• Title/Summary/Keyword: Preprocessing method

Search Result 1,076, Processing Time 0.036 seconds

The preprocessing effect using K-means clustering and merging algorithms in cardiac left ventricle segmentation

  • Cho, Ik-Hwan;Do, Ki-Bum;Oh, Jung-Su;Song, In-Chan;Chang, Kee-Hyun;Jeong, Dong-Seok
    • Proceedings of the KSMRM Conference
    • /
    • 2002.11a
    • /
    • pp.126-126
    • /
    • 2002
  • Purpose: For quantitative analysis of the cardiac diseases, it is necessary to segment the left-ventricle(LV) in MR cardiac images. Snake or active contour model has been used to segment LV boundary. In using these models, however, the contour of the LV may not converge to the desirable one because the contour may fall into local minimum value due to image artifact in inner region of the LV Therefore, in this paper, we propose the new preprocessing method using K-means clustering and merging algorithms that can improve the performance of the active contour model.

  • PDF

Crack Detection on Concrete Bridge by Image Processing Technique (영상처리 기법을 이용한 콘크리트 교량의 균열 검출)

  • Kim, Hyung-Jin;Lee, Jeong-Ho;Moon, Young-Shik
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.381-382
    • /
    • 2007
  • In this paper, crack detection technique of concrete bridge is proposed robust against shadow and noise. Our technique consists of two steps. In the first step, crack candidate region is detected by preprocessing. Preprocessing techniques such as median filter, isolated point filter and morphological techniques, use utilized for detection of crack candidate regions. In the final step, crack is detected from crack candidate region by considering any connectivity between cracks. By experimental results, performance is improved 6.8% over the existing method.

  • PDF

Estimating Directly Damage on External Surface of Container from Parameters of Capsize-Gaussian-Function

  • Son TRAN Ngoc Hoang;KIM Hwan-Seong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2005.10a
    • /
    • pp.297-302
    • /
    • 2005
  • In this paper, an estimating damage on external surface of container using Capsize-Gaussian-Function (be called CGF) is presented. The estimation of the damage size can be get directly from two parameters of CGF, these are the depth and the flexure, also the direction of damage. The performance of the present method has been illustrated using an image of damage container, which had been taken from Hanjin Busan Port, after using image processing techniques to do preprocessing of the image, especially, the main used technique is Canny edge detecting that is widely used in computer vision to locate sharp intensity and to find object boundaries in the image, then correlation between the edge image from the preprocessing step and the CGF with three parameters (direction, depth, flexure), as a result, we get an image that perform damage information, and these parameters is an estimator directly to the damage.

  • PDF

SMD Detection and Classification Using YOLO Network Based on Robust Data Preprocessing and Augmentation Techniques

  • NDAYISHIMIYE, Fabrice;Lee, Joon Jae
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.211-220
    • /
    • 2021
  • The process of inspecting SMDs on the PCB boards improves the product quality, performance and reduces frequent issues in this field. However, undesirable scenarios such as assembly failure and device breakdown can occur sometime during the assembly process and result in costly losses and time-consuming. The detection of these components with a model based on deep learning may be effective to reduce some errors during the inspection in the manufacturing process. In this paper, YOLO models were used due to their high speed and good accuracy in classification and target detection. A SMD detection and classification method using YOLO networks based on robust data preprocessing and augmentation techniques to deal with various types of variation such as illumination and geometric changes is proposed. For 9 different components of data provided from a PCB manufacturer company, the experiment results show that YOLOv4 is better with fast detection and classification than YOLOv3.

The Contrast Ratio Applied Preprocessing Method for Enhancing Recognition Rate of Artificial Intelligence (인공지능 인식률을 높이기 위한 명암비 적용 전처리 방법)

  • Kim, Sung-Jung;Yoo, Jaechern
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.19-21
    • /
    • 2019
  • 본 논문에서는 인공지능의 인식률을 높이기 위해 명암비를 적용한 전처리 방법에 대해 제안한다. 이 방법은 인공지능이 기존의 방법보다 특징점을 쉽게 얻어내기 위해서 명암비를 적용한 전처리를 진행하여 인식률을 높이기 위함에 목적을 두고 있다. 제안한 방법으로 인하여 문자인식이 얼마나 향상되었고, 기존의 성능과 비교하여 정확도가 얼마나 향상되었는지를 알아보고 있다.

  • PDF

Image Classification Model using web crawling and transfer learning (웹 크롤링과 전이학습을 활용한 이미지 분류 모델)

  • Lee, JuHyeok;Kim, Mi Hui
    • Journal of IKEEE
    • /
    • v.26 no.4
    • /
    • pp.639-646
    • /
    • 2022
  • In this paper, to solve the large dataset problem, we collect images through an image collection method called web crawling and build datasets for use in image classification models through a data preprocessing process. We also propose a lightweight model that can automatically classify images by adding category values by incorporating transfer learning into the image classification model and an image classification model that reduces training time and achieves high accuracy.

Application of FFT to orientation determination

  • Woo, Dong-Min;Park, Mignon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10b
    • /
    • pp.1730-1733
    • /
    • 1991
  • In this paper, we two dimensional processing method is presented, which can accurately determine the orientation of an part. Matching bewteen the object and the object contour is decomposed to estimate the orientation of the object and to evaluate the similarity new approach is very robust with respect to noise and no preprocessing of the contour is required. Also, this method has many advantages over the converntional correlation technique. With only a few uniformly sampled points, this method can estimate the accurate orientation in an efficient manner even in a noisy environment.

  • PDF

Design of improved Mulit-FNN for Nonlinear Process modeling

  • Park, Hosung;Sungkwun Oh
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.102.2-102
    • /
    • 2002
  • In this paper, the improved Multi-FNN (Fuzzy-Neural Networks) model is identified and optimized using HCM (Hard C-Means) clustering method and optimization algorithms. The proposed Multi-FNN is based on FNN and use simplified and linear inference as fuzzy inference method and error back propagation algorithm as learning rules. We use a HCM clustering and genetic algorithms (GAs) to identify both the structure and the parameters of a Multi-FNN model. Here, HCM clustering method, which is carried out for the process data preprocessing of system modeling, is utilized to determine the structure of Multi-FNN according to the divisions of input-output space using I/O process data. Also, the parame...

  • PDF

A Network Packet Analysis Method to Discover Malicious Activities

  • Kwon, Taewoong;Myung, Joonwoo;Lee, Jun;Kim, Kyu-il;Song, Jungsuk
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.143-153
    • /
    • 2022
  • With the development of networks and the increase in the number of network devices, the number of cyber attacks targeting them is also increasing. Since these cyber-attacks aim to steal important information and destroy systems, it is necessary to minimize social and economic damage through early detection and rapid response. Many studies using machine learning (ML) and artificial intelligence (AI) have been conducted, among which payload learning is one of the most intuitive and effective methods to detect malicious behavior. In this study, we propose a preprocessing method to maximize the performance of the model when learning the payload in term units. The proposed method constructs a high-quality learning data set by eliminating unnecessary noise (stopwords) and preserving important features in consideration of the machine language and natural language characteristics of the packet payload. Our method consists of three steps: Preserving significant special characters, Generating a stopword list, and Class label refinement. By processing packets of various and complex structures based on these three processes, it is possible to make high-quality training data that can be helpful to build high-performance ML/AI models for security monitoring. We prove the effectiveness of the proposed method by comparing the performance of the AI model to which the proposed method is applied and not. Forthermore, by evaluating the performance of the AI model applied proposed method in the real-world Security Operating Center (SOC) environment with live network traffic, we demonstrate the applicability of the our method to the real environment.