• Title/Summary/Keyword: 영상처리기법

Search Result 2,624, Processing Time 0.036 seconds

유비쿼터스 컴퓨팅 황경에서 발생하는 에이전트간 충돌 해결 모델

  • 이건수;김민구
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2004.11a
    • /
    • pp.249-258
    • /
    • 2004
  • 오늘날 활발하게 이루어지고 있는 유비쿼터스 컴퓨팅 관련 기술 연구는 사용자가 시간과 장소에 구애받지 않고 네트워크에 접근해 다양한 컴퓨터 관련 서비스를 제공 받을 수 있는 방법에 초점을 맞추고 있다. 이 처럼 시간과 공간의 한계를 뛰어 넘은 네트워크로의 자유로운 접근은 일상 생활의 패러다임을 바꾸어 놓게 될 것이다. 유비쿼터스 컴퓨팅 기술을 통해 가장 큰 변화가 일어나는 분야는 일반 가정환경에서 일어나는 인텔리전트 홈 네트워크 (Intelligent Home Network) 라고 할 수 있다. 집에 들어오면, 자동으로 문을 열어주고, 불을 켜주며, 놓쳤던 TV 프로그램을 자동으로 녹화해 놓았다가 원하는 시간에 보여주고, 적당한 시간에 목욕물을 미리 받아준다. 또한 집밖으로 나가기 전, 일기예보에 따라 우산을 챙겨주고, 일정을 확인시켜주며 입고 나갈 옷을 골라줄 수도 있다. 이 모든 일들이 유비쿼터스 컴퓨팅 기술이 가져올 인텔리전트 홈 네트워크의 모습이다. 그러나, 모든 사용자에게 효과적인 서비스를 제공하기 위해서는 홈 네트워크 상의 자원 관리에서 일어날 수 있는 에이전트들간의 자원 접근 권한 충돌을 효율적으로 방지할 수 있는 기술이 필요하다. 유비쿼터스 컴퓨팅 환경에서 자원관리 특성은 점유의 연속성, 자원 사이의 연관성, 그리고 자원과 사용자 사 사이의 연계성의 3 가지 특성을 지니고 있다. 본 논문에서는 유비쿼터스 컴퓨팅 환경에서 일어날 수 있는 자원 충돌 상황을 효율적으로 처리하기 위한 자원 협상 방법을 제안한다. 본 방법은 자원 관리 특성을 바탕으로 시간논리에 기반을 둔 자원 선점과 분배 규칙으로 구성된다.트 시스템은 b-Cart를 기반으로 할 것으로 예측할 수 있다.타났다. 또한, 스네이크의 초기 제어점을 얼굴은 44개, 눈은 16개, 입은 24개로 지정하여 MER추출에 성공한 영상에 대해 스네이크 알고리즘을 수행한 결과, 추출된 영역의 오차율은 각각 2.2%, 2.6%, 2.5%로 나타났다.해서 Template-based reasoning 예를 보인다 본 방법론은 검색노력을 줄이고, 검색에 있어 Feasibility와 Admissibility를 보장한다.매김할 수 있는 중요한 계기가 될 것이다.재무/비재무적 지표를 고려한 인공신경망기법의 예측적중률이 높은 것으로 나타났다. 즉, 로지스틱회귀 분석의 재무적 지표모형은 훈련, 시험용이 84.45%, 85.10%인 반면, 재무/비재무적 지표모형은 84.45%, 85.08%로서 거의 동일한 예측적중률을 가졌으나 인공신경망기법 분석에서는 재무적 지표모형이 92.23%, 85.10%인 반면, 재무/비재무적 지표모형에서는 91.12%, 88.06%로서 향상된 예측적중률을 나타내었다.ting LMS according to increasing the step-size parameter $\mu$ in the experimentally computed. learning curve. Also we find that convergence speed of proposed algorithm is increased by (B+1) time proportional to B which B is the number of recycled data b

  • PDF

Dementia Patient Wandering Behavior and Anomaly Detection Technique through Biometric Authentication and Location-based in a Private Blockchain Environment (프라이빗 블록체인 환경에서 생체인증과 위치기반을 통한 치매환자 배회행동 및 이상징후 탐지 기법)

