• Title/Summary/Keyword: Convergence technique

Search Result 2,405, Processing Time 0.032 seconds

Evaluation Method of Structural Safety using Gated Recurrent Unit (Gated Recurrent Unit 기법을 활용한 구조 안전성 평가 방법)

  • Jung-Ho Kang
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.1
    • /
    • pp.183-193
    • /
    • 2024
  • Recurrent Neural Network technology that learns past patterns and predicts future patterns using technology for recognizing and classifying objects is being applied to various industries, economies, and languages. And research for practical use is making a lot of progress. However, research on the application of Recurrent Neural Networks for evaluating and predicting the safety of mechanical structures is insufficient. Accurate detection of external load applied to the outside is required to evaluate the safety of mechanical structures. Learning of Recurrent Neural Networks for this requires a large amount of load data. This study applied the Gated Recurrent Unit technique to examine the possibility of load learning and investigated the possibility of applying a stacked Auto Encoder as a way to secure load data. In addition, the usefulness of learning mechanical loads was analyzed with the Gated Recurrent Unit technique, and the basic setting of related functions and parameters was proposed to secure accuracy in the recognition and prediction of loads.

Effect of Drug Eluting Uniformity for Biodegradable Stent by Solid Freeform Fabrication (쾌속조형기법을 이용한 생분해성 스텐트용 메쉬필름의 약물방출거동 효과)

  • Cheong, Sin Young;Kim, Yang Eun;Koh, Young Joo;Shin, Wang Soo;Lee, Jun Hee;Kim, Wan Doo;Yoo, Young Eun;Park, Su A
    • Polymer(Korea)
    • /
    • v.38 no.1
    • /
    • pp.93-97
    • /
    • 2014
  • Biodegradable drug-eluting stent has dual functions of supporting the lumen and treating internal tumor preventing the restenosis by releasing drug. In this study, the polycaprolactone (PCL) based three dimensional (3D) mesh loaded with paclitaxel (PTX) was presented by rapid prototyping (RP) technique of solid freeform fabrication (SFF) for biodegradable drug-eluting stent application. PCL has many advantageous properties such as good biocompatibility, good mechanical properties, and good drug permeability. PTX is widely used in the cancer treatment by inhibiting tumor cell proliferation. Analytical methods of HPLC and NMR were used for simultaneous quantification of PTX. Scanning electron microscopy (SEM) was performed to observe the architecture and morphologies of 3D mesh. The cytotoxicity assay results indicated released PTX's biological activity. This study provided that PCL based 3D mesh loaded with PTX by RP technique has great potential for biodegradable drug-eluting stent application.

Design and Development of T-DMB Multichannel Audio Service System Based on Spatial Audio Coding

  • Lee, Yong-Ju;Seo, Jeong-Il;Beack, Seung-Kwon;Jang, Dae-Young;Kang, Kyeong-Ok;Kim, Jin-Woong;Hong, Jin-Woo
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.365-375
    • /
    • 2009
  • In this paper, a terrestrial digital multimedia broadcasting (T-DMB) multichannel audio broadcasting system based on spatial audio coding is presented. The proposed system provides realistic multichannel audio service via T-DMB with a small increase of data rate as well as backward compatibility with the conventional stereo-based T-DMB player. To reduce the data rate for additional multichannel audio signals, we compress the multichannel audio signals using the sound source location cue coding algorithm, which is an efficient parametric multichannel audio compression technique. For compatibility, we use the dependent property of an elementary stream descriptor, and this property should be ignored in a conventional T-DMB player. To verify the feasibility of the proposed system, we implement the T-DMB multichannel audio encoder and a prototype player. We perform a compatibility test using the T-DMB multichannel audio encoder and conventional T-DMB players. The test demonstrates that the proposed system is compatible with a conventional T-DMB player and that it can provide a promisingly rich audio service.

A New Convergence Acceleration Technique for Scramjet Flowfields

  • Bernard Parent;Jeung, In-Seuck
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2004.03a
    • /
    • pp.15-25
    • /
    • 2004
  • This paper outlines a new convergence acceleration de-signed to solve scramjet flowfields with zones of re-circulation. Named the “marching-window”, the algorithm consists of performing pseudo-time iterations on a minimal width subdomain composed of a sequence of cross-stream planes of nodes. The upstream boundary of the subdomain is positioned such that all nodes upstream exhibit a residual smaller than the user-specified convergence threshold. The advancement of the downstream boundary follows the advancement of the upstream boundary, except in zones of significant streamwise ellipticity where a streamwise ellipticity sensor ensures its continuous progress. Compared to the standard pseudo-time marching approach, the march-ing-window is here seen to decrease the work required for convergence by up to 24 times for supersonic flows with little streamwise ellipticity and by up to 8 times for supersonic flows with large streamwise separated regions. The memory requirements are observed to be reduced sixfold by not allocating memory to the nodes not included in the computational subdomain. The marching-window satisfies the same convergence criterion as the standard pseudo-time stepping methods, hence resulting in the same converged solution within the tolerance of the user-specified convergence threshold. The extension of the marching-window to the weakly-ionized Navier-Stokes equations is also discussed.

