• Title/Summary/Keyword: 패턴 매칭 알고리즘

Search Result 156, Processing Time 0.021 seconds

Visual Inspection Method by Pyramid Data Structure (IC핀 조사를 위한 시각 조사 방법)

  • 최성진;조동래;김영해;나극환;김춘길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.5
    • /
    • pp.374-383
    • /
    • 1990
  • For a visual inspectio system to be viable, it must in general achieve the same or lower costs as those incurred by manual methods, it must have a reasonable inspection rate, and it must be reliable and maintainable : for the visual inspection system, inspection at high speed, flexibility for variety of products, and low cost are needed. In order to solve these problems, we propose the visual inspection algorithm by divide-and-conquer technique using the pyramid data structure and the development of simplified pattern matching method. By this method we can reduce the number of data required to compare with patterns and make the inspection time short.

  • PDF

Design of a Contactless Access Security System using Palm Creases and Palm Vein Pattern Matching (손금과 정맥혈관 패턴매칭을 이용한 비접촉 출입 보안시스템 설계)

  • Ki-Jung Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.327-334
    • /
    • 2024
  • In this paper, we developed a system with a near-infrared LED light source with a wavelength of 950nm to acquire palm vein images and a white LED light source to acquire palm creases based on Raspberry Pi. In addition, we implemented a unique pattern-extractable image processing technology that can prevent counterfeiting and enhance security of mixed creases and palmprints through image pre-processing (Gray scaling, Histogram Equalization, Blurring, Thresholding, Thinning) for the acquired vein and palm images, and secured a source technology that can be used in a security-enhanced system.

Automated Generation Algorithm of the Penetration Scenarios using Association Mining Technique (연관 마이닝 기법을 이용한 침입 시나리오 자동생성 알고리즘)

  • 정경훈;주정은;황현숙;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.203-207
    • /
    • 1999
  • In this paper we propose the automated generation algorithm of penetration scenario using association mining technique. Until now known intrusion detections are classified into anomaly detection and misuse detection. The former uses statistical method, features selection, neural network method in order to decide intrusion, the latter uses conditional probability, expert system, state transition analysis, pattern matching for deciding intrusion. In proposed many intrusion detection algorithms unknown penetrations are created and updated by security experts. Our algorithm automatically generates penetration scenarios applying association mining technique to state transition technique. Association mining technique discovers efficient and useful unknown information in existing data. In this paper the algorithm we propose can automatically generate penetration scenarios to have been produced by security experts and is easy to cope with intrusions when it is compared to existing intrusion algorithms. Also It has advantage that maintenance cost is not high.

  • PDF

A Study on Recognition of Korean Continuous Speech using Discrete Duration CHMM. (이산 시간 제어 CHMM을 이용한 한국어 연속 음성 인식에 관한 연구)

  • 김상범
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06c
    • /
    • pp.368-372
    • /
    • 1994
  • 확률적 모델을 이용한 HMM 으로 한국어 연속 음성 인식시스템을 구성하였다. 학습 모델로서는 양자화 DCK가 없는 연속출력 확률밀도를 사용한 연속출력 확률분포 HMM과 과도 구간 및 정상 구간의 시간구조를 충분히 BYGUS할 수 없는 것을 계속시간 확률 파라메터를 추가하여 보완한 이산 지속시간 제어 연속출력 확률분포 HMM을 이용하였다. 인식 알고리즘은 시계열 패턴의 시간축상에서의 비선형 신축을 고려한 에 매칭으로서, 음절의 경계를 자동으로 검출하는 O에을 이용하였다. 실험에서 사용된 연속음성데이타는 4연 숫자음과 연속음성 10문장으로 하였다. 인식 실험 결과 4연 숫자음에서 CHMM은 80.7%, DDCHMM은 92.9%의 인식률을 얻었고, 신문 사설에서 발췌한 연속 음성문장의 경우 CHMM 54.2%, DDCHMM에서는 68.9%을 얻어, 시간장 제어를 고려한 DDCHMM이 CHMM보다 SHB은 인식률을 얻었다.

  • PDF

An algorithm for creating index key for MPEG videos (MPEG 비디오 색인과 검색을 위한 색인키 생성 알고리즘)

  • 하성욱;강대성;김대진;권기항
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.3
    • /
    • pp.243-251
    • /
    • 1999
  • In this paper, we suggest a novel method which defines index for effectively searching MPEG video data. The traditional methods are slow because they rely on pattern matching of images between extracted shots and user's querying images. Whereas, our method uses a different approach: It transforms images of extracted PFrames into codes and uses the codes for creating index keys. To be specific, we define five features of non-context description for transparency about user's querying.

