• Title/Summary/Keyword: 구조 시스템 식별

Search Result 344, Processing Time 0.029 seconds

A Flexible Feature Matching for Automatic Facial Feature Points Detection (얼굴 특징점 자동 검출을 위한 탄력적 특징 정합)

  • Hwang, Suen-Ki;Bae, Cheol-Soo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.2
    • /
    • pp.12-17
    • /
    • 2010
  • An automatic facial feature points(FFPs) detection system is proposed. A face is represented as a graph where the nodes are placed at facial feature points(FFPs) labeled by their Gabor features and the edges are describes their spatial relations. An innovative flexible feature matching is proposed to perform features correspondence between models and the input image. This matching model works likes random diffusion process in the image space by employing the locally competitive and globally corporative mechanism. The system works nicely on the face images under complicated background, pose variations and distorted by facial accessories. We demonstrate the benefits of our approach by its implementation on the system.

  • PDF

A flexible Feature Matching for Automatic Face and Facial Feature Points Detection (얼굴과 얼굴 특징점 자동 검출을 위한 탄력적 특징 정합)

  • 박호식;배철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.705-711
    • /
    • 2003
  • An automatic face and facial feature points(FFPs) detection system is proposed. A face is represented as a graph where the nodes are placed at facial feature points(FFPs) labeled by their Gabor features and the edges are describes their spatial relations. An innovative flexible feature matching is proposed to perform features correspondence between models and the input image. This matching model works likes random diffusion process in !be image space by employing the locally competitive and globally corporative mechanism. The system works nicely on the face images under complicated background, pose variations and distorted by facial accessories. We demonstrate the benefits of our approach by its implementation on the face identification system.

A Flexible Feature Matching for Automatic face and Facial feature Points Detection (얼굴과 얼굴 특징점 자동 검출을 위한 탄력적 특징 정합)

  • 박호식;손형경;정연길;배철수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.608-612
    • /
    • 2002
  • An automatic face and facial feature points(FFPs) detection system is proposed. A face is represented as a graph where the nodes are placed at facial feature points(FFPs) labeled by their Gabor features md the edges are describes their spatial relations. An innovative flexible feature matching is proposed to perform features correspondence between models and the input image. This matching model works likes random diffusion process in the image spare by employing the locally competitive and globally corporative mechanism. The system works nicely on the face images under complicated background, pose variations and distorted by facial accessories. We demonstrate the benefits of our approach by its implementation on the fare identification system.

  • PDF

Font Classification using NMF and EMD (NMF와 EMD를 이용한 영문자 활자체 폰트분류)

  • Lee, Chang-Woo;Kang, Hyun;Jung, Kee-Chul;Kim, Hang-Joon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.688-690
    • /
    • 2004
  • 최근 전자화된 문서 영상을 효율적으로 관리하고 검색하기 위한 문서구조분석 방법과 문서의 자동 분류에 관한 많은 연구가 발표되고 있다. 본 논문에서는 NMF(non-negative matrix factorization) 알고리즘을 사용하여 폰트를 자동으로 분류하는 방법을 제안한다. 제안된 방법은 폰트의 구분 특징들이 공간적으로 국부성을 가지는 부분으로 표현될 수 있다는 가정을 바탕으로, 전체의 폰트 이미지들로부터 각 폰트들의 구분 특징인 부분을 학습하고, 학습된 부분들을 특징으로 사용하여 폰트를 분류하는 방법이다. 학습된 폰트의 특징들은 계층적 군집화 알고리즘을 이용하여 템플릿을 생성하고, 테스트 패턴을 분류하기 위하여 템플릿 패턴과의 EMD(earth mover's distance)를 사용한다. 실험결과에서 폰트 이미지들의 공간적으로 국부적인 특징들이 조사되고, 그 특징들의 폰트 식별을 위한 적절성을 보였다. 제안된 방법이 기존의 문자인식. 문서 검색 시스템들의 전처리기로 사용되면. 그 시스템들의 성능을 향상시킬 것으로 기대된다.

  • PDF

A Design and Implementation of ALE-compliant RFID Middleware System (ALE 기반 RFID 미들웨어 설계 및 구현)

  • Hong, Yeon-Mi;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.648-655
    • /
    • 2007
  • Nowadays, to realize ubiquitous computing environment, many research activities have been going on within various kinds of research domains including automatic identification sensor network, home network, telematics and so on. Especially, RFID middleware that supports the aggregation of RFID tag data, control and management, and the integration with legacy systems has recently gained a lot of attention. Meanwhile, EPCglobal defined an ALE(Application Level Events) standard specification, which exists between RFID readers and applications, and substitutes the previous systems called Savant. In the specification internal structures and implementation technologies of ALE are not mentioned and only external interfaces are defined. This approach easies the verification of standard compliance and inter-operability of the layer. In this paper, we present the design of ALE-compliant RFID middleware systems that process RFID tag data efficiently.

