• 제목/요약/키워드: Address Recognition

검색결과 208건 처리시간 0.03초

연결요소 분석에 기반한 인쇄체 한글 주소와 필기체 한글 주소의 구분 (Classification of Handwritten and Machine-printed Korean Address Image based on Connected Component Analysis)

  • 장승익;정선화;임길택;남윤석
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제30권10호
    • /
    • pp.904-911
    • /
    • 2003
  • 본 논문에서는 우편봉투 상에 기입된 인쇄체 한글 주소와 필기체 한글 주소를 효과적으로 구분할 수 있는 방법을 제안한다. 문자인식 모듈을 포함하는 각종 응용 시스템에서 입력 영상이 인쇄체인지 필기체인지 구분하는 것은 매우 중요하다. 이는 대부분의 경우 인쇄체 영상과 필기체 영상이 갖는 특징이 상이하여, 각 영상에서의 문자 및 문자열 분리 방법, 문자 인식 방법 둥이 매우 상이하게 개발되기 때문이다. 본 논문에서 제안한 구분 방법은 연결요소 추출 및 병합, 특징 추출, 영상 구분 순으로 수행된다. 연결요소 추출 및 병합 단계에서는 입력영상으로부터 연결요소를 추출한 후 일부 연결요소들에 대하여 병합을 시도하며, 특징 추출 단계에서는 병합결과 얻어진 연결요소들의 그룹들로부터 폭과 위치에 관련된 특징을 추출하고, 영상 구분 단계에서는 추출한 특징을 입력으로 제공받는 다충퍼셉트론을 사용하여 구분을 시도한다. 제안한 방법의 우수성을 증명하기 위해 실제 우편물로부터 추출된 3,147개의 한글 주소 영상을 사용하여 실험한 결과, 98.85%의 구분률을 보여주었다.

지능형 빌딩을 위한 디지털 통합 전관 방송 시스템 개발 (Development of Integrated Public Address System for Intelligent Building)

  • 김정숙;송치원
    • 한국지능시스템학회논문지
    • /
    • 제21권2호
    • /
    • pp.212-217
    • /
    • 2011
  • 본 논문에서는 미래 지능형 빌딩 시스템에서 요구되는 다양한 상황을 인지할 수 있는 지능형 디지털 통합 전관 방송 시스템을 개발하였다. 화재와 재난과 같은 응급 상황이 발생할 때 울리는 경보음을 인식할 수 있으며, 실내 온도와 습도 및 환경 오염도와 같은 다양한 센서 출력을 전달 받아 지능적으로 상황에 맞는 대처 방안을 필요한 곳에 개별적으로 방송할 수 있는 지능형 디지털 통합 전관 방송 시스템을 개발하였다. 외부 입력, 마이크, CD와 MP3 및 라디오 기능 등을 일체형으로 통합하고 소형화한 디지털 전관 방송 시스템을 개발하고 있으며, 시스템이 중앙 집중 제어가 가능하도록 운용 MICOM을 개발하였다. 중앙 집중 제어를 수행하기 위해 운용 MICOM은 제어 계층, 처리 계층 및 사용자 인터페이스 계층인 3계층으로 구성된다.

Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model

  • Kanti Singh Sangher;Archana Singh;Hari Mohan Pandey
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.99-109
    • /
    • 2023
  • The darknet is frequently referred to as the hub of illicit online activity. In order to keep track of real-time applications and activities taking place on Darknet, traffic on that network must be analysed. It is without a doubt important to recognise network traffic tied to an unused Internet address in order to spot and investigate malicious online activity. Any observed network traffic is the result of mis-configuration from faked source addresses and another methods that monitor the unused space address because there are no genuine devices or hosts in an unused address block. Digital systems can now detect and identify darknet activity on their own thanks to recent advances in artificial intelligence. In this paper, offer a generalised method for deep learning-based detection and classification of darknet traffic. Furthermore, analyse a cutting-edge complicated dataset that contains a lot of information about darknet traffic. Next, examine various feature selection strategies to choose a best attribute for detecting and classifying darknet traffic. For the purpose of identifying threats using network properties acquired from darknet traffic, devised a hybrid deep learning (DL) approach that combines Recurrent Neural Network (RNN) and Bidirectional LSTM (BiLSTM). This probing technique can tell malicious traffic from legitimate traffic. The results show that the suggested strategy works better than the existing ways by producing the highest level of accuracy for categorising darknet traffic using the Black widow optimization algorithm as a feature selection approach and RNN-BiLSTM as a recognition model.