  • PDF

3D Vision Inspection Algorithm using Geometrical Pattern Matching Method (기하학적 패턴 매칭을 이용한 3차원 비전 검사 알고리즘)

  • 정철진;허경무;김장기
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.1
    • /
    • pp.54-59
    • /
    • 2004
  • We suggest a 3D vision inspection algorithm which is based on the external shape feature. Because many electronic parts have the regular shape, if we have the database of pattern and can recognize the object using the database of the object s pattern, we can inspect many types of electronic parts. Our proposed algorithm uses the geometrical pattern matching method and 3D database on the electronic parts. We applied our suggested algorithm fer inspecting several objects including typical IC and capacitor. Through the experiments, we could find that our suggested algorithm is more effective and more robust to the inspection environment(rotation angle, light source, etc.) than conventional 2D inspection methods. We also compared our suggested algorithm with the feature space trajectory method.

Study on Design of Fingerprint Recognition Embedded System using Neural Network (신경망을 이용한 지문인식 임베디드 시스템 설계에 관한 연구)

  • Lee Jae-Hyun;Kim Dong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.4
    • /
    • pp.775-782
    • /
    • 2006
  • We generated blocks from the direction-extracted fingerprint during the pre-process of the fingerprint recognition algorithm and performed training by using the direction minutiae of each block as the input pattern of the neural network, so that we extracted the core points to use in the matching. Based on this, we designed the fingerprint recognition embedded system and tested it using the control board and the serial communication to utilize it for a variety of application systems. As a result, we can verify the reliance satisfactorily.

Implementation of Emotion Recognition System using Internet Phone (인터넷 폰을 이용한 감성인식 시스템 구현)

  • Kwon, Byeong-Heon;Seo, Burm-Suk
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.35-40
    • /
    • 2007
  • In this paper, we introduces contents about the emotion recognition and character display expressing emotion. In this paper, we proposes on things like how to search characteristic parameters expressing user emotion, how to deduce emotion through pattern matching algorithm. Also, we implemented display platform recognizing the caller's emotion over internet phone. It display character animations expressing emotion as the result deduced by emotion recognition algorithm.

  • PDF

A Study on Combined IDS Model For Performance Improving (성능 향상을 위한 통합 침입 탐지시스템에 대한 연구)

  • Hong, Seong-Kil;Won, Il-Yong;Song, Doo-Heon;Lee, Chang-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1843-1846
    • /
    • 2003
  • 네트워크 기반의 공격 및 비정상 행위를 정확히 탐지하고 판단하기 위한 기존의 탐지 모델은 공격 룰셋의 패턴매칭 기반인 Misuse Detection System을 사용하고 있다. 그러나 이 시스템의 특성상 새로운 공격의 미탐지 및 공격 오인등으로 False Positive 가 높다는 단점이 있다. 본 논문은 전체 시스템의 성능을 판정하는 False Positve 에러율을 줄여 성능을 향상하기 위해 Meachine Learning기반의 Anomaly Detection System 을 결합한 새로운 탐지 모델을 제안하고자 한다. Anomaly Detection System 은 정상행위에 대한 비교적 높은 탐지율과 새로운 공격에 대한 탐지가 용이하다. 본 논문에서는 각 시스템의 탐지모델로 Snort 와 인스턴스 기반의 알고리즘인 IBL 을 사용했으며, 결합모델의 타당성을 검증하기 위해서 각 탐지 모델의 False Positive와 False Negative 에러율을 측정하였다.

  • PDF

Programming Methodology of the Computer Go (컴퓨터 바둑 프로그래밍 기법)

  • Kim, Yeong-Sang;Lee, Jong-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.3
    • /
    • pp.460-470
    • /
    • 1996
  • In this paper, we describe the programming methodology which can produce computer Go.After computer Go program with the rules of Go determines a territory for itself, it must evaluate the exact next move. The common design principle of computer Go is to combine such heuristic elements as pattern match, alpha-beta pruning and influence function. In this study, we introduce many other approaches and their results on computer Go, and then show data structures and algorithms to implement computer Go project.

  • PDF