• 제목/요약/키워드: Computer Identification

검색결과 1,477건 처리시간 0.046초

변증 능력 평가 소프트웨어의 구현 (Development of the Software to test Pattern Diagnosis Ability in Oriental Medicine)

  • 김기왕;장재순
    • 대한한의진단학회지
    • /
    • 제14권1호
    • /
    • pp.70-78
    • /
    • 2010
  • Objectives : To qualify or enhance the diagnostic ability of students in Oriental Medicine, so called standardized patients are ideal modality, but because it's a man-based method, more convenient tools are required. Computer-based diagnostic ability test program gives effective way for the very purpose. So we made a pilot software evaluating Pattern Identification ability in Oriental Medicine. Methods and Materials : The pilot software was coded with Microsoft's EXCEL VBA. 87 names of Zheng (Symptom Pattern) and 674 names of symptom (including some signs) are adopted from the former standardization works conducted by Korean Institute of Oriental Medicine (KIOM) in 1996. Results : Compared with some manned modalities to test Pattern Identification ability, the test by this software shows superiority in convenience and objectivity. Conclusion : This software is world's first program to perform computer-based evaluation of Pattern Identification in Oriental Medicine, and it gives effective way to complement both written test and manned clinical performance test (CPX).

에너지 효율적인 모바일 RFID용 태그 충돌방지 프로토콜 (Energy Effective Tag Anti-collision Protocol for Mobile RFID System)

  • 조양현;국중각
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권2호
    • /
    • pp.207-214
    • /
    • 2012
  • 본 논문에서는 Slotted ALOHA, Dynamic Slotted ALOHA, Binary Tree, Query Tree를 분석하고 태그 인식 시간을 단축함으로써 모바일 RFID 환경에서 태그의 인식률을 높인다. 또한 인식시간의 단축을 통해 태그의 반송파 전력을 절약함으로써 보다 안정된 태그의 정보 전송이 가능하도록 한다. 이는 결과적으로 모바일 장치의 배터리 사용시간을 늘려서 서비스 접근도를 향상시킨다. 우리는 논문에서 제안한 에너지 효율적인 모바일 RFID용 태그충돌방지 프로토콜을 제안하였다. 제안 기법은 실험결과에서 태그 인식률, 충돌횟수 그리고 배터리 사용량에 있어서 향상된 결과를 나타내고 있다.

페이로드 시그니쳐 품질 평가를 통한 고효율 응용 시그니쳐 탐색 (High Performance Signature Generation by Quality Evaluation of Payload Signature)

  • 이성호;김종현;구영훈;;김명섭
    • 한국통신학회논문지
    • /
    • 제41권10호
    • /
    • pp.1301-1308
    • /
    • 2016
  • 인터넷 속도의 증가와 다양한 응용의 개발로 인해 인터넷 사용자와 이들이 발생시키는 인터넷 트래픽의 양이 급격히 증가하고 있다. 트래픽 분석에 있어서 트래픽 응용 식별 방법은 페이로드 시그니쳐에 의존적이기 때문에 시그니쳐의 구성이나 개수에 따라 높은 부하와 처리 속도가 느린 단점을 갖는다. 따라서 본 논문에서는 응용 식별을 위한 페이로드 시그니쳐의 중요도를 평가하는 방법과 이를 바탕으로 높은 효율의 시그니쳐를 탐색하는 방법을 제안한다. 각 시그니쳐 별로 3가지 기준을 바탕으로 가중치를 계산하고 계산된 가중치와 시그니쳐 맵을 통해 고효율의 시그니쳐 세트를 탐색한다. 제안하는 방법을 실제 트래픽에 적용했을 때 기존 대비 약 4배의 응용 식별 능력을 가진 높은 효율의 시그니쳐들을 정의할 수 있었다.

Vision-based Input-Output System identification for pedestrian suspension bridges

  • Lim, Jeonghyeok;Yoon, Hyungchul
    • Smart Structures and Systems
    • /
    • 제29권5호
    • /
    • pp.715-728
    • /
    • 2022
  • Recently, numbers of long span pedestrian suspension bridges have been constructed worldwide. While recent tragedies regarding pedestrian suspension bridges have shown how these bridges can wreak havoc on the society, there are no specific guidelines for construction standards nor safety inspections yet. Therefore, a structural health monitoring system that could help ensure the safety of pedestrian suspension bridges are needed. System identification is one of the popular applications for structural health monitoring method, which estimates the dynamic system. Most of the system identification methods for bridges are currently adapting output-only system identification method, which assumes the dynamic load to be a white noise due to the difficulty of measuring the dynamic load. In the case of pedestrian suspension bridges, the pedestrian load is within specific frequency range, resulting in large errors when using the output-only system identification method. Therefore, this study aims to develop a system identification method for pedestrian suspension bridges considering both input and output of the dynamic system. This study estimates the location and the magnitude of the pedestrian load, as well as the dynamic response of the pedestrian bridges by utilizing artificial intelligence and computer vision techniques. A simulation-based validation test was conducted to verify the performance of the proposed system. The proposed method is expected to improve the accuracy and the efficiency of the current inspection and monitoring systems for pedestrian suspension bridges.