  • Han, Young-Ae;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.119-125
    • /
    • 2022
  • With the recent increase in dementia patients due to aging, measures to prevent their wandering behavior and disappearance are urgently needed. To solve this problem, various authentication methods and location detection techniques have been introduced, but the security problem of personal authentication and a system that can check indoor and outdoor overall was lacking. In order to solve this problem, various authentication methods and location detection techniques have been introduced, but it was difficult to find a system that can check the security problem of personal authentication and indoor/outdoor overall. In this study, we intend to propose a system that can identify personal authentication, basic health status, and overall location indoors and outdoors by using wristband-type wearable devices in a private blockchain environment. In this system, personal authentication uses ECG, which is difficult to forge and highly personally identifiable, Bluetooth beacon that is easy to use with low power, non-contact and automatic transmission and reception indoors, and DGPS that corrects the pseudorange error of GPS satellites outdoors. It is intended to detect wandering behavior and abnormal signs by locating the patient. Through this, it is intended to contribute to the prompt response and prevention of disappearance in case of wandering behavior and abnormal symptoms of dementia patients living at home or in nursing homes.

Development of real-time defect detection technology for water distribution and sewerage networks (시나리오 기반 상·하수도 관로의 실시간 결함검출 기술 개발)

  • Park, Dong, Chae;Choi, Young Hwan
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.spc1
    • /
    • pp.1177-1185
    • /
    • 2022
  • The water and sewage system is an infrastructure that provides safe and clean water to people. In particular, since the water and sewage pipelines are buried underground, it is very difficult to detect system defects. For this reason, the diagnosis of pipelines is limited to post-defect detection, such as system diagnosis based on the images taken after taking pictures and videos with cameras and drones inside the pipelines. Therefore, real-time detection technology of pipelines is required. Recently, pipeline diagnosis technology using advanced equipment and artificial intelligence techniques is being developed, but AI-based defect detection technology requires a variety of learning data because the types and numbers of defect data affect the detection performance. Therefore, in this study, various defect scenarios are implemented using 3D printing model to improve the detection performance when detecting defects in pipelines. Afterwards, the collected images are performed to pre-processing such as classification according to the degree of risk and labeling of objects, and real-time defect detection is performed. The proposed technique can provide real-time feedback in the pipeline defect detection process, and it would be minimizing the possibility of missing diagnoses and improve the existing water and sewerage pipe diagnosis processing capability.

Efficient Poisoning Attack Defense Techniques Based on Data Augmentation (데이터 증강 기반의 효율적인 포이즈닝 공격 방어 기법)

  • So-Eun Jeon;Ji-Won Ock;Min-Jeong Kim;Sa-Ra Hong;Sae-Rom Park;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • Recently, the image processing industry has been activated as deep learning-based technology is introduced in the image recognition and detection field. With the development of deep learning technology, learning model vulnerabilities for adversarial attacks continue to be reported. However, studies on countermeasures against poisoning attacks that inject malicious data during learning are insufficient. The conventional countermeasure against poisoning attacks has a limitation in that it is necessary to perform a separate detection and removal operation by examining the training data each time. Therefore, in this paper, we propose a technique for reducing the attack success rate by applying modifications to the training data and inference data without a separate detection and removal process for the poison data. The One-shot kill poison attack, a clean label poison attack proposed in previous studies, was used as an attack model. The attack performance was confirmed by dividing it into a general attacker and an intelligent attacker according to the attacker's attack strategy. According to the experimental results, when the proposed defense mechanism is applied, the attack success rate can be reduced by up to 65% compared to the conventional method.

Exploring the contextual factors of episodic memory: dissociating distinct social, behavioral, and intentional episodic encoding from spatio-temporal contexts based on medial temporal lobe-cortical networks (일화기억을 구성하는 맥락 요소에 대한 탐구: 시공간적 맥락과 구분되는 사회적, 행동적, 의도적 맥락의 내측두엽-대뇌피질 네트워크 특징을 중심으로)

  • Park, Jonghyun;Nah, Yoonjin;Yu, Sumin;Lee, Seung-Koo;Han, Sanghoon
    • Korean Journal of Cognitive Science
    • /
    • v.33 no.2
    • /
    • pp.109-133
    • /
    • 2022
  • Episodic memory consists of a core event and the associated contexts. Although the role of the hippocampus and its neighboring regions in contextual representations during encoding has become increasingly evident, it remains unclear how these regions handle various context-specific information other than spatio-temporal contexts. Using high-resolution functional MRI, we explored the patterns of the medial temporal lobe (MTL) and cortical regions' involvement during the encoding of various types of contextual information (i.e., journalism principle 5W1H): "Who did it?," "Why did it happen?," "What happened?," "When did it happen?," "Where did it happen?," and "How did it happen?" Participants answered six different contextual questions while looking at simple experimental events consisting of two faces with one object on the screen. The MTL was divided to sub-regions by hierarchical clustering from resting-state data. General linear model analyses revealed a stronger activation of MTL sub-regions, the prefrontal lobe (PFC), and the inferior parietal lobule (IPL) during social (Who), behavioral (How), and intentional (Why) contextual processing when compared with spatio-temporal (Where/When) contextual processing. To further investigate the functional networks involved in contextual encoding dissociation, a multivariate pattern analysis was conducted with features selected as the task-based connectivity links between the hippocampal subfields and PFC/IPL. Each social, behavioral, and intentional contextual processing was individually and successfully classified from spatio-temporal contextual processing, respectively. Thus, specific contexts in episodic memory, namely social, behavior, and intention, involve distinct functional connectivity patterns that are distinct from those for spatio-temporal contextual memory.

