• Title/Summary/Keyword: Identity Matrix

Search Result 108, Processing Time 0.028 seconds

Wine Label Character Recognition in Mobile Phone Images using a Lexicon-Driven Post-Processing (사전기반 후처리를 이용한 모바일 폰 영상에서 와인 라벨 문자 인식)

  • Lim, Jun-Sik;Kim, Soo-Hyung;Lee, Chil-Woo;Lee, Guee-Sang;Yang, Hyung-Jung;Lee, Myung-Eun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.546-550
    • /
    • 2010
  • In this paper, we propose a method for the postprocessing of cursive script recognition in Wine Label Images. The proposed method mainly consists of three steps: combination matrix generation, character combination filtering, string matching. Firstly, the combination matrix generation step detects all possible combinations from a recognition result for each of the pieces. Secondly, the unnecessary information in the combination matrix is removed by comparing with bigram of word in the lexicon. Finally, string matching step decides the identity of result as a best matched word in the lexicon based on the levenshtein distance. An experimental result shows that the recognition accuracy is 85.8%.

Development of Combined Architecture of Multiple Deep Convolutional Neural Networks for Improving Video Face Identification (비디오 얼굴 식별 성능개선을 위한 다중 심층합성곱신경망 결합 구조 개발)

  • Kim, Kyeong Tae;Choi, Jae Young
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.6
    • /
    • pp.655-664
    • /
    • 2019
  • In this paper, we propose a novel way of combining multiple deep convolutional neural network (DCNN) architectures which work well for accurate video face identification by adopting a serial combination of 3D and 2D DCNNs. The proposed method first divides an input video sequence (to be recognized) into a number of sub-video sequences. The resulting sub-video sequences are used as input to the 3D DCNN so as to obtain the class-confidence scores for a given input video sequence by considering both temporal and spatial face feature characteristics of input video sequence. The class-confidence scores obtained from corresponding sub-video sequences is combined by forming our proposed class-confidence matrix. The resulting class-confidence matrix is then used as an input for learning 2D DCNN learning which is serially linked to 3D DCNN. Finally, fine-tuned, serially combined DCNN framework is applied for recognizing the identity present in a given test video sequence. To verify the effectiveness of our proposed method, extensive and comparative experiments have been conducted to evaluate our method on COX face databases with their standard face identification protocols. Experimental results showed that our method can achieve better or comparable identification rate compared to other state-of-the-art video FR methods.

Heterogeneous Face Recognition Using Texture feature descriptors (텍스처 기술자들을 이용한 이질적 얼굴 인식 시스템)

  • Bae, Han Byeol;Lee, Sangyoun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.3
    • /
    • pp.208-214
    • /
    • 2021
  • Recently, much of the intelligent security scenario and criminal investigation demands for matching photo and non-photo. Existing face recognition system can not sufficiently guarantee these needs. In this paper, we propose an algorithm to improve the performance of heterogeneous face recognition systems by reducing the different modality between sketches and photos of the same person. The proposed algorithm extracts each image's texture features through texture descriptors (gray level co-occurrence matrix, multiscale local binary pattern), and based on this, generates a transformation matrix through eigenfeature regularization and extraction techniques. The score value calculated between the vectors generated in this way finally recognizes the identity of the sketch image through the score normalization methods.

Genetic Diversity and Differentiation of Colletotrichum spp. Isolates Associated with Leguminosae Using Multigene Loci, RAPD and ISSR

