• Title/Summary/Keyword: Automated software

Search Result 527, Processing Time 0.02 seconds

A Study on the Optimum Design for Preventing Propelling Charge to Military Ammunition Vehicle (탄약운반장갑차의 장약 파손 방지를 위한 최적설계에 관한 연구)

  • Noh, Sang Wan;Kim, Sung Hoon;Park, Young Min;Kim, Byung Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.494-500
    • /
    • 2019
  • The purpose of this study was to determine a method to prevent damage during the transfer of loading through optimal design of loading transfer software for an ammunition-carrying armored vehicle. Typically, an ammunition carrier armored car is equipped with an automated charge transfer system. The load is intermittently damaged during the loading of the cargo, and this needs to be improved. The following improvements and verification tests were carried out. As impact speed increased, the loading speed was reduced 60%, and a special fixture utilizing a force gauge was developed and tested. If the maximum current of 11A for the servo controller is output when the load of the conveyor is generated by interference inside the loading tube, there is a possibility of charge breakage. If the maximum current is low, the load cannot be loaded. In the loading test for the ammunition carrier armored car with the actual charge, the improved design was found to be valid, as the load was not damaged and occurred nominally.

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

Scenario-Based Implementation Synthesis for Real-Time Object-Oriented Models (실시간 객체 지향 모델을 위한 시나리오 기반 구현 합성)

  • Kim, Sae-Hwa;Park, Ji-Yong;Hong, Seong-Soo
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1049-1064
    • /
    • 2005
  • The demands of increasingly complicated software have led to the proliferation of object-oriented design methodologies in embedded systems. To execute a system designed with objects in target hardware, a task set should be derived from the objects, representing how many tasks reside in the system and which task processes which event arriving at an object. The derived task set greatly influences the responsiveness of the system. Nevertheless, it is very difficult to derive an optimal task set due to the discrepancy between objects and tasks. Therefore, the common method currently used by developers is to repetitively try various task sets. This paper proposes Scenario-based Implementation Synthesis Architecture (SISA) to solve this problem. SISA encompasses a method for deriving a task set from a system designed with objects as well as its supporting development tools and run-time system architecture. A system designed with SISA not only consists of the smallest possible number of tasks, but also guarantees that the response time for each event in the system is minimized. We have fully implemented SISA by extending the ResoRT development tool and applied it to an existing industrial PBX system. The experimental results show that maximum response times were reduced $30.3\%$ on average compared to when the task set was derived by the best known existing methods.

Automation of Bio-Industrial Process Via Tele-Task Command(I) -identification and 3D coordinate extraction of object- (원격작업 지시를 이용한 생물산업공정의 생력화 (I) -대상체 인식 및 3차원 좌표 추출-)

  • Kim, S. C.;Choi, D. Y.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.26 no.1
    • /
    • pp.21-28
    • /
    • 2001
  • Major deficiencies of current automation scheme including various robots for bioproduction include the lack of task adaptability and real time processing, low job performance for diverse tasks, and the lack of robustness of take results, high system cost, failure of the credit from the operator, and so on. This paper proposed a scheme that could solve the current limitation of task abilities of conventional computer controlled automatic system. The proposed scheme is the man-machine hybrid automation via tele-operation which can handle various bioproduction processes. And it was classified into two categories. One category was the efficient task sharing between operator and CCM(computer controlled machine). The other was the efficient interface between operator and CCM. To realize the proposed concept, task of the object identification and extraction of 3D coordinate of an object was selected. 3D coordinate information was obtained from camera calibration using camera as a measurement device. Two stereo images were obtained by moving a camera certain distance in horizontal direction normal to focal axis and by acquiring two images at different locations. Transformation matrix for camera calibration was obtained via least square error approach using specified 6 known pairs of data points in 2D image and 3D world space. 3D world coordinate was obtained from two sets of image pixel coordinates of both camera images with calibrated transformation matrix. As an interface system between operator and CCM, a touch pad screen mounted on the monitor and remotely captured imaging system were used. Object indication was done by the operator’s finger touch to the captured image using the touch pad screen. A certain size of local image processing area was specified after the touch was made. And image processing was performed with the specified local area to extract desired features of the object. An MS Windows based interface software was developed using Visual C++6.0. The software was developed with four modules such as remote image acquisiton module, task command module, local image processing module and 3D coordinate extraction module. Proposed scheme shoed the feasibility of real time processing, robust and precise object identification, and adaptability of various job and environments though selected sample tasks.

