• Title/Summary/Keyword: 단일 클래스 분류

Search Result 69, Processing Time 0.024 seconds

Semantic Segmentation of Drone Images Based on Combined Segmentation Network Using Multiple Open Datasets (개방형 다중 데이터셋을 활용한 Combined Segmentation Network 기반 드론 영상의 의미론적 분할)

  • Ahram Song
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_3
    • /
    • pp.967-978
    • /
    • 2023
  • This study proposed and validated a combined segmentation network (CSN) designed to effectively train on multiple drone image datasets and enhance the accuracy of semantic segmentation. CSN shares the entire encoding domain to accommodate the diversity of three drone datasets, while the decoding domains are trained independently. During training, the segmentation accuracy of CSN was lower compared to U-Net and the pyramid scene parsing network (PSPNet) on single datasets because it considers loss values for all dataset simultaneously. However, when applied to domestic autonomous drone images, CSN demonstrated the ability to classify pixels into appropriate classes without requiring additional training, outperforming PSPNet. This research suggests that CSN can serve as a valuable tool for effectively training on diverse drone image datasets and improving object recognition accuracy in new regions.

A Fuzzy Weights Decision Method based on Degree of Contribution for Recognition of Insect Footprints (곤충 발자국 인식을 위한 기여도 기반의 퍼지 가중치 결정 방법)

  • Shin, Bok-Suk;Cha, Eui-Young;Woo, Young-Woon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.55-62
    • /
    • 2009
  • This paper proposes a decision method of fuzzy weights by utilizing degrees of contribution in order to classify insect footprint patterns having difficulties to classify species clearly. Insect footprints revealed delicately in the form of scattered spots since they are very small. Therefore it is not easy to define shape of footprints unlike other species, and there are lots of noises in the footprint patterns so that it is difficult to distinguish those from correct data. For these reasons, the extracted feature set has obvious feature values with some uncertain feature values, so we estimate weights according to degrees of contribution. If the one of feature values has distinct difference enough to decide a class among other classes, high weight is assigned to make classification. A calculated weight determines the membership values by fuzzy functions and objects are classified into the class having a superior value.atu present experimental resultseighrontribution. Iinsect footprints with noises by the proposed method.

The Optimization of Hybrid BCI Systems based on Blind Source Separation in Single Channel (단일 채널에서 블라인드 음원분리를 통한 하이브리드 BCI시스템 최적화)

  • Yang, Da-Lin;Nguyen, Trung-Hau;Kim, Jong-Jin;Chung, Wan-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.1
    • /
    • pp.7-13
    • /
    • 2018
  • In the current study, we proposed an optimized brain-computer interface (BCI) which employed blind source separation (BBS) approach to remove noises. Thus motor imagery (MI) signal and steady state visual evoked potential (SSVEP) signal were easily to be detected due to enhancement in signal-to-noise ratio (SNR). Moreover, a combination between MI and SSVEP which is typically can increase the number of commands being generated in the current BCI. To reduce the computational time as well as to bring the BCI closer to real-world applications, the current system utilizes a single-channel EEG signal. In addition, a convolutional neural network (CNN) was used as the multi-class classification model. We evaluated the performance in term of accuracy between a non-BBS+BCI and BBS+BCI. Results show that the accuracy of the BBS+BCI is achieved $16.15{\pm}5.12%$ higher than that in the non-BBS+BCI by using BBS than non-used on. Overall, the proposed BCI system demonstrate a feasibility to be applied for multi-dimensional control applications with a comparable accuracy.

Cluster-based Image Retrieval Method Using RAGMD (RAGMD를 이용한 클러스터 기반의 영상 검색 기법)

  • Jung, Sung-Hwan;Lee, Woo-Sun
    • The KIPS Transactions:PartB
    • /
    • v.9B no.1
    • /
    • pp.113-118
    • /
    • 2002
  • This paper presents a cluster-based image retrieval method. It retrieves images from a related cluster after classifying images into clusters using RAGMD, a clustering technique. When images are retrieved, first they are retrieved not from the whole image database one by one but from the similar cluster, a similar small image group with a query image. So it gives us retrieval-time reduction, keeping almost the same precision with the exhaustive retrieval. In the experiment using an image database consisting of about 2,400 real images, it shows that the proposed method is about 18 times faster than 7he exhaustive method with almost same precision and it can retrieve more similar images which belong to the same class with a query image.

A cell scheduling of a logically separated buffer in ATM switch (ATM 스위치에서 논리적으로 분할된 버퍼의 셀 스케쥴링)

  • 구창회;나지하;박권철;박광채
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1755-1764
    • /
    • 1997
  • In this paper, we proposed the mechanism for the buffer allocation and a cell scheduling method with logical separation a single buffer in the ATm switch, and analyzed the cell loss probability and the delay of each trafic (CBR/VBR/ABR) based on the weighted value and the dynamic cell service scheduling algorithm. The proposed switch buffering system classifies composite trafics incoming to the switch, according to the characteristic of traffic, then stores them in the logically separated buffers, and adopts the round-robin service with weighted value in order to transmit cells in buffers though one output port. We analyzed 4 cell service scheduling algorithms with dynamic round-robinfor each logically separated service line of a single buffer, in which buffers have the respective weighted values and 3 classes on mixed traffic which characteristized by traffic descriptor. In simulation, using SIMCRIPT II.5., we model the VBR and the ABR traffics as ON/OFF processes, and the CBR traffic as a Poisson processes. As the results of analysis according to the proposed buffer management mechanism and cell service algorithm, we have found that the required QoS of each VC can be quaranteed depends on a scale of weighted values allocated to buffers that changed the weighted values, and cell scheduling algorithm.

