• Title/Summary/Keyword: 검사알고리즘

Search Result 938, Processing Time 0.028 seconds

Online Virtual Try On using Mannequin Cloth Pictures (마네킨 의상사진 기반 온라인 가상의상착용)

  • Ahn, Heejune
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.6
    • /
    • pp.29-38
    • /
    • 2018
  • In this paper, we developed a virtual cloth try-on (VTON) technology that segement the cloth image worn on the mannequin and applies it to the user 's photograph. The two-dimensional image-based virtual wear study which does not require three-dimensional information of cloth and model is of practical value, but the research result shows that there are limitations of of the current technology for the problem of occlusion or distortion. In this study, we proposed an algorithm to apply the results obtained from the DNN- based segmentation and posture estimation to the user 's photograph, assuming that the mannequin cloth reduces the difficulties in this part. In order to improve the performance compared with the existing one, we used the validity check of the pre-attitude information, the improvement of the deformation using the outline, and the improvement of the divided area. As a result, a significantly improved result image of more than 50% was obtained.

Body Fat Segmentation of Abdominal CT Image (복부전산화단층영상의 체지방 분할방법)

  • Choi, Seokyoon
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.3
    • /
    • pp.489-493
    • /
    • 2019
  • Obesity is increasing in our country due to lack of lifestyle and physical activity. Semi-automatic program is used in existing fat calculation program using computed tomography. Although methods for solving related problems have been proposed, this study proposes an algorithm using morphology operation and We want to solve the problem with a new method that has a simple procedure and a relatively small amount of computation. As a result of repetition of erosion and expansion Automatic fat mass calculation can be done in the future by using the developed partitioning result. By providing an accurate segmentation tool, it will be helpful to doctors and reduce the expense and inspection cost of retesting. through morphology operation, it was found that the problem was solved from the image.Automatic fat mass calculation can be done in the future by using the developed partitioning result. By providing an accurate segmentation tool, it will be helpful to doctors and reduce the expense and inspection cost of retesting.

Extraction of Blood Velocity Using FCM and Fuzzy Decision Trees in Doppler Ultrasound Images of Brachial Artery (상완동맥 색조 도플러 초음파 영상에서 FCM과 퍼지 의사 결정 트리를 이용한 혈류 속도 추출)

  • Kim, Kwang Baek;Jung, Young Jin;Nam, Youn Man;Lee, Jae Yeol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.19-22
    • /
    • 2019
  • 상완동맥은 어깨에서부터 팔꿈치까지 내려오는 상완골의 내측부에 존재하며 혈압을 측정할 때 사용되는 혈관이다. 이 혈관은 골절로 인해 찢어지거나, 또는 혈액순환에 문제가 생겨 혈관이 막히는 경우가 발생한다. 이러한 경우 혈관의 상태를 확인하기 위하여 색조 도플러 초음파 검사를 사용하지만, 사용자에 따라 영상을 통한 판단 기준이 다르다는 문제점이 발생한다. 따라서 본 논문에서는 FCM과 Fuzzy Decision Tree를 이용한 영상 처리를 통해 일관성 있는 판단기준을 세우기 위한 혈류의 속도를 제안한다. 색조 도플러 초음파 영상에서의 상완 동맥을 추출하여 기울기를 이용한 FCM 알고리즘을 통해 소속도를 추출한 뒤 퍼지 룰에 적용하여 의사 결정 트리로 등급을 분류하고 결과적으로 혈류 속도를 추출한다. 색조 도플러 초음파 영상에서 환자의 개인 정보를 보호하기 위해 개인 정보 영역을 제거하여 ROI 영역을 추출하고 ROI 영역을 이진화를 통하여 상완동맥이 있는 영역을 추출한다. 이진화 된 ROI 영역에서 혈관 영상의 혈류 방향으로의 무게중심을 설정하고 각각의 픽셀과 무게중심 선과의 거리를 이용하여 소속도를 추출한 후 FCM을 사용하여 최적의 기울기를 선정한다. FCM을 통해 추출한 최종 소속도를 이용하여 퍼지 룰에 적용한 뒤 계산된 T-norm과 소속도의 분산을 이용하여 의사 결정 트리를 형성 트리의 단말 노드들은 각 픽셀을 분류한다. 분류되어진 데이터들의 노드별 소속도 평균을 구한 뒤 디퍼지화를 통해 COG(Center of Gravity)를 계산한다. 마지막으로 그 값을 이용하여 혈류 속도에 영향을 미치는 정도를 계산한 뒤 최종 혈류의 속도를 제안한다.

  • PDF

An Analysis of Error Treatment in Multiplication Using Reflective Activities (반성적 활동을 통한 곱셈의 오류 처치 행동 분석)

  • Na, Yunji;Park, Mangoo
    • Education of Primary School Mathematics
    • /
    • v.22 no.4
    • /
    • pp.281-294
    • /
    • 2019
  • The purpose of this study is to analyze errors and treatment behavior during the course of mathematics learning of academic achievement by applying reflective activities in the second semester of the third year of elementary school. The study participants are students from two classes, 21 from the third-grade S elementary school in Seoul and 20 from the comparative class. In the case of the experiment group, the multiplication unit was reconstructed into a mathematics class that applied reflective activities. They were pre-post-test to examine the changes in students' mathematics performance, and mathematical communication was recorded and analyzed for the focus group to analyze the patterns of learners' error handling in the reflective activities. In addition, they recorded and analyzed students' activities and conversations for error type and error handling. As a result of the study, the student's mathematics achievement was increased using reflective activities. When learning double digit multiplication, the error types varied. It was also confirmed that the reflective activities helped learners reflect on the multiplication algorithm and analyze the error-ridden calculations to reflect on and deal with their errors.

