• Title/Summary/Keyword: 자동 문제 생성 기술

Search Result 145, Processing Time 0.034 seconds

Design and Implementation for Efficient Multi Version ADS-B Target Report Message Processing (효율적인 다중 버전 ADS-B 타깃 리포트 메시지 처리를 위한 모듈 설계 및 구현)

  • Kim, Kanghee;Jang, Eunmee;Song, Inseong;Cho, Taehwan;Choi, Sangbang
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.265-277
    • /
    • 2015
  • Automatic dependent surveillance-broadcast (ADS-B) is the core technology of communication, navigation and surveillance/air traffic management (CNS/ATM), automatically broadcasts its own position information using GNSS and has an advantage of lower geological constraints and faster update speed compared with legacy radar systems. EUROCONTROL defined all purpose structured eurocontrol surveillance information exchange (ASTERIX) CAT.021. ASTERIX CAT.021 is modified several times, but it has compatibility issues with previous version of it. In this paper, we have designed an efficient message processing module regardless of the version of ASTERIX CAT.021. This implemented module generates patterns to collect messages received from the network, after that, received messages are processed in the routine that is defined in accordance with the patterns.

Morphable Model to Interpolate Difference between Number of Pixels and Number of Vertices (픽셀 수와 정점들 간의 차이를 보완하는 Morphable 모델)

  • Ko, Bang-Hyun;Moon, Hyeon-Joon;Kim, Yong-Guk;Moon, Seung-Bin;Lee, Jong-Weon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2007
  • The images, which were acquired from various systems such as CCTV and Robot, include many human faces. Because of a rapid increase in visual data, we cannot process these manually; rather we need to do these automatically. Furthermore, companies require automatic security systems to protect their new technology. There are various options available to us, including face recognition, iris recognition and fingerprint recognition. Face recognition is preferable since it does not require direct contact. However, the standard 2-Dimensional method is limited, so Morphable Models may be recommended as an alternative. The original morphable model, made by MPI, contains a large quantity of data such as texture and geometry data. This paper presents a Geometrix-based morphable model designed to reduce this data capacity.

Automatic Document Classification Using Multiple Classifier Systems (다중 분류기 시스템을 이용한 자동 문서 분류)

  • Kim, In-Cheol
    • The KIPS Transactions:PartB
    • /
    • v.11B no.5
    • /
    • pp.545-554
    • /
    • 2004
  • Combining multiple classifiers to obtain improved performance over the individual classifier has been a widely used technique. The task of constructing a multiple classifier system(MCS) contains two different Issues how to generate a diverse set of base-level classifiers and how to combine their predictions. In this paper, we review the characteristics of existing multiple classifier systems : Bagging, Boosting, and Slaking. For document classification, we propose new MCSs such as Stacked Bagging, Stacked Boosting, Bagged Stacking, Boosted Stacking. These MCSs are a sort of hybrid MCSs that combine advantages of existing MCSs such as Bugging, Boosting, and Stacking. We conducted some experiments of document classification to evaluate the performances of the proposed schemes on MEDLINE, Usenet news, and Web document collections. The result of experiments demonstrate the superiority of our hybrid MCSs over the existing ones.

Suggestions for Solving Errors and Integrity Guarantees in the Process of Transferring Standard Electronic Documents (표준 전자문서 이관 시 발생하는 무결성 보장 및 오류 해결에 대한 제언)

  • Yu, Young-Moon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.3
    • /
    • pp.1-21
    • /
    • 2020
  • Although the National Archives of Korea has been receiving transfer of standard electronic documents with a retention period of more than 30 years from the central administration since 2015, errors and inefficiencies persist. Despite this, however, there remain no studies that analyze or address these issues. This study aims to bridge this gap and found that most errors in the transfer process occur at the production stage. To address such, this study proposes a four-step solution. First, before electronic document approval, the text and attached files are checked for defects to prevent errors. Second, as soon as the signature is made, digital signatures are applied on a file-by-file basis to ensure integrity. Third, integrity verification and transfer inspection are automatically performed through digital signature investigation and defect check procedure during transfer and preservation. Fourth and last, the criteria of acquiring records and integrity guarantee technologies are properly applied in production stage with proper management and supervision.

