• Title/Summary/Keyword: Computer application

Search Result 7,892, Processing Time 0.038 seconds

Application of Geo-Segment Anything Model (SAM) Scheme to Water Body Segmentation: An Experiment Study Using CAS500-1 Images (수체 추출을 위한 Geo-SAM 기법의 응용: 국토위성영상 적용 실험)

  • Hayoung Lee;Kwangseob Kim;Kiwon Lee
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.4
    • /
    • pp.343-350
    • /
    • 2024
  • Since the release of Meta's Segment Anything Model (SAM), a large-scale vision transformer generation model with rapid image segmentation capabilities, several studies have been conducted to apply this technology in various fields. In this study, we aimed to investigate the applicability of SAM for water bodies detection and extraction using the QGIS Geo-SAM plugin, which enables the use of SAM with satellite imagery. The experimental data consisted of Compact Advanced Satellite 500 (CAS500)-1 images. The results obtained by applying SAM to these data were compared with manually digitized water objects, Open Street Map (OSM), and water body data from the National Geographic Information Institute (NGII)-based hydrological digital map. The mean Intersection over Union (mIoU) calculated for all features extracted using SAM and these three-comparison data were 0.7490, 0.5905, and 0.4921, respectively. For features commonly appeared or extracted in all datasets, the results were 0.9189, 0.8779, and 0.7715, respectively. Based on analysis of the spatial consistency between SAM results and other comparison data, SAM showed limitations in detecting small-scale or poorly defined streams but provided meaningful segmentation results for water body classification.

An Application-Specific and Adaptive Power Management Technique for Portable Systems (휴대장치를 위한 응용프로그램 특성에 따른 적응형 전력관리 기법)

  • Egger, Bernhard;Lee, Jae-Jin;Shin, Heon-Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.8
    • /
    • pp.367-376
    • /
    • 2007
  • In this paper, we introduce an application-specific and adaptive power management technique for portable systems that support dynamic voltage scaling (DVS). We exploit both the idle time of multitasking systems running soft real-time tasks as well as memory- or CPU-bound code regions. Detailed power and execution time profiles guide an adaptive power manager (APM) that is linked to the operating system. A post-pass optimizer marks candidate regions for DVS by inserting calls to the APM. At runtime, the APM monitors the CPU's performance counters to dynamically determine the affinity of the each marked region. for each region, the APM computes the optimal voltage and frequency setting in terms of energy consumption and switches the CPU to that setting during the execution of the region. Idle time is exploited by monitoring system idle time and switching to the energy-wise most economical setting without prolonging execution. We show that our method is most effective for periodic workloads such as video or audio decoding. We have implemented our method in a multitasking operating system (Microsoft Windows CE) running on an Intel XScale-processor. We achieved up to 9% of total system power savings over the standard power management policy that puts the CPU in a low Power mode during idle periods.

Shape Scheme and Size Discrete Optimum Design of Plane Steel Trusses Using Improved Genetic Algorithm (개선된 유전자 알고리즘을 이용한 평면 철골트러스의 형상계획 및 단면 이산화 최적설계)

  • Kim, Soo-Won;Yuh, Baeg-Youh;Park, Choon-Wok;Kang, Moon-Myung
    • Journal of Korean Association for Spatial Structures
    • /
    • v.4 no.2 s.12
    • /
    • pp.89-97
    • /
    • 2004
  • The objective of this study is the development of a scheme and discrete optimum design algorithm, which is based on the genetic algorithm. The algorithm can perform both scheme and size optimum designs of plane trusses. The developed Scheme genetic algorithm was implemented in a computer program. For the optimum design, the objective function is the weight of structures and the constraints are limits on loads and serviceability. The basic search method for the optimum design is the genetic algorithm. The algorithm is known to be very efficient for the discrete optimization. However, its application to the complicated structures has been limited because of the extreme time need for a number of structural analyses. This study solves the problem by introducing the size & scheme genetic algorithm operators into the genetic algorithm. The genetic process virtually takes no time. However, the evolutionary process requires a tremendous amount of time for a number of structural analyses. Therefore, the application of the genetic algorithm to the complicated structures is extremely difficult, if not impossible. The scheme genetic algorithm operators was introduced to overcome the problem and to complement the evolutionary process. It is very efficient in the approximate analyses and scheme and size optimization of plane trusses structures and considerably reduces structural analysis time. Scheme and size discrete optimum combined into the genetic algorithm is what makes the practical discrete optimum design of plane fusses structures possible. The efficiency and validity of the developed discrete optimum design algorithm was verified by applying the algorithm to various optimum design examples: plane pratt, howe and warren truss.

