• Title/Summary/Keyword: automation algorithm

Search Result 1,027, Processing Time 0.024 seconds

Design of Integrated Management System for Electronic Library Based on SaaS and Web Standard

  • Lee, Jong-Hoon;Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.41-51
    • /
    • 2015
  • Management systems for electronic library have been developed on the basis of Client/Server or ASP framework in domestic market for a long time. Therefore, both service provider and user suffer from their high cost and effort in management, maintenance, and repairing of software as well as hardware. Recently in addition, mobile devices like smartphone and tablet PC are frequently used as terminal devices to access computers through the Internet or other networks, sophisticatedly customized or personalized interface for n-screen service became more important issue these days. In this paper, we propose a new scheme of integrated management system for electronic library based on SaaS and Web Standard. We design and implement the proposed scheme applying Electronic Cabinet Guidelines for Web Standard and Universal Code System. Hosted application management style and software on demand style service models based on SaaS are basically applied to develop the management system. Moreover, a newly improved concept of duplication check algorithm in a hierarchical evaluation process is presented and a personalized interface based on web standard is applied to implement the system. Algorithms of duplication check for journal, volume/number, and paper are hierarchically presented with their logic flows. Total framework of our development obeys the standard feature of Electronic Cabinet Guidelines offered by Korea government so that we can accomplish standard of application software, quality improvement of total software, and reusability extension. Scope of our development includes core services of library automation system such as acquisition, list-up, loan-and-return, and their related services. We focus on interoperation compatibility between elementary sub-systems throughout complex network and structural features. Reanalyzing and standardizing each part of the system under the concept on the cloud of service, we construct an integrated development environment for generating, test, operation, and maintenance. Finally, performance analyses are performed about resource usability of server, memory amount used, and response time of server etc. As a result of measurements fulfilled over 5 times at different test points and using different data, the average response time is about 62.9 seconds for 100 clients, which takes about 0.629 seconds per client on the average. We can expect this result makes it possible to operate the system in real-time level proof. Resource usability and memory occupation are also good and moderate comparing to the conventional systems. As total verification tests, we present a simple proof to obey Electronic Cabinet Guidelines and a record of TTA authentication test for topics about SaaS maturity, performance, and application program features.

Exploratory Research on Automating the Analysis of Scientific Argumentation Using Machine Learning (머신 러닝을 활용한 과학 논변 구성 요소 코딩 자동화 가능성 탐색 연구)

  • Lee, Gyeong-Geon;Ha, Heesoo;Hong, Hun-Gi;Kim, Heui-Baik
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.2
    • /
    • pp.219-234
    • /
    • 2018
  • In this study, we explored the possibility of automating the process of analyzing elements of scientific argument in the context of a Korean classroom. To gather training data, we collected 990 sentences from science education journals that illustrate the results of coding elements of argumentation according to Toulmin's argumentation structure framework. We extracted 483 sentences as a test data set from the transcription of students' discourse in scientific argumentation activities. The words and morphemes of each argument were analyzed using the Python 'KoNLPy' package and the 'Kkma' module for Korean Natural Language Processing. After constructing the 'argument-morpheme:class' matrix for 1,473 sentences, five machine learning techniques were applied to generate predictive models relating each sentences to the element of argument with which it corresponded. The accuracy of the predictive models was investigated by comparing them with the results of pre-coding by researchers and confirming the degree of agreement. The predictive model generated by the k-nearest neighbor algorithm (KNN) demonstrated the highest degree of agreement [54.04% (${\kappa}=0.22$)] when machine learning was performed with the consideration of morpheme of each sentence. The predictive model generated by the KNN exhibited higher agreement [55.07% (${\kappa}=0.24$)] when the coding results of the previous sentence were added to the prediction process. In addition, the results indicated importance of considering context of discourse by reflecting the codes of previous sentences to the analysis. The results have significance in that, it showed the possibility of automating the analysis of students' argumentation activities in Korean language by applying machine learning.

A Study on the Automatic Detection of Railroad Power Lines Using LiDAR Data and RANSAC Algorithm (LiDAR 데이터와 RANSAC 알고리즘을 이용한 철도 전력선 자동탐지에 관한 연구)

  • Jeon, Wang Gyu;Choi, Byoung Gil
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.31 no.4
    • /
    • pp.331-339
    • /
    • 2013
  • LiDAR has been one of the widely used and important technologies for 3D modeling of ground surface and objects because of its ability to provide dense and accurate range measurement. The objective of this research is to develop a method for automatic detection and modeling of railroad power lines using high density LiDAR data and RANSAC algorithms. For detecting railroad power lines, multi-echoes properties of laser data and shape knowledge of railroad power lines were employed. Cuboid analysis for detecting seed line segments, tracking lines, connecting and labeling are the main processes. For modeling railroad power lines, iterative RANSAC and least square adjustment were carried out to estimate the lines parameters. The validation of the result is very challenging due to the difficulties in determining the actual references on the ground surface. Standard deviations of 8cm and 5cm for x-y and z coordinates, respectively are satisfactory outcomes. In case of completeness, the result of visual inspection shows that all the lines are detected and modeled well as compare with the original point clouds. The overall processes are fully automated and the methods manage any state of railroad wires efficiently.

