• Title/Summary/Keyword: 동작 평가

Search Result 1,590, Processing Time 0.024 seconds

Comparative analysis of fusion factors affecting the accuracy of injection amount of remote fluid monitoring system (원격 수액모니터링 시스템의 주입량의 정확도에 영향을 주는 융합인자의 비교 분석)

  • Kim, Seon-Chil
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.125-131
    • /
    • 2022
  • Recently, the prevalence of remotely managed patient care systems in medical institutions is increasing due to COVID-19. In particular, in the case of fluid monitoring, hospitals are considering introducing it as a system that can reduce patient safety and nurses' work. There are two products under development: a load cell method that measures weight and a method that detects drops of sap by infrared sensing. Although each product has differences in operation principle, sensor type, size, usage, and price, medical institutions are highly interested in the accuracy of the data obtained.In this study, two prototypes with different sensor methods were manufactured and the total amount of infusion per hour was measured to test the accuracy, which is the core of the infusion monitoring device. In addition, when there was an external movement, the change in the measured value of the sap was tested to evaluate the accuracy according to the measurement method. As a result of the experiment, there was a difference of less than 5% in the measurement value error of the two devices, and the load cell method showed a difference in the low-capacity measurement value and the infrared method in the high-capacity measurement value. As a result of this experiment, there was little difference in accuracy according to the sensor method of the infusion monitoring device, and it is considered that there is no problem in accuracy when used in a medical institution.

Adversarial Learning-Based Image Correction Methodology for Deep Learning Analysis of Heterogeneous Images (이질적 이미지의 딥러닝 분석을 위한 적대적 학습기반 이미지 보정 방법론)

  • Kim, Junwoo;Kim, Namgyu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.11
    • /
    • pp.457-464
    • /
    • 2021
  • The advent of the big data era has enabled the rapid development of deep learning that learns rules by itself from data. In particular, the performance of CNN algorithms has reached the level of self-adjusting the source data itself. However, the existing image processing method only deals with the image data itself, and does not sufficiently consider the heterogeneous environment in which the image is generated. Images generated in a heterogeneous environment may have the same information, but their features may be expressed differently depending on the photographing environment. This means that not only the different environmental information of each image but also the same information are represented by different features, which may degrade the performance of the image analysis model. Therefore, in this paper, we propose a method to improve the performance of the image color constancy model based on Adversarial Learning that uses image data generated in a heterogeneous environment simultaneously. Specifically, the proposed methodology operates with the interaction of the 'Domain Discriminator' that predicts the environment in which the image was taken and the 'Illumination Estimator' that predicts the lighting value. As a result of conducting an experiment on 7,022 images taken in heterogeneous environments to evaluate the performance of the proposed methodology, the proposed methodology showed superior performance in terms of Angular Error compared to the existing methods.

A Scalable Montgomery Modular Multiplier (확장 가능형 몽고메리 모듈러 곱셈기)

  • Choi, Jun-Baek;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.625-633
    • /
    • 2021
  • This paper describes a scalable architecture for flexible hardware implementation of Montgomery modular multiplication. Our scalable modular multiplier architecture, which is based on a one-dimensional array of processing elements (PEs), performs word parallel operation and allows us to adjust computational performance and hardware complexity depending on the number of PEs used, NPE. Based on the proposed architecture, we designed a scalable Montgomery modular multiplier (sMM) core supporting eight field sizes defined in SEC2. Synthesized with 180-nm CMOS cell library, our sMM core was implemented with 38,317 gate equivalents (GEs) and 139,390 GEs for NPE=1 and NPE=8, respectively. When operating with a 100 MHz clock, it was evaluated that 256-bit modular multiplications of 0.57 million times/sec for NPE=1 and 3.5 million times/sec for NPE=8 can be computed. Our sMM core has the advantage of enabling an optimized implementation by determining the number of PEs to be used in consideration of computational performance and hardware resources required in application fields, and it can be used as an IP (intellectual property) in scalable hardware design of elliptic curve cryptography (ECC).

A Design of Point Scalar Multiplier for Binary Edwards Curves Cryptography (이진 에드워즈 곡선 암호를 위한 점 스칼라 곱셈기 설계)

  • Kim, Min-Ju;Jeong, Young-Su;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1172-1179
    • /
    • 2022
  • This paper describes a design of point scalar multiplier for public-key cryptography based on binary Edwards curves (BEdC). For efficient implementation of point addition (PA) and point doubling (PD) on BEdC, projective coordinate was adopted for finite field arithmetic, and computational performance was improved because only one inversion was involved in point scalar multiplication (PSM). By applying optimizations to hardware design, the storage and arithmetic steps for finite field arithmetic in PA and PD were reduced by approximately 40%. We designed two types of point scalar multipliers for BEdC, Type-I uses one 257-b×257-b binary multiplier and Type-II uses eight 32-b×32-b binary multipliers. Type-II design uses 65% less LUTs compared to Type-I, but it was evaluated that it took about 3.5 times the PSM computation time when operating with 240 MHz. Therefore, the BEdC crypto core of Type-I is suitable for applications requiring high-performance, and Type-II structure is suitable for applications with limited resources.

