• Title/Summary/Keyword: background information

Search Result 4,897, Processing Time 0.033 seconds

Background Noise Classification in Noisy Speech of Short Time Duration Using Improved Speech Parameter (개량된 음성매개변수를 사용한 지속시간이 짧은 잡음음성 중의 배경잡음 분류)

  • Choi, Jae-Seung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1673-1678
    • /
    • 2016
  • In the area of the speech recognition processing, background noises are caused the incorrect response to the speech input, therefore the speech recognition rates are decreased by the background noises. Accordingly, a more high level noise processing techniques are required since these kinds of noise countermeasures are not simple. Therefore, this paper proposes an algorithm to distinguish between the stationary background noises or non-stationary background noises and the speech signal having short time duration in the noisy environments. The proposed algorithm uses the characteristic parameter of the improved speech signal as an important measure in order to distinguish different types of the background noises and the speech signals. Next, this algorithm estimates various kinds of the background noises using a multi-layer perceptron neural network. In this experiment, it was experimentally clear the estimation of the background noises and the speech signals.

An Improved Adaptive Background Mixture Model for Real-time Object Tracking based on Background Subtraction (배경 분리 기반의 실시간 객체 추적을 위한 개선된 적응적 배경 혼합 모델)

  • Kim Young-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.187-194
    • /
    • 2005
  • The background subtraction method is mainly used for the real-time extraction and tracking of moving objects from image sequences. In the outdoor environment, there are many changeable environment factors such as gradually changing illumination, swaying trees and suddenly moving objects , which are to be considered for an adaptive processing. Normally, GMM(Gaussian Mixture Model) is used to subtract the background by considering adaptively the various changes in the scenes, and the adaptive GMMs improving the real-time Performance were Proposed and worked. This paper, for on-line background subtraction, employed the improved adaptive GMM, which uses the small constant for learning rate a and is not able to speedily adapt the suddenly movement of objects, So, this paper Proposed and evaluated the dynamic control method of a using the adaptive selection of the number of component distributions and the global variances of pixel values.

  • PDF

Application of advanced spectral-ratio radon background correction in the UAV-borne gamma-ray spectrometry

  • Jigen Xia;Baolin Song;Yi Gu;Zhiqiang Li;Jie Xu;Liangquan Ge;Qingxian Zhang;Guoqiang Zeng;Qiushi Liu;Xiaofeng Yang
    • Nuclear Engineering and Technology
    • /
    • v.55 no.8
    • /
    • pp.2927-2934
    • /
    • 2023
  • The influence of the atmospheric radon background on the airborne gamma spectrum can seriously affect researchers' judgement of ground radiation information. However, due to load and endurance, unmanned aerial vehicle (UAV)-borne gamma-ray spectrometry is difficulty installing upward-looking detectors to monitor atmospheric radon background. In this paper, an advanced spectral-ratio method was used to correct the atmospheric radon background for a UAV-borne gamma-ray spectrometry in Inner Mongolia, China. By correcting atmospheric radon background, the ratio of the average count rate of U window in the anomalous radon zone (S5) to that in other survey zone decreased from 1.91 to 1.03, and the average uranium content in S5 decreased from 4.65 mg/kg to 3.37 mg/kg. The results show that the advanced spectral-ratio method efficiently eliminated the influence of the atmospheric radon background on the UAV-borne gamma-ray spectrometry to accurately obtain ground radiation information in uranium exploration. It can also be used for uranium tailings monitoring, and environmental radiation background surveys.

Improved Block-based Background Modeling Using Adaptive Parameter Estimation (적응적 파라미터 추정을 통한 향상된 블록 기반 배경 모델링)

  • Kim, Hanj-Jun;Lee, Young-Hyun;Song, Tae-Yup;Ku, Bon-Hwa;Ko, Han-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.73-81
    • /
    • 2011
  • In this paper, an improved block-based background modeling technique using adaptive parameter estimation that judiciously adjusts the number of model histograms at each frame sequence is proposed. The conventional block-based background modeling method has a fixed number of background model histograms, resulting to false negatives when the image sequence has either rapid illumination changes or swiftly moving objects, and to false positives with motionless objects. In addition, the number of optimal model histogram that changes each type of input image must have found manually. We demonstrate the proposed method is promising through representative performance evaluations including the background modeling in an elevator environment that may have situations with rapid illumination changes, moving objects, and motionless objects.

