• Title/Summary/Keyword: 이미지 처리기법

Search Result 806, Processing Time 0.03 seconds

Real-scale Experiment for Breach Retardation Effect on the Levee treated with New Substance due to Overtopping (신소재 제방의 월류붕괴 지연효과에 대한 실규모 실험)

  • Ko, Dongwoo;Kang, Woochul;Kim, Jongmin;Kim, Sungjung;Kang, Joongu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.54-54
    • /
    • 2020
  • 본 연구에서는 제방의 세굴이나 붕괴를 방지하기 위해 바이오폴리머(Biopolymer) 기반 신소재를 활용한 흙 제방의 보강공법을 제시하였다. 바이오폴리머 기반 제방의 보강공법은 흙과 바이오폴리머를 소량만 섞어도 흙의 강도 증진시킴과 동시에 빗물에 대한 내침식성과 식생의 생장을 촉진하는 생태성도 뛰어나기 때문에 제방 사면을 보호할 수 있는 친환경적이고 효율적인 공법이다. 이에 안동하천연구센터는 실증실험을 통한 신소재 제방 보강공법의 안정성 검증을 목표로 2 건의 월류붕괴 실험을 수행하였다. 첫 번째는 흙 제방 조건(Case 1)이며, 두 번째는 바이오폴리머 혼합 토양을 사면에 도포한 후 식생이 활착된 조건(Case 2)이다. 제방 붕괴에 따른 수로 내 수위변화를 측정하기 위해 압력식 수위계를 설치하였으며, 영상분석을 위한 다수의 카메라 및 드론을 활용하여 실험의 전 과정을 실시간 촬영하였다. 또한, 제내지 측 사면을 대상으로 월류에 따른 붕괴 지연효과를 정량적으로 제시하기 위해 이미지 픽셀 변화 측정 기법을 통한 시간에 따른 표면 손실률을 산정하였다. 흙 제방과 신소재 처리 제방의 시간에 따른 표면손실률을 비교한 결과, Case 2의 사면손실률이 Case 1에 비해 약 1.5~2.3 배 지연되는 것을 확인하였다. 하지만 단일 조건만으로 실험군과 비교군의 붕괴지연 결과가 제방 성능을 평가함에 있어서 일반화될 수 없으므로 이러한 정량적 평가는 다소 한계가 있다. 향후 이러한 부족한 부분을 해결하기 위한 노력과 다양한 조건의 추가실험을 통한 계측 데이터 및 붕괴지연시간의 평균값을 도출하여 신소재 제방의 안정성을 평가하기 위한 타당한 결과를 도출할 예정이다.

  • PDF

Distance measurement System from detected objects within Kinect depth sensor's field of view and its applications (키넥트 깊이 측정 센서의 가시 범위 내 감지된 사물의 거리 측정 시스템과 그 응용분야)

  • Niyonsaba, Eric;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.279-282
    • /
    • 2017
  • Kinect depth sensor, a depth camera developed by Microsoft as a natural user interface for game appeared as a very useful tool in computer vision field. In this paper, due to kinect's depth sensor and its high frame rate, we developed a distance measurement system using Kinect camera to test it for unmanned vehicles which need vision systems to perceive the surrounding environment like human do in order to detect objects in their path. Therefore, kinect depth sensor is used to detect objects in its field of view and enhance the distance measurement system from objects to the vision sensor. Detected object is identified in accuracy way to determine if it is a real object or a pixel nose to reduce the processing time by ignoring pixels which are not a part of a real object. Using depth segmentation techniques along with Open CV library for image processing, we can identify present objects within Kinect camera's field of view and measure the distance from them to the sensor. Tests show promising results that this system can be used as well for autonomous vehicles equipped with low-cost range sensor, Kinect camera, for further processing depending on the application type when they reach a certain distance far from detected objects.

  • PDF

Design and Implementation of Automatic Linking Support System for Efficient Generating and Retrieving Integrated Documents Based on Web (웹 통합문서의 효율적 생성과 검색을 위한 자동링크지원 시스템의 설계 및 구축)

  • Lee, Won-Jung;Jung, Eun-Jae;Joo, Su-Chong;Lee, Seung-Yong
    • The KIPS Transactions:PartA
    • /
    • v.10A no.2
    • /
    • pp.93-100
    • /
    • 2003
  • With the advent of distributed computing and Web service technologies, lots of users have been requiring services that can conveniently obtain and/or support well-assembled information based on Web. For this reason, we are to construct Automatic Linking Support Systems for generating Web-based integrated information and supporting retrieval information according to user's various requirements. Our system organization is based on client/server system. A server environment consisted of automatic linking engine that can provide lexical analyzing, query processing and integrated document generating functions, and databases that are made of dictionaries, image and URL contents. Also, client environments consisted of Web editor that can generate integrated documents and Web helper that can retrieve them via automatic linking engine and databases. For client's user-friendly interfaces, web editor and helper programs can directly execute by down leading from a server without setup them before inside clients. For reducing server's overheads, Parts of server's executing modules are distributed to clients on which they can be executing. As an implementation of our system, we use the JDK 1.3, SWING for user interfaces like Web editor and helper, RMI mechanism for interaction between clients and a server, and SQL server 7.0 for database development, respectively. Finally, we showed the access procedures of automatic document linking engine and databases from Web editor or Web helper, and results appearing on their screens.

