• Title/Summary/Keyword: Embedded Training

Search Result 128, Processing Time 0.024 seconds

Development of Mock Control Devices and Data Acquisition Apparatus for Power Tiller Training Simulator

  • Kim, YuYong;Kim, Byounggap;Shin, Seung-yeoub;Kim, Byoungin;Hong, Sunjung
    • Journal of Biosystems Engineering
    • /
    • v.40 no.3
    • /
    • pp.284-288
    • /
    • 2015
  • Training power tiller operators in safe farming is necessary to avoid farming accidents. With the continuing progress in computational technology, driving simulators have become increasingly popular for conducting such training. Purpose: The objective of this study is to develop mock control devices and data acquisition apparatus for a tiller simulator. Methods: Except for the stand and tail wheel adjusting levers, the mock control devices were developed using a tiller handle assay. The data acquisition apparatus was realized using an embedded data-logging device and LabVIEW, the system design software. Results: The control devices of a real handle assay were successfully mimicked by the mock operator control devices, which used sensors for the relevant measurements. The data from the mock devices were acquired and transmitted to the main computer at intervals of 10 ms via Wi-Fi. Conclusions: The developed mock control devices operate similar to real power tillers and can be utilized in power tiller training simulators.

Implementation of a Face Authentication Embedded System Using High-dimensional Local Binary Pattern Descriptor and Joint Bayesian Algorithm (고차원 국부이진패턴과 결합베이시안 알고리즘을 이용한 얼굴인증 임베디드 시스템 구현)

  • Kim, Dongju;Lee, Seungik;Kang, Seog Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1674-1680
    • /
    • 2017
  • In this paper, an embedded system for face authentication, which exploits high-dimensional local binary pattern (LBP) descriptor and joint Bayesian algorithm, is proposed. We also present a feasible embedded system for the proposed algorithm implemented with a Raspberry Pi 3 model B. Computer simulation for performance evaluation of the presented face authentication algorithm is carried out using a face database of 500 persons. The face data of a person consist of 2 images, one for training and the other for test. As performance measures, we exploit score distribution and face authentication time with respect to the dimensions of principal component analysis (PCA). As a result, it is confirmed that an embedded system having a good face authentication performance can be implemented with a relatively low cost under an optimized embedded environment.

MLP Based Real-Time Gravity Disturbance Compensation in INS Embedded Computer (다층 레이어 퍼셉트론 기반 INS 내장형 컴퓨터에서의 실시간 중력교란 보상)

  • Hyun-seok Kim;Hyung-soo Kim;Yun-hyuk Choi;Yun-chul Cho;Chan-sik Park
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.674-684
    • /
    • 2023
  • In this paper, a real-time prediction technique for gravity disturbances is proposed using a multi-layer perceptron (MLP) model. To select a suitable MLP model, 4 models with different network sizes were designed to compare the training accuracy and execution time. The MLP models were trained using the data of vehicle moving along the surface of the sea or land, including their positions and gravity disturbance. The gravity disturbances were calculated using the 2160th degree and order EGM2008 with SHM. Among the models, MLP4 demonstrated the highest training accuracy. After training, the weights and biases of the 4 models were stored in the embedded computer of the INS to implement the MLP network. MLP4 was found to have the shortest execution time among the 4 models. These research results are expected to contribute to improving the navigation accuracy of INS through gravity disturbance compensation in the future.

The Effectiveness of a Cultural Competence Training Program for Public Health Nurses using Intervention Mapping

  • Kim, Yune Kyong;Lee, Hyeonkyeong
    • Research in Community and Public Health Nursing
    • /
    • v.27 no.4
    • /
    • pp.410-422
    • /
    • 2016
  • Purpose: This study evaluated the effects of a cultural competence training program for public health nurses (PHNs) using intervention mapping. Methods: An embedded mixed method design was used. Forty-one PHNs (experimental: 21, control: 20) and forty marriage migrant women (MMW) (20, in each group) who were provided nursing care by PHN participated in the study. The experimental group was provided with a four-week cultural competence program consisting of an eight hour offline and online course, e-mail newsletters and social networking services (BAND). Transcultural Self-efficacy (TSE) of the PHNs, client-nurse trust, and satisfaction with nursing care of MMW were measured. Ten PHNs in the experimental group were interviewed after the experimental study. Results: The experimental group showed a significantly greater improvement in TSE, client-nurse trust, and satisfaction with nursing care than did the control group. Six themes emerged from qualitative data: (a) Recognizing cultural differences, (b) Being interested in the multicultural policy, (c) Trying to communicate in MMW's own language, (d) Providing medical information using internet and smart phone, (e) Embracing culturally diverse people into society, and (f) Requiring ongoing cultural competence training. Conclusion: Cultural competence training enabled PHNs to provide culturally competent care and contribute to MMW's health outcomes.

