• 제목/요약/키워드: Technology Learning

Search Result 8,025, Processing Time 0.032 seconds

Comparison of Artificial Intelligence Multitask Performance using Object Detection and Foreground Image (물체탐색과 전경영상을 이용한 인공지능 멀티태스크 성능 비교)

  • Jeong, Min Hyuk;Kim, Sang-Kyun;Lee, Jin Young;Choo, Hyon-Gon;Lee, HeeKyung;Cheong, Won-Sik
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.308-317
    • /
    • 2022
  • Researches are underway to efficiently reduce the size of video data transmitted and stored in the image analysis process using deep learning-based machine vision technology. MPEG (Moving Picture Expert Group) has newly established a standardization project called VCM (Video Coding for Machine) and is conducting research on video encoding for machines rather than video encoding for humans. We are researching a multitask that performs various tasks with one image input. The proposed pipeline does not perform all object detection of each task that should precede object detection, but precedes it only once and uses the result as an input for each task. In this paper, we propose a pipeline for efficient multitasking and perform comparative experiments on compression efficiency, execution time, and result accuracy of the input image to check the efficiency. As a result of the experiment, the capacity of the input image decreased by more than 97.5%, while the accuracy of the result decreased slightly, confirming the possibility of efficient multitasking.

Design and Implementation of BNN based Human Identification and Motion Classification System Using CW Radar (연속파 레이다를 활용한 이진 신경망 기반 사람 식별 및 동작 분류 시스템 설계 및 구현)

  • Kim, Kyeong-min;Kim, Seong-jin;NamKoong, Ho-jung;Jung, Yun-ho
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.211-218
    • /
    • 2022
  • Continuous wave (CW) radar has the advantage of reliability and accuracy compared to other sensors such as camera and lidar. In addition, binarized neural network (BNN) has a characteristic that dramatically reduces memory usage and complexity compared to other deep learning networks. Therefore, this paper proposes binarized neural network based human identification and motion classification system using CW radar. After receiving a signal from CW radar, a spectrogram is generated through a short-time Fourier transform (STFT). Based on this spectrogram, we propose an algorithm that detects whether a person approaches a radar. Also, we designed an optimized BNN model that can support the accuracy of 90.0% for human identification and 98.3% for motion classification. In order to accelerate BNN operation, we designed BNN hardware accelerator on field programmable gate array (FPGA). The accelerator was implemented with 1,030 logics, 836 registers, and 334.904 Kbit block memory, and it was confirmed that the real-time operation was possible with a total calculation time of 6 ms from inference to transferring result.

Development and Validation of Core Competency Assessment Tools for Engineering Student (공학계열 학생 핵심역량 진단도구 개발 및 타당화 연구)

  • Kim, Younyoung;Yoon, Jiyoung
    • Journal of Engineering Education Research
    • /
    • v.24 no.4
    • /
    • pp.3-20
    • /
    • 2021
  • As we have become more interested in 'competency' that means ability to do something around the world, the competency of the best performers has also been introduced in the university curriculum as a concept of core competency. Research continues on why this competency-based education is needed compared to existing academic-oriented education, how it can be introduced into existing curricula, and how it can be developed and evaluated in detail. This study develops and validates core competency assessment tools that can diagnose core competencies of engineering students. Therefore, this research paper conducted a literature review related to core competencies and also core competency assessment tools of university students. It seeks to explore the implications of core competency assessment tools for engineering students and then lay the foundation for competency-based teaching and learning at engineering colleges. And also it defines the concepts of core competencies and each core competency of engineering students through prior research analysis of competence, core competence, and core competence of university students. The primary core competency assessment tool consisted of sub-factors and questions of core competencies. It were modified through the expert validation of the primary one and then it was used as a core competency assessment tools for preliminary investigation. The core competency assessment tools for engineering students are consisted of 6 competencies, 22 sub-factors, and 91 questions. There are core competencies as follows: engineering basic competencies, major engineering competencies, self-management competencies, communication competencies, interpersonal competencies, global competencies. The preliminary survey was conducted on 426 engineering students attending the Engineering Education FESTA 2019. The preliminary findings were derived by conducting exploratory factor analysis, confirmatory factor analysis, question characteristics analysis, and reliability analysis for validation. The core competency assessment tools developed through this study can be used to verify the effectiveness of the curriculum and programs for students at engineering colleges. In addition, the developed core competencies, sub-factors, and questions can be utilized in a series of courses that design, conduct, and evaluate engineering curricula and programs as competency-based curriculum. The significance of this study is to lay the groundwork for providing competency-based education engineering students to develop core competencies.