Fuzzy Neural System Modeling using Fuzzy Entropy (퍼지 엔트로피를 이용한 퍼지 뉴럴 시스템 모델링)

  • 박인규
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.201-208
    • /
    • 2000
  • In this paper We describe an algorithm which is devised for 4he partition o# the input space and the generation of fuzzy rules by the fuzzy entropy and tested with the time series prediction problem using Mackey-Glass chaotic time series. This method divides the input space into several fuzzy regions and assigns a degree of each of the generated rules for the partitioned subspaces from the given data using the Shannon function and fuzzy entropy function generating the optimal knowledge base without the irrelevant rules. In this scheme the basic idea of the fuzzy neural network is to realize the fuzzy rules base and the process of reasoning by neural network and to make the corresponding parameters of the fuzzy control rules be adapted by the steepest descent algorithm. The Proposed algorithm has been naturally derived by means of the synergistic combination of the approximative approach and the descriptive approach. Each output of the rule's consequences has expressed with its connection weights in order to minimize the system parameters and reduce its complexities.

  • PDF

Fine-tuning of Attention-based BART Model for Text Summarization (텍스트 요약을 위한 어텐션 기반 BART 모델 미세조정)

  • Ahn, Young-Pill;Park, Hyun-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1769-1776
    • /
    • 2022
  • Automatically summarizing long sentences is an important technique. The BART model is one of the widely used models in the summarization task. In general, in order to generate a summarization model of a specific domain, fine-tuning is performed by re-training a language model trained on a large dataset to fit the domain. The fine-tuning is usually done by changing the number of nodes in the last fully connected layer. However, in this paper, we propose a fine-tuning method by adding an attention layer, which has been recently applied to various models and shows good performance. In order to evaluate the performance of the proposed method, various experiments were conducted, such as accumulating layers deeper, fine-tuning without skip connections during the fine tuning process, and so on. As a result, the BART model using two attention layers with skip connection shows the best score.

Analysis and Performance Evaluation of Pattern Condensing Techniques used in Representative Pattern Mining (대표 패턴 마이닝에 활용되는 패턴 압축 기법들에 대한 분석 및 성능 평가)

  • Lee, Gang-In;Yun, Un-Il
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.77-83
    • /
    • 2015
  • Frequent pattern mining, which is one of the major areas actively studied in data mining, is a method for extracting useful pattern information hidden from large data sets or databases. Moreover, frequent pattern mining approaches have been actively employed in a variety of application fields because the results obtained from them can allow us to analyze various, important characteristics within databases more easily and automatically. However, traditional frequent pattern mining methods, which simply extract all of the possible frequent patterns such that each of their support values is not smaller than a user-given minimum support threshold, have the following problems. First, traditional approaches have to generate a numerous number of patterns according to the features of a given database and the degree of threshold settings, and the number can also increase in geometrical progression. In addition, such works also cause waste of runtime and memory resources. Furthermore, the pattern results excessively generated from the methods also lead to troubles of pattern analysis for the mining results. In order to solve such issues of previous traditional frequent pattern mining approaches, the concept of representative pattern mining and its various related works have been proposed. In contrast to the traditional ones that find all the possible frequent patterns from databases, representative pattern mining approaches selectively extract a smaller number of patterns that represent general frequent patterns. In this paper, we describe details and characteristics of pattern condensing techniques that consider the maximality or closure property of generated frequent patterns, and conduct comparison and analysis for the techniques. Given a frequent pattern, satisfying the maximality for the pattern signifies that all of the possible super sets of the pattern must have smaller support values than a user-specific minimum support threshold; meanwhile, satisfying the closure property for the pattern means that there is no superset of which the support is equal to that of the pattern with respect to all the possible super sets. By mining maximal frequent patterns or closed frequent ones, we can achieve effective pattern compression and also perform mining operations with much smaller time and space resources. In addition, compressed patterns can be converted into the original frequent pattern forms again if necessary; especially, the closed frequent pattern notation has the ability to convert representative patterns into the original ones again without any information loss. That is, we can obtain a complete set of original frequent patterns from closed frequent ones. Although the maximal frequent pattern notation does not guarantee a complete recovery rate in the process of pattern conversion, it has an advantage that can extract a smaller number of representative patterns more quickly compared to the closed frequent pattern notation. In this paper, we show the performance results and characteristics of the aforementioned techniques in terms of pattern generation, runtime, and memory usage by conducting performance evaluation with respect to various real data sets collected from the real world. For more exact comparison, we also employ the algorithms implementing these techniques on the same platform and Implementation level.

