• Title/Summary/Keyword: Issue Recognition

Search Result 399, Processing Time 0.023 seconds

Three Dimensional(3D) Education Game Development for Treatment Assistance with High-Functioning Autism

  • Tae-In Jang;Hyung-Joon Baek;Sojeong Lee;Hayoon Jo;Yuri Yoon;Janghwan Kim;R. Young Chul Kim;Chaeyun Seo
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.3
    • /
    • pp.309-316
    • /
    • 2024
  • Due to rapid socio-economic development and environmental changes, particularly autism spectrum disorder (ASD) in the context of Attention Deficit Hyperactivity Disorder (ADHD) and high-functioning autism, has become a significant social issue. This issue is increasingly recognized from a societal perspective rather than just an individual or family problem. But there remains a lack of information in frontline education. Traditionally, treatment for ASD has been conducted in specialized institutions, or by professional doctors, therapists, and counselors. There are still several challenges such as 1) accessibility to hospitals and transportation for children with ASD, 2) the maturity and competence of therapists, and 3) the lack of appropriate educational content. To solve these problems, we propose a supplementary 3D educational game process for children with high-functioning autism that utilize speech recognition technology and games designed for continuous and repetitive learning. Our proposed game content can be used at home, which incorporates Speech-To-Text (STT) technology and mini-games to help children indirectly experience and learn to handle unexpected real-life situations. With this approach, we will expect that the children can develop social skills and enhance the efficiency of their treatment.

Hospital Security System using Biometric Technology (바이오메트릭스 기술을 이용한 병원보안시스템)

  • Jung, Yong-Gyu;Kang, Jeong-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.219-224
    • /
    • 2011
  • Recently increasing importance of information security, personal security is researched. Among them, biometrics research is very good at recognition and security particularly in terms of iris recognition. Recent hospital physicians and employees for access control is emphasized. But most of them, easy-employee card access control systems are used. It has difficulties of iris recognition on the issue of accurate iris recognition algorithm to eliminate noise and inaccuracy of pretreatment methods for recognition from existing research. Therefore, this paper complements existing encryption methods to the disadvantages of biometric iris recognition using high-access records in the hospital management system is applied. In addition to conventional pretreatment process to increase recognition eyebrows when mask line component added to the extraction mask, the correct preparation method, and accordingly proposed to improve the recognition of records management systems offer access to the hospital.

Design of Multimodal User Interface using Speech and Gesture Recognition for Wearable Watch Platform (착용형 단말에서의 음성 인식과 제스처 인식을 융합한 멀티 모달 사용자 인터페이스 설계)

  • Seong, Ki Eun;Park, Yu Jin;Kang, Soon Ju
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.6
    • /
    • pp.418-423
    • /
    • 2015
  • As the development of technology advances at exceptional speed, the functions of wearable devices become more diverse and complicated, and many users find some of the functions difficult to use. In this paper, the main aim is to provide the user with an interface that is more friendly and easier to use. The speech recognition is easy to use and also easy to insert an input order. However, speech recognition is problematic when using on a wearable device that has limited computing power and battery. The wearable device cannot predict when the user will give an order through speech recognition. This means that while speech recognition must always be activated, because of the battery issue, the time taken waiting for the user to give an order is impractical. In order to solve this problem, we use gesture recognition. This paper describes how to use both speech and gesture recognition as a multimodal interface to increase the user's comfort.

Face Recognition System Technologies for Authentication System - A Survey (인증시스템을 위한 얼굴인식 기술 : 서베이)

  • Hwang, Yooncheol;Mun, Hyung-Jin;Lee, Jae-Wook
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.9-13
    • /
    • 2015
  • With the advance of ICT, the necessity of user authentication to verify the identity of an opponent online not face to face is increasing. The authentication, the basis of the security, is used in various fields. Because ID-based authentication has weaknesses in terms of stability and losses, two or more than two authentication tools are used in the place in which the security is important. Recently, biometric authentication rather than ID, OTP, SMS authentication has been an issue in terms of credibility and efficiency. As the fields applied to current biometric recognition technologies are increasing, the application of the biometric recognition is being used in various fields such as mobile payment system, intelligent CCTV, immigration inspection, and access control. As the biometric recognition, finger print, iris, retina, vein, and face recognition have been studied actively. This study is to inspect the current state of domestic and foreign standardization including understanding of the face recognition and the trend of technology.

