• Title/Summary/Keyword: AI Software

Search Result 525, Processing Time 0.024 seconds

Design and Implementation of Scent-Supported Educational Content using Arduino

  • Hye-kyung Kwon;Heesun Kim
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.260-267
    • /
    • 2023
  • Due to the development of science and technology in the 4th Industrial Revolution, a variety of content is being developed and utilized through educational courses linked to digital textbooks. Students use smart devices to engage in realistic virtual learning experiences, interacting with the content in digital textbooks. However, while many realistic contents offer visual and auditory effects like 3D VR, AR, and holograms, olfactory content that evokes actual sensations has not yet been introduced. Therefore, in this paper, we designed and implemented 4D educational content by adding the sense of smell to existing content. This implemented content was tested in classrooms through a curriculum-based evaluation. Classes taught with olfactory-enhanced content showed a higher percentage of correct answers compared to those using traditional audio-visual materials, indicating improved understanding.

Improving Accuracy of Instance Segmentation of Teeth

  • Jongjin Park
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.280-286
    • /
    • 2024
  • In this paper, layered UNet with warmup and dropout tricks was used to segment teeth instantly by using data labeled for each individual tooth and increase performance of the result. The layered UNet proposed before showed very good performance in tooth segmentation without distinguishing tooth number. To do instance segmentation of teeth, we labeled teeth CBCT data according to tooth numbering system which is devised by FDI World Dental Federation notation. Colors for labeled teeth are like AI-Hub teeth dataset. Simulation results show that layered UNet does also segment very well for each tooth distinguishing tooth number by color. Layered UNet model using warmup trick was the best with IoU values of 0.80 and 0.77 for training, validation data. To increase the performance of instance segmentation of teeth, we need more labeled data later. The results of this paper can be used to develop medical software that requires tooth recognition, such as orthodontic treatment, wisdom tooth extraction, and implant surgery.

Q&A Chatbot in Arabic Language about Prophet's Biography

  • Somaya Yassin Taher;Mohammad Zubair Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.211-223
    • /
    • 2024
  • Chatbots have become very popular in our times and are used in several fields. The emergence of chatbots has created a new way of communicating between human and computer interaction. A Chatbot also called a "Chatter Robot," or conversational agent CA is a software application that mimics human conversations in its natural format, which contains textual material and oral communication with artificial intelligence AI techniques. Generally, there are two types of chatbots rule-based and smart machine-based. Over the years, several chatbots designed in many languages for serving various fields such as medicine, entertainment, and education. Unfortunately, in the Arabic chatbots area, little work has been done. In this paper, we developed a beneficial tool (chatBot) in the Arabic language which contributes to educating people about the Prophet's biography providing them with useful information by using Natural Language Processing.

Design and Implementation of Mobile Ticket Issuing Application (모바일 티켓 발권 애플리케이션 설계 및 구현)

  • Youngkyun Kim;Gyutae Kim;Janghwan Park;Heeseung Yoo;Taewook Kang;Hyunsoo Lim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.239-240
    • /
    • 2024
  • 본 논문에서는 모바일 기기에 티켓을 발매하는 발권 애플리케이션을 설계 및 구현하였다. 애플리케이션은 사용자가 웹 인터페이스를 통해 메뉴 선정과 결제를 완료하여 모바일 기기로 QR 코드 식권을 발급받도록 구현한다. 식권 결제는 PG 연동을 통해 이루어지며, 식권 코드의 유효성은 코드 스캐닝을 통해 실시간으로 검증되도록 구현한다. 그리고 관리자가 식권 판매와 사용 현황을 확인할 수 있는 모니터링 기능을 구현한다.

