• 제목/요약/키워드: electronic identification system

검색결과 414건 처리시간 0.026초

Fuzzy Relation-Based Fuzzy Neural-Networks Using a Hybrid Identification Algorithm

  • Park, Ho-Seung;Oh, Sung-Kwun
    • International Journal of Control, Automation, and Systems
    • /
    • 제1권3호
    • /
    • pp.289-300
    • /
    • 2003
  • In this paper, we introduce an identification method in Fuzzy Relation-based Fuzzy Neural Networks (FRFNN) through a hybrid identification algorithm. The proposed FRFNN modeling implement system structure and parameter identification in the efficient form of "If...., then... " statements, and exploit the theory of system optimization and fuzzy rules. The FRFNN modeling and identification environment realizes parameter identification through a synergistic usage of genetic optimization and complex search method. The hybrid identification algorithm is carried out by combining both genetic optimization and the improved complex method in order to guarantee both global optimization and local convergence. An aggregate objective function with a weighting factor is introduced to achieve a sound balance between approximation and generalization of the model. The proposed model is experimented with using two nonlinear data. The obtained experimental results reveal that the proposed networks exhibit high accuracy and generalization capabilities in comparison to other models.er models.

얼굴과 발걸음을 결합한 인식 (Fusion algorithm for Integrated Face and Gait Identification)

  • Nizami, Imran Fareed;Hong, Sug-Jun;Lee, Hee-Sung;Ann, Toh-Kar;Kim, Eun-Tai;Park, Mig-Non
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국지능시스템학회 2007년도 추계학술대회 학술발표 논문집
    • /
    • pp.15-18
    • /
    • 2007
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e. both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion is considered at decision level. The proposed algorithm is tested on the NLPR database.

  • PDF

HCM을 이용한 퍼지 모델의 On-Line 동정 (On-line Identification of fuzzy model using HCM algorithm)

  • 박호성;박병준;오성권
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1999년도 하계학술대회 논문집 G
    • /
    • pp.2929-2931
    • /
    • 1999
  • In this paper, an adaptive fuzzy inference and HCM(Hard C-Means) clustering method are used for on-line fuzzy modeling of nonlinear and complex system. Here HCM clustering method is utilized for determining the initial parameter of membership function of fuzzy premise rules and also avoiding overflow phenomenon during the identification of consequence parameters. To obtain the on-line model structure of fuzzy systems. we use the recursive least square method for the consequent parameter identification. And the proposed on-line identification algorithm is carried out and is evaluated for sewage treatment process system.

  • PDF

Time Domain Identification of an Interval System and Some Extremal Properties

  • Youngtae Woo;Taeshin Cho;Park, Sunwook;Kim, Youngchol
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1998년도 제13차 학술회의논문집
    • /
    • pp.123-128
    • /
    • 1998
  • This paper presents time domain identification of an interval system. We conjectured that Markov parameters (Pulse Responses) from Kharitonov plants would envelope those of the whole interval system. The examination on interrelations between Markov parameters from Kharitonov plants of an interval system and those of the whole interval system determines the validity of the conjecture and is used to give some extremal properties of Markov parameters. The results of this paper are shown in simulations on MBC500 Magnetic Bearing System and a given interval system.

  • PDF

Nonlinear Identification of Electronic Brake Pedal Behavior Using Hybrid GMDH and Genetic Algorithm in Brake-By-Wire System

  • Bae, Junhyung;Lee, Seonghun;Shin, Dong-Hwan;Hong, Jaeseung;Lee, Jaeseong;Kim, Jong-Hae
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권3호
    • /
    • pp.1292-1298
    • /
    • 2017
  • In this paper, we represent a nonlinear identification of electronic brake pedal behavior in the brake-by-wire (BBW) system based on hybrid group method of data handling (GMDH) and genetic algorithm (GA). A GMDH is a kind of multi-layer network with a structure that is determined through training and which can express nonlinear dynamics as a mathematical model. The GA is used in the GMDH, enabling each neuron to search for its optimal set of connections with the preceding layer. The results obtained with this hybrid approach were compared with different nonlinear system identification methods. The experimental results showed that the hybrid approach performs better than the other methods in terms of root mean square error (RMSE) and correlation coefficients. The hybrid GMDH/GA approach was effective for modeling and predicting the brake pedal system under random braking conditions.

