• Title/Summary/Keyword: Noise Identification

Search Result 899, Processing Time 0.036 seconds

A Study on the Robust Pitch Period Detection Algorithm in Noisy Environments (소음환경에 강인한 피치주기 검출 알고리즘에 관한 연구)

  • Seo Hyun-Soo;Bae Sang-Bum;Kim Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.481-484
    • /
    • 2006
  • Pitch period detection algorithms are applied to various speech signal processing fields such as speech recognition, speaker identification, speech analysis and synthesis. Furthermore, many pitch detection algorithms of time and frequency domain have been studied until now. AMDF(average magnitude difference function) ,which is one of pitch period detection algorithms, chooses a time interval from the valley point to the valley point as the pitch period. AMDF has a fast computation capacity, but in selection of valley point to detect pitch period, complexity of the algorithm is increased. In order to apply pitch period detection algorithms to the real world, they have robust prosperities against generated noise in the subway environment etc. In this paper we proposed the modified AMDF algorithm which detects the global minimum valley point as the pitch period of speech signals and used speech signals of noisy environments as test signals.

  • PDF

A Study On The Improvement Of Vehicle Plate Recognition (차량 번호판 인식 효율 향상을 위한 연구)

  • Kong, Yong-Hae;Kwon, Chun-Ki;Kim, Myung-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1947-1954
    • /
    • 2009
  • Camera-captured car plate images contain much variation and noise and the character images in a plate are typically very small. We attempted to improve the plate identification efficiency suitable for this undesirable condition. We experimented various image preprocessing and feature extracting methods and the very effective features that can compensate one feature's limitation is determined through extensive experiments. Finally two very effective features that can complement the limitations of each other feature(classifier) are determined and the efficiency is proved by recognition experiments. This approach is very necessary when handling plate character images which are typically small, various, and noisy. Individual classification result, confidence factor, region name relation and feedback verification are comprehensively considered to enhance the overall recognition efficiency. The efficiency of our method is verified by a recognition experiment using real car plate images taken from traffic roads.

A Reliable Data Capture in Multi-Reader RFID Environments (다중 태그 인식 기반의 신뢰성 있는 데이터 수집 환경)

  • Lee, Young-Ran
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.9
    • /
    • pp.4133-4137
    • /
    • 2011
  • Reliable Multi-Reader RFID identification is one of issues in Multi-Reader RFID realization program in recent. And the Multi-Reader RFID reader has difficulty to obtain reliable data in data capture layer. The reason is that unreliable readings such as a false positive reading and a false negative reading and missed readings can happen by reader collision problems, noise, or the mobility of tagged objects. We introduce performance metrics to solve these reader problems. We propose three solutions the Minimum Overlapped Read Zone (MORZ) with Received Signal Strength Indicator (RSSI), the Spatial-Temporal Division Access (STDA) method, and double bigger size of tags attached on the object. To show the improvement of the proposed methods, we calculate tag's successful read rates in a smart office, which consists of Multi-Reader RFID systems.

A Study on an Efficient and Robust Differential Privacy Scheme Using a Tag Field in Medical Environment

  • Kim, Soon-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.109-117
    • /
    • 2019
  • Recently, the invasion of privacy in medical information has been issued following the interest in the secondary use of mass medical information. The mass medical information is very useful information that can be used in various fields such as disease research and prevention. However, due to privacy laws such as the Privacy Act and Medical Law, this information, including patients' or health professionals' personal information, is difficult to utilize as a secondary use of mass information. To do these problem, various methods such as k-anonymity, l-diversity and differential-privacy that can be utilized while protecting privacy have been developed and utilized in this field. In this paper, we discuss the differential privacy processing of the various methods that have been studied so far, and discuss the problems of differential privacy using Laplace noise and the previously proposed differential privacy. Finally, we propose a new scheme to solve the existing problem by adding a 1-bit status field to the last column of a given data set to confirm the response to queries from analysts.

