• Title/Summary/Keyword: Electronic data capture

Search Result 47, Processing Time 0.022 seconds

American Sign Language Recognition System Using Wearable Sensors with Deep Learning Approach (딥러닝 방식의 웨어러블 센서를 사용한 미국식 수화 인식 시스템)

  • Chong, Teak-Wei;Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.2
    • /
    • pp.291-298
    • /
    • 2020
  • Sign language was designed for the deaf and dumb people to allow them to communicate with others and connect to the society. However, sign language is uncommon to the rest of the society. The unresolved communication barrier had eventually isolated deaf and dumb people from the society. Hence, this study focused on design and implementation of a wearable sign language interpreter. 6 inertial measurement unit (IMU) were placed on back of hand palm and each fingertips to capture hand and finger movements and orientations. Total of 28 proposed word-based American Sign Language were collected during the experiment, while 156 features were extracted from the collected data for classification. With the used of the long short-term memory (LSTM) algorithm, this system achieved up to 99.89% of accuracy. The high accuracy system performance indicated that this proposed system has a great potential to serve the deaf and dumb communities and resolve the communication gap.

Gesture Recognition by Analyzing a Trajetory on Spatio-Temporal Space (시공간상의 궤적 분석에 의한 제스쳐 인식)

  • 민병우;윤호섭;소정;에지마 도시야끼
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.1
    • /
    • pp.157-157
    • /
    • 1999
  • Researches on the gesture recognition have become a very interesting topic in the computer vision area, Gesture recognition from visual images has a number of potential applicationssuch as HCI (Human Computer Interaction), VR(Virtual Reality), machine vision. To overcome thetechnical barriers in visual processing, conventional approaches have employed cumbersome devicessuch as datagloves or color marked gloves. In this research, we capture gesture images without usingexternal devices and generate a gesture trajectery composed of point-tokens. The trajectory Is spottedusing phase-based velocity constraints and recognized using the discrete left-right HMM. Inputvectors to the HMM are obtained by using the LBG clustering algorithm on a polar-coordinate spacewhere point-tokens on the Cartesian space .are converted. A gesture vocabulary is composed oftwenty-two dynamic hand gestures for editing drawing elements. In our experiment, one hundred dataper gesture are collected from twenty persons, Fifty data are used for training and another fifty datafor recognition experiment. The recognition result shows about 95% recognition rate and also thepossibility that these results can be applied to several potential systems operated by gestures. Thedeveloped system is running in real time for editing basic graphic primitives in the hardwareenvironments of a Pentium-pro (200 MHz), a Matrox Meteor graphic board and a CCD camera, anda Window95 and Visual C++ software environment.

A Digital Hologram Encryption Method Using Data Scrambling of Frequency Coefficients

  • Choi, Hyun-Jun
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.3
    • /
    • pp.185-189
    • /
    • 2013
  • A digital hologram generated by a computer calculation (computer-generated hologram or capture using charge-coupled device [CCD] camera) is one of the most expensive types of content, and its usage is expanding. Thus, it is highly necessary to protect the ownership of digital holograms. This paper presents an efficient visual security scheme for holographic image reconstruction with a low scrambling cost. Most recent studies on optical security concentrate their focus on security authentication using optical characteristics. However, in this paper, we propose an efficient scrambling method to protect a digital hologram. Therefore, we introduce in this paper several scrambling attempts in both the spatial domain and frequency domain on the basis of the results of analyzing the properties of the coefficients in each domain. To effectively hide the image information, 1/4, 1/256, and 1/16,384 of the original digital hologram needs to be scrambled for the spatial-domain scheme, Fresnel-domain scheme, and discrete cosine transform-domain scheme, respectively. The encryption schemes and the analyses in this paper can be expected to be useful in the research on encryption and other works on digital holograms.