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

The Manufacture of Digital X-ray Devices and Implementation of Image Processing Algorithm (디지털 X-ray 장치 제작 및 영상 처리 알고리즘 구현)

  • Kim, So-young;Park, Seung-woo;Lee, Dong-hoon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.4
    • /
    • pp.195-201
    • /
    • 2020
  • This study studied scoliosis, one of the most common modern diseases caused by lifestyle patterns of office workers sitting in front of computers all day and modern people who use smart phones frequently. Scoliosis is a typical complication that takes more than 80% of the nation's total population at least once. X-ray are used to test for these complications. X-ray, a non-destructive testing method that allows scoliosis to be easily performed and filmed in various areas such as the chest, abdomen and bone without contrast agents or other instruments. We uses NI DAQ to miniaturize digital X-ray imaging devices and image intensifier in self-shielding housing with Vision Assistant for drawing lines to the top and the bottom of the spine to acquire angles, i.e. curvature in real-time. In this way, the research was conducted to see scoliosis patients and their condition easily and to help rapid treatment for solving the problem of posture correction in modern people.

Detection Algorithm of Road Surface Damage Using Adversarial Learning (적대적 학습을 이용한 도로 노면 파손 탐지 알고리즘)

  • Shim, Seungbo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.4
    • /
    • pp.95-105
    • /
    • 2021
  • Road surface damage detection is essential for a comfortable driving environment and the prevention of safety accidents. Road management institutes are using automated technology-based inspection equipment and systems. As one of these automation technologies, a sensor to detect road surface damage plays an important role. For this purpose, several studies on sensors using deep learning have been conducted in recent years. Road images and label images are needed to develop such deep learning algorithms. On the other hand, considerable time and labor will be needed to secure label images. In this paper, the adversarial learning method, one of the semi-supervised learning techniques, was proposed to solve this problem. For its implementation, a lightweight deep neural network model was trained using 5,327 road images and 1,327 label images. After experimenting with 400 road images, a model with a mean intersection over a union of 80.54% and an F1 score of 77.85% was developed. Through this, a technology that can improve recognition performance by adding only road images was developed to learning without label images and is expected to be used as a technology for road surface management in the future.

Web based Fault Tolerance 3D Visualization of IoT Sensor Information (웹 기반 IoT 센서 수집 정보의 결함 허용 3D 시각화)

  • Min, Kyoung-Ju;Jin, Byeong-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.146-152
    • /
    • 2022
  • Information collected from temperature, humidity, inclination, and pressure sensors using Raspberry Pi or Arduino is used in automatic constant temperature and constant humidity systems. In addition, by using it in the agricultural and livestock industry to remotely control the system with only a smartphone, workers in the agricultural and livestock industry can use it conveniently. In general, temperature and humidity are expressed in a line graph, etc., and the change is monitored in real time. The technology to visually express the temperature has recently been used intuitively by using an infrared device to test the fever of Corona 19. In this paper, the information collected from the Raspberry Pi and the DHT11 sensor is used to predict the temperature change in space through intuitive visualization and to make a immediate response. To this end, an algorithm was created to effectively visualize temperature and humidity, and data representation is possible even if some sensors are defective.

Analysis of the effect of non-face-to-face online SW education program on the computational thinking ability of students from the underprivileged class (비대면 온라인 SW 교육 프로그램이 소외계층 학생의 컴퓨팅 사고력에 미치는 영향 분석)

  • Lee, Jaeho;Lee, Seunghoon
    • Journal of Creative Information Culture
    • /
    • v.7 no.4
    • /
    • pp.207-215
    • /
    • 2021
  • As computational thinking has been noted as an important competency worldwide, SW education was introduced in the 2015 revised curriculum, and SW education has been applied to the curriculum from 2018. However, in a poor educational environment, the educationally underprivileged class is in the blind spot of SW education and is not receiving systematic SW education. Therefore, this study analyzed the effect of conducting a non-face-to-face SW online education program for 267 underprivileged elementary school students in education at a time when non-face-to-face online education was being conducted through the COVID-19 mass infectious disease. As a result of conducting the computational thinking ability test, which abstraction, problem decomposition, algorithm, automation, and data processing, before and after education, the overall score of computational thinking and the score of all five factors were statistically significantly increased(p<0.001). Among the five factors, there was the highest score improvement in data processing score. These results suggest that the non-face-to-face SW online education program is effective in improving the computational thinking ability of elementary school students from the educational underprivileged class.

Development of Internet of Things Sensor-based Information System Robust to Security Attack (보안 공격에 강인한 사물인터넷 센서 기반 정보 시스템 개발)

  • Yun, Junhyeok;Kim, Mihui
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.95-107
    • /
    • 2022
  • With the rapid development of Internet of Things sensor devices and big data processing techniques, Internet of Things sensor-based information systems have been applied in various industries. Depending on the industry in which the information systems are applied, the accuracy of the information derived can affect the industry's efficiency and safety. Therefore, security techniques that protect sensing data from security attacks and enable information systems to derive accurate information are essential. In this paper, we examine security threats targeting each processing step of an Internet of Things sensor-based information system and propose security mechanisms for each security threat. Furthermore, we present an Internet of Things sensor-based information system structure that is robust to security attacks by integrating the proposed security mechanisms. In the proposed system, by applying lightweight security techniques such as a lightweight encryption algorithm and obfuscation-based data validation, security can be secured with minimal processing delay even in low-power and low-performance IoT sensor devices. Finally, we demonstrate the feasibility of the proposed system by implementing and performance evaluating each security mechanism.