• Title/Summary/Keyword: 구조적판별

Search Result 348, Processing Time 0.03 seconds

Recognition method using stereo images-based 3D information for improvement of face recognition (얼굴인식의 향상을 위한 스테레오 영상기반의 3차원 정보를 이용한 인식)

  • Park Chang-Han;Paik Joon-Ki
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.3 s.309
    • /
    • pp.30-38
    • /
    • 2006
  • In this paper, we improved to drops recognition rate according to distance using distance and depth information with 3D from stereo face images. A monocular face image has problem to drops recognition rate by uncertainty information such as distance of an object, size, moving, rotation, and depth. Also, if image information was not acquired such as rotation, illumination, and pose change for recognition, it has a very many fault. So, we wish to solve such problem. Proposed method consists of an eyes detection algorithm, analysis a pose of face, md principal component analysis (PCA). We also convert the YCbCr space from the RGB for detect with fast face in a limited region. We create multi-layered relative intensity map in face candidate region and decide whether it is face from facial geometry. It can acquire the depth information of distance, eyes, and mouth in stereo face images. Proposed method detects face according to scale, moving, and rotation by using distance and depth. We train by using PCA the detected left face and estimated direction difference. Simulation results with face recognition rate of 95.83% (100cm) in the front and 98.3% with the pose change were obtained successfully. Therefore, proposed method can be used to obtain high recognition rate with an appropriate scaling and pose change according to the distance.

ICT inspection System for Flexible PCB using Pin-driver and Ground Guarding Method (핀 드라이버와 접지가딩 기법을 적용한 모바일 디스플레이용 연성회로기판의 ICT검사 시스템)

  • Han, Joo-Dong;Choi, Kyung-Jin;Lee, Young-Hyun;Kim, Dong-Han
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.6
    • /
    • pp.97-104
    • /
    • 2010
  • In this paper, ICT (in circuit tester) inspection system and inspection algorithm is proposed and detects whether inferiority exists or not in the mounted device on the flexible PCB in cell phones or mobile display devices. The system is composed of PD (pin-driver) and GGM (ground guarding method). The structural characteristics of these flexible PCB are analyzed, which is needed to input or output the test signal. Test signal to investigate the characteristics of passive components is generated using modified circuit diagram and proposed inspection algorithm. PM (pin-map) is decided on the basis of circuit diagram and has the information about the kind of test signal to be applied and the pad number for the test signal to be connected. PD is designed to load a proper test signal for a specific pad and is adjusted according to PM so that the reconstructed circuit has minimum node and mash. The proposed ICT inspection system is realized using PD and GGM. Using the system, an experiment for each passive component is done to investigate the measurement accuracy of the developed system and an experiment for real flexible PCB model is done to verity the effectiveness of the system.

