• Title/Summary/Keyword: Computer-networks

Search Result 5,262, Processing Time 0.029 seconds

A Design of the Vehicle Crisis Detection System(VCDS) based on vehicle internal and external data and deep learning (차량 내·외부 데이터 및 딥러닝 기반 차량 위기 감지 시스템 설계)

  • Son, Su-Rak;Jeong, Yi-Na
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.128-133
    • /
    • 2021
  • Currently, autonomous vehicle markets are commercializing a third-level autonomous vehicle, but there is a possibility that an accident may occur even during fully autonomous driving due to stability issues. In fact, autonomous vehicles have recorded 81 accidents. This is because, unlike level 3, autonomous vehicles after level 4 have to judge and respond to emergency situations by themselves. Therefore, this paper proposes a vehicle crisis detection system(VCDS) that collects and stores information outside the vehicle through CNN, and uses the stored information and vehicle sensor data to output the crisis situation of the vehicle as a number between 0 and 1. The VCDS consists of two modules. The vehicle external situation collection module collects surrounding vehicle and pedestrian data using a CNN-based neural network model. The vehicle crisis situation determination module detects a crisis situation in the vehicle by using the output of the vehicle external situation collection module and the vehicle internal sensor data. As a result of the experiment, the average operation time of VESCM was 55ms, R-CNN was 74ms, and CNN was 101ms. In particular, R-CNN shows similar computation time to VESCM when the number of pedestrians is small, but it takes more computation time than VESCM as the number of pedestrians increases. On average, VESCM had 25.68% faster computation time than R-CNN and 45.54% faster than CNN, and the accuracy of all three models did not decrease below 80% and showed high accuracy.

Integrated receptive field diversification method for improving speaker verification performance for variable-length utterances (가변 길이 입력 발성에서의 화자 인증 성능 향상을 위한 통합된 수용 영역 다양화 기법)

  • Shin, Hyun-seo;Kim, Ju-ho;Heo, Jungwoo;Shim, Hye-jin;Yu, Ha-Jin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.3
    • /
    • pp.319-325
    • /
    • 2022
  • The variation of utterance lengths is a representative factor that can degrade the performance of speaker verification systems. To handle this issue, previous studies had attempted to extract speaker features from various branches or to use convolution layers with different receptive fields. Combining the advantages of the previous two approaches for variable-length input, this paper proposes integrated receptive field diversification that extracts speaker features through more diverse receptive field. The proposed method processes the input features by convolutional layers with different receptive fields at multiple time-axis branches, and extracts speaker embedding by dynamically aggregating the processed features according to the lengths of input utterances. The deep neural networks in this study were trained on the VoxCeleb2 dataset and tested on the VoxCeleb1 evaluation dataset that divided into 1 s, 2 s, 5 s, and full-length. Experimental results demonstrated that the proposed method reduces the equal error rate by 19.7 % compared to the baseline.

Line Tracer Modeling for Educational Virtual Experiment (교육용 가상실험 라인 트레이서 모델링)

  • Ki, Jang-Geun;Kwon, Kee-Young
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.109-116
    • /
    • 2021
  • Traditionally, the engineering field has been dominated by face-to-face education focused on experimental practice, but demand for online learning has soared due to the rapid development of IT technology and Internet communication networks and recent changes in the social environment such as COVID-19. In order for efficient online education to be conducted in the engineering field, where the proportion of experimental practice is relatively high compared to other fields, virtual laboratory practice content that can replace actual experimental practice is very necessary. In this study, we developed a line tracer model and a virtual experimental software to simulate it for efficient online learning of microprocessor applications that are essential not only in the electric and electronic field but also in the overall engineering field where IT convergence takes place. In the developed line tracer model, the user can set various hardware parameter values in the desired form and write the software in assembly language or C language to test the operation on the computer. The developed line tracer virtual experimental software has been used in actual classes to verify its operation, and is expected to be an efficient virtual experimental practice tool in online non-face-to-face classes.

