• 제목/요약/키워드: distance functions

검색결과 681건 처리시간 0.028초

특징정보 분석을 통한 실시간 얼굴인식 (Realtime Face Recognition by Analysis of Feature Information)

  • 정재모;배현;김성신
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2001년도 추계학술대회 학술발표 논문집
    • /
    • pp.299-302
    • /
    • 2001
  • The statistical analysis of the feature extraction and the neural networks are proposed to recognize a human face. In the preprocessing step, the normalized skin color map with Gaussian functions is employed to extract the region of face candidate. The feature information in the region of the face candidate is used to detect the face region. In the recognition step, as a tested, the 120 images of 10 persons are trained by the backpropagation algorithm. The images of each person are obtained from the various direction, pose, and facial expression. Input variables of the neural networks are the geometrical feature information and the feature information that comes from the eigenface spaces. The simulation results of$.$10 persons show that the proposed method yields high recognition rates.

  • PDF

A Study on the Complex-Channel Blind Equalization Using ITL Algorithms

  • 김남용
    • 한국통신학회논문지
    • /
    • 제35권8A호
    • /
    • pp.760-767
    • /
    • 2010
  • For complex channel blind equalization, this study presents the performance and characteristics of two complex blind information theoretic learning algorithms (ITL) which are based on minimization of Euclidian distance (ED) between probability density functions compared to constant modulus algorithm which is based on mean squared error (MSE) criterion. The complex-valued ED algorithm employing constant modulus error and the complex-valued ED algorithm using a self-generated symbol set are analyzed to have the fact that the cost function of the latter forces the output signal to have correct symbol values and compensate amplitude and phase distortion simultaneously without any phase compensation process. Simulation results through MSE convergence and constellation comparison for severely distorted complex channels show significantly enhanced performance of symbol-point concentration with no phase rotation.

확률론적 이론에 기초한 동적 통행시간 모형 정립 (Development of Probability Theory based Dynamic Travel Time Models)

  • 양철수
    • 대한교통학회지
    • /
    • 제29권3호
    • /
    • pp.83-91
    • /
    • 2011
  • 이 논문은 확률론적인 방법을 이용하여 동적 통행시간(dynamic travel time) 모형을 도출한다. 동적 통행시간 모형은 차량의 통행시간은 도로 공간상에서의 교통흐름 분포에 따라, 또는 통행구간 출발점에서 시간에 대한 교통흐름의 분포에 따라 결정된다고 가정하여 얻어진다. 이 모형들에서 교통흐름의 분포가 차량의 통행시간에 미치는 정도를 나타내는 확률밀도함수(probability density function)는 여러 가지 형태의 도입될 수 있으나 지수분포를 따른다고 가정한다.

음성인식기반 스마트 의료조명 제어시스템 (Control System for Smart Medical Illumination Based on Voice Recognition)

  • 김민규;이수인;조현길
    • 대한임베디드공학회논문지
    • /
    • 제8권3호
    • /
    • pp.179-184
    • /
    • 2013
  • A voice recognition technology as a technology fundament plays an important role in medical devices with smart functions. This paper describes the implementation of a control system that can be utilized as a part of illumination equipment for medical applications (IEMA) based on a voice recognition. The control system can essentially be divided into five parts, the microphone, training part, recognition part, memory part, and control part. The system was implemented using the RSC-4x evaluation board which is included the micro-controller for voice recognition. To investigate the usefulness of the implemented control system, the experiments of the recognition rate was carried out according to the input distance for voice recognition. As a result, the recognition rate of the control system was more than 95% within a distance between 0.5 and 2m. The result verified that the implemented control system performs well as the smart control system based for an IEMA.

CBM 기반의 상호참여형 원격 방범시스템 구현 (Implementation of Collaboration Distance Guarding System based CBM(Computer Based Multimedia))

  • 김석수;신광철
    • 한국컴퓨터정보학회논문지
    • /
    • 제3권2호
    • /
    • pp.161-168
    • /
    • 1998
  • 본 논문은 상호참여형 CBM(Computer Based Multimedia) 기반의 원격지 방범시스템 기술에 관한 연구이고, 이는 방범진행중에 각 실의 모니터링을 통한 추가기능이 지원된다. 본 시스템은 ISDN 망을 이용한 센서에 의한 상황을 체킹하고 방범상황을 송신하게 된다. 본 원격지 방범시스템은 El/Tl 의 초고속정보통신망을 이용한 빠르고 안전한 시스템이다. 또한, 본 시스템은 ISDN 공중망을 이용한 방범시스템을 지원하고 있으며, 또한 모니터링 시스템은 방범시스템의 중앙 통제자에게 각 지역의 상황을 전송하여 모니터링하게 한다.

