• Title/Summary/Keyword: 이벤트 추출

Search Result 218, Processing Time 0.027 seconds

Atrial Fibrillation Waveform Extraction Algorithm for Holter Systems (홀터 심전계를 위한 심방세동 신호 추출 알고리즘)

  • Lee, Jeon;Song, Mi-Hye;Lee, Kyoung-Joung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.3
    • /
    • pp.38-46
    • /
    • 2012
  • Atrial fibrillation is needed to be detected at paroxysmal stage and to be treated. But, paroxysmal atrial fibrillation ECG is hardly obtained with 12-lead electrocardiographs but Holter systems. Presently, the averaged beat subtraction(ABS) method is solely used to estimate atrial fibrillatory waves even with somewhat large residual error. As an alternative, in this study, we suggested an ESAF(event-synchronous adaptive filter) based algorithm, in which the AF ECG was treated as a primary input and event-synchronous impulse train(ESIT) as a reference. And, ESIT was generated so to be synchronized with the ventricular activity by detecting QRS complex. We tested proposed algorithm with simulated AF ECGs and real AF ECGs. As results, even with low computational cost, this ESAF based algorithm showed better performance than the ABS method and comparable performance to algorithm based on PCA(principal component analysis) or SVD(singular value decomposition). We also proposed an expanded version of ESAF for some AF ECGs with multi-morphologic ventricular activities and this also showed reasonable performance. Ultimately, with Holter systems including our proposed algorithm, atrial activity signal can be precisely estimated in real-time so that it will be possible to calculate atrial fibrillatory rate and to evaluate the effect of anti-arrhythmic drugs.

A Study for Filter and Signature on IDS (Feature Construction with Data Mining) (IDS에서 Filter 와 Signature 의 역할에 대한 연구 (Date Mining을 이용한 Feature Construction))

  • Lee, Jung-Hyun;Weon, Ill-Young;Lee, Chang-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1089-1092
    • /
    • 2001
  • IDS 에서 가장 중요한 것은 침입을 논리적으로 모델링하고, 이것을 센싱 할 수 있는 Filter 의 개발이며 Filter 에서 발생한 이벤트들에서 특정 공격 행위를 인식할 수 있는 신호인 Signature 의 정의를 통해 이벤트 스트림에서 Signature 를 자동으로 인식할 수 있는 방법에 대한 연구가 가장 핵심적이라고 할 수 있다. 본 논문은 이러한 filter 와 Signature 에서 사용할 수 있도록 특징들이 정의 되어있는 양식으로 원시 데이터로부터 profile 을 생성 filter 와 signature 에서 탐지할 수 있는 모듈을 적용할 수 있도록 네트웍과 host input stream 등의 raw audit data 에서 특징을 추출 Feature Construction 작성에 대한 연구이다.

  • PDF

Sports Highlight Abstraction (스포츠 하이라이트 생성)

  • Kim, Mi-Ho;Shin, Seong-Yoon;Jeon, Keun-Hwan;Rhee, Yang-Weon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1233-1236
    • /
    • 2001
  • 다양한 장르의 비디오 데이터에서 하이라이트를 생성하는 것은 짧게 요약된 하이라이트 비디오 신을 생성하고자 하는 멀티미디어 컨텐츠의 제작자나 사용자에게 중요한 역할을 제공한다. 본 논문에서는 새로운 비디오 하이라이트의 생성 방법과 내용 기반, 즉 이벤트 기반의 비디오 인덱싱 방법을 제시한다. 경기 종목으로는 골을 넣어 득점하는 축구, 농구 그리고 핸드볼을 대상으로 하였으며 골을 넣어 득점하는 하이라이트 샷을 추출하기 위해 이벤트 규칙을 사용하였다. 비디오 인덱싱에서는 비디오 데이터 자체의 시각적 정보와 캡션 정보를 모두 이용하였다.

  • PDF

A Systematic Evaluation of Intrusion Detection System based on Modeling Privilege Change Events of Users (사용자별 권한이동 이벤트 모델링기반 침입탐지시스템의 체계적인 평가)

  • 박혁장;정유석;노영주;조성배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.661-663
    • /
    • 2001
  • 침입탐지 시스템은 내부자의 불법적인 사용, 오용 또는 외부 침입자에 의한 중요 정보 유출 및 변경을 알아내는 것으로서 각 운영체제에서 사용자가 발생시킨 키워드, 시스템 호출, 시스템 로그, 사용시간, 네트워크 패킷 등의 분석을 통하여 침입여부를 결정한다. 본 논문에서 제안하는 침입탐지시스템은 권한 이동 관련 이벤트 추출 기법을 이용하여 사용자의 권한이 바뀌는 일정한 시점만큼 기록을 한 후 HMM모델에 적용시켜 평가한다. 기존 실험에서 보여주었던 데이터의 신뢰에 대한 단점을 보완하기 위해 다량의 정상행위 데이터와 많은 종류의 침입유형을 적용해 보았고, 그 밖에 몇 가지 단점들을 수정하여 기존 모델에 비해 향상된 성능을 보이는지를 평가하였다 실험 결과 호스트기반의 침입에 대해서 매우 좋은 탐지율을 보여 주었고 F-P error(false positive error) 또한 매우 낮은 수치를 보여 주었다.