Low Power ADC Design for Mixed Signal Convolutional Neural Network Accelerator (혼성신호 컨볼루션 뉴럴 네트워크 가속기를 위한 저전력 ADC설계)

  • Lee, Jung Yeon;Asghar, Malik Summair;Arslan, Saad;Kim, HyungWon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1627-1634
    • /
    • 2021
  • This paper introduces a low-power compact ADC circuit for analog Convolutional filter for low-power neural network accelerator SOC. While convolutional neural network accelerators can speed up the learning and inference process, they have drawback of consuming excessive power and occupying large chip area due to large number of multiply-and-accumulate operators when implemented in complex digital circuits. To overcome these drawbacks, we implemented an analog convolutional filter that consists of an analog multiply-and-accumulate arithmetic circuit along with an ADC. This paper is focused on the design optimization of a low-power 8bit SAR ADC for the analog convolutional filter accelerator We demonstrate how to minimize the capacitor-array DAC, an important component of SAR ADC, which is three times smaller than the conventional circuit. The proposed ADC has been fabricated in CMOS 65nm process. It achieves an overall size of 1355.7㎛2, power consumption of 2.6㎼ at a frequency of 100MHz, SNDR of 44.19 dB, and ENOB of 7.04bit.

One-to-All and All-to-all Broadcasting Algorithms of Matrix Hypercube (매트릭스 하이퍼큐브의 일-대-다 방송과 다-대-다 방송 알고리즘)

  • Kim, Jongseok;Lee, Heongok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.8
    • /
    • pp.825-834
    • /
    • 2018
  • Broadcasting is a basic data communication method for interconnection networks. There are two types of broadcasting. One-to-all broadcasting is to transmit a message from one node to all other nodes and all-to-all broadcasting is to transmit a message from all the nodes that have messages to other nodes. And by the using way of the transmission port per unit time, there are two schemes of broadcasting. Single port telecommunication(SLA) is to transmit messages from one node that contains the messages to one adjacent node only and all port telecommunication(MLA) is to transmit messages from one node to all adjacent nodes within a time of unit. Matrix hypercube is that an interconnection network has improved network cost than that of hypercube with the same number of nodes. In this paper, we analyze broadcasting scheme of matirx hypercube. First, we propose one-to-all and all-to-all broadcasting algorithms of matrix hypercube. And we prove that one-to-all broadcasting times are 2n+1 and $2{\lceil}{\frac{n}{2}}{\rceil}+1$ based on the SLA and MLA models, respectively. Also, we show all-to-all broadcasting time using SLA model is $5{\times}2^{\frac{n}{2}}-2$ when n=even, and is $5{\times}2^{\frac{n-1}{2}}+2$ when n=odd.

Automated Story Generation with Image Captions and Recursiva Calls (이미지 캡션 및 재귀호출을 통한 스토리 생성 방법)

  • Isle Jeon;Dongha Jo;Mikyeong Moon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.1
    • /
    • pp.42-50
    • /
    • 2023
  • The development of technology has achieved digital innovation throughout the media industry, including production techniques and editing technologies, and has brought diversity in the form of consumer viewing through the OTT service and streaming era. The convergence of big data and deep learning networks automatically generated text in format such as news articles, novels, and scripts, but there were insufficient studies that reflected the author's intention and generated story with contextually smooth. In this paper, we describe the flow of pictures in the storyboard with image caption generation techniques, and the automatic generation of story-tailored scenarios through language models. Image caption using CNN and Attention Mechanism, we generate sentences describing pictures on the storyboard, and input the generated sentences into the artificial intelligence natural language processing model KoGPT-2 in order to automatically generate scenarios that meet the planning intention. Through this paper, the author's intention and story customized scenarios are created in large quantities to alleviate the pain of content creation, and artificial intelligence participates in the overall process of digital content production to activate media intelligence.

