• Title/Summary/Keyword: Deep-Learning

Search Result 5,447, Processing Time 0.033 seconds

Method for predicting the diagnosis of mastitis in cows using multivariate data and Recurrent Neural Network (다변량 데이터와 순환 신경망을 이용한 젖소의 유방염 진단예측 방법)

  • Park, Gicheol;Lee, Seonghun;Park, Jaehwa
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.75-82
    • /
    • 2021
  • Mastitis in cows is a major factor that hinders dairy productivity of farms, and many attempts have been made to solve it. However, research on mastitis has been limited to diagnosis rather than prediction, and even this is mostly using a single sensor. In this study, a predictive model was developed using multivariate data including biometric data and environmental data. The data used for the analysis were collected from robot milking machines and sensors installed in farmhouses in Chungcheongnam-do, South Korea. The recurrent neural network model using three weeks of data predicts whether or not mastitis is diagnosed the next day. As a result, mastitis was predicted with an accuracy of 82.9%. The superiority of the model was confirmed by comparing the performance of various data collection periods and various models.

Soil Moisture Prediction Based on Hyperspectral Image using CNN(Convolution Neural Network) (합성곱신경망을 이용한 초분광영상기반 토양수분예측)

  • Jeon, Nam-Youl;Lee, Bong-Kyu
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.75-81
    • /
    • 2021
  • Since plant growth is greatly influenced by moisture, it is important to control the soil to have optimal moisture for the plant being grown. Recently, researches on automatically analyzing plant growth information including soil moisture using spectral images are being conducted. However, hyperspectral images are difficult to use due to huge amount of data appearing in spectral bands. In this paper, we propose a method to solve the complexity of hyperspectral images using a CNN. Since the proposed method automatically analyzes the entire band of the target hyperspectral using deep learning, there is no need to make an effort to find a specific band for analysis of each image. In order to show the effectiveness of the proposed system, we conduct an experiment to analyze moistures using hyperspectral images obtained from soil.

Computerized bone age estimation system based on China-05 standard

  • Yin, Chuangao;Zhang, Miao;Wang, Chang;Lin, Huihui;Li, Gengwu;Zhu, Lichun;Fei, Weimin;Wang, Xiaoyu
    • Advances in nano research
    • /
    • v.12 no.2
    • /
    • pp.197-212
    • /
    • 2022
  • The purpose of this study is to develop an automatic software system for bone age evaluation and to evaluate its accuracy in testing and feasibility in clinical practice. 20394 left-hand radiographs of healthy children (2-18 years old) were collected from China Skeletal Development Survey data of 1998 and China Skeletal Development Survey data of 2005. Three experienced radiologists and China-05 standard maker jointly evaluate the stages of bone development and the reference bone age was determined by consensus. 1020 from 20394 radiographs were picked randomly as test set and the remaining 19374 radiographs as training set and validation set. Accuracy of the automatic software system for bone age assessment is evaluated in test set and two clinical test sets. Compared with the reference standard, the automatic software system based on RUS-CHN for bone age assessment has a 0.04 years old mean difference, ±0.40 years old in 95% confidence interval by single reading, a 85.6% percentage agreement of ratings, a 93.7% bone age accuracy rate, 0.17 years old of MAD, 0.29 years old of RMS; Compared with the reference standard, the automatic software system based on TW3-C RUS has a 0.04 years old mean difference, a ±0.38 years old in 95% confidence interval by single reading, a 90.9% percentage agreement of ratings, a 93.2% bone age accuracy rate, a 0.16 years of MAD, and a 0.28 years of RMS. Automatic software system, AI-China-05 showed reliably accuracy in bone age estimation and steady determination in different clinical test sets.

