• Title/Summary/Keyword: 탐지 성능

Search Result 1,968, Processing Time 0.029 seconds

Analysis of statistical characteristics of bistatic reverberation in the east sea (동해 해역에서 양상태 잔향음 통계적 특징 분석)

  • Yeom, Su-Hyeon;Yoon, Seunghyun;Yang, Haesang;Seong, Woojae
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.4
    • /
    • pp.435-445
    • /
    • 2022
  • In this study, the reverberation of a bistatic sonar operated in southeastern coast in the East Sea in July 2020 was analyzed. The reverberation sensor data were collected through an LFM sound source towed by a research vessel and a horizontal line array receiver 1 km to 5 km away from it. The reverberation sensor data was analyzed by various methods including geo-plot after signal processing. Through this, it was confirmed that the angle reflected from the sound source through the scatterer to the receiver has a dominant influence on the distribution of the reverberation sound, and the probability distribution characteristics of bistatic sonar reverberation varies for each beam. In addition, parametric factors of K distribution and Rayleigh distribution were estimated from the sample through moment method estimation. Using the Kolmogorov-Smirnov test at the confidence level of 0.05, the distribution probability of the data was analyzed. As a result, it could be observed that the reverberation follows a Rayleigh probability distribution, and it could be estimated that this was the effect of a low reverberation to noise ratio.

Development of Simulator for CBRN Reconnaissance Vehicle-II(Armored Type) (화생방정찰차-II(장갑형)용 모의훈련장비(시뮬레이터) 개발)

  • Lee, Sang Haeng;Seo, Seong Man;Lee, Yun Hee
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.45-54
    • /
    • 2022
  • This paper is about designing and implementing the simulation training equipment (simulator) for the CBRN Reconnaissance Vehicle-II (armor type). The simulation training equipment (simulator) is a military training equipment in a virtual environment that analyzes the training using various CBRN equipment according to the CBRN situation and make a professional report. The controller or training instructor can construct a scenario using the instructor control system for a possible CBRN situation, spread the situation, and observe the process of the trainee performing the propagated situation appropriately. All process can be monitored and analyzed by the system, and it can be recorded, so it is also used for AAR (After Action Review). To implement CBRN situation training in a virtual environment, instructor control (IOS), host (HOS), video (IGS), input/output device (IOC), and sound (ACS) were implemented, a long-range chemical automatic detector (LCA), a combined chemical detector (CAD), a control (MCC) and an operation (OCC) computer were developed as simulators. In this paper, the design and development of simulation training equipment for CBRN Reconnaissance Vehicle-II (armor type) was conducted, and the performance was verified through integrated tests and acceptance tests.

Comparative Analysis of Evaluation Methods for Image Segmentation Results (영상분할 결과 평가 방법의 적용성 비교 분석)

  • Seo, Won-Woo;Lee, Kyu-Sung
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.2
    • /
    • pp.257-274
    • /
    • 2021
  • Although image segmentation is a critical part of object-based analysis of high resolution imagery, there has been lack of studies to evaluate the quality of image segmentation. In this study, we aimed to find practical and effective methods to obtain optimal parameters for image segmentation. Evaluations of image segmentation are divided into unsupervised, supervised, and qualitative visual interpretation methods. Using the multispectral UAV images, sampled from urban and forest over the Incheon Metropolitan City Park, three evaluation methods were compared. In overall, three methods showed very similar results regardless of the computational costs and applicability, although the optimal parameters determined by the evaluations were different between the urban and forest images. There is no single measure that outperforms in the unsupervised evaluation. Any combinations of intra-segment measures (V, COV, WV) and inter-segment measures (MI, BSH, DTNP) provided almost the same results. Although supervised method may be biased by subjective selection of reference data, it can be easily applied to detect object of interest. The qualitative visual interpretation on the segmentation results corresponded with the unsupervised and supervised evaluations.

Implementation of AI-based Object Recognition Model for Improving Driving Safety of Electric Mobility Aids (전동 이동 보조기기 주행 안전성 향상을 위한 AI기반 객체 인식 모델의 구현)

  • Je-Seung Woo;Sun-Gi Hong;Jun-Mo Park
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.3
    • /
    • pp.166-172
    • /
    • 2022
  • In this study, we photograph driving obstacle objects such as crosswalks, side spheres, manholes, braille blocks, partial ramps, temporary safety barriers, stairs, and inclined curb that hinder or cause inconvenience to the movement of the vulnerable using electric mobility aids. We develop an optimal AI model that classifies photographed objects and automatically recognizes them, and implement an algorithm that can efficiently determine obstacles in front of electric mobility aids. In order to enable object detection to be AI learning with high probability, the labeling form is labeled as a polygon form when building a dataset. It was developed using a Mask R-CNN model in Detectron2 framework that can detect objects labeled in the form of polygons. Image acquisition was conducted by dividing it into two groups: the general public and the transportation weak, and image information obtained in two areas of the test bed was secured. As for the parameter setting of the Mask R-CNN learning result, it was confirmed that the model learned with IMAGES_PER_BATCH: 2, BASE_LEARNING_RATE 0.001, MAX_ITERATION: 10,000 showed the highest performance at 68.532, so that the user can quickly and accurately recognize driving risks and obstacles.

