• Title/Summary/Keyword: Automatic detection

Search Result 1,687, Processing Time 0.024 seconds

The Cucumber Cognizance for Back Propagation of Nerual Network (신경회로망의 오류역전파 알고리즘을 이용한 오이 인식)

  • Min, Byeong-Ro;Lee, Dae-Weon
    • Journal of Bio-Environment Control
    • /
    • v.20 no.4
    • /
    • pp.277-282
    • /
    • 2011
  • We carried out shape recognition. We found out cucumber's feature shape by means of neural network and back propagation algorithm. We developed an algorithm which finds object position and shape in real image and we gained following conclusion as a result. It was processed for feature shape extraction of cucumber to detect automatic. The output pattern rates of the miss-detected objects was 0.1~4.2% in the output pattern which was recognized as cucumber. We were gained output pattern according to image resolution $445{\times}363$, $501{\times}391$, $450{\times}271$, $297{\times}421$. It was appeared that no change was detected. When learning pattern was increased to 25, miss-detection ratio was 16.02%, and when learning pattern had 2 pattern, it didn't detect 8 cucumber in 40 images.

Development of Automatic Inspection System for ALC Block Using Distortion Correction Technique (왜곡 보정 기법을 이용한 ALC 블럭의 자동 검사 시스템 개발)

  • Han, Kwang-Hee;Huh, Kyung-Moo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.1
    • /
    • pp.1-6
    • /
    • 2010
  • The lens distortion in the machine vision system is inevitable phenomenon. Distortion is getting worse, due to the selection of lens in the trend of reducing prices and size of the system. In this trend, the distortion correction becomes more important. But, the traditional correction methods has problems, such as complexity and requiring more operations. Effective distorted digital image correction is the precondition of target detection and recognition based on vision inspection. To overcome the disadvantage of traditional distortion correction algorithms, such as complex modeling, massive computation and marginal information loss, an image distortion correction algorithm based on photogrammetry method is proposed in this paper. In our method, we use the lattice image as the measurement target. Through the experimental results, we could find that we can reduce the processing time by 4ms. And also the inspection failure rate of our method was reduced by 2.3% than human-eyes inspection method.

An Object Tracking Method for Studio Cameras by OpenCV-based Python Program (OpenCV 기반 파이썬 프로그램에 의한 방송용 카메라의 객체 추적 기법)

  • Yang, Yong Jun;Lee, Sang Gu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.291-297
    • /
    • 2018
  • In this paper, we present an automatic image object tracking system for Studio cameras on the stage. For object tracking, we use the OpenCV-based Python program using PC, Raspberry Pi 3 and mobile devices. There are many methods of image object tracking such as mean-shift, CAMshift (Continuously Adaptive Mean shift), background modelling using GMM(Gaussian mixture model), template based detection using SURF(Speeded up robust features), CMT(Consensus-based Matching and Tracking) and TLD methods. CAMshift algorithm is very efficient for real-time tracking because of its fast and robust performance. However, in this paper, we implement an image object tracking system for studio cameras based CMT algorithm. This is an optimal image tracking method because of combination of static and adaptive correspondences. The proposed system can be applied to an effective and robust image tracking system for continuous object tracking on the stage in real time.

AUTOMATIC DETECTION AND EXTRACTION ALGORITHM OF INTER-GRANULAR BRIGHT POINTS

  • Feng, Song;Ji, Kai-Fan;Deng, Hui;Wang, Feng;Fu, Xiao-Dong
    • Journal of The Korean Astronomical Society
    • /
    • v.45 no.6
    • /
    • pp.167-173
    • /
    • 2012
  • Inter-granular Bright Points (igBPs) are small-scale objects in the Solar photosphere which can be seen within dark inter-granular lanes. We present a new algorithm to automatically detect and extract igBPs. Laplacian and Morphological Dilation (LMD) technique is employed by the algorithm. It involves three basic processing steps: (1) obtaining candidate "seed" regions by Laplacian; (2) determining the boundary and size of igBPs by morphological dilation; (3) discarding brighter granules by a probability criterion. For validating our algorithm, we used the observed samples of the Dutch Open Telescope (DOT), collected on April 12, 2007. They contain 180 high-resolution images, and each has a $85{\times}68\;arcsec^2$ field of view (FOV). Two important results are obtained: first, the identified rate of igBPs reaches 95% and is higher than previous results; second, the diameter distribution is $220{\pm}25km$, which is fully consistent with previously published data. We conclude that the presented algorithm can detect and extract igBPs automatically and effectively.

A ProstateSegmentationofTRUS ImageusingSupport VectorsandSnake-likeContour (서포트 벡터와 뱀형상 윤곽선을 이용한 TRUS 영상의 전립선 분할)

  • Park, Jae Heung;Se, Yeong Geon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.101-109
    • /
    • 2012
  • In many diagnostic and treatment procedures for prostate disease accurate detection of prostate boundaries in transrectal ultrasound(TRUS) images is required. This is a challenging and difficult task due to weak prostate boundaries, speckle noise and the short range of gray levels. In this paper a method for automatic prostate segmentation inTRUS images using support vectors and snake-like contour is presented. This method involves preprocessing, extracting Gabor feature, training, and prostate segmentation. Gabor filter bank for extracting the texture features has been implemented. A support vector machine(SVM) for training step has been used to get each feature of prostate and nonprostate. The boundary of prostate is extracted by the snake-like contour algorithm. The results showed that this new algorithm extracted the prostate boundary with less than 9.3% relative to boundary provided manually by experts.

