• Title/Summary/Keyword: 호네트

Search Result 852, Processing Time 0.024 seconds

Detecting Vehicles That Are Illegally Driving on Road Shoulders Using Faster R-CNN (Faster R-CNN을 이용한 갓길 차로 위반 차량 검출)

  • Go, MyungJin;Park, Minju;Yeo, Jiho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.105-122
    • /
    • 2022
  • According to the statistics about the fatal crashes that have occurred on the expressways for the last 5 years, those who died on the shoulders of the road has been as 3 times high as the others who died on the expressways. It suggests that the crashes on the shoulders of the road should be fatal, and that it would be important to prevent the traffic crashes by cracking down on the vehicles intruding the shoulders of the road. Therefore, this study proposed a method to detect a vehicle that violates the shoulder lane by using the Faster R-CNN. The vehicle was detected based on the Faster R-CNN, and an additional reading module was configured to determine whether there was a shoulder violation. For experiments and evaluations, GTAV, a simulation game that can reproduce situations similar to the real world, was used. 1,800 images of training data and 800 evaluation data were processed and generated, and the performance according to the change of the threshold value was measured in ZFNet and VGG16. As a result, the detection rate of ZFNet was 99.2% based on Threshold 0.8 and VGG16 93.9% based on Threshold 0.7, and the average detection speed for each model was 0.0468 seconds for ZFNet and 0.16 seconds for VGG16, so the detection rate of ZFNet was about 7% higher. The speed was also confirmed to be about 3.4 times faster. These results show that even in a relatively uncomplicated network, it is possible to detect a vehicle that violates the shoulder lane at a high speed without pre-processing the input image. It suggests that this algorithm can be used to detect violations of designated lanes if sufficient training datasets based on actual video data are obtained.

PID-based Consensus and Formation Control of Second-order Multi-agent System with Heterogeneous State Information (이종 상태 정보를 고려한 이차 다개체 시스템의 PID 기반 일치 및 편대 제어)

  • Min-Jae Kang;Han-Ho Tack
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.103-111
    • /
    • 2023
  • Consensus, that aims to converge the states of agents to the same states through information exchanges between agents, has been widely studied to control the multi-agent systems. In real systems, the measurement variables of each agent may be different, the loss of information across communication may occur, and the different networks for each state may need to be constructed for safety. Moreover, the input saturation and the disturbances in the system may cause instability. Therefore, this paper studies the PID(Proportional-Integral-Derivative)-based consensus control to achieve the swarm behavior of the multi-agent systems considering the heterogeneous state information, the input saturations, and the disturbances. Specifically, we consider the multiple follower agents and the single leader agent modeled by the second-order systems, and investigate the conditions to achieve the consensus based on the stability of the error system. It is confirmed that the proposed algorithm can achieve the consensus if only the connectivity of the position graph is guaranteed. Moreover, by extending the consensus algorithm, we study the formation control problem for the multi-agent systems. Finally, the validity of the proposed algorithm was verified through the simulations.

The Self-governance of the Commons and the Socio-economic Sustainability of the Jeju Haenyeo Community (제주 해녀 공동체의 공유지 관리 특성과 사회경제적 지속가능성)

  • Jong-Ho Lee;Wonseob Song;Kyung Hee Kwon;Chul-Ki Cho
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.26 no.4
    • /
    • pp.458-476
    • /
    • 2023
  • This study analyzes previous research on 'The Self-Governance of the Commons' to overcome 'The Tragedy of the Commons', and derives elements for successful commons management. These factors are compared and analyzed with the social and economic attributes of the Jeju Haenyeo community, a successful community self-governance model. In addition, in the recently changing environment, it is revealed whether this internal community mechanism can be useful in the future. The goal is to reveal what social and economic factors will help the sustainability of the Jeju haenyeo community in the future. As a result of analyzing the internal operating mechanism of the Jeju haenyeo community, the production and distribution system that improves trust and reciprocity, the inherent sense of community, the division of roles between formal and informal organizations, and the institutionalized explicit and implicit norms within the organization served as internal and external strengths of community sustainability. However, the closure of the network, the crisis of productivity, the weakening of homogeneity, and the emergence of new subjects acted as internal and external weaknesses. In conclusion, for the sustainability of the Jeju Haenyeo community, it is necessary to reorganize the reproductive function of labor using the haenyeo school, to maintain clarity on the subject of livelihood and cultural transmission, and guarantee the income of Haenyeo.