Preprocessing Technique for Malicious Comments Detection Considering the Form of Comments Used in the Online Community (온라인 커뮤니티에서 사용되는 댓글의 형태를 고려한 악플 탐지를 위한 전처리 기법)

  • Kim Hae Soo;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.103-110
    • /
    • 2023
  • With the spread of the Internet, anonymous communities emerged along with the activation of communities for communication between people, and many users are doing harm to others, such as posting aggressive posts and leaving comments using anonymity. In the past, administrators directly checked posts and comments, then deleted and blocked them, but as the number of community users increased, they reached a level that managers could not continue to monitor. Initially, word filtering techniques were used to prevent malicious writing from being posted in a form that could not post or comment if a specific word was included, but they avoided filtering in a bypassed form, such as using similar words. As a way to solve this problem, deep learning was used to monitor posts posted by users in real-time, but recently, the community uses words that can only be understood by the community or from a human perspective, not from a general Korean word. There are various types and forms of characters, making it difficult to learn everything in the artificial intelligence model. Therefore, in this paper, we proposes a preprocessing technique in which each character of a sentence is imaged using a CNN model that learns the consonants, vowel and spacing images of Korean word and converts characters that can only be understood from a human perspective into characters predicted by the CNN model. As a result of the experiment, it was confirmed that the performance of the LSTM, BiLSTM and CNN-BiLSTM models increased by 3.2%, 3.3%, and 4.88%, respectively, through the proposed preprocessing technique.

A Comparison of Image Classification System for Building Waste Data based on Deep Learning (딥러닝기반 건축폐기물 이미지 분류 시스템 비교)

  • Jae-Kyung Sung;Mincheol Yang;Kyungnam Moon;Yong-Guk Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.199-206
    • /
    • 2023
  • This study utilizes deep learning algorithms to automatically classify construction waste into three categories: wood waste, plastic waste, and concrete waste. Two models, VGG-16 and ViT (Vision Transformer), which are convolutional neural network image classification algorithms and NLP-based models that sequence images, respectively, were compared for their performance in classifying construction waste. Image data for construction waste was collected by crawling images from search engines worldwide, and 3,000 images, with 1,000 images for each category, were obtained by excluding images that were difficult to distinguish with the naked eye or that were duplicated and would interfere with the experiment. In addition, to improve the accuracy of the models, data augmentation was performed during training with a total of 30,000 images. Despite the unstructured nature of the collected image data, the experimental results showed that VGG-16 achieved an accuracy of 91.5%, and ViT achieved an accuracy of 92.7%. This seems to suggest the possibility of practical application in actual construction waste data management work. If object detection techniques or semantic segmentation techniques are utilized based on this study, more precise classification will be possible even within a single image, resulting in more accurate waste classification

Detecting Vehicles That Are Illegally Driving on Road Shoulders Using Faster R-CNN (Faster R-CNN을 이용한 갓길 차로 위반 차량 검출)

  • Go, MyungJin;Park, Minju;Yeo, Jiho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.105-122
    • /
    • 2022
  • According to the statistics about the fatal crashes that have occurred on the expressways for the last 5 years, those who died on the shoulders of the road has been as 3 times high as the others who died on the expressways. It suggests that the crashes on the shoulders of the road should be fatal, and that it would be important to prevent the traffic crashes by cracking down on the vehicles intruding the shoulders of the road. Therefore, this study proposed a method to detect a vehicle that violates the shoulder lane by using the Faster R-CNN. The vehicle was detected based on the Faster R-CNN, and an additional reading module was configured to determine whether there was a shoulder violation. For experiments and evaluations, GTAV, a simulation game that can reproduce situations similar to the real world, was used. 1,800 images of training data and 800 evaluation data were processed and generated, and the performance according to the change of the threshold value was measured in ZFNet and VGG16. As a result, the detection rate of ZFNet was 99.2% based on Threshold 0.8 and VGG16 93.9% based on Threshold 0.7, and the average detection speed for each model was 0.0468 seconds for ZFNet and 0.16 seconds for VGG16, so the detection rate of ZFNet was about 7% higher. The speed was also confirmed to be about 3.4 times faster. These results show that even in a relatively uncomplicated network, it is possible to detect a vehicle that violates the shoulder lane at a high speed without pre-processing the input image. It suggests that this algorithm can be used to detect violations of designated lanes if sufficient training datasets based on actual video data are obtained.

