• Title/Summary/Keyword: Paper Similarity Test

Search Result 216, Processing Time 0.027 seconds

Image Segmentation Algorithm for Fish Object Extraction (어류객체 추출을 위한 영상분할 알고리즘)

  • Ahn, Soo-Hong;Oh, Jeong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1819-1826
    • /
    • 2010
  • This paper proposes the image segmentation algorithm to extracts a fish object from a fish image for fish image retrieval. The conventional algorithm using gray level similarity causes wrong image segmentation result in the boundary area of the object and the background with similar gray level. The proposed algorithm uses the reinforced edge and the adaptive block-based threshold for the boundary area with weak contrast and the virtual object to improve the eroded or disconnected object in the boundary area without contrast. The simulation results show that the percentage of extracting the visual-fine object from the test images is under 90% in the conventional algorithm while it is 97.7% in the proposed algorithms.

Boosting the Reasoning-Based Approach by Applying Structural Metrics for Ontology Alignment

  • Khiat, Abderrahmane;Benaissa, Moussa
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.834-851
    • /
    • 2017
  • The amount of sources of information available on the web using ontologies as support continues to increase and is often heterogeneous and distributed. Ontology alignment is the solution to ensure semantic interoperability. In this paper, we describe a new ontology alignment approach, which consists of combining structure-based and reasoning-based approaches in order to discover new semantic correspondences between entities of different ontologies. We used the biblio test of the benchmark series and anatomy series of the Ontology Alignment Evaluation Initiative (OAEI) 2012 evaluation campaign to evaluate the performance of our approach. We compared our approach successively with LogMap and YAM++ systems. We also analyzed the contribution of our method compared to structural and semantic methods. The results obtained show that our performance provides good performance. Indeed, these results are better than those of the LogMap system in terms of precision, recall, and F-measure. Our approach has also been proven to be more relevant than YAM++ for certain types of ontologies and significantly improves the structure-based and reasoningbased methods.

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

Generation of contrast enhanced computed tomography image using deep learning network

  • Woo, Sang-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.41-47
    • /
    • 2019
  • In this paper, we propose a application of conditional generative adversarial network (cGAN) for generation of contrast enhanced computed tomography (CT) image. Two types of CT data which were the enhanced and non-enhanced were used and applied by the histogram equalization for adjusting image intensities. In order to validate the generation of contrast enhanced CT data, the structural similarity index measurement (SSIM) was performed. Prepared generated contrast CT data were analyzed the statistical analysis using paired sample t-test. In order to apply the optimized algorithm for the lymph node cancer, they were calculated by short to long axis ratio (S/L) method. In the case of the model trained with CT data and their histogram equalized SSIM were $0.905{\pm}0.048$ and $0.908{\pm}0.047$. The tumor S/L of generated contrast enhanced CT data were validated similar to the ground truth when they were compared to scanned contrast enhanced CT data. It is expected that advantages of Generated contrast enhanced CT data based on deep learning are a cost-effective and less radiation exposure as well as further anatomical information with non-enhanced CT data.

Experimental study on the asymmetric impact loads and hydroelastic responses of a very large container ship

  • Lin, Yuan;Ma, Ning;Gu, Xiechong;Wang, Deyu
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.226-240
    • /
    • 2020
  • This paper presents an experimental investigation of asymmetric impact effects on hydroelastic responses. A 1:64 scaled segmented ship model with U-shape open cross-section backbone was newly designed to meet elastic similarity conditions of vertical, horizontal and torsional stiffness simultaneously. Different wave heading angles and wavelengths were adopted in regular wave test. In head wave condition, parametric rolling phenomena happened along with asymmetric slamming forces, the relationship between them was disclosed at first time. The impact forces on starboard and port sides showed alternating asymmetric periodic changes. In oblique wave condition, nonlinear springing and whipping responses were found. Since slamming phenomena occurred, high-frequency bending moments became an important part in total bending moments and whipping responses were found in small wavelength. The wavelength and head angle are varied to elucidate the relationship of springing/whipping loads and asymmetric impact. The distributions of peaks of horizontal and torsional loads show highly asymmetric property.

A study on road damage detection for safe driving of autonomous vehicles based on OpenCV and CNN

  • Lee, Sang-Hyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.47-54
    • /
    • 2022
  • For safe driving of autonomous vehicles, road damage detection is very important to lower the potential risk. In order to ensure safety while an autonomous vehicle is driving on the road, technology that can cope with various obstacles is required. Among them, technology that recognizes static obstacles such as poor road conditions as well as dynamic obstacles that may be encountered while driving, such as crosswalks, manholes, hollows, and speed bumps, is a priority. In this paper, we propose a method to extract similarity of images and find damaged road images using OpenCV image processing and CNN algorithm. To implement this, we trained a CNN model using 280 training datasheets and 70 test datasheets out of 350 image data. As a result of training, the object recognition processing speed and recognition speed of 100 images were tested, and the average processing speed was 45.9 ms, the average recognition speed was 66.78 ms, and the average object accuracy was 92%. In the future, it is expected that the driving safety of autonomous vehicles will be improved by using technology that detects road obstacles encountered while driving.

