• Title/Summary/Keyword: neural network.

Search Result 11,770, Processing Time 0.034 seconds

An Efficient Traning of Multilayer Neural Newtorks Using Stochastic Approximation and Conjugate Gradient Method (확률적 근사법과 공액기울기법을 이용한 다층신경망의 효율적인 학습)

  • 조용현
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.8 no.5
    • /
    • pp.98-106
    • /
    • 1998
  • This paper proposes an efficient learning algorithm for improving the training performance of the neural network. The proposed method improves the training performance by applying the backpropagation algorithm of a global optimization method which is a hybrid of a stochastic approximation and a conjugate gradient method. The approximate initial point for f a ~gtl obal optimization is estimated first by applying the stochastic approximation, and then the conjugate gradient method, which is the fast gradient descent method, is applied for a high speed optimization. The proposed method has been applied to the parity checking and the pattern classification, and the simulation results show that the performance of the proposed method is superior to those of the conventional backpropagation and the backpropagation algorithm which is a hyhrid of the stochastic approximation and steepest descent method.

  • PDF

Adaptive Learning Based on Bit-Significance Optimization with Hebbian Learning Rule and Its Electro-Optic Implementation (Hebb의 학습 법칙과 화소당 가중치 최소화 기법에 의한 적응학습 및 그의 전기광학적 구현)

  • Lee, Soo-Young;Shim, Chang-Sup;Koh, Sang-Ho;Jang, Ju-Seog;Shin, Sang-Yung
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.6
    • /
    • pp.108-114
    • /
    • 1989
  • Introducing and optimizing bit-significance to the Hopfield model, ten highly correlated binary images, i.e., numbers "0" to "9", are successfully stored and retrieved in a $6{}8$ node system. Unlike many other neural network models, this model has stronger error correction capability for correlated images such as "6","8","3", and "9". The bit significance optimization is regarded as an adaptive learning process based on least-mean-square error algorithm, and may be implemented with Widrow-Hoff neural nets optimizer. A design for electro-optic implementation including the adaptive optimization networks is also introduced.

  • PDF

Shear strength estimation of RC deep beams using the ANN and strut-and-tie approaches

  • Yavuz, Gunnur
    • Structural Engineering and Mechanics
    • /
    • v.57 no.4
    • /
    • pp.657-680
    • /
    • 2016
  • Reinforced concrete (RC) deep beams are structural members that predominantly fail in shear. Therefore, determining the shear strength of these types of beams is very important. The strut-and-tie method is commonly used to design deep beams, and this method has been adopted in many building codes (ACI318-14, Eurocode 2-2004, CSA A23.3-2004). In this study, the efficiency of artificial neural networks (ANNs) in predicting the shear strength of RC deep beams is investigated as a different approach to the strut-and-tie method. An ANN model was developed using experimental data for 214 normal and high-strength concrete deep beams from an existing literature database. Seven different input parameters affecting the shear strength of the RC deep beams were selected to create the ANN structure. Each parameter was arranged as an input vector and a corresponding output vector that includes the shear strength of the RC deep beam. The ANN model was trained and tested using a multi-layered back-propagation method. The most convenient ANN algorithm was determined as trainGDX. Additionally, the results in the existing literature and the accuracy of the strut-and-tie model in ACI318-14 in predicting the shear strength of the RC deep beams were investigated using the same test data. The study shows that the ANN model provides acceptable predictions of the ultimate shear strength of RC deep beams (maximum $R^2{\approx}0.97$). Additionally, the ANN model is shown to provide more accurate predictions of the shear capacity than all the other computed methods in this study. The ACI318-14-STM method was very conservative, as expected. Moreover, the study shows that the proposed ANN model predicts the shear strengths of RC deep beams better than does the strut-and-tie model approaches.