Filtering-Based Method and Hardware Architecture for Drivable Area Detection in Road Environment Including Vegetation (초목을 포함한 도로 환경에서 주행 가능 영역 검출을 위한 필터링 기반 방법 및 하드웨어 구조)

  • Kim, Younghyeon;Ha, Jiseok;Choi, Cheol-Ho;Moon, Byungin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.1
    • /
    • pp.51-58
    • /
    • 2022
  • Drivable area detection, one of the main functions of advanced driver assistance systems, means detecting an area where a vehicle can safely drive. The drivable area detection is closely related to the safety of the driver and it requires high accuracy with real-time operation. To satisfy these conditions, V-disparity-based method is widely used to detect a drivable area by calculating the road disparity value in each row of an image. However, the V-disparity-based method can falsely detect a non-road area as a road when the disparity value is not accurate or the disparity value of the object is equal to the disparity value of the road. In a road environment including vegetation, such as a highway and a country road, the vegetation area may be falsely detected as the drivable area because the disparity characteristics of the vegetation are similar to those of the road. Therefore, this paper proposes a drivable area detection method and hardware architecture with a high accuracy in road environments including vegetation areas by reducing the number of false detections caused by V-disparity characteristic. When 289 images provided by KITTI road dataset are used to evaluate the road detection performance of the proposed method, it shows an accuracy of 90.12% and a recall of 97.96%. In addition, when the proposed hardware architecture is implemented on the FPGA platform, it uses 8925 slice registers and 7066 slice LUTs.

Development of High-Sensitivity and Entry-Level Radiation Measuring Sensor Module (고감도 보급형 방사선 측정센서 모듈 개발)

  • Oh, Seung-Jin;Lee, Joo-Hyun;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.510-514
    • /
    • 2022
  • In this paper, we propose the development of high-sensitivity low-end radiation measuring sensor module. The proposed measurement sensor module is a scintillator + photomultiplier(SiPM) sensor optimization structure design, amplification and filter and control circuit design for sensor driver, control circuit design including short-distance communication, sensor mechanism design and manufacturing, and GUI development applied to prototypes consists of, etc. The scintillator + photomultiplier(SiPM) sensor optimization structure design is designed by checking the characteristics of the scintillator and the photomultiplier (SiPM) for the sensor structure design. Amplification, filter and control circuit design for sensor driver is designed to process fine scintillation signal generated by radiation with a scintillator using SiPM. Control circuit design including short-distance communication is designed to enable data transmission through MCU design to support short-range wireless communication function and wired communication support. The sensor mechanism design and manufacture is designed so that the glare generated by wrapping a reflective paper (mirroring) on the outside of the plastic scintillator is reflected to increase the efficiency in order to transmit the fine scintillation signal generated from the plastic scintillator to the photomultiplier(SiPM). The GUI development applied to the prototype expresses the date and time at the top according to each screen and allows the measurement unit and time, seconds, alarm level, communication status, battery capacity, etc. to be expressed. In order to evaluate the performance of the proposed system, the results of experiments conducted by an authorized testing institute showed that the radiation dose measurement range was 30 𝜇Sv/h ~ 10 mSv/h, so the results are the same as the highest level among products sold commercially at domestic and foreign. In addition, it was confirmed that the measurement uncertainty of ±7.4% was measured, and normal operation was performed under the international standard ±15%.

A Study about Directing Aspects and Contemporary Assessments during the Period of Coterie System(1931.7.8.-1932.12) of Shingeuk Troupe 'Geukyesulyeonguhoe(1931.7.8.-1938.3)' - Focusing on the First Trial Performance (5Act) - (신극 단체 '극예술연구회(1931.7.8.-1938.3)'의 동인제 시기(1931.7.8-1932.12) 연출 양상과 평가들에 관한 논고 - 제1회 시연작 <검찰관>(5막)을 예로 하여 -)

  • Sung, Meung-Heyn
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.156-168
    • /
    • 2022
  • This study was conducted to investigate the staging principle, the staging work and the trial performance of Shingeuk troupe Geukyesulyeonguhoe during the period of coterie system, focusing on Gogol work·Ham Daehoon translation·Hong Haeseong directing's (5Act). As a result, the first trial performance was based on a faithful full-scale description rather than an interpretive directing of play. It was a performance that focused on copying and implanting the external form of the performance stage of Shingeki troupe Tsukiji Little Theater. The general review of the time was summarized to the point that it was a relatively successful performance that exceeded expectations as a trial demonstration of amateur actors. However, in terms of the content of play and the form of performance, reservations and lack of contemporary(modern) interpretation caused the problem that the general audience was alienated. Therefore, it was difficult to achieve the effect of reflecting the reality of Chosun through , as Geukyesulyeonguhoe intended.

