• Title/Summary/Keyword: Computer science and engineering

Search Result 16,209, Processing Time 0.05 seconds

Effect of Hypotonic and Hypertonic Solution on Brining Process for Pork Loin Cube: Mass Transfer Kinetics (돼지고기 등심의 염지공정에서 소금농도의 영향: 물질전달 동역학을 중심으로)

  • Park, Min;Lee, Nak Hun;In, Ye-Won;Oh, Sang-Yup;Cho, Hyung-Yong
    • Food Engineering Progress
    • /
    • v.23 no.1
    • /
    • pp.7-15
    • /
    • 2019
  • The impregnation of solid foods into the surrounding hypotonic or hypertonic solution was explored as a method to infuse NaCl in pork loin cube without altering its matrix. Mass transfer kinetics using a diffusive model as the mathematical model for moisture gain/loss and salt gain and the resulting textural properties were studied for the surrounding solutions of NaCl 2.5, 5.0, 10.0 and 15% (w/w). It was possible to access the effects of brine concentration on the direction of the resulting water flow, quantify water and salt transfer, and confirm tenderization effect by salt infusion. For brine concentrations up to 10% it was verified that meat samples gained water, while for processes with 15% concentration, pork loin cubes lost water. The effective diffusion coefficients of salt ranged from 2.43×10-9 to 3.53×10-9 m2/s, while for the values of water ranged from 1.22×10-9 to 1.88×10-9 m2/s. The diffusive model was able to represent well salt gain rates using a single parameter, i.e. an effective diffusion coefficient of salt through the meat. However, it was not possible to find a characteristic effective diffusion coefficient for water transfer. Within the range of experimental conditions studied, salt-impregnated samples by 5% (w/w) brine were shown with minimum hardness, chewiness and shear force.

Regeneration of a defective Railroad Surface for defect detection with Deep Convolution Neural Networks (Deep Convolution Neural Networks 이용하여 결함 검출을 위한 결함이 있는 철도선로표면 디지털영상 재 생성)

  • Kim, Hyeonho;Han, Seokmin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.23-31
    • /
    • 2020
  • This study was carried out to generate various images of railroad surfaces with random defects as training data to be better at the detection of defects. Defects on the surface of railroads are caused by various factors such as friction between track binding devices and adjacent tracks and can cause accidents such as broken rails, so railroad maintenance for defects is necessary. Therefore, various researches on defect detection and inspection using image processing or machine learning on railway surface images have been conducted to automate railroad inspection and to reduce railroad maintenance costs. In general, the performance of the image processing analysis method and machine learning technology is affected by the quantity and quality of data. For this reason, some researches require specific devices or vehicles to acquire images of the track surface at regular intervals to obtain a database of various railway surface images. On the contrary, in this study, in order to reduce and improve the operating cost of image acquisition, we constructed the 'Defective Railroad Surface Regeneration Model' by applying the methods presented in the related studies of the Generative Adversarial Network (GAN). Thus, we aimed to detect defects on railroad surface even without a dedicated database. This constructed model is designed to learn to generate the railroad surface combining the different railroad surface textures and the original surface, considering the ground truth of the railroad defects. The generated images of the railroad surface were used as training data in defect detection network, which is based on Fully Convolutional Network (FCN). To validate its performance, we clustered and divided the railroad data into three subsets, one subset as original railroad texture images and the remaining two subsets as another railroad surface texture images. In the first experiment, we used only original texture images for training sets in the defect detection model. And in the second experiment, we trained the generated images that were generated by combining the original images with a few railroad textures of the other images. Each defect detection model was evaluated in terms of 'intersection of union(IoU)' and F1-score measures with ground truths. As a result, the scores increased by about 10~15% when the generated images were used, compared to the case that only the original images were used. This proves that it is possible to detect defects by using the existing data and a few different texture images, even for the railroad surface images in which dedicated training database is not constructed.

Implementation of Intelligent Characters adapting to Action Patterns of Opponent Characters (상대캐릭터의 행동패턴에 적응하는 지능캐릭터의 구현)

  • Lee, Myun-Sub;Cho, Byeong-Heon;Jung, Sung-Hoon;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.42 no.3
    • /
    • pp.31-38
    • /
    • 2005
  • This paper proposes an implementation method of intelligent characters that can properly adapt to action patterns of opponent characters in fighting games by using genetic algorithm. For this intelligent characters, past actions patterns of opponent characters should be included in the learning process. To verify the effectiveness of the proposed method, two types of experiments are performed and their results are compared. In first experiment(exp-1), intelligent characters consider current action and its step of an opponent character. In second experiment (exp-2), on the other hands, they take past actions of an opponent characters into account additionally. As a performance index, the ratio of score obtained by an intelligent character to that of an opponent character is adopted. Experimental results shows that even if the performance index of exp-1 is better than that of exp-2 at the beginning of stages, but the performance index of exp-2 outperforms that of exp-1 as stages go on. Moreover, optimum solutions are always found in all experimental cases in exp-2. Futhermore, intelligent characters in exp-2 could learn moving actions (forward and backward) and waiting actions for getting more scores through self evolution.

