• Title/Summary/Keyword: automatic identification

Search Result 649, Processing Time 0.023 seconds

Identification of Fuzzy-Radial Basis Function Neural Network Based on Mountain Clustering (Mountain Clustering 기반 퍼지 RBF 뉴럴네트워크의 동정)

  • Choi, Jeoung-Nae;Oh, Sung-Kwun;Kim, Hyun-Ki
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.3
    • /
    • pp.69-76
    • /
    • 2008
  • This paper concerns Fuzzy Radial Basis Function Neural Network (FRBFNN) and automatic rule generation of extraction of the FRBFNN by means of mountain clustering. In the proposed network, the membership functions of the premise part of fuzzy rules do not assume any explicit functional forms such as Gaussian, ellipsoidal, triangular, etc., so its resulting fitness values (degree of membership) directly rely on the computation of the relevant distance between data points. Also, we consider high-order polynomial as the consequent part of fuzzy rules which represent input-output characteristic of sup-space. The number of clusters and the centers of clusters are automatically generated by using mountain clustering method based on the density of data. The centers of cluster which are obtained by using mountain clustering are used to determine a degree of membership and weighted least square estimator (WLSE) is adopted to estimate the coefficients of the consequent polynomial of fuzzy rules. The effectiveness of the proposed model have been investigated and analyzed in detail for the representative nonlinear function.

  • PDF

Analysis on the navigation risk factors in Gunsan coastal area (1) (군산 연안 해역 항행 위해 요소 분석 (1))

  • JUNG, Cho-Young;YOO, Sang-Lok
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.53 no.3
    • /
    • pp.286-292
    • /
    • 2017
  • The Coastal VTS will be continuously constructed to prevent marine traffic accidents in the coastal waters of the Republic of Korea. In order to provide the best traffic information service to the ship operator, it is important to understand the navigation risk factor. In this study, we analyzed the navigational hazards of Gunsan coastal area where the coastal VTS will be constructed until 2020. For this purpose, major traffic flows of merchant ships and density of vessels engaged in fishing were analyzed. This study was conducted by Automatic Identification System (AIS) and Vessel Pass (V-PASS) data. The grid intervals are 10 minute ${\times}$ 10 minute (latitude ${\times}$ longitude) based on the section of the sea. A total of 30 sections were analyzed by constructing a grid. As a result of the analysis, the major traffic flows of the merchant vessels in the coastal area of Gunsan were surveyed from north to south toward Incheon, Pyeongtaek, Daesan, Yeosu, Pusan and Ulsan, and from east to west in the port of Gunsan Port, 173-3, 173-6, 173-8, 183-2, 183-5, 183-8, 183-3, 184-1 and 184-2. As a result of the study, the fishing boats in Gunsan coastal area mainly operated in spring and autumn. On the other hand, the main traffic flow of merchant ships and the distribution of fishing vessels continue to overlap from March to June, so special attention should be paid to the control during this period.

Image Segmentation of Adjoining Pigs Using Spatio-Temporal Information (시공간 정보를 이용한 근접 돼지의 영상 분할)

  • Sa, Jaewon;Han, Seoungyup;Lee, Sangjin;Kim, Heegon;Lee, Sungju;Chung, Yongwha;Park, Daihee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.10
    • /
    • pp.473-478
    • /
    • 2015
  • Recently, automatic video monitoring of individual pigs is emerging as an important issue in the management of group-housed pigs. Although a rich variety of studies have been reported on video monitoring techniques in intensive pig farming, it still requires further elaboration. In particular, when there exist adjoining pigs in a crowd pig room, it is necessary to have a way of separating adjoining pigs from the perspective of an image processing technique. In this paper, we propose an efficient image segmentation solution using both spatio-temporal information and region growing method for the identification of individual pigs in video surveillance systems. The experimental results with the videos obtained from a pig farm located in Sejong illustrated the efficiency of the proposed method.

Design and Implementation of a Book Counting System based on the Image Processing (영상처리를 이용한 도서 권수 판별 시스템 설계 및 구현)

  • Yum, Hyo-Sub;Hong, Min;Oh, Dong-Ik
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.3
    • /
    • pp.195-198
    • /
    • 2013
  • Many libraries utilize RFID tags for checking in and out of books. However, the recognition rate of this automatic process may depend on the orientation of antennas and RFID tags. Therefore we need supplemental systems to improve the recognition rate. The proposed algorithm sets up the ROI of the book existing area from the input image and then performs Canny edge detection algorithm to extract edges of books. Finally Hough line transform algorithm allows to detect the number of books from the extracted edges. To evaluate the performance of the proposed method, we applied our method to 350 book images under various circumstances. We then analyzed the performance of proposed method from results using recognition and mismatch ratio. The experimental result gave us 97.1% accuracy in book counting.

