• Title/Summary/Keyword: deep network

Search Result 2,913, Processing Time 0.03 seconds

Development of Bone Metastasis Detection Algorithm on Abdominal Computed Tomography Image using Pixel Wise Fully Convolutional Network (픽셀 단위 컨볼루션 네트워크를 이용한 복부 컴퓨터 단층촬영 영상 기반 골전이암 병변 검출 알고리즘 개발)

  • Kim, Jooyoung;Lee, Siyoung;Kim, Kyuri;Cho, Kyeongwon;You, Sungmin;So, Soonwon;Park, Eunkyoung;Cho, Baek Hwan;Choi, Dongil;Park, Hoon Ki;Kim, In Young
    • Journal of Biomedical Engineering Research
    • /
    • v.38 no.6
    • /
    • pp.321-329
    • /
    • 2017
  • This paper presents a bone metastasis Detection algorithm on abdominal computed tomography images for early detection using fully convolutional neural networks. The images were taken from patients with various cancers (such as lung cancer, breast cancer, colorectal cancer, etc), and thus the locations of those lesions were varied. To overcome the lack of data, we augmented the data by adjusting the brightness of the images or flipping the images. Before the augmentation, when 70% of the whole data were used in the pre-test, we could obtain the pixel-wise sensitivity of 18.75%, the specificity of 99.97% on the average of test dataset. With the augmentation, we could obtain the sensitivity of 30.65%, the specificity of 99.96%. The increase in sensitivity shows that the augmentation was effective. In the result obtained by using the whole data, the sensitivity of 38.62%, the specificity of 99.94% and the accuracy of 99.81% in the pixel-wise. lesion-wise sensitivity is 88.89% while the false alarm per case is 0.5. The results of this study did not reach the level that could substitute for the clinician. However, it may be helpful for radiologists when it can be used as a screening tool.

An Algorithm of Fingerprint Image Restoration Based on an Artificial Neural Network (인공 신경망 기반의 지문 영상 복원 알고리즘)

  • Jang, Seok-Woo;Lee, Samuel;Kim, Gye-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.530-536
    • /
    • 2020
  • The use of minutiae by fingerprint readers is robust against presentation attacks, but one weakness is that the mismatch rate is high. Therefore, minutiae tend to be used with skeleton images. There have been many studies on security vulnerabilities in the characteristics of minutiae, but vulnerability studies on the skeleton are weak, so this study attempts to analyze the vulnerability of presentation attacks against the skeleton. To this end, we propose a method based on the skeleton to recover the original fingerprint using a learning algorithm. The proposed method includes a new learning model, Pix2Pix, which adds a latent vector to the existing Pix2Pix model, thereby generating a natural fingerprint. In the experimental results, the original fingerprint is restored using the proposed machine learning, and then, the restored fingerprint is the input for the fingerprint reader in order to achieve a good recognition rate. Thus, this study verifies that fingerprint readers using the skeleton are vulnerable to presentation attacks. The approach presented in this paper is expected to be useful in a variety of applications concerning fingerprint restoration, video security, and biometrics.

Natural Photography Generation with Text Guidance from Spherical Panorama Image (360 영상으로부터 텍스트 정보를 이용한 자연스러운 사진 생성)

  • Kim, Beomseok;Jung, Jinwoong;Hong, Eunbin;Cho, Sunghyun;Lee, Seungyong
    • Journal of the Korea Computer Graphics Society
    • /
    • v.23 no.3
    • /
    • pp.65-75
    • /
    • 2017
  • As a 360-degree image carries information of all directions, it often has too much information. Moreover, in order to investigate a 360-degree image on a 2D display, a user has to either click and drag the image with a mouse, or project it to a 2D panorama image, which inevitably introduces severe distortions. In consequence, investigating a 360-degree image and finding an object of interest in such a 360-degree image could be a tedious task. To resolve this issue, this paper proposes a method to find a region of interest and produces a 2D naturally looking image from a given 360-degree image that best matches a description given by a user in a natural language sentence. Our method also considers photo composition so that the resulting image is aesthetically pleasing. Our method first converts a 360-degree image to a 2D cubemap. As objects in a 360-degree image may appear distorted or split into multiple pieces in a typical cubemap, leading to failure of detection of such objects, we introduce a modified cubemap. Then our method applies a Long Short Term Memory (LSTM) network based object detection method to find a region of interest with a given natural language sentence. Finally, our method produces an image that contains the detected region, and also has aesthetically pleasing composition.

