Detection

All posts under tag "Detection"

13 posts total
Sorted by date
Hyperbolic Graph Embeddings: a Survey and an Evaluation on Anomaly Detection

Hyperbolic Graph Embeddings: a Survey and an Evaluation on Anomaly Detection

ํ•˜์ดํผ๋ณผ๋ฆญ ๊ทธ๋ž˜ํ”„ ์ž„๋ฒ ๋”ฉ์€ ์ตœ๊ทผ ๋ณต์žกํ•˜๊ณ  ๋น„์œ ํด๋ฆฌ๋“œ์ ์ธ ๋„คํŠธ์›Œํฌ ๊ตฌ์กฐ๋ฅผ ๋ชจ๋ธ๋งํ•˜๋Š” ๋ฐ ์ฃผ๋ชฉ๋ฐ›๊ณ  ์žˆ๋‹ค. ์ „ํ†ต์ ์ธ ์œ ํด๋ฆฌ๋“œ ์ž„๋ฒ ๋”ฉ์€ ๋…ธ๋“œ ๊ฐ„ ๊ฑฐ๋ฆฌ์™€ ๊ด€๊ณ„๋ฅผ ํ‰๋ฉด ํ˜น์€ ์ €์ฐจ์› ์œ ํด๋ฆฌ๋“œ ๊ณต๊ฐ„์— ํˆฌ์‚ฌํ•จ์œผ๋กœ์จ ํŠธ๋ฆฌ ๊ตฌ์กฐ๋‚˜ ์Šค์ผ€์ผโ€‘ํ”„๋ฆฌ ๋„คํŠธ์›Œํฌ์™€ ๊ฐ™์€ ๊ณ ์ฐจ์›์  ๊ณ„์ธต์„ฑ์„ ์ถฉ๋ถ„ํžˆ ํ‘œํ˜„ํ•˜์ง€ ๋ชปํ•œ๋‹ค. ๋ฐ˜๋ฉด, ํ•˜์ดํผ๋ณผ๋ฆญ ๊ณต๊ฐ„์€ ์ง€์ˆ˜์ ์œผ๋กœ ํ™•์žฅ๋˜๋Š” ๋ณผ๋ฅจ ํŠน์„ฑ์„ ๊ฐ€์ง€๊ณ  ์žˆ์–ด, ๋™์ผํ•œ ์ฐจ์› ๋‚ด์—์„œ ๋” ๋งŽ์€ ๋…ธ๋“œ๋ฅผ ๊ตฌ๋ถ„ํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ํŠน์„ฑ์€ ํŠนํžˆ ์ด์ƒ ํƒ์ง€์™€ ๊ฐ™์ด ์ •์ƒ ํŒจํ„ด๊ณผ ๋น„์ •์ƒ ํŒจํ„ด ์‚ฌ์ด์˜ ๋ฏธ์„ธํ•œ ์ฐจ์ด๋ฅผ ํฌ์ฐฉํ•ด์•ผ ํ•˜๋Š” ์ž‘์—…์— ์œ ๋ฆฌํ•˜๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š”

Detection
HalluGraph: Auditable Hallucination Detection for Legal RAG Systems via Knowledge Graph Alignment

HalluGraph: Auditable Hallucination Detection for Legal RAG Systems via Knowledge Graph Alignment

