• Title/Summary/Keyword: Advanced Model

Search Result 6,469, Processing Time 0.037 seconds

Effect of the Learning Image Combinations and Weather Parameters in the PM Estimation from CCTV Images (CCTV 영상으로부터 미세먼지 추정에서 학습영상조합, 기상변수 적용이 결과에 미치는 영향)

  • Won, Taeyeon;Eo, Yang Dam;Sung, Hong ki;Chong, Kyu soo;Youn, Junhee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.6
    • /
    • pp.573-581
    • /
    • 2020
  • Using CCTV images and weather parameters, a method for estimating PM (Particulate Matter) index was proposed, and an experiment was conducted. For CCTV images, we proposed a method of estimating the PM index by applying a deep learning technique based on a CNN (Convolutional Neural Network) with ROI(Region Of Interest) image including a specific spot and an full area image. In addition, after combining the predicted result values by deep learning with the two weather parameters of humidity and wind speed, a post-processing experiment was also conducted to calculate the modified PM index using the learned regression model. As a result of the experiment, the estimated value of the PM index from the CCTV image was R2(R-Squared) 0.58~0.89, and the result of learning the ROI image and the full area image with the measuring device was the best. The result of post-processing using weather parameters did not always show improvement in accuracy in all cases in the experimental area.

Development of Permit Vehicle Classification System for Bridge Evaluation in Korea (허가차량 통행에 대한 교량의 안전성 평가를 위한 허가차량 분류 체계 개발)

  • Yu, Sang Seon;Kim, Kyunghyun;Paik, Inyeol;Kim, Ji Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.845-856
    • /
    • 2020
  • This study proposes a bridge evaluation system for indivisible permit vehicles such as hydraulic cranes. The permit loads for the bridge evaluation are divided into three categories: routine permit loads, special permit 1 loads, and special permit 2 loads. Routine permit and special permit 1 vehicles are allowed to cross a bridge with normal traffic. For these two permits, the standard lane model in the Korean Highway Bridge Design Code was adopted to consider normal traffic in the same lane. Special permit 2 vehicles are assumed to cross a bridge without other traffic. Structural analyses of two prestressed-beam bridges and two steel box girder bridges were conducted for the proposed permit loads. The rating factors of the four bridges for all permit loads were calculated as sufficiently large values for the moment and shear force so that crossing the bridges can be permitted. A reliability assessment of the bridges was performed to identify the reliability levels for the permit vehicles. It was confirmed that the reliability level of the minimum required strength obtained by the load-resistance factors yields the target reliability index of the design code for the permit vehicles.

A Study on the Concept of a Ship Predictive Maintenance Model Reflection Ship Operation Characteristics (선박 운항 특성을 반영한 선박 예지 정비 모델 개념 제안)

  • Youn, Ik-Hyun;Park, Jinkyu;Oh, Jungmo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.1
    • /
    • pp.53-59
    • /
    • 2021
  • The marine transport industry generally applies new technologies later than other transport industries, such as airways and railways. Vessels require efficient operation, and their performance and lifespan depend on the level of maintenance and management. Many studies have shown that corrective maintenance (CM) and time-based maintenance (TBM) have restrictions with respect to enabling efficient maintenance of workload and cost to improve operational efficiency. Predictive maintenance (PdM) is an advanced technology that allows monitoring the condition and performance of a target machine to predict its time of failure and helps maintain the key machinery in optimal working conditions at all times. This study presents the development of a marine predictive maintenance (MPdM; maritime predictive maintenance) method based on applying PdM to the marine environment. The MPdM scheme is designed by considering the special environment of the marine transport industry and the extreme marine conditions. Further, results of the study elaborates upon the concept of MPdM and its necessity to advancing marine transportation in the future.

Deep Learning Based Pine Nut Detection in UAV Aerial Video (UAV 항공 영상에서의 딥러닝 기반 잣송이 검출)

  • Kim, Gyu-Min;Park, Sung-Jun;Hwang, Seung-Jun;Kim, Hee Yeong;Baek, Joong-Hwan
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.1
    • /
    • pp.115-123
    • /
    • 2021
  • Pine nuts are Korea's representative nut forest products and profitable crops. However, pine nuts are harvested by climbing the trees themselves, thus the risk is high. In order to solve this problem, it is necessary to harvest pine nuts using a robot or an unmanned aerial vehicle(UAV). In this paper, we propose a deep learning based detection method for harvesting pine nut in UAV aerial images. For this, a video was recorded in a real pine forest using UAV, and a data augmentation technique was used to supplement a small number of data. As the data for 3D detection, Unity3D was used to model the virtual pine nut and the virtual environment, and the labeling was acquired using the 3D transformation method of the coordinate system. Deep learning algorithms for detection of pine nuts distribution area and 2D and 3D detection of pine nuts objects were used DeepLabV3+, YOLOv4, and CenterNet, respectively. As a result of the experiment, the detection rate of pine nuts distribution area was 82.15%, the 2D detection rate was 86.93%, and the 3D detection rate was 59.45%.

A Study on How to Set up a Standard Framework for AI Ethics and Regulation (AI 윤리와 규제에 관한 표준 프레임워크 설정 방안 연구)

  • Nam, Mun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.7-15
    • /
    • 2022
  • With the aim of an intelligent world in the age of individual customization through decentralization of information and technology, sharing/opening, and connection, we often see a tendency to cross expectations and concerns in the technological discourse and interest in artificial intelligence more than ever. Recently, it is easy to find claims by futurists that AI singularity will appear before and after 2045. Now, as part of preparations to create a paradigm of coexistence that coexists and prosper with AI in the coming age of artificial intelligence, a standard framework for setting up more correct AI ethics and regulations is required. This is because excluding the risk of omission of setting major guidelines and methods for evaluating reasonable and more reasonable guideline items and evaluation standards are increasingly becoming major research issues. In order to solve these research problems and at the same time to develop continuous experiences and learning effects on AI ethics and regulation setting, we collect guideline data on AI ethics and regulation of international organizations / countries / companies, and research and suggest ways to set up a standard framework (SF: Standard Framework) through a setting research model and text mining exploratory analysis. The results of this study can be contributed as basic prior research data for more advanced AI ethics and regulatory guidelines item setting and evaluation methods in the future.