Research on functional area-specific technologies application of future C4I system for efficient battlefield visualization (미래 지휘통제체계의 효율적 전장 가시화를 위한 기능 영역별 첨단기술 적용방안)

  • Sangjun Park;Jungho Kang;Yongjoon Lee;Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.109-119
    • /
    • 2023
  • C4I system is an integrated battlefield information system that automates the five elements of command, control, communications, computers, and information to efficiently manage the battlefield. C4I systems play an important role in collecting and analyzing enemy positions, situations, and operational results to ensure that all services have the same picture in real time and optimize command decisions and mission orders. However, the current C4I has limitations whenever a new weapon system is introduced, as it only provides battlefield visualization in a single area focusing on the battlefield situation for each military service. In a future battlefield that expands not only to land, sea, and air domains but also to cyber and space domains, improved command and control decisions will be possible if organic data from various weapon systems is gathered to quickly visualize the battlefield situation desired by the user. In this study, the visualization technology applicable to the future C4I system is divided into map area, situation map area, and display area. The technological implementation of this future C4I system is based on various data and communication means such as 5G networks, and is expected to enable hyper-connected battlefield visualization that utilizes a variety of high-quality information to enable realistic and efficient battlefield situation awareness.

Comparative Analysis on Network Slicing Techniques in 5G Environment (5G 환경에서의 네트워크 슬라이싱 연구 비교 분석)

  • A Reum Ko;Ilhwan Ji;Hojun Jin;Seungho Jeon;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.84-96
    • /
    • 2023
  • Network slicing refers to a technology that divides network infrastructure into multiple parts. Network slicing enables flexible network configuration while minimizing the physical resources required for network division. For this reason, network slicing technology has recently been developed and introduced in a form suitable for the 5G environment for efficient management of large-scale network environments. However, systematic analysis of network slicing research in the 5G environment has not been conducted, resulting in a lack of systematic analysis of the technology. Accordingly, in this paper, we provide insight into network slicing technology in the 5G network environment by conducting a comparative analysis of the technology. In this study's comparative analysis, 13 literatures on network slicing in the 5G environment was identified and compared and analyzed through a systematic procedure. As a result of the analysis, three network slicing technologies frequently used for 5G networks were identified: RAN (radio access network) slicing, CN (core network) slicing, and E2E (end-to-end) sliding. These technologies are mainly used for network services. It was confirmed that research is being conducted to achieve quality improvement and network isolation. It is believed that the results of this comparative analysis study can contribute to 6G technology research as a future direction and utilization plan for network slicing research.

  • PDF

Applying Transfer Learning to Improve the Performance of Deep Learning-based Groundwater Level Prediction Model with Insufficient Training Data (딥러닝 기반 지하수위 예측 모델 개발에 있어 데이터 부족 문제 해결을 위한 전이학습의 응용)