๋ณธ ๋…ผ๋ฌธ์€ ๋ฒ•๋ฅ  ๋ถ„์•ผ์—์„œ ์ธ๊ณต์ง€๋Šฅ ๊ธฐ๋ฐ˜ ์ž๋™ ๋ฌธ์„œ ์ƒ์„ฑ์ด ์ง๋ฉดํ•œ ๊ฐ€์žฅ ํ•ต์‹ฌ์ ์ธ ๋ฌธ์ œ์ธ โ€˜ํ™˜๊ฐ(hallucination)โ€™์„ ๊ทธ๋ž˜ํ”„ ์ด๋ก ์„ ํ™œ์šฉํ•ด ์ฒด๊ณ„์ ์œผ๋กœ ํ•ด๊ฒฐํ•˜๋ ค๋Š” ์‹œ๋„๋‹ค. ๊ธฐ์กด์˜ ํ™˜๊ฐ ํƒ์ง€ ๋ฐฉ๋ฒ•์€ ์ฃผ๋กœ ํ…์ŠคํŠธ ๊ฐ„ ์˜๋ฏธ ์œ ์‚ฌ๋„๋ฅผ ๊ณ„์‚ฐํ•˜๋Š” ๋ฐฉ์‹์— ์˜์กดํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ์ ‘๊ทผ๋ฒ•์€ ๋ฌธ๋งฅ์ƒ ์œ ์‚ฌํ•ด ๋ณด์ด์ง€๋งŒ ์‹ค์ œ๋กœ๋Š” ์ค‘์š”ํ•œ ์—”ํ„ฐํ‹ฐ(์˜ˆ: ๋‹น์‚ฌ์ž๋ช…, ์‚ฌ๊ฑด ์ผ์ž, ์กฐํ•ญ ๋ฒˆํ˜ธ)๊ฐ€ ์ž˜๋ชป ๊ต์ฒด๋˜๊ฑฐ๋‚˜ ๋ˆ„๋ฝ๋˜๋Š” ๊ฒฝ์šฐ๋ฅผ ํฌ์ฐฉํ•˜์ง€ ๋ชปํ•œ๋‹ค. ๋ฒ•๋ฅ  ๋ฌธ์„œ๋Š” ์ž‘์€ ์—”ํ„ฐํ‹ฐ์˜ ๋ณ€ํ˜•๋งŒ์œผ๋กœ๋„ ํŒ๊ฒฐ ๊ฒฐ๊ณผ์— ํฐ ์˜ํ–ฅ์„ ๋ฏธ์น  ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์—, ๋ณด๋‹ค ์ •๋ฐ€ํ•˜๊ณ  ํ•ด์„ ๊ฐ€๋Šฅํ•œ ๊ฒ€์ฆ ๋ฉ”์ปค๋‹ˆ

Detection System
No Image

Comment on Japanese Detection of Air Fluorescence Light from a Cosmic Ray Shower in 1969

๋ณธ ๋…ผ๋ฌธ์€ 1960๋…„๋Œ€ ์ผ๋ณธ์—์„œ ์ˆ˜ํ–‰๋œ ์šฐ์ฃผ์„  ๋Œ€๊ธฐ ์ƒค์›Œ ์—ฐ๊ตฌ๋ฅผ ์ค‘์‹ฌ์œผ๋กœ, ๊ทธ ๋‹น์‹œ์˜ ๊ด€์ธก ๊ธฐ์ˆ ๊ณผ ๊ฒฐ๊ณผ๋ฅผ ํ˜„๋Œ€์ ์ธ ์‹œ๊ฐ์œผ๋กœ ์žฌ๊ฒ€ํ† ํ•˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ํ•˜๋ผ ๋“ฑ(Hara et al.)์ด 1969๋…„์— ๋ณด๊ณ ํ•œ 10^19eV ์—๋„ˆ์ง€ ์ˆ˜์ค€์˜ ์šฐ์ฃผ์„  ์ง‘์ค‘ ๋Œ€๊ธฐ ์ƒค์›Œ์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๋Œ€๊ธฐ ํ˜•๊ด‘ ๋น›์„ ๊ฐ์ง€ํ•œ ์‚ฌ๊ฑด์— ๋Œ€ํ•ด ์‹ฌ๋„ ์žˆ๋Š” ๋ถ„์„์„ ์ œ๊ณตํ•œ๋‹ค. ์—ฐ๊ตฌ ๋ฐฐ๊ฒฝ 1960๋…„๋Œ€์—๋Š” ์ผ๋ณธ๊ณผ ๋ฏธ๊ตญ์˜ ์—ฐ๊ตฌํŒ€์ด ๊ฐ๊ฐ ๋Œ€๊ธฐ ํ˜•๊ด‘ ๋น› ๊ฐ์ง€์˜ ๊ฐ€๋Šฅ์„ฑ์„ ์กฐ์‚ฌํ•˜๊ณ  ์žˆ์—ˆ๋‹ค. ํ•˜๋ผ ๋“ฑ์€ 1968๋…„ 12์›”๋ถ€ํ„ฐ ๋„๋‹ค์ด๋ผ ์ฒœ๋ฌธ๋Œ€์—์„œ 5๊ฐœ์›” ๋™์•ˆ ์‹คํ—˜์„ ์ˆ˜ํ–‰ํ–ˆ์œผ๋ฉฐ, ์ด ๊ธฐ๊ฐ„ ๋™์•ˆ 10^