Design of Vision-based Interaction Tool for 3D Interaction in Desktop Environment (데스크탑 환경에서의 3차원 상호작용을 위한 비전기반 인터랙션 도구의 설계)

  • Choi, Yoo-Joo;Rhee, Seon-Min;You, Hyo-Sun;Roh, Young-Sub
    • The KIPS Transactions:PartB
    • /
    • v.15B no.5
    • /
    • pp.421-434
    • /
    • 2008
  • As computer graphics, virtual reality and augmented reality technologies have been developed, in many application areas based on those techniques, interaction for 3D space is required such as selection and manipulation of an 3D object. In this paper, we propose a framework for a vision-based 3D interaction which enables to simulate functions of an expensive 3D mouse for a desktop environment. The proposed framework includes a specially manufactured interaction device using three-color LEDs. By recognizing position and color of the LED from video sequences, various events of the mouse and 6 DOF interactions are supported. Since the proposed device is more intuitive and easier than an existing 3D mouse which is expensive and requires skilled manipulation, it can be used without additional learning or training. In this paper, we explain methods for making a pointing device using three-color LEDs which is one of the components of the proposed framework, calculating 3D position and orientation of the pointer and analyzing color of the LED from video sequences. We verify accuracy and usefulness of the proposed device by showing a measurement result of an error of the 3D position and orientation.

Adaptive Thresholding Method Using Zone Searching Based on Representative Points for Improving the Performance of LCD Defect Detection (LCD 결함 검출 성능 개선을 위한 대표점 기반의 영역 탐색을 이용한 적응적 이진화 기법)

  • Kim, Jin-Uk;Ko, Yun-Ho;Lee, Si-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.7
    • /
    • pp.689-699
    • /
    • 2016
  • As the demand for LCD increases, the importance of inspection equipment for improving the efficiency of LCD production is continuously emphasized. The pattern inspection apparatus is one that detects minute defects of pattern quickly using optical equipment such as line scan camera. This pattern inspection apparatus makes a decision on whether a pixel is a defect or not using a single threshold value in order to meet constraint of real time inspection. However, a method that uses an adaptive thresholding scheme with different threshold values according to characteristics of each region in a pattern can greatly improve the performance of defect detection. To apply this adaptive thresholding scheme it has to be known that a certain pixel to be inspected belongs to which region. Therefore, this paper proposes a region matching algorithm that recognizes the region of each pixel to be inspected. The proposed algorithm is based on the pattern matching scheme with the consideration of real time constraint of machine vision and implemented through GPGPU in order to be applied to a practical system. Simulation results show that the proposed method not only satisfies the requirement for processing time of practical system but also improves the performance of defect detection.

The Study of QoS Parameter Metrics For Efficient End-to-End QoS Management (효율적인 End-to-End QoS 관리를 위한 QoS 인자 Metrics 에 관한 연구)