Initial System for Automation of PDQ-based Shape Quality Verification of Naval Ship Product Model (제품데이터품질(PDQ) 평가에 따른 함정 제품모델의 형상 품질검증 자동화 초기 시스템)

  • Oh, Dae-Kyun;Hwang, In-Hyuck;Ryu, Cheol-Ho;Lee, Dong-Kun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.1
    • /
    • pp.113-119
    • /
    • 2014
  • Recently, R.O.K. Navy is increasing re-usability of design data and application of M&S(Modeling and Simulation) through the establishment of collaborative product development environment focused on Naval Ship Product Model(NSPM). As a result, the reliability of the result of design is getting better, and furthermore, a study to improve quality of construction through simulation of production/operation is in progress. Accordingly, the database construction of design data and the DB(Database) quality become important, but there was not research related to those or it was just initial state. This paper conducted research about system of the quality verification process of shape elements which compose NSPM based on the quality verification guideline of NSPM as the result of the precedent study. The hull surface was limited as verification object. The study to verify two things that application of basic drawing by the cad model of hull surface, and whether there is error in the geometric quality of cad model was progressed. To achieve this goal, the verification criteria and algorithm were defined and the prototype system which is based on was developed.

An Interactive Knowledge-based Planning System (인터렉티브 지식베이스 기반의 계획시스템)

  • Jeon, Hyoung-Bae;Han, Eun-Ji;Um, Ky-Hyun;Cho, Kyung-Eun
    • Journal of Korea Game Society
    • /
    • v.9 no.3
    • /
    • pp.139-150
    • /
    • 2009
  • This paper attempts to investigate the establishment of an interactive knowledge base for action planning by virtual agents and an interactive knowledge-based planning system. A fixed knowledge base is unable to properly handle a change in circumstances because fixed planning is only available under a fixed knowledge base. Therefore, this paper proposes the establishment of an interactive knowledge base which is applicable to diverse environments and an artificial intelligence planning system in which an interactive knowledge base is available. The interactive knowledge base proposed in this paper consists of motivation, behavior, object and action. The association relationship between knowledge base and its input is set using an automation tool. With this tool, a user can easily add to or amend the components of the knowledge base. With this knowledge base, a character plans all action items and chooses one of them to take an action. Since a new action can be applicable by updating the knowledge base even when the character environment changes, it is very useful for virtual reality content developers. This paper has established a relationship between scalable interactive knowledge base components and other components and proposes a convenient input tool and a planning system algorithm effective for an interactive knowledge base. The results of this study have been verified through testing in a virtual environment ('virtual library').

  • PDF

Development of non-destructive freshness measurement system for eggs using PLC control and image processing (PLC제어와 영상처리를 이용한 계란의 비파괴 신선도 측정 시스템 개발)

  • Kim, Tae-Jung;Kim, Sun-Jung;Lee, Dong-Goo;Lee, Jeong-Ho;Lee, Young-Seok;Hwang, Heon;Choi, Sun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.2
    • /
    • pp.162-169
    • /
    • 2019
  • Non-destructive freshness measurement using spectroscopy has been carried out several times, but research on freshness and freshness has not been conducted. Therefore the purpose of this study is to develop a system for visually measuring and quantifying the air sack inside the egg by non - destructive method. The experimental environment which designed a small chamber was composed of 850nm band of two IR lasers, IR camera and two servo motors to acquire air sack Images. When the air sack volume ratio is 2.9% or less and the density is 0.9800 or more, the Haugh Unit value is 60 or more It was judged to be a fresh egg of a grade B or higher. These results mean, using the weight measurement, nondestructive decision system, and freshness evaluating algorithm. It can be expected to distinguish grade B or more marketable eggs without using destructive methods.

A Development of Road Crack Detection System Using Deep Learning-based Segmentation and Object Detection (딥러닝 기반의 분할과 객체탐지를 활용한 도로균열 탐지시스템 개발)

  • Ha, Jongwoo;Park, Kyongwon;Kim, Minsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.1
    • /
    • pp.93-106
    • /
    • 2021
  • Many recent studies on deep learning-based road crack detection have shown significantly more improved performances than previous works using algorithm-based conventional approaches. However, many deep learning-based studies are still focused on classifying the types of cracks. The classification of crack types is highly anticipated in that it can improve the crack detection process, which is currently relying on manual intervention. However, it is essential to calculate the severity of the cracks as well as identifying the type of cracks in actual pavement maintenance planning, but studies related to road crack detection have not progressed enough to automated calculation of the severity of cracks. In order to calculate the severity of the crack, the type of crack and the area of the crack in the image must be identified together. This study deals with a method of using Mobilenet-SSD that is deep learning-based object detection techniques to effectively automate the simultaneous detection of crack types and crack areas. To improve the accuracy of object-detection for road cracks, several experiments were conducted to combine the U-Net for automatic segmentation of input image and object-detection model, and the results were summarized. As a result, image masking with U-Net is able to maximize object-detection performance with 0.9315 mAP value. While referring the results of this study, it is expected that the automation of the crack detection functionality on pave management system can be further enhanced.

