• Title/Summary/Keyword: Software Process Level and Process Performance

Search Result 100, Processing Time 0.025 seconds

Generative optical flow based abnormal object detection method using a spatio-temporal translation network

  • Lim, Hyunseok;Gwak, Jeonghwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.11-19
    • /
    • 2021
  • An abnormal object refers to a person, an object, or a mechanical device that performs abnormal and unusual behavior and needs observation or supervision. In order to detect this through artificial intelligence algorithm without continuous human intervention, a method of observing the specificity of temporal features using optical flow technique is widely used. In this study, an abnormal situation is identified by learning an algorithm that translates an input image frame to an optical flow image using a Generative Adversarial Network (GAN). In particular, we propose a technique that improves the pre-processing process to exclude unnecessary outliers and the post-processing process to increase the accuracy of identification in the test dataset after learning to improve the performance of the model's abnormal behavior identification. UCSD Pedestrian and UMN Unusual Crowd Activity were used as training datasets to detect abnormal behavior. For the proposed method, the frame-level AUC 0.9450 and EER 0.1317 were shown in the UCSD Ped2 dataset, which shows performance improvement compared to the models in the previous studies.

Map Error Measuring Mechanism Design and Algorithm Robust to Lidar Sparsity (라이다 점군 밀도에 강인한 맵 오차 측정 기구 설계 및 알고리즘)

  • Jung, Sangwoo;Jung, Minwoo;Kim, Ayoung
    • The Journal of Korea Robotics Society
    • /
    • v.16 no.3
    • /
    • pp.189-198
    • /
    • 2021
  • In this paper, we introduce the software/hardware system that can reliably calculate the distance from sensor to the model regardless of point cloud density. As the 3d point cloud map is widely adopted for SLAM and computer vision, the accuracy of point cloud map is of great importance. However, the 3D point cloud map obtained from Lidar may reveal different point cloud density depending on the choice of sensor, measurement distance and the object shape. Currently, when measuring map accuracy, high reflective bands are used to generate specific points in point cloud map where distances are measured manually. This manual process is time and labor consuming being highly affected by Lidar sparsity level. To overcome these problems, this paper presents a hardware design that leverage high intensity point from three planar surface. Furthermore, by calculating distance from sensor to the device, we verified that the automated method is much faster than the manual procedure and robust to sparsity by testing with RGB-D camera and Lidar. As will be shown, the system performance is not limited to indoor environment by progressing the experiment using Lidar sensor at outdoor environment.

Mathematical Consideration on PV Cell Modeling (PV cell modeling의 수학적 고찰)

  • Park, Hyeonah;Kim, Hyosung
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.19 no.1
    • /
    • pp.51-56
    • /
    • 2014
  • PV cell modeling is necessary both for software and hardware simulators in analyzing and testing the performance of PV generation systems. Unique I-V curve of a PV cell identifies its own characteristics by electrical equivalent model that is composed of diode constants ($I_o$, $v_t$), photo-generated current ($I_{ph}$), series resistance ($R_s$), and shunt resistance ($R_{sh}$). Photo-generated current can be easily estimated since it is proportional to irradiation level. However, other electrical parameters should be solved from the manufacturer's data sheet that is consisted with three remarkable operating points such as open circuit voltage ($V_{oc}$), short circuit current ($I_{sc}$), and maximum power voltage/current ($V_{MPP}/I_{MPP}$). This paper explains and analyzes mathematical process of a novel PV cell modeling algorithm that was proposed by the authors with the name of "K-algorithm".

Development of Injection Moulding Method of Sabot using Polyetherimide Composite Material (PEI계 복합 재료를 이용한 탄자 운반체의 사출 성형 기술 개발에 관한 연구)

  • 정태형;이범재;하영욱;이성계
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2001.04a
    • /
    • pp.269-274
    • /
    • 2001
  • This research covers the development of new technique for composite injection molding of high stiffness Sabot. An analysis of polymer resin is performed by means of making test specimen mold and doing test with accordance of ASTM test guidelines. Structural analysis and simulation of injection molding process are carried out in order not only to estimate but also to predict the characteristics of molding stresses what both product and structure of mold may have. For structural analysis software, Moldflow and LS-dyna are used and universal test machine is utilized for evaluating performance of sabot. Cases of adopting this material to sabot are not announced yet in domestic academic world. In addition to that, materials for polymer-metal mixed injection molding are imported on the whole due to deficient level of domestic technology. Therefore, this new developed injection molding technique using PEI material can make it available to ensure the technology of making mold, injection and design. Finally, this technique may be applicable to another sabot having different radius of warheads from now on.

  • PDF

A Re-Ranking Retrieval Model based on Two-Level Similarity Relation Matrices (2단계 유사관계 행렬을 기반으로 한 순위 재조정 검색 모델)

  • 이기영;은희주;김용성
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.11
    • /
    • pp.1519-1533
    • /
    • 2004
  • When Web-based special retrieval systems for scientific field extremely restrict the expression of user's information request, the process of the information content analysis and that of the information acquisition become inconsistent. In this paper, we apply the fuzzy retrieval model to solve the high time complexity of the retrieval system by constructing a reduced term set for the term's relatively importance degree. Furthermore, we perform a cluster retrieval to reflect the user's Query exactly through the similarity relation matrix satisfying the characteristics of the fuzzy compatibility relation. We have proven the performance of a proposed re-ranking model based on the similarity union of the fuzzy retrieval model and the document cluster retrieval model.

