• Title/Summary/Keyword: object-based verification method

Search Result 70, Processing Time 0.039 seconds

Measuring the Confidence of Human Disaster Risk Case based on Text Mining (텍스트마이닝 기반의 인적재난사고사례 신뢰도 측정연구)

  • Lee, Young-Jai;Lee, Sung-Soo
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.63-79
    • /
    • 2011
  • Deducting the risk level of infrastructure and buildings based on past human disaster risk cases and implementing prevention measures are important activities for disaster prevention. The object of this study is to measure the confidence to proceed quantitative analysis of various disaster risk cases through text mining methodology. Indeed, by examining confidence calculation process and method, this study suggests also a basic quantitative framework. The framework to measure the confidence is composed into four stages. First step describes correlation by categorizing basic elements based on human disaster ontology. Secondly, terms and cases of Term-Document Matrix will be created and the frequency of certain cases and terms will be quantified, the correlation value will be added to the missing values. In the third stage, association rules will be created according to the basic elements of human disaster risk cases. Lastly, the confidence value of disaster risk cases will be measured through association rules. This kind of confidence value will become a key element when deciding a risk level of a new disaster risk, followed up by preventive measures. Through collection of human disaster risk cases related to road infrastructure, this study will demonstrate a case where the four steps of the quantitative framework and process had been actually used for verification.

Ontology Knowledge Base Scheme for User Query Semantic Interpretation (사용자 질의 의미 해석을 위한 온톨로지 지식베이스 스키마 구축)

  • Doh, Hana;Lee, Moo-Hun;Jeong, Hoon;Choi, Eui-In
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.285-292
    • /
    • 2013
  • The method of recent information retrieval passes into an semantic search to provide more accurate results than keyword-based search. But in common user case, they are still accustomed to using existing keyword-based search. Hence they are hard to create a typed structured query language. In this paper, we propose to ontology knowledge-base scheme for query interpretation of these user. The proposed scheme was designed based on the OWL-DL for description logic reasoning, it can provide a richer representation of the relationship between the object by using SWRL(Semantic Web Rule Language). Finally, we are describe the experimental results of the similarity measurement for verification of a user query semantic interpretation.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

The SOTDMA Algorithm Development and Verification for AIS (AIS용 SOTDMA알고리즘 구현 및 검증에 관한 연구)

  • Lee, Sang-Hoey;Lee, Hyo-Sung;Lim, Yong-Kon;Lee, Heung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.07d
    • /
    • pp.3037-3039
    • /
    • 2005
  • The AIS(Automatic Identification System) transmits the position of ships and other information to prevent accidents which could occur in the sea. It has to be developed SOTDMA(Self-Organized Time Division Multiple Access) Algorithm which is important on wireless communication method for the AIS because It is based on ITU(International Telecommunication Union) M.1371-1 of the international standard therefore, we need to develop a performance evaluation simulator efficiently to develop and analyze SOTDMA Algorithm. this paper shows the method of designing it. Real ships access The VHF maritime mobile band but in this performance evaluation simulator several ship objects access the shared memory. Real ships are designed as the object and the wireless communication channel is designed as the shared memory. The ships apply for real virtual data which got from assistance hardware and The SOTDMA Algorithm driving state verifies the performance evaluation simulator by IEC(International Electrotechnical commission) 61993-2. After verifying results the performance evaluation simulator is correctly satisfied with IEC 61993-2. So we expect that it helps not only the AIS technology developed but also verify new SOTDMA Algorithm

  • PDF

Development of Simulator for AIS Algorithm Verification (AIS 알고리즘 검증용 시뮬레이터 개발)

  • Lee, Hyo-Sung;Lee, Seung-Min;Lee, Heung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.478-480
    • /
    • 2005
  • The AIS(Automatic Identification System) transmits the position of ships and other information to prevent accidents which could occur in the sea. It has to be developed SOTDMA(Self-Organized Time Division Multiple Access) Algorithm which is important on wireless communication method for the AIS because It is based on ITU(International Telecommunication Union) M.1371-1 of the international standard therefore, we need to develop a performance evaluation simulator efficiently to develop and analyze SOTDMA Algorithm. This paper shows the method of designing it. Real ships access The VHF maritime mobile band but in this performance evaluation simulator several ship objects access the shared memory. Real ships are designed as the object and the wireless communication channel is designed as the shared memory. The ships apply for real virtual data which got from assistance hardware and The SOTDMA Algorithm driving state verifies the performance evaluation simulator by IEC(International Electrotechnical commission) 61993-2. After verifying results the performance evaluation simulator is correctly satisfied with IEC 61993-2. So we expect that it helps not only the AIS technology developed but also verify new SOTDMA Algorithm.