가축의 사양관리 자동화를 위한 전자 개체인식장치의 신호전송에 관한 연구 (A Study on the Signal Transmission of Electronic Identification System for Automatic Breeding Management of Domestic Animals)

  • 한병성
    • Journal of Biosystems Engineering
    • /
    • 제24권1호
    • /
    • pp.75-80
    • /
    • 1999
  • Signal separation and transmission are essential for automatic breeding management of domestic animals. Electronic identification system could transmit the signal of an individual within a defined range to a personal computer by an electromagnetic signal recognition method. Signals for individual recognition were originated by controlling 12 tri-state pins of IC(PT2262) in a transmitter. PT 2262 can generate 4,096 codes. These encoded signals were modulated and transmitted with wireless lines from the transmitter. Then they were demodulated in a receiver, and the signals were transmitted to the micro-processor through an interface and were identified in a PC.

  • PDF

전자연동장치의 안전성 활동에 관한 연구(I) (A Study On Hazards Identification Of Programmable Electronic Interlocking System For Safety Activity)

  • 박재영;이종우
    • 대한전기학회논문지:전기기기및에너지변환시스템부문B
    • /
    • 제55권12호
    • /
    • pp.661-666
    • /
    • 2006
  • Interlocking signalling system plays key role as core system to manage railway operation. The core role of railway operation is to control routing, displaying signal and regulation for train. Interlocking system relate tightly to railway accident because collision and derailment is sometime taken place wrong route setting and signal displaying. Safety activity for interlocking system is inevitable to avoid the accident over its life cycle. The safety activity includes hazard identification and analysis, safety requirement allocation, safety plan, safety activity and ao on. The safety activity need a broad wide range work. In this paper, we concentrate on hazard identification for generic interlocking system and programmable electronic interlocking system and compare between two results. The hazards will be used for safety activity.

XTR 버전의 개인식별 프로토콜을 이용해 블랙메일링을 막는 실질적인 방법 (A Practical Approach Defeating Blackmailing XTR-version Identification protocol)

  • 한동국;박혜영;박영호;김창한;임종인
    • 정보보호학회논문지
    • /
    • 제12권1호
    • /
    • pp.55-66
    • /
    • 2002
  • 블라인드 서명을 기반으로 만든 전자화폐 시스템이 David clam에 의하여 처음으로 제안되었다. 그러나 vain Solms과 Naccache는 블라인딩된 화폐는 블랙메일링 공격을 쉽게 허용한다는 것을 발견했다. 본 논문에서는 XTR을 이용해 Schnorr 개인식별 프로토콜을 구성하여 블랙메일링 공격이 있을 경우에 은행에게 블랙메일링 공격에 대한 정보를 개인식별 과정에서 알려주는 방법을 제안한다. 일반적으로 전자화폐가 가지는 여러 가지 문제점 중에서 블랙메일링이 가장 심각하다. 특히 고객을 납치한 상태에서의 블랙메일링은 전자화폐 시스템에 치명적인 결과를 가져오게 된다. 그러나 본 논문에서 제안한 XTR 버전의 Schnorr 개인식별 프로토콜을 사용하면 기존의 방법들이 블랙메일링 공격을 막기 위해 필요로 하는 가정들을 사용하지 않고도 효과적으로 블랙메일링 공격을 막을 수 있는 실질적인 방법이 된다.

Wavelet Neural Network Based Indirect Adaptive Control of Chaotic Nonlinear Systems

  • Choi, Yoon-Ho;Choi, Jong-Tae;Park, Jin-Bae
    • 한국지능시스템학회논문지
    • /
    • 제14권1호
    • /
    • pp.118-124
    • /
    • 2004
  • In this paper, we present a indirect adaptive control method using a wavelet neural network (WNN) for the control of chaotic nonlinear systems without precise mathematical models. The proposed indirect adaptive control method includes the off-line identification and on-line control procedure for chaotic nonlinear systems. In the off-line identification procedure, the WNN based identification model identifies the chaotic nonlinear system by using the serial-parallel identification structure and is trained by the gradient-descent method. And, in the on-line control procedure, a WNN controller is designed by using the off-line identification model and is trained by the error back-propagation algorithm. Finally, the effectiveness and feasibility of the proposed control method is demonstrated with applications to the chaotic nonlinear systems.

Optical Encryption System using a Computer Generated Hologram

  • Kim, Jong-Yun;Park, Se-Joon;Kim, Soo-Joong;Doh, Yang-Hoi;Kim, Cheol-Su
    • Journal of the Optical Society of Korea
    • /
    • 제4권1호
    • /
    • pp.19-22
    • /
    • 2000
  • A new image encoding and identification scheme is proposed for security verification by us-ing a CGH(computer generated hologram), random phase mask, and a correlation technique. The encrypted image, which is attached to the security product, is made by multiplying a QP- CGH(quadratic phase CGI) with a random phase function. The random phase function plays a key role when the encrypted image is decrypted. The encrypted image can be optically recovered by a 2-f imaging system and automatically verified for personal identification by a 4-f correlation system. Simulation results show the proposed method can be used for both the reconstruction of an original image and the recognition of an encrypted image.