  • PDF

Deriving adoption strategies of deep learning open source framework through case studies (딥러닝 오픈소스 프레임워크의 사례연구를 통한 도입 전략 도출)

  • Choi, Eunjoo;Lee, Junyeong;Han, Ingoo
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.27-65
    • /
    • 2020
  • Many companies on information and communication technology make public their own developed AI technology, for example, Google's TensorFlow, Facebook's PyTorch, Microsoft's CNTK. By releasing deep learning open source software to the public, the relationship with the developer community and the artificial intelligence (AI) ecosystem can be strengthened, and users can perform experiment, implementation and improvement of it. Accordingly, the field of machine learning is growing rapidly, and developers are using and reproducing various learning algorithms in each field. Although various analysis of open source software has been made, there is a lack of studies to help develop or use deep learning open source software in the industry. This study thus attempts to derive a strategy for adopting the framework through case studies of a deep learning open source framework. Based on the technology-organization-environment (TOE) framework and literature review related to the adoption of open source software, we employed the case study framework that includes technological factors as perceived relative advantage, perceived compatibility, perceived complexity, and perceived trialability, organizational factors as management support and knowledge & expertise, and environmental factors as availability of technology skills and services, and platform long term viability. We conducted a case study analysis of three companies' adoption cases (two cases of success and one case of failure) and revealed that seven out of eight TOE factors and several factors regarding company, team and resource are significant for the adoption of deep learning open source framework. By organizing the case study analysis results, we provided five important success factors for adopting deep learning framework: the knowledge and expertise of developers in the team, hardware (GPU) environment, data enterprise cooperation system, deep learning framework platform, deep learning framework work tool service. In order for an organization to successfully adopt a deep learning open source framework, at the stage of using the framework, first, the hardware (GPU) environment for AI R&D group must support the knowledge and expertise of the developers in the team. Second, it is necessary to support the use of deep learning frameworks by research developers through collecting and managing data inside and outside the company with a data enterprise cooperation system. Third, deep learning research expertise must be supplemented through cooperation with researchers from academic institutions such as universities and research institutes. Satisfying three procedures in the stage of using the deep learning framework, companies will increase the number of deep learning research developers, the ability to use the deep learning framework, and the support of GPU resource. In the proliferation stage of the deep learning framework, fourth, a company makes the deep learning framework platform that improves the research efficiency and effectiveness of the developers, for example, the optimization of the hardware (GPU) environment automatically. Fifth, the deep learning framework tool service team complements the developers' expertise through sharing the information of the external deep learning open source framework community to the in-house community and activating developer retraining and seminars. To implement the identified five success factors, a step-by-step enterprise procedure for adoption of the deep learning framework was proposed: defining the project problem, confirming whether the deep learning methodology is the right method, confirming whether the deep learning framework is the right tool, using the deep learning framework by the enterprise, spreading the framework of the enterprise. The first three steps (i.e. defining the project problem, confirming whether the deep learning methodology is the right method, and confirming whether the deep learning framework is the right tool) are pre-considerations to adopt a deep learning open source framework. After the three pre-considerations steps are clear, next two steps (i.e. using the deep learning framework by the enterprise and spreading the framework of the enterprise) can be processed. In the fourth step, the knowledge and expertise of developers in the team are important in addition to hardware (GPU) environment and data enterprise cooperation system. In final step, five important factors are realized for a successful adoption of the deep learning open source framework. This study provides strategic implications for companies adopting or using deep learning framework according to the needs of each industry and business.

A Method of Intra Mode Coding for Joint Exploration Model (JEM) (차세대 비디오 부호화 실험모델(JEM)의 화면내 예측 모드 부호화 기법)

  • Park, Dohyeon;Lee, Jinho;Kang, Jung Won;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.495-502
    • /
    • 2018
  • JVET (Joint Video Exploration Team) which explored evolving technologies of video coding with capabilities beyond HEVC (High Efficiency Video Coding), released a references software codec named the Joint Exploration Model (JEM) for performance verification of coding technologies. JEM has 67 intra prediction modes that extend the 35 modes of HEVC for intra prediction. Therefore, the enhancement of the coding performance is limited due to the overhead of prediction mode coding. In this paper, we analyze the probabilities of prediction modes selections, and then we propose a more efficient intra prediction mode coding based on the results of analyzed mode occurrence. In addition, we propose a context modeling for CABAC (Context-Adaptive Binary Arithmetic Coding) of the proposed mode coding. Experimental results show that the BD-rate gain is 0.02% on the AI (All Intra) coding structure compared to JEM 7.0. We need to optimize context modeling for additional coding performance enhancement.