Physics Detection Astrophysics
A Novel comprehensive method for real time Video Motion Detection   Surveillance

A Novel comprehensive method for real time Video Motion Detection Surveillance

๋ณธ ๋…ผ๋ฌธ์€ ์ €๋ ดํ•˜๊ณ  ํšจ์œจ์ ์ธ ์‹ค์‹œ๊ฐ„ ๋น„๋””์˜ค ๋ชจ์…˜ ๊ฐ์ง€ ๋ณด์•ˆ ์‹œ์Šคํ…œ(VMDss)์˜ ์„ค๊ณ„์™€ ๊ตฌํ˜„์„ ๋‹ค๋ฃจ๊ณ  ์žˆ๋‹ค. ์ด ์‹œ์Šคํ…œ์€ ์‚ฌ์šฉ์ž ์นœํ™”์ ์ด๊ณ  ์›๊ฒฉ ์ œ์–ด๊ฐ€ ๊ฐ€๋Šฅํ•˜๋ฉฐ, ๋ฏธ๋ฆฌ ์ •์˜๋œ ์ƒ‰์ƒ ๊ฐ์ฒด ์ถ”์  ๊ธฐ๋Šฅ์„ ํฌํ•จํ•˜๊ณ  ์žˆ์–ด ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ ์œ ์šฉํ•˜๊ฒŒ ํ™œ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. 1. ์‹œ์Šคํ…œ ๊ตฌ์„ฑ ์ „์†ก ์„น์…˜ : ์ปดํ“จํ„ฐ, RS232 ์ธํ„ฐํŽ˜์ด์Šค, ๋งˆ์ดํฌ๋กœ์ปจํŠธ๋กค๋Ÿฌ, RF ์†ก์‹ ๊ธฐ, RF ๋น„๋””์˜ค ์ˆ˜์‹ ๊ธฐ๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด๋“ค ์š”์†Œ๋Š” ์‹œ๊ฐ ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  ์ œ์–ด ์‹ ํ˜ธ๋ฅผ ์ „์†กํ•˜๋Š” ์—ญํ• ์„ ์ˆ˜ํ–‰ํ•œ๋‹ค. ์ˆ˜์‹  ์„น์…˜ : ๋ชจ๋ฐ”์ผ ํ”Œ๋žซํผ, RF ์ˆ˜์‹ ๊ธฐ, ๋งˆ์ดํฌ๋กœ์ปจํŠธ๋กค๋Ÿฌ, RF ์นด๋ฉ”

Detection Computer Science Computer Vision
An Empirical Evaluation of LLM-Based Approaches for Code Vulnerability Detection: RAG, SFT, and Dual-Agent Systems

An Empirical Evaluation of LLM-Based Approaches for Code Vulnerability Detection: RAG, SFT, and Dual-Agent Systems

