• 제목/요약/키워드: 딥러닝 기반 제어

검색결과 84건 처리시간 0.03초

Deep Learning Based Emergency Response Traffic Signal Control System

  • Jeong-In, Park
    • Journal of the Korea Society of Computer and Information
    • /
    • 제28권2호
    • /
    • pp.121-129
    • /
    • 2023
  • In this paper, we developed a traffic signal control system for emergency situations that can minimize loss of property and life by actively controlling traffic signals in a certain section in response to emergency situations. When the emergency vehicle terminal transmits an emergency signal including identification information and GPS information, the surrounding image is obtained from the camera, and the object is analyzed based on deep learning to output object information having information such as the location, type, and size of the object. After generating information tracking this object and detecting the signal system, the signal system is switched to emergency mode to identify and track the emergency vehicle based on the received GPS information, and to transmit emergency control signals based on the emergency vehicle's traveling route. It is a system that can be transmitted to a signal controller. This system prevents the emergency vehicle from being blocked by an emergency control signal that is applied first according to an emergency signal, thereby minimizing loss of life and property due to traffic obstacles.

Development of Smart Door Lock with Emergency Situation Recognition to Prevent Crime in Single Household Based on Deep Learning (딥러닝 기반 1인 가구 범죄 예방을 위한 긴급 상황 인식 스마트 도어록 개발)

  • Lee, Jinsun;Han, Jieun;Yoo, Hyuna;Park, Juyeon;Kim, Hyung Hoon;Shim, Hyeon-min
    • Annual Conference of KIPS
    • /
    • 한국정보처리학회 2020년도 추계학술발표대회
    • /
    • pp.251-254
    • /
    • 2020
  • 매년 1인 가구를 대상으로 한 범죄가 증가하고 있다. 이에 따라 지문인식, 스마트키와 같은 도어록 제품들이 출시되었지만 오히려 범죄에 악용되는 사례들이 발생하였다. 본 논문에서는 얼굴인식장치(face identifier, FI)를 통해 객체를 인식하고, 원격 도어록 관리자(remote door lock manager, RDM)를 통해 잠금제어부(locking control unit, LCU)를 관리하는 긴급 상황 인식 스마트 도어록을 제안한다. 사용자의 얼굴을 얼마나 빠르고 정확하게 인식하는지 속도와 신뢰도에 대한 테스트를 진행하였고, 긴급 상황 시 사용자가 안전하게 집으로 들어갈 수 있음을 확인하였다. 본 제품을 통해 주거 침입, 스토킹 등 1인 가구 대상 범죄율과 도어록 악용 범죄율이 낮아질 것으로 사료된다.

Design of an App for Growing Companion Plants using Smart Farm Technology (스마트 팜 기술을 이용한 반려식물 키우기 앱 설계)

  • Ok-Kyoon Ha;Hyeon-sang Soon;Hyoun-jun Lee;Chang-hui Seo;Seong-hun Jo;Ji-yun Kang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 한국컴퓨터정보학회 2023년도 제68차 하계학술대회논문집 31권2호
    • /
    • pp.455-456
    • /
    • 2023
  • 현대인들의 바쁜 생활방식과 그로 인한 1인 가구 비율의 증가 등 사회적 요소로 인해 외로움을 겪으면서 우울증을 호소하는 사람이 증가하고 있고, 이에 따라 반려식물에 대한 관심과 시장이 증가하고 있다. 기존의 스마트 팜 시스템 관련 기술은 자동화 및 액추에이터 제어, 데이터 분석 및 예측 등 자동화와 정보 제공을 목적으로 사용되고 있다. 홈 가드닝을 통한 식물 키우기에 대한 관심 증가와 더불어 반려식물로 식물에 대한 교감을 제공하는 기능은 제공되지 않고 있다. 본 논문에서는 반려식물의 상태를 감정으로 전달하는 디지털 기반의 홈가드닝 앱을 제시한다. 제시하는 앱은 실제 스마트 팜 시스템과 실시간으로 연결되어 식물의 성장에 따라 변화하는 모습을 적합한 식물 캐릭터로 바꾸어 시각적으로 제공한다. 또한, 딥러닝 기술을 이용하여 식물의 성장 단계를 자동으로 분류하고, 식물의 생육 환경을 판단하여 캐럭터화된 식물의 표정을 제공한다. 제시하는 앱은 반려식물을 키우는 사람의 노동력을 줄여주고, 반려식물과의 교감을 제공하는 다양한 경험을 제시할 수 있다.