Watermarking Using Multiresolution Wavelet Transform and Image Fusion (다중 해상도 웨이블릿 변환과 영상 융합을 이용한 워터마킹)

  • Kim Dong-Hyun;Jun Kye-Suk;Lee Dae-Young
    • The KIPS Transactions:PartB
    • /
    • v.12B no.7 s.103
    • /
    • pp.729-736
    • /
    • 2005
  • In this paper. the proposed method for the digital watermarking is based on the multiresolution wavelet transform. The 1-level Discrete Wavelet Transform(DWT) coefficients of a $2N_{wx}{\times}2N_{wy}$ binary logo image used as a watermarks. The LL band and middle frequency band of the host image that the 3-level DWT has been performed are divided into $N_{wx}{\times}N_{wy}$ size and we use large coefficients at the divided blocks to make threshold. we set the thresholds that completely insert the watermark in each frequency of the host image. The thresholds in each frequency of the host image differ each other. The watermarks where is the same positions are added to the larger coefficients than threshold in the blocks at LL band and middle frequency band in order to prevent the quality deterioration of the host image. The watermarks are inserted in LL band and middle frequency band of the host image. In order to be invisibility of the watermark, the Human Visual System(HVS) is applied to the watermark. We prove the proper embedding method by experiment. We rapidly detect the watermark using this watermarking method. And because the small size watermarks are inserted by HVS, the results confirm the superiority of the proposed method on invisibility and robustness.

Non-face-to-face online home training application study using deep learning-based image processing technique and standard exercise program (딥러닝 기반 영상처리 기법 및 표준 운동 프로그램을 활용한 비대면 온라인 홈트레이닝 어플리케이션 연구)

  • Shin, Youn-ji;Lee, Hyun-ju;Kim, Jun-hee;Kwon, Da-young;Lee, Seon-ae;Choo, Yun-jin;Park, Ji-hye;Jung, Ja-hyun;Lee, Hyoung-suk;Kim, Joon-ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.577-582
    • /
    • 2021
  • Recently, with the development of AR, VR, and smart device technologies, the demand for services based on non-face-to-face environments is also increasing in the fitness industry. The non-face-to-face online home training service has the advantage of not being limited by time and place compared to the existing offline service. However, there are disadvantages including the absence of exercise equipment, difficulty in measuring the amount of exercise and chekcing whether the user maintains an accurate exercise posture or not. In this study, we develop a standard exercise program that can compensate for these shortcomings and propose a new non-face-to-face home training application by using a deep learning-based body posture estimation image processing algorithm. This application allows the user to directly watch and follow the trainer of the standard exercise program video, correct the user's own posture, and perform an accurate exercise. Furthermore, if the results of this study are customized according to their purpose, it will be possible to apply them to performances, films, club activities, and conferences

A Study on Body Image of Women Who Participate in Physical Exercise (스포츠 센터 운동 참여에 따른 여성의 신체이미지에 관한 연구)

  • Kang, Byeol-Nim
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.145-148
    • /
    • 2006
  • This study aimed at preventing women from suffering from health problems and stress due to excessive lookism and encouraging them to participate in sports activities to form desirable body image and eventually to live a healthy and sound life. To achieve this goal, this study formed a population with members of sports centers located in Seoul and Daejeon areas as of 2006 and made a sample of 450 participants in physical exercise at a sports center through stratified cluster random sampling and that of 450 non-participants through a survey with mothers and sisters of those students from elementary and secondary schools within the areas for sampling the participants' group, thereby analyzing the data on a total of 900 persons. A questionnaire was used as a tool to collect data; a reliability test presented weight-, health-, and figure-related factors as a=.807, a=.819, and a=.784, respectively. This study used such statistical analysis methods as t-test, One-way ANOVA, and the Analysis of Covariance to analyze data. This study produced the following conclusions through these research methods and procedure. Pticipation in physical exercise has a positive effect on body image. Pticipation in physical exercise at a sports center show higher satisfaction with body image than non-participats.

