• Title/Summary/Keyword: Environment reconstruction

Search Result 391, Processing Time 0.028 seconds

Deep Learning: High-quality Imaging through Multicore Fiber

  • Wu, Liqing;Zhao, Jun;Zhang, Minghai;Zhang, Yanzhu;Wang, Xiaoyan;Chen, Ziyang;Pu, Jixiong
    • Current Optics and Photonics
    • /
    • v.4 no.4
    • /
    • pp.286-292
    • /
    • 2020
  • Imaging through multicore fiber (MCF) is of great significance in the biomedical domain. Although several techniques have been developed to image an object from a signal passing through MCF, these methods are strongly dependent on the surroundings, such as vibration and the temperature fluctuation of the fiber's environment. In this paper, we apply a new, strong technique called deep learning to reconstruct the phase image through a MCF in which each core is multimode. To evaluate the network, we employ the binary cross-entropy as the loss function of a convolutional neural network (CNN) with improved U-net structure. The high-quality reconstruction of input objects upon spatial light modulation (SLM) can be realized from the speckle patterns of intensity that contain the information about the objects. Moreover, we study the effect of MCF length on image recovery. It is shown that the shorter the fiber, the better the imaging quality. Based on our findings, MCF may have applications in fields such as endoscopic imaging and optical communication.

Source Enumeration Method using Eigenvalue Gap Ratio and Performance Comparison in Rayleigh Fading (Eigenvalue Gap의 Ratio를 이용한 신호 개수 추정 방법 및 Rayleigh Fading 환경에서의 신호 개수 추정 성능 비교)

  • Kim, Taeyoung;Lee, Yunseong;Park, Chanhong;Choi, Yeongyoon;Kim, Kiseon;Lee, Dongkeun;Lee, Myung-Sik;Kang, Hyunjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.492-502
    • /
    • 2021
  • In electronic warfare, source enumeration and direction-of-arrival estimation are important. The source enumeration method based on eigenvalues of covariance matrix from received is one of the most used methods. However, there are some drawbacks such as accuracy less than 100 % at high SNR, poor performance at low SNR and reduction of maximum number of estimating sources. We suggested new method based on eigenvalues gaps, which is named AREG(Accumulated Ratio of Eigenvalues Gaps). Meanwhile, FGML(Fast Gridless Maximum Likelihood) which reconstructs the covariance matrix was suggested by Wu et al., and it improves performance of the existing source enumeration methods without modification of algorithms. In this paper, first, we combine AREG with FGML to improve the performance. Second, we compare the performance of source enumeration and direction-of-arrival estimation methods in Rayleigh fading. Third, we suggest new method named REG(Ratio of Eigenvalues Gaps) to reduce performance degradation in Rayleigh Fading environment of AREG.

A Study on Dynamic Code Analysis Method using 2nd Generation PT(Processor Trace) (2세대 PT(Processor Trace)를 이용한 동적 코드분석 방법 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.97-101
    • /
    • 2019
  • If the operating system's core file contains an Intel PT, the debugger can not only check the program state at the time of the crash, but can also reconfigure the control flow that caused the crash. We can also extend the execution trace scope to the entire system to debug kernel panics and other system hangs. The second-generation PT, the WinIPT library, includes an Intel PT driver with additional code to run process and core-specific traces through the IOCTL and registry mechanisms provided by Windows 10 (RS5). In other words, the PT trace information, which was limited access only by the first generation PT, can be executed by process and core by the IOCTL and registry mechanism provided by the operating system in the second generation PT. In this paper, we compare and describe methods for collecting, storing, decoding and detecting malicious codes of data packets in a window environment using 1/2 generation PT.