๋ณธ ์—ฐ๊ตฌ๋Š” LLM์„ ํ™œ์šฉํ•œ ์ฝ”๋“œ ์ทจ์•ฝ์  ํƒ์ง€์˜ ์‹ค์šฉ์„ฑ์„ ์ •๋Ÿ‰์ ์œผ๋กœ ํ‰๊ฐ€ํ•˜๊ธฐ ์œ„ํ•ด ์„ธ ๊ฐ€์ง€ ์ ‘๊ทผ๋ฒ•์„ ์ฒด๊ณ„์ ์œผ๋กœ ๋น„๊ตํ•˜์˜€๋‹ค. ์ฒซ ๋ฒˆ์งธ ์ ‘๊ทผ๋ฒ•์ธ Retrievalโ€‘Augmented Generation(RAG)์€ ์‚ฌ์ „ ํ•™์Šต๋œ LLM์— ์™ธ๋ถ€ ์ง€์‹ ๋ฒ ์ด์Šค๋ฅผ ๋™์ ์œผ๋กœ ์—ฐ๊ฒฐํ•œ๋‹ค. ๊ตฌ์ฒด์ ์œผ๋กœ, MITRE CWE ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์™€ ์ตœ์‹  ์›น ๊ฒ€์ƒ‰ ๊ฒฐ๊ณผ๋ฅผ ์‹ค์‹œ๊ฐ„์œผ๋กœ ๊ฐ€์ ธ์™€ ํ”„๋กฌํ”„ํŠธ์— ์‚ฝ์ž…ํ•จ์œผ๋กœ์จ ๋ชจ๋ธ์ด ์ฝ”๋“œ ์กฐ๊ฐ์„ ํ•ด์„ํ•  ๋•Œ ์ตœ์‹  ๋ณด์•ˆ ํŒจํ„ด๊ณผ CWE ์ •์˜๋ฅผ ์ฐธ์กฐํ•˜๋„๋ก ์„ค๊ณ„๋˜์—ˆ๋‹ค. ์ด ๊ณผ์ •์€ ๋ฒกํ„ฐ ๊ฒ€์ƒ‰ ์—”์ง„(FAISS)๊ณผ ํ…์ŠคํŠธ ์ž„๋ฒ ๋”ฉ์„ ํ™œ์šฉํ•ด ๊ด€๋ จ ๋ฌธ์„œ๋ฅผ

System Computer Science Software Engineering Detection
No Image

Adversarial VR: An Open-Source Testbed for Evaluating Adversarial Robustness of VR Cybersickness Detection and Mitigation

์ด ๋…ผ๋ฌธ์€ ๊ฐ€์ƒํ˜„์‹ค(VR) ํ™˜๊ฒฝ์—์„œ ์‚ฌ์ด๋ฒ„์งˆ๋ณ‘(CS)์˜ ์‹ฌ๊ฐ๋„ ์กฐ์ž‘ ๋ฐ ๊ทธ์— ๋”ฐ๋ฅธ ์ ์ ˆํ•˜์ง€ ์•Š์€ ์™„ํ™” ์ „๋žต์„ ์—ฐ๊ตฌํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ํŠนํžˆ, ๋กœ์ปฌ VR ํ™˜๊ฒฝ๊ณผ ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ VR ํ™˜๊ฒฝ์ด ๊ฒฐํ•ฉ๋œ ํ…Œ์ŠคํŠธ๋ฒ ๋“œ๋ฅผ ๊ฐœ๋ฐœํ•˜์—ฌ ์ด ๋ฌธ์ œ๋ฅผ ํƒ๊ตฌํ•ฉ๋‹ˆ๋‹ค. ๋กœ์ปฌ ํ™˜๊ฒฝ์—์„œ๋Š” ์‚ฌ์šฉ์ž์˜ ์ฒดํ—˜ ์ค‘์— CS ์™„ํ™”๊ฐ€ ์ด๋ฃจ์–ด์ง€๋ฉฐ, ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ๋Š” ๋”ฅ๋Ÿฌ๋‹(DL) ๋ชจ๋ธ์„ ํ™œ์šฉํ•ด CS ๊ฐ์ง€๋ฅผ ์ˆ˜ํ–‰ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๋…ผ๋ฌธ์˜ ํ•ต์‹ฌ์€ ์ ๋Œ€์  ์˜ˆ์ œ๋ฅผ ์ƒ์„ฑํ•˜์—ฌ DL ๋ชจ๋ธ์— ์ž…๋ ฅํ•จ์œผ๋กœ์จ CS์˜ ์‹ฌ๊ฐ๋„๋ฅผ ์กฐ์ž‘ํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ ‘๊ทผ๋ฒ•์€ VR ์‚ฌ์šฉ์ž์˜ ์ฒดํ—˜ ์งˆ์„ ์ €ํ•˜์‹œํ‚ค๊ฑฐ๋‚˜, ์‹ฌ์ง€์–ด๋Š”