Fingerprint Recognition using Linking Information of Minutiae (특징점의 연결정보를 이용한 지문인식)

  • Cha, Heong-Hee;Jang, Seok-Woo;Kim, Gye-Young;Choi, Hyung-Il
    • The KIPS Transactions:PartB
    • /
    • v.10B no.7
    • /
    • pp.815-822
    • /
    • 2003
  • Fingerprint image enhancement and minutiae matching are two key steps in an automatic fingerprint identification system. In this paper, we propose a fingerprint recognition technique by using minutiae linking information. Recognition process have three steps ; preprocessing, minutiae extraction, matching step based on minutiae pairing. After extracting minutiae of a fingerprint from its thinned image for accuracy, we introduce matching process using minutiae linking information. Introduction of linking information into the minutiae matching process is a simple but accurate way, which solves the problem of reference minutiae pair selection with low cost in comparison stage of two fingerprints. This algorithm is invariable to translation and rotation of fingerprint. The matching algorithm was tested on 500 images from the semiconductor chip style scanner, experimental result revealed the false acceptance rate is decreased and genuine acceptance rate is increased than existing method.

Cost Effective Mobility Anchor Point Selection Scheme for F-HMIPv6 Networks (F-HMIPv6 환경에서의 비용 효율적인 MAP 선택 기법)

  • Roh Myoung-Hwa;Jeong Choong-Kyo
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.265-271
    • /
    • 2006
  • In this paper, we propose a new automatic fingerprint identification system that identifies individuals in large databases. The algorithm consists of three steps: preprocessing, classification, and matching, in the classification, we present a new classification technique based on the statistical approach for directional image distribution. In matching, we also describe improved minutiae candidate pair extraction algorithm that is faster and more accurate than existing algorithm. In matching stage, we extract fingerprint minutiaes from its thinned image for accuracy, and introduce matching process using minutiae linking information. Introduction of linking information into the minutiae matching process is a simple but accurate way, which solves the problem of reference minutiae pair selection in comparison stage of two fingerprints quickly. This algorithm is invariant to translation and rotation of fingerprint. The proposed system was tested on 1000 fingerprint images from the semiconductor chip style scanner. Experimental results reveal false acceptance rate is decreased and genuine acceptance rate is increased than existing method.

  • PDF

Deep Learning-based Approach for Classification of Tribological Time Series Data for Hand Creams (딥러닝을 이용한 핸드크림의 마찰 시계열 데이터 분류)

  • Kim, Ji Won;Lee, You Min;Han, Shawn;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.98-105
    • /
    • 2021
  • The sensory stimulation of a cosmetic product has been deemed to be an ancillary aspect until a decade ago. That point of view has drastically changed on different levels in just a decade. Nowadays cosmetic formulators should unavoidably meet the needs of consumers who want sensory satisfaction, although they do not have much time for new product development. The selection of new products from candidate products largely depend on the panel of human sensory experts. As new product development cycle time decreases, the formulators wanted to find systematic tools that are required to filter candidate products into a short list. Traditional statistical analysis on most physical property tests for the products including tribology tests and rheology tests, do not give any sound foundation for filtering candidate products. In this paper, we suggest a deep learning-based analysis method to identify hand cream products by raw electric signals from tribological sliding test. We compare the result of the deep learning-based method using raw data as input with the results of several machine learning-based analysis methods using manually extracted features as input. Among them, ResNet that is a deep learning model proved to be the best method to identify hand cream used in the test. According to our search in the scientific reported papers, this is the first attempt for predicting test cosmetic product with only raw time-series friction data without any manual feature extraction. Automatic product identification capability without manually extracted features can be used to narrow down the list of the newly developed candidate products.

