• Title/Summary/Keyword: distance functions

Search Result 681, Processing Time 0.024 seconds

Realtime Face Recognition by Analysis of Feature Information (특징정보 분석을 통한 실시간 얼굴인식)

  • Chung, Jae-Mo;Bae, Hyun;Kim, Sung-Shin
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.299-302
    • /
    • 2001
  • The statistical analysis of the feature extraction and the neural networks are proposed to recognize a human face. In the preprocessing step, the normalized skin color map with Gaussian functions is employed to extract the region of face candidate. The feature information in the region of the face candidate is used to detect the face region. In the recognition step, as a tested, the 120 images of 10 persons are trained by the backpropagation algorithm. The images of each person are obtained from the various direction, pose, and facial expression. Input variables of the neural networks are the geometrical feature information and the feature information that comes from the eigenface spaces. The simulation results of$.$10 persons show that the proposed method yields high recognition rates.

  • PDF

A Study on the Complex-Channel Blind Equalization Using ITL Algorithms

  • Kim, Nam-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8A
    • /
    • pp.760-767
    • /
    • 2010
  • For complex channel blind equalization, this study presents the performance and characteristics of two complex blind information theoretic learning algorithms (ITL) which are based on minimization of Euclidian distance (ED) between probability density functions compared to constant modulus algorithm which is based on mean squared error (MSE) criterion. The complex-valued ED algorithm employing constant modulus error and the complex-valued ED algorithm using a self-generated symbol set are analyzed to have the fact that the cost function of the latter forces the output signal to have correct symbol values and compensate amplitude and phase distortion simultaneously without any phase compensation process. Simulation results through MSE convergence and constellation comparison for severely distorted complex channels show significantly enhanced performance of symbol-point concentration with no phase rotation.

Development of Probability Theory based Dynamic Travel Time Models (확률론적 이론에 기초한 동적 통행시간 모형 정립)

  • Yang, Chul-Su
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.3
    • /
    • pp.83-91
    • /
    • 2011
  • This paper discusses models for estimating dynamic travel times based on probability theory. The dynamic travel time models proposed in the paper are formulated assuming that the travel time of a vehicle depends on the distribution of the traffic stream condition with respect to the location along a road when the subject vehicle enters the starting point of a travel distance or with respect to the time at the starting point of a travel distance. The models also assume that the dynamic traffic flow can be represented as an exponential distribution function among other types of probability density functions.

Control System for Smart Medical Illumination Based on Voice Recognition (음성인식기반 스마트 의료조명 제어시스템)

  • Kim, Min-Kyu;Lee, Soo-In;Cho, Hyun-Kil
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.3
    • /
    • pp.179-184
    • /
    • 2013
  • A voice recognition technology as a technology fundament plays an important role in medical devices with smart functions. This paper describes the implementation of a control system that can be utilized as a part of illumination equipment for medical applications (IEMA) based on a voice recognition. The control system can essentially be divided into five parts, the microphone, training part, recognition part, memory part, and control part. The system was implemented using the RSC-4x evaluation board which is included the micro-controller for voice recognition. To investigate the usefulness of the implemented control system, the experiments of the recognition rate was carried out according to the input distance for voice recognition. As a result, the recognition rate of the control system was more than 95% within a distance between 0.5 and 2m. The result verified that the implemented control system performs well as the smart control system based for an IEMA.

Implementation of Collaboration Distance Guarding System based CBM(Computer Based Multimedia) (CBM 기반의 상호참여형 원격 방범시스템 구현)

  • 김석수;신광철
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.2
    • /
    • pp.161-168
    • /
    • 1998
  • This paper proposes the distance-video-guarding system technology based on collaboration CBM personal computer which enables additional functions such as monitoring each room while the guarding is in progress. This system sends the atmosphere of guarding by checking the status of environment with the sensor using ISDN. Current remote guarding desktop system uses leased lines (T1/E1 ) applying fast speed rate and security. This system provides an external monitoring system which runs on ISDN Public line also. Monitoring system transfers the natural status of each site to center controller of the guarding system.

  • PDF

Combining Different Distance Measurements Methods with Dempster-Shafer-Theory for Recognition of Urdu Character Script

  • Khan, Yunus;Nagar, Chetan;Kaushal, Devendra S.
    • International Journal of Ocean System Engineering
    • /
    • v.2 no.1
    • /
    • pp.16-23
    • /
    • 2012
  • In this paper we discussed a new methodology for Urdu Character Recognition system using Dempster-Shafer theory which can powerfully estimate the similarity ratings between a recognized character and sampling characters in the character database. Recognition of character is done by five probability calculation methods such as (similarity, hamming, linear correlation, cross-correlation, nearest neighbor) with Dempster-Shafer theory of belief functions. The main objective of this paper is to Recognition of Urdu letters and numerals through five similarity and dissimilarity algorithms to find the similarity between the given image and the standard template in the character recognition system. In this paper we develop a method to combine the results of the different distance measurement methods using the Dempster-Shafer theory. This idea enables us to obtain a single precision result. It was observed that the combination of these results ultimately enhanced the success rate.