An Empirical Study on the EDI Diffusion and Performance (EDI 시스템의 확산과 성과에 관한 실증적 연구)

  • Lee, Jae-Won;Lee, Young-Hwan
    • Asia pacific journal of information systems
    • /
    • v.10 no.4
    • /
    • pp.1-20
    • /
    • 2000
  • Electronic Data Interchange(EDI) has the potential to improve business operations by expediting the exchange of business documents. It will also provide substantive operational and strategic benefits to the trading firms. However, the successful implementation of EDI systems requires the mutual trust and cooperation between the trading firms. The extent of EDI diffusion and performance depends on inter-organizational, intra-organizational, as well as innovation factors. Researches based on the sociopolitical process framework in the use of IT, organizational theory, resource dependence theory, and innovation diffusion theory have identified 3 inter-organizational variables(transaction climate, dependence, external IS expert support) and 4 intra-organizational variables(strategic IS planning, infrastructure, top management support, education/training,), and 3 innovation variables(compatibility, relative advantage, cost) that affect EDI diffusion. In this study, a multi-dimensional measure on EDI diffusion has been developed to capture the external and internal integration. Then, the influence of these 10 variables on the extent to which the EDI adopting firms pursue diffusion has been examined. Whether more diffusion leads to superior performance has also been studied. International trade managers from 107 firms in the trade industry participated in a field survey. The results based on a structural equation model(SEM), developed using AMOS, provide quite a strong support for the hypothesized relations. Both education/training and IT infrastructure influenced external and internal diffusion of EDI systems. Internal diffusion of EDI enables the adopting firms to improve operational and strategic performance, whereas external diffusion contributes only to operational performance.

  • PDF

A Study on System Requirements for Integrated Electronic Document Management System (IEDMS) (통합전자문서체계구현을 위한 요구기능 분석 연구 -A사의 전자문서관리 사례를 중심으로-)

  • 권택문
    • Journal of Information Technology Application
    • /
    • v.2 no.1
    • /
    • pp.55-81
    • /
    • 2000
  • An Electronic Document Management System(EDMS) is an electronic system solution that is used to create, capture, distribute, edit, store and manage documents and related structured data repositories throughout an organization. Recently, documents of any type, such as text, images, and video files, and structured databases can be controlled and managed by an office automation system and an EDMS. Thus, many organizations are already using these information technologies to reduce process cycle-times. But what the organizations are missing is a integrated system the current workflow or office automation system and provides immediate access to and automatic routing of the organization's mission-critical information. This study tried to find out the user's requirements for integrating current information system and relatively new technology, electronic document management system in order to improve business operations, productivity and quality, and reduces waste. integration of electronic document management system(EDMS) and office automation system and proper use of these technological will improve organization's processes, and compress the process cycle-times. For this study a case study was done by a project team in cooperation with a government organization(say A company). Through this case study valuable electronic document management and office automation system requirement have been identified and reported for providing a system model in order to design an Integrated EDMS(IMDMS).

  • PDF

Effect of Nitrogen, Titanium, and Yttrium Doping on High-K Materials as Charge Storage Layer

  • Cui, Ziyang;Xin, Dongxu;Park, Jinsu;Kim, Jaemin;Agrawal, Khushabu;Cho, Eun-Chel;Yi, Junsin
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.33 no.6
    • /
    • pp.445-449
    • /
    • 2020
  • Non-volatile memory is approaching its fundamental limits with the Si3N4 storage layer, necessitating the use of alternative materials to achieve a higher programming/erasing speed, larger storage window, and better data retention at lower operating voltage. This limitation has restricted the development of the charge-trap memory, but can be addressed by using high-k dielectrics. The paper reviews the doping of nitrogen, titanium, and yttrium on high-k dielectrics as a storage layer by comparing MONOS devices with different storage layers. The results show that nitrogen doping increases the storage window of the Gd2O3 storage layer and improves its charge retention. Titanium doping can increase the charge capture rate of HfO2 storage layer. Yttrium doping increases the storage window of the BaTiO3 storage layer and improves its fatigue characteristics. Parameters such as the dielectric constant, leakage current, and speed of the memory device can be controlled by maintaining a suitable amount of external impurities in the device.

