• Title/Summary/Keyword: object information

Search Result 8,789, Processing Time 0.037 seconds

A Real-Time Head Tracking Algorithm Using Mean-Shift Color Convergence and Shape Based Refinement (Mean-Shift의 색 수렴성과 모양 기반의 재조정을 이용한 실시간 머리 추적 알고리즘)

  • Jeong Dong-Gil;Kang Dong-Goo;Yang Yu Kyung;Ra Jong Beom
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.1-8
    • /
    • 2005
  • In this paper, we propose a two-stage head tracking algorithm adequate for real-time active camera system having pan-tilt-zoom functions. In the color convergence stage, we first assume that the shape of a head is an ellipse and its model color histogram is acquired in advance. Then, the min-shift method is applied to roughly estimate a target position by examining the histogram similarity of the model and a candidate ellipse. To reflect the temporal change of object color and enhance the reliability of mean-shift based tracking, the target histogram obtained in the previous frame is considered to update the model histogram. In the updating process, to alleviate error-accumulation due to outliers in the target ellipse of the previous frame, the target histogram in the previous frame is obtained within an ellipse adaptively shrunken on the basis of the model histogram. In addition, to enhance tracking reliability further, we set the initial position closer to the true position by compensating the global motion, which is rapidly estimated on the basis of two 1-D projection datasets. In the subsequent stage, we refine the position and size of the ellipse obtained in the first stage by using shape information. Here, we define a robust shape-similarity function based on the gradient direction. Extensive experimental results proved that the proposed algorithm performs head hacking well, even when a person moves fast, the head size changes drastically, or the background has many clusters and distracting colors. Also, the propose algorithm can perform tracking with the processing speed of about 30 fps on a standard PC.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

Aspect-Based Sentiment Analysis Using BERT: Developing Aspect Category Sentiment Classification Models (BERT를 활용한 속성기반 감성분석: 속성카테고리 감성분류 모델 개발)

  • Park, Hyun-jung;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.1-25
    • /
    • 2020
  • Sentiment Analysis (SA) is a Natural Language Processing (NLP) task that analyzes the sentiments consumers or the public feel about an arbitrary object from written texts. Furthermore, Aspect-Based Sentiment Analysis (ABSA) is a fine-grained analysis of the sentiments towards each aspect of an object. Since having a more practical value in terms of business, ABSA is drawing attention from both academic and industrial organizations. When there is a review that says "The restaurant is expensive but the food is really fantastic", for example, the general SA evaluates the overall sentiment towards the 'restaurant' as 'positive', while ABSA identifies the restaurant's aspect 'price' as 'negative' and 'food' aspect as 'positive'. Thus, ABSA enables a more specific and effective marketing strategy. In order to perform ABSA, it is necessary to identify what are the aspect terms or aspect categories included in the text, and judge the sentiments towards them. Accordingly, there exist four main areas in ABSA; aspect term extraction, aspect category detection, Aspect Term Sentiment Classification (ATSC), and Aspect Category Sentiment Classification (ACSC). It is usually conducted by extracting aspect terms and then performing ATSC to analyze sentiments for the given aspect terms, or by extracting aspect categories and then performing ACSC to analyze sentiments for the given aspect category. Here, an aspect category is expressed in one or more aspect terms, or indirectly inferred by other words. In the preceding example sentence, 'price' and 'food' are both aspect categories, and the aspect category 'food' is expressed by the aspect term 'food' included in the review. If the review sentence includes 'pasta', 'steak', or 'grilled chicken special', these can all be aspect terms for the aspect category 'food'. As such, an aspect category referred to by one or more specific aspect terms is called an explicit aspect. On the other hand, the aspect category like 'price', which does not have any specific aspect terms but can be indirectly guessed with an emotional word 'expensive,' is called an implicit aspect. So far, the 'aspect category' has been used to avoid confusion about 'aspect term'. From now on, we will consider 'aspect category' and 'aspect' as the same concept and use the word 'aspect' more for convenience. And one thing to note is that ATSC analyzes the sentiment towards given aspect terms, so it deals only with explicit aspects, and ACSC treats not only explicit aspects but also implicit aspects. This study seeks to find answers to the following issues ignored in the previous studies when applying the BERT pre-trained language model to ACSC and derives superior ACSC models. First, is it more effective to reflect the output vector of tokens for aspect categories than to use only the final output vector of [CLS] token as a classification vector? Second, is there any performance difference between QA (Question Answering) and NLI (Natural Language Inference) types in the sentence-pair configuration of input data? Third, is there any performance difference according to the order of sentence including aspect category in the QA or NLI type sentence-pair configuration of input data? To achieve these research objectives, we implemented 12 ACSC models and conducted experiments on 4 English benchmark datasets. As a result, ACSC models that provide performance beyond the existing studies without expanding the training dataset were derived. In addition, it was found that it is more effective to reflect the output vector of the aspect category token than to use only the output vector for the [CLS] token as a classification vector. It was also found that QA type input generally provides better performance than NLI, and the order of the sentence with the aspect category in QA type is irrelevant with performance. There may be some differences depending on the characteristics of the dataset, but when using NLI type sentence-pair input, placing the sentence containing the aspect category second seems to provide better performance. The new methodology for designing the ACSC model used in this study could be similarly applied to other studies such as ATSC.

