• Title/Summary/Keyword: Automatic checking

Search Result 147, Processing Time 0.027 seconds

Deep-Learning-based smartphone application for automatic recognition of ingredients on curved containers (곡면 용기에 표시된 성분표 자동 인식을 위한 인공지능 기반 스마트폰 애플리케이션)

  • Hieyong Jeong;Choonsung Shin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.6
    • /
    • pp.29-43
    • /
    • 2023
  • Consumers should look at the ingredients of cosmetics or food for their health and purchase them after checking whether they contain allergy-causing ingredients. Therefore, this paper aimed to develop an artificial intelligence-based smartphone application for automatically recognizing the ingredients displayed on a curved container and delivering it to consumers in an easy-to-understand manner. The app needs to allow consumers to immediately comprehend the restricted ingredients by recognizing the ingredients' words in the cropped image. Two major issues should be solved during the development process: First, although there were flat containers for cosmetics or food, most were curved containers. Thus, it was necessary to recognize the ingredient table displayed on the curved containers. Second, since the ingredients' words were displayed on the curved surface, the transformed or line-changed words also needed to be recognized. The proposed new methods were enough to solve the above two problems. The application developed through various tests verified that there was no problem recognizing the ingredients' words contained in a cylindrical curved container.

A Study on the Effect of the Document Summarization Technique on the Fake News Detection Model (문서 요약 기법이 가짜 뉴스 탐지 모형에 미치는 영향에 관한 연구)

  • Shim, Jae-Seung;Won, Ha-Ram;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.201-220
    • /
    • 2019
  • Fake news has emerged as a significant issue over the last few years, igniting discussions and research on how to solve this problem. In particular, studies on automated fact-checking and fake news detection using artificial intelligence and text analysis techniques have drawn attention. Fake news detection research entails a form of document classification; thus, document classification techniques have been widely used in this type of research. However, document summarization techniques have been inconspicuous in this field. At the same time, automatic news summarization services have become popular, and a recent study found that the use of news summarized through abstractive summarization has strengthened the predictive performance of fake news detection models. Therefore, the need to study the integration of document summarization technology in the domestic news data environment has become evident. In order to examine the effect of extractive summarization on the fake news detection model, we first summarized news articles through extractive summarization. Second, we created a summarized news-based detection model. Finally, we compared our model with the full-text-based detection model. The study found that BPN(Back Propagation Neural Network) and SVM(Support Vector Machine) did not exhibit a large difference in performance; however, for DT(Decision Tree), the full-text-based model demonstrated a somewhat better performance. In the case of LR(Logistic Regression), our model exhibited the superior performance. Nonetheless, the results did not show a statistically significant difference between our model and the full-text-based model. Therefore, when the summary is applied, at least the core information of the fake news is preserved, and the LR-based model can confirm the possibility of performance improvement. This study features an experimental application of extractive summarization in fake news detection research by employing various machine-learning algorithms. The study's limitations are, essentially, the relatively small amount of data and the lack of comparison between various summarization technologies. Therefore, an in-depth analysis that applies various analytical techniques to a larger data volume would be helpful in the future.

Factors Influencing Frequency of Abnormal Peak in the Measurement of HbA1c by HPLC (HPLC법을 이용한 HbA1c 측정시 Abnormal Peak의 빈도와 원인)

