• 제목/요약/키워드: Execution Detection

검색결과 205건 처리시간 0.023초

특이값 분해를 이용한 치수측정 기반 디지털 트윈 알고리즘 경량화 (Lightweight Algorithm for Digital Twin based on Diameter Measurement using Singular-Value-Decomposition)

  • 이승민;박대진
    • 대한임베디드공학회논문지
    • /
    • 제18권3호
    • /
    • pp.117-124
    • /
    • 2023
  • In the machine vision inspection equipment, diameter measurement is important process in inspection of cylindrical object. However, machine vision inspection equipment requires complex algorithm processing such as camera distortion correction and perspective distortion correction, and the increase in processing time and cost required for precise diameter measurement. In this paper, we proposed the algorithm for diameter measurement of cylindrical object using the laser displacement sensor. In order to fit circle for given four input outer points, grid search algorithms using root-mean-square error and mean-absolute error are applied and compared. To solve the limitations of the grid search algorithm, we finally apply the singular-value-decomposition based circle fitting algorithm. In order to compare the performance of the algorithms, we generated the pseudo data of the outer points of the cylindrical object and applied each algorithm. As a result of the experiment, the grid search using root-mean-square error confirmed stable measurement results, but it was confirmed that real-time processing was difficult as the execution time was 10.8059 second. The execution time of mean-absolute error algorithm was greatly improved as 0.3639 second, but there was no weight according to the distance, so the result of algorithm is abnormal. On the other hand, the singular-value-decomposition method was not affected by the grid and could not only obtain precise detection results, but also confirmed a very good execution time of 0.6 millisecond.

Toward High Utilization of Heterogeneous Computing Resources in SNP Detection

  • Lim, Myungeun;Kim, Minho;Jung, Ho-Youl;Kim, Dae-Hee;Choi, Jae-Hun;Choi, Wan;Lee, Kyu-Chul
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.212-221
    • /
    • 2015
  • As the amount of re-sequencing genome data grows, minimizing the execution time of an analysis is required. For this purpose, recent computing systems have been adopting both high-performance coprocessors and host processors. However, there are few applications that efficiently utilize these heterogeneous computing resources. This problem equally refers to the work of single nucleotide polymorphism (SNP) detection, which is one of the bottlenecks in genome data processing. In this paper, we propose a method for speeding up an SNP detection by enhancing the utilization of heterogeneous computing resources often used in recent high-performance computing systems. Through the measurement of workload in the detection procedure, we divide the SNP detection into several task groups suitable for each computing resource. These task groups are scheduled using a window overlapping method. As a result, we improved upon the speedup achieved by previous open source applications by a magnitude of 10.

비디오 모니터링 환경에서 정확한 돼지 탐지 (Accurate Pig Detection for Video Monitoring Environment)

  • 안한세;손승욱;유승현;서유일;손준형;이세준;정용화;박대희
    • 한국멀티미디어학회논문지
    • /
    • 제24권7호
    • /
    • pp.890-902
    • /
    • 2021
  • Although the object detection accuracy with still images has been significantly improved with the advance of deep learning techniques, the object detection problem with video data remains as a challenging problem due to the real-time requirement and accuracy drop with occlusion. In this research, we propose a method in pig detection for video monitoring environment. First, we determine a motion, from a video data obtained from a tilted-down-view camera, based on the average size of each pig at each location with the training data, and extract key frames based on the motion information. For each key frame, we then apply YOLO, which is known to have a superior trade-off between accuracy and execution speed among many deep learning-based object detectors, in order to get pig's bounding boxes. Finally, we merge the bounding boxes between consecutive key frames in order to reduce false positive and negative cases. Based on the experiment results with a video data set obtained from a pig farm, we confirmed that the pigs could be detected with an accuracy of 97% at a processing speed of 37fps.

스마트 단말에서의 이벤트 기반 스트리밍 콘텐츠 재생 시점 탐지 방법 (Streaming Contents Execution Point Analysis using Activated Events on Smart Devices)

  • 나승재;서창욱;김민철;이형우;정치윤;한승완
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2015년도 제51차 동계학술대회논문집 23권1호
    • /
    • pp.61-64
    • /
    • 2015
  • 최근 청소년들의 스마트 단말 사용이 급격히 증가하면서, 스마트 단말을 통하여 유해 콘텐츠에 접근하는 비중이 점점 더 늘어나고 있다. 이에 본 논문에서는 스마트 단말에서 스트리밍 콘텐츠가 실행되는 메커니즘을 분석하고, 이를 기반으로 실행 이벤트의 연관성을 분석하여 스트리밍 콘텐츠가 재생되는 시점을 자동으로 탐지할 수 있는 방법을 제안하였다. 제안된 방법을 사용하면 스마트 단말에서 스트리밍 유해 콘텐츠를 효과적으로 차단 할 수 있을 것으로 기대된다.