Detection
No Image

A Comprehensive Dataset for Human vs. AI Generated Image Detection

๋ณธ ๋…ผ๋ฌธ์ด ์ œ์‹œํ•˜๋Š” MS COCOAI ๋ฐ์ดํ„ฐ์…‹์€ ํ˜„์žฌ ์ด๋ฏธ์ง€ ์ง„์œ„ ํƒ์ง€ ์—ฐ๊ตฌ์—์„œ ๊ฐ€์žฅ ์‹œ๊ธ‰ํžˆ ์š”๊ตฌ๋˜๋Š” โ€˜๋‹ค์–‘์„ฑโ€™๊ณผ โ€˜๊ทœ๋ชจโ€™๋ฅผ ๋™์‹œ์— ๋งŒ์กฑํ•œ๋‹ค๋Š” ์ ์—์„œ ํฐ ์˜๋ฏธ๋ฅผ ๊ฐ€์ง„๋‹ค. ์ฒซ์งธ, ๊ธฐ์กด ๋ฐ์ดํ„ฐ์…‹๋“ค์€ ์ฃผ๋กœ ๋‹จ์ผ ์ƒ์„ฑ ๋ชจ๋ธ์ด๋‚˜ ์ œํ•œ๋œ ํ”„๋กฌํ”„ํŠธ ์„ธํŠธ๋ฅผ ์‚ฌ์šฉํ•ด ๋งŒ๋“  ์ด๋ฏธ์ง€์— ๊ตญํ•œ๋ผ ์žˆ์—ˆ์œผ๋ฉฐ, ์ด๋Š” ์‹ค์ œ ํ˜„์žฅ์—์„œ ๋งˆ์ฃผ์น˜๋Š” ๋‹ค์–‘ํ•œ AI ํˆด๊ณผ์˜ ๊ฒฉ์ฐจ๋ฅผ ์ดˆ๋ž˜ํ•œ๋‹ค. ๋ฐ˜๋ฉด ๋ณธ ๋ฐ์ดํ„ฐ์…‹์€ Stable Diffusion 3ยท2.1ยทSDXL, DALLโ€‘E 3, MidJourney v6 ๋“ฑ ์ตœ์‹  ๋ชจ๋ธ์„ ๋ชจ๋‘ ํฌํ•จํ•จ์œผ๋กœ์จ, ํ˜„์žฌ ์‹œ์žฅ์—์„œ ๋„๋ฆฌ ์‚ฌ์šฉ๋˜๋Š” ์ฃผ์š” ์ƒ์„ฑ

Computer Science Data Detection Computer Vision
Interpretable Plant Leaf Disease Detection Using Attention-Enhanced CNN

Interpretable Plant Leaf Disease Detection Using Attention-Enhanced CNN

๋ณธ ๋…ผ๋ฌธ์€ ์‹๋ฌผ ์žŽ ๋ณ‘์›๊ท  ์ž๋™ ์ง„๋‹จ ๋ถ„์•ผ์—์„œ ์ •ํ™•๋„์™€ ํ•ด์„ ๊ฐ€๋Šฅ์„ฑ์„ ๋™์‹œ์— ๋งŒ์กฑ์‹œํ‚ค๋Š” ๋ชจ๋ธ ์„ค๊ณ„์— ์ดˆ์ ์„ ๋งž์ถ”์—ˆ๋‹ค. ๊ธฐ์กด์˜ CNN ๊ธฐ๋ฐ˜ ๋ณ‘ ์ง„๋‹จ ๋ชจ๋ธ์€ ๋†’์€ ๋ถ„๋ฅ˜ ์„ฑ๋Šฅ์„ ๋ณด์—ฌ์™”์ง€๋งŒ, โ€œ์™œ ์ด๋Ÿฐ ๊ฒฐ๊ณผ๊ฐ€ ๋‚˜์™”๋Š”๊ฐ€โ€์— ๋Œ€ํ•œ ์„ค๋ช…์ด ๋ถ€์กฑํ•ด ํ˜„์žฅ ์ ์šฉ์— ํ•œ๊ณ„๊ฐ€ ์žˆ์—ˆ๋‹ค. ์ด๋ฅผ ๊ทน๋ณตํ•˜๊ธฐ ์œ„ํ•ด ์ €์ž๋“ค์€ VGG16 ๊ตฌ์กฐ์— Convolution Block Attention Module(CBAM)์„ ๊ฐ ํ•ฉ์„ฑ๊ณฑ ๋ธ”๋ก ๋’ค์— ์‚ฝ์ž…ํ•˜์˜€๋‹ค. CBAM์€ ์ฑ„๋„โ€‘์ฃผ์˜์™€ ๊ณต๊ฐ„โ€‘์ฃผ์˜ ๋‘ ๋‹จ๊ณ„๋กœ ๊ตฌ์„ฑ๋˜์–ด, ์ค‘์š”ํ•œ ํŠน์ง• ์ฑ„๋„์„ ๊ฐ•์กฐํ•˜๊ณ  ๋™์‹œ์— ๋ณ‘๋ณ€์ด ์ง‘์ค‘๋œ ์˜์—ญ์„ ๊ฐ•์กฐํ•œ

