• Title/Summary/Keyword: applications identification

Search Result 783, Processing Time 0.04 seconds

System Identification for Analysis Model Upgrading of FRP Decks (FRP 바닥판의 해석모델개선을 위한 System Identification 기법)

  • Seo, Hyeong-Yeol;Kim, Doo-Kie;Kim, Dong-Hyawn;Cui, Jintao;Lee, Young-Ho
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2007.05a
    • /
    • pp.588-593
    • /
    • 2007
  • Fiber reinforced polymer(FRP) composite decks are new to bridge applications and hence not much literature exists on their structural mechanical behavior. As there are many differences between numerical displacements through static analysis of the primary model and experimental displacements through static load tests, system identification (SI)techniques such as Neural Networks (NN) and support vector machines (SVM) utilized in the optimization of the FE model. During the process of identification, displacements were used as input while stiffness as outputs. Through the comparison of numerical displacements after SI and experimental displacements, it can note that NN and SVM would be effective SI methods in modeling an FRP deck. Moreover, two methods such as response surface method and iteration were proposed to optimize the estimated stiffness. Finally, the results were compared through the mean square error (MSE) of the differences between numerical displacements and experimental displacements at 6 points.

  • PDF

Viewpoint Invariant Person Re-Identification for Global Multi-Object Tracking with Non-Overlapping Cameras

  • Gwak, Jeonghwan;Park, Geunpyo;Jeon, Moongu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2075-2092
    • /
    • 2017
  • Person re-identification is to match pedestrians observed from non-overlapping camera views. It has important applications in video surveillance such as person retrieval, person tracking, and activity analysis. However, it is a very challenging problem due to illumination, pose and viewpoint variations between non-overlapping camera views. In this work, we propose a viewpoint invariant method for matching pedestrian images using orientation of pedestrian. First, the proposed method divides a pedestrian image into patches and assigns angle to a patch using the orientation of the pedestrian under the assumption that a person body has the cylindrical shape. The difference between angles are then used to compute the similarity between patches. We applied the proposed method to real-time global multi-object tracking across multiple disjoint cameras with non-overlapping field of views. Re-identification algorithm makes global trajectories by connecting local trajectories obtained by different local trackers. The effectiveness of the viewpoint invariant method for person re-identification was validated on the VIPeR dataset. In addition, we demonstrated the effectiveness of the proposed approach for the inter-camera multiple object tracking on the MCT dataset with ground truth data for local tracking.

Directional ARMAX Model-Based Approach for Rotordynamics Identification, Part 2 : Performance Evaluations and Applications (방향 시계열에 의한 회전체 동특성 규명 : (II) 성능 평가 및 응용)

  • 박종포;이종원
    • Journal of KSNVE
    • /
    • v.9 no.1
    • /
    • pp.60-69
    • /
    • 1999
  • In the first paper of this research$^{(1)}$. a new time series method. directional ARMAX (dARMAX) model-based approach. was proposed for rotordynamics identification. The dARMAX processes complex-valued signals, utilizing the complex modal testing theory which enables the separation of the backward and forward modes in the two-sided frequency domain and makes effective modal parameter identification possible. to account for the dynamic characteristics inherent in rotating machinery. In this second part. an evaluation of its performance characteristics based on both simulated and experimental data is presented. Numerical simulations are carried out to show that the method. a complex time series method. successfully implements the complex modal testing in the time domain. and it is superior in nature to the conventional ARMAX and the frequency-domain methods in the estimation of the modal parameters for isotropic and weakly anisotropic rotor systems. Experiments are carried out to demonstrate the applicability and the effectiveness of the dARMAX model-based approach, following the proposed fitting strategy. for the rotordynamics identification.

  • PDF

Optimal Stiffness Estimation of Composite Decks Model using System Identification (System Identification 기법을 이용한 복합소재 바닥판 해석모델의 최적강성추정)

  • Seo, Hyeong-Yeol;Kim, Doo-Kie;Kim, Dong-Hyawn;Cui, Jintao;Park, Ki-Tae
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2007.04a
    • /
    • pp.565-570
    • /
    • 2007
  • Fiber reinforced polymer(FRP) composite decks are new to bridge applications and hence not much literature exists on their structural mechanical behavior. As there are many differences between numerical displacements through static analysis of the primary model and experimental displacements through static load tests, system identification (SI)techniques such as Neural Networks (NN) and support vector machines (SVM) utilized in the optimization of the FE model. During the process of identification, displacements were used as input while stiffness as outputs. Through the comparison of numerical displacements after SI and experimental displacements, it can note that NN and SVM would be effective SI methods in modeling an FRP deck. Moreover, two methods such as response surface method and iteration were proposed to optimize the estimated stiffness. Finally, the results were compared through the mean square error (MSE) of the differences between numerical displacements and experimental displacements at 6 points.