The Effects of the Biodiversity Increase after Creation of the Artificial Wetland -The Case of Ecological Pond at Seoul Technical High School- (인공습지 조성후 생물다양성 증진 효과에 관한 연구 -서울공고 생태연못을 중심으로-)

  • 김귀곤;조동길
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.27 no.3
    • /
    • pp.1-17
    • /
    • 1999
  • The purpose of this study is to evaluate the creation techniques of artificial wetland, one of biotopes developed to promote biodiversity in urban areas, and to look for improvement steps. Specifically, artificial wetland creation techniques were categorized into living environment and living creature classification. Being living conditions for creations, habitat environment was reviewed with a focus on water and soil environments. Living creatures were classified into plants, insects, fish, and birds. The evaluation of creation techniques was done in post-construction evaluation while considering the creation of habitats for living creatures. Intervention by users, changes in living environment and living species, and relevance of creation techniques were reviewed. Key results of this study are as follows. (1) Water environment for the living environment of creatures provides a suitable environment conditions for the living of creatures through a process easing the use of piped water. Various water depths and embankment appear to have a positive impact on the living of aquatic life. In particular, embankment covered in soil naturally played an important role as a place for the activities of aquatic insects and young fish as well as the growth of aquatic plants. (2) Various aquatic and ground plants to promote insect-diversity, shallow water, and old-tree logs had contributed greatly in increasing the types and number of insects. Aquatic insects. Aquatic insects were seen much particularly in areas where aquatic plants are rich but water is shallow than any other areas. (3) A space piled with stone to provide habitats for fish was not much used. However, it was observed that fish used embankment built with natural stones and embankment using logs in areas where water is deep. In addition, it was confirmed that 1,500 fish that had been released propagated using various depths and places for birth. (4) It was analyzed that techniques (creation of island, log setting, and creation of man-made bird nests) to provide habitats and to attract birds are not serving their roles. In such a case, it is believed that species had not increased due to the smallness as well as isolated features of the area. Based on theoretical review, they are judged to be areas that are likely to be used when a greater variety of birds is introduced. It is judged that attracting and keeping more birds at the site, such spaces need to be linked systematically in the future in terms of building eco-network while ensuring an adequate living areas. (5) In the study areas, users intervened greatly. As a result, a blockage was created preventing the normal growth of plants and non-indigenous plants were introduced. In order to limit the intervention by users, setting enough buffer zones, and environment education programs were urgently required. D/H=1>Hyangkyo> houses on the river>temples>lecture halls. D/H ratio of the backside areas is as follows. D/H=1>Hyangkyo>houses on the river>lecture halls. 4. Inner garden were planted deciduous than evergreen trees with Lagerstroemia indica. Enclosed dominant trees were planted by Pinus densiflora, Querces seuata. construct GEM strain, and examined for the expression and functional stability in microcosms.

  • PDF

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.

Sensor Fault Detection Scheme based on Deep Learning and Support Vector Machine (딥 러닝 및 서포트 벡터 머신기반 센서 고장 검출 기법)

  • Yang, Jae-Wan;Lee, Young-Doo;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.2
    • /
    • pp.185-195
    • /
    • 2018
  • As machines have been automated in the field of industries in recent years, it is a paramount importance to manage and maintain the automation machines. When a fault occurs in sensors attached to the machine, the machine may malfunction and further, a huge damage will be caused in the process line. To prevent the situation, the fault of sensors should be monitored, diagnosed and classified in a proper way. In the paper, we propose a sensor fault detection scheme based on SVM and CNN to detect and classify typical sensor errors such as erratic, drift, hard-over, spike, and stuck faults. Time-domain statistical features are utilized for the learning and testing in the proposed scheme, and the genetic algorithm is utilized to select the subset of optimal features. To classify multiple sensor faults, a multi-layer SVM is utilized, and ensemble technique is used for CNN. As a result, the SVM that utilizes a subset of features selected by the genetic algorithm provides better performance than the SVM that utilizes all the features. However, the performance of CNN is superior to that of the SVM.

A Study on Polynomial Pre-Distortion Technique Using PAPR Reduction Method in the Next Generation Mobile Communication System (차세대 이동통신 시스템에 PAPR 감소기법을 적용한 다항식 사전왜곡 기법에 관한 연구)

  • Kim, Wan-Tae;Park, Ki-Sik;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.684-690
    • /
    • 2010
  • Recently, the NG(Next Generation) system is studied for supporting convergence of various services and multi mode of single terminal. And a demand of user for taking the various services is getting increased, for supporting these services, many systems being able to transmit a large message have been appeared. In the NG system, it has to be supporting the CDMA and WCDMA besides the tele communication systems using OFDM method with single terminal An intergrated system can be improved with adopting of SoC technique. For adopting SoC technique on the intergrated terminal, we have to solve the non linear problem of HPA(High Power Amplifier). Nonlinear characteristic of HPA distorts both amplitude and phase of transmit signal, this distortion cause deep adjacent channel interference. We adopt a polynomial pre-distortion technique for this problem. In this paper, a noble modem design for NG mobile communication service and a method using polynomial pre-distorter with PAPR technique for counterbalancing nonlinear characteristic of the HPA are proposed.