Factors Drawing Members of a Financial Institution to Information Security Risk Management (금융기관 종사자들을 정보보안 위험관리로 이끄는 요인)

  • An, Hoju;Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.39-64
    • /
    • 2015
  • As information and information technology become more important in competitive corporate environments, the risk of information security breaches has increased accordingly. Although organizations establish security measures to manage information security risks, members of organizations do not comply with them well, and their information security behavior intention is unclear. Therefore, to understand the information security risk management intention of the members of organizations, the present study developed a research model using Protection Motivation Theory, Supervisory Authority Pressure, and Background factors. This study presents empirical research findings based on the analysis of survey data from 201 members of financial institutions. Perceived Severity, Self-efficacy, and Supervisory Authority Pressure had a positive effect on intention; however, Perceived Vulnerability and Response Efficacy did not affect intention. Security Avoidance Habit, which was considered a background factor, had a negative effect on all parameters, and did not have an effect on intention. Security Awareness Training, another background factor, had a positive effect on information security risk management intention and perceived vulnerability, self-efficacy, response efficacy, and supervisory authority pressure, and had no effect on perceived severity. This study used supervisory authority pressure and background factors in the field of information security, and provided a basis to use supervisory authority pressure in future studies on behavior of organizations and members of an organization. In addition, the use of various background factors presented the groundwork for the expansion of protection motivation theory. Furthermore, practitioners can use the study findings as a foundation for organization's security activities, and to improve regulations.

Touch Pen Using Depth Information

  • Lee, Dong-Seok;Kwon, Soon-Kak
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1313-1318
    • /
    • 2015
  • Current touch pen requires the special equipments to detect a touch and its price increases in proportion to the screen size. In this paper, we propose a method for detecting a touch and implementing a pen using the depth information. The proposed method obtains a background depth image using a depth camera and extracts an object by comparing a captured depth image with the background depth image. Also, we determine a touch if the depth value of the object is the same as the background and then provide the pen event. Using this method, we can implement a cheaper and more convenient touch pen.

Convergence Control of Moving Object using Opto-Digital Algorithm in the 3D Robot Vision System

  • Ko, Jung-Hwan;Kim, Eun-Soo
    • Journal of Information Display
    • /
    • v.3 no.2
    • /
    • pp.19-25
    • /
    • 2002
  • In this paper, a new target extraction algorithm is proposed, in which the coordinates of target are obtained adaptively by using the difference image information and the optical BPEJTC(binary phase extraction joint transform correlator) with which the target object can be segmented from the input image and background noises are removed in the stereo vision system. First, the proposed algorithm extracts the target object by removing the background noises through the difference image information of the sequential left images and then controlls the pan/tilt and convergence angle of the stereo camera by using the coordinates of the target position obtained from the optical BPEJTC between the extracted target image and the input image. From some experimental results, it is found that the proposed algorithm can extract the target object from the input image with background noises and then, effectively track the target object in real time. Finally, a possibility of implementation of the adaptive stereo object tracking system by using the proposed algorithm is also suggested.

APPLICATION OF THE BIFOCUSING METHOD IN MICROWAVE IMAGING WITHOUT BACKGROUND INFORMATION

  • SEONG-HO SON;WON-KWANG PARK
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.27 no.2
    • /
    • pp.109-122
    • /
    • 2023
  • In this study, we consider the application of the bifocusing method (BFM) for identifying the locations and shapes of small anomalies from scattering parameter data when the exact values of background permittivity and conductivity are unknown. To this end, an imaging function using numerical focusing operator is introduced and its mathematical structure is revealed by establishing a relationship with an infinite series of Bessel functions, antenna arrangements, and anomaly properties. On the basis of the revealed structure, we demonstrate why inaccurate location and size of anomalies were retrieved via the BFM. Some simulation results are illustrated using synthetic data polluted by random noise to support the theoretical result.

A Background Image Generation Method for Image Detector Using Detected Vehicle Information (차량 탐지 정보를 이용한 영상 검지기의 배경 영상 생성 방법)

  • Kwon, Young Tak;Kim, Yoon Jin;Park, Chul Hong;Kim, Hee Jeong;Soh, Young Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.3 no.1
    • /
    • pp.60-68
    • /
    • 1999
  • In this paper, we propose a new background generation method for image detector for traffic information collection. Conventional methods result in bad performance when there are frequent traffic jams due to heavy traffic. To improve on this, we use high level information from vehicle detection. Only part of the image that is not considered as vehicle is used in background generation. The proposed method finds background more robustly than that of the conventional methods even in the presence of heavy traffic.

  • PDF

Research on Segmentation for Sidescan Sonar Image by Morphological Method (사이드스캔소나 이미지의 모폴로지 기법을 이용한 세그먼테이션에 관한 연구)

  • Lee, Ji-Eun;Shim, Tae-Bo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.2
    • /
    • pp.143-148
    • /
    • 2012
  • There are many researches on segmentation of sidescan sonar image to recognize or classify the underwater objects. Although existing algorithms's performance is good in detecting object's shadow and reducing the underwater noise, the computing time is very low. In this paper we try to separate shadow from background and segment the underwater image by using morphological method using background's noise distribution characteristics and object's shadow charateristics. This algorithm is useful when the average of background is lower than the average of the shadow, because this is adjusted from the background's chracteristics. Results shows that the algorithm works fine in multiple object environments and the computing time is reduced to 1 second.