• Title/Summary/Keyword: 경계탐지

Search Result 183, Processing Time 0.03 seconds

Coreference Resolution Pipeline Model using Mention Boundaries and Mention Pairs in Dialogues (대화 데이터셋에서 멘션 경계와 멘션 쌍을 이용한 상호참조해결 파이프라인 모델)

  • Damrin Kim;Seongsik Park;Harksoo Kim
    • Annual Conference on Human and Language Technology
    • /
    • 2022.10a
    • /
    • pp.307-312
    • /
    • 2022
  • 상호참조해결은 주어진 문서에서 멘션을 추출하고 동일한 개체의 멘션들을 군집화하는 작업이다. 기존 상호참조해결 연구의 멘션탐지 단계에서 진행한 가지치기는 모델이 계산한 점수를 바탕으로 순위화하여 정해진 비율의 멘션만을 상호참조해결에 사용하기 때문에 잘못 예측된 멘션을 입력하거나 정답 멘션을 제거할 가능성이 높다. 또한 멘션 탐지와 상호참조해결을 종단간 모델로 진행하여 학습 시간이 오래 걸리고 모델 복잡도가 높은 문제가 존재한다. 따라서 본 논문에서는 상호참조해결을 2단계 파이프라인 모델로 진행한다. 첫번째 멘션 탐지 단계에서 후보 단어 범위의 점수를 계산하여 멘션을 예측한다. 두번째 상호참조해결 단계에서는 멘션 탐지 단계에서 예측된 멘션을 그대로 이용해서 서로 상호참조 관계인 멘션 쌍을 예측한다. 실험 결과, 2단계 학습 방법을 통해 학습 시간을 단축하고 모델 복잡도를 축소하면서 종단간 모델과 유사한 성능을 유지하였다. 상호참조해결은 Light에서 68.27%, AMI에서 48.87%, Persuasion에서 69.06%, Switchboard에서 60.99%의 성능을 보였다.

  • PDF

Sonar System Application for detection of underwater work space boundary using seabed type underwater equipments (착저형 수중장비를 이용한 수중작업 시 작업경계면 인식을 위한 소나시스템 활용법)

  • Shin, Changjoo;Jang, In-Sung;Won, Deokhee;Seo, Jung-min;Baek, Won-Dae;Kim, Kihun;KIM, JONG HOON
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.678-684
    • /
    • 2016
  • The detection of an underwater work space boundary is very important when an underwater construction is carried out using seabed type underwater equipment, such as underwater machines for rubble mound leveling, because it can induce industrial disasters. Therefore, divers are needed to mark the underwater work space boundary. A nylon rope is used to improve the convenience during an underwater diver's work. The results showed that the work space boundary can be detected using a sonar system. Using these results, an efficient method to detect the underwater work space boundary can be obtained when an underwater construction is carried out using seabed type underwater equipment.

Fog Detection over the Korean Peninsula Derived from Satellite Observations of Polar-orbit (MODIS) and Geostationary (GOES-9) (극궤도(MODIS) 및 정지궤도(GOES-9) 위성 관측을 이용한 한반도에서의 안개 탐지)

  • Yoo, Jung-Moon;Yun, Mi-Young;Jeong, Myeong-Jae;Ahn, Myoung-Hwan
    • Journal of the Korean earth science society
    • /
    • v.27 no.4
    • /
    • pp.450-463
    • /
    • 2006
  • Seasonal threshold values for fog detection over the ten airport areas within the Korean Peninsula have been derived from the data of polar-orbit Aqua/Terra MODIS and geostationary GOES-9 during a two years. The values are obtained from reflectance at $0.65{\mu}m\;(R_{0.65})$ and the difference in brightness temperature between $3.7{\mu}m\;and\;11{\mu}m\;(T_{3.7-11})$. In order to examine the discrepancy between the threshold values of two kinds of satellites, the following four parameters have been analyzed under the condition of daytime/nighttime and fog/clear-sky, utilizing their simultaneous observations over the Seoul metropolitan area: brightness temperature at $3.7{\mu}m$, the temperature at $11{\mu}m,\;the\;T_{3.7-11}$ for day and night, and the $R_{0.65}$ for daytime. The parameters show significant correlations (r<0.5) in spatial distribution between the two kinds of satellites. The discrepancy between their infrared thresholds is mainly due to the disagreement in their spatial resolutions and spectral bands, particularly at $3.7{\mu}m$. Fog detection from GOES-9 over the nine airport areas except the Cheongju airport has revealed accuracy of 60% in the daytime and 70% in the nighttime, based on statistical verification. The accuracy decreases in foggy cases with twilight, precipitation, short persistence, or the higher cloud above fog. The sensitivity of radiance and reflectance with wavelength has been analyzed in numerical experiments with respect to various meteorological conditions to investigate optical characteristics of the three channels.

