• Title/Summary/Keyword: vector computer

Search Result 2,007, Processing Time 0.029 seconds

Korean Traditional Music Genre Classification Using Sample and MIDI Phrases

  • Lee, JongSeol;Lee, MyeongChun;Jang, Dalwon;Yoon, Kyoungro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1869-1886
    • /
    • 2018
  • This paper proposes a MIDI- and audio-based music genre classification method for Korean traditional music. There are many traditional instruments in Korea, and most of the traditional songs played using the instruments have similar patterns and rhythms. Although music information processing such as music genre classification and audio melody extraction have been studied, most studies have focused on pop, jazz, rock, and other universal genres. There are few studies on Korean traditional music because of the lack of datasets. This paper analyzes raw audio and MIDI phrases in Korean traditional music, performed using Korean traditional musical instruments. The classified samples and MIDI, based on our classification system, will be used to construct a database or to implement our Kontakt-based instrument library. Thus, we can construct a management system for a Korean traditional music library using this classification system. Appropriate feature sets for raw audio and MIDI phrases are proposed and the classification results-based on machine learning algorithms such as support vector machine, multi-layer perception, decision tree, and random forest-are outlined in this paper.

Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data

  • Fidalcastro, A;Baburaj, E
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5023-5038
    • /
    • 2017
  • Big data is an emerging technology which deals with wide range of data sets with sizes beyond the ability to work with software tools which is commonly used for processing of data. When we consider a huge network, we have to process a large amount of network information generated, which consists of both normal and abnormal activity logs in large volume of multi-dimensional data. Intrusion Detection System (IDS) is required to monitor the network and to detect the malicious nodes and activities in the network. Massive amount of data makes it difficult to detect threats and attacks. Sequential Pattern mining may be used to identify the patterns of malicious activities which have been an emerging popular trend due to the consideration of quantities, profits and time orders of item. Here we propose a sequential pattern mining algorithm with fuzzy logic feature selection and fuzzy weighted support for huge volumes of network logs to be implemented in Apache Hadoop YARN, which solves the problem of speed and time constraints. Fuzzy logic feature selection selects important features from the feature set. Fuzzy weighted supports provide weights to the inputs and avoid multiple scans. In our simulation we use the attack log from NS-2 MANET environment and compare the proposed algorithm with the state-of-the-art sequential Pattern Mining algorithm, SPADE and Support Vector Machine with Hadoop environment.

A Study on Word Sense Disambiguation Using Bidirectional Recurrent Neural Network for Korean Language

  • Min, Jihong;Jeon, Joon-Woo;Song, Kwang-Ho;Kim, Yoo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.41-49
    • /
    • 2017
  • Word sense disambiguation(WSD) that determines the exact meaning of homonym which can be used in different meanings even in one form is very important to understand the semantical meaning of text document. Many recent researches on WSD have widely used NNLM(Neural Network Language Model) in which neural network is used to represent a document into vectors and to analyze its semantics. Among the previous WSD researches using NNLM, RNN(Recurrent Neural Network) model has better performance than other models because RNN model can reflect the occurrence order of words in addition to the word appearance information in a document. However, since RNN model uses only the forward order of word occurrences in a document, it is not able to reflect natural language's characteristics that later words can affect the meanings of the preceding words. In this paper, we propose a WSD scheme using Bidirectional RNN that can reflect not only the forward order but also the backward order of word occurrences in a document. From the experiments, the accuracy of the proposed model is higher than that of previous method using RNN. Hence, it is confirmed that bidirectional order information of word occurrences is useful for WSD in Korean language.