Towards Low Complexity Model for Audio Event Detection

  • Saleem, Muhammad;Shah, Syed Muhammad Shehram;Saba, Erum;Pirzada, Nasrullah;Ahmed, Masood
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.175-182
    • /
    • 2022
  • In our daily life, we come across different types of information, for example in the format of multimedia and text. We all need different types of information for our common routines as watching/reading the news, listening to the radio, and watching different types of videos. However, sometimes we could run into problems when a certain type of information is required. For example, someone is listening to the radio and wants to listen to jazz, and unfortunately, all the radio channels play pop music mixed with advertisements. The listener gets stuck with pop music and gives up searching for jazz. So, the above example can be solved with an automatic audio classification system. Deep Learning (DL) models could make human life easy by using audio classifications, but it is expensive and difficult to deploy such models at edge devices like nano BLE sense raspberry pi, because these models require huge computational power like graphics processing unit (G.P.U), to solve the problem, we proposed DL model. In our proposed work, we had gone for a low complexity model for Audio Event Detection (AED), we extracted Mel-spectrograms of dimension 128×431×1 from audio signals and applied normalization. A total of 3 data augmentation methods were applied as follows: frequency masking, time masking, and mixup. In addition, we designed Convolutional Neural Network (CNN) with spatial dropout, batch normalization, and separable 2D inspired by VGGnet [1]. In addition, we reduced the model size by using model quantization of float16 to the trained model. Experiments were conducted on the updated dataset provided by the Detection and Classification of Acoustic Events and Scenes (DCASE) 2020 challenge. We confirm that our model achieved a val_loss of 0.33 and an accuracy of 90.34% within the 132.50KB model size.

AIoT-based High-risk Industrial Safety Management System of Artificial Intelligence (AIoT 기반 고위험 산업안전관리시스템 인공지능 연구)

  • Yeo, Seong-koo;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1272-1278
    • /
    • 2022
  • The government enacted and promulgated the 'Severe Accident Punishment Act' in January 2021 and is implementing this law. However, the number of occupational accidents in 2021 increased by 10.7% compared to the same period of the previous year. Therefore, safety measures are urgently needed in the industrial field. In this study, BLE Mesh networking technology is applied for safety management of high-risk industrial sites with poor communication environment. The complex sensor AIoT device collects gas sensing values, voice and motion values in real time, analyzes the information values through artificial intelligence LSTM algorithm and CNN algorithm, and recognizes dangerous situations and transmits them to the server. The server monitors the transmitted risk information in real time so that immediate relief measures are taken. By applying the AIoT device and safety management system proposed in this study to high-risk industrial sites, it will minimize industrial accidents and contribute to the expansion of the social safety net.

Abnormality Detection Method of Factory Roof Fixation Bolt by Using AI

  • Kim, Su-Min;Sohn, Jung-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.33-40
    • /
    • 2022
  • In this paper, we propose a system that analyzes drone photographic images of panel-type factory roofs and conducts abnormal detection of bolts. Currently, inspectors directly climb onto the roof to carry out the inspection. However, safety accidents caused by working conditions at high places are continuously occurring, and new alternatives are needed. In response, the results of drone photography, which has recently emerged as an alternative to the dangerous environment inspection plan, will be easily inspected by finding the location of abnormal bolts using deep learning. The system proposed in this study proceeds with scanning the captured drone image using a sample image for the situation where the bolt cap is released. Furthermore, the scanned position is discriminated by using AI, and the presence/absence of the bolt abnormality is accurately discriminated. The AI used in this study showed 99% accuracy in test results based on VGGNet.

Price Prediction of Fractional Investment Products Using LSTM Algorithm: Focusing on Musicow (LSTM 모델을 이용한 조각투자 상품의 가격 예측: 뮤직카우를 중심으로)

  • Jung, Hyunjo;Lee, Jaehwan;Suh, Jihae
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.81-94
    • /
    • 2022
  • Real estate and artworks were considered challenging investment targets for individual investors because of their relatively high average transaction price despite their long investment history. Recently, the so-called fractional investment, generally known as investing in a share of the ownership right for real-life assets, etc., and most investors perceive that they actually own a piece (fraction) of the ownership right through their investments, is gaining popularity. Founded in 2016, Musicow started the first service that allows users to invest in copyright fees related to music distribution. Using the LSTM algorithm, one of the deep learning algorithms, this research predict the price of right to participate in copyright fees traded in Musicow. In addition to variables related to claims such as transfer price, transaction volume of claims, and copyright fees, comprehensive indicators indicating the market conditions for music copyright fees participation, exchange rates reflecting economic conditions, KTB interest rates, and Korea Composite Stock Index were also used as variables. As a result, it was confirmed that the LSTM algorithm accurately predicts the transaction price even in the case of fractional investment which has a relatively low transaction volume.