  • Jiho Jeong;Jina Jeong
    • Economic and Environmental Geology
    • /
    • v.57 no.5
    • /
    • pp.551-562
    • /
    • 2024
  • Predicting groundwater levels with data-driven models like artificial neural networks typically requires a substantial amount of data. However, when groundwater monitoring wells are newly developed or when a significant portion of the data is invalid (for example, due to missing values or outliers), acquiring an adequate dataset for training prediction models becomes challenging, leading to diminished prediction accuracy. This study proposes a method based on transfer learning to address the issue of insufficient training data. The Gated Recurrent Unit (GRU) was used as the primary data-driven model for predictions. A GRU-based pretrained network for the transfer learning process was developed using groundwater level and corresponding rainfall data collected from 89 monitoring stations nationwide. Subsequently, this pretrained network was fine-tuned using a small amount of training data obtained from the target monitoring well to develop the final prediction model. To verify the effectiveness of the transfer learning algorithm, two different groundwater level prediction models were evaluated: 1) a GRU-based model trained with insufficient data from the target well, and 2) a GRU-based model utilizing the transfer learning algorithm. Comparative verification was conducted with groundwater level data obtained from wells at two different locations, where the model using the transfer learning algorithm demonstrated superior performance compared to the other. This study confirms that the transfer learning algorithm can significantly enhance the performance of groundwater level prediction models, irrespective of the amount of available training data.

Network Coding Technologies for Wireless Bidirectional Asymmetric Relay (무선 양방향 비대칭 상호중계를 위한 네트워크 코딩 기법)

  • Bongseop Song;Sangpill Lee;Choong-Hee Lee;Inho Lee;In-Joong Nam
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.5
    • /
    • pp.1-9
    • /
    • 2024
  • With the emergence of various next-generation wireless networks, the traditional store and forward(SF) method at network nodes has faced limitations in efficiently utilizing network capacity. To overcome these limitations, various network coding techniques based on the decode and forward(DF) method have been proposed. However, these techniques have primarily focused on traffic environments with asymmetric packet lengths between relay nodes, limiting their applicability when different modulation and coding schemes(MCS) are applied to relay nodes. This paper proposes a relay network coding scheme that supports high frequency efficiency while simultaneously enabling bidirectional relaying using DF, considering asymmetric MCS traffic that reflects different transmission data and wireless channel conditions between individual nodes for efficient utilization of wireless network capacity. Additionally, this paper demonstrates the possibility of cooperative communication at the relay and examines the effect of increased communication distance. Subsequently, computer simulations are conducted to verify the performance gains of the proposed technique in terms of network coding for each source node with asymmetric information lengths. This proposed technique shows additional bit error rate(BER) performance gains by adopting an incremental redundancy(IR) scheme that follows network coding, even in mobile node environments where direct link transmission between source nodes is possible.

Perspectives on Glutaminase Inhibitors as Metabolic Anti-cancer Agents (Glutamine 대사항암제의 개발과 전망)

  • Ho-Yeon Jeon;Chae-Ryeong Seo;Jaeho Bae;Soon-Cheol Ahn
    • Journal of Life Science
    • /
    • v.34 no.10
    • /
    • pp.744-754
    • /
    • 2024
  • Cancer cells exhibit a unique metabolic process for uncontrolled cell division, providing bioenergy and intermediates, which are significantly different from normal cells. Here an aerobic glycolysis converts most of the pyruvate produced from glucose into lactate and inefficiently produced ATP. Cancer cells counter their lack of energy through glutamine metabolism, together with glucose. Glutamine is the most abundant amino acid in the blood and is used for the synthesis of amino acids, nucleotides, and lipids, as well as bioenergy through glutaminolysis. Cancer cells rely on glutamine rather than normal cells, showing more than half of the tricarboxylic acid cycle metabolites derived from glutamine, called glutamine addiction. Oncogenes c-Myc also regulates the expression of various genes involved in glutamine metabolism and promotes the absorption of glutamine. Whether glutaminase (GLS) causes or inhibits tumors is controversial. However, GLS1 is a promising treatment target due to its higher carcinogenic incidence, whereas GLS2 is known to act as a tumor suppressor. The 4th-generation metabolic anti-cancer therapy, which has been actively investigated since the mid-2010s, is based on a complex and sophisticated network of cancer metabolites. These drugs directly regulate the energy metabolism of cancer cells to maximize anti-cancer effects without side effects. GLS is a crucial enzyme for cancer metabolism and tumor progression that catalyzes the first stage in the process of glutaminolysis. The development of anti-cancer drugs targeting GLS enzymes has emerged as a promising strategy.