A New Method to Detect Inner/Outer Race Bearing Fault Using Discrete Wavelet Transform in Frequency-Domain

  • Ghods, Amirhossein;Lee, Hong-Hee
    • Proceedings of the KIPE Conference
    • /
    • 2013.11a
    • /
    • pp.63-64
    • /
    • 2013
  • Induction motors' faults detection is almost a popular topic among researchers. Monitoring the output of motors is a key factor in detecting these faults. (Short-time) Fourier, (continuous, discrete) wavelet, and extended Park vector transformations are among the methods for fault detection. One major deficiency of these methods is not being able to detect the severity of faults that carry low energy information, e.g. in ball bearing system failure, there is absolutely no way to detect the severity of fault using Fourier or wavelet transformations. In this paper, the authors have applied the Discrete Wavelet Transform (DWT) frequency-domain analysis to detect bearing faults in an induction motor. In other words, in discrete transform which the output signal is decomposed in several steps and frequency resolution increases considerably, the frequency-band analysis is performed and it will be verified that first of all, fault sidebands become more recognizable for detection in higher levels of decomposition, and secondly, the inner race bearing faults turn out easier in these levels; and all these matter because of eliminating the not-required high energy components in lower levels of decomposing.

  • PDF

Design and Implementation of 2D Fashion Design System based on Diagraming Piece (도식화 피스기반 2D패션 디자인 시스템의 설계 및 구현)

  • 김영운;이혜정;정성태;정석태;이용주;조진애
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.45-54
    • /
    • 2004
  • A CAD and diagraming program of clothing and fashion design field within the country variously exist, but this paper implements design CAD and diagraming system based on diagraming piece with database system. Proposal system can be used quickly and easily to designer because of providing various diagraming piece. intend to utilize the data to diagraming piece provide with various classification and key word. 2D fashion design system provide GUI, various drawing tool, vector type document. application data based on XML, diverse library and easy mapping capacity for user.

  • PDF

Metamorphosis Hierarchical Motion Vector Estimation Algorithm (변형계층적 모션벡터 추정알고리즘)

  • Kim Jeong-Woong;Yang Hae-Sool
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.709-712
    • /
    • 2006
  • 다양한 종류의 컴퓨터가 사람, 사물, 환경 속에 내재되어 있고, 이들이 서로 연결되어, 필요한 곳에서 활용할 수 있는 유비쿼터스 환경에서는 홈 네트워크를 통해 이 기종 기기간 다양한 데이터 교환을 요구한다. 더욱이 원활한 영상 데이터의 처리, 전송, 모니터링 기술은 핵심적 요소가 아닐 수 없다. 공간 및 시간적인 해상도, 컬러의 표현 그리고 화질의 측정방법 등 고전적 영상 처리 연구 분야뿐만 아니라 국한된 대역폭을 갖는 홈네트워크의 전송체계에서 전송률 문제에 대한 심도 있는 연구가 필요하다. 본 논문에서는 홈네트워크 상황에서 콘텐츠의 중심이 되는 영상 데이터의 전송과 처리 그리고 제어를 위하여 새로운 움직임 추정 알고리즘을 제안한다. 각도, 거리등 다양한 환경에서 전송되어지는 스테레오 카메라의 영상데이터들은 축소, 확대, 이동, 보정 등 전처리 후 제안된 변형계층 모션벡터 추정 알고리즘을 이용하여 압축 처리, 전송된다. 기존 모션벡터 추정 알고리즘의 장점을 계승하고 단점을 보완한 변형계층 알고리즘은 비정형, 소형 매크로 블록을 이용하여 휘도의 편차가 큰 영상의 효율적 움직임 추정에 이용된다. 본 논문에서 제안한 변형계층 알고리즘과 이를 이용해 구현된 영상시스템은 유비쿼터스 환경에서 다양하게 활용될 수 있다.

  • PDF

Power Aware Routing Protocol based on Both Threshold by Residual Battery Capacity and Signal Strength in Mobile Ad-hoc Network (Mobile Ad-hoc 네트워크에서 Threshold 적용과 신호세기 기반의 효율적인 파워소모 라우팅 프로토콜)

