• Title/Summary/Keyword: Address Recognition

Search Result 220, Processing Time 0.021 seconds

An Approach to Segmentation of Address Strings of unconstrained handwritten Hangul using Run-Length Code (Rum-Length code를 이용한 제약없이 쓰여진 한글 필기체 주소열 분할)

  • Kim, Gyeonghwan;Yoon, Jason-J
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.11
    • /
    • pp.813-821
    • /
    • 2001
  • While recognition of isolated units of writing, such as a character or a word, has been extensively studied, emphasis on the segmentation itself has been lacking. In this paper we propose an active segmentation method for handwritten Hangul address strings based on the Run-length code. A slant correction algorithm, which is considered as an important preprocessing step for the segmentation, is presented. Three fundamental candidate estimation functions are introduced to detect the clues on touching points, and the classification of touching types is attempted depending on the structural peculiarity of Hangul. Our experiments show segmentation performance of 88.2% on touching characters with minimal over-segmentation.

  • PDF

Legal and Practical Solutions for the Expanding the Roles of Medical Support Staff Nurses (진료지원인력의 확대된 업무 수행을 위한 합법적이고 합리적인 해결 방안)

  • Choi, Su Jung;Kim, Min Young
    • Journal of Korean Academy of Nursing
    • /
    • v.54 no.3
    • /
    • pp.300-310
    • /
    • 2024
  • Purpose: Medical support staff nurses have traditionally performed various supportive tasks for physicians, often extending beyond standard nursing roles. Despite these long-standing practices, there is a notable lack of official recognition and legal protection for these expanded responsibilities, leading to increasing legal concerns. Therefore, there is a need for proposing a rational solution to address these issues. Methods: The number of medical support staff nurses is rising, particularly as they fill gaps left by the 2024 resident physician strike. The study focuses on identifying potential challenges arising from this shift and developing strategic improvements to address these challenges effectively. Results: This study proposed legally expanding the scope of nursing duties and creating a robust system for training and certifying nurses to handle these responsibilities effectively, by integrating these roles within the advanced practice nurse (APN) framework. Conclusion: Integrating these roles within the framework of APN can offer a sustainable and legally sound solution to the ongoing healthcare crisis, ensuring patient safety and safeguarding healthcare workers' legal rights.

Spatialization of Unstructured Document Information Using AI (AI를 활용한 비정형 문서정보의 공간정보화)

  • Sang-Won YOON;Jeong-Woo PARK;Kwang-Woo NAM
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.3
    • /
    • pp.37-51
    • /
    • 2023
  • Spatial information is essential for interpreting urban phenomena. Methodologies for spatializing urban information, especially when it lacks location details, have been consistently developed. Typical methods include Geocoding using structured address information or place names, spatial integration with existing geospatial data, and manual tasks utilizing reference data. However, a vast number of documents produced by administrative agencies have not been deeply dealt with due to their unstructured nature, even when there's demand for spatialization. This research utilizes the natural language processing model BERT to spatialize public documents related to urban planning. It focuses on extracting sentence elements containing addresses from documents and converting them into structured data. The study used 18 years of urban planning public announcement documents as training data to train the BERT model and enhanced its performance by manually adjusting its hyperparameters. After training, the test results showed accuracy rates of 96.6% for classifying urban planning facilities, 98.5% for address recognition, and 93.1% for address cleaning. When mapping the result data on GIS, it was possible to effectively display the change history related to specific urban planning facilities. This research provides a deep understanding of the spatial context of urban planning documents, and it is hoped that through this, stakeholders can make more effective decisions.

The Teachers' Recognition and a Plan for the Improvement of the System on Selection of Gifted Students in Science Using Teachers' Observation and Nomination (과학 영재 관찰.추천 선발 방식에 대한 교사의 인식 조사 및 개선 방안)

  • Bang, Mi Seon;Kim, Yong Gwon
    • Journal of Korean Elementary Science Education
    • /
    • v.32 no.2
    • /
    • pp.169-184
    • /
    • 2013
  • The purpose of this study is to investigate teachers' recognition and to suggest an improvement in the system of teacher's observation and nomination used to selecting gifted and talented students in Science in the Busan Metropolitan School District in 2013 by investigating teachers' recognition of the system and their expressed needs. The results are as follows. First, it was observed that teachers are of the opinion that it is difficult to determine the science gifted students by observation due to their lack of expertise in giftedness and gifted education, the lack of a check list to use, and the difficulty of ensuring the objectivity of the results of the determination. Second, the absence of objective screening tools used for the selection, the selection of gifted students based on their subjective judgment, and the possibility to select students based only on visible manifestations of ability may cause parents to mistrust the system. Thus, institutional support is required to address the concerns of teachers and parents. Third, the teachers who are in charge of observation, nomination, selection and determination need to be trained. After that, at least one of these teachers should be assigned in each school and training should operate continuously and systematically. Lastly, while these things are occurring, the process of observation and nomination of by teachers, which is the basis of pooling gifted students at the level of Busan Metropolitan School District, should be continued.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

3D Facial Landmark Tracking and Facial Expression Recognition

  • Medioni, Gerard;Choi, Jongmoo;Labeau, Matthieu;Leksut, Jatuporn Toy;Meng, Lingchao
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.3
    • /
    • pp.207-215
    • /
    • 2013
  • In this paper, we address the challenging computer vision problem of obtaining a reliable facial expression analysis from a naturally interacting person. We propose a system that combines a 3D generic face model, 3D head tracking, and 2D tracker to track facial landmarks and recognize expressions. First, we extract facial landmarks from a neutral frontal face, and then we deform a 3D generic face to fit the input face. Next, we use our real-time 3D head tracking module to track a person's head in 3D and predict facial landmark positions in 2D using the projection from the updated 3D face model. Finally, we use tracked 2D landmarks to update the 3D landmarks. This integrated tracking loop enables efficient tracking of the non-rigid parts of a face in the presence of large 3D head motion. We conducted experiments for facial expression recognition using both framebased and sequence-based approaches. Our method provides a 75.9% recognition rate in 8 subjects with 7 key expressions. Our approach provides a considerable step forward toward new applications including human-computer interactions, behavioral science, robotics, and game applications.

