• 제목/요약/키워드: Semantic Complexity

검색결과 72건 처리시간 0.026초

특징 융합을 이용한 농작물 다중 분광 이미지의 의미론적 분할 (Semantic Segmentation of Agricultural Crop Multispectral Image Using Feature Fusion)

  • 문준렬;박성준;백중환
    • 한국항행학회논문지
    • /
    • 제28권2호
    • /
    • pp.238-245
    • /
    • 2024
  • 본 논문에서는 농작물 다중 분광 이미지에 대해 특징 융합 기법을 이용하여 의미론적 분할 성능을 향상시키기 위한 프레임워크를 제안한다. 스마트팜 분야에서 연구 중인 딥러닝 기술 중 의미론적 분할 모델 대부분은 RGB(red-green-blue)로 학습을 진행하고 있고 성능을 높이기 위해 모델의 깊이와 복잡성을 증가시키는 데에 집중하고 있다. 본 연구는 기존 방식과 달리 다중 분광과 어텐션 메커니즘을 통해 모델을 최적화하여 설계한다. 제안하는 방식은 RGB 단일 이미지와 함께 UAV (unmanned aerial vehicle)에서 수집된 여러 채널의 특징을 융합하여 특징 추출 성능을 높이고 상호보완적인 특징을 인식하여 학습 효과를 증대시킨다. 특징 융합에 집중할 수 있도록 모델 구조를 개선하고, 작물 이미지에 유리한 채널 및 조합을 실험하여 다른 모델과의 성능을 비교한다. 실험 결과 RGB와 NDVI (normalized difference vegetation index)가 융합된 모델이 다른 채널과의 조합보다 성능이 우수함을 보였다.

실시간 시스템의 실행 공간상에서 구문 및 의미패턴에 기반한 상태 최소화를 위한 추상화 방법 (An Abstraction Method for State Minimization based on Syntactic and Semantic Patterns in the Execution Space of Real-Time Systems)

  • 박지연;조기환;이문근
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제30권1_2호
    • /
    • pp.103-116
    • /
    • 2003
  • 정형기법을 사용하여 실시간 시스템을 명세할 때. 상태 기반 정형 기법이 가지는 큰 문제 중의 하나는 시간 값. 자료 값, 위치 값을 통한 상대 표현으로 발생하는 상태 폭발이다. 본 논문에서는 상태 폭발 문제를 접근하기 위해, 시스템의 명세에 적용하는 추상화와, 명세된 시스템의 실행에 적용하는 추상화 기법을 정의하였다. 명세 구문에 정의한 추상화를 추문 추상화라 정의하고 명세 구문이 가진 패턴(연산 정보, 구조)을 정의하여 추상화한다. 실행에 적용되는 추상화는 의미 추상화라 정의하고 실행 시 생성되는 시간, 자료, 위치 상태 값이 파진 실행 의미의 패턴을 추상화한다. 추상화를 통하여 명세 모델과 실행 모델에 계층을 생성하여 상위 계층에서는 복잡도가 낮은 단계에서 시스템의 개략적인 정보를 분석할 수 있다. 하위 계층에서는 정확도가 높은 분석을 수행할 수 있는 반면에 많은 상태를 살펴야되기 때문에 높은 복잡도를 가진다. 본 논문에서는 추상화의 정의와 더불어, 적용 사례를 통하여 상태 감소와 계층성 생성, 복잡도 감소를 보인다.

실내조경에 있어서 식물의 시각량이 시각선호에 미치는 영향 (The Influence of the Ratio of Greenery on the Visual Preference in interior Landscape)