  • Mahmodi, Farshid;Kadir, J.B.;Puteh, A.;Pourdad, S.S.;Nasehi, A.;Soleimani, N.
    • The Plant Pathology Journal
    • /
    • v.30 no.1
    • /
    • pp.10-24
    • /
    • 2014
  • Genetic diversity and differentiation of 50 Colletotrichum spp. isolates from legume crops studied through multigene loci, RAPD and ISSR analysis. DNA sequence comparisons by six genes (ITS, ACT, Tub2, CHS-1, GAPDH, and HIS3) verified species identity of C. truncatum, C. dematium and C. gloeosporiodes and identity C. capsici as a synonym of C. truncatum. Based on the matrix distance analysis of multigene sequences, the Colletotrichum species showed diverse degrees of intera and interspecific divergence (0.0 to 1.4%) and (15.5-19.9), respectively. A multilocus molecular phylogenetic analysis clustered Colletotrichum spp. isolates into 3 well-defined clades, representing three distinct species; C. truncatum, C. dematium and C. gloeosporioides. The ISSR and RAPD and cluster analysis exhibited a high degree of variability among different isolates and permitted the grouping of isolates of Colletotrichum spp. into three distinct clusters. Distinct populations of Colletotrichum spp. isolates were genetically in accordance with host specificity and inconsistent with geographical origins. The large population of C. truncatum showed greater amounts of genetic diversity than smaller populations of C. dematium and C. gloeosporioides species. Results of ISSR and RAPD markers were congruent, but the effective maker ratio and the number of private alleles were greater in ISSR markers.

Identifying the biological and physical essence of protein-protein network for yeast proteome : Eigenvalue and perturbation analysis of Laplacian matrix (이스트 프로테옴에 대한 단백질-단백질 네트워크의 생물학적 및 물리학적 정보인식 : 라플라스 행렬에 대한 고유치와 섭동분석)

  • Chang, Ik-Soo;Cheon, Moo-Kyung;Moon, Eun-Joung;Kim, Choong-Rak
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2004.11a
    • /
    • pp.265-271
    • /
    • 2004
  • The interaction network of protein -protein plays an important role to understand the various biological functions of cells. Currently, the high -throughput experimental techniques (two -dimensional gel electrophoresis, mass spectroscopy, yeast two -hybrid assay) provide us with the vast amount of data for protein-protein interaction at the proteome scale. In order to recognize the role of each protein in their network, the efficient bioinformatical and computational analysis methods are required. We propose a systematic and mathematical method which can analyze the protein -protein interaction network rigorously and enable us to capture the biological and physical essence of a topological character and stability of protein -protein network, and sensitivity of each protein along the biological pathway of their network. We set up a Laplacian matrix of spectral graph theory based on the protein-protein network of yeast proteome, and perform an eigenvalue analysis and apply a perturbation method on a Laplacian matrix, which result in recognizing the center of protein cluster, the identity of hub proteins around it and their relative sensitivities. Identifying the topology of protein -protein network via a Laplacian matrix, we can recognize the important relation between the biological pathway of yeast proteome and the formalism of master equation. The results of our systematic and mathematical analysis agree well with the experimental findings of yeast proteome. The biological function and meaning of each protein cluster can be explained easily. Our rigorous analysis method is robust for understanding various kinds of networks whether they are biological, social, economical...etc

  • PDF

Illumination Robust Face Recognition using Ridge Regressive Bilinear Models (Ridge Regressive Bilinear Model을 이용한 조명 변화에 강인한 얼굴 인식)

  • Shin, Dong-Su;Kim, Dai-Jin;Bang, Sung-Yang
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.1
    • /
    • pp.70-78
    • /
    • 2007
  • The performance of face recognition is greatly affected by the illumination effect because intra-person variation under different lighting conditions can be much bigger than the inter-person variation. In this paper, we propose an illumination robust face recognition by separating identity factor and illumination factor using the symmetric bilinear models. The translation procedure in the bilinear model requires a repetitive computation of matrix inverse operation to reach the identity and illumination factors. Sometimes, this computation may result in a nonconvergent case when the observation has an noisy information. To alleviate this situation, we suggest a ridge regressive bilinear model that combines the ridge regression into the bilinear model. This combination provides some advantages: it makes the bilinear model more stable by shrinking the range of identity and illumination factors appropriately, and it improves the recognition performance by reducing the insignificant factors effectively. Experiment results show that the ridge regressive bilinear model outperforms significantly other existing methods such as the eigenface, quotient image, and the bilinear model in terms of the recognition rate under a variety of illuminations.