Image Retrieval Based on the Weighted and Regional Integration of CNN Features

  • Liao, Kaiyang;Fan, Bing;Zheng, Yuanlin;Lin, Guangfeng;Cao, Congjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.894-907
    • /
    • 2022
  • The features extracted by convolutional neural networks are more descriptive of images than traditional features, and their convolutional layers are more suitable for retrieving images than are fully connected layers. The convolutional layer features will consume considerable time and memory if used directly to match an image. Therefore, this paper proposes a feature weighting and region integration method for convolutional layer features to form global feature vectors and subsequently use them for image matching. First, the 3D feature of the last convolutional layer is extracted, and the convolutional feature is subsequently weighted again to highlight the edge information and position information of the image. Next, we integrate several regional eigenvectors that are processed by sliding windows into a global eigenvector. Finally, the initial ranking of the retrieval is obtained by measuring the similarity of the query image and the test image using the cosine distance, and the final mean Average Precision (mAP) is obtained by using the extended query method for rearrangement. We conduct experiments using the Oxford5k and Paris6k datasets and their extended datasets, Paris106k and Oxford105k. These experimental results indicate that the global feature extracted by the new method can better describe an image.

Dual Branched Copy-Move Forgery Detection Network Using Rotation Invariant Energy in Wavelet Domain (웨이블릿 영역에서 회전 불변 에너지 특징을 이용한 이중 브랜치 복사-이동 조작 검출 네트워크)

  • Jun Young, Park;Sang In, Lee;Il Kyu, Eom
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.17 no.6
    • /
    • pp.309-317
    • /
    • 2022
  • In this paper, we propose a machine learning-based copy-move forgery detection network with dual branches. Because the rotation or scaling operation is frequently involved in copy-move forger, the conventional convolutional neural network is not effectively applied in detecting copy-move tampering. Therefore, we divide the input into rotation-invariant and scaling-invariant features based on the wavelet coefficients. Each of the features is input to different branches having the same structure, and is fused in the combination module. Each branch comprises feature extraction, correlation, and mask decoder modules. In the proposed network, VGG16 is used for the feature extraction module. To check similarity of features generated by the feature extraction module, the conventional correlation module used. Finally, the mask decoder model is applied to develop a pixel-level localization map. We perform experiments on test dataset and compare the proposed method with state-of-the-art tampering localization methods. The results demonstrate that the proposed scheme outperforms the existing approaches.

Study of Economic Storage Method for Differential ECT Signals (차동형 와전류신호의 경제적 저장법 연구)

  • Lee, Chang-Jun;Lee, Jin-Ho;Shin, Young-Kil
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.3
    • /
    • pp.253-258
    • /
    • 2004
  • To get accurate information about the defect from the test signal, NDT engineers should have a good knowledge on forward problems. Such knowledge is usually obtained by a lot of testing experiences. Another why of obtaining such knowledge is to build a database containing lots of defect information and their corresponding signals. However, the archiving of raw test data would require a lot of storage space. In this paper, an economic way of storing signals is studied by using Fourier descriptors. Instead of saving raw signal data, Fourier descriptors are saved and the storage spare is reduced. Of course, the defect signal can be reconstructed from the stored descriptors. By using differential ECT signals produced by numerical modeling and experiment, the savings of 85% from the original signal and $57{\sim}65%$ from the filtered signal in the storage space were confirmed. The similarity of the reconstructed signal and the original signal was also demonstrated. This Fourier descriptor approach could contribute significantly in building differential signal databases.

A Method for Detecting Program Plagiarism Comparing Class Structure Graphs (클래스 구조 그래프 비교를 통한 프로그램 표절 검사 방법)

  • Kim, Yeoneo;Lee, Yun-Jung;Woo, Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.37-47
    • /
    • 2013
  • Recently, lots of research results on program comparison have been reported since the code theft become frequent as the increase of code mobility. This paper proposes a plagiarism detection method using class structures. The proposed method constructs a graph representing the referential relationship between the member variables and the methods. This relationship is shown as a bipartite graph and the test for graph isomorphism is applied on the set of graphs to measure the similarity of the programs. In order to measure the effectiveness of this method, an experiment was conducted on the test set, the set of Java source codes submitted as solutions for the programming assignments in Object-Oriented Programming course of Pusan National University in 2012. In order to evaluate the accuracy of the proposed method, the F-measure is compared to those of JPlag and Stigmata. According to the experimental result, the F-measure of the proposed method is higher than those of JPlag and Stigmata by 0.17 and 0.34, respectively.