• Title/Summary/Keyword: 깊이 정보 확장

Search Result 91, Processing Time 0.032 seconds

Microplastics Intellectual Network Analysis based on Bigdata (빅데이터 기반한 미세플라스틱 지적네트워크 분석)

  • Kim, Younghee;Chang, Kwanjong
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.239-259
    • /
    • 2022
  • Since 2019, research on microplastics has been actively conducted around the world, so analyzing the differences between domestic and foreign microplastics research can be a milestone in establishing the direction of domestic research. In this study, microplastic papers from KCI and WoS were extracted and the differences between domestic and foreign studies were analyzed using a network analysis methodology based on big data such as author keyword co-occurrence word analysis, thesis co-citation analysis, and author co-citation analysis. As a result of the analysis, the analysis of the research topic confirmed that studies that could affect the human body and the treatment of microplastics in daily life were additionally needed in Korea. In the analysis of the depth of thesis citation that examines the quality of research, it was found that Korea was still insufficient at 2.25 overseas and 1.39 in Korea. In the analysis of the composition of the joint research front, where various researchers participate and share information, 3 out of 22 clusters in Korea are Star type. In the case of overseas, all 19 clusters have a mesh structure, so it was confirmed that information flow and sharing were insufficient in specific research fields in Korea. These research results confirmed the need to expand the research topic of microplastics, improve the quality of research, and improve the research promotion system in which various researchers participate. In addition, if the automation program is developed based on topic modeling, it will be possible to build a system capable of real-time analysis.

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification (화자식별 기반의 AI 음성인식 서비스에 대한 사이버 위협 분석)

  • Hong, Chunho;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.33-40
    • /
    • 2021
  • Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.

A Real-time Hand Pose Recognition Method with Hidden Finger Prediction (은닉된 손가락 예측이 가능한 실시간 손 포즈 인식 방법)

  • Na, Min-Young;Choi, Jae-In;Kim, Tae-Young
    • Journal of Korea Game Society
    • /
    • v.12 no.5
    • /
    • pp.79-88
    • /
    • 2012
  • In this paper, we present a real-time hand pose recognition method to provide an intuitive user interface through hand poses or movements without a keyboard and a mouse. For this, the areas of right and left hands are segmented from the depth camera image, and noise removal is performed. Then, the rotation angle and the centroid point of each hand area are calculated. Subsequently, a circle is expanded at regular intervals from a centroid point of the hand to detect joint points and end points of the finger by obtaining the midway points of the hand boundary crossing. Lastly, the matching between the hand information calculated previously and the hand model of previous frame is performed, and the hand model is recognized to update the hand model for the next frame. This method enables users to predict the hidden fingers through the hand model information of the previous frame using temporal coherence in consecutive frames. As a result of the experiment on various hand poses with the hidden fingers using both hands, the accuracy showed over 95% and the performance indicated over 32 fps. The proposed method can be used as a contactless input interface in presentation, advertisement, education, and game applications.

Simulation Study on the Calculation of Weapon System's Operating Maintenance Costs to develop LCS-P (LCS-P 개발을 위한 무기체계 운용유지비 산출 시뮬레이션 연구)

  • Kim, Kyung-Rok;Kim, Hee-Wook;Jeong, Jun;Cha, Jong-Han;Jeong, Do-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.82-91
    • /
    • 2020
  • Recently, the research and development of weapon systems have expanded from ILS centered on acquisition costs to LCS, including operating maintenance costs. Regulations define the provision and formula of operating maintenance costs, but this does not consider the characteristics of the design and operation/maintenance of real weapon systems based on engineering calculations. Therefore, this study suggests a simulation design method to complement these areas and produce more accurate operating maintenance costs. The research procedures are as follows. First, the provision and formula of operating maintenance costs were defined to make the simulation results applicable. Second, a simulation model was developed by reviewing design considerations so that the simulation results reflect reality more accurately. The design considerations include the PBS of weapon systems, operation schedules, specifications for operation/maintenance/warehouse facilities, and basic cost information (personnel expense and spare part/equipment cost). This study is expected to be effective in calculating the operating maintenance costs more easily and accurately.

