• Title/Summary/Keyword: 자동화 기술

Search Result 2,982, Processing Time 0.029 seconds

Detection of Levee Displacement and Estimation of Vulnerability of Levee Using Remote Sening (원격탐사를 이용한 하천 제방 변위량 측정과 취약지점 선별)

  • Bang, Young Jun;Jung, Hyo Jun;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • As a method of predicting the displacement of river levee in advance, Differential Interferometry (D-InSAR) kind of InSAR techniques was used to identify weak points in the area of the levee collapes near Gumgok Bridge (Somjin River) in Namwon City, which occurred in the summer of 2020. As a result of analyzing the displacement using five images each in the spring and summer of 2020, the Variation Index (V) of area where the collapse occurred was larger than that of the other areas, so the prognostic sysmptoms was detected. If the levee monitoring system is realized by analyzing the correlations with displacement results and hydrometeorological factors, it will overcome the existing limitations of system and advance ultra-precise, automated river levee maintenance technology and improve national disaster management.

Hangul Font Dataset for Korean Font Research Based on Deep Learning (딥러닝 기반의 한글 폰트 연구를 위한 한글 폰트 데이터셋)

  • Ko, Debbie Honghee;Lee, Hyunsoo;Suk, Jungjae;Hassan, Ammar Ul;Choi, Jaeyoung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.2
    • /
    • pp.73-78
    • /
    • 2021
  • Recently, as interest in deep learning has increased, many researches in various fields using deep learning techniques have been conducted. Studies on automatic generation of fonts using deep learning-based generation models are limited to several languages such as Roman or Chinese characters. Generating Korean font is a very time-consuming and expensive task, and can be easily created using deep learning. For research on generating Korean fonts, it is important to prepare a Korean font dataset from the viewpoint of process automation in order to keep pace with deep learning-based generation models. In this paper, we propose a Korean font dataset for deep learning-based Korean font research and describe a method of constructing the dataset. Based on the Korean font data set proposed in this paper, we show the usefulness of the proposed dataset configuration through the process of applying it to a deep learning Korean font generation application.

A Feasibility Analysis of a Low Noise and Dust Suction Type Pavement Cutter (저소음·분진회수형 도로절단기 개발의 타당성 분석)

  • Kim, Kyoon Tai
    • Ecology and Resilient Infrastructure
    • /
    • v.7 no.4
    • /
    • pp.274-283
    • /
    • 2020
  • A large amount of fine dust is generated during the process of pavement cutting. Consequently, reducing the amount of fine dust generated during pavement cutting is crucial for the overall management of fine dust. Based on this premise, in this study, a conceptual model is proposed for a device that can be employed for recovering scattered dust generated at the site of pavement cutting. The economic feasibility associated with the incorporation of the proposed model was analyzed. Results obtained from the economic feasibility analysis of the proposed conceptual model indicate that the benefit ratio is 2.96, which is significantly higher than 1. The rate of return is found to be 62.78%, which significantly exceeds the minimum expected rate of return (i.e., 10%), as established on the basis of interviews conducted with companies that implement pavement cutting. Furthermore, the break-even point is found to be at approximately 21.6 months. Hence, the proposed pavement cutter, which features dust suction and a low noise level, is economically feasible.

Circuit Design for Noise Removal of Sine Wave Hall Sensor Signal (정현파 Hall Sensor 신호의 잡음제거를 위한 회로설계)

  • Jeong, Sungin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.135-141
    • /
    • 2021
  • Interest is growing in the design and development of square wave driven BLDC permanent magnet motors suitable for industrial automation, and the development of position detection circuits and drivers. However, this motor is somewhat limited in its application despite the price and functional advantages due to the decrease in efficiency due to switching loss and vibration and noise. In the process of designing and assembling a BLDC motor, the magnetic pole angle is not uniform or the magnetic flux distribution is distorted due to problems in magnetic circuit design or product non-uniformity in the assembly process. Therefore, these things cause position detection deviation and deteriorate the motor characteristics. In addition, the sine wave driven BLDC system can operate stably only when the signal generated from the position sensor is accurately fed back to the driver. However, since the generated signal cannot perform stable position detection due to the occurrence of DC offset component due to magnetic flux density deviation or magnetization technology, which is an external influence, this study intends to study the proposed circuit that can remove the DC offset component.

Image Restoration Algorithm based on Segmented Mask and Standard Deviation in Impulse Noise Environment (임펄스 잡음 환경에서 분할 마스크와 표준편차에 기반한 영상 복원 알고리즘)

  • Cheon, Bong-Won;Kim, Woo-Young;Sagong, Byung-Il;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1039-1045
    • /
    • 2021
  • In modern society, due to the influence of the 4th industrial revolution, camera sensors and image-based automation systems are being used in various fields, and interest in image and signal processing is increasing. In this paper, we propose a digital filter algorithm for image reconstruction in an impulse noise environment. The proposed algorithm divides the image into eight masks in vertical, horizontal, and diagonal directions based on the local mask set in the image, and compares the standard deviation of each segmentation mask to obtain a reference value. The final output is calculated by applying the weight according to the spatial distance and the weight using the reference value to the local mask. To evaluate the performance of the proposed algorithm, it was simulated with the existing algorithm, and the performance was compared using enlarged images and PSNR.