Strengthening International Collaboration for Counter-Piracy Efforts - Focusing on Counter-Piracy Operations Off the Coast of Somalia - (해적퇴치를 위한 국제공조 확대 방안 - 소말리아 해적퇴치 방안을 중심으로 -)

  • Kim, Duk-Ki
    • Strategy21
    • /
    • s.31
    • /
    • pp.251-293
    • /
    • 2013
  • 해적은 공해상 해상안전을 위협 한다는 점에서 '인류공동의 적'으로 규정되어 모든 국가가 이를 규제할 수 있는 보편적 관할권이 행사되는 범죄이다. 한국을 포함한 아시아 지역 국가들은 말라카해협 통항에 관해 깊은 이해관계를 갖고 있어 해적 소탕에 대한 의지가 강한 편이다. 이러한 의지는 2006년 '아시아해적퇴치정보공유센터(ReCAAP ISO)'의 창설에 밑거름이 되었으며, 아시아 지역에서 해적이 출현하면 동 센터를 통해 17개국 회원국으로 즉시 통보되고, 주변국의 해경과 해군이 유기적인 작전을 통해 해적을 효율적으로 퇴치하고 있는 모범사례다. 그러나 2009년 소말리아 내란에 따른 무정부 상태가 지속되면서 소말리아 및 아덴만에서의 해적활동이 극성을 부리기 시작했으며, 선박납치 행위가 급증하자 세계 각국에서 함정과 항공기를 파견하여 해적퇴치 활동을 전개하고 있으나 근절되지 않을 뿐만 아니라 해적의 활동해역이 확대되고 있다. 이러한 배경 하에 시작된 본 연구는 연구결과를 중심으로 다음과 같은 대응 방안을 제시한다. 첫째, 소말리아 해적의 근본원인은 국가의 붕괴에서 비롯된 치안부재와 열악한 경제사정 등 내부적인 요인이 크기 때문에 다국적 해군 활동으로 인한 근본적인 해적퇴치에는 한계가 있다. 따라서 국제적인 차원에서 '지역협력협정'체결은 물론, 소말리아 국가재건을 위한 노력이 함께 이루어지는 종합적인 대책이 필요하다. 그러나 보다 더 근본적인 해결책은 유엔차원에서 빠른 시간 내에 소말리아가 정치적 안정을 유지할 수 있도록 정치적 차원에서의 지원이 필요하며, 해적과 테러리스트가 연계됨으로써 국제문제로 확대되지 않도록 하는 노력도 병행되어야 한다. 둘째, 해적문제는 특정국가에만 해당되는 것이 아니라 초국가적인 문제임을 감안하여 유엔안전보장이사회 결의 제1851호에서 '지역 센터' 설립을 권고하고 있는 것처럼 2006년 아시아 국가들이 설치한 ReCAAP ISO와 같은 형태의 지역국가 간 협력기구 또는 유엔 차원의 해적 전담기구를 설치하여 국제사회 공조 하에 해적에 대처하는 방안을 추진하는 것이 필요하다. 셋째, 최근 발생하고 있는 해적행위는 주로 항구 등 내수, 영해 등 연안국의 관할권이 행사되는 지역에서 발생하고 있어 유엔해양법상의 규정은 이러한 '해적' 퇴치에 더 이상 효율적이지 못하다. 국제사회는 이러한 문제점을 인식하여 국제해사기구 (IMO) 등 국제기구를 통해 영해내의 해적 처벌을 위해 최선의 노력을 기울이고 있다. 향후 궁극적으로는 유엔해양법협약의 개정을 통해 법적인 문제점이 개선되어야 한다. 넷째, 전술적인 측면에서도 지상에 기지를 두고 있는 해적들의 지도부가 그 동안 쌓아 놓은 네트워크를 이용하여 다국적 해군에 대한 정보를 수집하고 대응방안을 강구함으로써 나름대로의 생존전략을 구사할 것으로 예상된다. 특히, 선박을 납치한 후 소말리아 연안으로 이동하면서 해군함정과 대치하는 과정에서 해적들이 살상을 당하는 사례가 증가함에 따라 지금까지는 피랍된 선박의 선원을 단순히 해적활동에 참여시키거나, 항해지원을 위한 목적 등으로만 활용했는데, 앞으로는 해적들의 인명피해를 최소화하기 위해서라도 선원들을 방패막이로 활용할 가능성이 더욱 높아질 것으로 예상된다. 따라서 참가하는 해군함정 또는 부대간 해적들의 활동 관련 정보를 공유하는 등 사전에 정보를 획득하기 위한 협력을 강화해야 한다. 다섯째, 한국군함이 삼호주얼리호를 납치했던 소말리아 해적을 한국까지 대리고 와서 처벌하는 것은 불합리하고, 많은 문제점을 야기할 수 있기 때문에 향후 해적처벌을 위한 국제사법기구의 설치가 요구된다. 회원국 분담금으로 운영되는 유엔에 산하기관을 설치하여 소말리아 인접국에서 해결하도록 적극적인 노력을 경주할 필요가 있다. 마지막으로, 선박회사에서도 자국 선박이 위험구역으로 지정된 해역을 항해할 경우를 대비해서 선박자동식별 시스템 구축을 확대하고, 해적이 선박에 승선했을 경우를 대비해서 안전구역(citadel)을 설치하여 선원의 안전을 확보하는 등의 대책이 필요하다. 본 연구를 통해 해양안보는 어느 특정국가에게만 주어진 것이 아니며, 해적행위도 특정 국가의 선박을 대상으로 하는 것이 아니므로 각국 정부간 공동의 협력과 국제사회의 공조가 반드시 실현될 때 해적의 위협으로부터 선박의 안전과 국제사회의 평화가 실현될 수 있다는 것을 강조하고자 한다.