Research trends to analysis of 『Muyedobotongji』 (『무예도보통지』 연구동향 분석)

  • Kwak, Nak-hyun
    • (The)Study of the Eastern Classic
    • /
    • no.55
    • /
    • pp.193-221
    • /
    • 2014
  • This study aims to analyze trends of advanced research of "Muyedobotongji". The conclusions are as following in these. First, the number of theses related with "Muyedobotongji" is 47 in total including 29 master's theses and 18 doctor's theses. The sports science comprises the largest proportion of study including 23 master's degree and 12 doctor's degree. Besides sports science field, "Muyedobotongji" is analyzed in various study fields such as library and information, engineering, science of art and culture contents. In master's theses, They focused on practical ways of "Muyedobotongji". But "Muyedobotongji" is conducted by perspective of the humanities in doctor's theses. Second, There are 72 theses related with "Muyedobotongji" in scientific journal. Regarding these in detail, there are 35 theses in sports science, 12 theses in Korean history, 7 theses in martial arts, 5 theses in dance studies, 4 these in Korean studies, 2 theses in Chinse studies, 2 theses in art history, 1 these in Japanese literature and 1 thesis in military science. This fact helps us understand "Muyedobotongji" is studied actively in sports science field. Third, the future research directions of "Muyedobotongji" Should be considered in 3 categories. first, it needs to do interdisciplinary fusion research. Through this, it can complement insufficient parts of existing researches. Second, it needs to make standard Key words. The unified Key words are able to use communicating in different field of scientific journals without confusing. Third It needs to build data bases which are applied to martial art areas. It can provide chances for both Korean martial arts and "Muyedobotongji" to be practiced in culture contents.

An Experimental Comparison of CNN-based Deep Learning Algorithms for Recognition of Beauty-related Skin Disease

  • Bae, Chang-Hui;Cho, Won-Young;Kim, Hyeong-Jun;Ha, Ok-Kyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.25-34
    • /
    • 2020
  • In this paper, we empirically compare the effectiveness of training models to recognize beauty-related skin disease using supervised deep learning algorithms. Recently, deep learning algorithms are being actively applied for various fields such as industry, education, and medical. For instance, in the medical field, the ability to diagnose cutaneous cancer using deep learning based artificial intelligence has improved to the experts level. However, there are still insufficient cases applied to disease related to skin beauty. This study experimentally compares the effectiveness of identifying beauty-related skin disease by applying deep learning algorithms, considering CNN, ResNet, and SE-ResNet. The experimental results using these training models show that the accuracy of CNN is 71.5% on average, ResNet is 90.6% on average, and SE-ResNet is 95.3% on average. In particular, the SE-ResNet-50 model, which is a SE-ResNet algorithm with 50 hierarchical structures, showed the most effective result for identifying beauty-related skin diseases with an average accuracy of 96.2%. The purpose of this paper is to study effective training and methods of deep learning algorithms in consideration of the identification for beauty-related skin disease. Thus, it will be able to contribute to the development of services used to treat and easy the skin disease.

Establishment of the Suitability Class in Ginseng Cultivated Lands (인삼 재배 적지 기준 설정 연구)