PVM Performance Enhancement over a High-Speed Myrinet (초고속 Myrinet 통신망에서의 PVM 성능 개선)

  • Kim, In-Soo;Shim, Jae-Hong;Choi, Kyung-Hee;Jung, Gi-Hyun;Moon, Kyeong-Deok;Kim, Tae-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.74-87
    • /
    • 2000
  • PVM (parallel virtual machine) provides a programming environment that allows a collection of networked workstations to appear as a single parallel computational resource. The performance of parallel applications in this environment depends on the performance of data transfers between tasks. In this paper, we present a new Myrinet-based communication model of PVM that improves PVM communication performance over a high-speed Myrinet LAN. The proposed PVM communication model adopts a communication mechanism that allows any user-level process to directly access the network interface board without going through UDP/IP protocol stacks in the kernel. This mechanism provides faster data transfers between PVM tasks over the Myrinet since it avoids data copy overhead from kernel (user space) to user space (kernel) and reduces communication latency due to network protocol software layers. We implemented EPVM (Enhanced PVM), our updated version of the traditional PVM using UDP/IP, that is based on the proposed communication model over the Myrinet. Performance results show EPVM achieves communication speed-up of one to two over the traditional PVM.

  • PDF

A Study on Effective Software Education Model by Disability Type for Youth

  • Lee, Hyun Ju;Lee, Won Joo;Jung, Hoe Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.261-268
    • /
    • 2020
  • In this paper, we propose an effective software education model for youths with disability. This software education model consists of a four-step process. In the first step, it draws the education curriculum of the software education for different types of disabled youths based on the results of comparative analysis of software education field in special education curriculum. In the second step, it suggests achievement standards for effective software education for the disabled students by classifying students with intellectual disabilities and visual, hearing, and physical disabilities without any multiple disabilities. In the third step, the study developed a modular textbook comprised of unplugged activities using coding robot Albert, physical computing, and block/text coding with the reflection of the characteristic of each type of disability. In the fourth step, it applied the textbook to the school field and educated disabled students focusing on experience to allow them to think logically and by stages about different problems they face in daily lives. In addition, by analyzing the results of youths' performance evaluation and surveys, it was shown that 82.3% of developmental disabilities, 78.8% of visual impairments, 90.9% of hearing impairments, and 78.8% of physically disabilities achieved achievements above the "medium" level. These results prove that the software education model for youths with disabilities proposed in this paper is very effective in improving computational chinking of youths with disabilities.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

Evaluation of Operational Options of Wastewater Treatment Using EQPS Models (EQPS 모델을 이용한 하수처리장 운전 평가)

  • Yoo, Hosik;Ahn, Seyoung
    • Journal of the Korean Society of Urban Environment
    • /
    • v.18 no.4
    • /
    • pp.401-408
    • /
    • 2018
  • EQPS (Effluent Quality Prediction System, Dynamita, France) was applied to analyze the appropriateness of the design of a bioreactor in A sewage treatment plant. A sewage treatment plant was designed by setting the design concentration of the secondary clarifier effluent to total nitrogen and total phosphorus, 10 mg/L and 1.8 mg/L, respectively, in order to comply with the target water quality at the level of the hydrophilic water. The retention time of the 4-stage BNR reactor was 9.6 hours, which was 0.5 for the pre-anoxic tank, 1.0 for the anaerobic tank, 2.9 for the anoxic tank, and 5.2 hours for the aerobic tank. As a result of the modeling of the winter season, the retention time of the anaerobic tank was increased by 0.2 hours in order to satisfy the target water quality of the hydrophilic water level. The default coefficients of the one step nitrification denitrification model proposed by the software manufacturer were used to exclude distortion of the modeling results. Since the process modeling generally presents optimal conditions, the retention time of the 4-stage BNR should be increased to 9.8 hours considering the bioreactor margin. The accurate use of process modeling in the design stage of the sewage treatment plant is a way to ensure the stability of the treatment performance and efficiency after construction of the sewage treatment plant.

Design of Integrated Management System for Electronic Library Based on SaaS and Web Standard

  • Lee, Jong-Hoon;Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.41-51
    • /
    • 2015
  • Management systems for electronic library have been developed on the basis of Client/Server or ASP framework in domestic market for a long time. Therefore, both service provider and user suffer from their high cost and effort in management, maintenance, and repairing of software as well as hardware. Recently in addition, mobile devices like smartphone and tablet PC are frequently used as terminal devices to access computers through the Internet or other networks, sophisticatedly customized or personalized interface for n-screen service became more important issue these days. In this paper, we propose a new scheme of integrated management system for electronic library based on SaaS and Web Standard. We design and implement the proposed scheme applying Electronic Cabinet Guidelines for Web Standard and Universal Code System. Hosted application management style and software on demand style service models based on SaaS are basically applied to develop the management system. Moreover, a newly improved concept of duplication check algorithm in a hierarchical evaluation process is presented and a personalized interface based on web standard is applied to implement the system. Algorithms of duplication check for journal, volume/number, and paper are hierarchically presented with their logic flows. Total framework of our development obeys the standard feature of Electronic Cabinet Guidelines offered by Korea government so that we can accomplish standard of application software, quality improvement of total software, and reusability extension. Scope of our development includes core services of library automation system such as acquisition, list-up, loan-and-return, and their related services. We focus on interoperation compatibility between elementary sub-systems throughout complex network and structural features. Reanalyzing and standardizing each part of the system under the concept on the cloud of service, we construct an integrated development environment for generating, test, operation, and maintenance. Finally, performance analyses are performed about resource usability of server, memory amount used, and response time of server etc. As a result of measurements fulfilled over 5 times at different test points and using different data, the average response time is about 62.9 seconds for 100 clients, which takes about 0.629 seconds per client on the average. We can expect this result makes it possible to operate the system in real-time level proof. Resource usability and memory occupation are also good and moderate comparing to the conventional systems. As total verification tests, we present a simple proof to obey Electronic Cabinet Guidelines and a record of TTA authentication test for topics about SaaS maturity, performance, and application program features.