• Title/Summary/Keyword: semantic complexity

Search Result 71, Processing Time 0.023 seconds

Semantic Segmentation of Agricultural Crop Multispectral Image Using Feature Fusion (특징 융합을 이용한 농작물 다중 분광 이미지의 의미론적 분할)

  • Jun-Ryeol Moon;Sung-Jun Park;Joong-Hwan Baek
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.2
    • /
    • pp.238-245
    • /
    • 2024
  • In this paper, we propose a framework for improving the performance of semantic segmentation of agricultural multispectral image using feature fusion techniques. Most of the semantic segmentation models being studied in the field of smart farms are trained on RGB images and focus on increasing the depth and complexity of the model to improve performance. In this study, we go beyond the conventional approach and optimize and design a model with multispectral and attention mechanisms. The proposed method fuses features from multiple channels collected from a UAV along with a single RGB image to increase feature extraction performance and recognize complementary features to increase the learning effect. We study the model structure to focus on feature fusion and compare its performance with other models by experimenting with favorable channels and combinations for crop images. The experimental results show that the model combining RGB and NDVI performs better than combinations with other channels.

An Abstraction Method for State Minimization based on Syntactic and Semantic Patterns in the Execution Space of Real-Time Systems (실시간 시스템의 실행 공간상에서 구문 및 의미패턴에 기반한 상태 최소화를 위한 추상화 방법)

  • 박지연;조기환;이문근
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.1_2
    • /
    • pp.103-116
    • /
    • 2003
  • States explosion due to composition of spaces of data, temporal, and locational values is one of the well-known critical problems which cause difficulty in understanding and analysing real-time systems specified with state-based formal methods. In order to overcome this problem, this paper presents an abstraction method for state minimization based on an abstraction in system specification and an abstraction in system execution. The first is named the syntactic in system specification and an abstraction in system execution. The first is named the syntactic abstraction, through which the patterns of the unconditionally internalized computation and the repetition and selection structures are abstracted. The latter is named the semantic abstraction, through which the patterns of the execution space represented with data. Through the abstractions, the components of a system in specification and execution model is hierarchically organized. The system can be analyzed briefly in the upper level in an skeleton manner with low complexity. The system, however, can be abstraction method for the state minimization and the decrease in analysis complexity through the abstraction with examples.

The Influence of the Ratio of Greenery on the Visual Preference in interior Landscape (실내조경에 있어서 식물의 시각량이 시각선호에 미치는 영향)

  • 이남현;방광자
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.24 no.2
    • /
    • pp.13-24
    • /
    • 1996
  • The purpose of this study is to suggest optimum level of the Ratio of Greenery within the frame of vision in the interior landscape design through the analysis of visual character and preference of the interior landscape. The concept of the RG was defined as the ratio of projected area of plants higher than 1.2M against background wall from eye level. 5 photography of Interior landscape space -- 10,20,30,40 and 50% of the RG-- were constructed by computer graphic techinques. Likert scale and semantic differential scale were used to analyse visual character and preference of the interior landscape space. The analysis results are as follows : 1. Factors that compose of the image of the interior landscape have been found to be the "evaluation ", "complexity". The mean value of semantic differential scale showed a significant difference according to RG. When the RG was 20~30%, "Harmony" and "stability" was strongly recognized than the other factors and the interior landscape made the interior space natural and intimate. But at the RG 40!50%, users felt "stuffy" and "too complex" by many plants, so it was not efficient the Interior Landscape. 2. The visual preference was significantly different according to RG. The mean value of the visual preference was increased as the RG was higher, it was the highest at the RG 30%. But over the RG 30%, the preference level was declined. 3. Based on these results, this study suggests that the optimum level of RG in the Interior Landscape is 30%.at the optimum level of RG in the Interior Landscape is 30%.

  • PDF

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.

Survey of Automatic Query Expansion for Arabic Text Retrieval

  • Farhan, Yasir Hadi;Noah, Shahrul Azman Mohd;Mohd, Masnizah
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.4
    • /
    • pp.67-86
    • /
    • 2020
  • Information need has been one of the main motivations for a person using a search engine. Queries can represent very different information needs. Ironically, a query can be a poor representation of the information need because the user can find it difficult to express the information need. Query Expansion (QE) is being popularly used to address this limitation. While QE can be considered as a language-independent technique, recent findings have shown that in certain cases, language plays an important role. Arabic is a language with a particularly large vocabulary rich in words with synonymous shades of meaning and has high morphological complexity. This paper, therefore, provides a review on QE for Arabic information retrieval, the intention being to identify the recent state-of-the-art of this burgeoning area. In this review, we primarily discuss statistical QE approaches that include document analysis, search, browse log analyses, and web knowledge analyses, in addition to the semantic QE approaches, which use semantic knowledge structures to extract meaningful word relationships. Finally, our conclusion is that QE regarding the Arabic language is subjected to additional investigation and research due to the intricate nature of this language.