Detection
No Image

Code-in-the-Loop Forensics: Agentic Tool Use for Image Forgery Detection

์ด ๋…ผ๋ฌธ์€ ์ด๋ฏธ์ง€ ์œ„๋ณ€์กฐ ๊ฒ€์ถœ(IFD) ๋ถ„์•ผ์—์„œ ์ €์ˆ˜์ค€ ์žก์Œ ๊ธฐ๋ฐ˜ ๋ฐฉ๋ฒ•๊ณผ ๊ณ ์ˆ˜์ค€ ์˜๋ฏธ ์ •๋ณด ๊ธฐ๋ฐ˜ MLLMs์˜ ํ†ตํ•ฉ์„ ๋ชฉํ‘œ๋กœ ํ•œ๋‹ค. ForenAgent๋Š” ์ด๋Ÿฌํ•œ ๋‘ ๊ฐ€์ง€ ์ ‘๊ทผ ๋ฐฉ์‹์„ ๊ฒฐํ•ฉํ•˜์—ฌ, Python ๊ธฐ๋ฐ˜ ๋„๊ตฌ๋ฅผ ํ™œ์šฉํ•ด ์ด๋ฏธ์ง€ ์œ„๋ณ€์กฐ ๊ฒ€์ถœ์„ ์ˆ˜ํ–‰ํ•˜๋Š” ์ƒˆ๋กœ์šด ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ์ด ํ”„๋ ˆ์ž„์›Œํฌ๋Š” ๋‹ค์ค‘ ๋ผ์šด๋“œ ์ƒํ˜ธ์ž‘์šฉ์„ ํ†ตํ•ด MLLMs๊ฐ€ ์ €์ˆ˜์ค€ ๋„๊ตฌ๋ฅผ ์ƒ์„ฑํ•˜๊ณ  ์‹คํ–‰ํ•˜๋ฉฐ, ์ด๋ฅผ ๋ฐ˜๋ณต์ ์œผ๋กœ ๊ฐœ์„ ํ•จ์œผ๋กœ์จ ๋”์šฑ ์œ ์—ฐํ•˜๊ณ  ํ•ด์„ ๊ฐ€๋Šฅํ•œ ์œ„๋ณ€์กฐ ๋ถ„์„์ด ๊ฐ€๋Šฅํ•˜๋„๋ก ์„ค๊ณ„๋˜์—ˆ๋‹ค. ForenAgent์˜ ํ•ต์‹ฌ์€ ๋‘ ๋‹จ๊ณ„ ํ›ˆ๋ จ ํŒŒ์ดํ”„๋ผ์ธ๊ณผ ๋™์  ์ถ”๋ก  ๋ฃจ

Detection
TACK Tunnel Data (TTD): A Benchmark Dataset for Deep Learning-Based Defect Detection in Tunnels

TACK Tunnel Data (TTD): A Benchmark Dataset for Deep Learning-Based Defect Detection in Tunnels

