• Title/Summary/Keyword: Source recognition

Search Result 378, Processing Time 0.024 seconds

Analysis of Real-Time Estimation Method Based on Hidden Markov Models for Battery System States of Health

  • Piao, Changhao;Li, Zuncheng;Lu, Sheng;Jin, Zhekui;Cho, Chongdu
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.217-226
    • /
    • 2016
  • A new method is proposed based on a hidden Markov model (HMM) to estimate and analyze battery states of health. Battery system health states are defined according to the relationship between internal resistance and lifetime of cells. The source data (terminal voltages and currents) can be obtained from vehicular battery models. A characteristic value extraction method is proposed for HMM. A recognition framework and testing datasets are built to test the estimation rates of different states. Test results show that the estimation rates achieved based on this method are above 90% under single conditions. The method achieves the same results under hybrid conditions. We can also use the HMMs that correspond to hybrid conditions to estimate the states under a single condition. Therefore, this method can achieve the purpose of the study in estimating battery life states. Only voltage and current are used in this method, thereby establishing its simplicity compared with other methods. The batteries can also be tested online, and the method can be used for online prediction.

Weibo Disaster Rumor Recognition Method Based on Adversarial Training and Stacked Structure

  • Diao, Lei;Tang, Zhan;Guo, Xuchao;Bai, Zhao;Lu, Shuhan;Li, Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3211-3229
    • /
    • 2022
  • To solve the problems existing in the process of Weibo disaster rumor recognition, such as lack of corpus, poor text standardization, difficult to learn semantic information, and simple semantic features of disaster rumor text, this paper takes Sina Weibo as the data source, constructs a dataset for Weibo disaster rumor recognition, and proposes a deep learning model BERT_AT_Stacked LSTM for Weibo disaster rumor recognition. First, add adversarial disturbance to the embedding vector of each word to generate adversarial samples to enhance the features of rumor text, and carry out adversarial training to solve the problem that the text features of disaster rumors are relatively single. Second, the BERT part obtains the word-level semantic information of each Weibo text and generates a hidden vector containing sentence-level feature information. Finally, the hidden complex semantic information of poorly-regulated Weibo texts is learned using a Stacked Long Short-Term Memory (Stacked LSTM) structure. The experimental results show that, compared with other comparative models, the model in this paper has more advantages in recognizing disaster rumors on Weibo, with an F1_Socre of 97.48%, and has been tested on an open general domain dataset, with an F1_Score of 94.59%, indicating that the model has better generalization.

A Survey on Deep Learning based Face Recognition for User Authentication (사용자 인증을 위한 딥러닝 기반 얼굴인식 기술 동향)

  • Mun, Hyung-Jin;Kim, Gea-Hee
    • Journal of Industrial Convergence
    • /
    • v.17 no.3
    • /
    • pp.23-29
    • /
    • 2019
  • Object recognition distinguish objects which are different from each other. But Face recognition distinguishes Identity of Faces with Similar Patterns. Feature extraction algorithm such as LBP, HOG, Gabor is being replaced with Deep Learning. As the technology that identify individual face with machine learning using Deep Learning Technology is developing, The Face Recognition Technology is being used in various field. In particular, the technology can provide individual and detailed service by being used in various offline environments requiring user identification, such as Smart Mirror. Face Recognition Technology can be developed as the technology that authenticate user easily by device like Smart Mirror and provide service authenticated user. In this paper, we present investigation about Face Recognition among various techniques for user authentication and analysis of Python source case of Face recognition and possibility of various service using Face Recognition Technology.

Hierarchical Hand Pose Model for Hand Expression Recognition (손 표현 인식을 위한 계층적 손 자세 모델)

  • Heo, Gyeongyong;Song, Bok Deuk;Kim, Ji-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1323-1329
    • /
    • 2021
  • For hand expression recognition, hand pose recognition based on the static shape of the hand and hand gesture recognition based on the dynamic hand movement are used together. In this paper, we propose a hierarchical hand pose model based on finger position and shape for hand expression recognition. For hand pose recognition, a finger model representing the finger state and a hand pose model using the finger state are hierarchically constructed, which is based on the open source MediaPipe. The finger model is also hierarchically constructed using the bending of one finger and the touch of two fingers. The proposed model can be used for various applications of transmitting information through hands, and its usefulness was verified by applying it to number recognition in sign language. The proposed model is expected to have various applications in the user interface of computers other than sign language recognition.