Methods for Integration of Documents using Hierarchical Structure based on the Formal Concept Analysis (FCA 기반 계층적 구조를 이용한 문서 통합 기법)

  • Kim, Tae-Hwan;Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.63-77
    • /
    • 2011
  • The World Wide Web is a very large distributed digital information space. From its origins in 1991, the web has grown to encompass diverse information resources as personal home pasges, online digital libraries and virtual museums. Some estimates suggest that the web currently includes over 500 billion pages in the deep web. The ability to search and retrieve information from the web efficiently and effectively is an enabling technology for realizing its full potential. With powerful workstations and parallel processing technology, efficiency is not a bottleneck. In fact, some existing search tools sift through gigabyte.syze precompiled web indexes in a fraction of a second. But retrieval effectiveness is a different matter. Current search tools retrieve too many documents, of which only a small fraction are relevant to the user query. Furthermore, the most relevant documents do not nessarily appear at the top of the query output order. Also, current search tools can not retrieve the documents related with retrieved document from gigantic amount of documents. The most important problem for lots of current searching systems is to increase the quality of search. It means to provide related documents or decrease the number of unrelated documents as low as possible in the results of search. For this problem, CiteSeer proposed the ACI (Autonomous Citation Indexing) of the articles on the World Wide Web. A "citation index" indexes the links between articles that researchers make when they cite other articles. Citation indexes are very useful for a number of purposes, including literature search and analysis of the academic literature. For details of this work, references contained in academic articles are used to give credit to previous work in the literature and provide a link between the "citing" and "cited" articles. A citation index indexes the citations that an article makes, linking the articleswith the cited works. Citation indexes were originally designed mainly for information retrieval. The citation links allow navigating the literature in unique ways. Papers can be located independent of language, and words in thetitle, keywords or document. A citation index allows navigation backward in time (the list of cited articles) and forwardin time (which subsequent articles cite the current article?) But CiteSeer can not indexes the links between articles that researchers doesn't make. Because it indexes the links between articles that only researchers make when they cite other articles. Also, CiteSeer is not easy to scalability. Because CiteSeer can not indexes the links between articles that researchers doesn't make. All these problems make us orient for designing more effective search system. This paper shows a method that extracts subject and predicate per each sentence in documents. A document will be changed into the tabular form that extracted predicate checked value of possible subject and object. We make a hierarchical graph of a document using the table and then integrate graphs of documents. The graph of entire documents calculates the area of document as compared with integrated documents. We mark relation among the documents as compared with the area of documents. Also it proposes a method for structural integration of documents that retrieves documents from the graph. It makes that the user can find information easier. We compared the performance of the proposed approaches with lucene search engine using the formulas for ranking. As a result, the F.measure is about 60% and it is better as about 15%.