  • PDF

Host-Based Intrusion Detection Model Using Few-Shot Learning (Few-Shot Learning을 사용한 호스트 기반 침입 탐지 모델)

  • Park, DaeKyeong;Shin, DongIl;Shin, DongKyoo;Kim, Sangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.271-278
    • /
    • 2021
  • As the current cyber attacks become more intelligent, the existing Intrusion Detection System is difficult for detecting intelligent attacks that deviate from the existing stored patterns. In an attempt to solve this, a model of a deep learning-based intrusion detection system that analyzes the pattern of intelligent attacks through data learning has emerged. Intrusion detection systems are divided into host-based and network-based depending on the installation location. Unlike network-based intrusion detection systems, host-based intrusion detection systems have the disadvantage of having to observe the inside and outside of the system as a whole. However, it has the advantage of being able to detect intrusions that cannot be detected by a network-based intrusion detection system. Therefore, in this study, we conducted a study on a host-based intrusion detection system. In order to evaluate and improve the performance of the host-based intrusion detection system model, we used the host-based Leipzig Intrusion Detection-Data Set (LID-DS) published in 2018. In the performance evaluation of the model using that data set, in order to confirm the similarity of each data and reconstructed to identify whether it is normal data or abnormal data, 1D vector data is converted to 3D image data. Also, the deep learning model has the drawback of having to re-learn every time a new cyber attack method is seen. In other words, it is not efficient because it takes a long time to learn a large amount of data. To solve this problem, this paper proposes the Siamese Convolutional Neural Network (Siamese-CNN) to use the Few-Shot Learning method that shows excellent performance by learning the little amount of data. Siamese-CNN determines whether the attacks are of the same type by the similarity score of each sample of cyber attacks converted into images. The accuracy was calculated using Few-Shot Learning technique, and the performance of Vanilla Convolutional Neural Network (Vanilla-CNN) and Siamese-CNN was compared to confirm the performance of Siamese-CNN. As a result of measuring Accuracy, Precision, Recall and F1-Score index, it was confirmed that the recall of the Siamese-CNN model proposed in this study was increased by about 6% from the Vanilla-CNN model.

유리화 비정형 탄소(vitreous carbon)를 이용하여 제작한 전계방출 소자의 균일성 증진방법

  • 안상혁;이광렬
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 1999.07a
    • /
    • pp.53-53
    • /
    • 1999
  • 전계방출을 이용한 평판 표시장치는 CRT가 가진 장점을 모두 갖는 동시에 얇고 가벼우며 낮은 전력소모로 완벽한 색을 구현할 수 있는 차세대 표시장치로서 이에 대한 여국가 활발히 이루어지고 있다. 여기에 사용되는 음극물질로서 실리콘이나 몰리 등을 팁모양으로 제작하여 사용해 왔다. 하지만 잔류가스에 의한 역스퍼터링이나 화학적 반응에 의해서 전계방출 성능이 점차 저하되는 등의 해결해야할 많은 문제가 있다. 이러한 문제들을 해결하기 위하여 탄소계 재료로서 다이아몬드, 다이아몬드상 카본 등을 이용하려는 노력이 진행되어 왔다. 이중 유리화 비정형 탄소는 다량의 결함을 가지고 있는 유리질의 고상 탄소 재로로서, 전기전도도가 우수하면서 outgassing이 적고 기계적 강도가 뛰어나며 고온에서도 화학적으로 안정하여 전계방출 소자의 음극재료로서 알맞은 것으로 생각된다. 유리화 비정형 탄소가루를 전기영동법으로 기판에 코팅하여 전계방출 소자를 제작하였다. 전기영동 용액으로 이소프로필알코올에 질산마그네슘과 소량의 증류수, 유리화 비정형 탄소분말을 섞어주었고 기판으로는 몰리(Mo)가 증착된 유리를 사용하였다. 균일한 증착을 위해서 증착후 역전압을 걸어 주는 방법과 증착 후 플라즈마 처리를 하는 등의 여러 가지 방법을 사용했다. 전계방출 전류는 1$\times$10-7Torr이사에서 측정하였다. 1회 제작된 용액으로 반복해서 증착한 횟수에 따라 표면의 거치기, 입자의 분포, 전계방출 측정 결과 등의 차이가 관찰되었다. 발광이미지는 전압에 따라 변화하였고, 균일한 발광을 관찰하기 위해서 오랜 시간동안 aging 과정을 거쳐야 했다. 그리고 구 모양의 양극을 사용해서 위치를 변화시키며 시동 전기장을 관찰하여 위치에 따른 전계방출의 차이를 조사하여 발광의 균일성을 알 수 있었다.on microscopy로 분석하였으며 구조 분석은 X-선 회절분석, X-ray photoelectron spectroscopy 그리고Auger electron spectroscope로 하였다. 증착된 산화바나듐 박막의 전기화학적 특성을 분석하기 위하여 리튬 메탈을 anode로 하고 EC:DMC=1:1, 1M LiPF6 액체 전해질을 사용한 Half-Cell를 구성하여 200회 이상의 정전류 충 방전 시험을 행하였다. Half-Cell test 결과 박막의 결정성과 표면상태에 따라 매우 다른 전지 특성을 나타내었다.도상승율을 갖는 경우가 다른 베이킹 시나리오 모델에 비해 효과적이라 생각되며 초대 필요 공급열량은 200kW 정도로 산출되었다. 실질적인 수치를 얻기 위해 보다 고차원 모델로의 해석이 필요하리라 생각된다. 끝으로 장기적인 관점에서 KSTAR 장치의 베이킹 계획도 살펴본다.습파라미터와 더불어, 본 연구에서 새롭게 제시된 주기분할층의 파라미터들이 모형의 학습성과를 높이기 위해 함께 고려된다. 한편, 이러한 학습과정에서 추가적으로 고려해야 할 파라미터 갯수가 증가함에 따라서, 본 모델의 학습성과가 local minimum에 빠지는 문제점이 발생될 수 있다. 즉, 웨이블릿분석과 인공신경망모형을 모두 전역적으로 최적화시켜야 하는 문제가 발생한다. 본 연구에서는 이 문제를 해결하기 위해서, 최근 local minimum의 가능성을 최소화하여 전역적인 학습성과를 높여 주는 인공지능기법으로서 유전자알고리즘기법을 본 연구이 통합모델에 반영하였다. 이에 대한 실증사례 분석결과는 일일 환율예측문제를 적용하였을 경우, 기존의 방법론보다 더 나운 예측성과를 타나내었다.pective" to workflow architectural discussions. The vocabulary suggested