Damage detection in truss bridges using transmissibility and machine learning algorithm: Application to Nam O bridge

  • Nguyen, Duong Huong;Tran-Ngoc, H.;Bui-Tien, T.;De Roeck, Guido;Wahab, Magd Abdel
    • Smart Structures and Systems
    • /
    • v.26 no.1
    • /
    • pp.35-47
    • /
    • 2020
  • This paper proposes the use of transmissibility functions combined with a machine learning algorithm, Artificial Neural Networks (ANNs), to assess damage in a truss bridge. A new approach method, which makes use of the input parameters calculated from the transmissibility function, is proposed. The network not only can predict the existence of damage, but also can classify the damage types and identity the location of the damage. Sensors are installed in the truss joints in order to measure the bridge vibration responses under train and ambient excitations. A finite element (FE) model is constructed for the bridge and updated using FE software and experimental data. Both single damage and multiple damage cases are simulated in the bridge model with different scenarios. In each scenario, the vibration responses at the considered nodes are recorded and then used to calculate the transmissibility functions. The transmissibility damage indicators are calculated and stored as ANNs inputs. The outputs of the ANNs are the damage type, location and severity. Two machine learning algorithms are used; one for classifying the type and location of damage, whereas the other for finding the severity of damage. The measurements of the Nam O bridge, a truss railway bridge in Vietnam, is used to illustrate the method. The proposed method not only can distinguish the damage type, but also it can accurately identify damage level.

The Identification of Japanese Black Cattle by Their Faces

  • Kim, Hyeon T.;Ikeda, Y.;Choi, Hong L.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.18 no.6
    • /
    • pp.868-872
    • /
    • 2005
  • Individual management of the animal is the first step towards reaching the goal of precision livestock farming that aids animal welfare. Accurate recognition of each individual animal is important for precise management. Electronic identification of cattle, usually referred to as RFID (Radio Frequency Identification), has many advantages for farm management. In practice, however, RFID implementations can cause several problems. Reading speed and distance must be optimized for specific applications. Image processing is more effective than RFID for the development of precision farming system in livestock. Therefore, the aim of this paper is to attempt the identification of cattle by using image processing. The majority of the research on the identification of cattle by using image processing has been for the black-and-white patterns of the Holstein. But, native Japanese and Korean cattle do not have a consistent pattern on the body, so that identification by pattern is impossible. This research aims to identify to Japanese black cattle, which does not have a black-white pattern on the body, by using image processing and a neural network algorithm. 12 Japanese black cattle were tested. Values of input parameter were calculated by using the face image values of 12 cows. The face was identified by the associate neural memory algorithm, and the algorithm was verified by the transformed face image, for example, of brightness, distortion, noise and angle. As a result, there was difference due to a transformation ratio of the brightness, distortion, noise, and angle. The algorithm could identify 100% in the range from -30 to +30 degrees of brightness, -20 to +40 degrees of distortion, 0 to 60% of noise and -20 to +30 degree of angle transformed images.

Model Verification Algorithm for ATM Security System (ATM 보안 시스템을 위한 모델 인증 알고리즘)

  • Jeong, Heon;Lim, Chun-Hwan;Pyeon, Suk-Bum
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.72-78
    • /
    • 2000
  • In this study, we propose a model verification algorithm based on DCT and neural network for ATM security system. We construct database about facial images after capturing thirty persons facial images in the same lumination and distance. To simulate model verification, we capture four learning images and test images per a man. After detecting edge in facial images, we detect a characteristic area of square shape using edge distribution in facial images. Characteristic area contains eye bows, eyes, nose, mouth and cheek. We extract characteristic vectors to calculate diagonally coefficients sum after obtaining DCT coefficients about characteristic area. Characteristic vectors is normalized between +1 and -1, and then used for input vectors of neural networks. Not considering passwords, simulations results showed 100% verification rate when facial images were learned and 92% verification rate when facial images weren't learned. But considering passwords, the proposed algorithm showed 100% verification rate in case of two simulations.