  • Lee, Sang-Young;Sohn, Jin-Ho;Ahn, Gae-Soon;Hwang, Sun-Ha;Chun, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.907-910
    • /
    • 2003
  • 이동통신 기술이 발전함에 따라 이동통신 네트워크를 통한 서비스들이 다양해지고, 사용자들의 수는 점점 늘어가고 있다. 또한 사용자들은 일반적으로 이동통신 서비스에 대해 유선 망과 동등한 수준의 품질을 기대한다. 그러나, 이동통신망은 유무선 통합망으로 구성되어 있으며, 이들 복잡한 구성을 갖는 네트워크에 대한 서비스 품질 보장은 유선망에 비해 훨씬 어렵다. 이의 결과로, 이동통신 서비스 네트워크의 트래픽은 과거에 비해 폭발적으로 증가하였다. 따라서, 네트워크 사업자와 서비스 제공자들은 서비스의 성능 문제에 직면하고 있으며, 네트워크 사업자나 서비스 제공자들은 효과적인 서비스 품질관리 기술을 강력하게 요구하고 있다. QoS 감시는 QoS 제공과 보장을 위한 기본적인 기술로서, 실제 네트워크에서 QoS 감시를 위해서는 네트워크 및 서비스 성능 인자들과 QoS 인자들의 관계를 식별해야 한다. 본 논문에서는 서비스와 네트워크 성능인자 그리고, QoS 인자들간의 관계를 QoS metrics로 정의하며, 각 인자들의 관계는 계층적인 그래프로 나타낸다. QoS metrics의 정의와 이에 따른 계층적 그래프의 구성을 통해 세 가지 이점을 기대 할 수 있다. 첫째, 네트워크 사업자들은 QoS 저하의 주요 원인을 신속하게 식별 할 수 있다. 둘째, 네트워크 사업자들과 서비스 제공자들은 주관적인 QoS 를 수치 적인 성능 지표를 통해 측정이 가능하다. 마지막으로, QoS metrics 는 네트워크 사업자들과 서비스 제공자들이 QoS 감시 활동의 결과에 따라 그들의 네트워크를 재구성하는 데 도움을 주며 E2E QoS 제공에 효율성을 가져다 준다.현을 정형화하기 위해 Oolong 코드의 명령어들을 문법으로 작성하였으며, PGS를 통해 생성된 어휘 정보를 가지고 스캐너를 구성하였으며, 파싱테이블을 가지고 파서를 설계하였다. 파서의 출력으로 AST가 생성되면 번역기는 AST를 탐색하면서 의미적으로 동등한 MSIL 코드를 생성하도록 시스템을 컴파일러 기법을 이용하여 모듈별로 구성하였다.적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유

  • PDF

Research Trend Analysis for Fault Detection Methods Using Machine Learning (머신러닝을 사용한 단층 탐지 기술 연구 동향 분석)

  • Bae, Wooram;Ha, Wansoo
    • Economic and Environmental Geology
    • /
    • v.53 no.4
    • /
    • pp.479-489
    • /
    • 2020
  • A fault is a geological structure that can be a migration path or a cap rock of hydrocarbon such as oil and gas, formed from source rock. The fault is one of the main targets of seismic exploration to find reservoirs in which hydrocarbon have accumulated. However, conventional fault detection methods using lateral discontinuity in seismic data such as semblance, coherence, variance, gradient magnitude and fault likelihood, have problem that professional interpreters have to invest lots of time and computational costs. Therefore, many researchers are conducting various studies to save computational costs and time for fault interpretation, and machine learning technologies attracted attention recently. Among various machine learning technologies, many researchers are conducting fault interpretation studies using the support vector machine, multi-layer perceptron, deep neural networks and convolutional neural networks algorithms. Especially, researchers use not only their own convolution networks but also proven networks in image processing to predict fault locations and fault information such as strike and dip. In this paper, by investigating and analyzing these studies, we found that the convolutional neural networks based on the U-Net from image processing is the most effective one for fault detection and interpretation. Further studies can expect better results from fault detection and interpretation using the convolutional neural networks along with transfer learning and data augmentation.

Effects of Antenna Modeling in 2-D FDTD Simulation of an Ultra-Wide Band Radar for Nondestructive Testing of a Concrete Wall (콘크리트 벽의 비파괴검사를 위한 초광대역 레이더의 2차원 FDTD 시뮬레이션에서 안테나 모델링의 영향)

  • Joo, Jeong-Myeong;Hong, Jin-Young;Shin, Sang-Jin;Kim, Dong-Hyeon;Oh, Yisok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.1
    • /
    • pp.98-105
    • /
    • 2013
  • This paper presents a finite-difference time-domain(FDTD) simulation and a data processing technique for radar sensing of the internal structure of a wall using an ultra-wide band antenna. We first designed an ultra-wide band anti-podal vivaldi antenna with a frequency range of 0.3~7 GHz which is chosen to be relatively low after considering the characteristics of wave attenuation, wall penetration, and range resolution. In this study the two-dimensional FDTD technique was used to simulate a wall-penetration-radar experiment under practical conditions. The next, the measured radiation pattern of the practical antenna is considered as an equivalent source in the FDTD simulation, and the reflection data of a concrete wall and targets are obtained by using the simulation. Then, a data processing technique has been applied to the FDTD reflection data to get a radar image for remote sensing of the internal structure of the wall. We compared the two different source excitations in the FDTD simulation; (1) commonly-used isotropic point sources and (2) polynomial curve fitting sources of the measured radiation pattern. As a result, when we apply the measured antenna pattern into the FDTD simulation, we could obtain about 2.5 dB higher signal to noise level than using a plane wave incidence with isotropic sources.