• 제목/요약/키워드: applications identification

검색결과 771건 처리시간 0.023초

Fractal behavior identification for monitoring data of dam safety

  • Su, Huaizhi;Wen, Zhiping;Wang, Feng
    • Structural Engineering and Mechanics
    • /
    • 제57권3호
    • /
    • pp.529-541
    • /
    • 2016
  • Under the interaction between dam body, dam foundation and external environment, the dam structural behavior presents the time-varying nonlinear characteristics. According to the prototypical observations, the correct identification on above nonlinear characteristics is very important for dam safety control. It is difficult to implement the description, analysis and diagnosis for dam structural behavior by use of any linear method. Based on the rescaled range analysis approach, the algorithm is proposed to identify and extract the fractal feature on observed dam structural behavior. The displacement behavior of one actual dam is taken as an example. The fractal long-range correlation for observed displacement behavior is analyzed and revealed. The feasibility and validity of the proposed method is verified. It is indicated that the mechanism evidence can be provided for the prediction and diagnosis of dam structural behavior by using the fractal identification method. The proposed approach has a high potential for other similar applications.

RFID Technology in Health Environment Opportunities and Challenges for Modern Cancer Care

  • Safdari, Reza;Maserat, Elham;Maserat, Elnaz
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제13권12호
    • /
    • pp.6533-6537
    • /
    • 2012
  • Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

Identification of 2D Impulse Response by use of M-array with Application to 2D M-transform

  • Liu, Min;Kashiwagi, Hiroshi;Kobatake, Hidefumi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1999년도 제14차 학술회의논문집
    • /
    • pp.234-237
    • /
    • 1999
  • In this paper, a new method for identification of two-dimensional(2D) impulse response is presented. As is well known, identification of 2D impulse response is an important and necessary theme for image processing or signal processing. Here, the authors extend M-transform which has been proposed by some of the authors to 2D case where an image is used instead of signal, and M-array is used instead of M-sequence. Firstly, we show that 2D impulse response can be obtained by use of M-array. Next 2D M-transform is defined where any 2D image can be considered to be the output of 2D filter whose input is 2D M-array. Simulation results show the effectiveness of identification of 2D impulse response by either using M-array or by 2D M-transform.

  • PDF

A Speaker Pruning Method for Real-Time Speaker Identification System

  • 김민정;석수영;정종혁
    • 대한임베디드공학회논문지
    • /
    • 제10권2호
    • /
    • pp.65-71
    • /
    • 2015
  • It has been known that GMM (Gaussian Mixture Model) based speaker identification systems using ML (Maximum Likelihood) and WMR (Weighting Model Rank) demonstrate very high performances. However, such systems are not so effective under practical environments, in terms of real time processing, because of their high calculation costs. In this paper, we propose a new speaker-pruning algorithm that effectively reduces the calculation cost. In this algorithm, we select 20% of speaker models having higher likelihood with a part of input speech and apply MWMR (Modified Weighted Model Rank) to these selected speaker models to find out identified speaker. To verify the effectiveness of the proposed algorithm, we performed speaker identification experiments using TIMIT database. The proposed method shows more than 60% improvement of reduced processing time than the conventional GMM based system with no pruning, while maintaining the recognition accuracy.

국내 조명 환경에서 센서공간을 활용한 이동로봇의 위치인식시스템 개발 (Development of Location Identification System for Moving Robot in the Sensor Space under KS Illumination Intensity Environment)

  • 강철웅;고석준
    • 대한임베디드공학회논문지
    • /
    • 제9권2호
    • /
    • pp.67-73
    • /
    • 2014
  • When a mobile robot performs in unknown environments, a location identification is an essential task. In this paper, we propose a location identification system that uses a sensor space without additional devices on the robot. Also the sensor space consists of a matrix of CDS sensor; when a robot was positioned on the CDS sensor, we can estimate the coordinate of the location by sensing a light. Based on KS illumination standard, experiments are performed in various environments. By evaluating the experimental results, we can show that the proposed system can be applicable to the location identification system of a moving robot.

Parameter Identification of an Induction Motor Drive with Magnetic Saturation for Electric Vehicle

  • Jeong, Yu-Seok;Lee, Jun-Young
    • Journal of Power Electronics
    • /
    • 제11권4호
    • /
    • pp.418-423
    • /
    • 2011
  • This paper presents a simulation model and a parameter identification scheme of an induction motor drive for electric vehicle. The induction motor in automotive applications should operate in very high efficiency and achieve the maximum-torque-per-ampere (MTPA) feature even with saturated magnetic flux under very high torque. The indirect vector control which is typically adopted in traction drive system requires precise information of motor parameters, particularly rotor time constants. This work models an induction motor considering magnetic saturation and proposes an empirical identification method using the current controller in the synchronous reference frame. The proposed method is applied to a 22kW-rated induction motor for electric vehicle.