LH-FAS v2: Head Pose Estimation-Based Lightweight Face Anti-Spoofing (LH-FAS v2: 머리 자세 추정 기반 경량 얼굴 위조 방지 기술)

  • Hyeon-Beom Heo;Hye-Ri Yang;Sung-Uk Jung;Kyung-Jae Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.309-316
    • /
    • 2024
  • Facial recognition technology is widely used in various fields but faces challenges due to its vulnerability to fraudulent activities such as photo spoofing. Extensive research has been conducted to overcome this challenge. Most of them, however, require the use of specialized equipment like multi-modal cameras or operation in high-performance environments. In this paper, we introduce LH-FAS v2 (: Lightweight Head-pose-based Face Anti-Spoofing v2), a system designed to operate on a commercial webcam without any specialized equipment, to address the issue of facial recognition spoofing. LH-FAS v2 utilizes FSA-Net for head pose estimation and ArcFace for facial recognition, effectively assessing changes in head pose and verifying facial identity. We developed the VD4PS dataset, incorporating photo spoofing scenarios to evaluate the model's performance. The experimental results show the model's balanced accuracy and speed, indicating that head pose estimation-based facial anti-spoofing technology can be effectively used to counteract photo spoofing.

Customer Barcode Support System for the Cost Saving of Mail Items (우편물 처리원가 절감을 위한 고객 바코드 지원 시스템)

  • Hwang, Jae-Gak;Park, Moon-Sung;Song, Jae-Gwan;Woo, Dong-Chin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2563-2573
    • /
    • 1999
  • In most mail automatic processing centers, after facing and canceling, letter mails are passed through an Optical Character Recognition/Barcode Sorter(OCR/BS) to read the postal code and 3 of 5 fluorescent (luminescent) barcode is applied. Normally, 31%∼35% of this mails are rejected. The main reasons for reading failures are poor printing quality of addresses and barcodes, script printing, writing in a cursive hand, variety fonts, and failure to locate the address. Our goal is to provide mailer with top quality service and customer barcode service as we move toward 100% barcoding automation of letter mail. In this paper, we propose a method of printing 3 of 5 customer barcode, postal code management, and detection of postal code based on postal address for increase the performance of automatic processing system in mail items. Using postal code generating rules, which are automatically extracted from postal addresses and address numbers, creates postal codes. The customer barcode support system is implemented by C++ language and runs on IBM PC under Windows 95.

  • PDF

Implementation of Public Address System Using Anchor Technology

  • Seungwon Lee;Soonchul Kwon;Seunghyun Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.1-12
    • /
    • 2023
  • A public address (PA) system installed in a building is a system that delivers alerts, announcements, instructions, etc. in an emergency or disaster situation. As for the products used in PA systems, with the development of information and communication technology, PA products with various functions have been introduced to the market. PA systems recently launched in the market may be connected through a single network to enable efficient management and operation, or use voice recognition technology to deliver quick information in case of an emergency. In addition, a system capable of locating a user inside a building using a location-based service and guiding or responding to a safe area in the event of an emergency is being launched on the market. However, the new PA systems currently on the market add some functions to the existing PA system configuration to make system operation more convenient, but they do not change the complex PA system configuration to reduce facility costs, maintenance, and management costs. In this paper, we propose a novel PA system configuration for buildings using audio networks and control hierarchy over peer-to-peer (Anchor) technology based on audio over IP (AoIP), which simplifies the complex PA system configuration and enables convenient operation and management. As a result of the study, through the emergency signal processing algorithm, fire broadcasting was made possible according to the detection of the existence of a fire signal in the Anchor system. In addition, the control device of the PA system was replaced with software to reduce the equipment installation cost, and the PA system configuration was simplified. In the future, it is expected that the PA system using Anchor technology will become the standard for PA facilities.

Implementation of Pattern Recognition Algorithm Using Line Scan Camera for Recognition of Path and Location of AGV (무인운반차(AGV)의 주행경로 및 위치인식을 위한 라인스캔카메라를 이용한 패턴인식 알고리즘 구현)

  • Kim, Soo Hyun;Lee, Hyung Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.1
    • /
    • pp.13-21
    • /
    • 2018
  • AGVS (Automated Guided Vehicle System) is a core technology of logistics automation which automatically moves specific objects or goods within a certain work space. Conventional AGVS generally requires the in-door localization system and each AGV equips expensive sensors such as laser, magnetic, inertial sensors for the route recognition and automatic navigation. thus the high installation cost is inevitable and there are many restrictions on route(path) modification or expansion. To address this issue, in this paper, we propose a cost-effective and scalable AGV based on a light-weight pattern recognition technique. The proposed pattern recognition technology not only enables autonomous driving by recognizing the route(path), but also provides a technique for figuring out the loc ation of AGV itself by recognizing the simple patterns(bar-code like) installed on the route. This significantly reduces the cost of implementing AGVS as well as benefiting from route modification and expansion. In order to verify the effectiveness of the proposed technique, we first implement a pattern recognition algorithm on a light-weight MCU(Micro Control Unit), and then verify the results by implementing an MCU_controlled AGV prototype.