• 제목/요약/키워드: Key Points

검색결과 918건 처리시간 0.032초

A Novel Face Recognition Algorithm based on the Deep Convolution Neural Network and Key Points Detection Jointed Local Binary Pattern Methodology

  • Huang, Wen-zhun;Zhang, Shan-wen
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권1호
    • /
    • pp.363-372
    • /
    • 2017
  • This paper presents a novel face recognition algorithm based on the deep convolution neural network and key point detection jointed local binary pattern methodology to enhance the accuracy of face recognition. We firstly propose the modified face key feature point location detection method to enhance the traditional localization algorithm to better pre-process the original face images. We put forward the grey information and the color information with combination of a composite model of local information. Then, we optimize the multi-layer network structure deep learning algorithm using the Fisher criterion as reference to adjust the network structure more accurately. Furthermore, we modify the local binary pattern texture description operator and combine it with the neural network to overcome drawbacks that deep neural network could not learn to face image and the local characteristics. Simulation results demonstrate that the proposed algorithm obtains stronger robustness and feasibility compared with the other state-of-the-art algorithms. The proposed algorithm also provides the novel paradigm for the application of deep learning in the field of face recognition which sets the milestone for further research.

Temperature distribution analysis of steel box-girder based on long-term monitoring data

  • Wang, Hao;Zhu, Qingxin;Zou, Zhongqin;Xing, Chenxi;Feng, Dongming;Tao, Tianyou
    • Smart Structures and Systems
    • /
    • 제25권5호
    • /
    • pp.593-604
    • /
    • 2020
  • Temperature may have more significant influences on structural responses than operational loads or structural damage. Therefore, a comprehensive understanding of temperature distributions has great significance for proper design and maintenance of bridges. In this study, the temperature distribution of the steel box girder is systematically investigated based on the structural health monitoring system (SHMS) of the Sutong Cable-stayed Bridge. Specifically, the characteristics of the temperature and temperature difference between different measurement points are studied based on field temperature measurements. Accordingly, the probability density distributions of the temperature and temperature difference are calculated statistically, which are further described by the general formulas. The results indicate that: (1) the temperature and temperature difference exhibit distinct seasonal characteristics and strong periodicity, and the temperature and temperature difference among different measurement points are strongly correlated, respectively; (2) the probability density of the temperature difference distribution presents strong non-Gaussian characteristics; (3) the probability density function of temperature can be described by the weighted sum of four Normal distributions. Meanwhile, the temperature difference can be described by the weighted sum of Weibull distribution and Normal distribution.

Cancer Care Management through a Mobile Phone Health Approach: Key Considerations

  • Mohammadzadeh, Niloofar;Safdari, Reza;Rahimi, Azin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제14권9호
    • /
    • pp.4961-4964
    • /
    • 2013
  • Greater use of mobile phone devices seems inevitable because the health industry and cancer care are facing challenges such as resource constraints, rising care costs, the need for immediate access to healthcare data of types such as audio video texts for early detection and treatment of patients and increasing remote aids in telemedicine. Physicians, in order to study the causes of cancer, detect cancer earlier, act in prevention measures, determine the effectiveness of treatment and specify the reasons for the treatment ineffectiveness, need to access accurate, comprehensive and timely cancer data. Mobile devices provide opportunities and can play an important role in consulting, diagnosis, treatment, and quick access to health information. There easy carriage make them perfect tools for healthcare providers in cancer care management. Key factors in cancer care management systems through a mobile phone health approach must be considered such as human resources, confidentiality and privacy, legal and ethical issues, appropriate ICT and provider infrastructure and costs in general aspects and interoperability, human relationships, types of mobile devices and telecommunication related points in specific aspects. The successful implementation of mobile-based systems in cancer care management will constantly face many challenges. Hence, in applying mobile cancer care, involvement of users and considering their needs in all phases of project, providing adequate bandwidth, preparation of standard tools that provide maximum mobility and flexibility for users, decreasing obstacles to interrupt network communications, and using suitable communication protocols are essential. It is obvious that identifying and reducing barriers and strengthening the positive points will have a significant role in appropriate planning and promoting the achievements of mobile cancer care systems. The aim of this article is to explain key points which should be considered in designing appropriate mobile health systems in cancer care as an approach for improving cancer care management.

