• Title/Summary/Keyword: End-Point Detection

Search Result 161, Processing Time 0.025 seconds

Extracting Beginning Boundaries for Efficient Management of Movie Storytelling Contents (스토리텔링 콘텐츠의 효과적인 관리를 위한 영화 스토리 발단부의 자동 경계 추출)

  • Park, Seung-Bo;You, Eun-Soon;Jung, Jason J.
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.279-292
    • /
    • 2011
  • Movie is a representative media that can transmit stories to audiences. Basically, a story is described by characters in the movie. Different from other simple videos, movies deploy narrative structures for explaining various conflicts or collaborations between characters. These narrative structures consist of 3 main acts, which are beginning, middle, and ending. The beginning act includes 1) introduction to main characters and backgrounds, and 2) conflicts implication and clues for incidents. The middle act describes the events developed by both inside and outside factors and the story dramatic tension heighten. Finally, in the end act, the events are developed are resolved, and the topic of story and message of writer are transmitted. When story information is extracted from movie, it is needed to consider that it has different weights by narrative structure. Namely, when some information is extracted, it has a different influence to story deployment depending on where it locates at the beginning, middle and end acts. The beginning act is the part that exposes to audiences for story set-up various information such as setting of characters and depiction of backgrounds. And thus, it is necessary to extract much kind information from the beginning act in order to abstract a movie or retrieve character information. Thereby, this paper proposes a novel method for extracting the beginning boundaries. It is the method that detects a boundary scene between the beginning act and middle using the accumulation graph of characters. The beginning act consists of the scenes that introduce important characters, imply the conflict relationship between them, and suggest clues to resolve troubles. First, a scene that the new important characters don't appear any more should be detected in order to extract a scene completed the introduction of them. The important characters mean the major and minor characters, which can be dealt as important characters since they lead story progression. Extra should be excluded in order to extract a scene completed the introduction of important characters in the accumulation graph of characters. Extra means the characters that appear only several scenes. Second, the inflection point is detected in the accumulation graph of characters. It is the point that the increasing line changes to horizontal line. Namely, when the slope of line keeps zero during long scenes, starting point of this line with zero slope becomes the inflection point. Inflection point will be detected in the accumulation graph of characters without extra. Third, several scenes are considered as additional story progression such as conflicts implication and clues suggestion. Actually, movie story can arrive at a scene located between beginning act and middle when additional several scenes are elapsed after the introduction of important characters. We will decide the ratio of additional scenes for total scenes by experiment in order to detect this scene. The ratio of additional scenes is gained as 7.67% by experiment. It is the story inflection point to change from beginning to middle act when this ratio is added to the inflection point of graph. Our proposed method consists of these three steps. We selected 10 movies for experiment and evaluation. These movies consisted of various genres. By measuring the accuracy of boundary detection experiment, we have shown that the proposed method is more efficient.

Serial Determinations of Serum Squamous Cell Carcinoma Antigen (SCC) during Radiotherapy for Uterine Cervix Cancer (자궁경부암에서 방사선치료 중 혈중 Squamous Cell Carcinoma Antigen 값의 변화)

  • Yun, Hyong-Geun;Park, Seok-Kun
    • Radiation Oncology Journal
    • /
    • v.19 no.2
    • /
    • pp.136-141
    • /
    • 2001
  • Purpose : To evaluate the significance of serum SCC for the monitoring of treatment response and the early detection of distant metastasis during radiotherapy (RT). Materials and Methods : In 13 patients with histologically proven primary squamous cell carcinoma of uterine cervix, serum SCC values were checked in pre-RT point, weekly during RT, and in post-RT point. Results : In 4 of 13 cases, metastasis appeared at the end of external RT, so that intracavitary radiation couldn't be peformed.01 these 4 cases,3 with elevated pre-RT SCC level, who resulted in lung metastasis on chest PA at the end of external RT showed decreased post-RT SCC value despite of metastasis. Of all 10 cases with elevated pre-RT SCC value (including 3 with metastasis at the end of external RT), SCC value was higher than pre-RT value in 7 at 9 Gy and the difference was statistically significant. At 18 Gy, SCC was higher in 4 and lower in 6 than pre-RT value. After 18 Gy, SCC value decreased continuously to the end of RT in all 10 cases. Conclusion : During RT, SCC value increased initially at 9 Gy. To 18 Gy, SCC value decreased to the nearly same with pre-RT value. After 18 Gy, to the end of RT, SCC value decreased continuously and normalized in completely responded cases. In cases with appearance of lung metastasis, SCC value also decreased with the disappearance of main mass of uterine cervix despite metastasis.