Biometric Identification: Iris Recognition, Biometric Cryptography

  • Rawan Alrasheddi;Zainab Alawami;Maryam Hazazi;Reema Abu Alsaud;Ruba Alobaidi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.41-46
    • /
    • 2023
  • Biometrics is an application of biometric authentication and identification techniques that are used for security. Where people can be identified by physical or behavioral features such as iris, fingerprints, or even voice. Biometrics with cryptography can be used in a variety of applications such as issuing, generating, or associating biometric keys. Biometric identification and cryptography are used in many institutions and high-security systems due to the difficulty of tampering or forgery by hackers. In this paper, literature reviews on biometric identification and cryptography are presented and discussed. In addition to a comparison of techniques in the literature reviews, identifying its strengths and weaknesses, and providing an initial proposal for biometrics and cryptography.

Structural monitoring and identification of civil infrastructure in the United States

  • Nagarajaiah, Satish;Erazo, Kalil
    • Structural Monitoring and Maintenance
    • /
    • 제3권1호
    • /
    • pp.51-69
    • /
    • 2016
  • Monitoring the performance and estimating the remaining useful life of aging civil infrastructure in the United States has been identified as a major objective in the civil engineering community. Structural health monitoring has emerged as a central tool to fulfill this objective. This paper presents a review of the major structural monitoring programs that have been recently implemented in the United States, focusing on the integrity and performance assessment of large-scale structural systems. Applications where response data from a monitoring program have been used to detect and correct structural deficiencies are highlighted. These applications include (but are not limited to): i) Post-earthquake damage assessment of buildings and bridges; ii) Monitoring of cables vibration in cable-stayed bridges; iii) Evaluation of the effectiveness of technologies for retrofit and seismic protection, such as base isolation systems; and iv) Structural damage assessment of bridges after impact loads resulting from ship collisions. These and many other applications show that a structural health monitoring program is a powerful tool for structural damage and condition assessment, that can be used as part of a comprehensive decision-making process about possible actions that can be undertaken in a large-scale civil infrastructure system after potentially damaging events.

Syntactic Structured Framework for Resolving Reflexive Anaphora in Urdu Discourse Using Multilingual NLP

  • Nasir, Jamal A.;Din, Zia Ud.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권4호
    • /
    • pp.1409-1425
    • /
    • 2021
  • In wide-ranging information society, fast and easy access to information in language of one's choice is indispensable, which may be provided by using various multilingual Natural Language Processing (NLP) applications. Natural language text contains references among different language elements, called anaphoric links. Resolving anaphoric links is a key problem in NLP. Anaphora resolution is an essential part of NLP applications. Anaphoric links need to be properly interpreted for clear understanding of natural languages. For this purpose, a mechanism is desirable for the identification and resolution of these naturally occurring anaphoric links. In this paper, a framework based on Hobbs syntactic approach and a system developed by Lappin & Leass is proposed for resolution of reflexive anaphoric links, present in Urdu text documents. Generally, anaphora resolution process takes three main steps: identification of the anaphor, location of the candidate antecedent(s) and selection of the appropriate antecedent. The proposed framework is based on exploring the syntactic structure of reflexive anaphors to find out various features for constructing heuristic rules to develop an algorithm for resolving these anaphoric references. System takes Urdu text containing reflexive anaphors as input, and outputs Urdu text with resolved reflexive anaphoric links. Despite having scarcity of Urdu resources, our results are encouraging. The proposed framework can be utilized in multilingual NLP (m-NLP) applications.

Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets

  • Zhao, Yanna;Wang, Lei;Zhao, Xu;Liu, Yuncai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권2호
    • /
    • pp.775-792
    • /
    • 2015
  • Person re-identification is an important and challenging task in computer vision with numerous real world applications. Despite significant progress has been made in the past few years, person re-identification remains an unsolved problem. This paper presents a novel appearance-based approach to person re-identification. The approach exploits region covariance matrix and color histograms to capture the statistical properties and chromatic information of each object. Robustness against low resolution, viewpoint changes and pose variations is achieved by a novel signature, that is, the combination of Log Covariance Matrix feature and HSV histogram (LCMH). In order to further improve re-identification performance, third-party image sets are utilized as a common reference to sufficiently represent any image set with the same type. Distinctive and reliable features for a given image set are extracted through decision boundary between the specific set and a third-party image set supervised by max-margin criteria. This method enables the usage of an existing dataset to represent new image data without time-consuming data collection and annotation. Comparisons with state-of-the-art methods carried out on benchmark datasets demonstrate promising performance of our method.