Bio-Signal Detection Monitoring System Using ZigBee and Wireless Network (거리측정 센서 스캐닝과 퍼지 제어를 이용한 생체신호 모니터링 전동 휠체어 자율주행 시스템)

  • Kim, Kuk-Se;Yang, Sang-Gi;Rasheed, M.Tahir;Ahn, Seong-Soo;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.331-339
    • /
    • 2008
  • Nowadays with advancement in technology and aging society, the number of disabled citizens is increasing. The disabled citizens always need a caretaker for daily life routines especially for mobility. In future, the need is considered to increase more. To reduce the burden from the disabled, various devices for healthcare are introduced using computer technology. The power wheelchair is an important and convenient mobility device. The demand of power wheelchair is increasing for assistance in mobility. In this paper we proposed a robotic wheelchair for mobility aid to reduce the burden from the disabled. The main issue in an autonomous wheelchair is the automatic detection and avoidance of obstacles and going to the pre-designated place. The proposed algorithm detects the obstacles and avoids them to drive the wheelchair to the desired place safely. By this way, the disabled will not always have to worry about paying deep attention to the surroundings and his path. User has a handheld bio-sensor monitoring system for get user's bio-signal. If user detects unusual signal, alarm send to protector.

  • PDF

A Study on Optimum Ventilation System in the Deep Coal Mine (심부 석탄광산의 환기시스템 최적화 연구)

  • Kwon, Joon Uk;Kim, Sun Myung;Kim, Yun Kwang;Jang, Yun Ho
    • Tunnel and Underground Space
    • /
    • v.25 no.2
    • /
    • pp.186-198
    • /
    • 2015
  • This paper aims for the ultimate goal to optimize the work place environment through assuring the optimal required ventilation rate based on the analysis of the airflow. The working environment is deteriorated due to a rise in temperature of a coal mine caused by increase of its depth and carriage tunnels. To improve the environment, the ventilation evaluation on J coal mine is carried out and the effect of a length of the tunnel on the temperature to enhance the ventilation efficiency in the subsurface is numerically analyzed. The analysis shows that J coal mine needs $17,831m^3/min$ for in-flow ventilation rate but the total input air flowrate is $16,474m^3/min$, $1,357m^3/min$ of in-flow ventilation rate shortage. The temperatures were predicted on the two developed models of J mine, and VnetPC that is a numerical program for the flowrate prediction. The result of the simulation notices the temperature in the case of developing all 4 areas of -425ML as a first model is predicted 29.30 at the main gangway 9X of C section and in the case of developing 3 areas of -425ML excepting A area as a second model, it is predicted 27.45 Celsius degrees.

Change of Fractured Rock Permeability due to Thermo-Mechanical Loading of a Deep Geological Repository for Nuclear Waste - a Study on a Candidate Site in Forsmark, Sweden

  • Min, Ki-Bok;Stephansson, Ove
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2009.06a
    • /
    • pp.187-187
    • /
    • 2009
  • Opening of fractures induced by shear dilation or normal deformation can be a significant source of fracture permeability change in fractured rock, which is important for the performance assessment of geological repositories for spent nuclear fuel. As the repository generates heat and later cools the fluid-carrying ability of the rocks becomes a dynamic variable during the lifespan of the repository. Heating causes expansion of the rock close to the repository and, at the same time, contraction close to the surface. During the cooling phase of the repository, the opposite takes place. Heating and cooling together with the, virgin stress can induce shear dilation of fractures and deformation zones and change the flow field around the repository. The objectives of this work are to examine the contribution of thermal stress to the shear slip of fracture in mid- and far-field around a KBS-3 type of repository and to investigate the effect of evolution of stress on the rock mass permeability. In the first part of this study, zones of fracture shear slip were examined by conducting a three-dimensional, thermo-mechanical analysis of a spent fuel repository model in the size of 2 km $\times$ 2 km $\times$ 800 m. Stress evolutions of importance for fracture shear slip are: (1) comparatively high horizontal compressive thermal stress at the repository level, (2) generation of vertical tensile thermal stress right above the repository, (3) horizontal tensile stress near the surface, which can induce tensile failure, and generation of shear stresses at the comers of the repository. In the second part of the study, fracture data from Forsmark, Sweden is used to establish fracture network models (DFN). Stress paths obtained from the thermo-mechanical analysis were used as boundary conditions in DFN-DEM (Discrete Element Method) analysis of six DFN models at the repository level. Increases of permeability up to a factor of four were observed during thermal loading history and shear dilation of fractures was not recovered after cooling of the repository. An understanding of the stress path and potential areas of slip induced shear dilation and related permeability changes during the lifetime of a repository for spent nuclear fuel is of utmost importance for analysing long-term safety. The result of this study will assist in identifying critical areas around a repository where fracture shear slip is likely to develop. The presentation also includes a brief introduction to the ongoing site investigation on two candidate sites for geological repository in Sweden.

  • PDF