  • PDF

Arabic Words Extraction and Character Recognition from Picturesque Image Macros with Enhanced VGG-16 based Model Functionality Using Neural Networks

  • Ayed Ahmad Hamdan Al-Radaideh;Mohd Shafry bin Mohd Rahim;Wad Ghaban;Majdi Bsoul;Shahid Kamal;Naveed Abbas
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1807-1822
    • /
    • 2023
  • Innovation and rapid increased functionality in user friendly smartphones has encouraged shutterbugs to have picturesque image macros while in work environment or during travel. Formal signboards are placed with marketing objectives and are enriched with text for attracting people. Extracting and recognition of the text from natural images is an emerging research issue and needs consideration. When compared to conventional optical character recognition (OCR), the complex background, implicit noise, lighting, and orientation of these scenic text photos make this problem more difficult. Arabic language text scene extraction and recognition adds a number of complications and difficulties. The method described in this paper uses a two-phase methodology to extract Arabic text and word boundaries awareness from scenic images with varying text orientations. The first stage uses a convolution autoencoder, and the second uses Arabic Character Segmentation (ACS), which is followed by traditional two-layer neural networks for recognition. This study presents the way that how can an Arabic training and synthetic dataset be created for exemplify the superimposed text in different scene images. For this purpose a dataset of size 10K of cropped images has been created in the detection phase wherein Arabic text was found and 127k Arabic character dataset for the recognition phase. The phase-1 labels were generated from an Arabic corpus of quotes and sentences, which consists of 15kquotes and sentences. This study ensures that Arabic Word Awareness Region Detection (AWARD) approach with high flexibility in identifying complex Arabic text scene images, such as texts that are arbitrarily oriented, curved, or deformed, is used to detect these texts. Our research after experimentations shows that the system has a 91.8% word segmentation accuracy and a 94.2% character recognition accuracy. We believe in the future that the researchers will excel in the field of image processing while treating text images to improve or reduce noise by processing scene images in any language by enhancing the functionality of VGG-16 based model using Neural Networks.

Vision Based Sensor Fusion System of Biped Walking Robot for Environment Recognition (영상 기반 센서 융합을 이용한 이쪽로봇에서의 환경 인식 시스템의 개발)

  • Song, Hee-Jun;Lee, Seon-Gu;Kang, Tae-Gu;Kim, Dong-Won;Seo, Sam-Jun;Park, Gwi-Tae
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.123-125
    • /
    • 2006
  • This paper discusses the method of vision based sensor fusion system for biped robot walking. Most researches on biped walking robot have mostly focused on walking algorithm itself. However, developing vision systems for biped walking robot is an important and urgent issue since biped walking robots are ultimately developed not only for researches but to be utilized in real life. In the research, systems for environment recognition and tole-operation have been developed for task assignment and execution of biped robot as well as for human robot interaction (HRI) system. For carrying out certain tasks, an object tracking system using modified optical flow algorithm and obstacle recognition system using enhanced template matching and hierarchical support vector machine algorithm by wireless vision camera are implemented with sensor fusion system using other sensors installed in a biped walking robot. Also systems for robot manipulating and communication with user have been developed for robot.