A Study on Detection of Malicious Android Apps based on LSTM and Information Gain (LSTM 및 정보이득 기반의 악성 안드로이드 앱 탐지연구)

  • Ahn, Yulim;Hong, Seungah;Kim, Jiyeon;Choi, Eunjung
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.641-649
    • /
    • 2020
  • As the usage of mobile devices extremely increases, malicious mobile apps(applications) that target mobile users are also increasing. It is challenging to detect these malicious apps using traditional malware detection techniques due to intelligence of today's attack mechanisms. Deep learning (DL) is an alternative technique of traditional signature and rule-based anomaly detection techniques and thus have actively been used in numerous recent studies on malware detection. In order to develop DL-based defense mechanisms against intelligent malicious apps, feeding recent datasets into DL models is important. In this paper, we develop a DL-based model for detecting intelligent malicious apps using KU-CISC 2018-Android, the most up-to-date dataset consisting of benign and malicious Android apps. This dataset has hardly been addressed in other studies so far. We extract OPcode sequences from the Android apps and preprocess the OPcode sequences using an N-gram model. We then feed the preprocessed data into LSTM and apply the concept of Information Gain to improve performance of detecting malicious apps. Furthermore, we evaluate our model with numerous scenarios in order to verify the model's design and performance.

Design and Implementation of a Pre-processing Method for Image-based Deep Learning of Malware (악성코드의 이미지 기반 딥러닝을 위한 전처리 방법 설계 및 개발)

  • Park, Jihyeon;Kim, Taeok;Shin, Yulim;Kim, Jiyeon;Choi, Eunjung
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.650-657
    • /
    • 2020
  • The rapid growth of internet users and faster network speed are driving the new ICT services. ICT Technology has improved our way of thinking and style of life, but it has created security problems such as malware, ransomware, and so on. Therefore, we should research against the increase of malware and the emergence of malicious code. For this, it is necessary to accurately and quickly detect and classify malware family. In this paper, we analyzed and classified visualization technology, which is a preprocessing technology used for deep learning-based malware classification. The first method is to convert each byte into one pixel of the image to produce a grayscale image. The second method is to convert 2bytes of the binary to create a pair of coordinates. The third method is the method using LSH. We proposed improving the technique of using the entire existing malicious code file for visualization, extracting only the areas where important information is expected to exist and then visualizing it. As a result of experimenting in the method we proposed, it shows that selecting and visualizing important information and then classifying it, rather than containing all the information in malicious code, can produce better learning results.

Bayesian Inference driven Behavior-Network Architecture for Intelligent Agent to Avoid Collision with Moving Obstacles (지능형 에이전트의 움직이는 장애물 충돌 회피를 위한 베이지안 추론 주도형 행동 네트워크 구조)

  • 민현정;조성배
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.8
    • /
    • pp.1073-1082
    • /
    • 2004
  • This paper presents a technique for an agent to adaptively behave to unforeseen and dynamic circumstances. Since the traditional methods utilized the information about an environment to control intelligent agents, they were robust but could not behave adaptively in a complex and dynamic world. A behavior-based method is suitable for generating adaptive behaviors within environments, but it is necessary to devise a hybrid control architecture that incorporates the capabilities of inference, learning and planning for high-level abstract behaviors. This Paper proposes a 2-level control architecture for generating adaptive behaviors to perceive and avoid dynamic moving obstacles as well as static obstacles. The first level is behavior-network for generating reflexive and autonomous behaviors, and the second level is to infer dynamic situation of agents. Through simulation, it has been confirmed that the agent reaches a goal point while avoiding static and moving obstacles with the proposed method.