PCA 알고리즘과 개선된 퍼지 신경망을 이용한 여권 인식 및 얼굴 인증

  • Jung Byung-Hee;Park Choong-Shik;Kim Kwang-Baek
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2006.06a
    • /
    • pp.336-343
    • /
    • 2006
  • 본 논문에서는 여권 영 상에서 PCA 알고리즘을 이용한 얼굴 인증과 개선된 퍼지 신경망을 이용한 여권 코드 인식 방법을 제안한다. 본 논문에서는 여권영상에 대해 소벨 연산자를 이용하여 에지를 추출하고 에지가 추출된 영상을 수평 스미어링하여 여권코드 영역을 추출한다. 추출된 여권 코드 영역의 기울기를 검사하여 기울기 보정을 하고, 여권 코드 영역을 이진화 한다. 이진화된 여권 코드 영역에 대하여 8방향윤곽선 추적 알고리즘을 적용하여 여권 코드를 추출한다. 추출된 여권 코드는 퍼지 신경망을 개선하여 여권 코드 인식에 적용한다. 개선된 퍼지 신경 망은 입력층과 중간층 사이의 학습 구조로는 FCM 클러스터링 알고리즘을 적용하고 중간층과 출력층 사이의 학습은 일반화된 델타학습 방법을 적용한다. 그리고 학습 성능을 개선하기 위하여 중간층과 출력층의 가중치 조정에 적용되는 학습률을 동적으로 조정하기 위해 퍼지 제어 시스템을 적용한다. 제안된 퍼지 신경망은 목표값과 출력값의 차이에 대한 절대값이 ${\epsilon}$ 보다 적거나 같으면 정확으로 분류하고 크면 부정확으로 분류하여 정확의 총 개수를 퍼지 제어 시스템에 적용하여 학습률과 모멘텀을 동적으로 조정한다. 여권의 주어진 규격에 근거하여 사진 영역을 추출하고 추출된 사진 영역에 대하여 YCbCr와 RGB 정보를 이용하여 얼굴영역을 추출한다. 추출된 얼굴 영역을 PCA 알고리즘과 스냅샷(Snap-Shot) 방법을 적용하여 얼굴 영역의 위조를 판별한다. 제안된 방법의 여권 코드 인식과 얼굴 인증의 성능을 평가하기 위하여 실제 여권 영상에 적용한 결과, 기존의 방법보다 여권 코드 인식과 얼굴 인증에 있어서 효율적인 것을 확인하였다.s, whereas AVs provide much better security.크는 기준년도부터 2031년까지 5년 단위로 계획된 장래도로를 반영하여 구축된다. 교통주제도 및 교통분석용 네트워크는 국가교통DB구축사업을 통해 구축된 자료로서 교통체계효율화법 제9조의4에 따라 공공기관이 교통정책 및 계획수립 등에 활용할 수 있도록 제공하고 있다. 건설교통부의 승인절차를 거쳐 제공하며 활용 후에는 갱신자료 및 활용결과를 통보하는 과정을 거치도록 되어있다. 교통주제도는 국가의 교통정책결정과 관련분야의 기초자료로서 다양하게 활용되고 있으며, 특히 ITS 노드/링크 기본지도로 활용되는 등 교통 분야의 중요한 지리정보로서 구축되고 있다..20{\pm}0.37L$, 72시간에 $1.33{\pm}0.33L$로 유의한 차이를 보였으므로(F=6.153, P=0.004), 술 후 폐환기능 회복에 효과가 있다. 4) 실험군과 대조군의 수술 후 노력성 폐활량은 수술 후 72시간에서 실험군이 $1.90{\pm}0.61L$, 대조군이 $1.51{\pm}0.38L$로 유의한 차이를 보였다(t=2.620, P=0.013). 5) 실험군과 대조군의 수술 후 일초 노력성 호기량은 수술 후 24시간에서 $1.33{\pm}0.56L,\;1.00{\ge}0.28L$로 유의한 차이를 보였고(t=2.530, P=0.017), 술 후 72시간에서 $1.72{\pm}0.65L,\;1.33{\pm}0.3L$로 유의한 차이를 보였다(t=2.540, P=0.016). 6) 대상자의 술 후 폐환기능에 영향을 미치는 요인은 성별로 나타났다. 이에 따

  • PDF

Hardware Implementation of Real-Time Blind Watermarking by Substituting Bitplanes of Wavelet DC Coefficients (웨이블릿 DC 계수의 비트평면 치환방법에 의한 실시간 블라인드 워터마킹 및 하드웨어 구현)

  • 서영호;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.398-407
    • /
    • 2004
  • In this paper, a blind watermarking method which is suitable to the video compression using 2-D discrete wavelet transform was proposed and implemented into the hardware using VHDL(VHSIC Hardware Description Language). The goal of the proposed watermarking algorithm is the authentication about the manipulation of the watermark embedded image and the detection of the error positions. Considering the compressed video image, the proposed watermarking scheme is unrelated to the quantization and is able to concurrently embed or extract the watermark. We experimentally verified that the lowest frequency subband(LL4) is not sensitive to the change in the spatial domain, so LL4 subband was selected for the mark space. And the combination of the bitplanes which has the properties of both the minimum degradation of the image and the robustness was chosen as the embedded Point in the mark space in LL4 subband. Since we know the watermark embedded positions and the watermark is embedded by not varying the value but changing the value, the watermark can be extracted without the original image. Also, for the security when exposing the watermark embedded position, we embed the encrypted watermark by the block cipher. The proposed watermark algorithm shows the robustness against the general image manipulation and is easily transplanted into the image or video compressor with the minimal changing in the structure. The designed hardware has 4037 LABs(24%) and 85 ESBs(3%) in APEX20KC EP20K400CF672C7 FPGA of Altera and stably operates in 82MHz clock frequency.

