• Title/Summary/Keyword: face feature

Search Result 881, Processing Time 0.033 seconds

Vision-Based Real-Time Motion Capture System

  • Kim, Tae-Ho;Jo, Kang-Hyun;Yoon, Yeo-Hong;Kang, Hyun-Duk;Kim, Dae-Nyeon;Kim, Se-Yoon;Lee, In-Ho;Park, Chang-Jun;Leem Nan-Hee;Kim, Sung-Een
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.171.5-171
    • /
    • 2001
  • Information that is acquired by adhered sensors on a body has been commonly used for the three-dimensional real-time motion capture algorithm. This paper describes realtime motion capture algorithm using computer vision. In a real-time image sequence, human body silhouette is extracted use a background subtraction between background image and the reference image. Then a human standing posture whether forward or backward is estimated by extraction of skin region in the silhoutte. After then, the principal axis is calculated in the torso and the face region is estimated on the principal axis. Feature points, which are essential condition to track the human gesture, are obtained ...

  • PDF

Fuzzy estimation of minor flank wear in face milling (면삭밀링가공시 공구 부절삭날 마모길이의 퍼지적 평가)

  • Ko, Tae Jo;Cho, Dong Woo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.12 no.4
    • /
    • pp.28-38
    • /
    • 1995
  • The flank wear at the minor cutting edge significantly affects the geometric accuracy and surface roughness in finish machining. A fuzzy estimator based on a fuzzy inference algorithm with a max-min composition rule is introduced to evaluate the minor flank wear length. The features sensitive to minor flank wear are extracted from the dispersion analysis of a time series AR model of the feed directional acceleration signal. These features, dispersions, are used for constructing linguistic rules, and then the fuzzy inferences are carried out with test data sets collected under various cutting conditions. The proposed system turns out to be effective for estimating minor flank wear length.

  • PDF

Android-based Face detection using OpenCV (안드로이드 기반의 휴대용 스마트폰을 이용한 실시간 얼굴 검출)

  • Koo, Mose;Kim, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.1077-1079
    • /
    • 2020
  • 본 논문에서는 현재 활발히 연구 중에 있는 얼굴 인식의 전 과정인 얼굴 검출단계를 OpenCV를 이용한 안드로이드 기반의 휴대용 스마트폰으로 실시간 얼굴 및 눈 영역을 검출하는 어플리케이션의 개발을 수행하였다. 얼굴 검출 및 눈 검출 기술은 OpenCV에서 제공하는 실시간 얼굴 인식을 위해 이미지에서 얼굴의 특징을 찾는 기법 중 하나인 Haar-like Feature을 이용한 검출 방식을 사용하였다. 얼굴 검출 및 눈 검출에 대해 스마트폰에서 촬영한 이미지를 사용하여 구현 결과를 평가하였다.

Feature Comparison of Emotion Recognition Models using Face Images (얼굴사진 기반 감정인식 모델의 특성 분석)

  • Kim, MinGeyung;Yang, Jiyoon;Choi, Yoo-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.615-617
    • /
    • 2022
  • 본 논문에서는 얼굴사진 기반 감정인식 심층망, 음성사운드를 기반한 감정인식 심층망을 결합한 앙상블 네트워크 구축을 위한 사전연구로서 얼굴사진 기반 감정을 인식하는 기존 딥뉴럴 네트워크 모델들을 입력 데이터 처리 방법에 따라 분류하고, 각 방법의 특성을 분석한다. 또한, 얼굴사진 외관 특성을 기반한 감정인식 네트워크를 여러 구조로 구성하고, 구성된 방법의 성능을 비교하여, 우수 성능을 보이는 네트워크를 선정하여 추후 앙상블 네트워크의 구성 네트워크로 사용하고자 한다.

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

Structural Design on Small Scale Sandwich Composite Wind Turbine Blade

  • Seongjin Ahn;Hyunbum Park
    • International Journal of Aerospace System Engineering
    • /
    • v.10 no.2
    • /
    • pp.1-4
    • /
    • 2023
  • Even though the recent development trend of wind turbine systems has been focused on larger MW Classes, the small-scale wind turbine system has been continuously developed because it has some advantages due to easy personnel establishment and use with low cost and energy saving effect. This work is to propose a specific structural design and analysis procedure for development of a low noise 500W class small wind turbine system which will be applicable to relatively low wind speed region like Korea. The proposed structural feature has a skin-spar-foam sandwich composite structure with the E-glass/Epoxy face sheets and the Urethane foam core for lightness, structural stability, low manufacturing cost and easy manufacturing process. Moreover this type of structure has good behaviors for reduction of vibration and noise. Structural analysis including load cases, stress, deformation, buckling and vibration was performed using the Finite Element Method. In order to evaluate the designed blade structure the structural tests were done, and their test results were compared with the estimated results.

