 분석 연구를 위한 인공신경망 기법 개발)

  • Chang, Buhm-Soo;Park, Hyuck-Jin;Lee, Saro;Juhyung Ryu;Park, Jaewon;Lee, Moung-Jin
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2002.10a
    • /
    • pp.499-506
    • /
    • 2002
  • The purpose of this study is to develop landslide susceptibility analysis techniques using artificial neural networks and to apply the newly developed techniques for assessment of landslide susceptibility to the study area of Yongin in Korea. Landslide locations were identified in the study area from interpretation of aerial Photographs and field survey data, and a spatial database of the topography, soil type and timber cover were constructed. The landslide-related factors such as topographic slope, topographic curvature, soil texture, soil drainage, soil effective thickness, timber age, and timber diameter were extracted from the spatial database. Using those factors, landslide susceptibility and weights of each factor were analyzed by two artificial neural network methods. In the first method, the landslide susceptibility index was calculated by the back propagation method, which is a type of artificial neural network method. Then, the susceptibility map was made with a GIS program. The results of the landslide susceptibility analysis were verified using landslide location data. The verification results show satisfactory agreement between the susceptibility index and existing landslide location data. In the second method, weights of each factor were determinated. The weights, relative importance of each factor, were calculated using importance-free characteristics method of artificial neural networks.

  • PDF

A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models (의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byunghyuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.

Optical Character Recognition for Hindi Language Using a Neural-network Approach

  • Yadav, Divakar;Sanchez-Cuadrado, Sonia;Morato, Jorge
    • Journal of Information Processing Systems
    • /
    • v.9 no.1
    • /
    • pp.117-140
    • /
    • 2013
  • Hindi is the most widely spoken language in India, with more than 300 million speakers. As there is no separation between the characters of texts written in Hindi as there is in English, the Optical Character Recognition (OCR) systems developed for the Hindi language carry a very poor recognition rate. In this paper we propose an OCR for printed Hindi text in Devanagari script, using Artificial Neural Network (ANN), which improves its efficiency. One of the major reasons for the poor recognition rate is error in character segmentation. The presence of touching characters in the scanned documents further complicates the segmentation process, creating a major problem when designing an effective character segmentation technique. Preprocessing, character segmentation, feature extraction, and finally, classification and recognition are the major steps which are followed by a general OCR. The preprocessing tasks considered in the paper are conversion of gray scaled images to binary images, image rectification, and segmentation of the document's textual contents into paragraphs, lines, words, and then at the level of basic symbols. The basic symbols, obtained as the fundamental unit from the segmentation process, are recognized by the neural classifier. In this work, three feature extraction techniques-: histogram of projection based on mean distance, histogram of projection based on pixel value, and vertical zero crossing, have been used to improve the rate of recognition. These feature extraction techniques are powerful enough to extract features of even distorted characters/symbols. For development of the neural classifier, a back-propagation neural network with two hidden layers is used. The classifier is trained and tested for printed Hindi texts. A performance of approximately 90% correct recognition rate is achieved.

Detection of Colluded Multimedia Fingerprint by Neural Network (신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.80-87
    • /
    • 2006
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic inform on using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before recontributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the hopfield neural network using (n,k)code designing for the error bits correction confirmed that can correct error within 2bits.

Differential Privacy Technology Resistant to the Model Inversion Attack in AI Environments (AI 환경에서 모델 전도 공격에 안전한 차분 프라이버시 기술)

  • Park, Cheollhee;Hong, Dowon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.589-598
    • /
    • 2019
  • The amount of digital data a is explosively growing, and these data have large potential values. Countries and companies are creating various added values from vast amounts of data, and are making a lot of investments in data analysis techniques. The privacy problem that occurs in data analysis is a major factor that hinders data utilization. Recently, as privacy violation attacks on neural network models have been proposed. researches on artificial neural network technology that preserves privacy is required. Therefore, various privacy preserving artificial neural network technologies have been studied in the field of differential privacy that ensures strict privacy. However, there are problems that the balance between the accuracy of the neural network model and the privacy budget is not appropriate. In this paper, we study differential privacy techniques that preserve the performance of a model within a given privacy budget and is resistant to model inversion attacks. Also, we analyze the resistance of model inversion attack according to privacy preservation strength.