An Economic Evaluation Study of Office Remodeling and Green-remodeling Projects : A Simulation Approach to a Rental Office in GBD, Seoul (생애주기를 고려한 오피스 건물의 리모델링과 그린리모델링의 경제성 평가 연구 : 서울시 강남업무지구의 임대오피스 사례)

  • Lee, Seong-Ho;Lee, Jae-Su
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.3
    • /
    • pp.23-34
    • /
    • 2018
  • Due to a waste of energy in korea, about 525,000 which are 75 percent of total buildings are at least 15 years old buildings that need remodeling. There are two current remodeling systems. One is a remodeling system to reduce a waste of resources from the reconstruction. The other is a green-remodeling system aimed to energy savings and reducing environmental costs. This study is to analyze quantitatively these current systems with respect to the cost-benefit caused by the life cycle and suggests the political and institutional implications through the interpretation of the results. For a quantitative analysis, we analyzed reducing maintenance costs and rent benefits with simulation by using opportunity costs, construction costs, plan costs and supervision costs as expense variables and using the reduced floor area ratio, institutional incentives, energy, water resources and certified emission reduction(CER) as benefit variables. As a result of the empirical study, the green-modeling was more beneficial in the field of environment such as the energy savings, however, the final benefits of remodeling which has no green building certification costs but more floor area ratio incentives were more economical. The green-remodeling system focused on reducing environmental costs and energy savings needs a equatable institutional incentive system.

Evaluation of artifacts around the breast expander according to magnetic field strength (자장의 세기에 따른 유방 확장기 주위의 인공물 평가)

  • Jung, Dong- Il;Kim, Jae-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1144-1149
    • /
    • 2020
  • The magnetic valve of the breast tissue expander generates imaging artifacts during MRI examination, so MRI examination is limited. To evaluate the effect of imaging artifacts on the diagnosis area for patients with breast tissue expander who need MRI examination. Imaging artifacts were measured using self-made phantoms and actual clinical conditions. Imaging artifacts were measured differently depending on the environment of 1.5 Tesla and 3.0 Tesla, and the effects of imaging artifacts were less in the C-spine and L-spine tests. If MRI due to breast cancer metastasis is absolutely necessary, head & neck examination and L-spine can be examined mainly at 1.5 Tesla, but some sequences may cause distortion due to image artifacts. In terms of safety, MRI scans of patients with breast tissue expanders can be performed conditionally at 1.5T, avoiding 3.0T.

A Method for Tree Image Segmentation Combined Adaptive Mean Shifting with Image Abstraction

  • Yang, Ting-ting;Zhou, Su-yin;Xu, Ai-jun;Yin, Jian-xin
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1424-1436
    • /
    • 2020
  • Although huge progress has been made in current image segmentation work, there are still no efficient segmentation strategies for tree image which is taken from natural environment and contains complex background. To improve those problems, we propose a method for tree image segmentation combining adaptive mean shifting with image abstraction. Our approach perform better than others because it focuses mainly on the background of image and characteristics of the tree itself. First, we abstract the original tree image using bilateral filtering and image pyramid from multiple perspectives, which can reduce the influence of the background and tree canopy gaps on clustering. Spatial location and gray scale features are obtained by step detection and the insertion rule method, respectively. Bandwidths calculated by spatial location and gray scale features are then used to determine the size of the Gaussian kernel function and in the mean shift clustering. Furthermore, the flood fill method is employed to fill the results of clustering and highlight the region of interest. To prove the effectiveness of tree image abstractions on image clustering, we compared different abstraction levels and achieved the optimal clustering results. For our algorithm, the average segmentation accuracy (SA), over-segmentation rate (OR), and under-segmentation rate (UR) of the crown are 91.21%, 3.54%, and 9.85%, respectively. The average values of the trunk are 92.78%, 8.16%, and 7.93%, respectively. Comparing the results of our method experimentally with other popular tree image segmentation methods, our segmentation method get rid of human interaction and shows higher SA. Meanwhile, this work shows a promising application prospect on visual reconstruction and factors measurement of tree.

The complete mitochondrial genome of the blue-tailed damselfly Ischnura elegans (Odonata: Coenagrionidae)-a climate-sensitive indicator species in South Korea