  • PDF

Development of Automatized Quantitative Analysis Method in CT Images Evaluation using AAPM Phantom (AAPM Phantom을 이용한 CT 영상 평가 시 자동화된 정량적 분석 방법 개발)

  • Noh, Sung Sun;Um, Hyo Sik;Kim, Ho Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.163-173
    • /
    • 2014
  • When evaluating the spatial resolution images and evaluation of low contrast resolution using CT standard phantom, and might present a automated quantitative evaluation method for minimizing errors by subjective judgment of the evaluator be, and try to evaluate the usefulness. 120kVp and 250mAs, 10mm collimation, SFOV(scan field of view) of 25cm or more than, exposure conditions DFOV(display field of view) of 25cm, and were evaluated the 24 passing images and 20 failing images taken using a standard reconstruction algorithm by using the Nuclear Associates, Inc. AAPM CT Performance Phantom(Model 76-410). Quantitative evaluation of low contrast resolution and spatial resolution was using an evaluation program that was self-developed using the company Mathwork Matlab(Ver. 7.6. (R2008a)) software. In this study, the results were evaluated using the evaluation program that was self-developed in the evaluation of images using CT standard phantom, it was possible to evaluate an objective numerical qualitative evaluation item. First, if the contrast resolution, if EI is 0.50, 0.51, 0.52, 0.53, as a result of evaluating quantitatively the results were evaluated qualitatively match. Second, if CNR is -0.0018~-0.0010, as a result of evaluating quantitatively the results were evaluated qualitatively match. Third, if the spatial resolution, as a result of using a image segmentation technique, and automatically extract the contour boundary of the hole, as a result of evaluating quantitatively the results were evaluated qualitatively match.

Development of a Tree Ring Measuring Program Using Smartphone-Captured Images (스마트폰 촬영 이미지를 활용한 나이테 검출 및 분석 프로그램 개발)

  • Kim, Dong-Hyeon;Kim, Tae-Lee;Cho, Hyung-Joo;Kim, Dong-Geun
    • Journal of Korean Society of Forest Science
    • /
    • v.109 no.4
    • /
    • pp.484-491
    • /
    • 2020
  • In this study, to solve the existing inefficient stem analysis process and expensive equipment cost problems, a method for detecting and analyzing tree rings using smartphone images was proposed and a semi-automated computer program (TRIO, Tree Ring Information) was developed. TRIO can measure the annual ring radius and save the results to Excel. Since TRIO uses smartphone images, the results may vary depending on the quality of the smartphone camera. Therefore, using the Samsung Galaxy S10 and Tap 2, 30 dics images of Pinus rigida were acquired and analyzed, and these were compared with WinDENDROTM. As a result of the study, both Samsung Galaxy S10 and S2 showed significant results with WinDENDROTM, and the R2 value of S10 had a high correlation as 0.976, and RMSE was analyzed as 0.4199, and very similar results were output. The R2 value of S2 was 0.975 and the RMSE was 0.4232, showing no significant difference from S10. Accordingly, the TRIO developed in this study analyzed the annual radius value very similar to WinDENDROTM.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

Automated Story Generation with Image Captions and Recursiva Calls (이미지 캡션 및 재귀호출을 통한 스토리 생성 방법)

