• Title/Summary/Keyword: recognition of possible problem

Search Result 126, Processing Time 0.025 seconds

A Smart Refrigerator System based on Internet of Things (IoT 기반 스마트 냉장고 시스템)

  • Kim, Hanjin;Lee, Seunggi;Kim, Won-Tae
    • Journal of IKEEE
    • /
    • v.22 no.1
    • /
    • pp.156-161
    • /
    • 2018
  • Recently, as the population rapidly increases, food shortages and waste are emerging serious problem. In order to solve this problem, various countries and enterprises are trying research and product development such as a study of consumers' purchasing patterns of food and a development of smart refrigerator using IoT technology. However, the smart refrigerators which currently sold have high price issue and another waste due to malfunction and breakage by complicated configurations. In this paper, we proposed a low-cost smart refrigerator system based on IoT for solving the problem and efficient management of ingredients. The system recognizes and registers ingredients through QR code, image recognition, and speech recognition, and can provide various services of the smart refrigerator. In order to improve an accuracy of image recognition, we used a model using a deep learning algorithm and proved that it is possible to register ingredients accurately.

A Syntactic Structure Analysis of Hangul Using the Primitive Transformation (원소 변환을 이용한 한글 패턴의 구조 분석)

  • 강현철;최동혁;이완주;박규태
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.12
    • /
    • pp.1956-1964
    • /
    • 1989
  • In this paper, a new method of Hangul recognition is proposed to solve the problems of misrecognition owing to the contacts of FCEs (Fundamental Character Elements) in a Hangul pattern. Structures of FCFs are represented with PAG(Programmed Array Grammar) to recognize an input pattern on 2-D. array of pels., and the unnecessary deformation of the conventional approach can be eliminated by using PEACE parsing which extracts primitives and computes attributes in the course of analyzing the structure of an input pattern. Also, primitive transformation at contacts can afford to confirm all the possible structures of an input pattern and solve the problem of misrecognition owing to the contacts of FCEs. The recognition rate of proposed method for printed Hangul characters shows 96.2% for 1978 Gothic-letters and 92.0% for 1920 Myng-style-letters, respectively.

  • PDF

A Study on the Learning Efficiency of Multilayered Neural Networks using Variable Slope (기울기 조정에 의한 다층 신경회로망의 학습효율 개선방법에 대한 연구)

  • 이형일;남재현;지선수
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.20 no.42
    • /
    • pp.161-169
    • /
    • 1997
  • A variety of learning methods are used for neural networks. Among them, the backpropagation algorithm is most widely used in such image processing, speech recognition, and pattern recognition. Despite its popularity for these application, its main problem is associated with the running time, namely, too much time is spent for the learning. This paper suggests a method which maximize the convergence speed of the learning. Such reduction in e learning time of the backpropagation algorithm is possible through an adaptive adjusting of the slope of the activation function depending on total errors, which is named as the variable slope algorithm. Moreover experimental results using this variable slope algorithm is compared against conventional backpropagation algorithm and other variations; which shows an improvement in the performance over pervious algorithms.

  • PDF

A Case Study on the Features of General Citizen's Scientific Participation and Action: Focus on the Case of Responding to Fine Dust Issue (일반 시민의 과학적 참여와 실천 사례 연구: 미세먼지 문제 대응 활동을 중심으로)

  • Chang, Jina;Lim, Insook;Park, Joonhyeong
    • Journal of Science Education
    • /
    • v.45 no.2
    • /
    • pp.201-218
    • /
    • 2021
  • The purpose of this study is to investigate qualitatively two cases of general citizens' scientific participation and activities responding to fine dust problem. The processes of their scientific actions were investigated and categorized inductively based on three stages: problem recognition stage, information collection and analysis stage, and sharing and spreading stage. As a result, in the 'problem recognition' stage, two participants recognized the seriousness of the fine dust problem as they felt a threat to their health and began to act practically by questioning the accuracy of public data. In the 'information collection and analysis' stage, a participant collected as much information as possible and compared them in order to obtain more accurate information for her situation. On the other hand, another participant conducted various experiments in person to get the information which is appropriate to his situation. Finally, in the 'Sharing and Spreading' stage, both participants created and shared various materials based on online environment, and continued their activities with a sense of contribution through others assistance. Educational implications are discussed in terms of civic science education and scientific literacy.