  • PDF

Research on Optimal Deployment of Sonobuoy for Autonomous Aerial Vehicles Using Virtual Environment and DDPG Algorithm (가상환경과 DDPG 알고리즘을 이용한 자율 비행체의 소노부이 최적 배치 연구)

  • Kim, Jong-In;Han, Min-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.2
    • /
    • pp.152-163
    • /
    • 2022
  • In this paper, we present a method to enable an unmanned aerial vehicle to drop the sonobuoy, an essential element of anti-submarine warfare, in an optimal deployment. To this end, an environment simulating the distribution of sound detection performance was configured through the Unity game engine, and the environment directly configured using Unity ML-Agents and the reinforcement learning algorithm written in Python from the outside communicated with each other and learned. In particular, reinforcement learning is introduced to prevent the accumulation of wrong actions and affect learning, and to secure the maximum detection area for the sonobuoy while the vehicle flies to the target point in the shortest time. The optimal placement of the sonobuoy was achieved by applying the Deep Deterministic Policy Gradient (DDPG) algorithm. As a result of the learning, the agent flew through the sea area and passed only the points to achieve the optimal placement among the 70 target candidates. This means that an autonomous aerial vehicle that deploys a sonobuoy in the shortest time and maximum detection area, which is the requirement for optimal placement, has been implemented.

Vehicle Detection and Ship Stability Calculation using Image Processing Technique (영상처리기법을 활용한 차량 검출 및 선박복원성 계산)

  • Kim, Deug-Bong;Heo, Jun-Hyeog;Kim, Ga-Lam;Seo, Chang-Beom;Lee, Woo-Jun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.7
    • /
    • pp.1044-1050
    • /
    • 2021
  • After the occurrence of several passenger ship accidents in Korea, various systems are being developed for passenger ship safety management. A total of 162 passenger ships operate along the coast of Korea, of which 105 (65 %) are car-ferries with open vehicle decks. The car-ferry has a navigation pattern that passes through 2 to 4 islands. Safety inspections at the departure point(home port) are carried out by the crew, the operation supervisor of the operation management office, and the maritime safety supervisor. In some cases, self-inspections are carried out for safety inspections at layovers. As with any system, there are institutional and practical limitations. To this end, this study was conducted to suggest a method of detecting a vehicle using image processing and linking it to the calculations for ship stability. For vehicle detection, a method using a difference image and one using machine learning were used. However, a limitation was observed in these methods that the vehicle could not be identified due to strong background lighting from the pier and the ship in the cases where the camera was backlit such as during sunset or at night. It appears necessary to secure sufficient image data and upgrade the program for stable image processing.

LiDAR Chip for Automated Geo-referencing of High-Resolution Satellite Imagery (라이다 칩을 이용한 고해상도 위성영상의 자동좌표등록)

  • Lee, Chang No;Oh, Jae Hong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.4_1
    • /
    • pp.319-326
    • /
    • 2014
  • The accurate geo-referencing processes that apply ground control points is prerequisite for effective end use of HRSI (High-resolution satellite imagery). Since the conventional control point acquisition by human operator takes long time, demands for the automated matching to existing reference data has been increasing its popularity. Among many options of reference data, the airborne LiDAR (Light Detection And Ranging) data shows high potential due to its high spatial resolution and vertical accuracy. Additionally, it is in the form of 3-dimensional point cloud free from the relief displacement. Recently, a new matching method between LiDAR data and HRSI was proposed that is based on the image projection of whole LiDAR data into HRSI domain, however, importing and processing the large amount of LiDAR data considered as time-consuming. Therefore, we wmotivated to ere propose a local LiDAR chip generation for the HRSI geo-referencing. In the procedure, a LiDAR point cloud was rasterized into an ortho image with the digital elevation model. After then, we selected local areas, which of containing meaningful amount of edge information to create LiDAR chips of small data size. We tested the LiDAR chips for fully-automated geo-referencing with Kompsat-2 and Kompsat-3 data. Finally, the experimental results showed one-pixel level of mean accuracy.

