• Title/Summary/Keyword: deep running

Search Result 121, Processing Time 0.024 seconds

Prediction System of Running Heart Rate based on FitRec (FitRec 기반 달리기 심박수 예측 시스템)

  • Kim, Jinwook;Kim, Kwanghyun;Seon, Joonho;Lee, Seongwoo;Kim, Soo-Hyun;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.165-171
    • /
    • 2022
  • Human heart rate can be used to measure exercise intensity as an important indicator. If heart rate can be predicted, exercise can be performed more efficiently by regulating the intensity of exercise in advance. In this paper, a FitRec-based prediction model is proposed for estimating running heart rate for users. Endomondo data is utilized for training the proposed prediction model. The processing algorithms for time-series data, such as LSTM(long short term memory) and GRU(gated recurrent unit), are employed to compare their performance. On the basis of simulation results, it was demonstrated that the proposed model trained with running exercise performed better than the model trained with several cardiac exercises.

Vehicle License Plate Recognition System using SSD-Mobilenet and ResNet for Mobile Device (SSD-Mobilenet과 ResNet을 이용한 모바일 기기용 자동차 번호판 인식시스템)

  • Kim, Woonki;Dehghan, Fatemeh;Cho, Seongwon
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.92-98
    • /
    • 2020
  • This paper proposes a vehicle license plate recognition system using light weight deep learning models without high-end server. The proposed license plate recognition system consists of 3 steps: [license plate detection]-[character area segmentation]-[character recognition]. SSD-Mobilenet was used for license plate detection, ResNet with localization was used for character area segmentation, ResNet was used for character recognition. Experiemnts using Samsung Galaxy S7 and LG Q9, accuracy showed 85.3% accuracy and around 1.1 second running time.

Speaker Verification Model Using Short-Time Fourier Transform and Recurrent Neural Network (STFT와 RNN을 활용한 화자 인증 모델)

  • Kim, Min-seo;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1393-1401
    • /
    • 2019
  • Recently as voice authentication function is installed in the system, it is becoming more important to accurately authenticate speakers. Accordingly, a model for verifying speakers in various ways has been suggested. In this paper, we propose a new method for verifying speaker verification using a Short-time Fourier Transform(STFT). Unlike the existing Mel-Frequency Cepstrum Coefficients(MFCC) extraction method, we used window function with overlap parameter of around 66.1%. In this case, the speech characteristics of the speaker with the temporal characteristics are studied using a deep running model called RNN (Recurrent Neural Network) with LSTM cell. The accuracy of proposed model is around 92.8% and approximately 5.5% higher than that of the existing speaker certification model.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

CNN-LSTM Coupled Model for Prediction of Waterworks Operation Data

  • Cao, Kerang;Kim, Hangyung;Hwang, Chulhyun;Jung, Hoekyung
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1508-1520
    • /
    • 2018
  • In this paper, we propose an improved model to provide users with a better long-term prediction of waterworks operation data. The existing prediction models have been studied in various types of models such as multiple linear regression model while considering time, days and seasonal characteristics. But the existing model shows the rate of prediction for demand fluctuation and long-term prediction is insufficient. Particularly in the deep running model, the long-short-term memory (LSTM) model has been applied to predict data of water purification plant because its time series prediction is highly reliable. However, it is necessary to reflect the correlation among various related factors, and a supplementary model is needed to improve the long-term predictability. In this paper, convolutional neural network (CNN) model is introduced to select various input variables that have a necessary correlation and to improve long term prediction rate, thus increasing the prediction rate through the LSTM predictive value and the combined structure. In addition, a multiple linear regression model is applied to compile the predicted data of CNN and LSTM, which then confirms the data as the final predicted outcome.

PharmacoNER Tagger: a deep learning-based tool for automatically finding chemicals and drugs in Spanish medical texts

  • Armengol-Estape, Jordi;Soares, Felipe;Marimon, Montserrat;Krallinger, Martin
    • Genomics & Informatics
    • /
    • v.17 no.2
    • /
    • pp.15.1-15.7
    • /
    • 2019
  • Automatically detecting mentions of pharmaceutical drugs and chemical substances is key for the subsequent extraction of relations of chemicals with other biomedical entities such as genes, proteins, diseases, adverse reactions or symptoms. The identification of drug mentions is also a prior step for complex event types such as drug dosage recognition, duration of medical treatments or drug repurposing. Formally, this task is known as named entity recognition (NER), meaning automatically identifying mentions of predefined entities of interest in running text. In the domain of medical texts, for chemical entity recognition (CER), techniques based on hand-crafted rules and graph-based models can provide adequate performance. In the recent years, the field of natural language processing has mainly pivoted to deep learning and state-of-the-art results for most tasks involving natural language are usually obtained with artificial neural networks. Competitive resources for drug name recognition in English medical texts are already available and heavily used, while for other languages such as Spanish these tools, although clearly needed were missing. In this work, we adapt an existing neural NER system, NeuroNER, to the particular domain of Spanish clinical case texts, and extend the neural network to be able to take into account additional features apart from the plain text. NeuroNER can be considered a competitive baseline system for Spanish drug and CER promoted by the Spanish national plan for the advancement of language technologies (Plan TL).