  • 이남현;방광자
    • 한국조경학회지
    • /
    • 제24권2호
    • /
    • pp.13-24
    • /
    • 1996
  • The purpose of this study is to suggest optimum level of the Ratio of Greenery within the frame of vision in the interior landscape design through the analysis of visual character and preference of the interior landscape. The concept of the RG was defined as the ratio of projected area of plants higher than 1.2M against background wall from eye level. 5 photography of Interior landscape space -- 10,20,30,40 and 50% of the RG-- were constructed by computer graphic techinques. Likert scale and semantic differential scale were used to analyse visual character and preference of the interior landscape space. The analysis results are as follows : 1. Factors that compose of the image of the interior landscape have been found to be the "evaluation ", "complexity". The mean value of semantic differential scale showed a significant difference according to RG. When the RG was 20~30%, "Harmony" and "stability" was strongly recognized than the other factors and the interior landscape made the interior space natural and intimate. But at the RG 40!50%, users felt "stuffy" and "too complex" by many plants, so it was not efficient the Interior Landscape. 2. The visual preference was significantly different according to RG. The mean value of the visual preference was increased as the RG was higher, it was the highest at the RG 30%. But over the RG 30%, the preference level was declined. 3. Based on these results, this study suggests that the optimum level of RG in the Interior Landscape is 30%.at the optimum level of RG in the Interior Landscape is 30%.

  • PDF

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.

Survey of Automatic Query Expansion for Arabic Text Retrieval

  • Farhan, Yasir Hadi;Noah, Shahrul Azman Mohd;Mohd, Masnizah
    • Journal of Information Science Theory and Practice
    • /
    • 제8권4호
    • /
    • pp.67-86
    • /
    • 2020
  • Information need has been one of the main motivations for a person using a search engine. Queries can represent very different information needs. Ironically, a query can be a poor representation of the information need because the user can find it difficult to express the information need. Query Expansion (QE) is being popularly used to address this limitation. While QE can be considered as a language-independent technique, recent findings have shown that in certain cases, language plays an important role. Arabic is a language with a particularly large vocabulary rich in words with synonymous shades of meaning and has high morphological complexity. This paper, therefore, provides a review on QE for Arabic information retrieval, the intention being to identify the recent state-of-the-art of this burgeoning area. In this review, we primarily discuss statistical QE approaches that include document analysis, search, browse log analyses, and web knowledge analyses, in addition to the semantic QE approaches, which use semantic knowledge structures to extract meaningful word relationships. Finally, our conclusion is that QE regarding the Arabic language is subjected to additional investigation and research due to the intricate nature of this language.

제2 외국어로 한국어를 배우는 영어권 학습자의 한국어 부사격 조사 '-에 의 습득과 발달에 관한 연구 (The Acquisition and Development of the Korean Adverbial Particle -ey by L1 English Learners of Korean)

  • 에브루 터커
    • 한국어교육
    • /
    • 제28권4호
    • /
    • pp.337-366
    • /
    • 2017
  • 이 연구는 미국 대학에서 제2외국어로 한국어를 배우는 영어권 학습자의 부사형 조사 '-에'의 다양한 의미론적 뜻의 습득을 고찰한다. 이 연구는 초급반, 중급반, 고급반의 45명 참가자들을 대상으로, 한국어 학습 첫 학기 교실에서 이 조사가 가르쳐 졌을 때 각 단계의 학습자들이 어떻게 그 의미를 해석하며 실제로 어떻게 사용하는가에 대한 수행능력을 중심으로 이루어졌다. 이 연구 결과는 다양한 의미론적 뜻에 대해 서로 다른 발달 과정을 보여주고 있다. 통계 분석 결과에 따르면 초급반과 중급반에서는 이 연구 과제 '-에'의 의미 중 시간과 목표, 정적인 위치적 의미의 습득이 접촉의 의미나, 개별의 의미보다 좀 더 쉽게 습득 된다는 것을 보여주고 있다. 반면에 고급반에서는 개별의 의미를 제외하고는 모든 의미론적인 의미가 거의 목표점까지 도달하였다. 이 연구는 의미론적 복합성과 다른 언어권 간의 영향과 같은 요인과 함께, 제2 언어 빈도수, 언어학적 입력, 습득 방식과 같은 다양한 요인이 '-에'의 습득에 영향을 미친다는 것을 제시하고 있다.