The Study of NHPP Software Reliability Model from the Perspective of Learning Effects (학습 효과 기법을 이용한 NHPP 소프트웨어 신뢰도 모형에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.25-32
    • /
    • 2011
  • In this study, software products developed in the course of testing, software managers in the process of testing software test and test tools for effective learning effects perspective has been studied using the NHPP software. The Weibull distribution applied to distribution was based on finite failure NHPP. Software error detection techniques known in advance, but influencing factors for considering the errors found automatically and learning factors, by prior experience, to find precisely the error factor setting up the testing manager are presented comparing the problem. As a result, the learning factor is greater than automatic error that is generally efficient model could be confirmed. This paper, a numerical example of applying using time between failures and parameter estimation using maximum likelihood estimation method, after the efficiency of the data through trend analysis model selection were efficient using the mean square error and $R_{sq}$.

A Study on the Effects of a Virtual-Users Model Computing the Semantics of Spaces for the Operation and Understanding of Human Behavior Simulation of Architecture-Major Students (공간의 의미를 연산하는 가상 사용자 모델이 건축설계 전공학생들의 인간행동 시뮬레이션 운용과 이해도에 미치는 효과에 관한 연구)

  • Hong, Seung-Wan
    • Journal of KIBIM
    • /
    • v.6 no.3
    • /
    • pp.34-41
    • /
    • 2016
  • The previous studies argue that using the semantic properties of BIM objects is efficient for simulating the behaviors of autonomous, computer agents, called virtual-users, but such assumption is not proven via evidence-based research approaches. Hence, this present study aims to investigate the empirical effects of a human behavior simulation model equipped the semantics of spaces on the architecture-major students' operation and understanding of the simulation system, compared to a typical path-finding model. To achieve the aim, this study analyzed the survey and interview data, collected in the authentic design projects. The analysis indicates that (1) using a simulation model equipped the semantics of spaces helps the students' operation of the simulation, and (2) it also aids understanding the relationship between the variables of spaces and virtual-users (${\alpha}=0.74$). In addition, the qualitative data inform that the advantages of the simulation model that computes the semantics of spaces stem in the automatic behavioral changes of massive numbers of virtual-users, and efficient detection and activation on the what-if situations. The analysis also reveals that the simulation model has shortcomings in orchestrating the complex data structure between the semantics properties of spaces and virtual-users under multi-sequential scenarios. The results of this study contribute to develop a future design system combining BIM with human behavior simulation.

Barcode Region of Interest Extraction Method Using a Local Pixel Directions in a Multiple Barcode Region Image (다중 바코드 영역을 가지는 영상에서 지역적 픽셀 방향성을 이용한 바코드 관심 영역 추출 방법)

  • Cho, Hosang;Kang, Bongsoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2121-2128
    • /
    • 2015
  • In this paper presents a method of extracting reliable and regions of interest (ROI) in barcode for the purpose of factory automation. backgrounds are separated based on directional components and the characteristics of detected patterns. post-processing is performed on candidate images with analysis of problems caused by blur, rotation and areas of high similarity. In addition, the resizing factor is used to achieve faster calculations through image resizing. The input images contained multiple product or barcode for application to diverse automation environments; a high extraction success rate is accomplished despite the maximum shooting distance of 80 cm. Simulations involving images with various shooting distances gave an ROI detection rate of 100% and a post-processing success rate of 99.3%.

An Agent based Emergency Warning System for Dealing With Defensive Information Warfare in Strategic Simulation Exercises (전략시뮬레이션 훈련에서의 방어적 정보전을 위한 에이전트 기반 위기경보시스템의 개발)

  • Lee Yong-Han;Kumara Soundar R.T.
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.11-26
    • /
    • 2004
  • Software for analyzing documents on the net to detect specific categories of occurrences is in great demand. In the current world where detecting terrorist threats is critical there is a great need for such systems. One of the critical application areas of such software is the automatic detection of a national infrastructure emergency. In this research an agent-based generic architecture for emergency warning systems is proposed and implemented. This system, called the National Infrastructure Emergency Warning System (NIEWS), is designed to analyze given documents, to detect threats, and to report possible threats with the necessary information to the appropriate users autonomously. In addition, a systematic analysis framework to detect emergencies on the subject of defensive information warfare is designated and implemented through a knowledge base. The developed system along with the knowledge base is implemented and successfully deployed to Strategic Crisis Exercise (SCE) at the United State Army War College (USAWC), saving a good amount of money by replacing human SMEs (subject matter experts) in the SCE.

  • PDF

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games (악성코드의 이미지 시각화 탐지 기법을 적용한 온라인 게임상에서의 이탈 유저 탐지 모델)

  • Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1431-1439
    • /
    • 2017
  • In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.