• Title/Summary/Keyword: Convergence techniques

Search Result 1,679, Processing Time 0.03 seconds

Accuracy Improvement of Pig Detection using Image Processing and Deep Learning Techniques on an Embedded Board (임베디드 보드에서 영상 처리 및 딥러닝 기법을 혼용한 돼지 탐지 정확도 개선)

  • Yu, Seunghyun;Son, Seungwook;Ahn, Hanse;Lee, Sejun;Baek, Hwapyeong;Chung, Yongwha;Park, Daihee
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.4
    • /
    • pp.583-599
    • /
    • 2022
  • Although the object detection accuracy with a single image has been significantly improved with the advance of deep learning techniques, the detection accuracy for pig monitoring is challenged by occlusion problems due to a complex structure of a pig room such as food facility. These detection difficulties with a single image can be mitigated by using a video data. In this research, we propose a method in pig detection for video monitoring environment with a static camera. That is, by using both image processing and deep learning techniques, we can recognize a complex structure of a pig room and this information of the pig room can be utilized for improving the detection accuracy of pigs in the monitored pig room. Furthermore, we reduce the execution time overhead by applying a pruning technique for real-time video monitoring on an embedded board. Based on the experiment results with a video data set obtained from a commercial pig farm, we confirmed that the pigs could be detected more accurately in real-time, even on an embedded board.

Noise Removal using a Convergence of the posteriori probability of the Bayesian techniques vocabulary recognition model to solve the problems of the prior probability based on HMM (HMM을 기반으로 한 사전 확률의 문제점을 해결하기 위해 베이시안 기법 어휘 인식 모델에의 사후 확률을 융합한 잡음 제거)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.295-300
    • /
    • 2015
  • In vocabulary recognition using an HMM model which models the prior distribution for the observation of a discrete probability distribution indicates the advantages of low computational complexity, but relatively low recognition rate. The Bayesian techniques to improve vocabulary recognition model, it is proposed using a convergence of two methods to improve recognition noise-canceling recognition. In this paper, using a convergence of the prior probability method and techniques of Bayesian posterior probability based on HMM remove noise and improves the recognition rate. The result of applying the proposed method, the recognition rate of 97.9% in vocabulary recognition, respectively.

The Performance Analysis of Digital Watermarking based on Merging Techniques

  • Ariunzaya, Batgerel;Chu, Hyung-Suk;An, Chong-Koo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.3
    • /
    • pp.176-180
    • /
    • 2011
  • Even though algorithms for watermark embedding and extraction step are important issue for digital watermarking, watermark selection and post-processing can give us an opportunity to improve our algorithms and achieve higher performance. For this reason, we summarized the possibilities of improvements for digital watermarking by referring to the watermark merging techniques rather than embedding and extraction algorithms in this paper. We chose Cox's function as main embedding and extraction algorithm, and multiple barcode watermarks as a watermark. Each bit of the multiple copies of barcode watermark was embedded into a gray-scale image with Cox's embedding function. After extracting the numbers of watermark, we applied the watermark merging techniques; including the simple merging, N-step iterated merging, recover merging and combination of iterated-recover merging. Main consequence of our paper was the fact of finding out how multiple barcode watermarks and merging techniques can give us opportunities to improve the performance of algorithm.

Implementation of a Recommendation system using the advanced deep reinforcement learning method (고급 심층 강화학습 기법을 이용한 추천 시스템 구현)

  • Sony Peng;Sophort Siet;Sadriddinov Ilkhomjon;DaeYoung, Kim;Doo-Soon Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.406-409
    • /
    • 2023
  • With the explosion of information, recommendation algorithms are becoming increasingly important in providing people with appropriate content, enhancing their online experience. In this paper, we propose a recommender system using advanced deep reinforcement learning(DRL) techniques. This method is more adaptive and integrative than traditional methods. We selected the MovieLens dataset and employed the precision metric to assess the effectiveness of our algorithm. The result of our implementation outperforms other baseline techniques, delivering better results for Top-N item recommendations.

A Study on Beauty Illustration-Converged Design Based on Watercolor Techniques -Centering on Generation of Art Makeup Design- (수채화 기법을 활용한 뷰티 일러스트레이션 융합 디자인 -아트메이크업 디자인 작품 제작을 중심으로-)

  • Park, Li-La
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.283-289
    • /
    • 2017
  • This study aims to create artworks where characteristics of paintings appear by converging beauty illustration that conducts proactive activities in an area of arts with watercolor techniques. It carries academic significance in that it delves into convergence design that reflects creative expression by putting the spotlight on diversified expressive methods of beauty illustraion through watercolor techniques. As for a method of the study, preceding studies and technical books were examined, and a total of four beauty illustration artworks were created centering on art makeup design by classifying watercolor techniques into gradient technique and overlap lining technique. First of all, the result made it possible for watercolor techniques to explore unlimited possibilities at a time of suggesting another expressive method of beauty illustration. Second, it was possible to express unique art makeup design through clear and candid characteristics inherent in watercolor paintings. In this regard, the study enhanced accessibility by departing from limited expression methods applied to beauty illustration to induce a wider range of artworks. It is hoped that beauty illustration can be specialized to achieve an independent artistic domain equipped with diversity and professionalism.