Development of Statistical Prediction Engine for Integrated Log Analysis Systems (통합 로그 분석 시스템을 위한 통계학적 예측 엔진 개발)

  • KO, Kwang-Man;Kwon, Beom-Chul;Kim, Sung-Chul;Lee, Sang-Jun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.638-639
    • /
    • 2013
  • Anymon Plus(ver 3.0)은 통합 로그 분석 시스템으로 대용량 로그 및 빅데이터의 실시간 수집 저장 분석할 수 있는 제품(초당 40,000 이벤트 처리)으로서, 방화벽 로그 분석을 통한 비정상 네트워크 행위 탐지, 웹 로그 분석을 통한 사용 패턴 분석, 인터넷 쇼핑몰 사기 주문 분석 및 탐지, 내부 정부 유출 분석 및 탐지 등과 같은 다양한 분야로 응용이 확대되고 있다. 본 논문에서는 보안관련 인프라 로그를 분석하고 예측하여 예상 보안사고 시기에 집중적 경계를 통한 선제적 대응을 모색하기 위해 통계적 이론에 기반한 통합 로그 분석 시스템을 개발하기 위해, 회귀분석 및 시계열 분석이 가능한 예측 엔진 시스템을 설계하고 구현한다.

Urban Change Detection for High-resolution Satellite Images using DeepLabV3+ (DeepLabV3+를 이용한 고해상도 위성영상에서의 도시 변화탐지)

  • Song, Chang-Woo;Wahyu, Wiratama
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.441-442
    • /
    • 2021
  • 본 논문에서는 고해상도의 시계열 위성영상을 딥러닝 알고리즘으로 학습하여 도시 변화탐지를 수행한다. 고해상도 위성영상을 활용한 서비스는 4 차 산업혁명 융합 신사업 중 하나인 스마트시티에 적용하여 도시 노후화, 교통 혼잡, 범죄 등 다양한 도시 문제 해결 및 효율적인 도시를 구축하는데 활용이 가능하다. 이에 본 연구에서는 도시 변화탐지를 위한 딥러닝 알고리즘으로 DeepLabV3+를 사용한다. 이는 인코더-디코더 구조로, 공간 정보를 점진적으로 회복함으로써 더욱 정확한 물체의 경계면을 찾을 수 있다. 제안하는 방법은 DeepLabV3+의 레이어와 loss function 을 수정하여 기존보다 좋은 결과를 얻었다. 객관적인 성능평가를 위해, 공개된 데이터셋 LEVIR-CD 으로 학습한 결과로 평균 IoU 는 0.87, 평균 Dice 는 0.93 을 얻었다.

Verification of Extended TRW Algorithm for DDoS Detection in SIP Environment (SIP 환경에서의 DDoS 공격 탐지를 위한 확장된 TRW 알고리즘 검증)

  • Yum, Sung-Yeol;Ha, Do-Yoon;Jeong, Hyun-Cheol;Park, Seok-Cheon
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.594-600
    • /
    • 2010
  • Many studies are DDoS in Internet network, but the study is the fact that is not enough in a voice network. Therefore, we designed the extended TRW algorithm that was a DDoS attack traffic detection algorithm for the voice network which used an IP data network to solve upper problems in this article and evaluated it. The algorithm that is proposed in this paper analyzes TRW algorithm to detect existing DDoS attack in Internet network and, design connection and end connection to apply to a voice network, define probability function to count this. For inspect the algorithm, Set a threshold and using NS-2 Simulator. We measured detection rate by an attack traffic type and detection time by attack speed. At the result of evaluation 4.3 seconds for detection when transmitted INVITE attack packets per 0.1 seconds and 89.6% performance because detected 13,453 packet with attack at 15,000 time when transmitted attack packet.

Generation of Sea Surface Temperature Products Considering Cloud Effects Using NOAA/AVHRR Data in the TeraScan System: Case Study for May Data (TeraScan시스템에서 NOAA/AVHRR 해수면온도 산출시 구름 영향에 따른 신뢰도 부여 기법: 5월 자료 적용)

