• Title/Summary/Keyword: Identification Information

Search Result 4,783, Processing Time 0.033 seconds

Genetically Optimized Information Granules-based FIS (유전자적 최적 정보 입자 기반 퍼지 추론 시스템)

  • Park, Keon-Jun;Oh, Sung-Kwun;Lee, Young-Il
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.146-148
    • /
    • 2005
  • In this paper, we propose a genetically optimized identification of information granulation(IG)-based fuzzy model. To optimally design the IG-based fuzzy model we exploit a hybrid identification through genetic alrogithms(GAs) and Hard C-Means (HCM) clustering. An initial structure of fuzzy model is identified by determining the number of input, the seleced input variables, the number of membership function, and the conclusion inference type by means of GAs. Granulation of information data with the aid of Hard C-Means(HCM) clustering algorithm help determine the initial paramters of fuzzy model such as the initial apexes of the membership functions and the initial values of polyminial functions being used in the premise and consequence part of the fuzzy rules. And the inital parameters are tuned effectively with the aid of the genetic algorithms and the least square method. And also, we exploite consecutive identification of fuzzy model in case of identification of structure and parameters. Numerical example is included to evaluate the performance of the proposed model.

  • PDF

Semantic Similarity-Based Contributable Task Identification for New Participating Developers

  • Kim, Jungil;Choi, Geunho;Lee, Eunjoo
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.4
    • /
    • pp.228-234
    • /
    • 2018
  • In software development, the quality of a product often depends on whether its developers can rapidly find and contribute to the proper tasks. Currently, the word data of projects to which newcomers have previously contributed are mainly utilized to find appropriate source files in an ongoing project. However, because of the vocabulary gap between software projects, the accuracy of source file identification based on information retrieval is not guaranteed. In this paper, we propose a novel source file identification method to reduce the vocabulary gap between software projects. The proposed method employs DBPedia Spotlight to identify proper source files based on semantic similarity between source files of software projects. In an experiment based on the Spring Framework project, we evaluate the accuracy of the proposed method in the identification of contributable source files. The experimental results show that the proposed approach can achieve better accuracy than the existing method based on comparison of word vocabularies.

Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets

  • Zhao, Yanna;Wang, Lei;Zhao, Xu;Liu, Yuncai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.775-792
    • /
    • 2015
  • Person re-identification is an important and challenging task in computer vision with numerous real world applications. Despite significant progress has been made in the past few years, person re-identification remains an unsolved problem. This paper presents a novel appearance-based approach to person re-identification. The approach exploits region covariance matrix and color histograms to capture the statistical properties and chromatic information of each object. Robustness against low resolution, viewpoint changes and pose variations is achieved by a novel signature, that is, the combination of Log Covariance Matrix feature and HSV histogram (LCMH). In order to further improve re-identification performance, third-party image sets are utilized as a common reference to sufficiently represent any image set with the same type. Distinctive and reliable features for a given image set are extracted through decision boundary between the specific set and a third-party image set supervised by max-margin criteria. This method enables the usage of an existing dataset to represent new image data without time-consuming data collection and annotation. Comparisons with state-of-the-art methods carried out on benchmark datasets demonstrate promising performance of our method.

Hanwoo individual identification with DNA marker information

  • Lee, Jea-Young;Choi, Yu-Mi
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.3
    • /
    • pp.599-608
    • /
    • 2007
  • This study was conducted to establish an individual identification system in Hanwoo cattle. Samples of 33 Hanwoo individuals from Korean elite sire families were used. Thirteen major microsatellite markers were selected from alleles amplified, their frequencies, H(Heterozygosity) and PIC(Polymorphism Information Content) with Hardy-Weinberg equilibrium. Next, in order to evaluate the power of the markers selected on the individual animal identification, MP(Match probability) and R(Relatedness coefficient) with the percentage of animal incorrectly identified were computed. Finally nine microsatellite markers were selected and discussed.

  • PDF

A Study on the Intention and Behavior of Sharing Information in Online World: Focusing on Moderating Effect of Information Importance (온라인상에서 정보공유 의도 및 행동에 미치는 영향에 관한 연구 - 정보 중요성의 조절효과를 중심으로 -)

  • Kim, Gu
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.22-41
    • /
    • 2013
  • The purpose of this paper is to examine the effect of interpersonal face-to-face offline on identification-based trust and reciprocity norm in online world, and the effect of identification-based trust and reciprocity norm on the intention and behavior of sharing information in online world. To understand the moderating role, the importance of information was established as a moderating variable, and an empirical analysis was conducted, focusing on the undergraduate. The results of this study are as follows. It was found that interpersonal face-to-face in offline world affects identification-based trust and reciprocity norm in online positively. A reciprocity norm of identification-based trust and reciprocity norm in online world affected by interpersonal face-to-face in offline world has a positive effect on the intention and behavior of sharing information in online, but showed that identification-based trust does not affect them significantly. And reciprocity norm has significant relationship with information sharing behavior through the intention to share information. It was found to be a partial moderating effect of importance of information on the relationship among the reciprocity norm and the intention and behavior of sharing information.