Deterministic and probabilistic analysis of tunnel face stability using support vector machine

  • Li, Bin;Fu, Yong;Hong, Yi;Cao, Zijun
    • Geomechanics and Engineering
    • /
    • v.25 no.1
    • /
    • pp.17-30
    • /
    • 2021
  • This paper develops a convenient approach for deterministic and probabilistic evaluations of tunnel face stability using support vector machine classifiers. The proposed method is comprised of two major steps, i.e., construction of the training dataset and determination of instance-based classifiers. In step one, the orthogonal design is utilized to produce representative samples after the ranges and levels of the factors that influence tunnel face stability are specified. The training dataset is then labeled by two-dimensional strength reduction analyses embedded within OptumG2. For any unknown instance, the second step applies the training dataset for classification, which is achieved by an ad hoc Python program. The classification of unknown samples starts with selection of instance-based training samples using the k-nearest neighbors algorithm, followed by the construction of an instance-based SVM-KNN classifier. It eventually provides labels of the unknown instances, avoiding calculate its corresponding performance function. Probabilistic evaluations are performed by Monte Carlo simulation based on the SVM-KNN classifier. The ratio of the number of unstable samples to the total number of simulated samples is computed and is taken as the failure probability, which is validated and compared with the response surface method.

Real-time Handwriting Recognizer based on Partial Learning Applicable to Embedded Devices (임베디드 디바이스에 적용 가능한 부분학습 기반의 실시간 손글씨 인식기)

  • Kim, Young-Joo;Kim, Taeho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.591-599
    • /
    • 2020
  • Deep learning is widely utilized to classify or recognize objects of real-world. An abundance of data is trained on high-performance computers and a trained model is generated, and then the model is loaded in an inferencer. The inferencer is used in various environments, so that it may cause unrecognized objects or low-accuracy objects. To solve this problem, real-world objects are collected and they are trained periodically. However, not only is it difficult to immediately improve the recognition rate, but is not easy to learn an inferencer on embedded devices. We propose a real-time handwriting recognizer based on partial learning on embedded devices. The recognizer provides a training environment which partially learn on embedded devices at every user request, and its trained model is updated in real time. As this can improve intelligence of the recognizer automatically, recognition rate of unrecognized handwriting increases. We experimentally prove that learning and reasoning are possible for 22 numbers and letters on RK3399 devices.

Modality-Based Sentence-Final Intonation Prediction for Korean Conversational-Style Text-to-Speech Systems

  • Oh, Seung-Shin;Kim, Sang-Hun
    • ETRI Journal
    • /
    • v.28 no.6
    • /
    • pp.807-810
    • /
    • 2006
  • This letter presents a prediction model for sentence-final intonations for Korean conversational-style text-to-speech systems in which we introduce the linguistic feature of 'modality' as a new parameter. Based on their function and meaning, we classify tonal forms in speech data into tone types meaningful for speech synthesis and use the result of this classification to build our prediction model using a tree structured classification algorithm. In order to show that modality is more effective for the prediction model than features such as sentence type or speech act, an experiment is performed on a test set of 970 utterances with a training set of 3,883 utterances. The results show that modality makes a higher contribution to the determination of sentence-final intonation than sentence type or speech act, and that prediction accuracy improves up to 25% when the feature of modality is introduced.

  • PDF

Study on Design of Fingerprint Recognition Embedded System using Neural Network (신경망을 이용한 지문인식 임베디드 시스템 설계에 관한 연구)

  • Lee Jae-Hyun;Kim Dong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.4
    • /
    • pp.775-782
    • /
    • 2006
  • We generated blocks from the direction-extracted fingerprint during the pre-process of the fingerprint recognition algorithm and performed training by using the direction minutiae of each block as the input pattern of the neural network, so that we extracted the core points to use in the matching. Based on this, we designed the fingerprint recognition embedded system and tested it using the control board and the serial communication to utilize it for a variety of application systems. As a result, we can verify the reliance satisfactorily.

Performance Analysis of Deep Learning-based Image Super Resolution Methods (딥 러닝 기반의 초해상도 이미지 복원 기법 성능 분석)

  • Lee, Hyunjae;Shin, Hyunkwang;Choi, Gyu Sang;Jin, Seong-Il
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.15 no.2
    • /
    • pp.61-70
    • /
    • 2020
  • Convolutional Neural Networks (CNN) have been used extensively in recent times to solve image classification and segmentation problems. However, the use of CNNs in image super-resolution problems remains largely unexploited. Filter interpolation and prediction model methods are the most commonly used algorithms in super-resolution algorithm implementations. The major limitation in the above named methods is that images become totally blurred and a lot of the edge information are lost. In this paper, we analyze super resolution based on CNN and the wavelet transform super resolution method. We compare and analyze the performance according to the number of layers and the training data of the CNN.

Study on Design of Fingerprint Recognition Embedded System using Neural Network

  • Kim, Dong Han;Kim, Jung Hoon;Lee, Sang Hae
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.3
    • /
    • pp.347-352
    • /
    • 2004
  • We generated blocks from the direction-extracted fingerprint during the pre-process of the fingerprint recognition algorithm and performed training by using the direction minutiae of each block as the input pattern of the neural network, so that we extracted the core points to use in the matching. Based on this, we designed the fingerprint recognition embedded system and tested it by using the control board and the serial communication to utilize it for a variety of application systems. As a result, we can verify the reliance satisfactorily.