• Title/Summary/Keyword: 이진이미지

Search Result 297, Processing Time 0.027 seconds

Hair thickness measuring scheme based on portable camera image (포터블 카메라 영상 기반 모발 두께 측정 기법)

  • Kim, Hyungjun;Kim, Woogeol;Rew, Jehyeok;Hwang, Eenjun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1420-1423
    • /
    • 2015
  • 기존의 영상처리 및 컴퓨터 비전 기술은 X-ray, 군사용 사진, CCTV 영상과 같은 제한적인 상황에서 주로 사용되었다. 스마트폰이 보급되면서 고해상도의 사진을 어디서든 촬영할 수 있게 되었고, 고성능 디바이스를 이용하여 촬영된 영상을 즉시 가공 및 처리가 가능하게 되었다. 그 결과 영상처리 기술이 이전보다 다양하고 좀 더 일반적인 분야에서도 쓰이게 되었다. 그러나 영상처리 기술은 조건이 제한될수록 처리가 용이하며, 일반적인 이미지들을 처리하기 위해서는 고려해야 할 사항이 많다. 특히 두피 영상 분석의 경우 머리카락이 겹치는 부분이나 그림자, 머리카락이 밀집하여 상대적으로 어두워지는 부분 등을 고려해야 하는 어려움이 있으며 현재까지 영상처리를 이용한 두피영상 분석에 대한 연구는 많지 않은 것이 현실이다. 본 논문에서는 스마트폰에 부착하는 포터블 카메라로 촬영된 두피영상을 분석하여 모발의 두께를 측정하는 기법을 제시한다. 먼저 영상에 대한 전처리로 Contrast stretching과 이 진화 과정을 수행한다. 얻어진 이진화 영상에 대해 머리카락의 Skeleton을 추출하고 각 pixel의 각도(angle)를 이용하여 법선을 구한다. 계산된 법선과 머리카락 사이의 교점을 구한 후 두 점사이의 거리를 통해 모발의 두께를 계산한다. 계산된 두께와 현미경을 이용하여 측정한 모발의 실제 두께와 비교하여 제안된 기법의 정확도를 평가한다.

Development of Mission Language for Autonomous Underwater Vehicle (자율무인잠수정을 위한 임무 언어 개발)

  • Kim, Bang-Hyun;Lee, Fill-Youb;Sim, Hyung-Won;Jun, Bong-Huan;Lee, Pan-Mook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06c
    • /
    • pp.554-559
    • /
    • 2010
  • 자율무인잠수정은 탐사 목적에 따라 다양한 임무를 수행해야 하며, 임무에 따라 자율무인잠수정 행동의 유형과 순서는 달라질 수 있다. 그러나 대부분의 자율무인잠수정은 한정된 임무에 대하여 프로그램 내부에 고정된 행동 유형으로 동작하며, 다른 유형의 임무를 수행해야 할 경우에는 프로그램을 수정해야 하는 문제점이 있다. 따라서 본 연구에서는 자율무인잠수정이 수행할 수 있는 다양한 임무를 명시할 수 있는 임무 언어를 개발하였다. 이 임무 언어는 명령어의 실행 순서를 제어할 수 있는 제어문과 자율무인잠수정의 행동을 지정하거나 자율무인잠수정의 상태를 입출력 할 수 있는 명령어, 그리고 변수 정의를 제공하기 때문에, 사용자가 자율무인잠수정의 임무를 자유롭게 표현하는 것이 가능하다. 임무 언어로 작성된 임무 파일은 전용 어셈블러에 의해 이진 형식의 실행이미지로 변환된 후에, 자율무인잠수정 내장 소프트웨어 내부의 가상기계 기억장치에 적재되어 실행된다. 실행이미지를 가상기계에서 해석하고 실행하는데 필요한 시스템의 자원을 최소화하기 위하여 임무 언어는 자율무인잠수정의 임무를 표현하기 위한 필수적인 부분만을 고려하여 설계되었으며, 문법은 ARM v5 어셈블리와 유사한 형태이다. 개발된 임무 언어는 한국해양연구원에서 개발한 이심이100 자율무인잠수정에 적용되었으며, 이후 개발할 6,000m급의 이심이6000 자율무인잠수정에도 사용될 예정이다.

