• Title/Summary/Keyword: Address Recognition

Search Result 208, Processing Time 0.029 seconds

Classification of Handwritten and Machine-printed Korean Address Image based on Connected Component Analysis (연결요소 분석에 기반한 인쇄체 한글 주소와 필기체 한글 주소의 구분)

  • 장승익;정선화;임길택;남윤석
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.10
    • /
    • pp.904-911
    • /
    • 2003
  • In this paper, we propose an effective method for the distinction between machine-printed and handwritten Korean address images. It is important to know whether an input image is handwritten or machine-printed, because methods for handwritten image are quite different from those of machine-printed image in such applications as address reading, form processing, FAX routing, and so on. Our method consists of three blocks: valid connected components grouping, feature extraction, and classification. Features related to width and position of groups of valid connected components are used for the classification based on a neural network. The experiment done with live Korean address images has demonstrated the superiority of the proposed method. The correct classification rate for 3,147 testing images was about 98.85%.

Development of Integrated Public Address System for Intelligent Building (지능형 빌딩을 위한 디지털 통합 전관 방송 시스템 개발)

  • Kim, Jung-Sook;Song, Chee-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.2
    • /
    • pp.212-217
    • /
    • 2011
  • In this paper, we developed an intelligent minimized integrated digital public address which can provide context awareness of various events occurring in future intelligent buildings. It is able to recognize both voices and sounds, such as a fire bell and a disaster bell, which signal to escape in emergence situations and it can sense information which is sent from various sensors, for example, the inner temperature, humidity, and environment status in an intelligent building. Also, the intelligent digital integrated public address can broadcast information to individual places, according to context awareness that is from sensing information, by using network with an ID. And we are developing a minimized integrated digital public address system that has facilities such as external input, Mic., CD, MP3 and Radio. Developing an integrated digital public address system with operational MICOM will make it possible to control the facilities of digital devices centrally. The operational MICOM is composed of 3 layers which are a control layer, a processing layer and a user interface layer.

Cyber Threat Intelligence Traffic Through Black Widow Optimisation by Applying RNN-BiLSTM Recognition Model

  • Kanti Singh Sangher;Archana Singh;Hari Mohan Pandey
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.99-109
    • /
    • 2023
  • The darknet is frequently referred to as the hub of illicit online activity. In order to keep track of real-time applications and activities taking place on Darknet, traffic on that network must be analysed. It is without a doubt important to recognise network traffic tied to an unused Internet address in order to spot and investigate malicious online activity. Any observed network traffic is the result of mis-configuration from faked source addresses and another methods that monitor the unused space address because there are no genuine devices or hosts in an unused address block. Digital systems can now detect and identify darknet activity on their own thanks to recent advances in artificial intelligence. In this paper, offer a generalised method for deep learning-based detection and classification of darknet traffic. Furthermore, analyse a cutting-edge complicated dataset that contains a lot of information about darknet traffic. Next, examine various feature selection strategies to choose a best attribute for detecting and classifying darknet traffic. For the purpose of identifying threats using network properties acquired from darknet traffic, devised a hybrid deep learning (DL) approach that combines Recurrent Neural Network (RNN) and Bidirectional LSTM (BiLSTM). This probing technique can tell malicious traffic from legitimate traffic. The results show that the suggested strategy works better than the existing ways by producing the highest level of accuracy for categorising darknet traffic using the Black widow optimization algorithm as a feature selection approach and RNN-BiLSTM as a recognition model.

A Study on Improving of Fault Recognition Method in Distribution Line (배전선로 고장인지 방식에 관한 연구)

  • Lee, Jin;Park, Chan
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.33 no.1
    • /
    • pp.65-69
    • /
    • 2020
  • The aim of this study is to improve the fault decision ability of FRTU (Feeder remote terminal unit) in DAS (Distribution automation system). FRTU uses the FI (Fault indicator) algorithm based on fault current pickup and operation of the protection device. Even if the inrush current flows or the protection device is sensitive to the transient current, FRTU may indicate incorrect fault information. To address these problems, we propose an improved fault recognition algorithm that can be applied to FRTU. We will detect a specific wave that is indicative of a fault, and use this information to identify a fault wave. The specific wave-detection algorithm is based on the duration and periodicity of the voltage, current, and harmonic variations. In addition, we propose fault recognition algorithms using voltage factor variation analysis and DWT (Discrete wavelet transform). All the wave data used in this study were actual data stored in FRTU.

International Harmonization of Accreditation of Toxicologists

  • Satoh, Tetsuo
    • Toxicological Research
    • /
    • v.17
    • /
    • pp.189-191
    • /
    • 2001
  • In the past, IUTOX engaged in dialogue with various international toxicology organizations to address this important issue. IUTOX Executive Committee engaged in activities that support accreditation and/or registration of toxicologists around the world. As a result of discussions held during the IUTOX-sponsored workshop at the 2000 Annual Meeting of the SOT in Philadelphia, it was decided to create an international forum, the "International Assembly for the Recognition of Toxicologists"(IART). The mission of IART was defined as threefold: 1) to establish a forum for development of criteria for recognizing qualified experts in toxicology; 2) to assist "recognizing organizations" in establishing these criteria; and 3) to promote identification and training needs to enhance expertise in toxicology. The membership of IART is open to all organizations (e.g., registries, boards, academies, etc.) whose purpose is the recognition of expertise in toxicology.rtise in toxicology.