조기언어발달 아동의 초기 언어능력의 안정성 (Stability of Early Language Development of Verbally-Precocious Korean Children from 2 to 3 Year-old)

  • 이귀옥
    • 한국지역사회생활과학회지
    • /
    • 제19권4호
    • /
    • pp.673-684
    • /
    • 2008
  • The purpose of this study is to compare the complexity of language level between verbally-precocious and typically-developing children from 2 to 3 years-old. Participants were 15 children classified as verbally-precocious were scored at the mean 56.85(expressive language) and 88.82(receptive language), and another 15 children classified as typically developing did at the mean 33.51(expressive language) and 58.01(receptive language) on MCDI-K. Each child's spontaneous utterances in interaction with her caregiver were collected at three different times with 6 months interval. All of the utterances were transcribed and analyzed for the use of MLU and lexical diversity by using KCLA. Summarizing the overall results, verbally-precocious children had significantly higher language abilities than typically-developing children at each time, and there were significant differences between two groups in syntactic and semantic language development, showing that verbally-precocious children indicated distinctive MLU and lexical diversity. These results suggest a high degree of stability in precocious verbal status, with variations in language complexity during conversations contributing to later differences in their language ability.

  • PDF

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

A Hierarchical Context Dissemination Framework for Managing Federated Clouds

  • Famaey, Jeroen;Latre, Steven;Strassner, John;Turck, Filip De
    • Journal of Communications and Networks
    • /
    • 제13권6호
    • /
    • pp.567-582
    • /
    • 2011
  • The growing popularity of the Internet has caused the size and complexity of communications and computing systems to greatly increase in recent years. To alleviate this increased management complexity, novel autonomic management architectures have emerged, in which many automated components manage the network's resources in a distributed fashion. However, in order to achieve effective collaboration between these management components, they need to be able to efficiently exchange information in a timely fashion. In this article, we propose a context dissemination framework that addresses this problem. To achieve scalability, the management components are structured in a hierarchy. The framework facilitates the aggregation and translation of information as it is propagated through the hierarchy. Additionally, by way of semantics, context is filtered based on meaning and is disseminated intelligently according to dynamically changing context requirements. This significantly reduces the exchange of superfluous context and thus further increases scalability. The large size of modern federated cloud computing infrastructures, makes the presented context dissemination framework ideally suited to improve their management efficiency and scalability. The specific context requirements for the management of a cloud data center are identified, and our context dissemination approach is applied to it. Additionally, an extensive evaluation of the framework in a large-scale cloud data center scenario was performed in order to characterize the benefits of our approach, in terms of scalability and reasoning time.

Using Small Corpora of Critiques to Set Pedagogical Goals in First Year ESP Business English

  • Wang, Yu-Chi;Davis, Richard Hill
    • 아시아태평양코퍼스연구
    • /
    • 제2권2호
    • /
    • pp.17-29
    • /
    • 2021
  • The current study explores small corpora of critiques written by Chinese and non-Chinese university students and how strategies used by these writers compare with high-rated L1 students. Data collection includes three small corpora of student writing; 20 student critiques in 2017, 23 student critiques from 2018, and 23 critiques from the online Michigan MICUSP collection at the University of Michigan. The researchers employ Text Inspector and Lexical Complexity to identify university students' vocabulary knowledge and awareness of syntactic complexity. In addition, WMatrix4® is used to identify and support the comparison of lexical and semantic differences among the three corpora. The findings indicate that gaps between Chinese and non-Chinese writers in the same university classes exist in students' knowledge of grammatical features and interactional metadiscourse. In addition, critiques by Chinese writers are more likely to produce shorter clauses and sentences. In addition, the mean value of complex nominal and coordinate phrases is smaller for Chinese students than for non-Chinese and MICUSP writers. Finally, in terms of lexical bundles, Chinese student writers prefer clausal bundles instead of phrasal bundles, which, according to previous studies, are more often found in texts of skilled writers. The current study's findings suggest incorporating implicit and explicit instruction through the implementation of corpora in language classrooms to advance skills and strategies of all, but particularly of Chinese writers of English.