Shrinkage Model Selection for Portfolio Optimization on Vietnam Stock Market

  • NGUYEN, Nhat;NGUYEN, Trung;TRAN, Tuan;MAI, An
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.135-145
    • /
    • 2020
  • This paper provides the practical application of a linear shrinkage framework on Vietnam stock market. The cumulative data points observed in this analysis are 468 weeks from January 2011 to December 2019. All the companies listed on Ho Chi Minh City Stock Exchange (HOSE), except the companies under two years period from Initial Public Offering (IPO), are considered. The cumulative number of stocks picked is therefore 350 companies. The VNINDEX, which is the Vietnam Stock Index, is used as a reference index for shrinking to a single-index model. The empirical results show that the shrinkage of covariance matrix for portfolio optimization gives the promising results for the investors on Vietnam stock market. The shrinkage method helps the investors to produce the optimal portfolio in the sense of having higher profit with lower levels of risk compared to the portfolio of the traditional SCM method. Moreover, the portfolio turnover of shrinkage method is always kept at low magnitudes, and this makes the shrinkage portfolios save much transaction costs and reduce the liquidity risks in the trading process. In addition, the ability of shrinkage method in making profit is once again confirmed by the Alpha coefficient that achieves a high positive value.

THE STRUCTURE OF SEMIPERFECT RINGS

  • Han, Jun-Cheol
    • Journal of the Korean Mathematical Society
    • /
    • v.45 no.2
    • /
    • pp.425-433
    • /
    • 2008
  • Let R be a ring with identity $1_R$ and let U(R) denote the group of all units of R. A ring R is called locally finite if every finite subset in it generates a finite semi group multiplicatively. In this paper, some results are obtained as follows: (1) for any semilocal (hence semiperfect) ring R, U(R) is a finite (resp. locally finite) group if and only if R is a finite (resp. locally finite) ring; U(R) is a locally finite group if and only if U$(M_n(R))$ is a locally finite group where $M_n(R)$ is the full matrix ring of $n{\times}n$ matrices over R for any positive integer n; in addition, if $2=1_R+1_R$ is a unit in R, then U(R) is an abelian group if and only if R is a commutative ring; (2) for any semiperfect ring R, if E(R), the set of all idempotents in R, is commuting, then $R/J\cong\oplus_{i=1}^mD_i$ where each $D_i$ is a division ring for some positive integer m and |E(R)|=$2^m$; in addition, if 2=$1_R+1_R$ is a unit in R, then every idempotent is central.

Sampled-Data Controller Design for Nonlinear Systems Including Singular Perturbation in Takagi-Sugeno Form (특이섭동을 포함한 타카기 - 수게노 형태의 비선형 시스템을 위한 새로운 샘플치 제어기의 설계기법 제안)

  • Moon, Ji Hyun;Lee, Jaejun;Lee, Ho Jae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.50-55
    • /
    • 2016
  • This paper discusses a sampled-data controller design problem for nonlinear systems including singular perturbation. The concerned system is assumed to be modeled in Takagi--Sugeno (T--S) form. By introducing a novel Lyapunov function and an identity equation, the stability of the sampled-data closed-loop dynamics of the singularly perturbed T--S fuzzy system is analyzed. The design condition is represented in terms of linear matrix inequalities. A few discussions on the development are made that propose future research topics. Numerical simulation shows the effectiveness of the proposed method.

A Differential Privacy Approach to Preserve GWAS Data Sharing based on A Game Theoretic Perspective

  • Yan, Jun;Han, Ziwei;Zhou, Yihui;Lu, Laifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1028-1046
    • /
    • 2022
  • Genome-wide association studies (GWAS) aim to find the significant genetic variants for common complex disease. However, genotype data has privacy information such as disease status and identity, which make data sharing and research difficult. Differential privacy is widely used in the privacy protection of data sharing. The current differential privacy approach in GWAS pays no attention to raw data but to statistical data, and doesn't achieve equilibrium between utility and privacy, so that data sharing is hindered and it hampers the development of genomics. To share data more securely, we propose a differential privacy preserving approach of data sharing for GWAS, and achieve the equilibrium between privacy and data utility. Firstly, a reasonable disturbance interval for the genotype is calculated based on the expected utility. Secondly, based on the interval, we get the Nash equilibrium point between utility and privacy. Finally, based on the equilibrium point, the original genotype matrix is perturbed with differential privacy, and the corresponding random genotype matrix is obtained. We theoretically and experimentally show that the method satisfies expected privacy protection and utility. This method provides engineering guidance for protecting GWAS data privacy.