• Title/Summary/Keyword: Rule-Based Cooperation

Search Result 75, Processing Time 0.023 seconds

Character Region Detection Using Structural Features of Hangul Vowel (한글 모음의 구조적 특징을 이용한 문자영역 검출 기법)

  • Park, Jong-Cheon;Lee, Keun-Wang;Park, Hyoung-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.872-877
    • /
    • 2012
  • We proposes the method to detect the Hangul character region from natural image using topological structural feature of Hangul grapheme. First, we transform a natural image to a gray-scale image. Second, feature extraction performed with edge and connected component based method, Edge-based method use a Canny-edge detector and connected component based method applied the local range filtering. Next, if features are not corresponding to the heuristic rule of Hangul character, extracted features filtered out and select candidates of character region. Next, candidates of Hangul character region are merged into one Hangul character using Hangul character merging algorithm. Finally, we detect the final character region by Hangul character class decision algorithm. Experimental result, proposed method could detect a character region effectively in images that contains a complex background and various environments. As a result of the performance evaluation, A proposed method showed advanced results about detection of Hangul character region from mobile image.

An Alert Data Mining Framework for Intrusion Detection System (침입탐지시스템의 경보데이터 분석을 위한 데이터 마이닝 프레임워크)

  • Shin, Moon-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.459-466
    • /
    • 2011
  • In this paper, we proposed a data mining framework for the management of alerts in order to improve the performance of the intrusion detection systems. The proposed alert data mining framework performs alert correlation analysis by using mining tasks such as axis-based association rule, axis-based frequent episodes and order-based clustering. It also provides the capability of classify false alarms in order to reduce false alarms. We also analyzed the characteristics of the proposed system through the implementation and evaluation of the proposed system. The proposed alert data mining framework performs not only the alert correlation analysis but also the false alarm classification. The alert data mining framework can find out the unknown patterns of the alerts. It also can be applied to predict attacks in progress and to understand logical steps and strategies behind series of attacks using sequences of clusters and to classify false alerts from intrusion detection system. The final rules that were generated by alert data mining framework can be used to the real time response of the intrusion detection system.

A Study of Chinese Peaceful Rise and East Asian Regional Cooperation (중국의 평화적 부상과 동아시아 지역협력 연구)

  • Shong, Il-Ho;Lee, Gye-Young
    • International Commerce and Information Review
    • /
    • v.14 no.3
    • /
    • pp.75-96
    • /
    • 2012
  • China will replace the global governance of the 21st century in 2050. The rise of China provide the Chinese development model to other developing countries. There are positive element and disability element in China's 'peaceful rise' strategy at the same time. Success of the reform and opening up, market liberalization, economic interdependency, economic globalization, stability of ruling power, consolidation of one-party rule and soft power increase are the promotions of peaceful rise. China's rise as a power nation begins by regaining the superpower status in East Asia. East Asia is a lebensraum assuring a continuing growth to China. For this lebensraum, China shows an interest in institutionalization of regional economic cooperation. The core values of ASEAN, namely the mutual respect, harmonious coexistence, co-prosperity, egalitarianism and pluralism are in conform to China's policy of harmonious world and peaceful coexistence. Through this common value the tension in East Asia will be alleviated. By the regional hegemony strategy based on soft power and economic success, China will try to regain the past glorious position. Attaining status as a coordinator of the world rule will be based on the success of the East Asian strategy. Korea and other neighboring countries will be the best beneficiary countries of the China's rise strategy. China's rising strategy will have a profound effect on neighboring countries especially, Korea. The scale of the movement of goods, labor, and capital between the two countries will become much larger than present. Through regional trade agreements, economic interdependency between Korea and China will increase.

  • PDF

Transformation from Data Flow Diagram to SysML Diagram (데이터흐름도(DFD)의 SysML 다이어그램으로의 변환에 관한 연구)

  • Yoon, Seok-In;Wang, Ji-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5827-5833
    • /
    • 2013
  • Due to science and technology evolutions, modern systems are becoming larger and more complex. In developing complex systems, Model-Based Systems Engineering (MBSE), which is approach to reduce complexity, is being introduced and applied to various system domains. However, because of the modeling being made through a variety of languages, there is a problem with communication within the stakeholders and a lack of consistency in the models. In this paper, by investigating the rule explaining the transformation of one of the only traditional diagrams, DFD, to SysML and reusing the formerly built models, we attempt to implement by SysML. Analyzing each diagram's Metamodel and validating the connection of each component through bipartite graph especially suggest an effective transformation rule. Also, by applying to naval-combat system, we confirm efficiency of this study. Establishing the results of this study as basis for conducting further study, we will be able to transform other previous models gained from formerly built system to SysML. In this way, the stakeholder's communication can be improved and we anticipate that the application of SysML will be beneficial to the much efficient MBSE.

An Object Quality Verification Method for BIM Libraries based on Standardized Drawings in Civil Projects -Focusing on Retaining Wall Case (토목 표준도 기반의 BIM 라이브러리에 대한 객체 품질 검증 방법 연구-옹벽사례를 중심으로)

  • Moon, Hyoun-Seok;Kim, Chang-Yoon;Cho, Geun-Ha;Ju, Ki-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.129-137
    • /
    • 2016
  • BIM libraries for architectural projects have been developed and distributed. However, they do not define physical and logical quality control methods for individual library objects, so there are some difficulties in securing reliability of 3D library models converted from 2D drawings. Because the BIM library contents can be built by participating material and member-fabrication companies, after making individual BIM library objects, a certification process through separate quality verification is very important when delivering as-built BIM libraries. Since the BIM library should have generality for usage, it is necessary to secure the quality of BIM library objects according to consistent verification standards. Therefore, this study suggests a quality verification method for certifying a BIM library object from physical and data perspectives by comparing existing 2D drawings in the BIM libraries built based on standardized 2D drawings from MOLIT. This method could be widely used for quality verification in delivering BIM libraries by companies in the construction sector and operated with rule set data for quality verification of as-built BIM models.