  • PDF

Application of Modified Mupit for the Recurrent Vulva Cancer in Brachytherapy (재발한 Vulvar 종양의 근접치료 시 Modified Mupit Applicator의 적용)

  • Kim, Jong-Sik;Jung, Chun-Young;Oh, Dong-Gyoon;Song, Ki-Won;Park, Young-Hwan
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.18 no.1
    • /
    • pp.13-19
    • /
    • 2006
  • Purpose: To evaluate whether modified MUPIT applicator can effectively eradicate recurrent tumor in uterine cervix cancer and reduce rectal complication after complete radiation treatment. Materials and Methods: Modified MUPIT applicator basically consists of an acrylic cylinder with flexible brain applicator, an acrylic template with a predrilled array of holes that serve as guides for interstitial needles and interstitial needles. CT scan was peformed to determine tumor volume and the position of interstitial needles. Modified MUPIT applicator was applied to patient in operation room and the accuracy for position of interstitial needles in tumor volume was confirmed by CTscan. Brachytherapy was delivered using modified MUPIT applicator and RALS(192-lr HDR) after calculated computer planning by orthogonal film. The daily dose was 600cGy and the total dose was delivered 3,000 cGy in tumor volume by BID. Rectal dose was measured by TLD at 5 points so that evaluated the risk of rectal complication. Results: The application of modified MUPIT applicator improved dramatically dose distributions in tumor volume and follow-up of 3 month for this patient was clinically partial response without normal tissue complication, Rectal dose was measured 34.1 cGy, 57.1 cGy, 103.8 cGy, 162.7 cGy, 165.7 cGy at each points, especially the rectal dose including previous EBRT and ICR was 34.1 cGy, 57.1 cGy. Conclusion: Patients with locally recurrent tumor in uterine cervix cancel treated with modified MUPIT applicator can expect reasonable rates of local control. The advantages of the system are the fixed geometry provided by the template and cylinders. and improved dose distributions in irregular tumor volume without rectal complication.

  • PDF

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

A Computer Simulation for Small Animal Iodine-125 SPECT Development (소동물 Iodine-125 SPECT 개발을 위한 컴퓨터 시뮬레이션)

  • Jung, Jin-Ho;Choi, Yong;Chung, Yong-Hyun;Song, Tae-Yong;Jeong, Myung-Hwan;Hong, Key-Jo;Min, Byung-Jun;Choe, Yearn-Seong;Lee, Kyung-Han;Kim, Byung-Tae
    • The Korean Journal of Nuclear Medicine
    • /
    • v.38 no.1
    • /
    • pp.74-84
    • /
    • 2004
  • Purpose: Since I-125 emits low energy (27-35 keV) radiation, thinner crystal and collimator could be employed and, hence, it is favorable to obtain high quality images. The purpose of this study was to derive the optimized parameters of I-125 SPECT using a new simulation tool, GATE (Geant4 Application for Tomographic Emission). Materials and Methods: To validate the simulation method, gamma camera developed by Weisenberger et al. was modeled. Nal(T1) plate crystal was used and its thickness was determined by calculating detection efficiency. Spatial resolution and sensitivity curves were estimated by changing variable parameters for parallel-hole and pinhole collimator. Peformances of I-125 SPECT equipped with the optimal collimator were also estimated. Results: in the validation study, simulations were found to agree well with experimental measurements in spatial resolution (4%) and sensitivity (3%). In order to acquire 98% gamma ray detection efficiency, Nal(T1) thickness was determined to be 1 mm. Hole diameter (mm), length (mm) and shape were chosen to be 0.2:5:square and 0.5:10:hexagonal for high resolution (HR) and general purpose (GP) parallel-hole collimator, respectively. Hole diameter, channel height and acceptance angle of pinhole (PH) collimator were determined to be 0.25 mm, 0.1 mm and 90 degree. The spatial resolutions of reconstructed image of the I-125 SPECT employing HR:GP:PH were 1.2:1.7:0.8 mm. The sensitivities of HR:GP:PH were 39.7:71.9:5.5 cps/MBq. Conclusion: The optimal crystal and collimator parameters for I-125 Imaging were derived by simulation using GATE. The results indicate that excellent resolution and sensitivity imaging is feasible using I-125 SPECT.

Field-in-Field Technique to Improve Dose Distribution in the Junction of the Field with Head & Neck Cancer (Field-in-Field Technique을 이용한 두경부암의 접합부위 선량개선에 관한 고찰)

