• Title/Summary/Keyword: Dynamic Feature

Search Result 670, Processing Time 0.023 seconds

A Study on the Development of Embedded Serial Multi-modal Biometrics Recognition System (임베디드 직렬 다중 생체 인식 시스템 개발에 관한 연구)

  • Kim, Joeng-Hoon;Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.1
    • /
    • pp.49-54
    • /
    • 2006
  • The recent fingerprint recognition system has unstable factors, such as copy of fingerprint patterns and hacking of fingerprint feature point, which mali cause significant system error. Thus, in this research, we used the fingerprint as the main recognition device and then implemented the multi-biometric recognition system in serial using the speech recognition which has been widely used recently. As a multi-biometric recognition system, once the speech is successfully recognized, the fingerprint recognition process is run. In addition, speaker-dependent DTW(Dynamic Time Warping) algorithm is used among existing speech recognition algorithms (VQ, DTW, HMM, NN) for effective real-time process while KSOM (Kohonen Self-Organizing feature Map) algorithm, which is the artificial intelligence method, is applied for the fingerprint recognition system because of its calculation amount. The experiment of multi-biometric recognition system implemented in this research showed 2 to $7\%$ lower FRR (False Rejection Ratio) than single recognition systems using each fingerprints or voice, but zero FAR (False Acceptance Ratio), which is the most important factor in the recognition system. Moreover, there is almost no difference in the recognition time(average 1.5 seconds) comparing with other existing single biometric recognition systems; therefore, it is proved that the multi-biometric recognition system implemented is more efficient security system than single recognition systems based on various experiments.

ROI Based Object Extraction Using Features of Depth and Color Images (깊이와 칼라 영상의 특징을 사용한 ROI 기반 객체 추출)

  • Ryu, Ga-Ae;Jang, Ho-Wook;Kim, Yoo-Sung;Yoo, Kwan-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.395-403
    • /
    • 2016
  • Recently, Image processing has been used in many areas. In the image processing techniques that a lot of research is tracking of moving object in real time. There are a number of popular methods for tracking an object such as HOG(Histogram of Oriented Gradients) to track pedestrians, and Codebook to subtract background. However, object extraction has difficulty because that a moving object has dynamic background in the image, and occurs severe lighting changes. In this paper, we propose a method of object extraction using depth image and color image features based on ROI(Region of Interest). First of all, we look for the feature points using the color image after setting the ROI a range to find the location of object in depth image. And we are extracting an object by creating a new contour using the convex hull point of object and the feature points. Finally, we compare the proposed method with the existing methods to find out how accurate extracting the object is.

Traffic Object Tracking Based on an Adaptive Fusion Framework for Discriminative Attributes (차별적인 영상특징들에 적응 가능한 융합구조에 의한 도로상의 물체추적)

  • Kim Sam-Yong;Oh Se-Young
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.43 no.5 s.311
    • /
    • pp.1-9
    • /
    • 2006
  • Because most applications of vision-based object tracking demonstrate satisfactory operations only under very constrained environments that have simplifying assumptions or specific visual attributes, these approaches can't track target objects for the highly variable, unstructured, and dynamic environments like a traffic scene. An adaptive fusion framework is essential that takes advantage of the richness of visual information such as color, appearance shape and so on, especially at cluttered and dynamically changing scenes with partial occlusion[1]. This paper develops a particle filter based adaptive fusion framework and improves the robustness and adaptation of this framework by adding a new distinctive visual attribute, an image feature descriptor using SIFT (Scale Invariant Feature Transform)[2] and adding an automatic teaming scheme of the SIFT feature library according to viewpoint, illumination, and background change. The proposed algorithm is applied to track various traffic objects like vehicles, pedestrians, and bikes in a driver assistance system as an important component of the Intelligent Transportation System.

A Systematic Literature Review on Secure Software Development using Feature Driven Development (FDD) Agile Model (기능주도개발 Agile 방법을 사용할 때의 안전한 소프트웨어 개발에 관한 문헌연구)

  • Arbain, Adila Firdaus;Ghani, Imran;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.13-27
    • /
    • 2014
  • Agile methodologies have gained recognition as efficient development processes through their quick delivery of software, even under time constraints. However, like other agile methods such as Scrum, Extreme Programming (XP) and The Dynamic Systems Development Method (DSDM), Feature Driven Development (FDD) has been criticized due to the unavailability of security elements in its twelve practices. In order to examine this matter more closely, we conducted a systematic literature review (SLR) and studied literature for the years 2001-2012. Our findings highlight that, in its current form, the FDD model partially supports the development of secure software. However, there is little research on this topic, as detailed information about the usage of secure software is rarely published. Thus, we have been able to conclude that the existing five phases of FDD have not been enough to develop secure software until recently. For this reason, security-based phase and practices in FDD need to be proposed.

