• Title/Summary/Keyword: Verification Algorithm

Search Result 1,145, Processing Time 0.03 seconds

Strategies to improve the range verification of stochastic origin ensembles for low-count prompt gamma imaging

  • Hsuan-Ming Huang
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3700-3708
    • /
    • 2023
  • The stochastic origin ensembles method with resolution recovery (SOE-RR) has been proposed to reconstruct proton-induced prompt gammas (PGs), and the reconstructed PG image was used for range verification. However, due to low detection efficiency, the number of valid events is low. Such a low-count condition can degrade the accuracy of the SOE-RR method for proton range verification. In this study, we proposed two strategies to improve the reconstruction of the SOE-RR algorithm for low-count PG imaging. We also studied the number of iterations and repetitions required to achieve reliable range verification. We simulated a proton beam (108 protons) irradiated on a water phantom and used a two-layer Compton camera to detect 4.44-MeV PGs. Our simulated results show that combining the SOE-RR algorithm with restricted volume (SOE-RR-RV) can reduce the error of the estimation of the Bragg peak position from 5.0 mm to 2.5 mm. We also found that the SOE-RR-RV algorithm initialized using a back-projection image could improve the convergence rate while maintaining accurate range verification. Finally, we observed that the improved SOE-RR algorithm set for 60,000 iterations and 25 repetitions could provide reliable PG images. Based on the proposed reconstruction strategies, the SOE-RR algorithm has the potential to achieve a positioning error of 2.5 mm for low-count PG imaging.

VCB Control Algorithm Verifications of Korean High Speed Train (한국형 고속전철의 VCB 제어 알고리즘 검증)

  • Jeon, J.W.;Jeong, P.K.;Lee, J.H.;Park, D.Y.;Kim, Y.J.;Lee, B.S.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07b
    • /
    • pp.1362-1364
    • /
    • 2000
  • This paper presents the control algorithm verification process for VCB (Vacuum Circuit Breaker) of Korean High Speed Train. In order to enhance the reliability of the control algorithm, the verification process must be performed. The verification is conducted by comparing the pre-designed control algorithm with the pre-planned scenario by simulation tools such as SDL and MSC. This verification process will be applied to the other control algorithms of various control units of Korean High Speed Train.

  • PDF

Text-dependent Speaker Verification System Over Telephone Lines (전화망을 위한 어구 종속 화자 확인 시스템)

  • 김유진;정재호
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.663-667
    • /
    • 1999
  • In this paper, we review the conventional speaker verification algorithm and present the text-dependent speaker verification system for application over telephone lines and its result of experiments. We apply blind-segmentation algorithm which segments speech into sub-word unit without linguistic information to the speaker verification system for training speaker model effectively with limited enrollment data. And the World-mode] that is created from PBW DB for score normalization is used. The experiments are presented in implemented system using database, which were constructed to simulate field test, and are shown 3.3% EER.

  • PDF

Verification System for Cutting Condition of Ball-End Milling Process (볼엔드 밀링의 절삭조건 검증시스템)

  • Kim, Chan Bong;Yang, Min Yang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.12 no.2
    • /
    • pp.123-134
    • /
    • 1995
  • In this paper, the fast force algorithm has been studied so that it is used to calculate cutting forces and to develope the NC verification system. The NC verification using the fast force algorithm can verify excessive cutting force which is the cause of deflection and breakage of tool, and adjust the feed rate and spindle speed.

  • PDF

Vehicle Detection Using Edge Analysis and AdaBoost Algorithm (에지 분석과 에이다부스트 알고리즘을 이용한 차량검출)

  • Song, Gwang-Yul;Lee, Ki-Yong;Lee, Joon-Woong
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.17 no.1
    • /
    • pp.1-11
    • /
    • 2009
  • This paper proposes an algorithm capable of detecting vehicles in front or in rear using a monocular camera installed in a vehicle. The vehicle detection has been regarded as an important part of intelligent vehicle technologies. The proposed algorithm is mainly composed of two parts: 1)hypothesis generation of vehicles, and 2)hypothesis verification. The hypotheses of vehicles are generated by the analysis of vertical and horizontal edges and the detection of symmetry axis. The hypothesis verification, which determines vehicles among hypotheses, is done by the AdaBoost algorithm. The proposed algorithm is proven to be effective through experiments performed on various images captured on the roads.