  • PDF

Harmful Tide Intrusion Detection Model Using YOLO (YOLO 를 이용한 유해조수 침입 감지 모델)

  • Park, Seong-Ho;Lee, Jin-Seong;Song, Bo-Mi;Park, Jang-Woo;Shin, Chang-Sun;Cho, Young-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.51-53
    • /
    • 2021
  • 유해조수에 의한 농작물 피해규모는 2015 년 106 억원, 2017 년 126 억원에 이어 2019 년 137 억원으로 해마다 늘어나고 있다. 유해조수 중 조류에 의한 피해는 농작물 외에도 항공기, 전기/통신망, 양식장에 이르기 까지 다양한 산업분야에서 발생한다. ICT 기술은 유해조수에 의한 농작물 및 시설물의 피해를 줄이기 위한 효과적인 방안을 제시할 수 있다. 본 연구에서는 이미지 인식 및 분석 기술을 이용하여 유해조수 감지 및 피해방지를 위한 YOLO 기반의 감지 모델을 설계 후 유해조수 중 조류에 적용하여 테스트했다. 제안하는 모델은 여러 산업분야에서 유해조수 피해 방지를 위한 다양한 응용개발에 활용될 수 있다.

Customer Behavior Prediction of Binary Classification Model Using Unstructured Information and Convolution Neural Network: The Case of Online Storefront (비정형 정보와 CNN 기법을 활용한 이진 분류 모델의 고객 행태 예측: 전자상거래 사례를 중심으로)

  • Kim, Seungsoo;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.221-241
    • /
    • 2018
  • Deep learning is getting attention recently. The deep learning technique which had been applied in competitions of the International Conference on Image Recognition Technology(ILSVR) and AlphaGo is Convolution Neural Network(CNN). CNN is characterized in that the input image is divided into small sections to recognize the partial features and combine them to recognize as a whole. Deep learning technologies are expected to bring a lot of changes in our lives, but until now, its applications have been limited to image recognition and natural language processing. The use of deep learning techniques for business problems is still an early research stage. If their performance is proved, they can be applied to traditional business problems such as future marketing response prediction, fraud transaction detection, bankruptcy prediction, and so on. So, it is a very meaningful experiment to diagnose the possibility of solving business problems using deep learning technologies based on the case of online shopping companies which have big data, are relatively easy to identify customer behavior and has high utilization values. Especially, in online shopping companies, the competition environment is rapidly changing and becoming more intense. Therefore, analysis of customer behavior for maximizing profit is becoming more and more important for online shopping companies. In this study, we propose 'CNN model of Heterogeneous Information Integration' using CNN as a way to improve the predictive power of customer behavior in online shopping enterprises. In order to propose a model that optimizes the performance, which is a model that learns from the convolution neural network of the multi-layer perceptron structure by combining structured and unstructured information, this model uses 'heterogeneous information integration', 'unstructured information vector conversion', 'multi-layer perceptron design', and evaluate the performance of each architecture, and confirm the proposed model based on the results. In addition, the target variables for predicting customer behavior are defined as six binary classification problems: re-purchaser, churn, frequent shopper, frequent refund shopper, high amount shopper, high discount shopper. In order to verify the usefulness of the proposed model, we conducted experiments using actual data of domestic specific online shopping company. This experiment uses actual transactions, customers, and VOC data of specific online shopping company in Korea. Data extraction criteria are defined for 47,947 customers who registered at least one VOC in January 2011 (1 month). The customer profiles of these customers, as well as a total of 19 months of trading data from September 2010 to March 2012, and VOCs posted for a month are used. The experiment of this study is divided into two stages. In the first step, we evaluate three architectures that affect the performance of the proposed model and select optimal parameters. We evaluate the performance with the proposed model. Experimental results show that the proposed model, which combines both structured and unstructured information, is superior compared to NBC(Naïve Bayes classification), SVM(Support vector machine), and ANN(Artificial neural network). Therefore, it is significant that the use of unstructured information contributes to predict customer behavior, and that CNN can be applied to solve business problems as well as image recognition and natural language processing problems. It can be confirmed through experiments that CNN is more effective in understanding and interpreting the meaning of context in text VOC data. And it is significant that the empirical research based on the actual data of the e-commerce company can extract very meaningful information from the VOC data written in the text format directly by the customer in the prediction of the customer behavior. Finally, through various experiments, it is possible to say that the proposed model provides useful information for the future research related to the parameter selection and its performance.