  • PDF

A Study on the AR Identification of unknown system using Cumulant (Cumulant를 이용한 미지 시스템의 AR 식별에 관한 연구)

  • Lim, Seung-Gag
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.2 s.344
    • /
    • pp.39-43
    • /
    • 2006
  • This paper deals with the AR Identification of unknown system using cumulant, which is the 3rd order statistics of output signal in the presence of the noise signal. The algorithms for identification of unknown system we applies to the AR identification method using the cumulant which is possible to the guarantees of global convergence and the representation of amplitude and phase information of system among with the method of parametric modeling. In the process of identification, we considered unknown system to the one of AR system. After the generation of input signal, it was being passed through the system then We use the its output signal that the noise is added. As a result of identification of AR system by changing the signal to noise ratio, we get the fairly good results compared to original system output values and confirmed that the pole was located in the unit circle of z transform.

A visual identification key to Orchidaceae of Korea

  • Seo, Seon-Won;Oh, Sang-Hun
    • Korean Journal of Plant Taxonomy
    • /
    • v.47 no.2
    • /
    • pp.124-131
    • /
    • 2017
  • Species identification is a fundamental and routine process in plant systematics, and linguistic-based dichotomous keys are widely used in the identification process. Recently, novel tools for species identification have been developed to improve the accuracy, ease to use, and accessibility related to these tasks for a broad range of users given the advances in information and communications technology. A visual identification key is such an approach, in which couplets consist of images of plants or a part of a plant instead of botanical terminology. We developed a visual identification key for 101 taxa of Orchidaceae in Korea and evaluated its performance. It uses short statements for image couplets to avoid misinterpretations by users. The key at the initial steps (couplets) uses relatively easy characters that can be determined with the naked eye. The final steps of the visual key provide images of species and information about distributions and flowering times to determine the species that best fit the available information. The number of steps required to identify a species varies, ranging from three to ten with an average of 4.5. A performance test with senior college students showed that species were accurately identified using the visual key at a rate significantly higher than when using a linguistic-based dichotomous key and a color manual. The findings presented here suggest that the proposed visual identification key is a useful tool for the teaching of biodiversity at schools, for the monitoring of ecosystems by citizens, and in other areas that require rapid, easy, and accurate identifications of species.

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

A Health Management Service with Beacon-Based Identification for Preventive Elderly Care

  • Li, Jian-Wei;Chang, Yi-Chun;Xu, Min-Xiong;Huang, De-Yao
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.648-662
    • /
    • 2020
  • Bluetooth low energy (BLE) beacon is an actively push-to-broadcast electronic signal and can be used for object identification. This paper uses such beacon-based identification and Internet of Things (IoT) technologies for the elder health management service system to simplify the user interfaces and steps for preventive elder care. In the proposed system, an elder's family member, caregiver, or medical worker can conveniently and quickly record daily health management information. Besides, through the statistics and analysis of the data on the back end of the system, it is helpful for the elderly to refer to the data of daily care management and future management trends. Similarly, it is also an essential reference data for system maintenance and the new preventive health care services development.

Trends in Low Altitude Small Drone Identification Technology and Standardization (저고도 소형드론 식별 기술 및 표준화 동향)

  • Kang, K.M.;Park, J.C.;Choi, S.N.;Oh, J.H.;Hwang, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.6
    • /
    • pp.164-174
    • /
    • 2019
  • This article presents low altitude small drone identification trends at home and abroad. To reduce the dysfunction caused by the proliferation of drones worldwide, there is a growing interest in remote identification technologies that can identify the basic information of the drone. First, this article introduces policy trends in major countries. US, Europe, and China have recently provided recommendations regarding technologies available for the remote identification and tracking of a drone. Next, standardization activities on identification communications and identification systems are introduced. For this, standards organizations for the small drone identification, such as the International Organization for Standardization, IEEE 802, Radio Technical Commission for Aeronautics, International Civil Aviation Organization, and $3^{rd}$ Generation Partnership Project, are investigated. Finally, drone identification technology trends are introduced. In the US and Europe, various drone identification technologies have been studied to identify a drone owner and drone registration information with a drone identifier. In South Korea, drone identification technology is still in its infancy, whereas drone detection and physical counterattack technologies are somewhat more developed. As such, major drone manufacturers are also currently studying and developing drone identification systems.