A Defect Inspection Method in TFT-LCD Panel Using LS-SVM (LS-SVM을 이용한 TFT-LCD 패널 내의 결함 검사 방법)

  • Choi, Ho-Hyung;Lee, Gun-Hee;Kim, Ja-Geun;Joo, Young-Bok;Choi, Byung-Jae;Park, Kil-Houm;Yun, Byoung-Ju
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.6
    • /
    • pp.852-859
    • /
    • 2009
  • Normally, to extract the defect in TFT-LCD inspection system, the image is obtained by using line scan camera or area scan camera which is achieved by CCD or CMOS sensor. Because of the limited dynamic range of CCD or CMOS sensor as well as the effect of the illumination, these images are frequently degraded and the important features are hard to decern by a human viewer. In order to overcome this problem, the feature vectors in the image are obtained by using the average intensity difference between defect and background based on the weber's law and the standard deviation of the background region. The defect detection method uses non-linear SVM (Supports Vector Machine) method using the extracted feature vectors. The experiment results show that the proposed method yields better performance of defect classification methods over conveniently method.

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.

Understanding the Asymptotic Convergence of Domain of Attraction in Extreme Value Distribution for Establishing Baseline Distribution in Statistical Damage Assessment of a Structure (통계적 구조물 손상진단에서 기저분포 구성을 위한 극치분포의 점근적 수렴성 이해)

  • Kang, Joo-Sung;Park, Hyun-Woo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.13 no.2 s.54
    • /
    • pp.231-242
    • /
    • 2009
  • The baseline distribution of a structure represents the statistical distribution of dynamic response feature from the healthy state of the structure. Generally, damage-sensitive dynamic response feature of a structure manifest themselves near the tail of a baseline statistical distribution. In this regard, some researchers have paid attention to extreme value distribution for modeling the tail of a baseline distribution. However, few researches have been conducted to theoretically understand the extreme value distribution from a perspective of statistical damage assessment. This study investigates the asymptotic convergence of domain of attraction in extreme value distribution through parameter estimation, which is needed for reliable statistical damage assessment. In particular, the asymptotic convergence of a domain of attraction is quantified with respect to the sample size out of which each extreme value is extracted. The effect of the sample size on false positive alarms in statistical damage assessment is quantitatively investigated as well. The validity of the proposed method is demonstrated through numerically simulated acceleration data on a two span continuous truss bridge.

Fine Feature Sensing and Restoration by Tactile Examination of PVDF Sensor

  • Yoon, Seong-Sik;Kang, Sung-Chul;Lee, Woo-Sub;Choi, Hyouk-Ryeol;Oh, Sang-Rok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.942-947
    • /
    • 2003
  • An important signal processing problem in PVDF sensor is the restoration of surface information from electric sensing signals. The objectives of this research are to design a new texture sensing system and to develop a new signal processing algorithm for signals from the sensor to be tangibly displayed by tangible interface systems. The texture sensing system is designed to get surface information with high resolution and dynamic range. First, a PVDF sensor is made of piezoelectric polymer (polyvinylidene fluoride) strips molded in a silicon rubber and attached in a rigid cylinder body. The sensor is mounted to a scanning system for dynamic sensing. Secondly, a new signal processing algorithm is developed to restore surface information. The algorithm consists of the two-dimensional modeling of the sensor using an identification method and inverse filtering from sensing signals into estimated surface information. Finally the two-dimensional surface information can be experimentally reconstructed from sensing signals using the developed signal processing algorithm.

  • PDF

On-line signature verification method using Gabor filter (Gabor 필터를 이용한 온라인 서명 검증 기법)

  • 이종현;김성훈;김재희
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.3
    • /
    • pp.129-137
    • /
    • 2004
  • This paper presents a signature verification method that uses Gabor filter in computing similarity between signatures. In computing similarity to compare two on-line signatures, the temporal relationship between two signatures should be computed in advance. However, conventional point matching method using DP(dynamic programming) matching consumes much computation. In this paper, we propose a fast method for computing the temporal relationship between two on-line signatures by using the phase output of Gabor Inter applied on the on-line signature signals. Two similarity measures are defined in the method: Temporal Similarity and Temporally Arranged Feature Profile Similarity. With the proposed method, Ive could compare signatures 30 times faster than conventional method using DP matching.

A Study on Intelligent Control Algorithm Development for Cooperation Working of Human and Robot (인간과 로봇 협력작업을 위한 로봇 지능제어알고리즘 개발에 관한 연구)

  • Lee, Woo-Song;Jung, Yang-Guen;Park, In-Man;Jung, Jong-Gyu;Kim, Hui-Jin;Kim, Min-Seong;Han, Sung-Hyun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.4
    • /
    • pp.285-297
    • /
    • 2017
  • This study proposed a new approach to develop an Intelligent control algorithm for cooperative working of human and robot based on voice recognition. In general case of speaker verification, Gaussian Mixture Model is used to model the feature vectors of reference speech signals. On the other hand, Dynamic Time Warping based template matching techniques were presented for the voice recognition about several years ago. We converge these two different concepts in a single method and then implement in a real time voice recognition enough to make reference model to satisfy 95% of recognition performance. In this paper it was illustrated the reliability of voice recognition by simulation and experiments for humanoid robot with 18 joints.