Combined Image Retrieval System using Clustering and Condensation Method (클러스터링과 차원축약 기법을 통합한 영상 검색 시스템)

  • Lee Se-Han;Cho Jungwon;Choi Byung-Uk
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.1 s.307
    • /
    • pp.53-66
    • /
    • 2006
  • This paper proposes the combined image retrieval system that gives the same relevance as exhaustive search method while its performance can be considerably improved. This system is combined with two different retrieval methods and each gives the same results that full exhaustive search method does. Both of them are two-stage method. One uses condensation of feature vectors, and the other uses binary-tree clustering. These two methods extract the candidate images that always include correct answers at the first stage, and then filter out the incorrect images at the second stage. Inasmuch as these methods use equal algorithm, they can get the same result as full exhaustive search. The first method condenses the dimension of feature vectors, and it uses these condensed feature vectors to compute similarity of query and images in database. It can be found that there is an optimal condensation ratio which minimizes the overall retrieval time. The optimal ratio is applied to first stage of this method. Binary-tree clustering method, searching with recursive 2-means clustering, classifies each cluster dynamically with the same radius. For preserving relevance, its range of query has to be compensated at first stage. After candidate clusters were selected, final results are retrieved by computing similarities again at second stage. The proposed method is combined with above two methods. Because they are not dependent on each other, combined retrieval system can make a remarkable progress in performance.

Passports Recognition using ART2 Algorithm and Face Verification (ART2 알고리즘과 얼굴 인증을 이용한 여권 인식)

  • Jang, Do-Won;Kim, Kwang-Baek
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.05a
    • /
    • pp.190-197
    • /
    • 2005
  • 본 논문에서는 출입국자 관리의 효율성과 체계적인 출입국 관리를 위하여 여권 코드를 자동으로 인식하고 위조 여권을 판별할 수 있는 여권 인식 및 얼굴 인증 방법을 제안한다. 여권 이미지는 기울어진 상태로 스캔되어 획득되어질 수도 있으므로 기울기 보정은 문자 분할 및 인식, 얼굴 인증에 있어 매우 중요하다. 따라서 본 논문에서는 여권 영상을 스미어링한 후, 추출된 문자열 중에서 가장 긴 문자열을 선택하고 이 문자열의 좌측과 우측 부분의 두께 중심을 연결하는 직선과 수평선과의 기울기를 이용하여 여권 여상에 대한 각도 보정을 수행한다. 여권 코드 추출은 소벨 연산자와 수평 스미어링, 8방향 윤곽선 추적 알고리즘을 적용하여 여권 코드의 문자열 영역을 추출하고, 추출된 여권 코드 문자열 영역에 대해 반복 이지화 방법을 적용하여 코드의 문자열 영역을 이진화한다. 이진화된 문자열 영역에 대해 CDM 마스크를 적용하여 문자열의 코드들을 복원하고 8방향 윤곽선 추적 알고리즘을 적용하여 개별 코드를 추출한다. 추출된 개별 코드는 ART2 알고리즘을 적용하여 인식한다. 얼굴 인증을 위해 템플릿 매칭 알고리즘을 이용하여 얼굴 템플릿 데이터베이스를 구축하고 여권에서 추출된 얼굴 영역과의 유사도 측정을 통하여 여권 얼굴 영역의 위조 여부를 판별한다. 얼굴 인증을 위해서 Hue, YIQ-I, YCbCr-Cb 특징들의 유사도를 종합적으로 분석하여 얼굴 인증에 적용한다. 제안된 여권 인식 및 얼굴 인증 방법의 성능을 평가를 위하여 원본 여권에 얼굴 부분을 위조한 여권과 노이즈, 대비 증가 및 감소, 밝기 증가 및 감소 및 여권 영상을 흐리게 하여 실험한 결과, 제안된 방법이 여권 코드 인식 및 얼굴 인증에 있어서 우수한 성능이 있음을 확인하였다.권 영상에서 획득되어진 얼굴 영상의 특징벡터와 데이터베이스에 있는 얼굴 영상의 특징벡터와의 거리 값을 계산하여 사진 위조 여부를 판별한다. 제안된 여권 인식 및 얼굴 인증 방법의 성능을 평가를 위하여 원본 여권에서 얼굴 부분을 위조한 여권과 기울어진 여권 영상을 대상으로 실험한 결과, 제안된 방법이 여권의 코드 인식 및 얼굴 인증에 있어서 우수한 성능이 있음을 확인하였다.진행하고 있다.태도와 유아의 창의성간에는 상관이 없는 것으로 나타났고, 일반 유아의 아버지 양육태도와 유아의 창의성간의 상관에서는 아버지 양육태도의 성취-비성취 요인에서와 창의성제목의 추상성요인에서 상관이 있는 것으로 나타났다. 따라서 창의성이 높은 아동의 아버지의 양육태도는 일반 유아의 아버지와 보다 더 애정적이며 자율성이 높지만 창의성이 높은 아동의 집단내에서 창의성에 특별한 영향을 더 미치는 아버지의 양육방식은 발견되지 않았다. 반면 일반 유아의 경우 아버지의 성취지향성이 낮을 때 자녀의 창의성을 향상시킬 수 있는 것으로 나타났다. 이상에서 자녀의 창의성을 향상시키는 중요한 양육차원은 애정성이나 비성취지향성으로 나타나고 있어 정서적인 측면의 지원인 것으로 밝혀졌다.징에서 나타나는 AD-SR맥락의 반성적 탐구가 자주 나타났다. 반성적 탐구 척도 두 그룹을 비교 했을 때 CON 상호작용의 특징이 낮게 나타나는 N그룹이 양적으로 그리고 내용적으로 더 의미 있는 반성적 탐구를 했다용을 지원하는 홈페이지를 만들어 자료 제공 사이트에 대한 메타 자료를 데이터베이스화했으며 이를 통해 학생들이 원하는 실시간 자료를 검색하여 찾을 수 있고 홈페이지를 방분했을 때 이해하기 어려운 그래프나 각 홈페이지가 제공하는 자료들에 대한 처리 방법을 도움말로 제공받을 수 있게 했다. 실