  • PDF

The Development of the Automatic Demand Response Systems Based on SEP 2.0 for the Appliances's Energy Reduction on Smart Grid Environments (스마트 그리드 환경에서 가전기기의 에너지 저감을 위한 SEP 2.0 기반의 자동수요반응 시스템 개발)

  • Jung, Jin-uk;Kim, Su-hong;Jin, Kyo-hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1799-1807
    • /
    • 2016
  • In this paper, we propose the automatic demand response systems which reduce the electric power consumption for the period automatically distinct from the existing passive demand response that a subscriber directly controls the energy consumption. The proposed systems are based on SEP 2.0 and consist of the demand response management program, the demand response server, and the demand response client. The demand response program shows the current status of the electric power use to a subscriber and supports the function which the administrator enables to creates or cancels a demand response event. The demand response server transmits the demand response event received from the demand response management program to the demand response client through SEP 2.0 protocol, and it stores the metering data from the demand response client in a database. After extracting the data, such as the demand response the start time, the duration, the reduction level, the demand response client reduces the electric power consumption for the period.

ViStoryNet: Neural Networks with Successive Event Order Embedding and BiLSTMs for Video Story Regeneration (ViStoryNet: 비디오 스토리 재현을 위한 연속 이벤트 임베딩 및 BiLSTM 기반 신경망)

  • Heo, Min-Oh;Kim, Kyung-Min;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.3
    • /
    • pp.138-144
    • /
    • 2018
  • A video is a vivid medium similar to human's visual-linguistic experiences, since it can inculcate a sequence of situations, actions or dialogues that can be told as a story. In this study, we propose story learning/regeneration frameworks from videos with successive event order supervision for contextual coherence. The supervision induces each episode to have a form of trajectory in the latent space, which constructs a composite representation of ordering and semantics. In this study, we incorporated the use of kids videos as a training data. Some of the advantages associated with the kids videos include omnibus style, simple/explicit storyline in short, chronological narrative order, and relatively limited number of characters and spatial environments. We build the encoder-decoder structure with successive event order embedding, and train bi-directional LSTMs as sequence models considering multi-step sequence prediction. Using a series of approximately 200 episodes of kids videos named 'Pororo the Little Penguin', we give empirical results for story regeneration tasks and SEOE. In addition, each episode shows a trajectory-like shape on the latent space of the model, which gives the geometric information for the sequence models.

Functional Test Automation for Android GUI Widgets Using XML (XML을 이용한 안드로이드 GUI 위젯의 기능 테스트 자동화)

  • Ma, Yingzhe;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.19D no.2
    • /
    • pp.203-210
    • /
    • 2012
  • Capture-and-replay technique is a common automatic method for GUI testing. Testing applications on Android platform cannot use directly capture-and-replay technique due to the testing framework which is already set up and technical supported by Google and lack of automatic linking GUI elements to actions handling widget events. Without capture-and-replay testing tools testers must design and implement testing scenarios according to the specification, and make linking every GUI elements to event handling parts all by hand. This paper proposes a more improved and optimized approach than common capture-and-replay technique for automatic testing Android GUI widgets. XML is applied to extract GUI elements from applications based on tracing the actions to handle widget events. After tracing click events using monitoring in capture phase test cases will be created by communicating status of activated widget in replay phase with API events.

A Study on Smart Touch Projector System Technology Using Infrared (IR) Imaging Sensor (적외선 영상센서를 이용한 스마트 터치 프로젝터 시스템 기술 연구)

  • Lee, Kuk-Seon;Oh, Sang-Heon;Jeon, Kuk-Hui;Kang, Seong-Soo;Ryu, Dong-Hee;Kim, Byung-Gyu
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.870-878
    • /
    • 2012
  • Recently, very rapid development of computer and sensor technologies induces various kinds of user interface (UI) technologies based on user experience (UX). In this study, we investigate and develop a smart touch projector system technology on the basis of IR sensor and image processing. In the proposed system, a user can control computer by understanding the control events based on gesture of IR pen as an input device. In the IR image, we extract the movement (or gesture) of the devised pen and track it for recognizing gesture pattern. Also, to correct the error between the coordinate of input image sensor and display device (projector), we propose a coordinate correction algorithm to improve the accuracy of operation. Through this system technology as the next generation human-computer interaction, we can control the events of the equipped computer on the projected image screen without manipulating the computer directly.

Malicious App Discrimination Mechanism by Measuring Sequence Similarity of Kernel Layer Events on Executing Mobile App (모바일 앱 실행시 커널 계층 이벤트 시퀀스 유사도 측정을 통한 악성 앱 판별 기법)

  • Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.4
    • /
    • pp.25-36
    • /
    • 2017
  • As smartphone users have increased in recent years, various applications have been developed and used especially for Android-based mobile devices. However, malicious applications developed by attackers for malicious purposes are also distributed through 3rd party open markets, and damage such as leakage of personal information or financial information of users in mobile terminals is continuously increasing. Therefore, to prevent this, a method is needed to distinguish malicious apps from normal apps for Android-based mobile terminal users. In this paper, we analyze the existing researches that detect malicious apps by extracting the system call events that occur when the app is executed. Based on this, we propose a technique to identify malicious apps by analyzing the sequence similarity of kernel layer events occurring in the process of running an app on commercial Android mobile devices.

User Event-based Information Structure Modeling for Class Abstraction of Business System (사용자 이벤트 기반의 정보구조 모델링을 이용한 비즈니스 업무 분석에서의 클래스 추출 방법)

  • Lee Hye-Seon;Park Jai-Nyun
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1071-1078
    • /
    • 2005
  • Use case modeling is a widely used technique for functional requirements analysis of business system but it is difficult to identify a use cases at the right level and use case specifications are too long and confusing. It is also hard to determine a functional decomposition Phases·s of use cases. Therefore customer doesn't understand the use cases. This paper is defining concept of the Information Structure Modeling(ISM) and analyzing business system for the customer's perspective. ISM is an efficient mechanism for analyzing user requirements and for Identifying objects in a business system using Attribute Structure Diagram which is a major tool of the ISM that describes user event. This paper is also to show how the classes are classified and derived as event-asset-transaction type in ISM. It provides a user-friendly approach to visually representing business model.