Petrology of the Cretaceous Igneous Rocks in the Mt. Baegyang Area, Busan (부산 백양산 지역의 백악기 화산-심성암류에 대한 암석학적 연구)

  • 김향수;고정선;윤성효
    • The Journal of the Petrological Society of Korea
    • /
    • v.12 no.1
    • /
    • pp.32-52
    • /
    • 2003
  • The Mt. Baegyang in Busan, composed of sedimentary basement rocks (Icheonri Formation), andesite (lava), andesitic pyroclastic rocks, fallout tuff and tuffaceous sedimentary rocks, rhyolitic pyroclastic rocks, intrusive rocks (granite-porphyry, felsite, and biotite-granite) of Cretaceous age in ascending order. The volcanic rocks show a section of composite volcano which comprised alternation of andesitic lava and pyroclasitc rocks, rhyolitic pyrocalstic rocks (tuff breccia, lapilli tuff, fine tuff) from the lower to the upper strata. From the major element chemical analysis, the volcanic and intrusive rocks belong to calc-alkaline rock series. The trace element composition and REE patterns of volcanic and plutonic rocks, which are characterized by a high LILE/HFSE ratio and enrichments in LREE, suggest that they are typical of continental margin arc calc-alkaline rocks produced in the subduction environment. Primary basaltic magma might have been derived from partial melting of mantle wedge in the upper mantle under destructive plate margin. Crystallization differentiation of the basaltic magma would have produced the calc-alkaline andesitic magma. And the felsic rhyolitic magma seems to have been evolved from andesitic magma with crystallization differentiation of plagioclase, pyroxene, and hornblende.

A Method of Inspecting ITO Pattern and Node Using Measured Data of Each Node's Mutual Capacitance ITO Sensor (상호 유도 정전하 방식 ITO 센서의 노드별 측정 데이터를 이용한 ITO패턴과 노드 검사 방법)

  • Han, Joo-Dong;Moon, Byoung-Joon;Choi, Kyung-Jin;Kim, Dong-Han
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.230-238
    • /
    • 2014
  • In this paper, we propose the possible way of accurate analysis and examination of ITO sensor to discriminate whether mutual capacitance ITO sensor is defective by using mutual capacitance of data in each node which consists of electrodes inside of ITO sensor. We have analyzed the structure characteristic of mutual capacitance ITO sensor which is used as an input device for not only small size electronics like mobile phone and tablets but also big size electronics and designed the circuit to inspect ITO sensor using touch screen panel IC. Set a variable related with mutual capacitance of charge and discharge and Implement to find and analyze accurate position when defect is made through the data from each node of ITO sensor. First, we can set a yield effective range through the first experiment data of mutual capacitance ITO sensor and by using the data of each node of ITO sensor which is the result from the second experiment, we can verify accuracy and effectiveness of effective range from the first experiment as a sample which is used in this experiment.

Mediating Effects of Perceived Risk and Usefulness between Online Information Credibility and Intention to Use (온라인 정보의 신뢰성 및 정보 활용의도 사이의 지각된 위험과 유용성의 매개효과에 관한 연구)

  • Sun, Jonghak;Yoon, Jung-Hyeon
    • Management & Information Systems Review
    • /
    • v.33 no.4
    • /
    • pp.99-118
    • /
    • 2014
  • Using the theory of attribution, this study investigates the determinants if controllability and explores underlying dimensions of online information credibility, and then investigates if the credibility of online information influences the users' intention to use the online information for evaluating or judging the involved products. Moreover, as a research attempt to investigate the impacts of online information credibility, this study examines whether the main effect of perceived online information credibility on the intention of using online information to make a decision of purchase is mediated by both perceived risk and perceived usefulness. A total of 287 survey forms were collected from online consumers. We examined reliability by exploring internal consistency of the multiple item scales in the overall sample. Convergent and discriminant validity were also examined for evidence of construct validity. Then, PLS technique was employed to test the research model. As a result of analyzing data from a dataset of 287 responses via PLS technique, it is found that (1) both sources (controllability and stability) of perceived credibility are significantly associated with both perceived risk and perceived usefulness, and (2) perceived risk as well as perceived usefulness partially mediate the link between the two sources of credibility and intention to use. The findings of this study also suggest that the two dimensions of online information credibility influence information recipient's intention to use. Moreover, the online information including descriptions about controllability and stability can trigger potential consumers to perceive risk about consumption of the informed products and services. Therefore, providing online information with highly described controllability and stability can increase not only the credibility of the online information itself, but also the intention to use the online information through perceived risk and usefulness.