  • PDF

A Study on the Performance Evaluation based on Modular Face Recognition System (모듈화된 얼굴인식 시스템을 이용한 성능 시험에 관한 연구)

  • Hong Tae-Hwa;Moon Hyeon-Joon;Shin Yong-Nyuo;Lee Dong-Geun;Kim Jae-Sung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.4 s.304
    • /
    • pp.35-44
    • /
    • 2005
  • Face recognition out of biometrics is considerable interesting due to high performance and accessibility in applications to security such as access control and banking service. Therefore, a study on the protocol of the performance test is an important issue to understand the art-of state and to show a direction in future works, in addtion to developing algorithms. We present a design criterion for the performance test protocol of face recognition system and show the result of experiment executed on identification and verification scenario based on PCA algorithm and XM2VTS DB

Public Policy Exception under Russian Law as a Ground for Refusing Recognition and Enforcement of Foreign Arbitral Awards

  • Andreevskikh, Liliia;Park, Eun-ok
    • Journal of Arbitration Studies
    • /
    • v.32 no.3
    • /
    • pp.47-70
    • /
    • 2022
  • This paper studies legal regulation of the public policy exception in the Russian Federation and domestic judicial practice on the issue. It reviews current legislation and analyzes a number of recent court cases where an arbitral award rendered by a foreign arbitration body was refused recognition and enforcement based on public policy violation. By doing so, it contributes to the knowledge on the concept of public policy in the Russian legal system and how public policy can affect the process of recognition and enforcement of foreign arbitral awards on its territory. The review of court cases demonstrates different aspects of how the public policy exception can be applied by Russian arbitrazh courts. Such decisions can provide a clearer picture of the kinds of situation that can lead to invoking the public policy clause by the court. Also, it is of practical value as persons preparing to file a claim or to be a defendant in a Russian court can be required to present existing court decisions in support of their claim or defence.

Conflict Resolution: Analysis of the Existing Theories and Resolution Strategies in Relation to Face Recognition

  • A. A. Alabi;B. S. Afolabi;B. I. Akhigbe;A. A. Ayoade
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.166-176
    • /
    • 2023
  • A scenario known as conflict in face recognition may arise as a result of some disparity-related issues (such as expression, distortion, occlusion and others) leading to a compromise of someone's identity or contradiction of the intended message. However, addressing this requires the determination and application of appropriate procedures among the various conflict theories both in terms of concepts as well as resolution strategies. Theories such as Marxist, Game theory (Prisoner's dilemma, Penny matching, Chicken problem), Lanchester theory and Information theory were analyzed in relation to facial images conflict and these were made possible by trying to provide answers to selected questions as far as resolving facial conflict is concerned. It has been observed that the scenarios presented in the Marxist theory agree with the form of resolution expected in the analysis of conflict and its related issues as they relate to face recognition. The study observed that the issue of conflict in facial images can better be analyzed using the concept introduced by the Marxist theory in relation to the Information theory. This is as a result of its resolution strategy which tends to seek a form of balance as result as opposed to the win or lose case scenarios applied in other concepts. This was also consolidated by making reference to the main mechanisms and result scenario applicable in Information theory.

A Study on Students' Recognition and Practice of Patient's Medical Information Protection, who are majoring in Medical Records (의무기록 전공학생들의 환자 의료정보 보호인식과 실천인식에 관한 연구)

  • Jung, Sang-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.585-594
    • /
    • 2016
  • This study is aimed at researching and analyzing the students' recognition and practice of the patents medical information, who are majoring in medical records and will be working as medical records technician, letting them recognize the importance of information, and at offering basic data required for development of medical records curriculum and for establishment of medical records protection policy. This study was conducted from 18th May through 6th June 2015, targeting 340 students enrolled four universities, by t-test, variance analysis, Pearson correlation analysis and multiple regression analysis. As a result of this study, the point of protection recognition and practice recognition is 3.55 and 3.49, respectively, out of 5. With regard to recognition of medical information protection, there was a significant difference in grade, satisfaction for major, experience of medical information protection education and recognition of law, while for recognition of practice, in grade, satisfaction for major, educational experience and damage of medical information exposure. Recognition of protection and recognition of practice had a significant static correlation, and recognition of information exposure, recognition of social issue and recognition of legal system had significant positive effect on recognition of practice. In order to raise the recognition of protection and recognition of practice, based on this study, it is considered necessary for the universities to educate the damage of medical information exposure and importance of medical records management, and to raise the students' recognition.