하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계 (A Design of Permission Management System Based on Group Key in Hadoop Distributed File System)

  • 김형주;강정호;유한나;전문석
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제4권4호
    • /
    • pp.141-146
    • /
    • 2015
  • 최근 스마트 기기 및 소셜 네트워크 서비스, 스트리밍 서비스 등 IT 기술의 발달로 인해 데이터가 급증하였다. 이러한 환경에 맞춰 대용량 데이터를 처리할 수 있는 기술도 함께 주목받고 있는데, 가장 대표적인 기술이 하둡이다. 하둡은 오픈 소스 기반으로 리눅스 기반의 범용 컴퓨터에서 실행할 수 있도록 설계되었다. 초기 하둡은 보안이 거의 도입되지 않았으나, 사용자가 늘어남에 따라 보안이 필요한 데이터가 증가하면서 2009년 커버로스와 토큰 시스템을 도입한 새로운 버전이 나왔다. 그러나 이 방식은 하나의 비밀키만을 사용하고, 사용자마다 블록에 대한 접근허가를 지정할 수 없다는 문제점과 재전송 공격 및 위장 공격 등이 가능하다는 취약점을 가지고 있다. 따라서 본 논문에서는 이러한 취약점을 보안하면서 성능을 유지하기 위해 사용자들을 논리적인 그룹으로 묶어서 인증하고, 이를 토큰에 반영하는 그룹키 기반의 프로토콜을 제안하였다. 성능평가 결과 키 생성에 따른 오버헤드가 없고, 비밀키 유출에 대한 취약점을 해결하였음을 확인하였다.

금구혈(禁灸穴)에 관한 문헌적 고찰 (A review study on the Moxibustion-prohibited Point)

  • 김광성;이병렬;임윤경
    • Korean Journal of Acupuncture
    • /
    • 제26권4호
    • /
    • pp.145-156
    • /
    • 2009
  • Objective : To increase the safety of moxibustion by understanding moxibustion-prohibited points' distinguishing features through literary inquiry. Method : We searched for moxibustion-prohibited points in Traditional Oriental Medical literature. Results : 1. Upon the advancement of moxibustion technique, the numbers of moxibustion-prohibited points increased. 2. Both Foot Meridians and Hand Meridians have similar percentage of moxibustion-prohibited points. Both Yin Meridians and Yang Meridians have similar percentage of moxibustion-prohibited points. 3. The face has the highest moxibustion-prohibited points ratio. The Back has the lowest moxibustion-prohibited points ratio. 4. We research 80 moxibustion-prohibited points and find 31 moxibustion-prohibitive reasons. A key reasons is that heating effect of moxibustion damages tissues, organs and meridian functions. There are also cases where the moxibustion-prohibited points can be designated upon the patients condition Conclusions : We could learn the distinguishing characteristics of moxibustion-prohibited points from this study. These results suggest that the treatment of moxibustion is more useful and safe.

  • PDF

사암침법 한격과 열격의 경혈구성에 관한 고찰 (A Literature Study on the Combination of acupoints of HANGYEOK and YEOLGYEOK in the Saam Acupuncture Method)

  • 유준상;한수지;윤동원
    • 대한한의학회지
    • /
    • 제41권3호
    • /
    • pp.81-97
    • /
    • 2020
  • Objectives: The objective of this study is to review the methods of combining acupoints of HANGYEOK(Cooling Mode) and YEOLGYEOK(Heating Mode) in Saam Acupuncture Method. Methods: We searched and investigated the journals and literatures by OASIS(Korea Institute of Oriental Medicine) and relevant searching engines with the key word "Saam, Hangyeok, Yeolgyeok". Unfortunately there was no relevant articles on this theme except six literatures. Six literatures with the key words relevant to Saam and acupuncture were selected and analyzed according to each composition of acupuncture prescription especially focusing on HANGYEOK and YEOLGYEOK. Results: Analyzing HANGYEOK and YEOLGYEOK of 12 meridians, two different methods emerged. In HANGYEOK to treat Heat Pattern, one method is to tonify Water points and directly sedate Fire points. The other is also to tonify Water point, but sedate Earth points instead of Fire points. It is assumed that Earth sedation method is to eradicate the underlying Fire. In only Heart meridian and Pericardium meridian there is one method to treat Heat Pattern: Water tonification and Fire Sedation. In YEOLGYEOK to treat Cold Pattern, there is one method to tonify Fire points and sedate Water points. In Pericardium meridian and Triple Energizer meridian there are some different combination of acupoints depending on literatures. Conclusions: Considering HANGYEOK and YEOLGYEOK in Saam Acupuncture Method, two methods are mainly discussed in HANGYEOK; Water Tonification Fire Sedation and Water Tonification Earth Sedation. To remove the underlying Fire, it is regarded that Water Tonification Earth Sedation is appropriate and close to Saam's thought.