๋ณธ ๋…ผ๋ฌธ์€ ํ„ฐ๋„ ๊ฒฐํ•จ ๊ฒ€์‚ฌ๋ฅผ ์œ„ํ•œ ์ƒˆ๋กœ์šด ๋ฐ์ดํ„ฐ์…‹์„ ์†Œ๊ฐœํ•˜๋ฉฐ, ์ด๋Š” ๋”ฅ๋Ÿฌ๋‹ ๋ชจ๋ธ์˜ ํ•™์Šต๊ณผ ์„ฑ๋Šฅ ๊ฐœ์„ ์— ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•ฉ๋‹ˆ๋‹ค. ํ„ฐ๋„์€ ๊ตํ†ต ์ธํ”„๋ผ์˜ ์ฃผ์š” ๊ตฌ์„ฑ ์š”์†Œ๋กœ, ์•ˆ์ „์„ฑ์„ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•ด ์ •๊ธฐ์ ์ธ ์ ๊ฒ€์ด ํ•„์ˆ˜์ ์ž…๋‹ˆ๋‹ค. ํ•˜์ง€๋งŒ ์ „ํ†ต์ ์ธ ์ˆ˜๋™ ๊ฒ€์‚ฌ ๋ฐฉ๋ฒ•์€ ์‹œ๊ฐ„ ์†Œ๋ชจ๊ฐ€ ๋งŽ๊ณ  ๋น„์šฉ์ด ๋†’์œผ๋ฉฐ ์ฃผ๊ด€์ ์ด์–ด์„œ ์ œํ•œ์ ์ด ์žˆ์Šต๋‹ˆ๋‹ค. ๋ชจ๋ฐ”์ผ ๋งคํ•‘ ์‹œ์Šคํ…œ๊ณผ ๋”ฅ๋Ÿฌ๋‹์˜ ๋ฐœ์ „์œผ๋กœ ์ž๋™ํ™”๋œ ์‹œ๊ฐ ๊ฒ€์‚ฌ๊ฐ€ ๊ฐ€๋Šฅํ•ด์กŒ์ง€๋งŒ, ์ด๋ฅผ ์œ„ํ•œ ์ถฉ๋ถ„ํ•œ ๋ฐ์ดํ„ฐ์…‹์ด ๋ถ€์กฑํ•˜์—ฌ ๊ทธ ํšจ๊ณผ๊ฐ€ ์ œํ•œ๋˜์–ด ์™”์Šต๋‹ˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ ์†Œ๊ฐœํ•˜๋Š” ์ƒˆ๋กœ์šด ๋ฐ์ดํ„ฐ์…‹์€ ์„ธ ๊ฐ€์ง€ ๋‹ค๋ฅธ ์ข…๋ฅ˜์˜ ํ„ฐ๋„ ๋ผ์ด๋‹์—

Learning Data Detection
An Efficient Real Time Method of Fingertip Detection

An Efficient Real Time Method of Fingertip Detection

: ๋ณธ ๋…ผ๋ฌธ์€ ์„ผ์„œ๋‚˜ ๋งˆ์ปค ์—†์ด ๋™์ ์ธ ์† ์ œ์Šค์ฒ˜๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ์ธ์‹ํ•˜๋Š” ๋ฐฉ๋ฒ•์— ๋Œ€ํ•ด ๊นŠ์ด ์žˆ๊ฒŒ ๋‹ค๋ฃฌ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ๊ธฐ์กด์˜ ์ง€๋ฌธ ๊ฐ์ง€ ๊ธฐ์ˆ ์—์„œ ๋‚˜ํƒ€๋‚œ ์—ฌ๋Ÿฌ ๋ฌธ์ œ์ ์„ ํ•ด๊ฒฐํ•˜๋ ค๊ณ  ์‹œ๋„ํ•œ๋‹ค. 1. ๊ธฐ์กด ์ ‘๊ทผ๋ฒ•์˜ ํ•œ๊ณ„ Garg

Detection Artificial Intelligence Computer Vision Multimedia Computer Science
Distributed Intrusion Detection for the Security of Societies of Robots

