• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.028 seconds

A Study of Unified Framework with Light Weight Artificial Intelligence Hardware for Broad range of Applications (다중 애플리케이션 처리를 위한 경량 인공지능 하드웨어 기반 통합 프레임워크 연구)

  • Jeon, Seok-Hun;Lee, Jae-Hack;Han, Ji-Su;Kim, Byung-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.969-976
    • /
    • 2019
  • A lightweight artificial intelligence hardware has made great strides in many application areas. In general, a lightweight artificial intelligence system consist of lightweight artificial intelligence engine and preprocessor including feature selection, generation, extraction, and normalization. In order to achieve optimal performance in broad range of applications, lightweight artificial intelligence system needs to choose a good preprocessing function and set their respective hyper-parameters. This paper proposes a unified framework for a lightweight artificial intelligence system and utilization method for finding models with optimal performance to use on a given dataset. The proposed unified framework can easily generate a model combined with preprocessing functions and lightweight artificial intelligence engine. In performance evaluation using handwritten image dataset and fall detection dataset measured with inertial sensor, the proposed unified framework showed building optimal artificial intelligence models with over 90% test accuracy.

Improving Fidelity of Synthesized Voices Generated by Using GANs (GAN으로 합성한 음성의 충실도 향상)

  • Back, Moon-Ki;Yoon, Seung-Won;Lee, Sang-Baek;Lee, Kyu-Chul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.1
    • /
    • pp.9-18
    • /
    • 2021
  • Although Generative Adversarial Networks (GANs) have gained great popularity in computer vision and related fields, generating audio signals independently has yet to be presented. Unlike images, an audio signal is a sampled signal consisting of discrete samples, so it is not easy to learn the signals using CNN architectures, which is widely used in image generation tasks. In order to overcome this difficulty, GAN researchers proposed a strategy of applying time-frequency representations of audio to existing image-generating GANs. Following this strategy, we propose an improved method for increasing the fidelity of synthesized audio signals generated by using GANs. Our method is demonstrated on a public speech dataset, and evaluated by Fréchet Inception Distance (FID). When employing our method, the FID showed 10.504, but 11.973 as for the existing state of the art method (lower FID indicates better fidelity).

A Development of Automatic Extraction System for Welding Inspection Information based on Shipbuilding and Maritime CAD (조선해양 CAD 기반 용접검사 정보 자동 추출 시스템 개발)

  • Kim, Bae-Sung;Hwang, Hun-Gyu;Song, Chang-Sub;Lee, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.28-36
    • /
    • 2020
  • In shipbuilding industry, there is conducting most of works by welding at the shipyard, and the volume of welding is increasing with international trends of green ships. Welding joint is guaranteed quality through non-destructive testing (NDT). The manual welding inspection report is produced by identifying the drawings designed, which results in losses the many workforce and occurs human errors. To solve these problems, this paper covers a system that reports on inspection information is automatically generation by input data based on shipbuilding-specific CAD. The developed system analyzes the shape data from drawings of modeling. Also, the system determines welding joints through expansion of the part boundary and generates tag numbers. In addition, it provides the function to automatically extract the information needed for inspection such as weld length, thickness and etc. We conducted test to verify the usefulness of the developed system and confirmed that the welding inspection information extracted through system matches the information shown in drawings of modeling.

Using Motivation of Short Video Advertising Marketing in China: An Exploratory Study of Douyin

  • Zeng, Nai
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.8
    • /
    • pp.229-237
    • /
    • 2021
  • This paper aims to study the using motivation and influencing factors of Chinese users' participation in live stream shopping through theoretical and empirical analysis, so as to evaluate the change in users' needs and improve marketing strategies. In doing so, I conducted a questionnaire survey for Chinese live stream shopping users and collected the required data. For empirical analysis, I used SPSS and AMOS software to carry out descriptive analysis, reliability and validity analysis and structural equation model analysis (SEM) to test the hypothesis. The results of the analysis showed that core competency and brand personality of the short video industry have a significant impact on user and customer perceived value, thus influencing users' using motivation. That is, users do not blindly follow live stream shopping but make their active choice. Therefore, it is suggested that live stream shopping platform should strengthen the e-commerce attributes and eradicate "the sense of false satisfaction", in order to achieve the effective communication of information. On the other hand, to stimulate the purchase motivation of users, the brand should build up its personality, and enhance user and customer perceived value in cyber marketing.

