• Title/Summary/Keyword: 시스템 원형

Search Result 626, Processing Time 0.026 seconds

The Estimation of the Target Position and Size Using Multi-layer Neural Network in Electrical Impedance Tomography (전기 임피던스 단층촬영법에서 다층 신경회로망을 이용한 표적의 위치와 크기 추정)

  • Kim, Ji-Hoon;Kim, Chan-Yong;Cho, Tae-Hyun;Lee, In-Soo
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.11
    • /
    • pp.35-41
    • /
    • 2018
  • Electrical impedance tomography (EIT) is a kind of nondestructive testing technique that obtains the internal resistivity distribution from the voltages measured at the electrodes located outside the area of interest. However, an image reconstruction problem in EIT has innate non-linearity and ill-posedness, so that it is difficult to obtain satisfactory reconstructed results. In general, a neural network can efficiently model the input and output relationships of a non-linear system. This paper proposes a method for estimating the position and size of a circular target using a multi-layer neural network. To verify the performance of the proposed method, neural network was trained and various computer simulations were performed and satisfactory performance was verified.

Possibility of Information Leakage through Analysis of Chinese Antivirus Software (중국 안티바이러스 제품 분석을 통한 정보유출 가능성 연구)

  • Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1369-1374
    • /
    • 2021
  • Recently, controversy has been raised over the security and safety of Chinese-made network equipment (Huawei 5G), apps (TikTok, etc.). In particular, according to the results of the Ministry of Defense investigation in 2020, malicious codes were found in CCTVs made in China that were delivered as military surveillance equipment used as a coast guard system, and specific information was remotely transmitted to a Chinese server. The safety issues of these Chinese security products can be questioned as being systematically led by the state rather than by companies or individuals. In this paper, we perform network and process level analysis of 360 Total Security(360 TS), a Chinese antivirus software. In addition, it compares and analyzes the domestic cloud-based vaccine V3 Lite product. Through this, the safety of Chinese security solutions is checked and information leakage and risks are suggested.

Vision-based Food Shape Recognition and Its Positioning for Automated Production of Custom Cakes (주문형 케이크 제작 자동화를 위한 영상 기반 식품 모양 인식 및 측위)

  • Oh, Jang-Sub;Lee, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1280-1287
    • /
    • 2020
  • This paper proposes a vision-based food recognition method for automated production of custom cakes. A small camera module mounted on a food art printer recognizes objects' shape and estimates their center points through image processing. Through the perspective transformation, the top-view image is obtained from the original image taken at an oblique position. The line and circular hough transformations are applied to recognize square and circular shapes respectively. In addition, the center of gravity of each figure are accurately detected in units of pixels. The test results show that the shape recognition rate is more than 98.75% under 180 ~ 250 lux of light and the positioning error rate is less than 0.87% under 50 ~ 120 lux. These values sufficiently meet the needs of the corresponding market. In addition, the processing delay is also less than 0.5 seconds per frame, so the proposed algorithm is suitable for commercial purpose.

An Implementation of Database Security Using Steganography in the Web (웹 상에서 스테가노그라피 기법을 이용한 안전한 데이터베이스 보안 구현)

  • Moon, Bong-Keun;Ryoo, Du-Gyu;Ko, Myung-Sun;Eom, Ki-Won;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.3-11
    • /
    • 2005
  • As the usage of Internet grows, we share many informations among the others and use more database systems for a various type of data. However, secure database system, which prevents the unauthorized users from modification, deletion, and access, is urgently required for sharing data in Internet. Conventional technologies of a data security are passive methods which depend on several steps with an access control, and these methods are vulnerable against the illegal attack because attacker can see the plain text that is private message. To prevent private data item for the special security from the malicious attack in web database, this paper is devoted to implement database system using steganography method, so we can protect the data item completely because attacker cannot know the secure message although he get the content of database.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Generating Pairwise Comparison Set for Crowed Sourcing based Deep Learning (크라우드 소싱 기반 딥러닝 선호 학습을 위한 쌍체 비교 셋 생성)

  • Yoo, Kihyun;Lee, Donggi;Lee, Chang Woo;Nam, Kwang Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.5
    • /
    • pp.1-11
    • /
    • 2022
  • With the development of deep learning technology, various research and development are underway to estimate preference rankings through learning, and it is used in various fields such as web search, gene classification, recommendation system, and image search. Approximation algorithms are used to estimate deep learning-based preference ranking, which builds more than k comparison sets on all comparison targets to ensure proper accuracy, and how to build comparison sets affects learning. In this paper, we propose a k-disjoint comparison set generation algorithm and a k-chain comparison set generation algorithm, a novel algorithm for generating paired comparison sets for crowd-sourcing-based deep learning affinity measurements. In particular, the experiment confirmed that the k-chaining algorithm, like the conventional circular generation algorithm, also has a random nature that can support stable preference evaluation while ensuring connectivity between data.