An Implementation of the Security Service on Internet Mail System (인터넷 메일 시스템에서의 정보보호 서비스 구현)

  • 강명희;신효영;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.107-122
    • /
    • 1997
  • Most of the currently used electronic mail system has the threat of security such as illegal leak of message, forgery, uncertain identity, denial of sending and receiving, and so forth. The security for this system is not satisfied yet, thus we explore these problems. In this thesis, we implement the security services for internet mail system which cover the weakness for traditional mail system. This system provides not only security services which PEM and PGP provides (i.e message confidentiality, message integrity, originator authentication, non-repudiation of origin), but also message replay prevention. and non-denial of recipient using certification of contents. In addition, this system increases security of the digital signature by signing with signature block formatting on the creation of it. And it increases security of the digital enveloping by encrypting with encryption block formatting of message encryption key.

A study on method of setting up the defense integrated security system (군 통합보안시스템 구축 방안 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.575-584
    • /
    • 2012
  • A established military security tast based on existing manual and off-line needs the change and development to support effective and systematic task performance according to environment change of informational and scientific project in the military. Therefore this study suggests to set up the standard model of the defense integrated security system to automate and informationize major defense security task based on actual and problem in the area of major defense of security task and case analysis of these in America, England and other countries. The standard model consist of unit systems were made up integrated security system, security management system, man entrance system, vehicle entrance system, high-tech guard system, terror prevention system and the security accident analysis system, and this suggested model based on possible technology and system. If this model is apply to each real military unit, we will expect the development of defense security.

Breaking character-based CAPTCHA using color information (색상 정보를 이용한 문자 기반 CAPTCHA의 무력화)

  • Kim, Sung-Ho;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.105-112
    • /
    • 2009
  • Nowadays, completely automated public turing tests to tell computers and humans apart(CAPTCHAs) are widely used to prevent various attacks by automated software agents such as creating accounts, advertising, sending spam mails, and so on. In early CAPTCHAs, the characters were simply distorted, so that users could easily recognize the characters. From that reason, using various techniques such as image processing, artificial intelligence, etc., one could easily break many CAPTCHAs, either. As an alternative, By adding noise to CAPTCHAs and distorting the characters in CAPTCHAs, it made the attacks to CAPTCHA more difficult. Naturally, it also made users more difficult to read the characters in CAPTCHAs. To improve the readability of CAPTCHAs, some CAPTCHAs used different colors for the characters. However, the usage of the different colors gives advantages to the adversary who wants to break CAPTCHAs. In this paper, we suggest a method of increasing the recognition ratio of CAPTCHAs based on colors.

Medical Implementation of Microarray Technology (마이크로어레이 분석기법의 임상적용에 관한 연구)

  • Kang, Ji Un
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.52 no.4
    • /
    • pp.310-316
    • /
    • 2020
  • Microarray technology represents a critical new advance in molecular cytogenetics. The development of this approach has provided fundamental insights into the molecular pathogenesis in clinical cytogenetics and has provided a clue to many unidentified or unexplained diseases. The approach allows a comprehensive investigation of thousands and millions of genomic loci simultaneously and enables the efficient detection of copy number alterations. The application of this technology has shown tremendous fluidity and complexity of the human genome, and has provided accurate diagnosis and appropriate clinical management in a timely and efficient manner for identifying genomic alterations. The clinical impact of the genomic alterations identified by microarrays is evolving into a diagnostic tool to identify high-risk patients better and predict patient outcomes from their genomic profiles. The transformation of conventional cytogenetics into an automated discipline will improve diagnostic yield significantly, leading to accurate diagnosis and genetic counseling. This article reviews cytogenetic technologies used to identify human chromosome alterations and highlights the potential utility of present and future genome microarray technology in the diagnosis.

The Effect of AI and Big Data on an Entry Firm: Game Theoretic Approach (인공지능과 빅데이터가 시장진입 기업에 미치는 영향관계 분석, 게임이론 적용을 중심으로)

  • Jeong, Jikhan
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.95-111
    • /
    • 2021
  • Despite the innovation of AI and Big Data, theoretical research bout the effect of AI and Big Data on market competition is still in early stages; therefore, this paper analyzes the effect of AI, Big Data, and data sharing on an entry firm by using game theory. In detail, the firms' business environments are divided into internal and external ones. Then, AI algorithms are divided into algorithms for (1) customer marketing, (2) cost reduction without automation, and (3) cost reduction with automation. Big Data is also divided into external and internal data. this study shows that the sharing of external data does not affect the incumbent firm's algorithms for consumer marketing while lessening the entry firm's entry barrier. Improving the incumbent firm's algorithms for cost reduction (with and without automation) and external data can be an entry barrier for the entry firm. These findings can be helpful (1) to analyze the effect of AI, Big Data, and data sharing on market structure, market competition, and firm behaviors and (2) to design policy for AI and Big Data.