Design and Implementation of BNN based Human Identification and Motion Classification System Using CW Radar (연속파 레이다를 활용한 이진 신경망 기반 사람 식별 및 동작 분류 시스템 설계 및 구현)

  • Kim, Kyeong-min;Kim, Seong-jin;NamKoong, Ho-jung;Jung, Yun-ho
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.211-218
    • /
    • 2022
  • Continuous wave (CW) radar has the advantage of reliability and accuracy compared to other sensors such as camera and lidar. In addition, binarized neural network (BNN) has a characteristic that dramatically reduces memory usage and complexity compared to other deep learning networks. Therefore, this paper proposes binarized neural network based human identification and motion classification system using CW radar. After receiving a signal from CW radar, a spectrogram is generated through a short-time Fourier transform (STFT). Based on this spectrogram, we propose an algorithm that detects whether a person approaches a radar. Also, we designed an optimized BNN model that can support the accuracy of 90.0% for human identification and 98.3% for motion classification. In order to accelerate BNN operation, we designed BNN hardware accelerator on field programmable gate array (FPGA). The accelerator was implemented with 1,030 logics, 836 registers, and 334.904 Kbit block memory, and it was confirmed that the real-time operation was possible with a total calculation time of 6 ms from inference to transferring result.

Development and Characteristics of Cheese-topped, Semi-dried and Seasoned Broughton's Ribbed Ark Scapharca broughtonii with Improved Fish Odor and Texture (비린내와 조직감이 개선된 치즈 토핑 반건조 조미 피조개(Scapharca broughtonii)의 개발 및 특성)

  • Kang, Sang In;Kim, Ye Jin;Lee, Ji Un;Park, Ji Hoon;Choi, Kwan Su;Hwang, Ji-Young;Heu, Min Soo;Lee, Jung Suck
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.54 no.6
    • /
    • pp.869-879
    • /
    • 2021
  • Methods for the development of home meal replacement seafood tailored to consumer needs for the advanced use of Broughton's ribbed ark Scapharca broughtonii (BRA) in Korea are required. In this study, we developed a cheese-topped, semi-dried, and seasoned Broughton's ribbed ark (S-BRA) tailored for the younger generation with an improved texture and fish odor. The optimization of conditions to improve the texture and fish odor was performed using RSM. The design of the model was appropriate because there was no significant difference (P>0.05) between the predicted and actual values of moisture content, hardness, and overall acceptance, and the optimal preparation conditions were a vinegar content of 2.68%, a soaking time of 62 min, a drying temperature of 60℃, and a time of 162 min. The S-BRA manufactured under these optimal conditions exhibited a lower odor intensity compared to the unsoaked and undried control, suggesting that the fish odor of S-BRA has been improved. The moisture content related to the texture of the S-BRA was lower than that of the control, and the hardness was higher. Therefore, the S-BRA developed in this study will appeal to people of all ages, especially the younger generation; their consumption is expected to increase.

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification (화자식별 기반의 AI 음성인식 서비스에 대한 사이버 위협 분석)

  • Hong, Chunho;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.33-40
    • /
    • 2021
  • Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.

Elementary School Teachers' Conception of the Learning Content of Elementary Science Education Subject Required in the 4th Industrial Revolution Era (4차 산업혁명 시대에 필요한 초등 과학교육학 과목의 학습 내용에 대한 초등 교사의 인식)

  • Na, Jiyeon
    • Journal of Science Education
    • /
    • v.45 no.1
    • /
    • pp.90-104
    • /
    • 2021
  • This study conducted an online survey to understand what elementary school teachers think about the learning contents of elementary science education subjects needed to train elementary science teachers suitable for the era of the 4th Industrial Revolution. The results are as follows: First, there were many elementary school teachers who thought that the current learning content of elementary science education was not suitable for the era of the 4th Industrial Revolution and that it needed to modify the learning content. Many of the teachers said that the learning content of the subject did not include the characteristics of the 4th Industrial Revolution, but also did not reflect the changes of the times and remained in the past. Second, the content that elementary school teachers thought was important in training elementary school teachers suitable for the era of the 4th Industrial Revolution was mainly related to the interests and curiosity of students, and scientific experiments or inquiry. On the contrary, the items that they thought should be deleted or reduced included science learning theory, science teaching/learning model, nature of science, and guidance for gifted children. Third, the contents that elementary school teachers thought needed to be added as learning content of elementary science education subjects were SSI education, science education-related social change and future prediction, advanced science technology, STEAM guidance, and integrated education within the science field. Fourth, in order to train elementary school teachers suitable for the era of the 4th Industrial Revolution, the contents that they thought should be introduced first as learning content of elementary science education subjects were SSI education, integrated education within the science field, STEAM guidance, and core competencies. Other contents that need to be introduced were software education, safety education, and project learning methods.

A Study on Cell-Broadcasting Based Security Authentication System and Business Models (셀 브로드캐스팅 보안 인증시스템 및 비즈니스 모델에 관한 연구)

  • Choi, Jeong-Moon;Lee, Jungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.325-333
    • /
    • 2021
  • With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.