Algorithm for Deadlock Prevention of Generalized Philosophers' Dining Problem (일반화된 철학자 만찬 문제의 교착상태 예방 알고리즘)

  • Sang-Un Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.73-78
    • /
    • 2023
  • The dining philosophers problem(DPP) is that five philosophers sit around a round table and eat spaghetti(or noodles) together, where they must have a pair of chopsticks(two) on both sides of them to eat, and if all philosophers have one chopstick on the right, no one can eat because the deadlock occurs. Deadlocks are a problem that frequently occur in parallel systems, and most current operating systems(OS) cannot prevent it. This paper proposes a silver bullet that causes no deadlock in an OS where all processors of 2≤n≤∞ have multiple parallel processing capabilities. The proposed method is a group round-robin method in which ⌊n/2⌋ odd processors form a group and perform simultaneously, and shift right to the next processor when execution ends. The proposed method is to perform two times for even processors, three times for odd processors per one round-robin. If the proposed method is performed n times, even-numbered processors perform n/2 times and odd-numbered processors perform (n-1)/2-times.

Punching System for Plastic Mulching at Soybean Field - Effect of Punching Knife Shape on the Cutting Performance (비닐 천공 시스템 개발 - 칼날 형상이 천공 성능에 미치는 영향)

  • Hong, Sungha;Choi, Ahnryul;Lee, Kyouseung
    • Journal of agriculture & life science
    • /
    • v.50 no.5
    • /
    • pp.217-224
    • /
    • 2016
  • In this study, performance of a developed automatic punching machine considering the planting density of soybeans was evaluated in the case of the operation speed of 0.18-0.28 m/s. The performance demonstrated a rate of 320-500 ㎡/h, 260-400 ㎡/h, and 210-330 ㎡/h for the 0.20 m, 0.25 m, and 0.30 m soybean planting density, respectively. One hundred percent punching capacity was confirmed in 30 mm distance between the ground and the blade. Additionally, in the 50 mm distance condition, the performance of round, square, and hexagonal blades were observed in the range of 16.7-25.2%, 33.0-42.3%, and 54.5-100.0%, respectively. Above all, the hexagonal blade with a 60° edge angle had the most superior cutting quality demonstrating a smooth and soft cutting plane of the plastic.

Stress-Strain Relations of Concrete According to the Confining Conditions (구속 조건에 따른 콘크리트 응력-변형률 관계)

  • Im, Seok Been;Han, Taek Hee;Han, Sang Yun;Kang, Young Jong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4A
    • /
    • pp.743-752
    • /
    • 2006
  • Confined concrete has enhanced strength and ductility compared with unconfined strength. Cause of these merits of confined concrete, many researches have been performed for confining effects of concrete and been studied in many fields. Although many researches about concrete confined by FRP sheets have been studied recently, it is difficult to apply concrete confined by FRP in real structures because FRP is a brittle material. In this study, the enhanced strength and ductility of concrete which is confined by steel tubes or steel plates were investigated. Fifty one specimens were tested and each specimen has different confining condition. Test results showed enhanced ductility and strength of confined concrete and concrete models were suggested under various confining conditions by regression of experimental data.

Slacks pattern development for the female adolescents with lower-body obesity using virtual simulation system (가상착의 시스템을 활용한 하체 비만 여자 청소년의 슬랙스원형 설계)

  • Jiyoung Lim
    • The Research Journal of the Costume Culture
    • /
    • v.31 no.6
    • /
    • pp.793-805
    • /
    • 2023
  • This study analyzes the body shapes of lower-body obese female adolescents and proposes a slacks pattern suitable for their body type. Lower-body obesity is a prevalent type of teenage obesity, and our proposals aim to improve consumer satisfaction in ready-to-wear clothes across this demographic. We first observe characteristics of obese lower bodies, noting significantly above-average thigh and hip circumference. These figures indicate a high degree of curvature in obese lower bodies, along with a large drop value. Leveraging this data, we develop a novel slacks pattern using 3D avatars in a virtual simulation system. The formulas for the main areas of the pattern are as follows: front waist girth W/4+0.75cm+0.5cm, back waist girth W/4+0.5cm-0.5cm, front hip girth H/4+1.25cm-0.5cm, back hip girth H/4+2cm+0.5cm, front crotch extension H/16+0.5cm, back crotch extension H/8+1cm. Results from appearance evaluations show that this pattern minimizes strain rate on the waist and hips, and its average score is significantly higher than that of an alternative pattern that was also evaluated. The minimized strain rate and high average score indicate that our pattern assigns a sufficient amount of space to the appropriate areas. Based on these results, we expect our research to inform slacks pattern development and production for obese consumers of all types.