  • Isle Jeon;Dongha Jo;Mikyeong Moon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.1
    • /
    • pp.42-50
    • /
    • 2023
  • The development of technology has achieved digital innovation throughout the media industry, including production techniques and editing technologies, and has brought diversity in the form of consumer viewing through the OTT service and streaming era. The convergence of big data and deep learning networks automatically generated text in format such as news articles, novels, and scripts, but there were insufficient studies that reflected the author's intention and generated story with contextually smooth. In this paper, we describe the flow of pictures in the storyboard with image caption generation techniques, and the automatic generation of story-tailored scenarios through language models. Image caption using CNN and Attention Mechanism, we generate sentences describing pictures on the storyboard, and input the generated sentences into the artificial intelligence natural language processing model KoGPT-2 in order to automatically generate scenarios that meet the planning intention. Through this paper, the author's intention and story customized scenarios are created in large quantities to alleviate the pain of content creation, and artificial intelligence participates in the overall process of digital content production to activate media intelligence.

Development of System for Real-Time Object Recognition and Matching using Deep Learning at Simulated Lunar Surface Environment (딥러닝 기반 달 표면 모사 환경 실시간 객체 인식 및 매칭 시스템 개발)

  • Jong-Ho Na;Jun-Ho Gong;Su-Deuk Lee;Hyu-Soung Shin
    • Tunnel and Underground Space
    • /
    • v.33 no.4
    • /
    • pp.281-298
    • /
    • 2023
  • Continuous research efforts are being devoted to unmanned mobile platforms for lunar exploration. There is an ongoing demand for real-time information processing to accurately determine the positioning and mapping of areas of interest on the lunar surface. To apply deep learning processing and analysis techniques to practical rovers, research on software integration and optimization is imperative. In this study, a foundational investigation has been conducted on real-time analysis of virtual lunar base construction site images, aimed at automatically quantifying spatial information of key objects. This study involved transitioning from an existing region-based object recognition algorithm to a boundary box-based algorithm, thus enhancing object recognition accuracy and inference speed. To facilitate extensive data-based object matching training, the Batch Hard Triplet Mining technique was introduced, and research was conducted to optimize both training and inference processes. Furthermore, an improved software system for object recognition and identical object matching was integrated, accompanied by the development of visualization software for the automatic matching of identical objects within input images. Leveraging satellite simulative captured video data for training objects and moving object-captured video data for inference, training and inference for identical object matching were successfully executed. The outcomes of this research suggest the feasibility of implementing 3D spatial information based on continuous-capture video data of mobile platforms and utilizing it for positioning objects within regions of interest. As a result, these findings are expected to contribute to the integration of an automated on-site system for video-based construction monitoring and control of significant target objects within future lunar base construction sites.

Constructing Area Cartogram Using a GIS Based Circular Cartogram Technique (GIS 기반 원형 카토그램 기법을 이용한 카토그램 제작 방법 연구)

  • Kim, Young-Hoon
    • Journal of the Korean Geographical Society
    • /
    • v.43 no.2
    • /
    • pp.235-252
    • /
    • 2008
  • Many cartographers have for many years searched for a way to construct cartograms in which the sizes of geographic areas such as states, counties or census tracts are reseated in proportion to their population or some other socio-economic properties. While many techniques and algorithms for creating cartograms have been proposed, some of them are still extremely complex to generate in a proper manner, and many of them suffer either from this lack of readability or from seamless integration with GIS software. This paper, therefore, presents a simple population cartogam technique based on the Circular Cartogram Algorithm(CCA) by Dorling(1996) to tackle these drawbacks by drawing the areas as simple circles for use as a base map and linking the construction with GIS mapping processes. For an automated approach in the cartogram generation, this paper proposes a close coupling method of ArcView GIS 3.3. package in order for users to access to the cartopam algorithm. Then, they will be available through an interface that the ArcView GIS system allows user-written routines to be accessed easily. The CCA and its coupling architecture ensure to improve the potential applicability of the use of cartograms to census mapping at practical levels. As the cartogram examples, cartograms of population and property types in 2005 Korea census data sets are illustrated in the end, by which viewers can easily identify the residential concentration and their relative ratio in Seoul metropolitan area.