A Study on An Enhancement Scheme of Privacy and Anonymity through Convergence of Security Mechanisms in Blockchain Environments (블록체인 환경에서 보안 기법들의 융합을 통한 프라이버시 및 익명성 강화 기법에 대한 연구)

  • Kang, Yong-Hyeog
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.75-81
    • /
    • 2018
  • Anonymity and privacy issues are becoming important as all transactions in the blockchain are open to users. Public blockchains appear to guarantee anonymity by using public-key addresses on behalf of users, but they can weaken anonymity by tracking with various analytic techniques based on transaction graph. In this paper, we propose a scheme to protect anonymity and privacy by converging various security techniques such as k-anonymity, mixing, blind signature, multi-phase processing, random selection, and zero-knowledge proof techniques with incentive mechanism and contributor participation. Through performance analysis, our proposed scheme shows that it is difficult to invade privacy and anonymity through collusion attacks if the number of contributors is larger than that of conspirators.

A Novel on Auto Imputation and Analysis Prediction Model of Data Missing Scope based on Machine Learning (머신러닝기반의 데이터 결측 구간의 자동 보정 및 분석 예측 모델에 대한 연구)

  • Jung, Se-Hoon;Lee, Han-Sung;Kim, Jun-Yeong;Sim, Chun-Bo
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.257-268
    • /
    • 2022
  • When there is a missing value in the raw data, if ignore the missing values and proceed with the analysis, the accuracy decrease due to the decrease in the number of sample. The method of imputation and analyzing patterns and significant values can compensate for the problem of lower analysis quality and analysis accuracy as a result of bias rather than simply removing missing values. In this study, we proposed to study irregular data patterns and missing processing methods of data using machine learning techniques for the study of correction of missing values. we would like to propose a plan to replace the missing with data from a similar past point in time by finding the situation at the time when the missing data occurred. Unlike previous studies, data correction techniques present new algorithms using DNN and KNN-MLE techniques. As a result of the performance evaluation, the ANAE measurement value compared to the existing missing section correction algorithm confirmed a performance improvement of about 0.041 to 0.321.

A Survey on system-based provenance graph and analysis trends (시스템 기반 프로비넌스 그래프와 분석 기술 동향)

  • Park Chanil
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.87-99
    • /
    • 2022
  • Cyber attacks have become more difficult to detect and track as sophisticated and advanced APT attacks increase. System providence graphs provide analysts of cyber security with techniques to determine the origin of attacks. Various system provenance graph techniques have been studied to reveal the origin of penetration against cyber attacks. In this study, we investigated various system provenance graph techniques and described about data collection and analysis techniques. In addition, based on the results of our survey, we presented some future research directions.

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation

  • Kang, Ki-Wan;Seo, Jung Taek;Baek, Sung Hoon;Kim, Chul Woo;Park, Ki-Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1063-1075
    • /
    • 2022
  • In recent years, container techniques have been broadly applied to cloud computing systems to maximize their efficiency, flexibility, and economic feasibility. Concurrently, studies have also been conducted to ensure the security of cloud computing. Among these studies, moving-target defense techniques using the high agility and flexibility of cloud-computing systems are gaining attention. Moving-target defense (MTD) is a technique that prevents various security threats in advance by proactively changing the main attributes of the protected target to confuse the attacker. However, an analysis of existing MTD techniques revealed that, although they are capable of deceiving attackers, MTD techniques have practical limitations when applied to an actual cloud-computing system. These limitations include resource wastage, management complexity caused by additional function implementation and system introduction, and a potential increase in attack complexity. Accordingly, this paper proposes a software-defined MTD system that can flexibly apply and manage existing and future MTD techniques. The proposed software-defined MTD system is designed to correctly define a valid mutation range and cycle for each moving-target technique and monitor system-resource status in a software-defined manner. Consequently, the proposed method can flexibly reflect the requirements of each MTD technique without any additional hardware by using a software-defined approach. Moreover, the increased attack complexity can be resolved by applying multiple MTD techniques.

Convergence Process for the Removal of Heavy Metals in the Abandoned Mine (휴폐광산의 중금속제어를 위한 융합공정 개발)

  • Dho, Hyonseung
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.155-160
    • /
    • 2016
  • The convergence process utilized both leaching and ion exchange techniques has been investigated for the heavy metals removal in the abandoned mine of Chungyang Province, Korea. The contaminated soil samples by heavy metals from Samkwang mine were analysed by statistical analyses. The highly contaminated soils was initially separated by the flotation process. The selectivity indices were increased with increasing flotation reagents. The selectivity of separation was then improved by the use of both leaching and ion exchange processes in order to extract the heavy metals. The results of this study showed that the higher the sulfuric acid concentration, the leaching rate of heavy metals was increased. The lecheate then was removed by the ion exchange method. The anticipating results might imply that convergence process utilized both leaching and ion exchange techniques would somehow apply for the removal of heavy metals in the abandoned mine.