  • Kim, Seon-Myeong;Lee, Yeong-Cheol;Jeong, Deok-Yang;Kim, Young-Bum
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.21 no.1
    • /
    • pp.17-23
    • /
    • 2009
  • Purpose: In treating head and neck cancer, it is very important to irradiate uniform dose on the junction of the bilateral irradiation field of the upper head and neck and the anterior irradiation field of the lower neck. In order to improve dose distribution on the junction, this study attempted to correct non uniform dose resulting from under dose and over dose using the field-in-field technique in treating the anterior irradiation field of the lower neck and to apply the technique to the treatment of head and neck cancer through comparison with conventional treatment. Materials and Methods: In order to examine dose difference between the entry point and the exit point where beam diffusion happens in bilateral irradiation on the upper head and neck, we used an anthropomorphic phantom. Computer Tomography was applied to the anthropomorphic phantom, the dose of interest points was compared in radiation treatment planning, and it was corrected by calculating the dose ratio at the junction of the lower neck. Dose distribution on the junction of the irradiated field was determined by placing low-sensitivity film on the junction of the lower neck and measuring dose distribution on the conventional bilateral irradiation of the upper head and neck and on the anterior irradiation of the lower neck. In addition, using the field-in-field technique, which takes into account beam diffusion resulting from the bilateral irradiation of the upper head and neck, we measured difference in dose distribution on the junction in the anterior irradiation of the lower neck. In order to examine the dose at interest points on the junction, we compared and analyzed the change of dose at the interest points on the anthropomorphic phantom using a thermoluminescence dosimeter. Results: In case of dose sum with the bilateral irradiation of the upper head and neck when the field-in-field technique is applied to the junction of the lower neck in radiation treatment planning, The dose of under dose areas increased by 4.7~8.65%. The dose of over dose areas also decreased by 2.75~10.45%. Moreover, in the measurement using low-sensitivity film, the dose of under dose areas increased by 11.3%, and that of over dose areas decreased by 5.3%. In the measurement of interest point dose using a thermoluminescence dosimeter, the application of the field-in-field technique corrected under dose by minimum 7.5% and maximum 17.6%. Thus, with the technique, we could improve non.uniform dose distribution. Conclusion: By applying the field-in-field technique, which takes into account beam divergence in radiation treatment planning, we could reduce cold spots and hot spots through the correction of dose on the junction and, in particular, we could correct under dose at the entry point resulting from beam divergence. This study suggests that the clinical application of the field-in-field technique may reduce the risk of lymph node metastasis caused by under dose on the cervical lymph node.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Classifying Forest Habitat Types Based on Potential Polyclimax Vegetation (다극성상(多極盛相) 잠재식생개념(潜在植生槪念)에 의거(依據)한 삼림환경형(森林環境型) 분류(分類)에 관(關)한 연구(硏究))

  • Hong, Sung Cheon
    • Journal of Korean Society of Forest Science
    • /
    • v.78 no.2
    • /
    • pp.177-188
    • /
    • 1989
  • The habitat typing method of classification based on community has been developed on many forested areas in the ROCKY MOUNTAINS of WESTERN NORTH AMERICA, and is being used in providing an objective principle of guide for classification of forest sites, land classification, vertical distribution and multipurpose management of forest. I actually made a trial of forest habitat type classification - The methodology can be segmented into a number of tasks including reconnaissance, selection of stands to be sampled, location of plots, data gathering, preliminary and computer analysis, preparation of key- and map of habitat type and description for each habitat type in a view of forest management - on UNIVERSITY OF MONTANA FORESTS in order to examine whether its application is fit or not in korean forest circumstances : these are composed mainly of artificial forest and forest in the early stage of succession. The main results obtained from this study were summarized as follows 1. A hierarchical classification-Climax, Habitat type and Phases-of forest sites was developed using the habitat typing method of classification. 2. A diagnostic key is provided for field identification of the types based upon presence and number of indicator species, and forest managers could prepare a map of habitat type and classify forest habirat types by reference to it. 3. The classified habitat types were considered to be effective on providing an objective principle of guide for multipurpose management of forest including potential productivity for timber, feed productivity of forage and wildlife, selection of the right species in the right sites, application of method of treatment and so forth. 4. Forest habitat type classifications based upon extrapolation which used relict species and associated stands is considered to be suitable for korean forest circumstances and objective in studying potential vegetation, vertical and horizontal distribution of forest.

  • PDF

Deep Learning OCR based document processing platform and its application in financial domain (금융 특화 딥러닝 광학문자인식 기반 문서 처리 플랫폼 구축 및 금융권 내 활용)

  • Dongyoung Kim;Doohyung Kim;Myungsung Kwak;Hyunsoo Son;Dongwon Sohn;Mingi Lim;Yeji Shin;Hyeonjung Lee;Chandong Park;Mihyang Kim;Dongwon Choi
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.143-174
    • /
    • 2023
  • With the development of deep learning technologies, Artificial Intelligence powered Optical Character Recognition (AI-OCR) has evolved to read multiple languages from various forms of images accurately. For the financial industry, where a large number of diverse documents are processed through manpower, the potential for using AI-OCR is great. In this study, we present a configuration and a design of an AI-OCR modality for use in the financial industry and discuss the platform construction with application cases. Since the use of financial domain data is prohibited under the Personal Information Protection Act, we developed a deep learning-based data generation approach and used it to train the AI-OCR models. The AI-OCR models are trained for image preprocessing, text recognition, and language processing and are configured as a microservice architected platform to process a broad variety of documents. We have demonstrated the AI-OCR platform by applying it to financial domain tasks of document sorting, document verification, and typing assistance The demonstrations confirm the increasing work efficiency and conveniences.