  • Kim, Sun-Kyung;Bae, Ae-Young;Choi, Dae-Yong;Kim, Myung-Soo;Yoo, Kwang-Hyun;Ki, Chang-Seok
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.37 no.2
    • /
    • pp.71-77
    • /
    • 2005
  • We experienced the specimen that contains a hemoglobin variant known as interference from HbAS in October 2003. It was the first case of Hb variants since Samsung Medical Center began conducting glycohemoglobin College of American Pathologists surveys in 1997. The purpose of this study is to share our experience with the specimen and promote the understanding of Hb variants & derivatives. We've performed cross checks to examine HbA1c by using two pieces of equipment; the TOSHOH G7 and BIO-RAD VARIANT-T(turbo), and Automatic High Performance Liquid Chromatography(HPLC) as an analytic measurement method. HPLC provides different fractional information of hemoglobin with a two-dimensional graph as well as numeric results. We have been performing a "Systematic Checking Process". Three specimen suspicious of Hb variants & derivatives were found through this process. College of American Pathologists notified that it is important for users to be aware of the limitation of their glycohemoglobin method to avoid reporting incorrect results due to interference from hemoglobin variants or hemoglobin adducts. Therefore, laboratory findings of Hb variants & derivatives are very important. The experience of qualified technicians with professional knowledge in Hb variants is the most important aspect in finding Hb variants. Korea is homogeneous in race and is not in an area with a higher finding rate of Hb variants. While 1,024 cases of Hb variants have been found in Japan, we do not have specific data on how many cases of Hb variants have been found in Korea. Considering Hb variant cases in Japan, which is geographically close to us, it is presumed that there must be various Hb variant cases in Korea. If domestic laboratories set a systemic protocol and build a network to share our experience in Hb variants, I expect the Korean Hb variants could also be listed on the world's Hb variant list.

  • PDF

A Development of Analysis System for Vessel Traffic Display and Statistics based on Maritime-BigData (해상-빅데이터 기반 선박 항적 표시 및 해상교통량 통계 분석 시스템의 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Shin, Il-Sik;Song, Sang-Kee;Nam, Gyeung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1195-1202
    • /
    • 2016
  • Recently, a lot of studies that applying the big data technology to various fields, are progressing actively. In the maritime domain, the big data is the meaningful information which makes and gathers by the navigation and communication equipment from the many ships on the ocean. Also, importance of the maritime safety is emphasized, because maritime accidents are rising with increasing of maritime traffic. To support prevention of maritime accidents, in this paper, we developed a vessel traffic display and statistic system based on AIS messages from the many vessels of maritime. Also, to verify the developed system, we conducted tests for vessel track display function and vessel traffic statistic function based on two test scenarios. Therefore, we verified the effectiveness of the developed system for vessel tracks display, abnormal navigation patterns, checking failure of AIS equipments and maritime traffic statistic analyses.

Building an Analytical Platform of Big Data for Quality Inspection in the Dairy Industry: A Machine Learning Approach (유제품 산업의 품질검사를 위한 빅데이터 플랫폼 개발: 머신러닝 접근법)

  • Hwang, Hyunseok;Lee, Sangil;Kim, Sunghyun;Lee, Sangwon
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.125-140
    • /
    • 2018
  • As one of the processes in the manufacturing industry, quality inspection inspects the intermediate products or final products to separate the good-quality goods that meet the quality management standard and the defective goods that do not. The manual inspection of quality in a mass production system may result in low consistency and efficiency. Therefore, the quality inspection of mass-produced products involves automatic checking and classifying by the machines in many processes. Although there are many preceding studies on improving or optimizing the process using the data generated in the production process, there have been many constraints with regard to actual implementation due to the technical limitations of processing a large volume of data in real time. The recent research studies on big data have improved the data processing technology and enabled collecting, processing, and analyzing process data in real time. This paper aims to propose the process and details of applying big data for quality inspection and examine the applicability of the proposed method to the dairy industry. We review the previous studies and propose a big data analysis procedure that is applicable to the manufacturing sector. To assess the feasibility of the proposed method, we applied two methods to one of the quality inspection processes in the dairy industry: convolutional neural network and random forest. We collected, processed, and analyzed the images of caps and straws in real time, and then determined whether the products were defective or not. The result confirmed that there was a drastic increase in classification accuracy compared to the quality inspection performed in the past.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

A Study on the Usefulness of Backend Development Tools for Web-based ERP Customization (Web기반 ERP 커스터마이징을 위한 백엔드 개발도구의 유용성 연구)