  • Hyeon, Geun-Soo;Kim, Seong-Min;Song, Kwan-Cheol;Yeon, Byeong-Yeol;Hyun, Dong-Yun
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.42 no.6
    • /
    • pp.430-438
    • /
    • 2009
  • An attempt was made to establish the suitability classes of lands for the cultivation of ginseng(Panax ginseng C. A. Meyer). For this study, the relationships between various soil characteristics and ginseng yields were investigated on altogether 450 ginseng fields (150 sites in paddy and 300 sites in upland), across Kangwon, Kyunggi, Chungbug, Chungnam, Jonbug and Kyungbug Provinces, where ginseng is widely cultivated. In the paddy fields, most influential properties of soil on the ginseng yields was found to be the drainage class. Texture of surface soil and available soil depths affected the ginseng yields to some extents. However, the topography, slope, and the gravel content were found not to affect the ginseng yields. In the uplands, the texture of surface soil was most influential and the topography, slope, and occurrence depth of hard-pan were least influential on the performance of the crop. Making use of multiple regression, by SAS, the contribution of soil morphological and physical properties such as, topography, surface soil texture, drainage class, slope, available soil depth, gravel content, and appearance depth of hard-pan, for the suitability of land for ginseng cultivation was analyzed. Based on the results of above analysis, adding up all of the suitability indices, land suitability classes for ginseng cultivation were proposed. On top of this, taking the weather conditions into consideration, suitability of land for ginseng cultivation was established in paddy field and in uplands. As an example, maps showing the distribution of suitable land for ginseng cultivation were drawn, adopting the land suitability classes obtained through current study, soil map, climate map, and GIS information, for Eumsung County, Chungbug Province. Making use of the information on the land suitability for ginseng cultivation obtained from current study, the suitability of lands currently under cultivation of ginseng was investigated. The results indicate that 74.0% of them in paddy field and 88.3% in upland are "highly suitable" and "suitable".

Biographical Context of Participation in Social Movement : A biography-reconstructive analysis on experiences in Miryang struggle against 765kV transmission tower (구술생애사 기록을 통해 본 사회운동참여의 맥락 밀양765kV송전탑건설반대운동에 참여한 여성주민들의 구술생애사 분석을 중심으로)

  • Kim, Young;Seol, Moonwon
    • The Korean Journal of Archival Studies
    • /
    • no.44
    • /
    • pp.101-151
    • /
    • 2015
  • This article analyzes biographies of women participants in Miryang struggle against 765㎸ transmission tower and finds that the experience of state violence under the ideological conflicts works the biographical context of participation in environment movement. The cases analyzed in this article disclose the family member's experience of state violence and their trauma through the participation in social movement. And they legitimize their family member's life, heal their trauma, and live a new life by the social movement participation. But the power of healing trauma comes from solidarity and support in social movement. Findings of this article imply that experiences of state violence have influence on the formation and development of various Korean social movements and we need more solidarity and democracy for healing the trauma occurred by state violence and concealed in individual memory. Findings of this article also suggest the importance of biography documents. Biography documents can contribute to widen and to deepen understandings on the social interaction and social history, because they are the document about people's experience who are excluded from the official history and character culture. Moreover biography documents can compensate the official documents, because they can offer the context to the social actions in the official documents. More accumulations and analyses on biographies can serve to widen and to deepen understanding and explanation of Korean society having multilayered exclusion in the process of the compressed modernization and the history of national division.

Improvements in Patch-Based Machine Learning for Analyzing Three-Dimensional Seismic Sequence Data (3차원 탄성파자료의 층서구분을 위한 패치기반 기계학습 방법의 개선)

  • Lee, Donguk;Moon, Hye-Jin;Kim, Chung-Ho;Moon, Seonghoon;Lee, Su Hwan;Jou, Hyeong-Tae
    • Geophysics and Geophysical Exploration
    • /
    • v.25 no.2
    • /
    • pp.59-70
    • /
    • 2022
  • Recent studies demonstrate that machine learning has expanded in the field of seismic interpretation. Many convolutional neural networks have been developed for seismic sequence identification, which is important for seismic interpretation. However, expense and time limitations indicate that there is insufficient data available to provide a sufficient dataset to train supervised machine learning programs to identify seismic sequences. In this study, patch division and data augmentation are applied to mitigate this lack of data. Furthermore, to obtain spatial information that could be lost during patch division, an artificial channel is added to the original data to indicate depth. Seismic sequence identification is performed using a U-Net network and the Netherlands F3 block dataset from the dGB Open Seismic Repository, which offers datasets for machine learning, and the predicted results are evaluated. The results show that patch-based U-Net seismic sequence identification is improved by data augmentation and the addition of an artificial channel.

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.