배전선로 고장인지 방식에 관한 연구 (A Study on Improving of Fault Recognition Method in Distribution Line)

  • 이진;박찬
    • 한국전기전자재료학회논문지
    • /
    • 제33권1호
    • /
    • pp.65-69
    • /
    • 2020
  • The aim of this study is to improve the fault decision ability of FRTU (Feeder remote terminal unit) in DAS (Distribution automation system). FRTU uses the FI (Fault indicator) algorithm based on fault current pickup and operation of the protection device. Even if the inrush current flows or the protection device is sensitive to the transient current, FRTU may indicate incorrect fault information. To address these problems, we propose an improved fault recognition algorithm that can be applied to FRTU. We will detect a specific wave that is indicative of a fault, and use this information to identify a fault wave. The specific wave-detection algorithm is based on the duration and periodicity of the voltage, current, and harmonic variations. In addition, we propose fault recognition algorithms using voltage factor variation analysis and DWT (Discrete wavelet transform). All the wave data used in this study were actual data stored in FRTU.

International Harmonization of Accreditation of Toxicologists

  • Satoh, Tetsuo
    • Toxicological Research
    • /
    • 제17권
    • /
    • pp.189-191
    • /
    • 2001
  • In the past, IUTOX engaged in dialogue with various international toxicology organizations to address this important issue. IUTOX Executive Committee engaged in activities that support accreditation and/or registration of toxicologists around the world. As a result of discussions held during the IUTOX-sponsored workshop at the 2000 Annual Meeting of the SOT in Philadelphia, it was decided to create an international forum, the "International Assembly for the Recognition of Toxicologists"(IART). The mission of IART was defined as threefold: 1) to establish a forum for development of criteria for recognizing qualified experts in toxicology; 2) to assist "recognizing organizations" in establishing these criteria; and 3) to promote identification and training needs to enhance expertise in toxicology. The membership of IART is open to all organizations (e.g., registries, boards, academies, etc.) whose purpose is the recognition of expertise in toxicology.rtise in toxicology.

  • PDF

Online Digit Recognition using Start and End Point

  • Shim, Jae-chang;Ansari, Md Israfil
    • Journal of Multimedia Information System
    • /
    • 제4권1호
    • /
    • pp.39-42
    • /
    • 2017
  • Communication between human and machine is having been researched from last few decades and still it's a challenging task because human behavior is unpredictable. When it comes on handwritten digits almost each human has their own writing style. Handwritten digit recognition plays an important role, especially in the courtesy amounts on bank checks, postal code on mail address etc. In our study, we proposed an efficient feature extraction system for recognizing single digit number drawn by mouse or by a finger on a screen. Our proposed method combines basic image processing and reading the strokes of a line drawn. It is very simple and easy to implement in various platform as compare to the system which required high system configuration. This system has been designed, implemented, and tested successfully.

Human Action Recognition Using Deep Data: A Fine-Grained Study

  • Rao, D. Surendra;Potturu, Sudharsana Rao;Bhagyaraju, V
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.97-108
    • /
    • 2022
  • The video-assisted human action recognition [1] field is one of the most active ones in computer vision research. Since the depth data [2] obtained by Kinect cameras has more benefits than traditional RGB data, research on human action detection has recently increased because of the Kinect camera. We conducted a systematic study of strategies for recognizing human activity based on deep data in this article. All methods are grouped into deep map tactics and skeleton tactics. A comparison of some of the more traditional strategies is also covered. We then examined the specifics of different depth behavior databases and provided a straightforward distinction between them. We address the advantages and disadvantages of depth and skeleton-based techniques in this discussion.