Improved Sliding Shapes for Instance Segmentation of Amodal 3D Object

  • Lin, Jinhua;Yao, Yu;Wang, Yanjie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5555-5567
    • /
    • 2018
  • State-of-art instance segmentation networks are successful at generating 2D segmentation mask for region proposals with highest classification score, yet 3D object segmentation task is limited to geocentric embedding or detector of Sliding Shapes. To this end, we propose an amodal 3D instance segmentation network called A3IS-CNN, which extends the detector of Deep Sliding Shapes to amodal 3D instance segmentation by adding a new branch of 3D ConvNet called A3IS-branch. The A3IS-branch which takes 3D amodal ROI as input and 3D semantic instances as output is a fully convolution network(FCN) sharing convolutional layers with existing 3d RPN which takes 3D scene as input and 3D amodal proposals as output. For two branches share computation with each other, our 3D instance segmentation network adds only a small overhead of 0.25 fps to Deep Sliding Shapes, trading off accurate detection and point-to-point segmentation of instances. Experiments show that our 3D instance segmentation network achieves at least 10% to 50% improvement over the state-of-art network in running time, and outperforms the state-of-art 3D detectors by at least 16.1 AP.

Study on Extension of the 6-DOF Measurement Area for a Model Ship by Developing Auto-tracking Technology for Towing Carriage in Deep Ocean Engineering Tank

  • Jung, Jae-sang;Lee, Young-guk;Seo, Min-guk;Park, In-Bo;Kim, Jin-ha;Kang, Dong-bae
    • Journal of Ocean Engineering and Technology
    • /
    • v.36 no.1
    • /
    • pp.50-60
    • /
    • 2022
  • The deep ocean engineering basin (DOEB) of the Korea Research Institute of Ship and Ocean Engineering (KRISO) is equipped with an extreme-environment reproduction facility that can analyze the motion characteristics of offshore structures and ships. In recent years, there have been requirements for a wide range of six-degree-of-freedom (6-DOF) motion measurements for performing maneuvering tests and free-running tests of target objects (offshore structures or ships). This study introduces the process of developing a wide-area motion measurement technology by incorporating the auto-tracking technology of the towing carriage system to overcome the existing 6-DOF motion measurement limitation. To realize a wide range of motion measurements, the automatic tracking control system of the towing carriage in the DOEB was designed as a speed control method. To verify the control performance, the characteristics of the towing carriage according to the variation in control gain were analyzed. Finally, a wide range of motions was tested using a model test object (a remotely operated vehicle (ROV)), and the wide-area motion measurement technology was implemented using an automatic tracking control system for a towing carriage.

Detection of TrustZone Rootkits Using ARM PMU Events (ARM PMU 이벤트를 활용한 TrustZone 루트킷 탐지에 대한 연구)

  • Jimin Choi;Youngjoo Shin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.929-938
    • /
    • 2023
  • ARM processors, utilized in mobile devices, have integrated the hardware isolation framework, TrustZone technology, to implement two execution environments: the trusted domain "Secure World" and the untrusted domain "Normal World". Rootkit is a type of malicious software that gains administrative access and hide its presence to create backdoors. Detecting the presence of a rootkit in a Secure World is difficult since processes running within the Secure World have no memory access restrictions and are isolated. This paper proposes a technique that leverages the hardware based PMU(Performance Monitoring Unit) to measure events of the Secure World rootkit and to detect the rootkit using deep learning.

Experimental Evaluation on Shear Strength of High-Strength RC Deep Beams (고강도 철근콘크리트 깊은 보의 전단 강도에 관한 실험평가)

  • Lee, Woo-Jin;Yoon, Seung-Joe;Kim, Seong-Soo
    • Journal of the Korea Concrete Institute
    • /
    • v.15 no.5
    • /
    • pp.689-696
    • /
    • 2003
  • Recently, Appendix A of ACI 318∼02 Code introduced the Strut-and-Tie Model(STM) procedure in shear design of deep flexural members. The STM procedure is widely used in the design of concrete regions where the distribution of longitudinal strains is significantly nonlinear, such as deep beams, beams with large openings, corbels, and dapped-end beams. Experimental study included five high-strength reinforced concrete deep beams with different detailing schemes for the horizontal and vertical reinforcement. The specimens were designed as simply supported beams subjected to concentrated loads on the top face and supported on the bottom face. At failure, all specimen exhibited primary diagonal crack running from the support region to the point load. Specimens which had mechanical anchorages(terminators) gives better representation of the load-carrying mechanism than the specimen had standard 90-degree anchorage at failure in deep flexural members. Based on the test results, shear design procedures contained in the ACI 318-99 Code, Appendix A of the ACI 318-02 Code, CSA A23.3-94 Code and CIRIA Guide-2 were evaluated. The Shear design of ACI 318-99 Code, Appendix A of the ACI 318-02 Code and CIRIA Guide-2 shown to be conservative predictions from 10% to 36% in the shear strength of the single-span deep beam which was tested. ACI 318-99 Code was the lowest standard deviation.