• Title/Summary/Keyword: computer-based technology

Search Result 8,875, Processing Time 0.036 seconds

Comparison of Computer and Human Face Recognition According to Facial Components

  • Nam, Hyun-Ha;Kang, Byung-Jun;Park, Kang-Ryoung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.40-50
    • /
    • 2012
  • Face recognition is a biometric technology used to identify individuals based on facial feature information. Previous studies of face recognition used features including the eye, mouth and nose; however, there have been few studies on the effects of using other facial components, such as the eyebrows and chin, on recognition performance. We measured the recognition accuracy affected by these facial components, and compared the differences between computer-based and human-based facial recognition methods. This research is novel in the following four ways compared to previous works. First, we measured the effect of components such as the eyebrows and chin. And the accuracy of computer-based face recognition was compared to human-based face recognition according to facial components. Second, for computer-based recognition, facial components were automatically detected using the Adaboost algorithm and active appearance model (AAM), and user authentication was achieved with the face recognition algorithm based on principal component analysis (PCA). Third, we experimentally proved that the number of facial features (when including eyebrows, eye, nose, mouth, and chin) had a greater impact on the accuracy of human-based face recognition, but consistent inclusion of some feature such as chin area had more influence on the accuracy of computer-based face recognition because a computer uses the pixel values of facial images in classifying faces. Fourth, we experimentally proved that the eyebrow feature enhanced the accuracy of computer-based face recognition. However, the problem of occlusion by hair should be solved in order to use the eyebrow feature for face recognition.

Applications of 5G and 6G in Smart Health Services

  • Al-Jawad, Fatimah;Alessa, Raghad;Alhammad, Sukainah;Ali, Batoola;Al-Qanbar, Majd;Rahman, Atta-ur
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.173-182
    • /
    • 2022
  • Healthcare organizations are overwhelmingly embracing smart value-based care strategies, which focuses on providing superior treatment at a significantly lower cost and quality of service (QoS). For these purposes, fifth generation (5G) of mobile service provides an innumerable improvement that clearly outperforms previous generations e.g., 3G and 4G. However, as with most advancements, 5G is projected to introduce new challenges, prompting the community to think about what comes next. This research was conducted to examine the most recent smart 5G technology applications and the solutions they provide to the healthcare industry. Finally, the paper discusses how the upcoming 6G technology has the potential to transform the future of healthcare sector even beyond the current 5G systems.

A Review of Structural Testing Methods for ASIC based AI Accelerators

  • Umair, Saeed;Irfan Ali, Tunio;Majid, Hussain;Fayaz Ahmed, Memon;Ayaz Ahmed, Hoshu;Ghulam, Hussain
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.103-111
    • /
    • 2023
  • Implementing conventional DFT solution for arrays of DNN accelerators having large number of processing elements (PEs), without considering architectural characteristics of PEs may incur overwhelming test overheads. Recent DFT based techniques have utilized the homogeneity and dataflow of arrays at PE-level and Core-level for obtaining reduction in; test pattern volume, test time, test power and ATPG runtime. This paper reviews these contemporary test solutions for ASIC based DNN accelerators. Mainly, the proposed test architectures, pattern application method with their objectives are reviewed. It is observed that exploitation of architectural characteristic such as homogeneity and dataflow of PEs/ arrays results in reduced test overheads.

Appearance-based Robot Visual Servo via a Wavelet Neural Network

  • Zhao, Qingjie;Sun, Zengqi;Sun, Fuchun;Zhu, Jihong
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.4
    • /
    • pp.607-612
    • /
    • 2008
  • This paper proposes a robot visual servo approach based on image appearance and a wavelet function neural network. The inputs of the wavelet neural network are changes of image features or the elements of image appearance vector, and the outputs are changes of robot joint angles. Image appearance vector is calculated by using eigen subspace transform algorithm. The proposed approach does not need a priori knowledge of the robot kinematics, hand-eye geometry and camera models. The experiment results on a real robot system show that the proposed method is practical and simple.

CRF Based Intrusion Detection System using Genetic Search Feature Selection for NSSA

  • Azhagiri M;Rajesh A;Rajesh P;Gowtham Sethupathi M
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.131-140
    • /
    • 2023
  • Network security situational awareness systems helps in better managing the security concerns of a network, by monitoring for any anomalies in the network connections and recommending remedial actions upon detecting an attack. An Intrusion Detection System helps in identifying the security concerns of a network, by monitoring for any anomalies in the network connections. We have proposed a CRF based IDS system using genetic search feature selection algorithm for network security situational awareness to detect any anomalies in the network. The conditional random fields being discriminative models are capable of directly modeling the conditional probabilities rather than joint probabilities there by achieving better classification accuracy. The genetic search feature selection algorithm is capable of identifying the optimal subset among the features based on the best population of features associated with the target class. The proposed system, when trained and tested on the bench mark NSL-KDD dataset exhibited higher accuracy in identifying an attack and also classifying the attack category.