A Study on the Verification Method of Ships' Fuel Oil Consumption by using AIS

  • Yang, Jinyoung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.3
    • /
    • pp.269-277
    • /
    • 2019
  • Since 2020, according to the International Convention for the Prevention of Pollution from Ships (MARPOL) amended in 2016, each Administration shall transfer the annual fuel consumption of its registered ships of 5,000 gross tonnage and above to the International Maritime Organization (IMO) after verifying them. The Administration needs stacks of materials, which must not be manipulated by ship companies, including the Engine log book and also bears an administrative burden to verify them by May every year. This study considers using the Automatic Identification System (AIS), mandatory navigational equipment, as an objective and efficient tool among several verification methods. Calculating fuel consumption using a ship's speed in AIS information based on the theory of a relationship between ship speed and fuel consumption was reported in several examples of relevant literature. After pre-filtering by excluding AIS records which had speed errors from the raw data of five domestic cargo vessels, fuel consumptions calculated using Excel software were compared to actual bunker consumptions presented by ship companies. The former consumptions ranged from 96 to 123 percent of the actual bunker consumptions. The difference between two consumptions could be narrowed to within 20 percent if the fuel consumptions for boilers were deducted from the actual bunker consumption. Although further study should be carried out for more accurate calculation methods depending on the burning efficiency of the engine, the propulsion efficiency of the ship, displacement and sea conditions, this method of calculating annual fuel consumption according to the difference between two consumptions is considered to be one of the most useful tools to verify bunker consumption.

Bridge Inspection and condition assessment using Unmanned Aerial Vehicles (UAVs): Major challenges and solutions from a practical perspective

  • Jung, Hyung-Jo;Lee, Jin-Hwan;Yoon, Sungsik;Kim, In-Ho
    • Smart Structures and Systems
    • /
    • v.24 no.5
    • /
    • pp.669-681
    • /
    • 2019
  • Bridge collapses may deliver a huge impact on our society in a very negative way. Out of many reasons why bridges collapse, poor maintenance is becoming a main contributing factor to many recent collapses. Furthermore, the aging of bridges is able to make the situation much worse. In order to prevent this unwanted event, it is indispensable to conduct continuous bridge monitoring and timely maintenance. Visual inspection is the most widely used method, but it is heavily dependent on the experience of the inspectors. It is also time-consuming, labor-intensive, costly, disruptive, and even unsafe for the inspectors. In order to address its limitations, in recent years increasing interests have been paid to the use of unmanned aerial vehicles (UAVs), which is expected to make the inspection process safer, faster and more cost-effective. In addition, it can cover the area where it is too hard to reach by inspectors. However, this strategy is still in a primitive stage because there are many things to be addressed for real implementation. In this paper, a typical procedure of bridge inspection using UAVs consisting of three phases (i.e., pre-inspection, inspection, and post-inspection phases) and the detailed tasks by phase are described. Also, three major challenges, which are related to a UAV's flight, image data acquisition, and damage identification, respectively, are identified from a practical perspective (e.g., localization of a UAV under the bridge, high-quality image capture, etc.) and their possible solutions are discussed by examining recently developed or currently developing techniques such as the graph-based localization algorithm, and the image quality assessment and enhancement strategy. In particular, deep learning based algorithms such as R-CNN and Mask R-CNN for classifying, localizing and quantifying several damage types (e.g., cracks, corrosion, spalling, efflorescence, etc.) in an automatic manner are discussed. This strategy is based on a huge amount of image data obtained from unmanned inspection equipment consisting of the UAV and imaging devices (vision and IR cameras).

Detection of Abnormal Vessel Trajectories with Convolutional Autoencoder (합성곱 오토인코더를 이용한 이상거동 선박 식별)

  • Son, June-Hyoung;Jang, Jun-Gun;Choi, Bongwan;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.190-197
    • /
    • 2020
  • Recently there was an incident that military radars, coastal CCTVs and other surveillance equipment captured a small rubber boat smuggling a group of illegal immigrants into South Korea, but guards on duty failed to notice it until after they reached the shore and fled. After that, the detection of such vessels before it reach to the Korean shore has emerged as an important issue to be solved. In the fields of marine navigation, Automatic Identification System (AIS) is widely equipped in vessels, and the vessels incessantly transmits its position information. In this paper, we propose a method of automatically identifying abnormally behaving vessels with AIS using convolutional autoencoder (CAE). Vessel anomaly detection can be referred to as the process of detecting its trajectory that significantly deviated from the majority of the trajectories. In this method, the normal vessel trajectory is gridded as an image, and CAE are trained with images from historical normal vessel trajectories to reconstruct the input image. Features of normal trajectories are captured into weights in CAE. As a result, images of the trajectories of abnormal behaving vessels are poorly reconstructed and end up with large reconstruction errors. We show how correctly the model detects simulated abnormal trajectories shifted a few pixel from normal trajectories. Since the proposed model identifies abnormally behaving ships using actual AIS data, it is expected to contribute to the strengthening of security level when it is applied to various maritime surveillance systems.