Intrusion Detection System Based on Sequential Model in SOME/IP (SOME/IP 에서의 시퀀셜 모델 기반 침입탐지 시스템)

  • Kang, Yeonjae;Pi, Daekwon;Kim, Haerin;Lee, Sangho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1171-1181
    • /
    • 2022
  • Front Collision-Avoidance Assist (FCA) or Smart Cruise Control (SCC) is installed in a modern vehicle, and the amount of data exchange between ECUs increases rapidly. Therefore, Automotive Ethernet, especially SOME/IP, which supports wide bandwidth and two-way communication, is widely adopted to overcome the bandwidth limitation of traditional CAN communication. SOME/IP is a standard protocol compatible with various automobile operating systems, and improves connectivity between components in the vehicle. However, no encryption or authentication process is defined in the SOME/IP protocol itself. Therefore, there is a need for a security study on the SOME/IP protocol. This paper proposes a deep learning-based intrusion detection system in SOME/IP and performs six attacks to confirm the performance of the intrusion detection system.

Query-Efficient Black-Box Adversarial Attack Methods on Face Recognition Model (얼굴 인식 모델에 대한 질의 효율적인 블랙박스 적대적 공격 방법)

  • Seo, Seong-gwan;Son, Baehoon;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1081-1090
    • /
    • 2022
  • The face recognition model is used for identity recognition of smartphones, providing convenience to many users. As a result, the security review of the DNN model is becoming important, with adversarial attacks present as a well-known vulnerability of the DNN model. Adversarial attacks have evolved to decision-based attack techniques that use only the recognition results of deep learning models to perform attacks. However, existing decision-based attack technique[14] have a problem that requires a large number of queries when generating adversarial examples. In particular, it takes a large number of queries to approximate the gradient. Therefore, in this paper, we propose a method of generating adversarial examples using orthogonal space sampling and dimensionality reduction sampling to avoid wasting queries that are consumed to approximate the gradient of existing decision-based attack technique[14]. Experiments show that our method can reduce the perturbation size of adversarial examples by about 2.4 compared to existing attack technique[14] and increase the attack success rate by 14% compared to existing attack technique[14]. Experimental results demonstrate that the adversarial example generation method proposed in this paper has superior attack performance.

Design and Implementation of High-Performance Cryptanalysis System Based on GPUDirect RDMA (GPUDirect RDMA 기반의 고성능 암호 분석 시스템 설계 및 구현)

  • Lee, Seokmin;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1127-1137
    • /
    • 2022
  • Cryptographic analysis and decryption technology utilizing the parallel operation of GPU has been studied in the direction of shortening the computation time of the password analysis system. These studies focus on optimizing the code to improve the speed of cryptographic analysis operations on a single GPU or simply increasing the number of GPUs to enhance parallel operations. However, using a large number of GPUs without optimization for data transmission causes longer data transmission latency than using a single GPU and increases the overall computation time of the cryptographic analysis system. In this paper, we investigate GPUDirect RDMA and related technologies for high-performance data processing in deep learning or HPC research fields in GPU clustering environments. In addition, we present a method of designing a high-performance cryptanalysis system using the relevant technologies. Furthermore, based on the suggested system topology, we present a method of implementing a cryptanalysis system using password cracking and GPU reduction. Finally, the performance evaluation results are presented according to demonstration of high-performance technology is applied to the implemented cryptanalysis system, and the expected effects of the proposed system design are shown.