Improvement of Access Control at Partially Grade-Separated Intersection (단순입체교차 도로의 진출입로 설치 금지구간 개선방안)

  • Kim, Young-Jin;Kim, Jin-Uk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.725-733
    • /
    • 2018
  • With urbanization projects involving trunk roads progressing, many simple interchanges, which separate passing traffic into the main traffic and access subtraffic, are being constructed to maximize the traffic capacity. Under the current Road Connection Rule, the access-prohibited section in an interchange is determined based on the access lane and limit distance in the complete interchange road, but separate criteria for the simple interchange are not defined. This may cause confusion in the Road Management Office's determination of the access-prohibited section in the simple interchange, or lead to the application of the criteria for the access-prohibited section in the complete interchange without considering the features of such interchange. This study conducted a comparative analysis of the domestic and overseas systems related to the installation of access section in trunk roads, such as general national roads. This paper presents a survey of the methods for applying the access-prohibited section in the interchange along with the actual cases and proposes improvement measures for a rational calculation of the access prohibited installation section in the simple interchange to minimize the downsides associated with the application of the extremely strict criteria. The proposed road connection rule improvement measures based on the consideration of the purpose of installing the simple interchange and on the consideration the features of the simple interchange are expected to prevent administration confusion by the field road management offices as well as the waste of unnecessary efforts and costs by petitioners so they can boost the service satisfaction for people and the administrative reliability.

HMM-based Speech Recognition using DMS Model and Fuzzy Concept (DMS 모델과 퍼지 개념을 이용한 HMM에 기초를 둔 음성 인식)

  • Ann, Tae-Ock
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.964-969
    • /
    • 2008
  • This paper proposes a HMM-based recognition method using DMSVQ(Dynamic Multi-Section Vector Quantization) codebook by DMS(Dynamic Multi-Section) model and fuzzy concept, as a study for speaker- independent speech recognition. In this proposed recognition method, training data are divided into several dynamic section and multi-observation sequences which are given proper probabilities by fuzzy rule according to order of short distance from DMSVQ codebook per each section are obtained. Thereafter, the HMM using this multi-observation sequences is generated, and in case of recognition, a word that has the most highest probability is selected as a recognized word. Other experiments to compare with the results of recognition experiments using proposed method are implemented as a data by the various conventional recognition methods under the equivalent environment. Through the experiment results, it is proved that the proposed method in this study is superior to the conventional recognition methods.

Mobile Phone Camera Based Scene Text Detection Using Edge and Color Quantization (에지 및 컬러 양자화를 이용한 모바일 폰 카메라 기반장면 텍스트 검출)

  • Park, Jong-Cheon;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.847-852
    • /
    • 2010
  • Text in natural images has a various and important feature of image. Therefore, to detect text and extraction of text, recognizing it is a studied as an important research area. Lately, many applications of various fields is being developed based on mobile phone camera technology. Detecting edge component form gray-scale image and detect an boundary of text regions by local standard deviation and get an connected components using Euclidean distance of RGB color space. Labeling the detected edges and connected component and get bounding boxes each regions. Candidate of text achieved with heuristic rule of text. Detected candidate text regions was merged for generation for one candidate text region, then text region detected with verifying candidate text region using ectilarity characterization of adjacency and ectilarity between candidate text regions. Experctental results, We improved text region detection rate using completentary of edge and color connected component.

A Mining-based Healthcare Multi-Agent System in Ubiquitous Environments (마이닝 기반 유비쿼터스 헬스케어 멀티에이전트 시스템)

  • Kang, Eun-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2354-2360
    • /
    • 2009
  • Healthcare is a field where ubiquitous computing is most widely used. We propose a mining-based healthcare multi-agent system for ubiquitous computing environments. This proposed scheme select diagnosis patterns using mining in the real-time biosignal data obtained from a patient's body. In addition, we classify them into normal, emergency and be ready for an emergency. This proposed scheme can deal with the enormous quantity of real-time sensing data and performs analysis and comparison between the data of patient's history and the real-time sensory data. We separate Association rule exploration into two data groups: one is the existing enormous quantity of medical history data. The other group is real-time sensory data which is collected from sensors measuring body temperature, blood pressure, pulse. Proposed system has advantage that can handle urgent situation in the far away area from hospital through PDA and mobile device. In addition, by monitoring condition of patient in a real time base, it shortens time and expense and supports medical service efficiently.

Real-time Event Processing Role Management System for IFTTT Service (IFTTT 서비스를 위한 실시간 이벤트 처리 룰 관리 시스템)

  • Kim, KyeYoung;Lee, HyunDong;Cho, Dae-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1379-1386
    • /
    • 2017
  • As the Internet of Things evolves, various IoT services are provided. IFTTT is an abbreviation for If This Then That and refers to a service that links different web-based services. This paper proposes a system that generates and manages rules that combine the possibility of IFTTT service and the real-time event processing according to the concept of IoT service. Conventional database-based data processing methods are burdened to process a lot of data of IoT devices coming in real-time. The IoT device's data can be classified into formal data such as the amount of power, temperature value and position information, and informal data such as video or image data. Thus, this system classifies the data stream of IoT devices coming in real-time using the CEP engine Esper into a file signature table, classifies the formal/informal data, and shows the condition of the device data defined by the user and the service to be provided by applying the service.