  • PDF

Combining Different Distance Measurements Methods with Dempster-Shafer-Theory for Recognition of Urdu Character Script

  • Khan, Yunus;Nagar, Chetan;Kaushal, Devendra S.
    • International Journal of Ocean System Engineering
    • /
    • 제2권1호
    • /
    • pp.16-23
    • /
    • 2012
  • In this paper we discussed a new methodology for Urdu Character Recognition system using Dempster-Shafer theory which can powerfully estimate the similarity ratings between a recognized character and sampling characters in the character database. Recognition of character is done by five probability calculation methods such as (similarity, hamming, linear correlation, cross-correlation, nearest neighbor) with Dempster-Shafer theory of belief functions. The main objective of this paper is to Recognition of Urdu letters and numerals through five similarity and dissimilarity algorithms to find the similarity between the given image and the standard template in the character recognition system. In this paper we develop a method to combine the results of the different distance measurement methods using the Dempster-Shafer theory. This idea enables us to obtain a single precision result. It was observed that the combination of these results ultimately enhanced the success rate.

신경회로망을 이용한 UPFC가 연계된 송전선로의 거리계전기에 관한 연구 (A Study on Distance Relay of Transmission with UPFC Using Artificial Neural Network)

  • 박정호;정창호;신동준;김진오
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 하계학술대회 논문집 A
    • /
    • pp.196-198
    • /
    • 2002
  • This paper represents a new approach for the protective relay of power transmission lines using a Artificial Neural Network(ANN). A different fault on transmission lines need to be detected, classified and located accurately and cleared as fast as possible. However, The protection range of the distance relay is always designed on the basis of fixed settings, and unfortunately these approach do not have the ability to adapt dynamically to the system operating condition. ANN is suitable for the adaptive relaying and the detection of complex faults. The backpropagation algorithm based multi-layer perceptron is utilized for the learning process. It allows to make control to various protection functions. As expected, the simulation result demonstrate that this approach is useful and satisfactory.

  • PDF

Architecture Support for Context-aware Adaptation of Rich Sensing Smartphone Applications

  • Meng, Zhaozong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권1호
    • /
    • pp.248-268
    • /
    • 2018
  • The performance of smartphone applications are usually constrained in user interactions due to resource limitation and it promises great opportunities to improve the performance by exploring the smartphone built-in and embedded sensing techniques. However, heterogeneity in techniques, semantic gap between sensor data and usable context, and complexity of contextual situations keep the techniques from seamless integration. Relevant studies mainly focus on feasibility demonstration of emerging sensing techniques, which rarely address both general architectures and comprehensive technical solutions. Based on a proposed functional model, this investigation provides a general architecture to deal with the dynamic context for context-aware automation and decision support. In order to take advantage of the built-in sensors to improve the performance of mobile applications, an ontology-based method is employed for context modelling, linguistic variables are used for heterogeneous context presentation, and semantic distance-based rule matching is employed to customise functions to the contextual situations. A case study on mobile application authentication is conducted with smartphone built-in hardware modules. The results demonstrate the feasibility of the proposed solutions and their effectiveness in improving operational efficiency.

침투성장거리를 이용한 로봇팔의 장애물회피 최적운동 (Obstacle-Free Optimal Motions of a Manipulator Arm Using Penetration Growth Distance)

  • 박종근
    • 한국정밀공학회지
    • /
    • 제18권10호
    • /
    • pp.116-126
    • /
    • 2001
  • This paper suggests a numerical method to find optimal geometric path and minimum-time motion for a spatial 6-link manipulator arm (PUMA 560 type). To find a minimum-time motion, the optimal geometric paths minimizing 2 different dynamic performance indices are searched first, and the minimum-time motions are searched on these optimal paths. In the algorithm to find optimal geometric paths, the objective functions (performance indices) are selected to minimize joint velocities, actuator forces or the combinations of them as well as to avoid one static obstacle. In the minimum-time algorithm the traveling time is expressed by the power series including 21 terms. The coefficients of the series are obtained using nonlinear programming to minimize the total traveling time subject to the constraints of velocity-dependent actuator forces.

  • PDF

The hydrocarbon concentration distribution in the contaminated site using geospatial analysis

  • Lee, Ju-Young;Yang, Jung-Seok;Choi, Jae-Young;Krishinamurshy, Ganeshi
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2007년도 학술발표회 논문집
    • /
    • pp.909-910
    • /
    • 2007
  • The volatile organic compounds exposure is governed by the source distance and dispersion of the pollutant into air and groundwater. The purpose of this study was to validate suggested models for the prediction of concentration distributions. The study design was organized into different methods to simulate industry site. The distribution models generally showed a fair agreement with measured data. For graphical representation of concentration of volatile hydrocarbon, it has to obtain a continuous representation of the contamination of the site. Therefore, the used interpolative methods examined for this project are the IDW(inverse Distance Weighting) and kriging method. In the results, in summary, all two different methods can be used to quantify exposures at a particular source area, and thus provide, a solid foundation for making risk-based decisions. All the calculations can be performed using Excel's built-in functions, and the capabilities of geospatial analysis allow the results to be displayed visually. However, anyone who uses these methods should understand all of the assumptions and limitation.

  • PDF