• Title/Summary/Keyword: software algorithms

Search Result 1,093, Processing Time 0.032 seconds

Object Recognition and Pose Estimation Based on Deep Learning for Visual Servoing (비주얼 서보잉을 위한 딥러닝 기반 물체 인식 및 자세 추정)

  • Cho, Jaemin;Kang, Sang Seung;Kim, Kye Kyung
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.1
    • /
    • pp.1-7
    • /
    • 2019
  • Recently, smart factories have attracted much attention as a result of the 4th Industrial Revolution. Existing factory automation technologies are generally designed for simple repetition without using vision sensors. Even small object assemblies are still dependent on manual work. To satisfy the needs for replacing the existing system with new technology such as bin picking and visual servoing, precision and real-time application should be core. Therefore in our work we focused on the core elements by using deep learning algorithm to detect and classify the target object for real-time and analyzing the object features. We chose YOLO CNN which is capable of real-time working and combining the two tasks as mentioned above though there are lots of good deep learning algorithms such as Mask R-CNN and Fast R-CNN. Then through the line and inside features extracted from target object, we can obtain final outline and estimate object posture.

Region-Based Gradient and Its Application to Image Segmentation

  • Kim, Hyoung Seok
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.108-113
    • /
    • 2018
  • In this study, we introduce a new image gradient computation based on understanding of image generation. Most images consist of groups of pixels with similar color information because the images are generally obtained by taking a picture of the real world. The general gradient operator for an image compares only the neighboring pixels and cannot obtain information about a wide area, and there is a risk of falling into a local minimum problem. Therefore, it is necessary to attempt to introduce the gradient operator of the interval concept. We present a bow-tie gradient by color values of pixels on bow-tie region of a given pixel. To confirm the superiority of our study, we applied our bow-tie gradient to image segmentation algorithms for various images.

L1-norm Minimization based Sparse Approximation Method of EEG for Epileptic Seizure Detection

  • Shin, Younghak;Seong, Jin-Taek
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.521-528
    • /
    • 2019
  • Epilepsy is one of the most prevalent neurological diseases. Electroencephalogram (EEG) signals are widely used for monitoring and diagnosis tool for epileptic seizure. Typically, a huge amount of EEG signals is needed, where they are visually examined by experienced clinicians. In this study, we propose a simple automatic seizure detection framework using intracranial EEG signals. We suggest a sparse approximation based classification (SAC) scheme by solving overdetermined system. L1-norm minimization algorithms are utilized for efficient sparse signal recovery. For evaluation of the proposed scheme, the public EEG dataset obtained by five healthy subjects and five epileptic patients is utilized. The results show that the proposed fast L1-norm minimization based SAC methods achieve the 99.5% classification accuracy which is 1% improved result than the conventional L2 norm based method with negligibly increased execution time (42msec).

Optimum Design of a Tubular Link Chain Conveyor for Sludge Transport (슬러지 이송용 튜브형 링크체인 컨베이어의 최적설계)

  • Kim, Bong-Hwan;Jeong, Young-Jae;Lee, Chang-Ryeol
    • Journal of the Korean Society of Mechanical Technology
    • /
    • v.20 no.6
    • /
    • pp.830-835
    • /
    • 2018
  • The tubular link chain conveyor works under very extreme conditions such as high tensile load, friction, and dangerous operating environments. In this study, we propose an optimal design plan for reducing cost and improving performance through weight reduction of tubular link chain conveyors for sludge transport. For light weight of tubular link chain conveyor, the optimization software using SHERPA algorithms, HEEDS was used in conjunction with ANSYS Mechanical V14.5, which is widely used in structural analysis, to achieve optimal tubular link chain. Through the optimization process, 19% light weight was achieved.

Design of a Compensation Algorithm for Thermal Infrared Data considering Environmental Temperature Variations (주변 환경 온도 변화를 고려한 열화상 온도 데이터의 보정 알고리즘 설계)

  • Song, Seong-Ho
    • Journal of IKEEE
    • /
    • v.25 no.2
    • /
    • pp.261-266
    • /
    • 2021
  • This paper suggests design methodology for thermal infrared data correction algorithms considering environmental temperature variations. First, a thermal infrared measurement model is suggested by a parameter-dependent first-order input-output equation using the relationship between infrared measurement data and model environmental parameters. In order to compensate the influence of environmental temperatures on infrared data, a compensation function is identified. Through experiments, the proposed algorithm is shown to reduce the influence of environmental temperatures on the infrared data effectively.