Model updating with constrained unscented Kalman filter for hybrid testing

  • Wu, Bin;Wang, Tao
    • Smart Structures and Systems
    • /
    • 제14권6호
    • /
    • pp.1105-1129
    • /
    • 2014
  • The unscented Kalman filter (UKF) has been developed for nonlinear model parametric identification, and it assumes that the model parameters are symmetrically distributed about their mean values without any constrains. However, the parameters in many applications are confined within certain ranges to make sense physically. In this paper, a constrained unscented Kalman filter (CUKF) algorithm is proposed to improve accuracy of numerical substructure modeling in hybrid testing. During hybrid testing, the numerical models of numerical substructures which are assumed identical to the physical substructures are updated online with the CUKF approach based on the measurement data from physical substructures. The CUKF method adopts sigma points (i.e., sample points) projecting strategy, with which the positions and weights of sigma points violating constraints are modified. The effectiveness of the proposed hybrid testing method is verified by pure numerical simulation and real-time as well as slower hybrid tests with nonlinear specimens. The results show that the new method has better accuracy compared to conventional hybrid testing with fixed numerical model and hybrid testing based on model updating with UKF.

Comparison of Insulation Coordination Between ±800kV and ±1100kV UHVDC Systems

  • Wang, Dong-ju;Zhou, Hao
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권4호
    • /
    • pp.1773-1779
    • /
    • 2015
  • Insulation coordination is a key problem in UHVDC systems in terms of safety and cost. Although high-voltage ±1100kV UHVDC projects are being planned in China, the characteristics and key points of high-voltage systems have not yet been analyzed. This study aims to improve the safe, effective operation of these high-voltage power transmission systems. First, we analyzed two typical insulation coordination schemes used in ±800kV UHVDC systems in China. Next, we used the two typical ±800kV insulation coordination schemes as a reference to analyze the ±1100kV UHVDC system. Finally, we compared these schemes and proposed an effective insulation coordination solution, as well as developing principles for ±1100kV UHVDC systems. Our findings indicate that the points enduring the highest voltage in the system should be protected separately by special arresters. Our analysis of the insulation coordination of ±800kV and ±1100kV UHVDC systems concluded that, in ±1100kV UHVDC systems, the main goal of insulation coordination is to lower the insulation level of points enduring the highest voltage. However, in a ±800kV UHVDC system, the main goal is to reduce the cost of manufacture for arresters, as well as the space occupation in the valve hall, with an acceptable insulation level.

플로팅 주거건축의 주요 건축계획 항목에 관한 연구 -플로팅 건축 관련 기준 및 주거건축 해외 사례를 중심으로- (The Key Points of Architectural Planning for Floating Residential Architecture)

  • 송석기
    • 한국산학기술학회논문지
    • /
    • 제14권10호
    • /
    • pp.5281-5289
    • /
    • 2013
  • 이 연구는 플로팅 건축과 관련된 각종 기준과 플로팅 주거건축 사례에서 확인할 수 있는 플로팅 주거건축의 주요 건축 계획 항목을 정리하고자 하였다. 미국과 캐나다, 네델란드, 일본에서 작성된 총 6종의 관련 기준과 미국과 캐나다, 네델란드의 플로팅 주거건축 사례를 총 14개 사례로 나누어 분석하였다. 이와 같은 분석을 통해 도출된 플로팅 주거건축의 주요 건축 계획 항목은 첫째, 육상과 연결되는 진입로 및 주거단지의 공용 통로 계획, 둘째, 공동으로 사용하는 주차장, 창고 등을 포함한 각종 편의 시설과 공용 공간 계획, 셋째, 방화 및 안전 장비의 설치와 불연 재료 및 난연 재료의 사용, 단지 규모에 따른 소방 설비 계획, 넷째, 단위 모듈러 주택의 제작 장소, 운송 방법, 시공 방법 등과 같은 모듈러 건축 시스템 적용 계획으로 정리할 수 있다.

교차참조점에 기반한 정지영상의 워터마크 생성 및 유사성 삽입 기법 (A Technique of Watermark Generation and Similarity Embedding for Still Images Based on Cross Reference Points)

  • 이항찬
    • 전기학회논문지
    • /
    • 제56권8호
    • /
    • pp.1484-1490
    • /
    • 2007
  • The Cross Reference Point(CRP) is a robust method for finding salient points in watermarking systems because it is based on the geometrical structure of a normalized image in order to avoid pointing error caused by digital attacks. After normalization of an image, the 100 CRPs are calculated. Next, the 100 blocks centered by CRPS are formed. These 100 blocks are arranged using a secrete key. Each boundary of 50 out of 100 blocks is surrounded by 8 blocks which are selected by the ordered number of a preceding block. This number is a seed of random number generator for selecting 8 out of 50 blocks. The search area of a center block is formed by a secrete key. The pixels of a center block are quantized to 10 levels by predefined thresholds. The watermarks are generated by the 50 quantized center blocks. These watermarks are embedded directly in the remaining 50 blocks. In other words, 50 out of 100 blocks are utilized to generate watermarks and the remaining 50 blocks are used to watermark embedding. Because the watermarks are generated in the given images, we can successfully detect watermarks after several digital attacks. The reason is that the blocks for the generation and detection of watermarks are equally affected by digital attacks except for the case of local distortion such as cropping.