  • PDF

Wideband 6-port Phase Correlator Using Caxial Cable Impedance Transformer and Wireline Coupler (동축선 임피던스 변환기와 Wireline Coupler를 이용한 광대역 6-단자 위상 상관기)

  • Park, Ung-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1188-1195
    • /
    • 2022
  • The 6-port phase correlator consists of one in-phase power divider and three 3-dB 90-degree phase difference power dividers, and is mainly used in a demodulation circuit that determines the phase of an input signal. This paper proposes the wideband 6-port phase correlator that consists of an in-phase power divider using a wideband 2:1 impedance transformer with three 37.5-Ω coaxial cables, and a 3-dB 90-degree phase difference power divide using Wireline. The proposed wideband phase correlator fabricated at a center frequency of 1000MHz has the value of the input reflection coefficient(S11 and S22) -14dB or less in the frequency range of 640~1270MHz. Also, the signal transmission characteristic(Si1), from the in-phase power divider input port to four output ports, has the amplitude of -6.5±0.6dB and the phase error of within ±3.4°, and the signal transmission characteristic(Si2), from the 90 degree phase difference power divider input port to four output ports, has the amplitude of -6.1±0.6dB and the phase error of within ±6.2°.

Analysis of the integral fuel tank considering hygrothermal enviornmental factors (열습도 환경요소를 고려한 일체형 복합재 연료탱크의 해석)

  • Moon, Jin-Bum;Kim, Soo-Hyun;Kim, Chun-Gon
    • Composites Research
    • /
    • v.20 no.5
    • /
    • pp.64-69
    • /
    • 2007
  • Matrix dominant properties of composites are largely degraded under harmful environments such as temperature and humidity. Therefore we should consider the harmful environmental factors in the design of an UAV integral fuel tank subjected to high temperature and high humidity. The harmful environment experiment was performed for carbon/epoxy composites made of a unidirectional prepreg USN175B, and a plain woven fabric prepreg WSN3. The immersion experiment was performed under $90^{\circ}C$. The specimens were tested when the weight gam of specimen was saturated. The specimens were tested under $74^{\circ}C$ to obtain tensile and inplane shear properties. The results showed that the matrix dominant properties were extremely degraded by hygrothermal environment. To consider the variability of load, the anti-optimization method was applied. By using this method, the worst load case was found by comparing the load convex model and stability boundary. The stability boundary was obtained by analysis of the integral wing fuel tank of UAV using degraded properties. To do this, it was known that the worst load case of the integral wing fuel tank was the hovering mode load case.

Violation Detection of Application Network QoS using Ontology in SDN Environment (SDN 환경에서 온톨로지를 활용한 애플리케이션 네트워크의 품질 위반상황 식별 방법)

  • Hwang, Jeseung;Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.7-20
    • /
    • 2017
  • The advancement of cloud and big data and the considerable growth of traffic have increased the complexity and problems in the management inefficiency of existing networks. The software-defined networking (SDN) environment has been developed to solve this problem. SDN enables us to control network equipment through programming by separating the transmission and control functions of the equipment. Accordingly, several studies have been conducted to improve the performance of SDN controllers, such as the method of connecting existing legacy equipment with SDN, the packet management method for efficient data communication, and the method of distributing controller load in a centralized architecture. However, there is insufficient research on the control of SDN in terms of the quality of network-using applications. To support the establishment and change of the routing paths that meet the required network service quality, we require a mechanism to identify network requirements based on a contract for application network service quality and to collect information about the current network status and identify the violations of network service quality. This study proposes a method of identifying the quality violations of network paths through ontology to ensure the network service quality of applications and provide efficient services in an SDN environment.