• Title/Summary/Keyword: goal detection

Search Result 292, Processing Time 0.031 seconds

Hardware Implementation of Moving Picture Retrieval System Using Scene Change Technique (장면 전환 기법을 이용한 동영상 검색 시스템의 하드웨어 구현)

  • Kim, Jang-Hui;Kang, Dae-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.3
    • /
    • pp.30-36
    • /
    • 2008
  • The multimedia that is characterized by multi-media, multi-features, multi-representations, huge volume, and varieties, is rapidly spreading out due to the increasing of application domains. Thus, it is urgently needed to develop a multimedia information system that can retrieve the needed information rapidly and accurately from the huge amount of multimedia data. For the content-based retrieval of moving picture, picture information is generally used. It is generally used when video is segmented. Through that, it can be a structural video browsing. The tasking that divides video to shot is called video segmentation, and detecting the cut for video segmentation is called cut detection. The goal of this paper is to divide moving picture using HMMD(Hue-Mar-Min-Diff) color model and edge histogram descriptor among the MPEG-7 visual descriptors. HMMD color model is more familiar to human's perception than the other color spaces. Finally, the proposed retrieval system is implemented as hardware.

Early Science of KVN: 43GHz fringe survey

  • Lee, Sang-Sung;Petrov, Leonid;Kim, Jongsoo;Jung, Taehyun;Sohn, Bong Won;Byun, Do-Young
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.2
    • /
    • pp.239.1-239.1
    • /
    • 2012
  • This paper presents the results of one of early sciences with Korean VLBI Network (KVN): a large fringe survey of compact radio sources at 43GHz. We established the catalog of correlated flux densities in three ranges of baseline projection lengths of 637 sources from a 43 GHz (Q-band) survey observed with the Korean VLBI Network. Of them, 623 sources have not been observed before at Q-band with VLBI. The goal of this work in the early science phase of the new VLBI array is twofold: to evaluate the performance of the new instrument that operates in a frequency range of 22--129 GHz and to build a list of objects that can be used as targets and as calibrators. We have observed the list of 799 target sources with declinations down to $-40{\circ}$. Among them, 724 were observed before with VLBI at 22 GHz and had correlated flux densities greater than 200 mJy. The overall detection rate is 78%. The detection limit, defined as the minimum flux density for a source to be detected with 90% probability in a single observation, was in a range of 115--180 mJy depending on declination. However, some sources as weak as 70 mJy have been detected. Of 623 detected sources, 33 objects are detected for the first time in VLBI mode. We determined their coordinates with the median formal uncertainty 20 mas. The results of this work set the basis for future efforts to build the complete flux-limited sample of extragalactic sources at frequencies 22 GHz and higher at 3/4 of the celestial sphere.

  • PDF

Cost analysis of hypertension screening program (고혈압 건강진단의 비용분석)

  • Park, Eun-Cheol;Yu, Seung-Hum
    • Journal of Preventive Medicine and Public Health
    • /
    • v.22 no.3 s.27
    • /
    • pp.380-388
    • /
    • 1989
  • To evaluate the costs of the hypertension screening program of the Korea Medical Insurance Corporation, the records of the screening examinations were used. The sample size was 49,983 of the 906,554 people insured by the Corporation and was obtained by two-stage stratification random sampling. The alternatives for efficiency of the screening program, which were divided into three categories : modification of the screening test package, application of other hypertension diagnostic criteria, and selective approach of tested groups by age, were evaluated according to the cost per patient detected. The results of this study were as follows In the hypertension screening system, the cost per patient detected was Won 30,883. The most nonsensitive test for hypertension detection was ophthalmoscopy, which was examined during the second stage of screening. If the ophthalmoscope examination was excluded, olny one person was not detected, which was 0.2% of detected persons, and the cost per patient detected decreased to Won 28,098. The most efficient modification of the screening test package was measurement of blood pressure through the first and second stages of screening. The cost per patient detected by this modification was Won 24,408. The application of other diagnostic critera, which were more restricted criteria, increased the cost per patient detected by 3.7%-6.7%. The cost per patient detected were Won 170,582 for persons less than 39 years old, Won 20,032 for persons 40 to 59 years old, and Won 8,675 for persons 60 years old and over. In conclusion, the best alternative suggested with respect to efficiency and practical application excluded the ophthalmoscope examination of second stage screening and restricted the target population to persons greater than 40 years old. The application of this alternative decreased 54.9% of the screening costs and the cost per patient detected was Won 15,222. This study was limited in that measurement of effectivenes was not of the ultimate goal of screening, which is decreasing morbidity and mortality, but was of disease detection as the short-term objective.

  • PDF

Detection of Defects in a Thin Steel Plate Using Ultrasonic Guided Wave (유도초음파를 이용한 박판에서의 결함의 검출에 관한 연구)

  • Jeong, Hee-Don;Shin, Hyeon-Jae;Rose, Joseph L.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.18 no.6
    • /
    • pp.445-454
    • /
    • 1998
  • In order to establish a technical concept for the detection of defects in weldments in thin steel plate, an experimental and theoretical investigation was carried out for artificial defects in a steel plate having a thickness of 2.4mm by using the guided wave technique. In particular the goal was to find the most effective testing parameters paying attention to the relationship between the excitation frequency by a tone burst system and various incident angles. It was found that the test conditions that worked best was for a frequency of 840kHz and an incident angle of 30 or 85 degrees, most of the defects were detected with these conditions. Also, it was clear that a guided wave mode generated under an incident angle of 30 degrees was a symmetric mode, So, and that of 85 degrees corresponded to an antisymmetric mode, Ao. By using the two modes, most of all of the defects could be detected. Furthermore, it was shown that the antisymmetric mode was more sensitive to defects near the surface than the symmetric mode. Theoretical predictions confirmed this sensitivity improvement with Ao for surface defects because of wave structure variation and energy concentration near the surface.