Personalized Search Technique using Users' Personal Profiles (사용자 개인 프로파일을 이용한 개인화 검색 기법)

  • Yoon, Sung-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.3
    • /
    • pp.587-594
    • /
    • 2019
  • This paper proposes a personalized web search technique that produces ranked results reflecting user's query intents and individual interests. The performance of personalized search relies on an effective users' profiling strategy to accurately capture their interests and preferences. User profile is a data set of words and customized weights based on recent user queries and the topic words of web documents from their click history. Personal profile is used to expand a user query to the personalized query before the web search. To determine the exact meaning of ambiguous queries and topic words, this strategy uses WordNet to calculate semantic similarities to words in the user personal profile. Experimental results with query expansion and re-ranking modules installed on general search systems shows enhanced performance with this personalized search technique in terms of precision and recall.

Contrast Enhancement Method using Color Components Analysis (컬러 성분 분석을 이용한 대비 개선 방법)

  • Park, Sang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.707-714
    • /
    • 2019
  • Recently, as the sensor network technologies and camera technologies develops, there are increasing needs by combining two technologies to effectively observe or monitor the areas that are difficult for people to access by using the visual sensor network. Since the applications using visual sensors take pictures of the outdoor areas, the images may not be well contrasted due to cloudy weather or low-light time periods such as a sunset. In this paper, we first model the color characteristics according to illumination using the characteristics of visual sensors that continuously capture the same area. Using this model, a new method for improving low contrast images in real time is proposed. In order to make the model, the regions of interest consisting of the same color are set up and the changes of color according to the brightness of images are measured. The gamma function is used to model color characteristics using the measured data. It is shown by experimental results that the proposed method improves the contrast of an image by adjusting the color components of the low contrast image simply and accurately.

Study on the Hand Gesture Recognition System and Algorithm based on Millimeter Wave Radar (밀리미터파 레이더 기반 손동작 인식 시스템 및 알고리즘에 관한 연구)

  • Lee, Youngseok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.251-256
    • /
    • 2019
  • In this paper we proposed system and algorithm to recognize hand gestures based on the millimeter wave that is in 65GHz bandwidth. The proposed system is composed of millimeter wave radar board, analog to data conversion and data capture board and notebook to perform gesture recognition algorithms. As feature vectors in proposed algorithm. we used global and local zernike moment descriptor which are robust to distort by rotation of scaling of 2D data. As Experimental result, performance of the proposed algorithm is evaluated and compared with those of algorithms using single global or local zernike descriptor as feature vectors. In analysis of confusion matrix of algorithms, the proposed algorithm shows the better performance in comparison of precision, accuracy and sensitivity, subsequently total performance index of our method is 95.6% comparing with another two mehods in 88.4% and 84%.

A Study on Multi-modal Near-IR Face and Iris Recognition on Mobile Phones (휴대폰 환경에서의 근적외선 얼굴 및 홍채 다중 인식 연구)

  • Park, Kang-Ryoung;Han, Song-Yi;Kang, Byung-Jun;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.1-9
    • /
    • 2008
  • As the security requirements of mobile phones have been increasing, there have been extensive researches using one biometric feature (e.g., an iris, a fingerprint, or a face image) for authentication. Due to the limitation of uni-modal biometrics, we propose a method that combines face and iris images in order to improve accuracy in mobile environments. This paper presents four advantages and contributions over previous research. First, in order to capture both face and iris image at fast speed and simultaneously, we use a built-in conventional mega pixel camera in mobile phone, which is revised to capture the NIR (Near-InfraRed) face and iris image. Second, in order to increase the authentication accuracy of face and iris, we propose a score level fusion method based on SVM (Support Vector Machine). Third, to reduce the classification complexities of SVM and intra-variation of face and iris data, we normalize the input face and iris data, respectively. For face, a NIR illuminator and NIR passing filter on camera are used to reduce the illumination variance caused by environmental visible lighting and the consequent saturated region in face by the NIR illuminator is normalized by low processing logarithmic algorithm considering mobile phone. For iris, image transform into polar coordinate and iris code shifting are used for obtaining robust identification accuracy irrespective of image capturing condition. Fourth, to increase the processing speed on mobile phone, we use integer based face and iris authentication algorithms. Experimental results were tested with face and iris images by mega-pixel camera of mobile phone. It showed that the authentication accuracy using SVM was better than those of uni-modal (face or iris), SUM, MAX, NIN and weighted SUM rules.