Optical encryption and decryption technique using virtual image in frequency domain (가상 영상을 이용한 주파수 영역에서의 광학적 암호화 및 복호화 방법)

  • 서동환;조규보;박세준;김수중;김정우;노덕수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.3
    • /
    • pp.255-259
    • /
    • 2003
  • In this paper, we propose an improved image encryption and decryption method using a virtual image and a joint transform correlator (JTC). The encrypted image is obtained by the Fourier transform of the product of a virtual-phase image and a random-phase image, and a Fourier transform of the decrypting key generated by the proposed phase assignment rule is used as the Fourier decrypting key. Based on the solution, the original image is reconstructed using JTC in the frequency-domain. The proposed method using a virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting by unauthorized people. And also the auto-correlation terms, which are the drawback of a JTC system, contribute to reconstructing the original image rather than to disturbing its identification. But because phase-only encryptions are sensitive to noise and scratches, phase errors can be generated in fabricating the encrypted image or the Fourier decrypting key so the errors that are responsible for degradation of the quality of the reconstructed image are analyzed and the solution is demonstrated. Computer simulations show the solution, and the proposed method is very useful for JTC architecture.

Real-Time Hardware Design of Image Quality Enhancement Algorithm using Multiple Exposure Images (다중 노출 영상을 이용한 영상의 화질 개선 알고리즘의 실시간 하드웨어 설계)

  • Lee, Seungmin;Kang, Bongsoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1462-1467
    • /
    • 2018
  • A number of algorithms for improving the image quality of low light images have been studied using a single image or multiple exposure images. The low light image is low in contrast and has a large amount of noise, which limits the identification of information of the subject. This paper proposes the hardware design of algorithms that improve the quality of low light image using 2 multiple exposure images taken with a dual camera. The proposed hardware structure is designed in real time processing in a way that does not use frame memory and line memory using transfer function. The proposed hardware design has been designed using Verilog and validated in Modelsim. Finally, when the proposed algorithm is implemented on FPGA using xc7z045-2ffg900 as the target board, the maximum operating frequency is 167.617MHz. When the image size is 1920x1080, the total clock cycle time is 2,076,601 and can be processed in real time at 80.7fps.

A multi-layer approach to DN 50 electric valve fault diagnosis using shallow-deep intelligent models

  • Liu, Yong-kuo;Zhou, Wen;Ayodeji, Abiodun;Zhou, Xin-qiu;Peng, Min-jun;Chao, Nan
    • Nuclear Engineering and Technology
    • /
    • v.53 no.1
    • /
    • pp.148-163
    • /
    • 2021
  • Timely fault identification is important for safe and reliable operation of the electric valve system. Many research works have utilized different data-driven approach for fault diagnosis in complex systems. However, they do not consider specific characteristics of critical control components such as electric valves. This work presents an integrated shallow-deep fault diagnostic model, developed based on signals extracted from DN50 electric valve. First, the local optimal issue of particle swarm optimization algorithm is solved by optimizing the weight search capability, the particle speed, and position update strategy. Then, to develop a shallow diagnostic model, the modified particle swarm algorithm is combined with support vector machine to form a hybrid improved particle swarm-support vector machine (IPs-SVM). To decouple the influence of the background noise, the wavelet packet transform method is used to reconstruct the vibration signal. Thereafter, the IPs-SVM is used to classify phase imbalance and damaged valve faults, and the performance was evaluated against other models developed using the conventional SVM and particle swarm optimized SVM. Secondly, three different deep belief network (DBN) models are developed, using different acoustic signal structures: raw signal, wavelet transformed signal and time-series (sequential) signal. The models are developed to estimate internal leakage sizes in the electric valve. The predictive performance of the DBN and the evaluation results of the proposed IPs-SVM are also presented in this paper.