  • PDF

Hardware Accelerated Design on Bag of Words Classification Algorithm

  • Lee, Chang-yong;Lee, Ji-yong;Lee, Yong-hwan
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.26-33
    • /
    • 2018
  • In this paper, we propose an image retrieval algorithm for real-time processing and design it as hardware. The proposed method is based on the classification of BoWs(Bag of Words) algorithm and proposes an image search algorithm using bit stream. K-fold cross validation is used for the verification of the algorithm. Data is classified into seven classes, each class has seven images and a total of 49 images are tested. The test has two kinds of accuracy measurement and speed measurement. The accuracy of the image classification was 86.2% for the BoWs algorithm and 83.7% the proposed hardware-accelerated software implementation algorithm, and the BoWs algorithm was 2.5% higher. The image retrieval processing speed of BoWs is 7.89s and our algorithm is 1.55s. Our algorithm is 5.09 times faster than BoWs algorithm. The algorithm is largely divided into software and hardware parts. In the software structure, C-language is used. The Scale Invariant Feature Transform algorithm is used to extract feature points that are invariant to size and rotation from the image. Bit streams are generated from the extracted feature point. In the hardware architecture, the proposed image retrieval algorithm is written in Verilog HDL and designed and verified by FPGA and Design Compiler. The generated bit streams are stored, the clustering step is performed, and a searcher image databases or an input image databases are generated and matched. Using the proposed algorithm, we can improve convenience and satisfaction of the user in terms of speed if we search using database matching method which represents each object.

A Study on Sensor Modeling for Virtual Testing of ADS Based on MIL Simulation (MIL 시뮬레이션 기반 ADS 기능 검증을 위한 환경 센서 모델링에 관한 연구)

  • Shin, Seong-Geun;Baek, Yun-Seok;Park, Jong-Ki;Lee, Hyuck-Kee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.331-345
    • /
    • 2021
  • Virtual testing is considered a major requirement for the safety verification of autonomous driving functions. For virtual testing, both the autonomous vehicle and the driving environment should be modeled appropriately. In particular, a realistic modeling of the perception sensor system such as the one having a camera and radar is important. However, research on modeling to consistently generate realistic perception results is lacking. Therefore, this paper presents a sensor modeling method to provide realistic object detection results in a MILS (Model in the Loop Simulation) environment. First, the key parameters for modeling are defined, and the object detection characteristics of actual cameras and radar sensors are analyzed. Then, the detection characteristics of a sensor modeled in a simulation environment, based on the analysis results, are validated through a correlation coefficient analysis that considers an actual sensor.

A Study on the Application of Object Detection Method in Construction Site through Real Case Analysis (사례분석을 통한 객체검출 기술의 건설현장 적용 방안에 관한 연구)

  • Lee, Kiseok;Kang, Sungwon;Shin, Yoonseok
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.2
    • /
    • pp.269-279
    • /
    • 2022
  • Purpose: The purpose of this study is to develop a deep learning-based personal protective equipment detection model for disaster prevention at construction sites, and to apply it to actual construction sites and to analyze the results. Method: In the method of conducting this study, the dataset on the real environment was constructed and the developed personal protective equipment(PPE) detection model was applied. The PPE detection model mainly consists of worker detection and PPE classification model.The worker detection model uses a deep learning-based algorithm to build a dataset obtained from the actual field to learn and detect workers, and the PPE classification model applies the PPE detection algorithm learned from the worker detection area extracted from the work detection model. For verification of the proposed model, experimental results were derived from data obtained from three construction sites. Results: The application of the PPE recognition model to construction site brings up the problems related to mis-recognition and non-recognition. Conclusions: The analysis outcomes were produced to apply the object recognition technology to a construction site, and the need for follow-up research was suggested through representative cases of worker recognition and non-recognition, and mis-recognition of personal protective equipment.

Rendering Method of Light Environment Based on Modeling of Physical Characteristic (물리적 특성 모델링에 기반한 라이팅 환경의 랜더링 기법)

  • Lee, Myong-Young;Lee, Cheol-Hee;Ha, Yeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.6 s.312
    • /
    • pp.46-56
    • /
    • 2006
  • In this paper, we propose an improved reproduction algorithm for a realistic image of the real scene based on the optical characteristics of the light sources and the materials at the lighting environment. This paper is continuation of the previous study to improve the modeling method of the light sources and the materials and apply this to the real rear lamp of automobile. The backward ray tracing method is first used to trace the light ray from a light source, and also considers the physical characteristics of object surfaces and geometric properties of light radiation to estimate accurately the light energy incoming toward to human eyes. For experiments and verification of the proposed method, the simulation results are compared with the measured light stimuli. Accordingly, the simulation results show that the proposed algorithm can estimate light energy well and reproduce the visually similar image with a scene incident on a sight of viewer.

Application of Deep Learning Method for Real-Time Traffic Analysis using UAV (UAV를 활용한 실시간 교통량 분석을 위한 딥러닝 기법의 적용)

  • Park, Honglyun;Byun, Sunghoon;Lee, Hansung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.4
    • /
    • pp.353-361
    • /
    • 2020
  • Due to the rapid urbanization, various traffic problems such as traffic jams during commute and regular traffic jams are occurring. In order to solve these traffic problems, it is necessary to quickly and accurately estimate and analyze traffic volume. ITS (Intelligent Transportation System) is a system that performs optimal traffic management by utilizing the latest ICT (Information and Communications Technology) technologies, and research has been conducted to analyze fast and accurate traffic volume through various techniques. In this study, we proposed a deep learning-based vehicle detection method using UAV (Unmanned Aerial Vehicle) video for real-time traffic analysis with high accuracy. The UAV was used to photograph orthogonal videos necessary for training and verification at intersections where various vehicles pass and trained vehicles by classifying them into sedan, truck, and bus. The experiment on UAV dataset was carried out using YOLOv3 (You Only Look Once V3), a deep learning-based object detection technique, and the experiments achieved the overall object detection rate of 90.21%, precision of 95.10% and the recall of 85.79%.