  • PDF

Home Network Observation System Using Activate Pattern Analysis of User and Multimedia Streaming (사용자의 행동 패턴 분석과 멀티미디어 스트리밍 기술을 이용한 홈 네트워크 감시 시스템)

  • Oh Dong-Yeol;Oh Hae-Seok;Sung Kyung-Sang
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1258-1268
    • /
    • 2005
  • While the concept of Home Network is laying by and its interests are increasing by means of digitalizing of the information communication infrastructure, many efforts are in progress toward convenient lives. Moreover, as information household appliances which have a junction of connecting to the network are appearing over the past a few years, the demands against intellectual Home Services are increasing. In this paper, by being based upon Multimedia which is an essential factor for developing of various application services on ubiquitous computing environments, we suggest a simplified application model that could apply the information to the automated processing system after studying user's behavior patterns using authentication and access control for identity certification of users. In addition, we compared captured video images in the fixed range by pixel unit through some time and checked disorder of them. And that made safe of user certification as adopting self-developed certification method which was used 'Hash' algorism through salt function of 12 byte. In order to show the usefulness of this proposed model, we did some testing by emulator for control of information after construction for Intellectual Multimedia Server, which ubiquitous network is available on as a scheme so as to check out developed applications. According to experimental results, it is very reasonable to believe that we could extend various multimedia applications in our daily lives.

  • PDF

Information Hiding Technique in Smart Phone for the Implementation of GIS Web-Map Service (GIS 웹 맵 서비스 구현을 위한 스마트 폰에서의 정보은닉 기법)

  • Kim, Jin-Ho;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.710-721
    • /
    • 2010
  • Recently, for the advancement of embedded technology about mobile device, a new kind of service, mash-up is appeared. It is service or application combining multimedia content making tool or device and web-GIS(geographic information system) service in the mobile environment. This service can be ease to use for casual user and can apply in various ways. So, It is served in web 2.0 environment actively. But, in the mashup service, because generated multimedia contents linked with web map are new type of multimedia contents which include user's migration routes in the space such as GPS coordinates. Thus, there are no protection ways for intellectual property created by GIS web-map service users and user's privacy. In this paper, we proposed a location and user information hiding scheme for GIS web-map service. This scheme embeds location and user information into a picture that is taken by camera module on the mobile phone. It is not only protecting way for user's privacy but is also tracing way against illegal photographer who is peeping person through hidden camera. And than, we also realized proposed scheme on the mobile smart phone. For minimizing margin of error about location coordinate value against contents manipulating attacks, GPS information is embedded into chrominance signal of contents considering weight of each digit about binary type of GPS coordinate value. And for tracing illegal photographer, user information such as serial number of mobile phone, phone number and photographing date is embedded into frequency spectrum of contents luminance signal. In the experimental results, we confirmed that the error of extracted information against various image processing attacks is within reliable tolerance. And after file format translation attack, we extracted embedded information from the attacked contents without no damage. Using similarity between extracted one and original templete, we also extracted whole information from damaged chrominance signal of contents by various image processing attacks.