  • Park Gun-Woo;Song Joo-Seok
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.1139-1142
    • /
    • 2006
  • Mobile Ad-hoc 네트워크(MANET)에서 각 노드들은 한정된 배터리에 의존하여 통신한다. 이와 같은 제한사항을 극복하기 위해 링크의 안정성을 유지하거나 파워 소모를 고려한 프로토콜에 대한 연구들이 활발히 이루어져 왔다. 하지만 링크의 안정성 또는 파워 소모의 어느 한 측면만을 고려함으로써 링크의 안정성은 높일 수 있으나 파워 소모가 효율적이지 못했다. 반면에 전체 파워소모는 줄일 수 있었으나 파워소모의 균형을 이루지 못함으로써 네트워크 수명을 오래 지속시킬 수 없는 문제점이 발생 했다. 본 논문에서는 배터리 잔량에 대한 threshold를 적용함과 동시에 신호세기를 고려하여 각 노드들의 균형된 파워소모와 네트워크 전체의 파워 소모를 최소화함으로써 네트워크 수명을 오래 지속시키기 위한 프로토콜인 PRTRS(Power Aware Routing Protocol based on Both Threshold by Residual Battery Capacity and Signal Strength in Mobile Ad-hoc Network)를 제안한다. PRTRS는 AODV(Ad-hoc On-demand Distance Vector Routing)를 기반으로 하였다. NS-2 네트워크 시뮬레이션 결과 PRTRS는 특정 노드로 집중되는 트래픽을 분산시켜 파워소모의 균형을 이루고 네트워크 전체의 파워소모를 최소화함으로써 네트워크 수명이 연장됨을 확인하였다.

  • PDF

A Study of Temporal Error Concealment in Low Bandwidth Network (저대역폭 통신망에서의 시간적 에러 은닉에 관한 연구)

  • Park, Sung-Chan;Lee, Gwi-Sang
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.6
    • /
    • pp.612-622
    • /
    • 2002
  • In this paper, we review temporal error concealment for video transport over unreliable networks, and a new approach for the recovery of lost or erroneous motion vection(MV)s by classifying the movements of neighboring blocks by their homogeneity is proposed. MVs of the neighboring blocks are classified according to the direction of MVs and a representative value for each class is determined to obtain the candidate MV set. By computing the distortion of the candidates, a MV with the minimum distortion is selected. Experimental results show that the proposed algorithm exhibits better performance in many cases than existing methods.

Vision-based Camera Localization using DEM and Mountain Image (DEM과 산영상을 이용한 비전기반 카메라 위치인식)

  • Cha Jeong-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.177-186
    • /
    • 2005
  • In this Paper. we propose vision-based camera localization technique using 3D information which is created by mapping of DEM and mountain image. Typically, image features for localization have drawbacks, it is variable to camera viewpoint and after time information quantify increases . In this paper, we extract invariance features of geometry which is irrelevant to camera viewpoint and estimate camera extrinsic Parameter through accurate corresponding Points matching by Proposed similarity evaluation function and Graham search method we also propose 3D information creation method by using graphic theory and visual clues, The Proposed method has the three following stages; point features invariance vector extraction, 3D information creation, camera extrinsic Parameter estimation. In the experiments, we compare and analyse the proposed method with existing methods to demonstrate the superiority of the proposed methods.

  • PDF

Analysis and Improvement of Ranking Algorithm for Web Mining System on the Hierarchical Web Environment

  • Heebyung Yoon;Lee, Kil-Seup;Kim, Hwa-Soo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.455-458
    • /
    • 2003
  • The variety of document ranking algorithms have developed to provide efficient mining results for user's query on the web environment. The typical ranking algorithms are the Vector-Space Model based on the text, PsgeRank and HITS algorithms based on the hyperlink structures and other several improvement algorithms. All these are for the user's convenience and preference. However, these algorithms are usually developed on then Horizontal and non-hierarchial web environments and are not suitable for the hierarchial web environments such as enterprise and defense networks. Thus, we must consider the special environment factors in order to improve the ranking algorithms. In this paper, we analyze the several typical algorithms used by hyperlink structures on the web environment. We, then suggest a configuration of the hierarchical web environment and also give the relations between agents of the web mining system. Next, we propose an improved ranking algorithm suitable to this kind of special environments. The proposed algorithm is considered both the hyperlink structures of the documents and the location of the user of the hierarchical web.

  • PDF