Alzheimer's disease recognition from spontaneous speech using large language models

  • Jeong-Uk Bang;Seung-Hoon Han;Byung-Ok Kang
    • ETRI Journal
    • /
    • 제46권1호
    • /
    • pp.96-105
    • /
    • 2024
  • We propose a method to automatically predict Alzheimer's disease from speech data using the ChatGPT large language model. Alzheimer's disease patients often exhibit distinctive characteristics when describing images, such as difficulties in recalling words, grammar errors, repetitive language, and incoherent narratives. For prediction, we initially employ a speech recognition system to transcribe participants' speech into text. We then gather opinions by inputting the transcribed text into ChatGPT as well as a prompt designed to solicit fluency evaluations. Subsequently, we extract embeddings from the speech, text, and opinions by the pretrained models. Finally, we use a classifier consisting of transformer blocks and linear layers to identify participants with this type of dementia. Experiments are conducted using the extensively used ADReSSo dataset. The results yield a maximum accuracy of 87.3% when speech, text, and opinions are used in conjunction. This finding suggests the potential of leveraging evaluation feedback from language models to address challenges in Alzheimer's disease recognition.

AlphaPose를 활용한 LSTM(Long Short-Term Memory) 기반 이상행동인식 (LSTM(Long Short-Term Memory)-Based Abnormal Behavior Recognition Using AlphaPose)

  • 배현재;장규진;김영훈;김진평
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제10권5호
    • /
    • pp.187-194
    • /
    • 2021
  • 사람의 행동인식(Action Recognition)은 사람의 관절 움직임에 따라 어떤 행동을 하는지 인식하는 것이다. 이를 위해서 영상처리에 활용되는 컴퓨터 비전 태스크를 활용하였다. 사람의 행동인식은 딥러닝과 CCTV를 결합한 안전사고 대응서비스로서 안전관리 현장 내에서도 적용될 수 있다. 기존연구는 딥러닝을 활용하여 사람의 관절 키포인트 추출을 통한 행동인식 연구가 상대적으로 부족한 상태이다. 또한 안전관리 현장에서 작업자를 지속적이고 체계적으로 관리하기 어려운 문제점도 있었다. 본 논문에서는 이러한 문제점들을 해결하기 위해 관절 키포인트와 관절 움직임 정보만을 이용하여 위험 행동을 인식하는 방법을 제안하고자 한다. 자세추정방법(Pose Estimation)의 하나인 AlphaPose를 활용하여 신체 부위의 관절 키포인트를 추출하였다. 추출된 관절 키포인트를 LSTM(Long Short-Term Memory) 모델에 순차적으로 입력하여 연속적인 데이터로 학습을 하였다. 행동인식 정확률을 확인한 결과 "누워있기(Lying Down)" 행동인식 결과의 정확도가 높음을 확인할 수 있었다.

Uncooperative Person Recognition Based on Stochastic Information Updates and Environment Estimators

  • Kim, Hye-Jin;Kim, Dohyung;Lee, Jaeyeon;Jeong, Il-Kwon
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.395-405
    • /
    • 2015
  • We address the problem of uncooperative person recognition through continuous monitoring. Multiple modalities, such as face, height, clothes color, and voice, can be used when attempting to recognize a person. In general, not all modalities are available for a given frame; furthermore, only some modalities will be useful as some frames in a video sequence are of a quality that is too low to be able to recognize a person. We propose a method that makes use of stochastic information updates of temporal modalities and environment estimators to improve person recognition performance. The environment estimators provide information on whether a given modality is reliable enough to be used in a particular instance; such indicators mean that we can easily identify and eliminate meaningless data, thus increasing the overall efficiency of the method. Our proposed method was tested using movie clips acquired under an unconstrained environment that included a wide variation of scale and rotation; illumination changes; uncontrolled distances from a camera to users (varying from 0.5 m to 5 m); and natural views of the human body with various types of noise. In this real and challenging scenario, our proposed method resulted in an outstanding performance.