Study Factors for Student Performance Applying Data Mining Regression Model Approach

  • Khan, Shakir
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.188-192
    • /
    • 2021
  • In this paper, we apply data mining techniques and machine learning algorithms using R software, which is used to predict, here we applied a regression model to test some factor on the dataset for which we assumed that it effects student performance. Model was built on an existing dataset which contains many factors and the final grades. The factors tested are the attention to higher education, absences, study time, parent's education level, parent's jobs, and the number of failures in the past. The result shows that only study time and absences can affect the students' performance. Prediction of student academic performance helps instructors develop a good understanding of how well or how poorly the students in their classes will perform, so instructors can take proactive measures to improve student learning. This paper also focuses on how the prediction algorithm can be used to identify the most important attributes in a student's data.

A Dangerous Situation Recognition System Using Human Behavior Analysis (인간 행동 분석을 이용한 위험 상황 인식 시스템 구현)

  • Park, Jun-Tae;Han, Kyu-Phil;Park, Yang-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.345-354
    • /
    • 2021
  • Recently, deep learning-based image recognition systems have been adopted to various surveillance environments, but most of them are still picture-type object recognition methods, which are insufficient for the long term temporal analysis and high-dimensional situation management. Therefore, we propose a method recognizing the specific dangerous situation generated by human in real-time, and utilizing deep learning-based object analysis techniques. The proposed method uses deep learning-based object detection and tracking algorithms in order to recognize the situations such as 'trespassing', 'loitering', and so on. In addition, human's joint pose data are extracted and analyzed for the emergent awareness function such as 'falling down' to notify not only in the security but also in the emergency environmental utilizations.

Bokeh Effect Algorithm using Defocus Map in Single Image (단일 영상에서 디포커스 맵을 활용한 보케 효과 알고리즘)

  • Lee, Yong-Hwan;Kim, Heung Jun
    • Journal of the Semiconductor & Display Technology
    • /
    • v.21 no.3
    • /
    • pp.87-91
    • /
    • 2022
  • Bokeh effect is a stylistic technique that can produce blurring the background of photos. This paper implements to produce a bokeh effect with a single image by post processing. Generating depth map is a key process of bokeh effect, and depth map is an image that contains information relating to the distance of the surfaces of scene objects from a viewpoint. First, this work presents algorithms to determine the depth map from a single input image. Then, we obtain a sparse defocus map with gradient ratio from input image and blurred image. Defocus map is obtained by propagating threshold values from edges using matting Laplacian. Finally, we obtain the blurred image on foreground and background segmentation with bokeh effect achieved. With the experimental results, an efficient image processing method with bokeh effect applied using a single image is presented.

Design of Learning Process with Code Reconstruction Principle for Non-computer Majors

  • Hye-Wuk, Jung
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-180
    • /
    • 2022
  • To develop computational thinking skills, university students are learning how to solve problems with algorithms, program commands and grammar, and program writing. Because non-computer majors have difficulty with computer programming-related content, they need a learning method to acquire coding knowledge from the process of understanding, interpreting, changing, and improving source codes by themselves. This study explored clone coding, refactoring coding, and coding methods using reconstruction tools, which are practical and effective learning methods for improving coding skills for students who are accustomed to coding. A coding learning process with the code reconstruction principle was designed to help non-computer majors use it to understand coding technology and develop their problem-solving ability and applied the coding technology learning method used in programmer education.

Automatic Detection of Forgery in Cell phone Images using Analysis of CFA Pattern Characteristics in Imaging Sensor (휴대폰의 CFA 패턴특성을 이용한 사진 위변조 탐지)

  • Shim, Jae-Youen;Kim, Seong-Whan
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1118-1121
    • /
    • 2010
  • With the advent of cell phone digital cameras, and sophisticated photo editing software, digital images can be easily manipulated and altered. Although good forgeries may leave no visual clues of having been tampered with, they may, nevertheless, alter the underlying statistics of an image. Most digital camera equipped in cell phones employ a single image sensor in conjunction with a color filter array (CFA), and then interpolates the missing color samples to obtain a three channel color image. This interpolation introduces specific correlations which are likely to be destroyed when tampering with an image. We quantify the specific correlations introduced by CFA interpolation, and describe how these correlations, or lack thereof, can be automatically detected in any portion of an image. We show the efficacy of this approach in revealing traces of digital tampering in lossless and lossy compressed color images interpolated with several different CFA algorithms in test cell phones.