• Title/Summary/Keyword: User recognition

Search Result 1,357, Processing Time 0.026 seconds

Development of Speech Recognition System based on User Context Information in Smart Home Environment (스마트 홈 환경에서 사용자 상황정보 기반의 음성 인식 시스템 개발)

  • Kim, Jong-Hun;Sim, Jae-Ho;Song, Chang-Woo;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.328-338
    • /
    • 2008
  • Most speech recognition systems that have a large capacity and high recognition rates are isolated word speech recognition systems. In order to extend the scope of recognition, it is necessary to increase the number of words that are to be searched. However, it shows a problem that exhibits a decrease in the system performance according to the increase in the number of words. This paper defines the context information that affects speech recognition in a ubiquitous environment to solve such a problem and develops user localization method using inertial sensor and RFID. Also, we develop a new speech recognition system that demonstrates better performances than the existing system by establishing a word model domain of a speech recognition system by context information. This system shows operation without decrease of recognition rate in smart home environment.

Designing a Mobile User Interface with Grip-Pattern Recognition (파지 형태 감지를 통한 휴대 단말용 사용자 인터페이스 개발)

  • Chang Wook;Kim Kee Eung;Lee Hyunjeong;Cho Joon Kee;Soh Byung Seok;Shim Jung Hyun;Yang Gyunghye;Cho Sung Jung;Park Joonah
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.245-248
    • /
    • 2005
  • This paper presents a novel user interface system which aims at easy controlling of mobile devices. The fundamental concept of the proposed interface is to launch an appropriate function of the device by sensing and recognizing the grip-pattern when the user tries to use the mobile device. To this end, we develop a prototype system which employs capacitive touch sensors covering the housing of the system and a recognition algorithm for offering the appropriate function which suitable for the sensed grip-pattern. The effectiveness and feasibility of the proposed method is evaluated through the test of recognition rate with the collected grip-pattern database.

  • PDF

Design of a User authentication Protocol Using Face Information (얼굴정보를 이용한 사용자 인증 프로토콜 설계)

  • 지은미
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.157-166
    • /
    • 2004
  • Consequently substantial research has been done on the development of the bio-metric recognition method as well as technical research in the field of authentication. As a method of bio-metric recognition, personal and unique information such as fingerprints, voice, face, Iris, hand-geometry and vein-pattern are used. The face image system in bio-metric recognition and information authentication reduces the denial response from the users because it is a non-contact system the face image system operates through a PC camera attached to a computer base this makes the system economically viable as well as user friendly. Conversely, the face image system is very sensitive to illumination, hair style and appearance and consequently creates recognition errors easily, therefore we must build a stable authentication system which is not too sensitive to changes in appearance and light. In this study, I proposed user authentication protocol to serve a confidentiality and integrity and to obtain a least Equal Error Rate to minimize the wrong authentication rate when it authenticates the user.

  • PDF

The University Gusdance System using the Alexa (Alexa를 이용한 대학안내 시스템)

  • Kim, Tae Jin;Kim, Dong Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2061-2066
    • /
    • 2017
  • The voice recognition technology is to recognize the voice of an user and execute the command. Recently, the voice recognition is evolving to the artificial intelligence voice recognition by adding the scheme of the natural language processing. The AI voice recognition is exploited to control the IoT devices or provide the information, such as the news or the wether. The University Information which is one of fields serviced by the information provider is mainly presented on the web. However, since too much information are presented on the web, it is difficult for an user to find efficiently the specific information which the user want to know. In this paper, we design and implement the university guidance system to recognize the user voice searching the information and provide the result using the voice. To do this, we classify the university data and design the lambda function to provide the data.

Design of Smart Platform based on Image Recognition for Lifelog (라이프로그용 영상인식 기반의 스마트 플랫폼 설계)

  • Choi, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.51-55
    • /
    • 2017
  • In this paper, we designed a LBS-based smart platform for Lifelog service that can utilize the other's lifelog information. The conventional Lifelog service means that the system records the daily activities of the smart device user so the user can retrieve the early-recorded information later. The proposed Lifelog service platform uses the GPS/UFID location information and the various information extracted from the image as the lifelog data. Further, the proposed Lifelog platform using DB can provide the user with the Lifelog data recorded by the other service user. The system usually provide the other's Lifelog data within the 500m distance from the user and the range of distance can be adjustable. The proposed smart platform based on image recognition for Lifelog can acquire the image from the smart device directly and perform the various image recognition processing to produce the useful image attributes. And it can store the location information, image data, image attributes and the relevant web informations on the database that can be retrieved by the other use's request. The attributes stored and managed in the image information database consist of the followings: Object ID, the image type, the capture time and the image GPS coordinates. The image type attribute has the following values: the mountain, the sea, the street, the front of building, the inside of building and the portrait. The captured image can be classified into the above image type by the pattern matching image processing techniques and the user's direct selection as well. In case of the portrait-attribute, we can choose the multiple sub-attribute values from the shirt, pant, dress and accessory sub-attributes. Managing the Lifelog data in the database, the system can provide the user with the useful additional services like a path finding to the location of the other service user's Lifelog data and information.

Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application

  • Lee, Sungju;Sa, Jaewon;Cho, Hyeonjoong;Park, Daihee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6152-6168
    • /
    • 2017
  • Recently, the biometric-based authentication systems such as FIDO (Fast Identity Online) are increased in mobile computing environments. The biometric-based authentication systems are performed on the mobile devices with the battery, the improving energy efficiency is important issue. In the case, the size of images (i.e., face, fingerprint, iris, and etc.) affects both recognition accuracy and energy consumption, and hence the tradeoff analysis between the both recognition accuracy and energy consumption is necessary. In this paper, we propose an energy-efficient way to authenticate based on biometric information with tradeoff analysis between the both recognition accuracy and energy consumption in multimedia IoT (Internet of Things) transmission environments. We select the facial information among biometric information, and especially consider the multicore-based mobile devices. Based on our experimental results, we prove that the proposed approach can enhance the energy efficiency of GABOR+LBP+GRAY VALUE, GABOR+LBP, GABOR, and LBP by factors of 6.8, 3.6, 3.6, and 2.4 over the baseline, respectively, while satisfying user's face recognition accuracy.

Recognition-Based Gesture Spotting for Video Game Interface (비디오 게임 인터페이스를 위한 인식 기반 제스처 분할)

  • Han, Eun-Jung;Kang, Hyun;Jung, Kee-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1177-1186
    • /
    • 2005
  • In vision-based interfaces for video games, gestures are used as commands of the games instead of pressing down a keyboard or a mouse. In these Interfaces, unintentional movements and continuous gestures have to be permitted to give a user more natural interface. For this problem, this paper proposes a novel gesture spotting method that combines spotting with recognition. It recognizes the meaningful movements concurrently while separating unintentional movements from a given image sequence. We applied our method to the recognition of the upper-body gestures for interfacing between a video game (Quake II) and its user. Experimental results show that the proposed method is on average $93.36\%$ in spotting gestures from continuous gestures, confirming its potential for a gesture-based interface for computer games.

  • PDF

Automatic Recognition of Bank Security Card Using Smart Phone (스마트폰을 이용한 은행 보안카드 자동 인식)

  • Kim, Jin-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.19-26
    • /
    • 2016
  • Among the various services for mobile banking, user authentication method using bank security card is still very useful. We can use mobile banking easily and safely in case of saving encoded security codes in smart phone and entering codes automatically whenever user authentication is required without bank security card. In this paper automatic recognition algorithm of security codes of bank security card is proposed in oder to enroll the encoded security codes into smart phone using smart phone camera. Advanced adaptive binarization is used for extracting digit segments from various background image pattern and adaptive 2-dimensional layout analysis method is developed for segmentation and recognition of damaged or touched digits. Experimental results of proposed algorithm using Android and iPhone, show excellent security code recognition results.

Implementation of Motorized Wheelchair using Speaker Independent Voice Recognition Chip and Wireless Microphone (화자 독립 방식의 음성 인식 칩 및 무선 마이크를 이용한 전동 휄체어의 구현)

  • Song, Byung-Seop;Lee, Jung-Hyun;Park, Jung-Jae;Park, Hee-Joon;Kim, Myoung-Nam
    • Journal of Sensor Science and Technology
    • /
    • v.13 no.1
    • /
    • pp.20-26
    • /
    • 2004
  • For the disabled persons who can't use their limbs, motorized wheelchair that is activated by voice recognition module employing speaker independent method, was implemented. The wireless voice transfer device was designed and employed for the user convenience. And the wheelchair was designed to operate using voice and keypad by selection of the user because they can manipulate it using keypad if necessary. The speaker independent method was used as the voice recognition module in order that anyone can manipulate the wheelchair in case of assistance. Using the implemented wheelchair, performance and motion of the system was examined and it has over than 97% of voice recognition rate and proper movements.

Re-classifying Method for Face Recognition (얼굴 인식 성능 향상을 위한 재분류 방법)

  • Bae Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.105-114
    • /
    • 2004
  • In the past year, the increasing concern about the biometric recognition makes the great activities on the security fields, such as the entrance control or user authentication. In particular, although the features of face recognition, such as user friendly and non-contact made it to be used widely, unhappily it has some disadvantages of low accuracy or low Re-attempts Rates. For this reason, I suggest the new approach to re-classify the classified data of recognition result data to solve the problems. For this study, I will use the typical appearance-based, PCA(Principal Component Analysis) algorithm and verify the performance improvement by adopting the re-classification approach using 200 peoples (10 pictures per one person).

  • PDF