Web-based University Classroom Attendance System Based on Deep Learning Face Recognition

  • Ismail, Nor Azman;Chai, Cheah Wen;Samma, Hussein;Salam, Md Sah;Hasan, Layla;Wahab, Nur Haliza Abdul;Mohamed, Farhan;Leng, Wong Yee;Rohani, Mohd Foad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.503-523
    • /
    • 2022
  • Nowadays, many attendance applications utilise biometric techniques such as the face, fingerprint, and iris recognition. Biometrics has become ubiquitous in many sectors. Due to the advancement of deep learning algorithms, the accuracy rate of biometric techniques has been improved tremendously. This paper proposes a web-based attendance system that adopts facial recognition using open-source deep learning pre-trained models. Face recognition procedural steps using web technology and database were explained. The methodology used the required pre-trained weight files embedded in the procedure of face recognition. The face recognition method includes two important processes: registration of face datasets and face matching. The extracted feature vectors were implemented and stored in an online database to create a more dynamic face recognition process. Finally, user testing was conducted, whereby users were asked to perform a series of biometric verification. The testing consists of facial scans from the front, right (30 - 45 degrees) and left (30 - 45 degrees). Reported face recognition results showed an accuracy of 92% with a precision of 100% and recall of 90%.

Interference Suppression Using Principal Subspace Modification in Multichannel Wiener Filter and Its Application to Speech Recognition

  • Kim, Gi-Bak
    • ETRI Journal
    • /
    • v.32 no.6
    • /
    • pp.921-931
    • /
    • 2010
  • It has been shown that the principal subspace-based multichannel Wiener filter (MWF) provides better performance than the conventional MWF for suppressing interference in the case of a single target source. It can efficiently estimate the target speech component in the principal subspace which estimates the acoustic transfer function up to a scaling factor. However, as the input signal-to-interference ratio (SIR) becomes lower, larger errors are incurred in the estimation of the acoustic transfer function by the principal subspace method, degrading the performance in interference suppression. In order to alleviate this problem, a principal subspace modification method was proposed in previous work. The principal subspace modification reduces the estimation error of the acoustic transfer function vector at low SIRs. In this work, a frequency-band dependent interpolation technique is further employed for the principal subspace modification. The speech recognition test is also conducted using the Sphinx-4 system and demonstrates the practical usefulness of the proposed method as a front processing for the speech recognizer in a distant-talking and interferer-present environment.

Neural Learning Algorithms for Independent Component Analysis

  • Choi, Seung-Jin
    • Journal of IKEEE
    • /
    • v.2 no.1 s.2
    • /
    • pp.24-33
    • /
    • 1998
  • Independent Component analysis (ICA) is a new statistical method for extracting statistically independent components from their linear instantaneous mixtures which are generated by an unknown linear generative model. The recognition model is learned in unsupervised manner so that the recovered signals by the recognition model become the possibly scaled estimates of original source signals. This paper addresses the neural learning approach to ICA. As recognition models a linear feedforward network and a linear feedback network are considered. Associated learning algorithms for both networks are derived from maximum likelihood and information-theoretic approaches, using natural Riemannian gradient [1]. Theoretical results are confirmed by extensive computer simulations.

  • PDF

Robust Speech Recognition Using Independent Component Analysis (독립성분분석을 이용한 강인한 음성인식)

  • 임형규;이창기
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.269-274
    • /
    • 2004
  • Noisy speech recognition is one of most important problems in speech recognition. In this paper, a method which efficiently removes the mixed noise with speech, is proposed. The proposed method is based on the ICA to separate the mixed noise. ICA(Independent component analysis) is a signal processing technique, whose goal is to express a set of random variables as linear combinations of components that are statistically as independent from each other as possible.

  • PDF

Smartphone Based FND Recognition Method using sequential difference images and ART-II Clustering (차영상과 ART2 클러스터링을 이용한 스마트폰 기반의 FND 인식 기법)

  • Koo, Kyung-Mo;Cha, Eui-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1377-1382
    • /
    • 2012
  • In this paper, we propose a novel recognition method that extract source data from encoded signal that are displayed on FND mounted on home appliances. First of all, it find a candidate FND region from sequential difference images taken by smartphone and extract segment image using clustering RGB value. After that, it normalize segment images to correct a slant error and recognize each segments using a relative distance. Experiments show the robustness of the recognition algorithm on smartphone.

Construction of an PFT database with various clinical information using optical character recognition and regular expression technique

  • Park, Man Young;Park, Rae Woong
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.55-60
    • /
    • 2017
  • The pulmonary function test (PFT) is an essential data source for evaluating the effect of drugs on the lungs or the status of lung function. However, the numeric values of PFT cannot be easily used for clinical studies without labor-intensive manual efforts, because PFTs are usually recorded as image files. This study was aimed at constructing a de-identified, open-access PFT database with various clinical information. For constructing the PFT database, optical character recognition (OCR), regular expression, and the parsing technique were used to extract alphanumeric data from the PFT images in a Korean tertiary teaching hospital. This longitudinal observational database contains 413,000 measurements of PFT from 183,000 patients.