  • PDF

Speed Prediction and Analysis of Nearby Road Causality Using Explainable Deep Graph Neural Network (설명 가능 그래프 심층 인공신경망 기반 속도 예측 및 인근 도로 영향력 분석 기법)

  • Kim, Yoo Jin;Yoon, Young
    • Journal of the Korea Convergence Society
    • /
    • 제13권1호
    • /
    • pp.51-62
    • /
    • 2022
  • AI-based speed prediction studies have been conducted quite actively. However, while the importance of explainable AI is emerging, the study of interpreting and reasoning the AI-based speed predictions has not been carried out much. Therefore, in this paper, 'Explainable Deep Graph Neural Network (GNN)' is devised to analyze the speed prediction and assess the nearby road influence for reasoning the critical contributions to a given road situation. The model's output was explained by comparing the differences in output before and after masking the input values of the GNN model. Using TOPIS traffic speed data, we applied our GNN models for the major congested roads in Seoul. We verified our approach through a traffic flow simulation by adjusting the most influential nearby roads' speed and observing the congestion's relief on the road of interest accordingly. This is meaningful in that our approach can be applied to the transportation network and traffic flow can be improved by controlling specific nearby roads based on the inference results.

Warehouse Fire Suppression Robot with Image-based Deep learning (영상기반 딥러닝을 이용한 창고 화재 진압 로봇)

  • Lee, Wan-gi;Cho, Beom-yeon;Lee, Han-se;Lee, Kang-ju;Kim, Hyung-hoon;Shim, Hyeon-min
    • Annual Conference of KIPS
    • /
    • 한국정보처리학회 2022년도 추계학술발표대회
    • /
    • pp.887-889
    • /
    • 2022
  • 화재로 발생하는 산업시설의 인명·재산 피해를 줄이고 기존 소방 설비의 단점을 보완하는 소방 로봇을 제안한다. 소방 로봇은 무인 시스템으로 설계되었으며 6개의 핵심 기능인 화재 감지, 화재 진압, 현장 이동, 화재 알림, 소방서 신고, 현장 모니터링으로 구성된다. 로봇의 구성은 구동부, 제어부, 소화부로 이루어져 있으며, 각 구성 중 일부를 선정하고 테스트 통하여 화재 진압에 유효함을 증명하였다.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • 제23권4호
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

Application of deep learning method for decision making support of dam release operation (댐 방류 의사결정지원을 위한 딥러닝 기법의 적용성 평가)

  • Jung, Sungho;Le, Xuan Hien;Kim, Yeonsu;Choi, Hyungu;Lee, Giha
    • Journal of Korea Water Resources Association
    • /
    • 제54권spc1호
    • /
    • pp.1095-1105
    • /
    • 2021
  • The advancement of dam operation is further required due to the upcoming rainy season, typhoons, or torrential rains. Besides, physical models based on specific rules may sometimes have limitations in controlling the release discharge of dam due to inherent uncertainty and complex factors. This study aims to forecast the water level of the nearest station to the dam multi-timestep-ahead and evaluate the availability when it makes a decision for a release discharge of dam based on LSTM (Long Short-Term Memory) of deep learning. The LSTM model was trained and tested on eight data sets with a 1-hour temporal resolution, including primary data used in the dam operation and downstream water level station data about 13 years (2009~2021). The trained model forecasted the water level time series divided by the six lead times: 1, 3, 6, 9, 12, 18-hours, and compared and analyzed with the observed data. As a result, the prediction results of the 1-hour ahead exhibited the best performance for all cases with an average accuracy of MAE of 0.01m, RMSE of 0.015 m, and NSE of 0.99, respectively. In addition, as the lead time increases, the predictive performance of the model tends to decrease slightly. The model may similarly estimate and reliably predicts the temporal pattern of the observed water level. Thus, it is judged that the LSTM model could produce predictive data by extracting the characteristics of complex hydrological non-linear data and can be used to determine the amount of release discharge from the dam when simulating the operation of the dam.