A Study on Distance Relay of Transmission with UPFC Using Artificial Neural Network (신경회로망을 이용한 UPFC가 연계된 송전선로의 거리계전기에 관한 연구)

  • Park, Jeong-Ho;Jung, Chang-Ho;Shin, Dong-Joon;Kim, Jin-O
    • Proceedings of the KIEE Conference
    • /
    • 2002.07a
    • /
    • pp.196-198
    • /
    • 2002
  • This paper represents a new approach for the protective relay of power transmission lines using a Artificial Neural Network(ANN). A different fault on transmission lines need to be detected, classified and located accurately and cleared as fast as possible. However, The protection range of the distance relay is always designed on the basis of fixed settings, and unfortunately these approach do not have the ability to adapt dynamically to the system operating condition. ANN is suitable for the adaptive relaying and the detection of complex faults. The backpropagation algorithm based multi-layer perceptron is utilized for the learning process. It allows to make control to various protection functions. As expected, the simulation result demonstrate that this approach is useful and satisfactory.

  • PDF

Architecture Support for Context-aware Adaptation of Rich Sensing Smartphone Applications

  • Meng, Zhaozong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.248-268
    • /
    • 2018
  • The performance of smartphone applications are usually constrained in user interactions due to resource limitation and it promises great opportunities to improve the performance by exploring the smartphone built-in and embedded sensing techniques. However, heterogeneity in techniques, semantic gap between sensor data and usable context, and complexity of contextual situations keep the techniques from seamless integration. Relevant studies mainly focus on feasibility demonstration of emerging sensing techniques, which rarely address both general architectures and comprehensive technical solutions. Based on a proposed functional model, this investigation provides a general architecture to deal with the dynamic context for context-aware automation and decision support. In order to take advantage of the built-in sensors to improve the performance of mobile applications, an ontology-based method is employed for context modelling, linguistic variables are used for heterogeneous context presentation, and semantic distance-based rule matching is employed to customise functions to the contextual situations. A case study on mobile application authentication is conducted with smartphone built-in hardware modules. The results demonstrate the feasibility of the proposed solutions and their effectiveness in improving operational efficiency.

Obstacle-Free Optimal Motions of a Manipulator Arm Using Penetration Growth Distance (침투성장거리를 이용한 로봇팔의 장애물회피 최적운동)

  • Park, Jong-Keun
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.18 no.10
    • /
    • pp.116-126
    • /
    • 2001
  • This paper suggests a numerical method to find optimal geometric path and minimum-time motion for a spatial 6-link manipulator arm (PUMA 560 type). To find a minimum-time motion, the optimal geometric paths minimizing 2 different dynamic performance indices are searched first, and the minimum-time motions are searched on these optimal paths. In the algorithm to find optimal geometric paths, the objective functions (performance indices) are selected to minimize joint velocities, actuator forces or the combinations of them as well as to avoid one static obstacle. In the minimum-time algorithm the traveling time is expressed by the power series including 21 terms. The coefficients of the series are obtained using nonlinear programming to minimize the total traveling time subject to the constraints of velocity-dependent actuator forces.

  • PDF

The hydrocarbon concentration distribution in the contaminated site using geospatial analysis

  • Lee, Ju-Young;Yang, Jung-Seok;Choi, Jae-Young;Krishinamurshy, Ganeshi
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.909-910
    • /
    • 2007
  • The volatile organic compounds exposure is governed by the source distance and dispersion of the pollutant into air and groundwater. The purpose of this study was to validate suggested models for the prediction of concentration distributions. The study design was organized into different methods to simulate industry site. The distribution models generally showed a fair agreement with measured data. For graphical representation of concentration of volatile hydrocarbon, it has to obtain a continuous representation of the contamination of the site. Therefore, the used interpolative methods examined for this project are the IDW(inverse Distance Weighting) and kriging method. In the results, in summary, all two different methods can be used to quantify exposures at a particular source area, and thus provide, a solid foundation for making risk-based decisions. All the calculations can be performed using Excel's built-in functions, and the capabilities of geospatial analysis allow the results to be displayed visually. However, anyone who uses these methods should understand all of the assumptions and limitation.

  • PDF