  • PDF

KOMPSAT Imagery Application Status (다목적실용위성 영상자료 활용 현황)

  • Lee, Kwangjae;Kim, Younsoo;Chae, Taebyeong
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_3
    • /
    • pp.1311-1317
    • /
    • 2018
  • The ultimate goal of satellite development is to use information obtained from satellites. Therefore, national-levelsatellite development program should include not only hardware development, but also infrastructure establishment and application technology development for information utilization. Until now, Korea has developed various satellites and has been very useful in weather and maritime surveillance as well as various disasters. In particular, KOMPSAT (Korea Multi-purpose Satellite) images have been used extensively in agriculture, forestry and marine fields based on high spatial resolution, and has been widely used in research related to precision mapping and change detection. This special issue aims to introduce a variety of recent studies conducted using KOMPSAT optical and SAR (Synthetic Aperture Radar) images and to disseminate related satellite image application technologies to the public sector.

A Hybrid Optimized Deep Learning Techniques for Analyzing Mammograms

  • Bandaru, Satish Babu;Deivarajan, Natarajasivan;Gatram, Rama Mohan Babu
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.73-82
    • /
    • 2022
  • Early detection continues to be the mainstay of breast cancer control as well as the improvement of its treatment. Even so, the absence of cancer symptoms at the onset has early detection quite challenging. Therefore, various researchers continue to focus on cancer as a topic of health to try and make improvements from the perspectives of diagnosis, prevention, and treatment. This research's chief goal is development of a system with deep learning for classification of the breast cancer as non-malignant and malignant using mammogram images. The following two distinct approaches: the first one with the utilization of patches of the Region of Interest (ROI), and the second one with the utilization of the overall images is used. The proposed system is composed of the following two distinct stages: the pre-processing stage and the Convolution Neural Network (CNN) building stage. Of late, the use of meta-heuristic optimization algorithms has accomplished a lot of progress in resolving these problems. Teaching-Learning Based Optimization algorithm (TIBO) meta-heuristic was originally employed for resolving problems of continuous optimization. This work has offered the proposals of novel methods for training the Residual Network (ResNet) as well as the CNN based on the TLBO and the Genetic Algorithm (GA). The classification of breast cancer can be enhanced with direct application of the hybrid TLBO- GA. For this hybrid algorithm, the TLBO, i.e., a core component, will combine the following three distinct operators of the GA: coding, crossover, and mutation. In the TLBO, there is a representation of the optimization solutions as students. On the other hand, the hybrid TLBO-GA will have further division of the students as follows: the top students, the ordinary students, and the poor students. The experiments demonstrated that the proposed hybrid TLBO-GA is more effective than TLBO and GA.

Modeling on Policy Conflict for Managing Heterogeneous Security Systems in Distributed Network Environment (분산 환경에서 이종의 보안시스템 관리를 위한 정책 충돌 모델링)

  • Lee, Dong-Young;Seo, Hee-Suk;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.1-8
    • /
    • 2009
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we defined the security policies using Z-Notation and the detection algorithm of policy conflict for managing heterogeneous firewall systems. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. With the process of the detection and resolution for policy conflict, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

A study on inspection system for brake pad (브레이크패드 검사 시스템 구축에 관한 연구)

  • Kim, Tae-Eun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.3
    • /
    • pp.403-408
    • /
    • 2013
  • In this paper, we propose to develop an inspection system that recognizes surface cracks on the brake pad and the types of brake pads of each car during the production process, on a conveyor belt. The brake pad is made from a mixture of materials, using high-heat and pressure. Therefore, the brake pad can be cracked and damaged on the surface during production. Our goal is to develop an effective detection system and application software to detect substandard product. A shadow is generated when the artificial light shines on the damaged of the surface of pad. Using the computer vision algorithm that is proposed we can detect the substandard product. Results from experiments confrim the performance of the proposed algorithm.

Efficient Strategy to Identify Gene-Gene Interactions and Its Application to Type 2 Diabetes

  • Li, Donghe;Wo, Sungho
    • Genomics & Informatics
    • /
    • v.14 no.4
    • /
    • pp.160-165
    • /
    • 2016
  • Over the past decade, the detection of gene-gene interactions has become more and more popular in the field of genome-wide association studies (GWASs). The goal of the GWAS is to identify genetic susceptibility to complex diseases by assaying and analyzing hundreds of thousands of single-nucleotide polymorphisms. However, such tests are computationally demanding and methodologically challenging. Recently, a simple but powerful method, named "BOolean Operation-based Screening and Testing" (BOOST), was proposed for genome-wide gene-gene interaction analyses. BOOST was designed with a Boolean representation of genotype data and is approximately equivalent to the log-linear model. It is extremely fast, and genome-wide gene-gene interaction analyses can be completed within a few hours. However, BOOST can not adjust for covariate effects, and its type-1 error control is not correct. Thus, we considered two-step approaches for gene-gene interaction analyses. First, we selected gene-gene interactions with BOOST and applied logistic regression with covariate adjustments to select gene-gene interactions. We applied the two-step approach to type 2 diabetes (T2D) in the Korea Association Resource (KARE) cohort and identified some promising pairs of single-nucleotide polymorphisms associated with T2D.