  • PDF

Development of JPEG2000 Viewer for Mobile Image System (이동형 의료영상 장치를 위한 JPEG2000 영상 뷰어 개발)

  • 김새롬;정해조;강원석;이재훈;이상호;신성범;유선국;김희중
    • Progress in Medical Physics
    • /
    • v.14 no.2
    • /
    • pp.124-130
    • /
    • 2003
  • Currently, as a consequence of PACS (Picture Archiving Communication System) implementation many hospitals are replacing conventional film-type interpretations of diagnostic medical images with new digital-format interpretations that can also be saved, and retrieve However, the big limitation in PACS is considered to be the lack of mobility. The purpose of this study is to determine the optimal communication packet size. This was done by considering the terms occurred in the wireless communication. After encoding medical image using JPGE2000 image compression method, This method embodied auto-error correction technique preventing the loss of packets occurred during wireless communication. A PC class server, with capabilities to load, collect data, save images, and connect with other network, was installed. Image data were compressed using JPEG2000 algorithm which supports the capability of high energy density and compression ratio, to communicate through a wireless network. Image data were also transmitted in block units coeded by JPEG2000 to prevent the loss of the packets in a wireless network. When JPGE2000 image data were decoded in a PUA (Personal Digital Assistant), it was instantaneous for a MR (Magnetic Resonance) head image of 256${\times}$256 pixels, while it took approximately 5 seconds to decode a CR (Computed Radiography) chest image of 800${\times}$790 pixels. In the transmission of the image data using a CDMA 1X module (Code-Division Multiple Access 1st Generation), 256 byte/sec was considered a stable transmission rate, but packets were lost in the intervals at the transmission rate of 1Kbyte/sec. However, even with a transmission rate above 1 Kbyte/sec, packets were not lost in wireless LAN. Current PACS are not compatible with wireless networks. because it does not have an interface between wired and wireless. Thus, the mobile JPEG2000 image viewing system was developed in order to complement mobility-a limitation in PACS. Moreover, the weak-connections of the wireless network was enhanced by re-transmitting image data within a limitations The results of this study are expected to play an interface role between the current wired-networks PACS and the mobile devices.

  • PDF