• Title/Summary/Keyword: online algorithm

Search Result 587, Processing Time 0.028 seconds

A Real-Time Disk Prefetch Scheme for Continuous Media Playback (연속매체 상영을 위한 실시간 디스크 프리팻칭 기법)

  • Lim Sung Chae
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.547-554
    • /
    • 2004
  • To play back CM (Continuous Media) in online mode, the multimedia system Is required to have a real-time disk scheduling scheme that can efficiently fulfill the strict temporal constraints of serviced CM streams to prevent hiccups. In general, such disk scheduling is performed based on the concept of periodic prefetching since a CM stream has a rather long Playback time. In this paper, we also propose a periodic prefetching scheme that runs by using real-time disk channels, called on-time delivery channels. Since the channels are generated from the bulk-SCAN algorithm and they can be allocated in a very flexible manner based on the EDF (earliest-deadline-first) algorithm, the proposed scheme provides a better Performance in terms of I/O throughput and the average response time, as well as hiccup-free playback of concurrent CM streams. To show that the proposed scheme outperforms other methods, we give some simulation results.

Performance Evaluation of Recurrent Neural Network Algorithms for Recommendation System in E-commerce (전자상거래 추천시스템을 위한 순환신경망 알고리즘들의 성능평가)

  • Seo, Jihye;Yong, Hwan-Seung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.7
    • /
    • pp.440-445
    • /
    • 2017
  • Due to the advance of e-commerce systems, the number of people using online shopping and products has significantly increased. Therefore, the need for an accurate recommendation system is becoming increasingly more important. Recurrent neural network is a deep-learning algorithm that utilizes sequential information in training. In this paper, an evaluation is performed on the application of recurrent neural networks to recommendation systems. We evaluated three recurrent algorithms (RNN, LSTM and GRU) and three optimal algorithms(Adagrad, RMSProp and Adam) which are commonly used. In the experiments, we used the TensorFlow open source library produced by Google and e-commerce session data from RecSys Challenge 2015. The results using the optimal hyperparameters found in this study are compared with those of RecSys Challenge 2015 participants.

Robust AAM-based Face Tracking with Occlusion Using SIFT Features (SIFT 특징을 이용하여 중첩상황에 강인한 AAM 기반 얼굴 추적)

  • Eom, Sung-Eun;Jang, Jun-Su
    • The KIPS Transactions:PartB
    • /
    • v.17B no.5
    • /
    • pp.355-362
    • /
    • 2010
  • Face tracking is to estimate the motion of a non-rigid face together with a rigid head in 3D, and plays important roles in higher levels such as face/facial expression/emotion recognition. In this paper, we propose an AAM-based face tracking algorithm. AAM has been widely used to segment and track deformable objects, but there are still many difficulties. Particularly, it often tends to diverge or converge into local minima when a target object is self-occluded, partially or completely occluded. To address this problem, we utilize the scale invariant feature transform (SIFT). SIFT is an effective method for self and partial occlusion because it is able to find correspondence between feature points under partial loss. And it enables an AAM to continue to track without re-initialization in complete occlusions thanks to the good performance of global matching. We also register and use the SIFT features extracted from multi-view face images during tracking to effectively track a face across large pose changes. Our proposed algorithm is validated by comparing other algorithms under the above 3 kinds of occlusions.

Analysis and Visualization for Comment Messages of Internet Posts (인터넷 게시물의 댓글 분석 및 시각화)

  • Lee, Yun-Jung;Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.45-56
    • /
    • 2009
  • There are many internet users who collect the public opinions and express their opinions for internet news or blog articles through the replying comment on online community. But, it is hard to search and explore useful messages on web blogs since most of web blog systems show articles and their comments to the form of sequential list. Also, spam and malicious comments have become social problems as the internet users increase. In this paper, we propose a clustering and visualizing system for responding comments on large-scale weblogs, namely 'Daum AGORA,' using similarity analysis. Our system shows the comment clustering result as a simple screen view. Our system also detects spam comments using Needleman-Wunsch algorithm that is a well-known algorithm in bioinformatics.

Design and Implementation of Text Classification System based on ETOM+RPost (ETOM+RPost기반의 문서분류시스템의 설계 및 구현)

  • Choi, Yun-Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.517-524
    • /
    • 2010
  • Recently, the size of online texts and textual information is increasing explosively, and the automated classification has a great potential for handling data such as news materials and images. Text classification system is based on supervised learning which needs laborous work by human expert. The main goal of this paper is to reduce the manual intervention, required for the task. The other goal is to increase accuracy to be high. Most of the documents have high complexity in contents and the high similarities in their described style. So, the classification results are not satisfactory. This paper shows the implementation of classification system based on ETOM+RPost algorithm and classification progress using SPAM data. In experiments, we verified our system with right-training documents and wrong-training documents. The experimental results show that our system has high accuracy and stability in all situation as 16% improvement in accuracy.

