• Title/Summary/Keyword: Personal Recognition

Search Result 688, Processing Time 0.027 seconds

Isolated Words Recognition using Correlation VQ-HMM (상관성있는 VQ-HMM을 이용한 고립 단어 인식)

  • 이진수
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1993.06a
    • /
    • pp.109-112
    • /
    • 1993
  • In this paper, we propose the modified VQ, applied correlation between codewords in order to reduce the error rate due to personal and speakers' temporal variation. Such a modified VQ is used in the stage of preprocessing of HMM and the temporal variation is absorbed by nonlinear Decimation and Interpolation of vowel part that we obtain higher recognition rate than not so case. The objects of experiment are Korea 142 DDD regional names and we show that the proposed method increase the recognition rate.

  • PDF

Human Posture Recognition: Methodology and Implementation

  • Htike, Kyaw Kyaw;Khalifa, Othman O.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1910-1914
    • /
    • 2015
  • Human posture recognition is an attractive and challenging topic in computer vision due to its promising applications in the areas of personal health care, environmental awareness, human-computer-interaction and surveillance systems. Human posture recognition in video sequences consists of two stages: the first stage is training and evaluation and the second is deployment. In the first stage, the system is trained and evaluated using datasets of human postures to ‘teach’ the system to classify human postures for any future inputs. When the training and evaluation process is deemed satisfactory as measured by recognition rates, the trained system is then deployed to recognize human postures in any input video sequence. Different classifiers were used in the training such as Multilayer Perceptron Feedforward Neural networks, Self-Organizing Maps, Fuzzy C Means and K Means. Results show that supervised learning classifiers tend to perform better than unsupervised classifiers for the case of human posture recognition.

A Study of the Pattern Kernels for a Lip Print Recognition

  • Paik, Kyoung-Seok;Chung, Chin-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.64-69
    • /
    • 1998
  • This paper presents a lip print recognition by the pattern kernels for a personal identification. A lip print recognition is developed less than the other physical attributes of a fingerprint, a voice pattern, a retinal blood/vessel pattern, or a facial recognition. A new method is proposed to recognize a lip print bi the pattern kernels. The pattern kernels are a function consisted of some local lip print pattern masks. This function converts the information on a lip print into the digital data. The recognition in the multi-resolution system is more reliable than recognition in the single-resolution system. The results show that the proposed algorithm by the multi-resolution architecture can be efficiently realized.

  • PDF

The Effects of Children's Self-perception and Human Rights Recognition in Local Children Center - Focusing on moderation effects of right guarantee and use satisfaction -

  • Rho, Seon-duk;Sim, Mi-young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.201-207
    • /
    • 2019
  • The purpose of this study is to suggest some implications by empirical testing the relationships between children's self-perception and human rights recognition in local children's center. For this study, Total 438 children were sampled and surveyed. The analytical results are the followings. First, personal characteristics was shown to have a significant effect to human right recognition. Second, self-perception was shown to have a significant effect to human right recognition. Third, right guarantee of center was shown to moderate the relationship between self-perception and human right recognition. This study provides some theoretical and polcy implications basing on these analytical results.

Recognition Levels on Personal Health Record in Accordance with Age and Disease Risk Factors (연령과질병위험인자 보유 여부에 따른 개인보건정보기록에 대한 인지도의 차이)

  • Son, Hyeon-S.;Rhee, Hyun-Sill
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11b
    • /
    • pp.763-765
    • /
    • 2010
  • Objectives: The aim of the research was to evaluate the recognition levels on PHR (Personal Health Record) which was regarded as a valuable tool in health areas. Old and young age groups (mostly university students) were two groups that were under investigation. The young age group was deliberately asked to pretend they were members in the old age group (adult group here after) in order to investigate the recognition level differences in such conditions. Methods: We performed common and grouping analyses based on two hypotheses. Firstly the survey results should be different in both age groups. Secondly people who had high risk factors of a disease (obesity in our study) should show higher recognition level on PHR based on an assumption that they were aware of serious outcome of the disease more than the others. Results & Conclusion: The first hypothesis was rejected as both groups show similar patterns in responding the survey. The second hypothesis was also rejected because both groups showed responses in similar patterns. Based on the outcome of our study and analyses, we concluded that there would be no differences in recognition levels on PHR between young and adult groups. Also, possession of disease risk factors, at least for obesity, would not affect the recognition level of PHR. Further elaborate researches with larger groups on the topic may be necessary in order to validate the method and to expand for various applications.