Analyzing Characteristics of Code Refactoring for Python Deep-Learning Applications (파이썬 딥러닝 응용의 코드 리팩토링 특성 분석)

  • Kim, Dong Kwan
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.754-764
    • /
    • 2022
  • Code refactoring refers to a maintenance task to change the code of a software system in order to consider new requirements, fix bugs, and restructure code. There have been various studies of refactoring subjects such as refactoring types, refactoring benefits, and CASE tools. However, Java applications rather than python ones have been benefited by refactoring-based coding practices. There are few cases of refactoring stuides on Python applications. This paper finds and analyzes single refactoring operations and composite refactoring operations for Python-based deep learning systems. In addition, we find that there is a statistically significant difference in the frequency of occurrence of single and complex refactoring operations in the two groups of deep learning applications and typical Python applications. Furthermore, we analyze keywords of commit messages to catch refactoring intentions of software developers.

A study on the design and implementation of a virus spread prevention system using digital technology (디지털 기술을 활용한 바이러스 확산 방지 시스템 설계 및 구현에 관한 연구)

  • Ji-Hyun, Yoo
    • Journal of IKEEE
    • /
    • v.26 no.4
    • /
    • pp.681-685
    • /
    • 2022
  • Including the COVID-19 crisis, humanity is constantly exposed to viral infections, and efforts are being made to prevent the spread of infection by quickly isolating infected people and tracing contacts. Passive epidemiological investigations that confirm contact with an infected person through contact have limitations in terms of accuracy and speed, so automatic tracking methods using various digital technologies are being proposed. This paper verify contact by utilizing Bluetooth Low Energy (BLE) technology and present an algorithm that identifies close contact through analysis and correction of RSSI (Received Signal Strength Indicator) values. Also, propose a system that can prevent the spread of viruses in a centralized server structure.

Design and Performance Evaluation of Open Information Retrieval Service System (개방형 정보검색시스템의 설계 및 성능분석)

  • Kim, Dong-Won;Ryu, Won;Jeon, Kyung-Pyo;Bae, Hyeon-Deok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1812-1821
    • /
    • 1996
  • In this paper, firstly we describe the structure and the performance of our ICPS(Information Communicaion Processing System) which currently provides information retrieval services, and then make a proposal for the construction of the open-networking information communication infra-structure which enables us to fully pre-pare for the emerging information society. In detail, the structure and the methodology needed for the implementation of the billing function on behalf of all information providers by using the user access network number as a user identification number while guaranteeing the equivalent access to the multiple value-added networks, are suggested. Based on the above ideas, the AICPS(Advanced Information Communication Processing System) has been designed and implemented. Final system performance evaluation with the assumption of a poling system as a system model, shows that our system can handle 10,000 user simultaneously who are using V.34 28.8 kbps modems and the processing capacity is 288,000 packet/sec. This result is so far superior to our target performance established during the desingning procedure. Namely, our system was originally designed to accommodate only 960 users at the same time. By taking advantage of this excessive high performance of our system, many other users can easily access the new services which are accessible only throught the ISDN or the Internet.

  • PDF

Effect of System Instability Factors in a Bistatic MTI Radar Using Pulse Chasing Scan Method (펄스 체이싱 스캔 방식을 이용한 바이스태틱 MTI 레이더에서 시스템 불안정 요소들의 영향)

  • Yang, Jin-Mo;Han, Il-Tak;Lee, Yong-Suk;Lee, Min-Joon;Kim, Whan-Woo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.3
    • /
    • pp.299-311
    • /
    • 2011
  • In this paper, we have identified the system instability factors in a bistatic radar system using pulse chasing and considered their effects on the bistatic receiver's MTI(Moving Target Indication) improvement performance. The pulse chasing is a scan method that searchs a restricted area on the transmit pulse-to-pulse basis and the MTI filter is a signal processing that separates a target from some kinds of interferences such as clutter using small number of transmit pulses. Ideal MTI processing performance, e.g., clutter attenuation and improvement, has been limited by the property of the clutter itself, however, the MTI performance in a proposed bistatic receiver configuration could be affected by the receiving beam pointing error during pulse chasing scanning. Also, for the bistatic receiver, we have defined other system instability factors, which result from the time synchronization error, COHO's phase error, the frequency/phase synchronization error, and have analyzed their effects on the system performance improvement.

Effective Eye Detection for Face Recognition to Protect Medical Information (의료정보 보호를 위해 얼굴인식에 필요한 효과적인 시선 검출)

  • Kim, Suk-Il;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.923-932
    • /
    • 2017
  • In this paper, we propose a GRNN(: Generalized Regression Neural Network) algorithms for new eyes and face recognition identification system to solve the points that need corrective action in accordance with the existing problems of facial movements gaze upon it difficult to identify the user and. Using a Kalman filter structural information elements of a face feature to determine the authenticity of the face was estimated future location using the location information of the current head and the treatment time is relatively fast horizontal and vertical elements of the face using a histogram analysis the detected. And the light obtained by configuring the infrared illuminator pupil effects in real-time detection of the pupil, the pupil tracking was to extract the text print vector. The abstract is to be in fully-justified italicized text as it is here, below the author information.