The Acquisition and Development of the Korean Adverbial Particle -ey by L1 English Learners of Korean (제2 외국어로 한국어를 배우는 영어권 학습자의 한국어 부사격 조사 '-에 의 습득과 발달에 관한 연구)

  • Turker, Ebru
    • Journal of Korean language education
    • /
    • v.28 no.4
    • /
    • pp.337-366
    • /
    • 2017
  • This study examines the acquisition of the multiple semantic functions of the Korean adverbial particle -ey by L1 American English learners of Korean as a second language at U.S. institutions. Participants at beginning, intermediate, and advanced proficiency levels (N = 45) were tested on the ability to interpret and produce five of the meanings of -ey, which they had been taught in formal classroom settings in the first semester of their Korean language learning. The results show different developmental trajectories for the particle's different semantic functions. The findings of a statistical analysis indicate that the beginning and intermediate proficiency learners had largely acquired the time, goal, and stative location meanings, but not the contact and unit meanings; the advanced learners demonstrated acquisition of all except for the unit meaning. The study suggests that in addition to factors such as semantic complexity and cross-linguistic influence, several other factors including L2 frequency, the availability of linguistic input, and instructional method also contribute to the acquisition of -ey.

Stability of Early Language Development of Verbally-Precocious Korean Children from 2 to 3 Year-old (조기언어발달 아동의 초기 언어능력의 안정성)

  • Lee, Kwee-Ock
    • The Korean Journal of Community Living Science
    • /
    • v.19 no.4
    • /
    • pp.673-684
    • /
    • 2008
  • The purpose of this study is to compare the complexity of language level between verbally-precocious and typically-developing children from 2 to 3 years-old. Participants were 15 children classified as verbally-precocious were scored at the mean 56.85(expressive language) and 88.82(receptive language), and another 15 children classified as typically developing did at the mean 33.51(expressive language) and 58.01(receptive language) on MCDI-K. Each child's spontaneous utterances in interaction with her caregiver were collected at three different times with 6 months interval. All of the utterances were transcribed and analyzed for the use of MLU and lexical diversity by using KCLA. Summarizing the overall results, verbally-precocious children had significantly higher language abilities than typically-developing children at each time, and there were significant differences between two groups in syntactic and semantic language development, showing that verbally-precocious children indicated distinctive MLU and lexical diversity. These results suggest a high degree of stability in precocious verbal status, with variations in language complexity during conversations contributing to later differences in their language ability.

  • PDF

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

A Hierarchical Context Dissemination Framework for Managing Federated Clouds

  • Famaey, Jeroen;Latre, Steven;Strassner, John;Turck, Filip De
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.567-582
    • /
    • 2011
  • The growing popularity of the Internet has caused the size and complexity of communications and computing systems to greatly increase in recent years. To alleviate this increased management complexity, novel autonomic management architectures have emerged, in which many automated components manage the network's resources in a distributed fashion. However, in order to achieve effective collaboration between these management components, they need to be able to efficiently exchange information in a timely fashion. In this article, we propose a context dissemination framework that addresses this problem. To achieve scalability, the management components are structured in a hierarchy. The framework facilitates the aggregation and translation of information as it is propagated through the hierarchy. Additionally, by way of semantics, context is filtered based on meaning and is disseminated intelligently according to dynamically changing context requirements. This significantly reduces the exchange of superfluous context and thus further increases scalability. The large size of modern federated cloud computing infrastructures, makes the presented context dissemination framework ideally suited to improve their management efficiency and scalability. The specific context requirements for the management of a cloud data center are identified, and our context dissemination approach is applied to it. Additionally, an extensive evaluation of the framework in a large-scale cloud data center scenario was performed in order to characterize the benefits of our approach, in terms of scalability and reasoning time.

Using Small Corpora of Critiques to Set Pedagogical Goals in First Year ESP Business English

  • Wang, Yu-Chi;Davis, Richard Hill
    • Asia Pacific Journal of Corpus Research
    • /
    • v.2 no.2
    • /
    • pp.17-29
    • /
    • 2021
  • The current study explores small corpora of critiques written by Chinese and non-Chinese university students and how strategies used by these writers compare with high-rated L1 students. Data collection includes three small corpora of student writing; 20 student critiques in 2017, 23 student critiques from 2018, and 23 critiques from the online Michigan MICUSP collection at the University of Michigan. The researchers employ Text Inspector and Lexical Complexity to identify university students' vocabulary knowledge and awareness of syntactic complexity. In addition, WMatrix4® is used to identify and support the comparison of lexical and semantic differences among the three corpora. The findings indicate that gaps between Chinese and non-Chinese writers in the same university classes exist in students' knowledge of grammatical features and interactional metadiscourse. In addition, critiques by Chinese writers are more likely to produce shorter clauses and sentences. In addition, the mean value of complex nominal and coordinate phrases is smaller for Chinese students than for non-Chinese and MICUSP writers. Finally, in terms of lexical bundles, Chinese student writers prefer clausal bundles instead of phrasal bundles, which, according to previous studies, are more often found in texts of skilled writers. The current study's findings suggest incorporating implicit and explicit instruction through the implementation of corpora in language classrooms to advance skills and strategies of all, but particularly of Chinese writers of English.