  • PDF

Accuracy Improvement of Pig Detection using Image Processing and Deep Learning Techniques on an Embedded Board (임베디드 보드에서 영상 처리 및 딥러닝 기법을 혼용한 돼지 탐지 정확도 개선)

  • Yu, Seunghyun;Son, Seungwook;Ahn, Hanse;Lee, Sejun;Baek, Hwapyeong;Chung, Yongwha;Park, Daihee
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.4
    • /
    • pp.583-599
    • /
    • 2022
  • Although the object detection accuracy with a single image has been significantly improved with the advance of deep learning techniques, the detection accuracy for pig monitoring is challenged by occlusion problems due to a complex structure of a pig room such as food facility. These detection difficulties with a single image can be mitigated by using a video data. In this research, we propose a method in pig detection for video monitoring environment with a static camera. That is, by using both image processing and deep learning techniques, we can recognize a complex structure of a pig room and this information of the pig room can be utilized for improving the detection accuracy of pigs in the monitored pig room. Furthermore, we reduce the execution time overhead by applying a pruning technique for real-time video monitoring on an embedded board. Based on the experiment results with a video data set obtained from a commercial pig farm, we confirmed that the pigs could be detected more accurately in real-time, even on an embedded board.

Structural parameter estimation combining domain decomposition techniques with immune algorithm

  • Rao, A. Rama Mohan;Lakshmi, K.
    • Smart Structures and Systems
    • /
    • v.8 no.4
    • /
    • pp.343-365
    • /
    • 2011
  • Structural system identification (SSI) is an inverse problem of difficult solution. Currently, difficulties lie in the development of algorithms which can cater to large size problems. In this paper, a parameter estimation technique based on evolutionary strategy is presented to overcome some of the difficulties encountered in using the traditional system identification methods in terms of convergence. In this paper, a non-traditional form of system identification technique employing evolutionary algorithms is proposed. In order to improve the convergence characteristics, it is proposed to employ immune algorithms which are proved to be built with superior diversification mechanism than the conventional evolutionary algorithms and are being used for several practical complex optimisation problems. In order to reduce the number of design variables, domain decomposition methods are used, where the identification process of the entire structure is carried out in multiple stages rather than in single step. The domain decomposition based methods also help in limiting the number of sensors to be employed during dynamic testing of the structure to be identified, as the process of system identification is carried out in multiple stages. A fifteen storey framed structure, truss bridge and 40 m tall microwave tower are considered as a numerical examples to demonstrate the effectiveness of the domain decomposition based structural system identification technique using immune algorithm.

Study on the scheme to reinforce military security system based on location information (위치정보를 이용한 군 보안체계 강화 방안)

  • Kim, Yun Young;Namkung, Seung Pil
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.83-90
    • /
    • 2015
  • Current PKI system will confront more dangerous elements in the wireless network. Accordingly, this study suggests a plan to strengthen authentication system plan with using access control and encryption to the location. Locational information collecting devices such as GPS and sensor are utilized to create a new key for authentication and collect locational information. Such a key encodes data and creates an authentication code for are access control. By using the method suggested by this study, it is possible to control access of a military secret from unauthorized place and to protect unauthorized user with unproposed technique. In addition, this technique enables access control by stage with utilizing the existing PKI system more wisely.

Hidden Indicator Based PIN-Entry Method Using Audio Signals

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.2
    • /
    • pp.91-96
    • /
    • 2017
  • PIN-entry interfaces have high risks to leak secret values if the malicious attackers perform shoulder-surfing attacks with advanced monitoring and observation devices. To make the PIN-entry secure, many studies have considered invisible radio channels as a secure medium to deliver private information. However, the methods are also vulnerable if the malicious adversaries find a hint of secret values from user's $na{\ddot{i}}ve$ gestures. In this paper, we revisit the state-of-art radio channel based bimodal PIN-entry method and analyze the information leakage from the previous method by exploiting the sight tracking attacks. The proposed sight tracking attack technique significantly reduces the original password complexities by 93.8% after post-processing. To keep the security level strong, we introduce the advanced bimodal PIN-entry technique. The new technique delivers the secret indicator information through a secure radio channel and the smartphone screen only displays the multiple indicator options without corresponding numbers. Afterwards, the users select the target value by following the circular layout. The method completely hides the password and is secure against the advanced shoulder-surfing attacks.

Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique (사회공학기법을 이용한 피싱 공격 분석 및 대응기술)

  • Lee, Dong-Hwi;Choi, Kyong-Ho;Lee, Dong-Chun;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.171-177
    • /
    • 2006
  • The hacking aspect of recent times is changing, the phishing attack which uses a social engineering technique is becoming the threat which is serious in Information Security. It cheats the user and it acquires a password or financial information of the individual and organization. The phishing attack uses the home page which is fabrication and E-mail and acquires personal information which is sensitive and financial information. This study proposes the establishment of National Fishing Response Center, complement of relation legal system Critical intelligence distribution channel of individual and enterprise.

  • PDF

A Study on DDoS Detection Technique based on Cluster in Mobile Ad-hoc Network (무선 애드혹 망에서 클러스터 기반 DDoS 탐지 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.25-30
    • /
    • 2011
  • MANET has a weak construction in security more because it is consisted of only moving nodes and doesn't have central management system. The DDoS attack is a serious attack among these attacks which threaten wireless network. The DDoS attack has various object and trick and become intelligent. In this paper, we propose the technique to raise DDoS detection rate by classifying abnormal traffic pattern. Cluster head performs sentinel agent after nodes which compose MANET are made into cluster. The decision tree is applied to detect abnormal traffic pattern after the sentinel agent collects all traffics and it judges traffic pattern and detects attack also. We confirm high attack detection rate of proposed detection technique in this study through experimentation.