  • PDF

Online Digit Recognition using Start and End Point

  • Shim, Jae-chang;Ansari, Md Israfil
    • Journal of Multimedia Information System
    • /
    • v.4 no.1
    • /
    • pp.39-42
    • /
    • 2017
  • Communication between human and machine is having been researched from last few decades and still it's a challenging task because human behavior is unpredictable. When it comes on handwritten digits almost each human has their own writing style. Handwritten digit recognition plays an important role, especially in the courtesy amounts on bank checks, postal code on mail address etc. In our study, we proposed an efficient feature extraction system for recognizing single digit number drawn by mouse or by a finger on a screen. Our proposed method combines basic image processing and reading the strokes of a line drawn. It is very simple and easy to implement in various platform as compare to the system which required high system configuration. This system has been designed, implemented, and tested successfully.

Human Action Recognition Using Deep Data: A Fine-Grained Study

  • Rao, D. Surendra;Potturu, Sudharsana Rao;Bhagyaraju, V
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.97-108
    • /
    • 2022
  • The video-assisted human action recognition [1] field is one of the most active ones in computer vision research. Since the depth data [2] obtained by Kinect cameras has more benefits than traditional RGB data, research on human action detection has recently increased because of the Kinect camera. We conducted a systematic study of strategies for recognizing human activity based on deep data in this article. All methods are grouped into deep map tactics and skeleton tactics. A comparison of some of the more traditional strategies is also covered. We then examined the specifics of different depth behavior databases and provided a straightforward distinction between them. We address the advantages and disadvantages of depth and skeleton-based techniques in this discussion.

Alzheimer's disease recognition from spontaneous speech using large language models

  • Jeong-Uk Bang;Seung-Hoon Han;Byung-Ok Kang
    • ETRI Journal
    • /
    • v.46 no.1
    • /
    • pp.96-105
    • /
    • 2024
  • We propose a method to automatically predict Alzheimer's disease from speech data using the ChatGPT large language model. Alzheimer's disease patients often exhibit distinctive characteristics when describing images, such as difficulties in recalling words, grammar errors, repetitive language, and incoherent narratives. For prediction, we initially employ a speech recognition system to transcribe participants' speech into text. We then gather opinions by inputting the transcribed text into ChatGPT as well as a prompt designed to solicit fluency evaluations. Subsequently, we extract embeddings from the speech, text, and opinions by the pretrained models. Finally, we use a classifier consisting of transformer blocks and linear layers to identify participants with this type of dementia. Experiments are conducted using the extensively used ADReSSo dataset. The results yield a maximum accuracy of 87.3% when speech, text, and opinions are used in conjunction. This finding suggests the potential of leveraging evaluation feedback from language models to address challenges in Alzheimer's disease recognition.

LSTM(Long Short-Term Memory)-Based Abnormal Behavior Recognition Using AlphaPose (AlphaPose를 활용한 LSTM(Long Short-Term Memory) 기반 이상행동인식)

  • Bae, Hyun-Jae;Jang, Gyu-Jin;Kim, Young-Hun;Kim, Jin-Pyung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.5
    • /
    • pp.187-194
    • /
    • 2021
  • A person's behavioral recognition is the recognition of what a person does according to joint movements. To this end, we utilize computer vision tasks that are utilized in image processing. Human behavior recognition is a safety accident response service that combines deep learning and CCTV, and can be applied within the safety management site. Existing studies are relatively lacking in behavioral recognition studies through human joint keypoint extraction by utilizing deep learning. There were also problems that were difficult to manage workers continuously and systematically at safety management sites. In this paper, to address these problems, we propose a method to recognize risk behavior using only joint keypoints and joint motion information. AlphaPose, one of the pose estimation methods, was used to extract joint keypoints in the body part. The extracted joint keypoints were sequentially entered into the Long Short-Term Memory (LSTM) model to be learned with continuous data. After checking the behavioral recognition accuracy, it was confirmed that the accuracy of the "Lying Down" behavioral recognition results was high.

Uncooperative Person Recognition Based on Stochastic Information Updates and Environment Estimators

  • Kim, Hye-Jin;Kim, Dohyung;Lee, Jaeyeon;Jeong, Il-Kwon
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.395-405
    • /
    • 2015
  • We address the problem of uncooperative person recognition through continuous monitoring. Multiple modalities, such as face, height, clothes color, and voice, can be used when attempting to recognize a person. In general, not all modalities are available for a given frame; furthermore, only some modalities will be useful as some frames in a video sequence are of a quality that is too low to be able to recognize a person. We propose a method that makes use of stochastic information updates of temporal modalities and environment estimators to improve person recognition performance. The environment estimators provide information on whether a given modality is reliable enough to be used in a particular instance; such indicators mean that we can easily identify and eliminate meaningless data, thus increasing the overall efficiency of the method. Our proposed method was tested using movie clips acquired under an unconstrained environment that included a wide variation of scale and rotation; illumination changes; uncontrolled distances from a camera to users (varying from 0.5 m to 5 m); and natural views of the human body with various types of noise. In this real and challenging scenario, our proposed method resulted in an outstanding performance.