• Title/Summary/Keyword: Face identification

Search Result 304, Processing Time 0.026 seconds

Determination of THRs - A Practical Approach for Manufacturers According to EN50129

  • Weber, Ulrich
    • Journal of the Korean Society for Railway
    • /
    • v.16 no.2
    • /
    • pp.104-109
    • /
    • 2013
  • The paper will outline how hazard identification and risk evaluation can effectively be performed to obtain Tolerable Hazard Rates (THR). As a target group manufacturers are addressed, who face the situation, that for a generic application THRs are needed for compliance with EN 50129 [1]. Focusing on functional hazards this paper shows a possible hazard log and the relevant analysis methods. The terms safety barrier and barrier function will be introduced and used instead of the term "safety function". As functional hazards and barrier functions depend on each other, emphasis will be put on a comprehensive and detailed definition of barrier functions and the usage of function lists. By using detailed and complete hazard and barrier function definitions THRs can be obtained while at the same time the approach becomes clear how the hazard rates (HR) will be established.

Face Identification using Support Vector Machines with Features Set extracted by Genetic Algorithm (GA에 의한 특징 선택에 따른 Support Vector Machines을 이용한 얼굴 인식)

  • 이경희;변혜란
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10b
    • /
    • pp.458-460
    • /
    • 2000
  • 본 논문에서는 유전자 알고리즘(GA)과 Support Vector Machine(SVM)을 결합하여 사용한 얼굴 인식 시스템을 제안한다. 기존의 SVM을 이용한 얼굴 인식 연구에서는 얼굴 전체 영상을 SVM의 입력벡터로 사용하는데 반해, 본 연구에서는 GA를 이용하여 얼굴 영상 중에서 개인별로 식별 능력이 우수한 특징들만을 선택하여 이를 SVM의 입력벡터로 사용한다. 조명, 표정, 안경 착용 등 다양한 변화가 있는 Yale 얼굴 데이터베이스를 사용하여 실험한 결과, 얼굴 전체 영상을 사용한 경우보다 더 좋은 인식률을 보였다. 또한 제안된 방법에 의한 얼굴 인식 시스템은 각 개인별로 식별력이 우수한 특징들만을 저장하므로, 얼굴인식 시스템을 구성하기 위해 저장될 정보의 양이 현저하게 감소하게 된다.

  • PDF

Abnormal Crowd Behavior Detection Using Heuristic Search and Motion Awareness

  • Usman, Imran;Albesher, Abdulaziz A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.131-139
    • /
    • 2021
  • In current time, anomaly detection is the primary concern of the administrative authorities. Suspicious activity identification is shifting from a human operator to a machine-assisted monitoring in order to assist the human operator and react to an unexpected incident quickly. These automatic surveillance systems face many challenges due to the intrinsic complex characteristics of video sequences and foreground human motion patterns. In this paper, we propose a novel approach to detect anomalous human activity using a hybrid approach of statistical model and Genetic Programming. The feature-set of local motion patterns is generated by a statistical model from the video data in an unsupervised way. This features set is inserted to an enhanced Genetic Programming based classifier to classify normal and abnormal patterns. The experiments are performed using publicly available benchmark datasets under different real-life scenarios. Results show that the proposed methodology is capable to detect and locate the anomalous activity in the real time. The accuracy of the proposed scheme exceeds those of the existing state of the art in term of anomalous activity detection.

Identification and SWOT analysis of ecological and security issues of battery electric vehicles

  • Sanjeev Kumar;Amit Pal
    • Advances in Energy Research
    • /
    • v.8 no.3
    • /
    • pp.165-174
    • /
    • 2022
  • Environmental sustainability is critical; else, the whole planet would face climatic disasters in the near future. A transportation system based on electric vehicles is assumed to be capable of providing long-term mobility. However, despite several attempts by national and international authorities, a great aim could not be met in India or the rest of the globe. Existing electric cars have a number of limits and obstacles. This report highlighted significant environmental and safety-related constraints that contribute to the low adoption rate of BEVs in India. A SWOT analysis was also carried out to identify the important elements influencing the future of BEV penetration in India.