  • PDF

Robust Speaker Identification using Independent Component Analysis (독립성분 분석을 이용한 강인한 화자식별)

  • Jang, Gil-Jin;Oh, Yung-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.5
    • /
    • pp.583-592
    • /
    • 2000
  • This paper proposes feature parameter transformation method using independent component analysis (ICA) for speaker identification. The proposed method assumes that the cepstral vectors from various channel-conditioned speech are constructed by a linear combination of some characteristic functions with random channel noise added, and transforms them into new vectors using ICA. The resultant vector space can give emphasis to the repetitive speaker information and suppress the random channel distortions. Experimental results show that the transformation method is effective for the improvement of speaker identification system.

  • PDF

Identifying Topic-Specific Experts on Microblog

  • Yu, Yan;Mo, Lingfei;Wang, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2627-2647
    • /
    • 2016
  • With the rapid growth of microblog, expert identification on microblog has been playing a crucial role in many applications. While most previous expert identification studies only assess global authoritativeness of a user, there is no way to differentiate the authoritativeness in a particular aspect of topics. In this paper, we propose a novel model, which jointly models text and following relationship in the same generative process. Furthermore, we integrate a similarity-based weight scheme into the model to address the popular bias problem, and use followee topic distribution as prior information to make user's topic distribution more precisely. Our empirical study on two large real-world datasets shows that our proposed model produces significantly higher quality results than the prior arts.

Issues Related to RFID Security and Privacy

  • Kim, Jong-Ki;Yang, Chao;Jeon, Jin-Hwan
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.951-958
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID may be viewed as a means of explicitly labeling objects to facilitate their "perception" by computing devices. RFlD systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFlD systems which could threat the technology s future. To successfully adopt RFID technology in various applications. we need to develop the solutions to protect the RFID system s data information. This study investigates important issues related to privacy and security of RF1D based on the recent literature and suggests solutions to cope with the problem.

  • PDF

Usability Comparison between PIN entry schemes (개인식별번호 입력 방식들에 대한 사용편의성 비교)

  • Kim, Chang-Soon;Song, Jeong-Eun;Lee, Mun-Kyu
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.34-39
    • /
    • 2009
  • Four-digit PIN(Personal Identification Number) is a well-known user authentication method used for many applications including ATMs and mobile phones. However, it is vulnerable to shoulder surfing attacks(SSAs). In this paper, we present new PIN entry methods which are secure against SSA and easy to use. We compare the usability and security of these methods with those of the existing methods.

  • PDF

OFSA: Optimum Frame-Slotted Aloha for RFID Tag Collision Arbitration

  • Lee, Dong-Hwan;Choi, Ji-Hoon;Lee, Won-Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1929-1945
    • /
    • 2011
  • RFID technologies have attracted a lot of attention in recent years because of their cost/time-effectiveness in large-scale logistics, supply chain management (SCM) and other various potential applications. One of the most important issues of the RFID-based systems is how quickly tags can be identified. Tag collision arbitration plays a more critical role in determining the system performance especially for passive tag-based ones where tag collisions are dealt with rather than prevented. We present a novel tag collision arbitration protocol called Optimum Frame-Slotted Aloha (OFSA). The protocol has been designed to achieve time-optimal efficiency in tag identification through an analytic study of tag identification delay and tag number estimation. Results from our analysis and extensive simulations demonstrate that OFSA outperforms other collision arbitration protocols. Also, unlike most prior anti-collision protocols, it does not require any modification to the current standards and architectures facilitating the rollout of RFID systems.

Trajectory Control of Direct Drive Robot with Two-Degree-of-Freedom Compensator (2자유도 보상기를 이용한 직접 구동형 로봇의 궤도제어)

  • Shin, Jeong-Ho;Fujiune, Konji;Suzuki, Tatsuya;Okuma, Shigeru
    • Proceedings of the KIEE Conference
    • /
    • 1993.11a
    • /
    • pp.304-306
    • /
    • 1993
  • In this paper, the authors show a link between a heuristic controller used in industry and a theoretical generalized controller. First, we clarify the internal structure of the generalized two-degree-of-freedom controller which yields a link between the theoretical researches and the practical applications. Secondly, we indicate how to blend identification and control together without any modification of the controller. This is in fact the problem of closed-loop identification. Thirdly, we propose a design technique of a free parameter taking into account a robust stability based on the information obtained from the identification. Finally, we apply the proposed algorithm to trajectory control of DD robot.

  • PDF