A Study on Prediction of EPB shield TBM Advance Rate using Machine Learning Technique and TBM Construction Information (머신러닝 기법과 TBM 시공정보를 활용한 토압식 쉴드TBM 굴진율 예측 연구)

  • Kang, Tae-Ho;Choi, Soon-Wook;Lee, Chulho;Chang, Soo-Ho
    • Tunnel and Underground Space
    • /
    • v.30 no.6
    • /
    • pp.540-550
    • /
    • 2020
  • Machine learning has been actively used in the field of automation due to the development and establishment of AI technology. The important thing in utilizing machine learning is that appropriate algorithms exist depending on data characteristics, and it is needed to analysis the datasets for applying machine learning techniques. In this study, advance rate is predicted using geotechnical and machine data of TBM tunnel section passing through the soil ground below the stream. Although there were no problems of application of statistical technology in the linear regression model, the coefficient of determination was 0.76. While, the ensemble model and support vector machine showed the predicted performance of 0.88 or higher. it is indicating that the model suitable for predicting advance rate of the EPB Shield TBM was the support vector machine in the analyzed dataset. As a result, it is judged that the suitability of the prediction model using data including mechanical data and ground information is high. In addition, research is needed to increase the diversity of ground conditions and the amount of data.

Leision Detection in Chest X-ray Images based on Coreset of Patch Feature (패치 특징 코어세트 기반의 흉부 X-Ray 영상에서의 병변 유무 감지)

  • Kim, Hyun-bin;Chun, Jun-Chul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.35-45
    • /
    • 2022
  • Even in recent years, treatment of first-aid patients is still often delayed due to a shortage of medical resources in marginalized areas. Research on automating the analysis of medical data to solve the problems of inaccessibility for medical services and shortage of medical personnel is ongoing. Computer vision-based medical inspection automation requires a lot of cost in data collection and labeling for training purposes. These problems stand out in the works of classifying lesion that are rare, or pathological features and pathogenesis that are difficult to clearly define visually. Anomaly detection is attracting as a method that can significantly reduce the cost of data collection by adopting an unsupervised learning strategy. In this paper, we propose methods for detecting abnormal images on chest X-RAY images as follows based on existing anomaly detection techniques. (1) Normalize the brightness range of medical images resampled as optimal resolution. (2) Some feature vectors with high representative power are selected in set of patch features extracted as intermediate-level from lesion-free images. (3) Measure the difference from the feature vectors of lesion-free data selected based on the nearest neighbor search algorithm. The proposed system can simultaneously perform anomaly classification and localization for each image. In this paper, the anomaly detection performance of the proposed system for chest X-RAY images of PA projection is measured and presented by detailed conditions. We demonstrate effect of anomaly detection for medical images by showing 0.705 classification AUROC for random subset extracted from the PadChest dataset. The proposed system can be usefully used to improve the clinical diagnosis workflow of medical institutions, and can effectively support early diagnosis in medically poor area.

Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin (VMProtect의 역공학 방해 기능 분석 및 Pin을 이용한 우회 방안)

  • Park, Seongwoo;Park, Yongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.297-304
    • /
    • 2021
  • Commercial obfuscation tools (protectors) aim to create difficulties in analyzing the operation process of software by applying obfuscation techniques and Anti-reversing techniques that delay and interrupt the analysis of programs in software reverse engineering process. In particular, in case of virtualization detection and anti-debugging functions, the analysis tool exits the normal execution flow and terminates the program. In this paper, we analyze Anti-reversing techniques of executables with Debugger Detection and Viralization Tools Detection options through VMProtect 3.5.0, one of the commercial obfuscation tools (protector), and address bypass methods using Pin. In addition, we predicted the location of the applied obfuscation technique by finding out a specific program termination routine through API analysis since there is a problem that the program is terminated by the Anti-VM technology and the Anti-DBI technology and drew up the algorithm flowchart for bypassing the Anti-reversing techniques. Considering compatibility problems and changes in techniques from differences in versions of the software used in experiment, it was confirmed that the bypass was successful by writing the pin automation bypass code in the latest version of the software (VMProtect, Windows, Pin) and conducting the experiment. By improving the proposed analysis method, it is possible to analyze the Anti-reversing method of the obfuscation tool for which the method is not presented so far and find a bypass method.