  • Jung, Hoon;Lee, KangSu
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.53-61
    • /
    • 2019
  • The risk of project failure has increased recently as ERP systems have been transformed into Web environments and task complexity has increased. Although low-code platform development tools are being used as a way to solve this problem, limitations exist as they are centered on UI. To overcome this, back-end development tools are required that can be developed quickly and easily, not only from the front development but also from a variety of development sources produced from the ERP development process, including back-end business services. In addition, the development tools included within existing ERP products require a lot of learning time from the perspective of beginner and intermediate developers due to high entry barriers. To address these shortcomings, this paper seeks to study ways to overcome the limitations of existing development tools within the ERP by providing customized development tool functions by enhancing the usability of ERP development tools suitable for each developer's skills and roles based on the requirements required by ERP development tools, such as reducing the time required for querying, automatic binding of data for testing for service-based units, and checking of source code quality.

The Study on Design of lead monoxide based radiation detector for Checking the Position of a Radioactive Source in an NDT (비파괴검사 분야에서 방사선원의 위치 확인을 위한 산화납 기반 방사선 검출기 설계에 관한 연구)

  • Ahn, Ki-Jung
    • Journal of the Korean Society of Radiology
    • /
    • v.11 no.4
    • /
    • pp.183-188
    • /
    • 2017
  • In recent years, the automatic remote control controller of the gamma ray irradiator malfunctions, and radiation workers are continuously exposed to radiation exposure accidents. In the non-destructive testing field, much time and resources are invested in establishing a radioactive source monitoring system in order to prevent potential incidents of radiation. In this study, the gamma-ray response properties of the lead monoxide-based radiation detector were estimated through monte carlo simulation as a previous study for the development of a radioactive source location monitoring system that can be applied universally to various non-destructive testing equipment. As a result of the study, the optimized thickness of the radiation detector varies according to the gamma-ray energy emitted from the radioactive source, and the optimized thickness gradually increases with increasing energy. In conclusion, the optimized thickness of the lead monoxide-based radiation detector was $200{\mu}m$ for the Ir-192, $150{\mu}m$ for the Se-75 and $300{\mu}m$ for the Co-60. Based on these results, the appropriate thickness of lead monoxide-based radiation detector considering secondary-electron equilibrium was evaluated to be $300{\mu}m$ for general application. These results can be used as a basic data for determining the appropriate thickness required in the radiation detector when developing a radiation source location monitoring system for universal application to various non-destructive testing equipment in the future.

Efficient Management of Statistical Information of Keywords on E-Catalogs (전자 카탈로그에 대한 효율적인 색인어 통계 정보 관리 방법)

  • Lee, Dong-Joo;Hwang, In-Beom;Lee, Sang-Goo
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.4
    • /
    • pp.1-17
    • /
    • 2009
  • E-Catalogs which describe products or services are one of the most important data for the electronic commerce. E-Catalogs are created, updated, and removed in order to keep up-to-date information in e-Catalog database. However, when the number of catalogs increases, information integrity is violated by the several reasons like catalog duplication and abnormal classification. Catalog search, duplication checking, and automatic classification are important functions to utilize e-Catalogs and keep the integrity of e-Catalog database. To implement these functions, probabilistic models that use statistics of index words extracted from e-Catalogs had been suggested and the feasibility of the methods had been shown in several papers. However, even though these functions are used together in the e-Catalog management system, there has not been enough consideration about how to share common data used for each function and how to effectively manage statistics of index words. In this paper, we suggest a method to implement these three functions by using simple SQL supported by relational database management system. In addition, we use materialized views to reduce the load for implementing an application that manages statistics of index words. This brings the efficiency of managing statistics of index words by putting database management systems optimize statistics updating. We showed that our method is feasible to implement three functions and effective to manage statistics of index words with empirical evaluation.

  • PDF