Distributed Intrusion Detection for the Security of Societies of Robots

๋ณธ ๋…ผ๋ฌธ์€ ์ž์œจ ๋กœ๋ด‡ ์ง‘๋‹จ ๋‚ด์—์„œ ์ž ์žฌ์  ์นจ์ž…์ž๋ฅผ ๊ฐ์ง€ํ•˜๋Š” ๋ฌธ์ œ๋ฅผ ๋‹ค๋ฃจ๋ฉฐ, ์ด๋Š” ๋ถ„์‚ฐ ํ™˜๊ฒฝ์—์„œ์˜ ๋ณด์•ˆ ๋ฌธ์ œ ํ•ด๊ฒฐ์„ ์œ„ํ•œ ์ค‘์š”ํ•œ ์—ฐ๊ตฌ์ž…๋‹ˆ๋‹ค. ์ฃผ์š” ๋‚ด์šฉ๊ณผ ๊ทธ ์ค‘์š”์„ฑ์„ ๋‹ค์Œ๊ณผ ๊ฐ™์ด ๋ถ„์„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. 1. ์นจ์ž…์ž ์ •์˜์™€ ๊ฐ์ง€ ๋ฐฉ๋ฒ• ๋…ผ๋ฌธ์€ ์นจ์ž…์ž๋ฅผ ์ž์œจ์ ์œผ๋กœ ํ–‰๋™ํ•˜์ง€ ์•Š๋Š” ๋กœ๋ด‡์œผ๋กœ ์ •์˜ํ•˜๋ฉฐ, ์ด๋Š” ๊ณ ์žฅ์ด๋‚˜ ์•…์˜์ ์ธ ์žฌํ”„๋กœ๊ทธ๋ž˜๋ฐ ๋“ฑ ๋‹ค์–‘ํ•œ ์›์ธ์— ์˜ํ•ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๊ฐœ๋ณ„ ๋กœ๋ด‡์ด ์ž์‹ ์˜ ์ƒํƒœ์™€ ์ธ์ ‘ํ•œ ์ด์›ƒ๊ณผ์˜ ํ†ต์‹ ์„ ํ†ตํ•ด ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์นจ์ž…์ž๋ฅผ ๊ฐ์ง€ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค. 2. ๋ถ„์‚ฐ ํ™˜๊ฒฝ

Detection Robotics Computer Science
Logical Consensus for Distributed and Robust Intrusion Detection

Logical Consensus for Distributed and Robust Intrusion Detection

๋ณธ ๋…ผ๋ฌธ์€ ๋„คํŠธ์›Œํฌ ๋‚ด์—์„œ ์—์ด์ „ํŠธ๋“ค์ด ์ง€์—ญ์ ์œผ๋กœ ์ˆ˜์ง‘ํ•œ ์ •๋ณด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์ „๋ฐ˜์ ์ธ ์œ„ํ˜‘์— ๋Œ€ํ•œ ํ•ฉ์˜๋ฅผ ๋„์ถœํ•˜๋Š” ์ƒˆ๋กœ์šด ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ํŠนํžˆ ๋ถ„์‚ฐ ํ™˜๊ฒฝ์—์„œ ๊ฐ ๋…ธ๋“œ๊ฐ€ ๋…๋ฆฝ์ ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ์„ ๊ฐ•ํ™”ํ•จ์œผ๋กœ์จ, ๋„คํŠธ์›Œํฌ ์ „์ฒด์˜ ์•ˆ์ •์„ฑ๊ณผ ๋ณด์•ˆ์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š”๋ฐ ์ค‘์ ์„ ๋‘๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๋…ผ๋ฌธ์€ ๋…ผ๋ฆฌ์  ํ•ฉ์˜ ๋ฌธ์ œ๋ฅผ ์ •์˜ํ•˜๊ณ , ์ด๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๊ธฐ์กด ์—ฐ๊ตฌ ๊ฒฐ๊ณผ๋“ค์„ ๊ฒ€ํ† ํ•ฉ๋‹ˆ๋‹ค. ํŠนํžˆ ์„ธํฌ ์ž๋™์ฒด์™€ ์œ ํ•œ ์ƒํƒœ ์ดํ„ฐ๋ ˆ์ด์…˜ ๋งต์˜ ์ˆ˜๋ ด์„ฑ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋Š” ์—์ด์ „ํŠธ๋“ค์ด ์ง€์—ญ์ ์œผ๋กœ ์ˆ˜์ง‘ํ•œ ์ •๋ณด๋ฅผ ์ „๋ฐ˜์ ์ธ ํ•ฉ์˜๋กœ ์—ฐ๊ฒฐํ•˜๋Š” ๋ฐ ์ค‘์š”ํ•œ ์—ญํ• ์„

Detection Robotics Computer Science

< Category Statistics (Total: 743) >

Electrical Engineering and Systems Science
7
General
272
General Relativity
7
HEP-EX
5
HEP-PH
12
HEP-TH
5
MATH-PH
3
NUCL-TH
1
Quantum Physics
10

Start searching

Enter keywords to search articles

โ†‘โ†“
โ†ต
ESC
โŒ˜K Shortcut