  • PDF

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

Iris Pattern Recognition for Personal Identification and Authentication Algorithm (개인확인 및 인증 알고리즘을 위한 홍채 패턴인식)

  • Go, Hyoun-Joo;Lee, Sang-Won;Chun, Myung-Geun
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.499-506
    • /
    • 2001
  • In this work, we present an iris pattern recognition method as a biometrically based technology for personal identification and authentication For this, we propose a new algorithm for extracting an unique feature from the iris of the human eye and representing this feature using the discrete Walsh-Hadamard transform. From the computational simplicity of the adopted transform, this can perform the personal identification and authentication in a fast manner to accomplish the information security.

  • PDF

Factors Associated with Middle Managers' Work Motivation: Evidence from SMEs in Vietnam

  • NGUYEN, Huong Thanh;NGUYEN, Nguyen Danh;TRAN, Binh Van
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.1009-1019
    • /
    • 2020
  • This study presents an exploratory investigation of SMEs in Vietnam to understand the impact of personal-level factors on middle managers' work motivation and the moderating role of work environment. A survey of 450 middle managers (MMs) in 150 Hanoi's SMEs was conducted. The findings of this research showed a significant positive impact of Achievement (ACHV), Recognition (RECOG), and Responsibility (RESP) on work motivation of MMs under the investigation. Furthermore, the result indicated that the work environment affects the relationship between personal-level factors and work motivation of participants. Consequently, both work environment improvement and strategies related to personal-level factors need to be taken into consideration. Especially, Recognition and transparency in Responsibility are appreciated in organizations with a low level of work environment satisfaction. However, there were no indications that Participation (PAR) and Communication (CMM) have a considerable impact on work motivation of respondents, being neither low level nor high level of work environment satisfaction. Based on the findings, recommendations are suggested for Vietnam's SMEs to improve work motivation of MMs, by (i) developing standards with emphasis on their achievement, (ii) paying attention to organizational culture focusing on the responsibility of this managerial level, and (iii) building an adequate incentive system, especially non-financial incentives.

The Condition Analysis about Job Satisfaction and Separation Propensity of Foodservice Industry Culinary Employee′s (외식산업 조리종사자의 직무만족과 이직성향에 대한 실태분석)

  • 이선호;김선희;김민수
    • Culinary science and hospitality research
    • /
    • v.9 no.4
    • /
    • pp.37-53
    • /
    • 2003
  • The purpose of this study was to find out efficient control plan for productivity increase. To analyze the data, the measure of question a paper was used to 5 a point measure, statistics disposition was used to SPSS, the analyze method was used to frequency analyze, trust degree analyze, difference analyze useful average value, person's correlation analyze, revolution analyze. The results of this study could be explained as follow: First, find out high change separation propensity. Secondly, was subjected important for atmosphere composition and was required strategy consideration for stable job recognition. Third, was operated affirmative to recognition about separation and was increased to job satisfaction according as a colleague relation and team work. Fourth, was increased to comparative separation propensity in case that high job satisfaction. Therefore it is required interesting labor item and treatment development about personal evaluation.

  • PDF

Volume Holographic Fingerprint Recognition System for Personal Identification (개인 인증을 위한 체적 홀로그래픽 지문인식 시스템)

  • 이승현
    • Journal of the Korean Society of Safety
    • /
    • v.13 no.4
    • /
    • pp.256-263
    • /
    • 1998
  • In this paper, we propose a volume holographic fingerprint recognition system based on optical correlator for personal identification. Optical correlator has high speed and parallel processing characteristics of optics. Matched filters are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference images of database are prerecorded in a photorefractive crystal in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database can be achieved by rotating the crystal by use of a step motor. Experimental results show that the proposed system can be used for the security verification system.

  • PDF