  • PDF

A Personal Digital Library on a Distributed Mobile Multiagents Platform (분산 모바일 멀티에이전트 플랫폼을 이용한 사용자 기반 디지털 라이브러리 구축)

  • Cho Young Im
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.12
    • /
    • pp.1637-1648
    • /
    • 2004
  • When digital libraries are developed by the traditional client/sever system using a single agent on the distributed environment, several problems occur. First, as the search method is one dimensional, the search results have little relationship to each other. Second, the results do not reflect the user's preference. Third, whenever a client connects to the server, users have to receive the certification. Therefore, the retrieval of documents is less efficient causing dissatisfaction with the system. I propose a new platform of mobile multiagents for a personal digital library to overcome these problems. To develop this new platform I combine the existing DECAF multiagents platform with the Voyager mobile ORB and propose a new negotiation algorithm and scheduling algorithm. Although there has been some research for a personal digital library, I believe there have been few studies on their integration and systemization. For searches of related information, the proposed platform could increase the relationship of search results by subdividing the related documents, which are classified by a supervised neural network. For the user's preference, as some modular clients are applied to a neural network, the search results are optimized. By combining a mobile and multiagents platform a new mobile, multiagents platform is developed in order to decrease a network burden. Furthermore, a new negotiation algorithm and a scheduling algorithm are activated for the effectiveness of PDS. The results of the simulation demonstrate that as the number of servers and agents are increased, the search time for PDS decreases while the degree of the user's satisfaction is four times greater than with the C/S model.

A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection (알려지지 않은 위협 탐지를 위한 CBA와 OCSVM 기반 하이브리드 침입 탐지 시스템)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Yun, Jiyoung;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.27-35
    • /
    • 2021
  • With the development of the Internet, various IT technologies such as IoT, Cloud, etc. have been developed, and various systems have been built in countries and companies. Because these systems generate and share vast amounts of data, they needed a variety of systems that could detect threats to protect the critical data contained in the system, which has been actively studied to date. Typical techniques include anomaly detection and misuse detection, and these techniques detect threats that are known or exhibit behavior different from normal. However, as IT technology advances, so do technologies that threaten systems, and these methods of detection. Advanced Persistent Threat (APT) attacks national or companies systems to steal important information and perform attacks such as system down. These threats apply previously unknown malware and attack technologies. Therefore, in this paper, we propose a hybrid intrusion detection system that combines anomaly detection and misuse detection to detect unknown threats. Two detection techniques have been applied to enable the detection of known and unknown threats, and by applying machine learning, more accurate threat detection is possible. In misuse detection, we applied Classification based on Association Rule(CBA) to generate rules for known threats, and in anomaly detection, we used One-Class SVM(OCSVM) to detect unknown threats. Experiments show that unknown threat detection accuracy is about 94%, and we confirm that unknown threats can be detected.

A Study on Mapping Relations between eBook Contents for Conversion (전자책 문서 변환을 위한 컨텐츠 대응 관계에 관한 연구)

  • 고승규;임순범;김성혁;최윤철
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.2
    • /
    • pp.99-111
    • /
    • 2003
  • By virtue of diverse advantages derived from digital media, eBook is getting started to use. And many market research agencies have predicted that its market will be greatly expanded soon. But against those expectations, copyright-related problems and the difficulties of its accessing inherited from various eBook content formats become an obstacle to its diffusion. The first problems can be solved by DRM technology. And to solve the second problems, each nation has published its own content standard format. But the domestic standards are useful only the domestic level, they still leave the problems in the national level. The variety of content formats has created a demand for mechanisms that allow the exchange of eBook contents. Therefore we study the mapping relations between eBook contents for conversion. To define the mapping relations, first we extract the mapping both between eBook contents and between normal XML documents. From those mappings, we define seven mapping relations and classify them by cardinality. And we analyze the classified relations, which can be generated by automatic, or not. Using these results, we also classify the eBook content conversion as automatic, semi-automatic, and manual. Besides, we provide the conversion templates for mapping relations for automatic generation of conversion scripts. To show the feasibility of conversion templates, we apply them to the eBook content conversion. Experiment shows that our conversion templates generate the conversion scripts properly. We expected that defined mapping relations and conversion templates can be used not only in eBook content conversion , but also in normal XML document conversion.

  • PDF

Classification and identification of organic aerosols in the atmosphere over Seoul using two dimensional gas chromatography-time of flight mass spectrometry (GC×GC/TOF-MS) data (GC×GC/TOF-MS를 이용한 서울 대기 중 유기 에어로졸의 분류 및 동정)

  • Jeon, So Hyeon;Lim, Hyung Bae;Choi, Na Rae;Lee, Ji Yi;Ahn, Yun Kyong;Kim, Yong Pyo
    • Particle and aerosol research
    • /
    • v.14 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • To identify a variety of organic compounds in the ambient aerosols, the two-dimensional gas chromatography-time of flight mass spectrometry (GCxGC) system (2DGC) has been applied. While 2DGC provides more peaks, the amount of the generated data becomes huge. A two-step approach has been proposed to efficiently interpret the organic aerosol analysis data. The two-dimensional 2DGC data were divided into 6 chemical groups depending on their volatility and polarity. Using these classification standards, all the peaks were subject to both qualitative and quantitative analyses and then classified into 8 classes. The aerosol samples collected in Seoul in summer 2013 and winter 2014 were used as the test case. It was found that some chemical classes such as furanone showed seasonal variation in the high polarity-volatile organic compounds (HP-VOC) group. Also, for some chemical classes, qualitative and quantitative analyses showed different trends. Limitations of the proposed method are discussed.