Real-time Segmentation of Black Ice Region in Infrared Road Images

  • Li, Yu-Jie;Kang, Sun-Kyoung;Jung, Sung-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.33-42
    • /
    • 2022
  • In this paper, we proposed a deep learning model based on multi-scale dilated convolution feature fusion for the segmentation of black ice region in road image to send black ice warning to drivers in real time. In the proposed multi-scale dilated convolution feature fusion network, different dilated ratio convolutions are connected in parallel in the encoder blocks, and different dilated ratios are used in different resolution feature maps, and multi-layer feature information are fused together. The multi-scale dilated convolution feature fusion improves the performance by diversifying and expending the receptive field of the network and by preserving detailed space information and enhancing the effectiveness of diated convolutions. The performance of the proposed network model was gradually improved with the increase of the number of dilated convolution branch. The mIoU value of the proposed method is 96.46%, which was higher than the existing networks such as U-Net, FCN, PSPNet, ENet, LinkNet. The parameter was 1,858K, which was 6 times smaller than the existing LinkNet model. From the experimental results of Jetson Nano, the FPS of the proposed method was 3.63, which can realize segmentation of black ice field in real time.

Use of Digital Educational Resources in the Training of Future Specialists in the EU Countries

  • Plakhotnik, Olga;Zlatnikov, Valentyn;Matviienko, Olena;Bezliudnyi, Oleksandr;Havrylenko, Anna;Yashchuk, Olena;Andrusyk, Pavlo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • The article proves that the main goal of informatization of higher education institutions in the EU countries is to improve the quality of education of future specialists by introducing digital educational resources into the education process. The main tasks of informatization of education are defined. Digital educational resources are interpreted as a set of data in digital form that is applicable for use in the learning process; it is an information source containing graphic, text, digital, speech, music, video, photo and other information aimed at implementing the goals and objectives of modern education; educational resources on the Internet, electronic textbooks, educational programs, electronic libraries, etc. The creation of digital educational resources is defined as one of the main directions of informatization of all forms and levels of Education. Types of digital educational resources by educational functions are considered. The factors that determine the effectiveness of using digital educational resources in the educational process are identified. The use of digital educational resources in the training of future specialists in the EU countries is considered in detail. European countries note that digital educational resources in professional use allow you to implement a fundamentally new approach to teaching and education, which is based on broad communication, free exchange of opinions, ideas, information of participants in a joint project, on a completely natural desire to learn new things, expand their horizons; is based on real research methods (scientific or creative laboratories), allowing you to learn the laws of nature, the basics of techniques, technology, social phenomena in their dynamics, in the process of solving vital problems, features of various types of creativity in the process of joint activities of a group of participants; promotes the acquisition by teachers of various related skills that can be very useful in their professional activities, including the skills of using computer equipment and various digital technologies.

Comparative Study of Anomaly Detection Accuracy of Intrusion Detection Systems Based on Various Data Preprocessing Techniques (다양한 데이터 전처리 기법 기반 침입탐지 시스템의 이상탐지 정확도 비교 연구)

  • Park, Kyungseon;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.11
    • /
    • pp.449-456
    • /
    • 2021
  • An intrusion detection system is a technology that detects abnormal behaviors that violate security, and detects abnormal operations and prevents system attacks. Existing intrusion detection systems have been designed using statistical analysis or anomaly detection techniques for traffic patterns, but modern systems generate a variety of traffic different from existing systems due to rapidly growing technologies, so the existing methods have limitations. In order to overcome this limitation, study on intrusion detection methods applying various machine learning techniques is being actively conducted. In this study, a comparative study was conducted on data preprocessing techniques that can improve the accuracy of anomaly detection using NGIDS-DS (Next Generation IDS Database) generated by simulation equipment for traffic in various network environments. Padding and sliding window were used as data preprocessing, and an oversampling technique with Adversarial Auto-Encoder (AAE) was applied to solve the problem of imbalance between the normal data rate and the abnormal data rate. In addition, the performance improvement of detection accuracy was confirmed by using Skip-gram among the Word2Vec techniques that can extract feature vectors of preprocessed sequence data. PCA-SVM and GRU were used as models for comparative experiments, and the experimental results showed better performance when sliding window, skip-gram, AAE, and GRU were applied.