Preliminary Design of Monitoring and Control Subsystem for GNSS Ground Station (위성항법 지상국 감시제어시스템 예비설계)

  • Jeong, Seong-Kyun;Lee, Jae-Eun;Park, Han-Earl;Lee, Sang-Uk;Kim, Jae-Hoon
    • Journal of Astronomy and Space Sciences
    • /
    • v.25 no.2
    • /
    • pp.227-238
    • /
    • 2008
  • GNSS (Global Navigation Satellite System) Ground Station monitors navigation satellite signal, analyzes navigation result, and uploads correction information to satellite. GNSS Ground Station is considered as a main object for constructing GNSS infra-structure and applied in various fields. ETRI (Electronics and Telecommunications Research Institute) is developing Monitoring and Control subsystem, which is subsystem of GNSS Ground Station. Monitoring and Control subsystem acquires GPS and Galileo satellite signal and provides signal monitoring data to GNSS control center. In this paper, the configurations of GNSS Ground Station and Monitoring and Control subsystem are introduced and the preliminary design of Monitoring and Control subsystem is performed. Monitoring and Control subsystem consists of data acquisition module, data formatting and archiving module, data error correction module, navigation solution determination module, independent quality monitoring module, and system operation and maintenance module. The design process uses UML (Unified Modeling Language) method which is a standard for developing software and consists of use-case modeling, domain design, software structure design, and user interface structure design. The preliminary design of Monitoring and Control subsystem enhances operation capability of GNSS Ground Station and is used as basic material for detail design of Monitoring and Control subsystem.

A Study on Estimation Technique of Manoeuvring Difficulty Using the Ship Manoeuvre Simulator for Berthing/Deberthing (선박 접이안 조종 시뮬레이터를 이용한 조종위험도 평가 기법에 관한 연구)

  • Yang Seung-Yeul;Sohn Kyoung-Ho;Lee Hee-Yong;Ha Mun-Keun;Kim Hyun-Soo;Lee JIn-Ho;Im Nam-Kyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.11a
    • /
    • pp.81-87
    • /
    • 2004
  • It includes the considerable concentration and dangerousness as the peculiar work of a pilot and dock-master to berthing/deberthing the big object as for the ship within the port or the ship yard. A tug utilization is getting increased in this berthing/deberthing work and the own ship is affected a lot by external force due to moving with low advance speed. In this study, we constructed the 2 dimension virtual system which can conduct the berthing/deberthing manoeuvring work by using mainly tugs in a external force, particularly strong wind. Also, propose objective standard that could estimate the degree of manoeuvring difficulty, and conducted simulation experiment for this. we analyzed correlations between the subjective estimation which is described numerically the decreased dangerousness and the objective index which is related to the main parameter regarding manoeuvring by using this simulator from the result of conducting simulation experiment. And then we discussed the estimation technique of manoeuvring difficulty.

  • PDF

A Service Reusability-Centric Process for Developing Software-as-a-Service (서비스 재사용성 중심의 Software-as-a-Service 개발 프로세스)

  • Lee, Jung-Woo;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.7
    • /
    • pp.518-535
    • /
    • 2010
  • Cloud Computing is emerged as an effective reuse paradigm, where service providers operate hardware and software and as a service, and service consumers invoke the service through Internet. Software-as-a-Service (SaaS) is a type of cloud services, where the whole software is designed as a service so that several consumers can reuse the SaaS. While tradition software applications are developed for a specific organization, SaaS is developed for multiple users in the various organizations. Hence, reusability is very essential characteristic of SaaS. Reusability is defined as a metric of how effective and efficient software functionalities can be used by various users. Reusability in SaaS is evaluated by considering three sub-characteristics; applicability, adaptability, and scalability. Since such a SaaS has considerable differences and characteristics from traditional software applications, conventional methods including object-oriented modeling, component-based development method, and service-oriented architecture (SOA) service development method would be limited in developing services which can fulfill these three sub-characteristics related to reusability as well as SaaS-intrinsic characteristics. Hence, there is a great demand for effective processes for developing SaaS cloud services. In this paper, we present a practical process for developing SaaS, which focuses on ensuring reusability. And by performing a case study with our proposed SaaS development process, we evaluate applicability of our proposed process and explain how the process is used in a real domain. Then, we compare our proposed process with others for verifying our study. Through the proposed process, cloud services with high quality can be more effectively developed.