Technology Trends for Motion Synthesis and Control of 3D Character

  • Choi, Jong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.19-26
    • /
    • 2019
  • In this study, we study the development and control of motion of 3D character animation and discuss the development direction of technology. Character animation has been developed as a data-based method and a physics-based method. The animation generation technique based on the keyframe method has been made possible by the development of the hardware technology, and the motion capture device has been used. Various techniques for effectively editing the motion data have appeared. At the same time, animation techniques based on physics have emerged, which realistically generate the motion of the character by physically optimized numerical computation. Recently, animation techniques using machine learning have shown new possibilities for creating characters that can be controlled by the user in real time and are expected to be developed in the future.

Explicit Dynamic Coordination Reinforcement Learning Based on Utility

  • Si, Huaiwei;Tan, Guozhen;Yuan, Yifu;peng, Yanfei;Li, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.792-812
    • /
    • 2022
  • Multi-agent systems often need to achieve the goal of learning more effectively for a task through coordination. Although the introduction of deep learning has addressed the state space problems, multi-agent learning remains infeasible because of the joint action spaces. Large-scale joint action spaces can be sparse according to implicit or explicit coordination structure, which can ensure reasonable coordination action through the coordination structure. In general, the multi-agent system is dynamic, which makes the relations among agents and the coordination structure are dynamic. Therefore, the explicit coordination structure can better represent the coordinative relationship among agents and achieve better coordination between agents. Inspired by the maximization of social group utility, we dynamically construct a factor graph as an explicit coordination structure to express the coordinative relationship according to the utility among agents and estimate the joint action values based on the local utility transfer among factor graphs. We present the application of such techniques in the scenario of multiple intelligent vehicle systems, where state space and action space are a problem and have too many interactions among agents. The results on the multiple intelligent vehicle systems demonstrate the efficiency and effectiveness of our proposed methods.

An idle time-based link adaptation algorithm for IEEE 802.11 WLANs (IEEE 802.11 무선 랜 환경에서 Idle time 기반의 링크 적응기술에 관한 연구)

  • Lee You-Sung;Kim Hyo-Gon;Choi Kyu-Young;Yoon Jong-Won;Kang In-Hye
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1283-1286
    • /
    • 2006
  • 본 논문에서는 관찰된 채널의 유휴 시간을 이용하여, ACK(Acknowledgement) 기반의 링크 적응 기술의 단점을 극복하는 새로운 알고리즘인 COLA 를 제안한다. COLA 는 광범위한 채널과 부하 상황에서 최적의 성능을 얻으며 RTS/CTS 메커니즘이나 하드웨어를 이용한 채널 SNR 측정과 같은 추가적인 옵션 혹은 별도의 프로토콜 메커니즘의 지원이 필요하지 않다. 또한 COLA 알고리즘은 단지 짧은 10 개의 critical 한 명령어를 사용함으로써 부하를 줄이며, 실제 동작 시 수반되는 heuristic 한 매개변수로부터 자유롭고, 따라서 실제 사용 시 장점을 가진다.

  • PDF

Social aspects of computer based mathematics learning (컴퓨터를 활용한 수학학습에서의 사회적 측면)

  • 류희찬;권성룡
    • Journal of Educational Research in Mathematics
    • /
    • v.9 no.1
    • /
    • pp.263-278
    • /
    • 1999
  • Computer with various powerful functions has profound potential for mathematics instruction and learning. As computer technology progress, its applicability to mathematics education become more comprehensive. Not only its functional development but various psychological positions also changed the way computer technology utilized in mathematics education. In behaviorist's perspective, computer viewed as a teaching machine and constructivist viewed computer as microworld where students could explore various mathematical contents. Both theoretical positions emphasized individual aspect of learning because behaviorist tried to individualize learning using computer and constructivist focused on the process of individual construction. But learning is not only a individual event but also a social event. Therefore we must take social aspect into account. This is especially important when it comes to computer based learning. So far, mathematics loaming with computer weighed individual aspect of loaming. Even in microworld environment, learning should be mediated by teacher and collaborative learning activities. In this aspect, the roles of teacher and peers are very important and socio-cultural perspective sheds light on the computer based learning. In socio-cultural perspective, the idea of scaffold is very important in learning and students gradually internalize the social dimension and scaffolding is gradually faded. And in the zone of proximal development, teacher and more competent peers guide students to formulate their own understanding. In sum, we must take following points into account. First of all, computer should not be viewed as a medium for individualized teaming. That is, interaction with computer should be catalyst for collaborative activities with peers. So, exploration in computer environment has to be followed by small group activities including small group discussion. Secondly, regardless of the role that computer would play, teacher should play a crucial role in computer based learning. This does not mean teacher should direct every steps in learning process. Teacher's intervention should help student construct actively. Thirdly, it is needed to conceptualize computer in learning situation as medium. This would affect learning situation and result in the change of pre-service and in-service teacher training. Computer to be used effectively in mathematics classroom, researches on assessment of computer based learning are needed.

  • PDF