Automatic Tagging Scheme for Plural Faces (다중 얼굴 태깅 자동화)

  • Lee, Chung-Yeon;Lee, Jae-Dong;Chin, Seong-Ah
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.3
    • /
    • pp.11-21
    • /
    • 2010
  • To aim at improving performance and reflecting user's needs of retrieval, the number of researches has been actively conducted in recent year as the quantity of information and generation of the web pages exceedingly increase. One of alternative approaches can be a tagging system. It makes users be able to provide a representation of metadata including writings, pictures, and movies etc. called tag and be convenient in use of retrieval of internet resources. Tags similar to keywords play a critical role in maintaining target pages. However, they still needs time consuming labors to annotate tags, which sometimes are found to be a hinderance caused by overuse of tagging. In this paper, we present an automatic tagging scheme for a solution of current tagging system conveying drawbacks and inconveniences. To realize the approach, face recognition-based tagging system on SNS is proposed by building a face area detection procedure, linear-based classification and boosting algorithm. The proposed novel approach of tagging service can increase possibilities that utilized SNS more efficiently. Experimental results and performance analysis are shown as well.

An Automatic ROI Extraction and Its Mask Generation based on Wavelet of Low DOF Image (피사계 심도가 낮은 이미지에서 웨이블릿 기반의 자동 ROI 추출 및 마스크 생성)

  • Park, Sun-Hwa;Seo, Yeong-Geon;Lee, Bu-Kweon;Kang, Ki-Jun;Kim, Ho-Yong;Kim, Hyung-Jun;Kim, Sang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.93-101
    • /
    • 2009
  • This paper suggests a new algorithm automatically searching for Region-of-Interest(ROI) with high speed, using the edge information of high frequency subband transformed with wavelet. The proposed method executes a searching algorithm of 4-direction object boundary by the unit of block using the edge information, and detects ROIs. The whole image is splitted by $64{\times}64$ or $32{\times}32$ sized blocks and the blocks can be ROI block or background block according to taking the edges or not. The 4-directions searche the image from the outside to the center and the algorithm uses a feature that the low-DOF image has some edges as one goes to center. After searching all the edges, the method regards the inner blocks of the edges as ROI, and makes the ROI masks and sends them to server. This is one of the dynamic ROI method. The existing methods have had some problems of complicated filtering and region merge, but this method improved considerably the problems. Also, it was possible to apply to an application requiring real-time processing caused by the process of the unit of block.

A Study on 2D Pattern Design Module and 3D Cloth Simulation System based on Octree Space Subdivision Method (2차원 패턴 디자인 모듈과 Octree 공간 분할 방법을 이용한 3차원 의복 시뮬레이션 시스템에 관한 연구)

  • Kim, Ju-Ri;Joung, Suck-Tae;Jung, Sung-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.4
    • /
    • pp.527-536
    • /
    • 2007
  • This paper proposes a 3D fashion design system that generates a 3D clothes model by using 2D patterns of clothes and drapes the 3D clothes model on a 3D human model. In the proposed system, 2D patterns of clothes are designed by selecting comer points of 2D mesh. After designing 2D patterns, a 3D clothes model is designed by describing the control points to be connected between 2D patterns. The proposed system reads a 3D human body model file and the designed 3D clothes model and creates a 3D human model putting on the clothes by using the mass-spring model based physical simulation. It calculates collision and reaction between the triangles of human body model and those of clothes for realistic simulation. Because the number of triangles is very large, the collision and reaction processing need a lot of time. To solve this problem, the proposed system decreases the number of collision and reaction processing by using the Octree space subdivision technique. It took a few seconds for generating a 3D human model putting on the designed 3D clothes.

  • PDF