Intelligent Green House Control System based on Deep Learning for Saving Electric Power Consumption (전력 소모 절감을 위한 딥 러닝기반의 지능형 그린 하우스 제어 시스템)

  • Shin, Hyeonyeop;Yim, Hyokyun;Kim, Won-Tae
    • Journal of IKEEE
    • /
    • 제22권1호
    • /
    • pp.53-60
    • /
    • 2018
  • Smart farm dissemination by continuously developing IoT is one of the best solution for decreasing labor in Korea farming area because of ageing. For this reason, the number of Smart farm in Korea is being increased. The Smart farm can control farming environment such as temperature for human. Specially, The important thing is controlling proper temperature for farming. In order to control the temperature, legacy smart farms are usually using pans or air conditioners which can control the temperature. However, those devices result in increasing production cost because the electric power consumption is high. For this reason, we propose a smart farm which can predict the proper temperature after an hour by using Deep learning to minimize the electric power consumption by controlling window instead of pans or air conditioners. We can see the 83% of electric power saving by means of the proposed smart farm.

Intrusion Detection System Based on Sequential Model in SOME/IP (SOME/IP 에서의 시퀀셜 모델 기반 침입탐지 시스템)

  • Kang, Yeonjae;Pi, Daekwon;Kim, Haerin;Lee, Sangho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제32권6호
    • /
    • pp.1171-1181
    • /
    • 2022
  • Front Collision-Avoidance Assist (FCA) or Smart Cruise Control (SCC) is installed in a modern vehicle, and the amount of data exchange between ECUs increases rapidly. Therefore, Automotive Ethernet, especially SOME/IP, which supports wide bandwidth and two-way communication, is widely adopted to overcome the bandwidth limitation of traditional CAN communication. SOME/IP is a standard protocol compatible with various automobile operating systems, and improves connectivity between components in the vehicle. However, no encryption or authentication process is defined in the SOME/IP protocol itself. Therefore, there is a need for a security study on the SOME/IP protocol. This paper proposes a deep learning-based intrusion detection system in SOME/IP and performs six attacks to confirm the performance of the intrusion detection system.

A Study on Synthetic Flight Vehicle Trajectory Data Generation Using Time-series Generative Adversarial Network and Its Application to Trajectory Prediction of Flight Vehicles (시계열 생성적 적대 신경망을 이용한 비행체 궤적 합성 데이터 생성 및 비행체 궤적 예측에서의 활용에 관한 연구)

  • Park, In Hee;Lee, Chang Jin;Jung, Chanho
    • Journal of IKEEE
    • /
    • 제25권4호
    • /
    • pp.766-769
    • /
    • 2021
  • In order to perform tasks such as design, control, optimization, and prediction of flight vehicle trajectories based on machine learning techniques including deep learning, a certain amount of flight vehicle trajectory data is required. However, there are cases in which it is difficult to secure more than a certain amount of flight vehicle trajectory data for various reasons. In such cases, synthetic data generation could be one way to make machine learning possible. In this paper, to explore this possibility, we generated and evaluated synthetic flight vehicle trajectory data using time-series generative adversarial neural network. In addition, various ablation studies (comparative experiments) were performed to explore the possibility of using synthetic data in the aircraft trajectory prediction task. The experimental results presented in this paper are expected to be of practical help to researchers who want to conduct research on the possibility of using synthetic data in the generation of synthetic flight vehicle trajectory data and the work related to flight vehicle trajectories.