Keyword Analysis of Research on Consumption of Children and Adolescents Using Text Mining (텍스트마이닝을 활용한 아동, 청소년 대상 소비관련 연구 키워드 분석)

  • Jin, Hyun-Jeong
    • Journal of Korean Home Economics Education Association
    • /
    • v.33 no.4
    • /
    • pp.1-13
    • /
    • 2021
  • The purpose of this study is to identify trends and potential themes of research on consumption of children and adolescents for 20 years by analyzing keywords. The keywords of 869 studies on consumption of children and adolescents published in journals listed in Korean Citation Index were analyzed using text mining techniques. The most frequent keywords were found in the order of youth, youth consumers, consumer education, conspicuous consumption, consumption behavior, and character. As a result of analyzing the frequency of keywords by dividing into five-year periods, it was confirmed that the frequency of consumer education was significantly higher betwn 2006 and 2010. Research on ethical consumption has been active since 2011, and research has been conducted on various topics instead of without a prominent keyword during the most recent 5-year period. Looking at the keywords based on the TF-IDF, the keywords related to the environment and the Internet were the main keywords between 2001 and 2005. From 2006 to 2010, the TF-IDF values of media use, advertisement education, and Internet items were high. From 2011 to 2015, fair trade, green growth, green consumption, North Korean defector youths, social media, and from 2016 to 2020, text mining, sustainable development education, maker education, and the 2015 revised curriculum appeared as important themes. As a result of topic modeling, eight topics were derived: consumer education, mass media/peer culture, rational consumption, Hallyu/cultural industry, consumer competency, economic education, teaching and learning method, and eco-friendly/ethical consumption. As a result of network analysis, it was found that conspicuous consumption and consumer education are important topics in consumption research of children and adolescents.

Vector-Based Data Augmentation and Network Learning for Efficient Crack Data Collection (효율적인 균열 데이터 수집을 위한 벡터 기반 데이터 증강과 네트워크 학습)

  • Kim, Jong-Hyun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.28 no.2
    • /
    • pp.1-9
    • /
    • 2022
  • In this paper, we propose a vector-based augmentation technique that can generate data required for crack detection and a ConvNet(Convolutional Neural Network) technique that can learn it. Detecting cracks quickly and accurately is an important technology to prevent building collapse and fall accidents in advance. In order to solve this problem with artificial intelligence, it is essential to obtain a large amount of data, but it is difficult to obtain a large amount of crack data because the situation for obtaining an actual crack image is mostly dangerous. This problem of database construction can be alleviated with elastic distortion, which increases the amount of data by applying deformation to a specific artificial part. In this paper, the improved crack pattern results are modeled using ConvNet. Rather than elastic distortion, our method can obtain results similar to the actual crack pattern. By designing the crack data augmentation based on a vector, rather than the pixel unit used in general data augmentation, excellent results can be obtained in terms of the amount of crack change. As a result, in this paper, even though a small number of crack data were used as input, a crack database can be efficiently constructed by generating various crack directions and patterns.

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

A study of 3D CAD and DLP 3D printing educational course (3D CAD와 DLP 3D 프린팅 교육과정에 관한 연구)

  • Young Hoon Kim;Jeongwon Seok
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.33 no.1
    • /
    • pp.22-30
    • /
    • 2023
  • Currently, almost all product development in the jewelry industry utilizes 3D CAD and 3D printing. In this situation, 3D CAD modeling and 3D printing ability units in colleges, Tomorrow Learning Card Education, and Course Evaluation-type jewelry design related education are conducted with developed curriculum based on the standards for training standards, training hours, training equipment, and practice materials presented by NCS. Accordingly, this study analyzes 3D CAD modeling and 3D printing training facilities, training hours, training equipment, etc into three categories of NCS precious metal processing and jewelry design, and studies the development of educational systems such as 3D CAD/3D printing curriculum and various environments that meet these standards. Education using this 3D CAD/3D printing education system will enable us to continuously supply professional talent with practical skills not only in the jewelry industry but also in the entire 3D CAD/3D printing manufacturing industry, which is called as one of the pillars of the 4th Industry. The quality of employment of trainees receiving education and the long-term retention rate after employed can also have a positive effect. In addition, excellent educational performance will help improve the recruitment rate of new students in jewelry jobs or manufacturing-related departments, which are difficult to recruit new students in recent years.