Development of CCTV for Identification of Maskless Wearers based on Deep Learning (딥러닝 기반 마스크 미착용자 식별 CCTV 개발)

  • Lee, Se-Hoon;Kwon, Hyeon-guen;Kim, Young-Jin;Jeong, Ji-Seok;Seo, Hee-Ju
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.317-318
    • /
    • 2020
  • 본 논문에서는 얼굴검출 후 MobilnetV2의 방법을 이용하여 적은 연산량으로 CCTV가 실시간으로 마스크 착용 유무를 판단할 수 있는 방법을 제시하였다. 이를 통해 현재 이슈가 되고있는 코로나19 등 전염병의 전염 위험이 있는 주요 장소에서 인공지능 CCTV가 마스크 미착용자를 식별해 알려줌으로써 마스크 미착용자를 관리할 수 있는 방법을 제공하였다.

  • PDF

Face Recognition and Preprocessing Technique for Speaker Identification in hard of hearing broadcasting (청각장애인용 방송에서 화자 식별을 위한 얼굴 인식 알고리즘 및 전처리 연구)

  • Kim, Nayeon;Cho, Sukhee;Bae, Byungjun;Ahn, ChungHyun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.07a
    • /
    • pp.450-452
    • /
    • 2020
  • 본 논문에서는 딥러닝 기반 얼굴 인식 알고리즘에 대해 살펴보고, 이를 청각장애인용 방송에서 화자를 식별하고 감정 표현 자막을 표출하기 위한 배우 얼굴 인식 기술에 적용하고자 한다. 우선, 배우 얼굴 인식을 위한 방안으로 원샷 학습 기반의 딥러닝 얼굴 인식 알고리즘인 ResNet-50 기반 VGGFace2 모델의 구성에 대해 이해하고, 이러한 모델을 기반으로 다양한 전처리 방식을 적용하여 정확도를 측정함으로써 실제 청각장애인용 방송에서 배우 얼굴을 인식하기 위한 방안에 대해 모색한다.

  • PDF

Deep Learning Approach for Automatic Discontinuity Mapping on 3D Model of Tunnel Face (터널 막장 3차원 지형모델 상에서의 불연속면 자동 매핑을 위한 딥러닝 기법 적용 방안)

  • Chuyen Pham;Hyu-Soung Shin
    • Tunnel and Underground Space
    • /
    • v.33 no.6
    • /
    • pp.508-518
    • /
    • 2023
  • This paper presents a new approach for the automatic mapping of discontinuities in a tunnel face based on its 3D digital model reconstructed by LiDAR scan or photogrammetry techniques. The main idea revolves around the identification of discontinuity areas in the 3D digital model of a tunnel face by segmenting its 2D projected images using a deep-learning semantic segmentation model called U-Net. The proposed deep learning model integrates various features including the projected RGB image, depth map image, and local surface properties-based images i.e., normal vector and curvature images to effectively segment areas of discontinuity in the images. Subsequently, the segmentation results are projected back onto the 3D model using depth maps and projection matrices to obtain an accurate representation of the location and extent of discontinuities within the 3D space. The performance of the segmentation model is evaluated by comparing the segmented results with their corresponding ground truths, which demonstrates the high accuracy of segmentation results with the intersection-over-union metric of approximately 0.8. Despite still being limited in training data, this method exhibits promising potential to address the limitations of conventional approaches, which only rely on normal vectors and unsupervised machine learning algorithms for grouping points in the 3D model into distinct sets of discontinuities.

The Role of Social Capital and Identity in Knowledge Contribution in Virtual Communities: An Empirical Investigation (가상 커뮤니티에서 사회적 자본과 정체성이 지식기여에 미치는 역할: 실증적 분석)