A Security SoC embedded with ECDSA Hardware Accelerator (ECDSA 하드웨어 가속기가 내장된 보안 SoC)

  • Jeong, Young-Su;Kim, Min-Ju;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1071-1077
    • /
    • 2022
  • A security SoC that can be used to implement elliptic curve cryptography (ECC) based public-key infrastructures was designed. The security SoC has an architecture in which a hardware accelerator for the elliptic curve digital signature algorithm (ECDSA) is interfaced with the Cortex-A53 CPU using the AXI4-Lite bus. The ECDSA hardware accelerator, which consists of a high-performance ECC processor, a SHA3 hash core, a true random number generator (TRNG), a modular multiplier, BRAM, and control FSM, was designed to perform the high-performance computation of ECDSA signature generation and signature verification with minimal CPU control. The security SoC was implemented in the Zynq UltraScale+ MPSoC device to perform hardware-software co-verification, and it was evaluated that the ECDSA signature generation or signature verification can be achieved about 1,000 times per second at a clock frequency of 150 MHz. The ECDSA hardware accelerator was implemented using hardware resources of 74,630 LUTs, 23,356 flip-flops, 32kb BRAM, and 36 DSP blocks.

The Effect of Abdominal Draw-in Maneuver with Leg Movements on Transversus Abdominis Thickness and Trunk Control in Stroke Patients (다리 움직임을 동반한 복부 드로우-인 기법이 뇌졸중 환자의 배가로근 두께와 몸통 조절에 미치는 영향)

  • Kang, Jeong-Il;Moon, Young-Jun;Jeong, Dae‐Keun
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.8
    • /
    • pp.287-294
    • /
    • 2020
  • The purpose of this study was, base on the observation that the leg movement has effect on muscles around trunk, to provide clinical fundamental data to develop effective abdominal draw-in technique by investigating the effect of abdominal draw-in exercise accompanying leg movement on the thickness of transversus abdominis muscle and trunk control ability in patients with stroke. The subjects were assigned randomly to experimental group I (n=9) on which the abdominal draw-in technique is applied and experimental group II (n=9) on which the abdominal draw-in technique accompanying leg movement is applied. The thickness of transversus abdominis muscle in the affected side and the trunk control ability were measured before and after treatment using ultrasonography and trunk impairment scale. A session of 30 minutes per day were performed four days a week for four weeks and the measured outcomes were analyzed. The in-group comparison showed significant difference both thickness of transversus abdominis muscle during abdominal draw-in technique application (p<0.01) and trunk control ability (p<0.001) between before and after treatment. The significant difference between two groups were observed only in trunk control ability (p<0.05). It was concluded that the abdominal draw-in technique accompanying leg movement is an intervention that has positive effect not only on transversus abdominis muscle but also on tunk control ability by inducing more efficient contraction reaction in muscles around trunk through autonomic pelvic movement caused by leg movement.

Detection of Delay Attack in IoT Automation System (IoT 자동화 시스템의 지연 공격 탐지)

  • Youngduk Kim;Wonsuk Choi;Dong hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.787-799
    • /
    • 2023
  • As IoT devices are widely used at home, IoT automation system that is integrate IoT devices for users' demand are gaining populrity. There is automation rule in IoT automation system that is collecting event and command action. But attacker delay the packet and make time that real state is inconsistent with state recongnized by the system. During the time, the system does not work correctly by predefined automation rule. There is proposed some detection method for delay attack, they have limitations for application to IoT systems that are sensitive to traffic volume and battery consumption. This paper proposes a practical packet delay attack detection technique that can be applied to IoT systems. The proposal scheme in this paper can recognize that, for example, when a sensor transmits an message, an broadcast packet notifying the transmission of a message is sent to the Server recognized that event has occurred. For evaluation purposes, an IoT system implemented using Raspberry Pi was configured, and it was demonstrated that the system can detect packet delay attacks within an average of 2.2 sec. The experimental results showed a power consumption Overhead of an average of 2.5 mA per second and a traffic Overhead of 15%. We demonstrate that our method can detect delay attack efficiently compared to preciously proposed method.