  • PDF

PXI모듈을 이용한 랩뷰 기반 시간-주파수 영역 반사파 실시간 계측 시스템 구현 (Implementation of a Labview Based Time-Frequency Domain Reflectometry Real Time System using the PXI Modules)

  • 박태근;곽기석;박진배;윤태성
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.336-338
    • /
    • 2006
  • One of the important topics concerning the safety of electrical and electronic system is the reliability of the wiring system. The Time-Frequency Domain Reflectometry(TFDR) is a state-of-the-art system for detection and estimation of the fault on a wiring/cable. The purpose of this paper is to implement a Labview based TFDR Real Time system though the instruments of PCI extensions for Instrumentation(PXI). The TFDR Real Time system consists of the five parts: Reference signal design, signal generation, signal acquisition, algorithm execution, results diplay part. In the signal generation and acquisition parts we adopt the Arbitrary Waveform Generator(AWG) and Digital Storage Oscilloscope(DSO) PXI modules which offer commonality, compatibility and easy integration at low cost. And execution of the PXI modules not only is controlled by the Labview programing but also the total system process is executed by the Labview application software.

  • PDF

Current landscape and future perspective of sentinel node mapping in endometrial cancer

  • Bogani, Giorgio;Raspagliesi, Francesco;Maggiore, Umberto Leone Roberti;Mariani, Andrea
    • Journal of Gynecologic Oncology
    • /
    • 제29권6호
    • /
    • pp.94.1-94.10
    • /
    • 2018
  • Endometrial cancer (EC) represents the most common gynecological neoplasm in developed countries. Surgery is the mainstay of treatment for EC. Although EC is characterized by a high prevalence several features regarding its management are still unclear. In particular the execution of lymphadenectomy is controversial. The recent introduction of sentinel node mapping represents the mid-way between the execution and omission of node dissection in EC patients. In the present review we discuss the emerging role of sentinel node mapping in EC. In addition, we discussed how type of tracers utilized and site of injection impacted on sentinel node detection rates. Future perspective regarding EC management are also discussed.

기호 실행에서의 인공 지능 적용에 대한 연구: 퍼징과 취약점 탐지에서의 활용 (A Study on the Application of Artificial Intelligence in Symbolic Execution: Usage in fuzzing and vulnerability detection)

  • 하회리;안선우;김현준;백윤흥
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2020년도 춘계학술발표대회
    • /
    • pp.582-584
    • /
    • 2020
  • 기호 실행 (symbolic execution)은 프로그램을 특정 상태로 구동하는 입력 값을 찾는 코드 분석기법이다. 이를 사용하면 자동화 소프트웨어 테스트 기법인 퍼징 (fuzzing)을 훨씬 효율적으로 사용하여 더 많은 보안 취약점을 찾을 수 있지만, 기호 실행의 한계점으로 인하여 쉽게 적용할 수 없었다. 이를 해결하기 위해 인공 지능을 활용한 방법을 소개하겠다.

텍스트 마이닝 기법을 이용한 컴퓨터 네트워크의 침입 탐지 (Using Text Mining Techniques for Intrusion Detection Problem in Computer Network)

  • 오승준;원민관
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권5호
    • /
    • pp.27-32
    • /
    • 2005
  • 최근 들어 데이터 마이닝 기법을 컴퓨터 네트워크의 침입 탐지에 적용하려는 많은 연구가 진행되고 있다. 본 논문에서는 침입 탐지 분야에서 프로그램 행위가 정상적인지 비정상적인지를 분류하기 위한 방법을 연구한다. 이를 위해, 택스트 마이닝 기법중의 하나인 k 최근접 이웃 (kNN) 분류기를 이용한 새로운 방법을 제안한다. 본 논문에서는 택스트 분류 기법을 적용하기 위해 각각의 시스템 호출을 단어로 간주하고, 시스템 호출의 집합들을 문서로 간주한다. 이러한 문서들은 kNN 분류기를 이용하여 분류된다. 간단한 예제를 통하여 제안하는 절차를 소개한다.

  • PDF

Frameworks for NHPP Software Reliability Growth Models

  • Park, J.Y.;Park, J.H.;Fujiwara, T.
    • International Journal of Reliability and Applications
    • /
    • 제7권2호
    • /
    • pp.155-166
    • /
    • 2006
  • Many software reliability growth models (SRGMs) based on nonhomogeneous Poisson process (NHPP) have been developed and applied in practice. NHPP SRGMs are characterized by their mean value functions. Mean value functions are usually derived from differential equations representing the fault detection/removal process during testing. In this paper such differential equations are regarded as frameworks for generating mean value functions. Currently available frameworks are theoretically discussed with respect to capability of representing the fault detection/removal process. Then two general frameworks are proposed.

  • PDF

Disapproval Judgment System of Research Fund Execution Details Based on Artificial Intelligence

  • Kim, Yongkuk;Juan, Tan;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • 제19권3호
    • /
    • pp.142-147
    • /
    • 2021
  • In this paper, we propose an intelligent research fund management system that applies artificial intelligence technology to an integrated research fund management system. By defining research fund management rules as work rules, a detection model learned using deep learning is designed, through which the disapproval status is presented for each research fund usage history. The disapproval detection system of the RCMS implemented in this study predicts whether the newly registered usage details are recognized or disapproved using an artificial intelligence model designed based on the use of an 8.87 million research fund registered in the RCMS. In addition, the item-detail recommendation system described herein presents the usage details according to the usage history item newly registered by the artificial intelligence model through a correlation between the research cost usage details and the item itself. The accuracy of the recommendation was shown to be 97.21%.