  • Shin, Ho Kyoung;Kim, Kyung Kyu;Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.53-74
    • /
    • 2012
  • A challenge in fostering virtual communities is the continuous supply of knowledge, namely members' willingness to contribute knowledge to their communities. Previous research argues that giving away knowledge eventually causes the possessors of that knowledge to lose their unique value to others, benefiting all except the contributor. Furthermore, communication within virtual communities involves a large number of participants with different social backgrounds and perspectives. The establishment of mutual understanding to comprehend conversations and foster knowledge contribution in virtual communities is inevitably more difficult than face-to-face communication in a small group. In spite of these arguments, evidence suggests that individuals in virtual communities do engage in social behaviors such as knowledge contribution. It is important to understand why individuals provide their valuable knowledge to other community members without a guarantee of returns. In virtual communities, knowledge is inherently rooted in individual members' experiences and expertise. This personal nature of knowledge requires social interactions between virtual community members for knowledge transfer. This study employs the social capital theory in order to account for interpersonal relationship factors and identity theory for individual and group factors that may affect knowledge contribution. First, social capital is the relationship capital which is embedded within the relationships among the participants in a network and available for use when it is needed. Social capital is a productive resource, facilitating individuals' actions for attainment. Nahapiet and Ghoshal (1997) identify three dimensions of social capital and explain theoretically how these dimensions affect the exchange of knowledge. Thus, social capital would be relevant to knowledge contribution in virtual communities. Second, existing research has addressed the importance of identity in facilitating knowledge contribution in a virtual context. Identity in virtual communities has been described as playing a vital role in the establishment of personal reputations and in the recognition of others. For instance, reputation systems that rate participants in terms of the quality of their contributions provide a readily available inventory of experts to knowledge seekers. Despite the growing interest in identities, however, there is little empirical research about how identities in the communities influence knowledge contribution. Therefore, the goal of this study is to better understand knowledge contribution by examining the roles of social capital and identity in virtual communities. Based on a theoretical framework of social capital and identity theory, we develop and test a theoretical model and evaluate our hypotheses. Specifically, we propose three variables such as cohesiveness, reciprocity, and commitment, referring to the social capital theory, as antecedents of knowledge contribution in virtual communities. We further posit that members with a strong identity (self-presentation and group identification) contribute more knowledge to virtual communities. We conducted a field study in order to validate our research model. We collected data from 192 members of virtual communities and used the PLS method to analyse the data. The tests of the measurement model confirm that our data set has appropriate discriminant and convergent validity. The results of testing the structural model show that cohesion, reciprocity, and self-presentation significantly influence knowledge contribution, while commitment and group identification do not significantly influence knowledge contribution. Our findings on cohesion and reciprocity are consistent with the previous literature. Contrary to our expectations, commitment did not significantly affect knowledge contribution in virtual communities. This result may be due to the fact that knowledge contribution was voluntary in the virtual communities in our sample. Another plausible explanation for this result may be the self-selection bias for the survey respondents, who are more likely to contribute their knowledge to virtual communities. The relationship between self-presentation and knowledge contribution was found to be significant in virtual communities, supporting the results of prior literature. Group identification did not significantly affect knowledge contribution in this study, inconsistent with the wealth of research that identifies group identification as an important factor for knowledge sharing. This conflicting result calls for future research that examines the role of group identification in knowledge contribution in virtual communities. This study makes a contribution to theory development in the area of knowledge management in general and virtual communities in particular. For practice, the results of this study identify the circumstances under which individual factors would be effective for motivating knowledge contribution to virtual communities.

  • PDF

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

Identification of Subgroups with Lower Level of Stroke Knowledge Using Decision-tree Analysis (의사결정나무 분석기법을 이용한 뇌졸중 지식 취약군 규명)

  • Kim, Hyun Kyung;Jeong, Seok Hee;Kang, Hyun Cheol
    • Journal of Korean Academy of Nursing
    • /
    • v.44 no.1
    • /
    • pp.97-107
    • /
    • 2014
  • Purpose: This study was performed to explore levels of stroke knowledge and identify subgroups with lower levels of stroke knowledge among adults in Korea. Methods: A cross-sectional survey was used and data were collected in 2012. A national sample of 990 Koreans aged 20 to 74 years participated in this study. Knowledge of risk factors, warning signs, and first action for stroke were surveyed using face-to-face interviews. Descriptive statistics and decision tree analysis were performed using SPSS WIN 20.0 and Answer Tree 3.1. Results: Mean score for stroke risk factor knowledge was 7.7 out of 10. The least recognized risk factor was diabetes and four subgroups with lower levels of knowledge were identified. Score for knowledge of stroke warning signs was 3.6 out of 6. The least recognized warning sign was sudden severe headache and six subgroups with lower levels of knowledge were identified. The first action for stroke was recognized by 65.7 percent of participants and four subgroups with lower levels of knowledge were identified. Conclusion: Multi-faceted education should be designed to improve stroke knowledge among Korean adults, particularly focusing on subgroups with lower levels of knowledge and less recognition of items in this study.