A Study of the Optical Fiber Sensor for sensing impact and pressure (광섬유를 이용한 충격 및 압력 센서에 관한 연구)

  • 양승국;조희제;이석정;전중성;오상기;김인수;오영환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.129-135
    • /
    • 2003
  • Optical fiber has many advantages, such as high reliability, long lifetime, immunity to the electromagnetic interference, high speed response and low cost. In this study, we proposed and developed an optical fiber impact and pressure sensor for prevention of accident which occurs in the automatic system or auto door. The principle of the sensor is to detect different optical intensity caused by variation of a speckle pattern due to the external perturbation. Speckle pattern appears at the end of a multimode fiber in which coherent beam propagates. The fabricated sensor in this study was tested. As a result of experiments, amplitude of the output signal isn't linear, but it has sufficient sensitivity for a sensor. Moreover, we can control sensitivity of the sensor by an amplifier at receiver. It has several advantages which are ability of detection at all point on the multimode fiber, large sensitive area, and many application areas for a sensing impact and pressure.

A study on the coordinates conversion procedures to activate the transformation of local into world geodetic reference system (세계측지계 전환활성화를 위한 변환방법 연구)

  • Hong, Chang-Ki;Kwon, Jay-Hyoun;Lee, Hyun-Jik;Lee, Won-Jin
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.1
    • /
    • pp.677-682
    • /
    • 2009
  • According to the revised law of survey, all the geographic information data including 1/1,000 digital topographic maps have to be converted to world geodetic reference system by the end of 2009. National Geographic Information Institute (NGII) formulated the policy to promote the conversion from local geodetic reference system to world geodetic reference system. However, the current conversion rate is lower than planned due to some impeding factors. Therefore, in this paper, those impeding factors are investigated and then efficient conversion strategies are established and provided. The research involves the validation of affine transformation, the determination of critical value for outlier detection and optimal number of common control points for coordinate conversion, and the treatment of old and new control points.

A Study on Network based Intelligent Intrusion Prevention model by using Fuzzy Cognitive Maps on Denial of Service Attack (서비스 거부 공격에서의 퍼지인식도를 이용한 네트워크기반의 지능적 침입 방지 모델에 관한 연구)

  • Lee, Se-Yul;Kim, Yong-Soo;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.148-153
    • /
    • 2003
  • A DoS(Denial of Service) attack appears in the form of the intrusion attempt and Syn Flooding attack is a typical example. The Syn Flooding attack takes advantage of the weak point of 3-way handshake between the end-points of TCP which is the connection-oriented transmission service and has the reliability This paper proposes a NIIP(Network based Intelligent Intrusion Prevention) model. This model captures and analyzes the packet informations for the detection of Syn Flooding attack. Using the result of analysis of decision module, the decision module, which utilizes FCM(Fuzzy Cognitive Maps), measures the degree of danger of the DoS and trains the response module to deal with attacks. This model is a network based intelligent intrusion prevention model that reduces or prevents the danger of Syn Flooding attack.

The Detection System for Hosts infected Malware through Behavior information of NAC post-connect (NAC 의 post-connect에서 행위정보를 사용한 악성코드 감염 호스트 탐지 시스템)

  • Han, Myung-Mook;Sun, Jong-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.91-98
    • /
    • 2010
  • NAC(Network Access Control) has been developed as a solution for the security of end-point user, to be a target computer of worm attack which does not use security patch of OS and install Anti-Virus, which spreads the viruses in the Intra-net. Currently the NAC products in market have a sufficient technology of pre-connect, but insufficient one of post-connect which detects the threats after the connect through regular authentication. Therefore NAC users have been suffered from Zero-day attacks and malware infection. In this paper, to solve the problems in the post-connect step we generate the normal behavior profiles using the traffic information of each host, host information through agent, information of open port and network configuration modification through network scanner addition to authentication of host and inspection of policy violation used before. Based on these we propose the system to detect the hosts infected malware.

  • PDF

A Study on the Travel Speed Estimation Using Bus Information (버스정보기반 통행속도 추정에 관한 연구)

  • Bin, Mi-Young;Moon, Ju-Back;Lim, Seung-Kook
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.4
    • /
    • pp.1-10
    • /
    • 2013
  • This study was conducted to investigate that bus information was used as an information of travel speed. To determine the travel speed on the road, bus information and the information collected from the point detector and the interval detection installed were compared. If bus information has the function of traffic information detector, can provide the travel speed information to road users. To this end, the model of recognizing the traffic patterns is necessary. This study used simple moving-average method, simple exponential smoothing method, Double moving average method, Double exponential smoothing method, ARIMA(Autoregressive integrated moving average model) as the existing methods rather than new approach methods. This study suggested the possibility to replace bus information system into other information collection system.