Robust Location Tracking Using a Double Layered Particle Filter (이중 구조의 파티클 필터를 이용한 강인한 위치추적)

  • Yun, Keun-Ho;Kim, Dai-Jin;Bang, Sung-Yang
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.12
    • /
    • pp.1022-1030
    • /
    • 2006
  • The location awareness is an important part of many ubiquitous computing systems, but a perfect location system does not exist yet in spite of many researches. Among various location tracking systems, we choose the RFID system due to its wide applications. However, the sensed RSSI signal is too sensitive to the direction of a RFID reader antenna, the orientation of a RFID tag, the human interference, and the propagation media situation. So, the existing location tracking method in spite of using the particle filter is not working well. To overcome this shortcoming, we suggest a robust location tracking method with a double layered structure, where the first layer coarsely estimates a tag's location in the block level using a regression technique or the SVM classifier and the second layer precisely computes the tag's location, velocity and direction using the particle filter technique. Its layered structure improves the location tracking performance by restricting the moving degree of hidden variables. Many extensive experiments show that the proposed location tracking method is so precise and robust to be a good choice for implementing the location estimation of a person or an object in the ubiquitous computing. We also validate the usefulness of the proposed location tracking method by implementing it for a real-time people monitoring system in a noisy and complicate workplace.

Algorithm Implementation for Detection and Tracking of Ships Using FMCW Radar (FMCW Radar를 이용한 선박 탐지 및 추적 기법 구현)

  • Hong, Dan-Bee;Yang, Chan-Su
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.16 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • This study focuses on a ship detection and tracking method using Frequency Modulated Continuous Wave (FMCW) radar used for horizontal surveillance. In general, FMCW radar can play an important role in maritime surveillance, because it has many advantages such as low warm-up time, low power consumption, and its all weather performance. In this paper, we introduce an effective method for data and signal processing of ship's detecting and tracking using the X-band radar. Ships information was extracted using an image-based processing method such as the land masking and morphological filtering with a threshold for a cycle data merged from raw data (spoke data). After that, ships was tracked using search-window that is ship's expected rectangle area in the next frame considering expected maximum speed (19 kts) and interval time (5 sec). By using this method, the tracking results for most of the moving object tracking was successful and those results were compared with AIS (Automatic Identification System) for ships position. Therefore, it can be said that the practical application of this detection and tracking method using FMCW radar improve the maritime safety as well as expand the surveillance coverage cost-effectively. Algorithm improvements are required for an enhancement of small ship detection and tracking technique in the future.

Interrelation Research of the Knowledge Regarding the Oral Health of the Elementary School Child and Behavior (초등학교 아동의 구강보건에 관한 지식과 행동의 상관관계 연구)

  • Lee, Hye-Kyung;Park, Chung-Sun;Kim, Mi-Jeong
    • Journal of dental hygiene science
    • /
    • v.8 no.3
    • /
    • pp.155-161
    • /
    • 2008
  • The purpose of this study was to provide information on goal setting for elementary oral-health education. The subjects in this study were 513, fourth and sixth graders from an elementary school located in the city of Iksan, north Jeolla province. It investigated the interrelation of the knowledge regarding the oral health of the elementary school student and conduct and with afterwords it got a same conclusion.: 1. The oral health knowledge degree of the investigation object people in 14 perfect score is not high is not with 8.77, the school girl oral health knowledge degree is higher the south student and than it was visible the difference which considers. 2. Also the student one recording oral health knowledge degree which is school dental health education experience appeared highly, considers statistically the difference which it was visible. 3. Oral health behavior degree the result which it investigates at 5 Likert scales, the whole average is not high was not with 3.13, it followed considers the difference which it was visible in grade. 4. The student one recording oral health behavior degree where the oral health knowledge is high appears highly, it was visible the difference which oral health knowledge and conduct considers. 5. Oral health knowledge and oral health behavior and school dental health education experience was a just fanshaped higher officer and the oral health knowledge degree was high and highly the possibility of knowing the burden there was also oral health behavior. 6. Relationship without the necessity of school oral health disappointment necessity and the oral healthy charge teacher was recognizing in gender and grade.

  • PDF