Analysis of Infiltration Route using Optimal Path Finding Methods and Geospatial Information (지형공간정보 및 최적탐색기법을 이용한 최적침투경로 분석)

  • Bang, Soo Nam;Heo, Joon;Sohn, Hong Gyoo;Lee, Yong Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1D
    • /
    • pp.195-202
    • /
    • 2006
  • The infiltration route analysis is a military application using geospatial information technology. The result of the analysis would present vulnerable routes for potential enemy infiltration. In order to find the susceptible routes, optimal path search algorithms (Dijkstra's and $A^*$) were used to minimize the cost function, summation of detection probability. The cost function was produced by capability of TOD (Thermal Observation Device), results of viewshed analysis using DEM (Digital Elevation Model) and two related geospatial information coverages (obstacle and vegetation) extracted from VITD (Vector product Interim Terrain Data). With respect to 50m by 50m cells, the individual cost was computed and recorded, and then the optimal infiltration routes was found while minimizing summation of the costs on the routes. The proposed algorithm was experimented in Daejeon region in South Korea. The test results show that Dijkstra's and $A^*$ algorithms do not present significant differences, but A* algorithm shows a better efficiency. This application can be used for both infiltration and surveillance. Using simulation of moving TOD, the most vulnerable routes can be detected for infiltration purpose. On the other hands, it can be inversely used for selection of the best locations of TOD. This is an example of powerful geospatial solution for military application.

Realization on the Integrated System of Navigation Communication and Fish Finder for Safety Operation of Fishing Vessel (어선의 안전조업을 위한 항해통신 및 어탐기의 통합시스템 구현)

  • In-suk Kang;In-ung Ju;Jeong-yeon Kim;Jo-cheon Choi
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.433-440
    • /
    • 2021
  • The problem of maritime accidents due to the carelessness of fishing vessels, which is affected by the aging of fishing vessel operators. And there is navigation, communication and fish finder that is installed inside the narrow bridge of a fishing vessel. Therefore these system are monitors as many as of each terminal, which is bad influence on obscuring view of front sea from a fishing vessel bridge. In addition a large problem, it is occurs to reduce of the information recognition ability due to the confusion, which is can not check the display information each of screen equipments. Therefore, there has been demand to simply integrated the equipment, and it has wanted the integrated support system of these equipment. The display must be provided on a fishing vessels such as electronic charts, communications equipments and fish detection into one case. In this paper, the integrated system will be installed the GPS plotter, AIS, VHF-DSC, V-pass, fish finder and power supply in the narrow wheelhouse on a fishing vessel, which is configured in one case and operated by multi function display (MFD). The MFD is integrated to simplify for several multi terminals and provided necessary information on a single screen. This integration fishery support system will has improved in sea safety operation and fishery environment of fishing vessels by this implementation.

Implementation of AI-based Object Recognition Model for Improving Driving Safety of Electric Mobility Aids (객체 인식 모델과 지면 투영기법을 활용한 영상 내 다중 객체의 위치 보정 알고리즘 구현)

  • Dong-Seok Park;Sun-Gi Hong;Jun-Mo Park
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.119-125
    • /
    • 2023
  • In this study, we photograph driving obstacle objects such as crosswalks, side spheres, manholes, braille blocks, partial ramps, temporary safety barriers, stairs, and inclined curb that hinder or cause inconvenience to the movement of the vulnerable using electric mobility aids. We develop an optimal AI model that classifies photographed objects and automatically recognizes them, and implement an algorithm that can efficiently determine obstacles in front of electric mobility aids. In order to enable object detection to be AI learning with high probability, the labeling form is labeled as a polygon form when building a dataset. It was developed using a Mask R-CNN model in Detectron2 framework that can detect objects labeled in the form of polygons. Image acquisition was conducted by dividing it into two groups: the general public and the transportation weak, and image information obtained in two areas of the test bed was secured. As for the parameter setting of the Mask R-CNN learning result, it was confirmed that the model learned with IMAGES_PER_BATCH: 2, BASE_LEARNING_RATE 0.001, MAX_ITERATION: 10,000 showed the highest performance at 68.532, so that the user can quickly and accurately recognize driving risks and obstacles.