  • Yang, Sung-Soo;Yang, Chan-Su;Park, Kwang-Soon
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.13 no.3
    • /
    • pp.165-173
    • /
    • 2010
  • A cloud detection method is introduced to improve the reliability of NOAA/AVHRR Sea Surface Temperature (SST) data processed during the daytime and nighttime in the TeraScan System. In daytime, the channels 2 and 4 are used to detect a cloud using the three tests, which are spatial uniformity tests of brightness temperature (infrared channel 4) and channel 2 albedo, and reflectivity threshold test for visible channel 2. Meanwhile, the nighttime cloud detection tests are performed by using the channels 3 and 4, because the channel 2 data are not available in nighttime. This process include the dual channel brightness temperature difference (ch3 - ch4) and infrared channel brightness temperature threshold tests. For a comparison of daytime and nighttime SST images, two data used here are obtained at 0:28 (UTC) and 21:00 (UTC) on May 13, 2009. 6 parameters was tested to understand the factors that affect a cloud masking in and around Korean Peninsula. In daytime, the thresholds for ch2_max cover a range 3 through 8, and ch4_delta and ch2_delta are fixed on 5 and 2, respectively. In nighttime, the threshold range of ch3_minus_ch4 is from -1 to 0, and ch4_delta and min_ch4_temp have the fixed thresholds with 3.5 and 0, respectively. It is acceptable that the resulted images represent a reliability of SST according to the change of cloud masking area by each level. In the future, the accuracy of SST will be verified, and an assimilation method for SST data should be tested for a reliability improvement considering an atmospheric characteristic of research area around Korean Peninsula.

Network Traffic-Based Access Control Using Software-Defined Perimeter (소프트웨어 정의 경계를 이용한 네트워크 트래픽 기반 동적 접근 제어)

  • Seo-Yi Kim;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.735-746
    • /
    • 2024
  • The rapid advancement of computer technology has necessitated a safer user environment, prompting the adoption of the zero trust model, which verifies all internal and external network activities. This paper proposes an efficient network traffic data-based dynamic access control method leveraging Software-Defined Perimeter (SDP) capabilities to implement zero trust and address latency issues. According to the performance evaluation results, the detection performance of the proposed scheme is similar to that of conventional schemes, but the dataset size was reduced by 62.47%. Additionally, by proposing an adaptive zero trust verification approach, the dataset size and verification time were reduced by 83.9% and 9.1%, respectively, while maintaining similar detection performance to conventional methods.

Automatic Fracture Detection in CT Scan Images of Rocks Using Modified Faster R-CNN Deep-Learning Algorithm with Rotated Bounding Box (회전 경계박스 기능의 변형 FASTER R-CNN 딥러닝 알고리즘을 이용한 암석 CT 영상 내 자동 균열 탐지)

  • Pham, Chuyen;Zhuang, Li;Yeom, Sun;Shin, Hyu-Soung
    • Tunnel and Underground Space
    • /
    • v.31 no.5
    • /
    • pp.374-384
    • /
    • 2021
  • In this study, we propose a new approach for automatic fracture detection in CT scan images of rock specimens. This approach is built on top of two-stage object detection deep learning algorithm called Faster R-CNN with a major modification of using rotated bounding box. The use of rotated bounding box plays a key role in the future work to overcome several inherent difficulties of fracture segmentation relating to the heterogeneity of uninterested background (i.e., minerals) and the variation in size and shape of fracture. Comparing to the commonly used bounding box (i.e., axis-align bounding box), rotated bounding box shows a greater adaptability to fit with the elongated shape of fracture, such that minimizing the ratio of background within the bounding box. Besides, an additional benefit of rotated bounding box is that it can provide relative information on the orientation and length of fracture without the further segmentation and measurement step. To validate the applicability of the proposed approach, we train and test our approach with a number of CT image sets of fractured granite specimens with highly heterogeneous background and other rocks such as sandstone and shale. The result demonstrates that our approach can lead to the encouraging results on fracture detection with the mean average precision (mAP) up to 0.89 and also outperform the conventional approach in terms of background-to-object ratio within the bounding box.

Refinement of Building Boundary using Airborne LiDAR and Airphoto (항공 LiDAR와 항공사진을 이용한 건물 경계 정교화)

  • Kim, Hyung-Tae;Han, Dong-Yeob
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.3
    • /
    • pp.136-150
    • /
    • 2008
  • Many studies have been carried out for automatic extraction of building by LiDAR data or airphoto. Combining the benefits of 3D location information data and shape information data of image can improve the accuracy. So, in this research building recognition algorithm based on contour was used to improve accuracy of building recognition by LiDAR data and elaborate building boundary recognition by airphoto. Building recognition algorithm based on contour can generate building boundary and roof structure information. Also it shows better accuracy of building detection than the existing recognition methods based on TIN or NDSM. Out of creating buffers in regular size on the building boundary which is presumed by contour, this research limits the boundary area of airphoto and elaborate building boundary to fit into edge of airphoto by double active contour. From the result of this research, 3D building boundary will be able to be detected by optimal matching on the constant range of extracted boundary in the future.

  • PDF