  • PDF

Low Complexity Image Thresholding Based on Block Type Classification for Implementation of the Low Power Feature Extraction Algorithm (저전력 특징추출 알고리즘의 구현을 위한 블록 유형 분류 기반 낮은 복잡도를 갖는 영상 이진화)

  • Lee, Juseong;An, Ho-Myoung;Kim, Byungcheul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.179-185
    • /
    • 2019
  • This paper proposes a block-type classification based image binarization for the implementation of the low-power feature extraction algorithm. The proposed method can be implemented with threshold value re-use technique approach when the image divided into $64{\times}64$ macro blocks size and calculating the threshold value for each block type only once. The algorithm is validated based on quantitative results that only a threshold value change rate of up to 9% occurs within the same image/block type. Existing algorithms should compute the threshold value for 64 blocks when the macro block is divided by $64{\times}64$ on the basis of $512{\times}512$ images, but all suggestions can be made only once for best cases where the same block type is printed, and for the remaining 63 blocks, the adaptive threshold calculation can be reduced by only performing a block type classification process. The threshold calculation operation is performed five times when all block types occur, and only the block type separation process can be performed for the remaining 59 blocks, so 93% adaptive threshold calculation operation can be reduced.

Feasibility of Deep Learning Algorithms for Binary Classification Problems (이진 분류문제에서의 딥러닝 알고리즘의 활용 가능성 평가)

  • Kim, Kitae;Lee, Bomi;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.95-108
    • /
    • 2017
  • Recently, AlphaGo which is Bakuk (Go) artificial intelligence program by Google DeepMind, had a huge victory against Lee Sedol. Many people thought that machines would not be able to win a man in Go games because the number of paths to make a one move is more than the number of atoms in the universe unlike chess, but the result was the opposite to what people predicted. After the match, artificial intelligence technology was focused as a core technology of the fourth industrial revolution and attracted attentions from various application domains. Especially, deep learning technique have been attracted as a core artificial intelligence technology used in the AlphaGo algorithm. The deep learning technique is already being applied to many problems. Especially, it shows good performance in image recognition field. In addition, it shows good performance in high dimensional data area such as voice, image and natural language, which was difficult to get good performance using existing machine learning techniques. However, in contrast, it is difficult to find deep leaning researches on traditional business data and structured data analysis. In this study, we tried to find out whether the deep learning techniques have been studied so far can be used not only for the recognition of high dimensional data but also for the binary classification problem of traditional business data analysis such as customer churn analysis, marketing response prediction, and default prediction. And we compare the performance of the deep learning techniques with that of traditional artificial neural network models. The experimental data in the paper is the telemarketing response data of a bank in Portugal. It has input variables such as age, occupation, loan status, and the number of previous telemarketing and has a binary target variable that records whether the customer intends to open an account or not. In this study, to evaluate the possibility of utilization of deep learning algorithms and techniques in binary classification problem, we compared the performance of various models using CNN, LSTM algorithm and dropout, which are widely used algorithms and techniques in deep learning, with that of MLP models which is a traditional artificial neural network model. However, since all the network design alternatives can not be tested due to the nature of the artificial neural network, the experiment was conducted based on restricted settings on the number of hidden layers, the number of neurons in the hidden layer, the number of output data (filters), and the application conditions of the dropout technique. The F1 Score was used to evaluate the performance of models to show how well the models work to classify the interesting class instead of the overall accuracy. The detail methods for applying each deep learning technique in the experiment is as follows. The CNN algorithm is a method that reads adjacent values from a specific value and recognizes the features, but it does not matter how close the distance of each business data field is because each field is usually independent. In this experiment, we set the filter size of the CNN algorithm as the number of fields to learn the whole characteristics of the data at once, and added a hidden layer to make decision based on the additional features. For the model having two LSTM layers, the input direction of the second layer is put in reversed position with first layer in order to reduce the influence from the position of each field. In the case of the dropout technique, we set the neurons to disappear with a probability of 0.5 for each hidden layer. The experimental results show that the predicted model with the highest F1 score was the CNN model using the dropout technique, and the next best model was the MLP model with two hidden layers using the dropout technique. In this study, we were able to get some findings as the experiment had proceeded. First, models using dropout techniques have a slightly more conservative prediction than those without dropout techniques, and it generally shows better performance in classification. Second, CNN models show better classification performance than MLP models. This is interesting because it has shown good performance in binary classification problems which it rarely have been applied to, as well as in the fields where it's effectiveness has been proven. Third, the LSTM algorithm seems to be unsuitable for binary classification problems because the training time is too long compared to the performance improvement. From these results, we can confirm that some of the deep learning algorithms can be applied to solve business binary classification problems.