  • Seung Hyun Lee;Jeong Sun Park;Jee-Young Pyo;Sung-Soo Kim;Iksoo Kim
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.46 no.2
    • /
    • pp.41-54
    • /
    • 2023
  • The blue-tailed damselfly, Ischnura elegans Van der Linden, 1820 (Odonata: Coenagrionidae), is a climate-sensitive indicator species in South Korea. In this study, we sequenced the complete mitochondrial genome (mitogenome) of I. elegans collected from South Korea for subsequent population genetic analysis, particularly to trace population movements in response to climate change. The 15,963 base pair (bp)-long complete mitogenome of I. elegans has typical sets of genes including a major non-coding region (the A+T-rich region), and an arrangement identical to that observed in ancestral insect species. The ATP6, ND3 and ND1 genes have the TTG start codon, which, although rare, is the canonical start codon for animal mitochondrial tRNA. The A/T content was 71.4% in protein-coding genes, 72.1% in tRNAs, 72.9% in the whole genome, 74.7% in srRNA, 75.3% in lrRNA, and 83.8% in the A+T-rich region. The A+T-rich region is unusually long (1,196 bp) and contains two subunits (192 bp and 176-165 bp), each of which is tandemly triplicated and surrounded by non-repeat sequences. Comparison of the sequence divergence among available mitogenomes of I. elegans, including the one from the current study, revealed ND2 as the most variable gene, followed by COII and COI, suggesting that ND2 should be targeted first in subsequent population-level studies. Phylogenetic reconstruction based on all available mitogenome sequences of Coenagrionidae showed a strong sister relationship between I. elegans and I. senegalensis.

Effective Ray-tracing based Rendering Methods for Point Cloud Data in Mobile Environments (모바일 환경에서 점 구름 데이터에 대한 효과적인 광선 추적 기반 렌더링 기법)

  • Woong Seo;Youngwook Kim;Kiseo Park;Yerin Kim;Insung Ihm
    • Journal of the Korea Computer Graphics Society
    • /
    • v.29 no.3
    • /
    • pp.93-103
    • /
    • 2023
  • The problem of reconstructing three-dimensional models of people and objects from color and depth images captured by low-cost RGB-D cameras has long been an active research area in computer graphics. Color and depth images captured by low-cost RGB-D cameras are represented as point clouds in three-dimensional space, which correspond to discrete values in a continuous three-dimensional space and require additional surface reconstruction compared to rendering using polygonal models. In this paper, we propose an effective ray-tracing based technique for visualizing point clouds rather than polygonal models. In particular, our method shows the possibility of an effective rendering method even in mobile environment which has limited performance due to processor heat and lack of battery.

Abnormal Flight Detection Technique of UAV based on U-Net (U-Net을 이용한 무인항공기 비정상 비행 탐지 기법 연구)

  • Myeong Jae Song;Eun Ju Choi;Byoung Soo Kim;Yong Ho Moon
    • Journal of Aerospace System Engineering
    • /
    • v.18 no.3
    • /
    • pp.41-47
    • /
    • 2024
  • Recently, as the practical application and commercialization of unmanned aerial vehicles (UAVs) is pursued, interest in ensuring the safety of the UAV is increasing. Because UAV accidents can result in property damage and loss of life, it is important to develop technology to prevent accidents. For this reason, a technique to detect the abnormal flight state of UAVs has been developed based on the AutoEncoder model. However, the existing detection technique is limited in terms of performance and real-time processing. In this paper, we propose a U-Net based abnormal flight detection technique. In the proposed technique, abnormal flight is detected based on the increasing rate of Mahalanobis distance for the reconstruction error obtained from the U-Net model. Through simulation experiments, it can be shown that the proposed detection technique has superior detection performance compared to the existing detection technique, and can operate in real-time in an on-board environment.

Examination of NATO's Strategic Changes After the Russia-Ukraine War and Korea's Security Strategic Implications (러-우 전쟁 이후 NATO의 전략 변화와 한국의 안보전략적 함의 고찰)

  • Kim Hyun Jin;Bae Il Soo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.25-29
    • /
    • 2024
  • After the Russia-Ukraine War, NATO broke away from the peacekeeping strategy that it had maintained and declared that it would strengthen the multilateral security consultative body, pursue strategic stability, expand armaments, cooperate security, and strengthen dialogue and cooperation in the Indo-Pacific region. Changes in NATO's strategy directly and indirectly affect Korea's security environment. Only by clearly analyzing this and establishing policies and strategies to respond to it can the threat be suppressed and national interests protected. NATO designates China and Russia as threats. By using cooperation and solidarity with NATO as an opportunity, we will be able to strengthen security cooperation and alliances, develop and expand the defense industry market, and expand opportunities to participate in the Ukraine reconstruction project.