Visualization of Structural Shape Information based on Octree using Terrestrial Laser Scanning (3D레이저스캐닝을 이용한 옥트리기반 구조물 형상정보 가시화)

  • Cha, Gichun;Lee, Donghwan;Park, Seunghee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.8-16
    • /
    • 2016
  • This study presents the visualization of shape information based on Octree using 3D laser scanning. The process of visualization was established to construct the Octree structure from the 3D scan data. The scan data was converted to a 2D surface through the mesh technique and the surface was then converted to a 3D object through the Raster/Vector transformation. The 3D object was transmitted to the Octree Root Node and The shape information was constructed by the recursive partitioning of the Octree Root Node. The test-bed was selected as the steel bridge structure in Sungkyunkwan University. The shape information based on Octree was condensed into 89.3%. In addition, the Octree compressibility was confirmed to compare the shape information of the office building, a computer science campus in Germany and a New College in USA. The basis is created by the visualization of shape information for double-deck tunnel and it will be expected to improve the efficiency of structural health monitoring and maintenance.

Highlight Detection Using Photometric Stereo and Object Reconstruction Using Difference Image (측광입체시법을 이용한 하이라이트 검출과 농담 차이를 이용한 물체 복원)

  • Bae, Cheol-Min;Mun, Yeong-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.1132-1140
    • /
    • 1997
  • In many vision tasks of the major obstacles is the specular highkight of smoth objects, which causes a misinterpretation of objects.This paper presents an dffcient algorithm for highight detection and object reconstruction, blsed on the theory of photometric stereo in which the location of highilight changes as the position of illumination source changes.Two images, referred to as base image and reference image.are sequentially taken with two different positionhs of the two images.The difference image is thresholded to detct the specular spike of the highlight.Then the specu-lar lobe around the specular spike is detected to reconstruct the object.The proposed algorithm can be applied to metals and dielectrics, regardlless of the surface chracteristics.This method can also be aplied to the case when the background is brighter than the object.

  • PDF

An IMADF Algorithm for Adaptive Noise Cancelation of Biomedical Signal (생체신호의 적응잡음제거를 위한 비적적응필터 알고리즘)

  • Yoon, Dal-Hwan;Lin, Chi-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.1
    • /
    • pp.59-67
    • /
    • 2009
  • In this paper, we have proposed the structure of the IMADF(improved modified multiplication-free adaptive filter) to cancel the adaptive noise in biomedical signals. The IMADF structure use the one-step predicted filter in the multiplication-free adaptive digital filter(MADF) structure using the DPCM and Sign algorithm. And then we use the heart phantom model based on the magnetocardiographic (MCG) to test the biomedical signals and analyze the signal of it. Their functions of the heart phantom occur from the multidipole current source. This can play role the same in the real function of the human heart to study it. In the experimental results, the IMADF algorithm has reduced the computational complexity by use of only the addition operation without a multiplier. Also, under the condition of identical stationary-state error, it could obtain the stabled convergence characteristics that the IMADF algorithm is almost same as the sign algorithm, but is better than the MADF algorithm. Here, this algorithm has effective characteristics when the correlation of the input signal is highly.

Design and Implementation of Web Contents Management System based on RIA (RIA기반의 웹 콘텐츠 관리에 관한 설계 및 구현)

  • Seo, Jun-Oh;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1109-1114
    • /
    • 2015
  • In this paper, design and implementation of RIA(: Rich Internet Application) technology, a CMS based on either of the Adobe Flex framework. Flex existing HTML + CSS + Javascript, etc. it can be easily added to a variety of visual components on a markup language consisting allow you to implement a more dynamic website. The HTTP request is processed using the Spring Framework of MVC based. Spring Framework provides a number of services for the development of a dynamic website to open source framework for the Java platform. It is being used as a standard-based technology for e-government framework used to develop recommendations and Republic of Korea during the Web service public institutions. Extensive production becomes increasingly thin web can be more efficiently managed, and will provide convenience to the user.

Anonymity of Tor Users on Unsecured Applications (비 암호화 프로그램 사용자의 토르망 익명성 보장 분석)

  • Shin, Seok-Joo;Dahal, Saurav;Pudasaini, Amod;Kang, Moon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.805-816
    • /
    • 2017
  • Tor is a popular, low-latency open network that offers online anonymity to users by concealing their information from anyone conducting traffic analysis. At the same time, a number of conventional passive and active attacking schemes have been proposed to compromise the anonymity provided by the Tor network. In addition to attacks on the network through traffic analysis, interacting with an unsecured application can reveal a Tor user's IP address. Specific traffic from such applications bypasses Tor proxy settings in the user's machine and forms connections outside the Tor network. This paper presents such applications and shows how they can be used to deanonymize Tor users. Extensive test studies performed in the paper show that applications such as Flash and BitTorrent can reveal the IP addresses of Tor users.

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

A Study on the Dynamics of Police Motorcycle Simulator (경찰 오토바이 시뮬레이터의 동역학에 관한 연구)

  • Ahn, Dong-Hyuk;Cho, Sung-Hyun;Kim, Hee-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.533-542
    • /
    • 2020
  • In this study, we developed a PC - based motorcycle simulator based on the development technology of the virtual patrol motorcycle training system. In order to get the impression that the motorcycle simulator is operating in a realistic way, it is important to have a reliable signal transmission and operation feeling between the driver and the simulator. In order to achieve this, we developed a system that can apply the sub-systems of the actual vehicle to the motorcycle simulator in order to generate the same operation feeling as the actual vehicle. Based on these results, We have developed a method for generating a feedback queue. Vehicle dynamics simulates real-time vehicle motion by receiving input from a steering wheel, accelerating / decelerating pedal, etc. operated by a driver on a vehicle simulator and transmitting the result to a visual and acoustic system, It is the central element of the simulator to generate. I want to summarize the main requirements of simulation dynamics.