Comparative Analysis of BP and SOM for Partial Discharge Pattern Recognition (부분방전 패턴인식에 대한 BP 및 SOM 알고리즘 비교 분석)

  • Lee, Ho-Keun;Kim, Jeong-Tae;Lim, Yoon-Seok;Kim, Ji-Hong;Koo, Ja-Yoon
    • Proceedings of the KIEE Conference
    • /
    • 2004.07c
    • /
    • pp.1930-1932
    • /
    • 2004
  • SOM(Self Organizing Map) algorithm which has some advantages such as data accumulation ability and the degradation trend trace ability was compared with conventionally used BP(Back Propagation) algorithm. For the purpose, partial discharge data were acquired and analysed from the artificial defects in GIS. As a result, basically the pattern recognition rate of BP algorithm was found out to be better than that of SOM algorithm. However, SOM algorithm showed a great on-site-applicability such as ability of suggesting new-pattern-possibility. Therefore, through increasing pattern recognition rate it is possible to apply SOM algorithm to partial discharge analysis. Also, for the image processing method it is required the normalization of the PRPDA graph. However, due to the normalization both BP and SOM algorithm have shown worse results, so that it is required further study to solve the problem.

  • PDF

Difference of Recognition of Subject and Device of Improvement in Security Activity of International Conference between Security Agency and Great-Sphere Self-Governing Body (국제회의 안전활동에 있어서 공안기관과 광역지자체간의 문제인식 차이 및 제고방안 -부산 APEC 행사를 중심으로-)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.389-412
    • /
    • 2007
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference which can be held hereafter. On the basis of security activity problems originating in APEC that had been held in Pusan in 2005. I made up questions three times to on the members of the police, military, fire figher and Busan city civil servants who had participated in Busan APEC and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The study result is as follows; First, the satisfactory cooperation between security agencies and self-governing body is needed for the basis of security activity in preparatory stage. Second, examining thoroughly security activity by function in activity stage. Third, giving full play to their genius by close cooperation between security agencies and self-governing body in enfourcement stage. Fourth, provision for events after this on the basis of effective estimation system in evaluation stage.

  • PDF

Recent advances in sketch based image retrieval: a survey (스케치 기반 이미지 검색의 최신 연구 동향)

  • Sehong Oh;Ho-Sik Seok
    • Journal of IKEEE
    • /
    • v.28 no.2
    • /
    • pp.209-220
    • /
    • 2024
  • A sketch is an intuitive means to express information, but compared to actual images, it has the problem of being highly abstract, diverse, and sparse. Recent advances in deep learning models have made it possible to discover features that are common to images and sketches. In this paper, we summarize recent trends in sketch-based image retrieval (SBIR) but it is not limited to SBIR. Besides SBIR, we also introduce sketch-based image recognition and generation studies. Zero-shot learning enables models to recognize categories not encountered during training. Zero-shot SBIR methods are also discussed. Commonly used free-hand sketch datasets are summarized and retrieval performance based on these datasets is reported.

A Study of Main Contents Extraction from Web News Pages based on XPath Analysis

  • Sun, Bok-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.1-7
    • /
    • 2015
  • Although data on the internet can be used in various fields such as source of data of IR(Information Retrieval), Data mining and knowledge information servece, and contains a lot of unnecessary information. The removal of the unnecessary data is a problem to be solved prior to the study of the knowledge-based information service that is based on the data of the web page, in this paper, we solve the problem through the implementation of XTractor(XPath Extractor). Since XPath is used to navigate the attribute data and the data elements in the XML document, the XPath analysis to be carried out through the XTractor. XTractor Extracts main text by html parsing, XPath grouping and detecting the XPath contains the main data. The result, the recognition and precision rate are showed in 97.9%, 93.9%, except for a few cases in a large amount of experimental data and it was confirmed that it is possible to properly extract the main text of the news.

Design and Implementation of a Language Identification System for Handwriting Input Data (필기 입력데이터에 대한 언어식별 시스템의 설계 및 구현)

  • Lim, Chae-Gyun;Kim, Kyu-Ho;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.63-68
    • /
    • 2010
  • Recently, to accelerate the Ubiquitous generation, the input interface of the mobile machinery and tools are actively being researched. In addition with the existing interfaces such as the keyboard and curser (mouse), other subdivisions including the handwriting, voice, vision, and touch are under research for new interfaces. Especially in the case of small-sized mobile machinery and tools, there is a increasing need for an efficient input interface despite the small screens. This is because, additional installment of other devices are strictly limited due to its size. Previous studies on handwriting recognition have generally been based on either two-dimensional images or algorithms which identify handwritten data inserted through vectors. Futhermore, previous studies have only focused on how to enhance the accuracy of the handwriting recognition algorithms. However, a problem arisen is that when an actual handwriting is inserted, the user must select the classification of their characters (e.g Upper or lower case English, Hangul - Korean alphabet, numbers). To solve the given problem, the current study presents a system which distinguishes different languages by analyzing the form/shape of inserted handwritten characters. The proposed technique has treated the handwritten data as sets of vector units. By analyzing the correlation and directivity of each vector units, a more efficient language distinguishing system has been made possible.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.