Development of an efficient method of radiation characteristic analysis using a portable simultaneous measurement system for neutron and gamma-ray

  • Jin, Dong-Sik;Hong, Yong-Ho;Kim, Hui-Gyeong;Kwak, Sang-Soo;Lee, Jae-Geun;Jung, Young-Suk
    • Analytical Science and Technology
    • /
    • v.35 no.2
    • /
    • pp.69-81
    • /
    • 2022
  • The method of measuring and classifying the energy category of neutrons directly using raw data acquired through a CZT detector is not satisfactory, in terms of accuracy and efficiency, because of its poor energy resolution and low measurement efficiency. Moreover, this method of measuring and analyzing the characteristics of low-energy or low-activity gamma-ray sources might be not accurate and efficient in the case of neutrons because of various factors, such as the noise of the CZT detector itself and the influence of environmental radiation. We have therefore developed an efficient method of analyzing radiation characteristics using a neutron and gamma-ray analysis algorithm for the rapid and clear identification of the type, energy, and radioactivity of gamma-ray sources as well as the detection and classification of the energy category (fast or thermal neutrons) of neutron sources, employing raw data acquired through a CZT detector. The neutron analysis algorithm is based on the fact that in the energy-spectrum channel of 558.6 keV emitted in the nuclear reaction 113Cd + 1n → 114Cd + in the CZT detector, there is a notable difference in detection information between a CZT detector without a PE modulator and a CZT detector with a PE modulator, but there is no significant difference between the two detectors in other energy-spectrum channels. In addition, the gamma-ray analysis algorithm uses the difference in the detection information of the CZT detector between the unique characteristic energy-spectrum channel of a gamma-ray source and other channels. This efficient method of analyzing radiation characteristics is expected to be useful for the rapid radiation detection and accurate information collection on radiation sources, which are required to minimize radiation damage and manage accidents in national disaster situations, such as large-scale radioactivity leak accidents at nuclear power plants or nuclear material handling facilities.

The first attempt of utilization of a wideband autonomous acoustic system and its general knowledge on analyzing the wideband acoustic data (광대역 자율 음향 시스템의 국내 최초 활용 시도와 광대역 음향 데이터 분석 방안)

  • KANG, Myounghee;CHO, Youn-Hyoung;LA, Hyoung sul;SON, Wuju;YUN, Hyeju;ADRIANUS, Aldwin;AN, Young-Su
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.58 no.2
    • /
    • pp.130-140
    • /
    • 2022
  • Recently, wideband acoustic technology has been introduced and started to be used in fisheries acoustic surveys in various waters worldwide. Wideband acoustic data provides high vertical resolution, high signal-to-noise ratio and continuous frequency characteristics over a wide frequency range for species identification. In this study, the main characteristics of wideband acoustic systems were elaborated, and a general methodology for wideband acoustic data analysis was presented using data collected in frequency modulation mode for the first time in Republic of Korea. In particular, this study described the data recording method using the mission planner of the wideband autonomous acoustic system, wideband acoustic data signal processing, calibration and the wideband frequency response graph. Since wideband acoustic systems are currently installed on many training and research vessels, it is expected that the results of this study can be used as basic knowledge for fisheries acoustic research using the state-of-the-art system.

Study on Robust Differential Privacy Using Secret Sharing Scheme (비밀 분산 기법을 이용한 강건한 디퍼렌셜 프라이버시 개선 방안에 관한 연구)

  • Kim, Cheoljung;Yeo, Kwangsoo;Kim, Soonseok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.311-319
    • /
    • 2017
  • Recently invasion of privacy problem in medical information have been issued following the interest in secondary use of large medical information. These large medical information is very useful information that can be used in various fields such as disease research and prevention. However, due to the privacy laws such as Privacy Act and Medical Law, these informations including patients or health professionals' personal information are difficult to utilize secondary. Accordingly, various methods such as k-anonymity, l-diversity and differential-privacy that can be utilized while protecting privacy have been developed and utilized in this field. In this paper, we study differential privacy processing procedure, one of various methods, and find out about the differential privacy problem using Laplace noise. Finally, we propose a new method using the Shamir's secret sharing method and symemetric key encryption algorithm such as AES for this problem.