The Study on The Identification Model of Friend or Foe on Helicopter by using Binary Classification with CNN

  • Kim, Tae Wan;Kim, Jong Hwan;Moon, Ho Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.33-42
    • /
    • 2020
  • There has been difficulties in identifying objects by relying on the naked eye in various surveillance systems. There is a growing need for automated surveillance systems to replace soldiers in the field of military surveillance operations. Even though the object detection technology is developing rapidly in the civilian domain, but the research applied to the military is insufficient due to a lack of data and interest. Thus, in this paper, we applied one of deep learning algorithms, Convolutional Neural Network-based binary classification to develop an autonomous identification model of both friend and foe helicopters (AH-64, Mi-17) among the military weapon systems, and evaluated the model performance by considering accuracy, precision, recall and F-measure. As the result, the identification model demonstrates 97.8%, 97.3%, 98.5%, and 97.8 for accuracy, precision, recall and F-measure, respectively. In addition, we analyzed the feature map on convolution layers of the identification model in order to check which area of imagery is highly weighted. In general, rotary shaft of rotating wing, wheels, and air-intake on both of ally and foe helicopters played a major role in the performance of the identification model. This is the first study to attempt to classify images of helicopters among military weapons systems using CNN, and the model proposed in this study shows higher accuracy than the existing classification model for other weapons systems.

Analyzing the Modes of Mathematically Gifted Students' Visualization on the Duality of Regular Polyhedrons (다면체의 쌍대 탐구 과정에서 초등수학영재들이 보여주는 시각화 방법 분석)

  • Lee, Jin Soo;Song, Sang Hun
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.17 no.2
    • /
    • pp.351-370
    • /
    • 2013
  • The purpose of this study is to analyze the modes of visualization which appears in the process of thinking that mathematically gifted 6th grade students get to understand components of the three-dimensional shapes on the duality of regular polyhedrons, find the duality relation between the relations of such components, and further explore on whether such duality relation comes into existence in other regular polyhedrons. The results identified in this study are as follows: First, as components required for the process of exploring the duality relation of polyhedrons, there exist primary elements such as the number of faces, the number of vertexes, and the number of edges, and secondary elements such as the number of vertexes gathered at the same face and the number of faces gathered at the same vertex. Second, when exploring the duality relation of regular polyhedrons, mathematically gifted students solved the problems by using various modes of spatial visualization. They tried mainly to use visual distinction, dimension conversion, figure-background perception, position perception, ability to create a new thing, pattern transformation, and rearrangement. In this study, by investigating students' reactions which can appear in the process of exploring geometry problems and analyzing such reactions in conjunction with modes of visualization, modes of spatial visualization which are frequently used by a majority of students have been investigated and reactions relating to spatial visualization that a few students creatively used have been examined. Through such various reactions, the students' thinking in exploring three dimensional shapes could be understood.

  • PDF