Modified GMM Training for Inexact Observation and Its Application to Speaker Identification

  • Kim, Jin-Young;Min, So-Hee;Na, Seung-You;Choi, Hong-Sub;Choi, Seung-Ho
    • 음성과학
    • /
    • 제14권1호
    • /
    • pp.163-174
    • /
    • 2007
  • All observation has uncertainty due to noise or channel characteristics. This uncertainty should be counted in the modeling of observation. In this paper we propose a modified optimization object function of a GMM training considering inexact observation. The object function is modified by introducing the concept of observation confidence as a weighting factor of probabilities. The optimization of the proposed criterion is solved using a common EM algorithm. To verify the proposed method we apply it to the speaker recognition domain. The experimental results of text-independent speaker identification with VidTimit DB show that the error rate is reduced from 14.8% to 11.7% by the modified GMM training.

  • PDF

Off-Line Parameter Identification of Permanent Magnet Synchronous Motor Using a Goertzel Algorithm

  • Yoon, Jae-Seung;Lee, Kyoung-Gu;Lee, June-Seok;Lee, Kyo-Beum
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권6호
    • /
    • pp.2262-2270
    • /
    • 2015
  • Generally, internal parameters of the motors and generators can be divided to the resistance and inductance components. They can become a cause of the changing internal parameters because they have sensitive characteristics due to external conditions. The changed parameters can generate the outputs which include error values from the speed and current controllers. Also, it can bring the temperature increase and mechanical damage to the system. Therefore, internal parameters of the motors and generators need to obtain their values according to the external conditions because it can prevent the mechanical damage caused by the changed parameters. In this paper, the off-line parameter identification method is verified using the Goertzel algorithm. The motor used in the simulation and experiments is an interior permanent magnet synchronous motor (IPMSM), and the proposed algorithm is verified by the simulation and experimental results.

Design of Tourism Application Based on RFID Technology

  • Lee, JiHyun;Lee, JoonGoo;Kim, SeonWook
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.74-82
    • /
    • 2014
  • Automatic identification is pervasive in many areas and its applicable areas are increasing gradually. 2D bar-code, NFC, and RFID technologies are representative examples of the automatic identification. This paper explains the implementation of mobile tourism application software on RFID technology. The mobile application provides the location and navigation information by combining the tag inventory and web database. The interactions among the user, application and database server are described in detail. This paper proposes a simple way of minimizing the efforts to build the entire system by storing the URLs for the tag and accessing existing tourism information services through the URLs.

Malicious Trust Managers Identification (MTMI) in Peer to Peer Networks

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.91-98
    • /
    • 2021
  • Peer to Peer Networks play an increasing role in today's networks, also it's expected that this type of communication networks evolves more in the future. Since the number of users that is involved in Peer to Peer Networks is huge and will be increased more in the future, security issues will appear and increase as well. Thus, providing a sustainable solution is needed to ensure the security of Peer to Peer Networks. This paper is presenting a new protocol called Malicious Trust Managers Identification (MTMI). This protocol is used to ensure anonymity of trust manager, that computes and stores the trust value for another peer. The proposed protocol builds a secure connection between trust managers by using public key infrastructure. As well as experimental testing has been conducted to validate the proposed protocol.

개체관리를 위한 인덕터 전송방식의 개체인식 시스템 개발 (Development of Individual Electronic Identification System Using the Inductive Transmission Method for Stockbreeding Management)

  • 고석철;한병성;이재;김용준;이수영
    • Journal of Biosystems Engineering
    • /
    • 제27권5호
    • /
    • pp.451-458
    • /
    • 2002
  • This paper introduces that livestock can be effectively managed by an individual electronic identification system. The proposed system was composed of the original code transmitter, receiver, personal computer, micro-processor, and RS485 telecommunications module. In the individual electronic identification system, the signal including encoded information of a milk-cow was transmitted from an original code transmitter to a micro-processor through RS485 telecommunications module. The transmitted signal can be successfully displayed in a personal computer. This system can be managed by 9999 individuals with a original code transmitter. The recognition rate of an individual electronic identification system was 98.5% and also auto-feeder operates very well. an individual electronic identification system was developed for automation of stockbreeding management. To automate the breeding management, it is necessary to obtain and analyze the individual information distinguished from others preferentially.