An Automatic Signature Verification Algorithm for Smart Devices

  • Kim, Seong-Hoon;Fan, Yunhe;Heo, Gyeongyong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.15-21
    • /
    • 2015
  • In this paper, we propose a stable automatic signature verification algorithm applicable to various smart devices. The proposed algorithm uses real and forgery data all together, which can improve the verification rate dramatically. As a tool for signature acquisition in a smart device, two applications, one using touch with a finger and the other using a pressure-sensing-stylus pen, are developed. The verification core is based on SVM and some modifications are made to include the characteristics of signatures. As shown in experimental results, the minimum error rate was 1.84% in the SVM based method, which can easily defeat 4.38% error rate with the previous parametric approach. Even more, 2.43% error rate was achieved with the features excluding pressure-related features, better than the previous approach including pressure-related features and only about 0.6% more error than the best result, which means that the proposed algorithm can be applied to a smart device with or without pressure-sensing-stylus pens and used for security purposes.

Writer verification using feature selection based on genetic algorithm: A case study on handwritten Bangla dataset

  • Jaya Paul;Kalpita Dutta;Anasua Sarkar;Kaushik Roy;Nibaran Das
    • ETRI Journal
    • /
    • v.46 no.4
    • /
    • pp.648-659
    • /
    • 2024
  • Author verification is challenging because of the diversity in writing styles. We propose an enhanced handwriting verification method that combines handcrafted and automatically extracted features. The method uses a genetic algorithm to reduce the dimensionality of the feature set. We consider offline Bangla handwriting content and evaluate the proposed method using handcrafted features with a simple logistic regression, radial basis function network, and sequential minimal optimization as well as automatically extracted features using a convolutional neural network. The handcrafted features outperform the automatically extracted ones, achieving an average verification accuracy of 94.54% for 100 writers. The handcrafted features include Radon transform, histogram of oriented gradients, local phase quantization, and local binary patterns from interwriter and intrawriter content. The genetic algorithm reduces the feature dimensionality and selects salient features using a support vector machine. The top five experimental results are obtained from the optimal feature set selected using a consensus strategy. Comparisons with other methods and features confirm the satisfactory results.

Robust Endpoint Detection Algorithm For Speaker Verification (화자인식을 위한 강인한 끝점 검출 알고리즘)

  • Jung Dae Sung;Kim Jung Gon;Kim Hyung Soon
    • Proceedings of the KSPS conference
    • /
    • 2003.05a
    • /
    • pp.137-140
    • /
    • 2003
  • In this paper, we propose a robust endpoint detection algorithm for speaker verification. Proposed algorithm uses energy and cepstral distance parameters, and it replaces the detected endpoints with endpoints of voiced speech, when the estimated signal-to-noise ratio (SNR) is low. Experimental results show that proposed algorithm is superior to energy-based endpoint detection algorithm.

  • PDF

Boundary Stitching Algorithm for Fusion of Vein Pattern (정맥패턴 융합을 위한 Boundary Stitching Algorithm)

  • Lim, Young-Kyu;Jang, Kyung-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.521-524
    • /
    • 2005
  • This paper proposes a fusion algorithm which merges multiple vein pattern images into a single image, larger than those images. As a preprocessing step of template matching, during the verification of biometric data such as fingerprint image, vein pattern image of hand, etc., the fusion technique is used to make reference image larger than the candidate images in order to enhance the matching performance. In this paper, a new algorithm, called BSA (Boundary Stitching Algorithm) is proposed, in which the boundary rectilinear parts extracted from the candidate images are stitched to the reference image in order to enlarge its matching space. By applying BSA to practical vein pattern verification system, its verification rate was increased by about 10%.

  • PDF

The Study for Advancing the Performance of Speaker Verification Algorithm Using Individual Voice Information (개별 음향 정보를 이용한 화자 확인 알고리즘 성능향상 연구)

  • Lee, Je-Young;Kang, Sun-Mee
    • Speech Sciences
    • /
    • v.9 no.4
    • /
    • pp.253-263
    • /
    • 2002
  • In this paper, we propose new algorithm of speaker recognition which identifies the speaker using the information obtained by the intensive speech feature analysis such as pitch, intensity, duration, and formant, which are crucial parameters of individual voice, for candidates of high percentage of wrong recognition in the existing speaker recognition algorithm. For testing the power of discrimination of individual parameter, DTW (Dynamic Time Warping) is used. We newly set the range of threshold which affects the power of discrimination in speech verification such that the candidates in the new range of threshold are finally discriminated in the next stage of sound parameter analysis. In the speaker verification test by using voice DB which consists of secret words of 25 males and 25 females of 8 kHz 16 bit, the algorithm we propose shows about 1% of performance improvement to the existing algorithm.

  • PDF