Network Coding Technologies for Wireless Bidirectional Asymmetric Relay (무선 양방향 비대칭 상호중계를 위한 네트워크 코딩 기법)

  • Bongseop Song;Sangpill Lee;Choong-Hee Lee;Inho Lee;In-Joong Nam
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.5
    • /
    • pp.1-9
    • /
    • 2024
  • With the emergence of various next-generation wireless networks, the traditional store and forward(SF) method at network nodes has faced limitations in efficiently utilizing network capacity. To overcome these limitations, various network coding techniques based on the decode and forward(DF) method have been proposed. However, these techniques have primarily focused on traffic environments with asymmetric packet lengths between relay nodes, limiting their applicability when different modulation and coding schemes(MCS) are applied to relay nodes. This paper proposes a relay network coding scheme that supports high frequency efficiency while simultaneously enabling bidirectional relaying using DF, considering asymmetric MCS traffic that reflects different transmission data and wireless channel conditions between individual nodes for efficient utilization of wireless network capacity. Additionally, this paper demonstrates the possibility of cooperative communication at the relay and examines the effect of increased communication distance. Subsequently, computer simulations are conducted to verify the performance gains of the proposed technique in terms of network coding for each source node with asymmetric information lengths. This proposed technique shows additional bit error rate(BER) performance gains by adopting an incremental redundancy(IR) scheme that follows network coding, even in mobile node environments where direct link transmission between source nodes is possible.

Development of Forest Road Network Model Using Digital Terrain Model (수치지형(數値地形)모델을 이용(利用)한 임도망(林道網) 배치(配置)모델의 개발(開發))

  • Lee, Jun Woo
    • Journal of Korean Society of Forest Science
    • /
    • v.81 no.4
    • /
    • pp.363-371
    • /
    • 1992
  • This study was aimed at developing a computer model to determine rational road networks in mountainous forests. The computer model is composed of two major subroutines for digital terrain analyses and route selection. The digital terrain model(DTM) provides various information on topographic and vegetative characteristics of forest stands. The DTM also evaluates the effectiveness of road construction based on slope gradients. Using the results of digital terrain analyses, the route selection subroutine, heuristically, determines the optimal road layout satisfying the predefined road densities. The route selection subroutine uses the area-partitioning method in order to fully of roads. This method leads to unbiased road layouts in forest areas. The size of the unit partitiones area can be calculated as a function of the predefined road density. In addition, the user-defined road density of the area-partitioning method provides flexibility in applying the model to real situations. The rational road network can be easily achived for varying road densities, which would be an essential element for network design of forest roads. The optimality conditions are evaluated in conjuction with longitudinal gradients, investment efficiency earthwork quantity or the mixed criteria of these three. The performance of the model was measured and, then, compared with those of conventional ones in terns of average skidding distance, accessibility of stands, development index and circulated road network index. The results of the performance analysis indicate that selection of roading routes for network design using the digital terrain analysis and the area-partitioning method improves performance of the network design medel.

  • PDF

Three Dimensional Measurements of Pore Morphological and Hydraulic Properties (토양 공극 형태와 수문학적 특성에 대한 3 차원적 측정)

  • Chun, Hyen-Chung;Gimenez, Daniel;Yoon, Sung-Won;Heck, Richard;Elliot, Tom;Ziska, Laise;Geaorge, Kate;Sonn, Yeon-Kyu;Ha, Sang-Keun
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.43 no.4
    • /
    • pp.415-423
    • /
    • 2010
  • Pore network models are useful tools to investigate soil pore geometry. These models provide quantitative information of pore geometry from 3D images. This study presents a pore network model to quantify pore structure and hydraulic characteristics. The objectives of this work were to apply the pore network model to characterize pore structure from large images to quantify pore structure, calculate water retention and hydraulic conductivity properties from a three dimensional soil image, and to combine measured hydraulic properties from experiments with calculated hydraulic properties from image. Soil samples were taken from a site located at the Baltimore science center, which is located inside of the city. Undisturbed columns were taken from the site and scanned with a computer tomographer at resolutions of 22 ${\mu}m$. Pore networks were extracted by medial-axis transformation and were used to measure pore geometry from one of the scanned samples. Water retention and unsaturated hydraulic conductivity values were calculated from the soil image. Properties of soil bulk density, water retention and unsaturated hydraulic conductivity were measured from three replicates of scanned soil samples. 3D image analysis provided accurate detailed pore properties such as individual pore volumes, pore length, and tortuosity of all pores. These data made possible to calculate accurate estimations of water retention and hydraulic conductivity. Combination of the calculated and measured hydraulic properties gave more accurate information on pore sizes over wider range than measured or calculated data alone. We could conclude that the hydraulic property computed from soil images and laboratory measurements can describe a full structure of intra- and inter-aggregate pores in soil.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.