Probabilistic-based damage identification based on error functions with an autofocusing feature

  • Gorgin, Rahim;Ma, Yunlong;Wu, Zhanjun;Gao, Dongyue;Wang, Yishou
    • Smart Structures and Systems
    • /
    • v.15 no.4
    • /
    • pp.1121-1137
    • /
    • 2015
  • This study presents probabilistic-based damage identification technique for highlighting damage in metallic structures. This technique utilizes distributed piezoelectric transducers to generate and monitor the ultrasonic Lamb wave with narrowband frequency. Diagnostic signals were used to define the scatter signals of different paths. The energy of scatter signals till different times were calculated by taking root mean square of the scatter signals. For each pair of parallel paths an error function based on the energy of scatter signals is introduced. The resultant error function then is used to estimate the probability of the presence of damage in the monitoring area. The presented method with an autofocusing feature is applied to aluminum plates for method verification. The results identified using both simulation and experimental Lamb wave signals at different central frequencies agreed well with the actual situations, demonstrating the potential of the presented algorithm for identification of damage in metallic structures. An obvious merit of the presented technique is that in addition to damages located inside the region between transducers; those who are outside this region can also be monitored without any interpretation of signals. This novelty qualifies this method for online structural health monitoring.

Damage detection of subway tunnel lining through statistical pattern recognition

  • Yu, Hong;Zhu, Hong P.;Weng, Shun;Gao, Fei;Luo, Hui;Ai, De M.
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.2
    • /
    • pp.231-242
    • /
    • 2018
  • Subway tunnel structure has been rapidly developed in many cities for its strong transport capacity. The model-based damage detection of subway tunnel structure is usually difficult due to the complex modeling of soil-structure interaction, the indetermination of boundary and so on. This paper proposes a new data-based method for the damage detection of subway tunnel structure. The root mean square acceleration and cross correlation function are used to derive a statistical pattern recognition algorithm for damage detection. A damage sensitive feature is proposed based on the root mean square deviations of the cross correlation functions. X-bar control charts are utilized to monitor the variation of the damage sensitive features before and after damage. The proposed algorithm is validated by the experiment of a full-scale two-rings subway tunnel lining, and damages are simulated by loosening the connection bolts of the rings. The results verify that root mean square deviation is sensitive to bolt loosening in the tunnel lining and X-bar control charts are feasible to be used in damage detection. The proposed data-based damage detection method is applicable to the online structural health monitoring system of subway tunnel lining.

A Study on Recommendation System Using Data Mining Techniques for Large-sized Music Contents (대용량 음악콘텐츠 환경에서의 데이터마이닝 기법을 활용한 추천시스템에 관한 연구)

  • Kim, Yong;Moon, Sung-Been
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.2
    • /
    • pp.89-104
    • /
    • 2007
  • This research attempts to give a personalized recommendation framework in large-sized music contents environment. Despite of existing studios and commercial contents for recommendation systems, large online shopping malls are still looking for a recommendation system that can serve personalized recommendation and handle large data in real-time. This research utilizes data mining technologies and new pattern matching algorithm. A clustering technique is used to get dynamic user segmentations using user preference to contents categories. Then a sequential pattern mining technique is used to extract contents access patterns in the user segmentations. And the recommendation is given by our recommendation algorithm using user contents preference history and contents access patterns of the segment. In the framework, preprocessing and data transformation and transition are implemented on DBMS. The proposed system is implemented to show that the framework is feasible. In the experiment using real-world large data, personalized recommendation is given in almost real-time and shows acceptable correctness.

Adaptive Intrusion Detection Algorithm based on Artificial Immune System (인공 면역계를 기반으로 하는 적응형 침입탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.169-174
    • /
    • 2003
  • The trial and success of malicious cyber attacks has been increased rapidly with spreading of Internet and the activation of a internet shopping mall and the supply of an online, or an offline internet, so it is expected to make a problem more and more. The goal of intrusion detection is to identify unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators in real time. In fact, the general security system based on Internet couldn't cope with the attack properly, if ever. other regular systems have depended on common vaccine softwares to cope with the attack. But in this paper, we will use the positive selection and negative selection mechanism of T-cell, which is the biologically distributed autonomous system, to develop the self/nonself recognition algorithm and AIS (Artificial Immune System) that is easy to be concrete on the artificial system. For making it come true, we will apply AIS to the network environment, which is a computer security system.

A Self-Organizing Model Based Rate Control Algorithm for MPEG-4 Video Coding

  • Zhang, Zhi-Ming;Chang, Seung-Gi;Park, Jeong-Hoon;Kim, Yong-Je
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.1
    • /
    • pp.72-78
    • /
    • 2003
  • A new self-organizing neuro-fuzzy network based rate control algorithm for MPEG-4 video encoder is proposed in this paper. Contrary to the traditional methods that construct the rate-distorion (RD) model based on experimental equations, the proposed method effectively exploits the non-stationary property of the video date with neuro-fuzzy network that self-organizes the RD model online and adaptively updates the structure. The method needs not require off-line pre-training; hence it is geared toward real-time coding. The comparative results through the experiments suggest that our proposed rate control scheme encodes the video sequences with less frame skip, providing good temporal quality and higher PSNR, compared to VM18.0.