  • PDF

Detection of Optical Flows on the Trajectories of Feature Points Using the Cellular Nonlinear Neural Networks (셀룰라 비선형 네트워크를 이용한 특징점 궤적 상에서 Optical Flow 검출)

  • Son, Hon-Rak;Kim, Hyeong-Suk
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.6
    • /
    • pp.10-21
    • /
    • 2000
  • The Cellular Noninear Networks structure for Distance Transform(DT) and the robust optical flow detection algorithm based on the DT are proposed. For some applications of optical flows such as target tracking and camera ego-motion computation, correct optical flows at a few feature points are more useful than unreliable one at every pixel point. The proposed algorithm is for detecting the optical flows on the trajectories only of the feature points. The translation lengths and the directions of feature movements are detected on the trajectories of feature points on which Distance Transform Field is developed. The robustness caused from the use of the Distance Transform and the easiness of hardware implementation with local analog circuits are the properties of the proposed structure. To verify the performance of the proposed structure and the algorithm, simulation has been done about various images under different noisy environment.

  • PDF

A Attendance-Absence Checking System using the Self-organizing Face Recognition (자기조직형 얼굴 인식에 의한 학생 출결 관리 시스템)

  • Lee, Woo-Beom
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.72-79
    • /
    • 2010
  • A EAARS(Electronic Attendance-Absence Recording System) is the important LSS(Learning Support System) for blending a on-line learning in the face-to-face classroom. However, the EAARS based on the smart card can not identify a real owner of the checked card. Therefore, we develop the CS(Client-Sever) system that manages the attendance-absence checking automatically, which is used the self-organizing neural network for the face recognition. A client system creates the ID file by extracting the face feature, a server system analyzes the ID file sent from client system, and performs a student identification by using the Recognized weight file saved in Database. As a result, The proposed CS EAARS shows the 92% efficiency in the CS environment that includes the various face image database of the real classroom.

A Study on the Spoken KOrean-Digit Recognition Using the Neural Netwok (神經網을 利用한 韓國語 數字音 認識에 관한 硏究)

  • Park, Hyun-Hwa;Gahang, Hae Dong;Bae, Keun Sung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.11 no.3
    • /
    • pp.5-13
    • /
    • 1992
  • Taking devantage of the property that Korean digit is a mono-syllable word, we proposed a spoken Korean-digit recognition scheme using the multi-layer perceptron. The spoken Korean-digit is divided into three segments (initial sound, medial vowel, and final consonant) based on the voice starting / ending points and a peak point in the middle of vowel sound. The feature vectors such as cepstrum, reflection coefficients, ${\Delta}$cepstrum and ${\Delta}$energy are extracted from each segment. It has been shown that cepstrum, as an input vector to the neural network, gives higher recognition rate than reflection coefficients. Regression coefficients of cepstrum did not affect as much as we expected on the recognition rate. That is because, it is believed, we extracted features from the selected stationary segments of the input speech signal. With 150 ceptral coefficients obtained from each spoken digit, we achieved correct recognition rate of 97.8%.

  • PDF

Fuzzy Neural Networks-Based Call Admission Control Using Possibility Distribution of Handoff Calls Dropping Rate for Wireless Networks (핸드오프 호 손실율 가능성 분포에 의한 무선망의 퍼지 신경망 호 수락제어)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.901-906
    • /
    • 2009
  • This paper proposes a call admission control(CAC) method for wireless networks, which is based on the upper bound of a possibility distribution of handoff calls dropping rates. The possibility distribution is estimated in a fuzzy inference and a learning algorithm in neural network. The learning algorithm is considered for tuning the membership functions(then parts)of fuzzy rules for the inference. The fuzzy inference method is based on a weighted average of fuzzy sets. The proposed method can avoid estimating excessively large handoff calls dropping rates, and makes possibile self-compensation in real time for the case where the estimated values are smaller than real values. So this method makes secure CAC, thereby guaranteeing the allowed CDR. From simulation studies we show that the estimation performance for the upper bound of call dropping rate is good, and then handoff call dropping rates in CAC are able to be sustained below user's desired value.

  • PDF