A Study on Method of Realtime Transcoding For N-Screen Environmenting (N-Screen 적응형 실시간 트랜스코딩 방법론에 관한 연구)

  • Lee, Jong-Ryun;Kang, Yi-Chul;Kim, Jong-Woo;Cho, Sung-woong
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.1483-1486
    • /
    • 2013
  • 최근 무선통신의 급격한 발전과 스마트 기기의 확산으로 인해 Tving, pooq 등 다양한 모바일 방송 서비스가 급속도로 증가하고 있다. 또한 다양한 영상처리 기법 등이 등장함에 따라 4K, 8K급의 UHD 동영상들이 속속들이 등장하고 있다. 이로 인해 트랜스코딩을 통해 가공되는 동영상의 포맷 및 해상도 또한 매우 다양해질 것으로 전망된다. 현재까지의 트랜스코딩 연구사례는 사용자의 이동환경을 고려한 안정적 QoS 보장 또는 서버의 부하를 줄이기 위한 분산처리 기법 등의 연구 위주로 진행되어 온 것이 현실이다. 하지만 상기 조건(adaptive streaming 및 서버부하 처리)들을 충족시키긴 위해선 보다 효율적인 트랜스코딩 시스템의 제공이 선행 되어야 할 것이다. 이에 따라 본 논문에서는 사용자 관점에서 보다 빨리 스트리밍 서비스를 제공 받기 위하여 우선순위 큐 알고리즘을 적용한 시스템을 설계 및 구현하였다. 검증을 위하여 4가지 콘테이너(.MOV, .FLV, .MKV, .AVI)를 실험대상으로 하였고, 비교 대상 트랜스코딩 시스템은 상용 스트리밍 서비스인 YouTube를 활용하였다. 성능 측정결과, 총 트랜스코딩 완료시간은 YouTube에 비해 41.61%로 시간이 단축되었다. 또한 모바일 TV시청자가 55%를 차지한다는 점을 고려하여 컨트롤 서버에서는 최단시간 서비스 제공을 위하여 저해상도부터 추출하여 스트리밍 서버를 통해 송출하도록 구현하였다. 본 연구결과는 트랜스코딩 성능개선 뿐만 아니라 모바일 대상자를 위한 맞춤형 서비스를 보다 빨리 제공할 수 있을 것이며, 그 수요는 점차 증대될 것으로 예상된다.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.

Development of small multi-copter system for indoor collision avoidance flight (실내 비행용 소형 충돌회피 멀티콥터 시스템 개발)

  • Moon, Jung-Ho
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.1
    • /
    • pp.102-110
    • /
    • 2021
  • Recently, multi-copters equipped with various collision avoidance sensors have been introduced to improve flight stability. LiDAR is used to recognize a three-dimensional position. Multiple cameras and real-time SLAM technology are also used to calculate the relative position to obstacles. A three-dimensional depth sensor with a small process and camera is also used. In this study, a small collision-avoidance multi-copter system capable of in-door flight was developed as a platform for the development of collision avoidance software technology. The multi-copter system was equipped with LiDAR, 3D depth sensor, and small image processing board. Object recognition and collision avoidance functions based on the YOLO algorithm were verified through flight tests. This paper deals with recent trends in drone collision avoidance technology, system design/manufacturing process, and flight test results.

A Modeling of Realtime Fuel Comsumption Prediction Using OBDII Data (OBDII 데이터 기반의 실시간 연료 소비량 예측 모델 연구)

  • Yang, Hee-Eun;Kim, Do-Hyun;Choe, Hoseop
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.2
    • /
    • pp.57-64
    • /
    • 2021
  • This study presents a method for realtime fuel consumption prediction using real data collected from OBDII. With the advent of the era of self-driving cars, electronic control units(ECU) are getting more complex, and various studies are being attempted to extract and analyze more accurate data from vehicles. But since ECU is getting more complex, it is getting harder to get the data from ECU. To solve this problem, the firmware was developed for acquiring accurate vehicle data in this study, which extracted 53,580 actual driving data sets from vehicles from January to February 2019. Using these data, the ensemble stacking technique was used to increase the accuracy of the realtime fuel consumption prediction model. In this study, Ridge, Lasso, XGBoost, and LightGBM were used as base models, and Ridge was used for meta model, and the predicted performance was MAE 0.011, RMSE 0.017.

A study on the application of blockchain technology to prevent duplicate supply and demand of similar welfare services (복지서비스 유사사업의 중복수급 방지를 위한 블록체인 기술 적용 연구)

  • Min, Youn A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.151-156
    • /
    • 2020
  • Various institutions provide various welfare-related services, and accordingly, the quantity and quality of welfare-related services are improved. Along with the improvement of welfare services, the rate of fraudulent and redundant supply and demand due to inappropriate applicants is also increasing. In particular, in the case of similarly promoted projects by various institutions, confirmation of duplicate applications may be insufficient due to system inconsistency between institutions and delays in qualification verification, which may result in duplicate supply and demand. In this paper, in order to prevent the redundant supply and demand related to welfare service similar projects in various institutions, the problem of data management and sharing between institutions was reviewed and a method of applying blockchain technology was proposed step by step. Through the proposal of this paper, transparent data management of recipients is possible, and through this, trust-based welfare benefit management will be possible.

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.