Comparison of the effectiveness of various neural network models applied to wind turbine condition diagnosis (풍력터빈 상태진단에 적용된 다양한 신경망 모델의 유효성 비교)

  • Manh-Tuan Ngo;Changhyun Kim;Minh-Chau Dinh;Minwon Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.5
    • /
    • pp.77-87
    • /
    • 2023
  • Wind turbines playing a critical role in renewable energy generation, accurately assessing their operational status is crucial for maximizing energy production and minimizing downtime. This study conducts a comparative analysis of different neural network models for wind turbine condition diagnosis, evaluating their effectiveness using a dataset containing sensor measurements and historical turbine data. The study utilized supervisory control and data acquisition data, collected from 2 MW doubly-fed induction generator-based wind turbine system (Model HQ2000), for the analysis. Various neural network models such as artificial neural network, long short-term memory, and recurrent neural network were built, considering factors like activation function and hidden layers. Symmetric mean absolute percentage error were used to evaluate the performance of the models. Based on the evaluation, conclusions were drawn regarding the relative effectiveness of the neural network models for wind turbine condition diagnosis. The research results guide model selection for wind turbine condition diagnosis, contributing to improved reliability and efficiency through advanced neural network-based techniques and identifying future research directions for further advancements.

An Optimized Deep Learning Techniques for Analyzing Mammograms

  • Satish Babu Bandaru;Natarajasivan. D;Rama Mohan Babu. G
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.39-48
    • /
    • 2023
  • Breast cancer screening makes extensive utilization of mammography. Even so, there has been a lot of debate with regards to this application's starting age as well as screening interval. The deep learning technique of transfer learning is employed for transferring the knowledge learnt from the source tasks to the target tasks. For the resolution of real-world problems, deep neural networks have demonstrated superior performance in comparison with the standard machine learning algorithms. The architecture of the deep neural networks has to be defined by taking into account the problem domain knowledge. Normally, this technique will consume a lot of time as well as computational resources. This work evaluated the efficacy of the deep learning neural network like Visual Geometry Group Network (VGG Net) Residual Network (Res Net), as well as inception network for classifying the mammograms. This work proposed optimization of ResNet with Teaching Learning Based Optimization (TLBO) algorithm's in order to predict breast cancers by means of mammogram images. The proposed TLBO-ResNet, an optimized ResNet with faster convergence ability when compared with other evolutionary methods for mammogram classification.

Second-Order Learning for Complex Forecasting Tasks: Case Study of Video-On-Demand (복잡한 예측문제에 대한 이차학습방법 : Video-On-Demand에 대한 사례연구)

  • 김형관;주종형
    • Journal of Intelligence and Information Systems
    • /
    • v.3 no.1
    • /
    • pp.31-45
    • /
    • 1997
  • To date, research on data mining has focused primarily on individual techniques to su, pp.rt knowledge discovery. However, the integration of elementary learning techniques offers a promising strategy for challenging a, pp.ications such as forecasting nonlinear processes. This paper explores the utility of an integrated a, pp.oach which utilizes a second-order learning process. The a, pp.oach is compared against individual techniques relating to a neural network, case based reasoning, and induction. In the interest of concreteness, the concepts are presented through a case study involving the prediction of network traffic for video-on-demand.

  • PDF

Soft Computing Optimized Models for Plant Leaf Classification Using Small Datasets

  • Priya;Jasmeen Gill
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.72-84
    • /
    • 2024
  • Plant leaf classification is an imperative task when their use in real world is considered either for medicinal purposes or in agricultural sector. Accurate identification of plants is, therefore, quite important, since there are numerous poisonous plants which if by mistake consumed or used by humans can prove fatal to their lives. Furthermore, in agriculture, detection of certain kinds of weeds can prove to be quite significant for saving crops against such unwanted plants. In general, Artificial Neural Networks (ANN) are a suitable candidate for classification of images when small datasets are available. However, these suffer from local minima problems which can be effectively resolved using some global optimization techniques. Considering this issue, the present research paper presents an automated plant leaf classification system using optimized soft computing models in which ANNs are optimized using Grasshopper Optimization algorithm (GOA). In addition, the proposed model outperformed the state-of-the-art techniques when compared with simple ANN and particle swarm optimization based ANN. Results show that proposed GOA-ANN based plant leaf classification system is a promising technique for small image datasets.

Breast Cancer Images Classification using Convolution Neural Network

  • Mohammed Yahya Alzahrani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.113-120
    • /
    • 2023
  • One of the most prevalent disease among women that leads to death is breast cancer. It can be diagnosed by classifying tumors. There are two different types of tumors i.e: malignant and benign tumors. Physicians need a reliable diagnosis procedure to distinguish between these tumors. However, generally it is very difficult to distinguish tumors even by the experts. Thus, automation of diagnostic system is needed for diagnosing tumors. This paper attempts to improve the accuracy of breast cancer detection by utilizing deep learning convolutional neural network (CNN). Experiments are conducted using Wisconsin Diagnostic Breast Cancer (WDBC) dataset. Compared to existing techniques, the used of CNN shows a better result and achieves 99.66%% in term of accuracy.