Anomaly-based Alzheimer's disease detection using entropy-based probability Positron Emission Tomography images

  • Husnu Baris Baydargil;Jangsik Park;Ibrahim Furkan Ince
    • ETRI Journal
    • /
    • v.46 no.3
    • /
    • pp.513-525
    • /
    • 2024
  • Deep neural networks trained on labeled medical data face major challenges owing to the economic costs of data acquisition through expensive medical imaging devices, expert labor for data annotation, and large datasets to achieve optimal model performance. The heterogeneity of diseases, such as Alzheimer's disease, further complicates deep learning because the test cases may substantially differ from the training data, possibly increasing the rate of false positives. We propose a reconstruction-based self-supervised anomaly detection model to overcome these challenges. It has a dual-subnetwork encoder that enhances feature encoding augmented by skip connections to the decoder for improving the gradient flow. The novel encoder captures local and global features to improve image reconstruction. In addition, we introduce an entropy-based image conversion method. Extensive evaluations show that the proposed model outperforms benchmark models in anomaly detection and classification using an encoder. The supervised and unsupervised models show improved performances when trained with data preprocessed using the proposed image conversion method.

The Formation and Geomorphic Development of Chon-hwang-san(Mt.) Talus (천황산 Talus의 형성과 지형발달)

  • Jeon, Young-Gweon
    • Journal of the Korean association of regional geographers
    • /
    • v.2 no.2
    • /
    • pp.173-182
    • /
    • 1996
  • The intent of this paper is to examine the talus in Chon-hwang-san in the southern part of Korean Peninsula, and then analyze its geomorphic feature and origin. The research is summarized as follows; (1) The talus is 220m long and the range of the width from 10 to 75m. The mean gradient is $33^{\circ}$ and the mean block size is $110{\times}59cm$(long axis$\times$short axis). The overall appearance of the talus is tongue-shaped and the geology of the constituent blocks is dacite. (2) This talus has two particular geomorphic landscapes. One is that the talus has not free face as source of blocks back of itself; the free face of the talus has been parallel retreated to disappearance by frost attack. The other is that the upper part of the talus is on the ridge. (3) This talus is classified into rock fall talus type, and the shape of rock fragments is angular. When considered in conjunction with face of being mentioned above, the morphology and lithology of the talus are best explained on the basis of origin under periglacial environment during late pleistocene time. (4) Most constituent rock debris are now lichen-covered, or covered with a mantle of weathering. There is no evidence of appreciable movement and for supplying block. Therefore, the talus appears to be relict or fossil form stage, currently.

  • PDF

A Study on Controlling IPTV Interface Based on Tracking of Face and Eye Positions (얼굴 및 눈 위치 추적을 통한 IPTV 화면 인터페이스 제어에 관한 연구)

  • Lee, Won-Oh;Lee, Eui-Chul;Park, Kang-Ryoung;Lee, Hee-Kyung;Park, Min-Sik;Lee, Han-Kyu;Hong, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.930-939
    • /
    • 2010
  • Recently, many researches for making more comfortable input device based on gaze detection have been vigorously performed in human computer interaction. However, these previous researches are difficult to be used in IPTV environment because these methods need additional wearing devices or do not work at a distance. To overcome these problems, we propose a new way of controlling IPTV interface by using a detected face and eye positions in single static camera. And although face or eyes are not detected successfully by using Adaboost algorithm, we can control IPTV interface by using motion vectors calculated by pyramidal KLT (Kanade-Lucas-Tomasi) feature tracker. These are two novelties of our research compared to previous works. This research has following advantages. Different from previous research, the proposed method can be used at a distance about 2m. Since the proposed method does not require a user to wear additional equipments, there is no limitation of face movement and it has high convenience. Experimental results showed that the proposed method could be operated at real-time speed of 15 frames per second. Wd confirmed that the previous input device could be sufficiently replaced by the proposed method.

Cascade CNN with CPU-FPGA Architecture for Real-time Face Detection (실시간 얼굴 검출을 위한 Cascade CNN의 CPU-FPGA 구조 연구)

  • Nam, Kwang-Min;Jeong, Yong-Jin
    • Journal of IKEEE
    • /
    • v.21 no.4
    • /
    • pp.388-396
    • /
    • 2017
  • Since there are many variables such as various poses, illuminations and occlusions in a face detection problem, a high performance detection system is required. Although CNN is excellent in image classification, CNN operatioin requires high-performance hardware resources. But low cost low power environments are essential for small and mobile systems. So in this paper, the CPU-FPGA integrated system is designed based on 3-stage cascade CNN architecture using small size FPGA. Adaptive Region of Interest (ROI) is applied to reduce the number of CNN operations using face information of the previous frame. We use a Field Programmable Gate Array(FPGA) to accelerate the CNN computations. The accelerator reads multiple featuremap at once on the FPGA and performs a Multiply-Accumulate (MAC) operation in parallel for convolution operation. The system is implemented on Altera Cyclone V FPGA in which ARM Cortex A-9 and on-chip SRAM are embedded. The system runs at 30FPS with HD resolution input images. The CPU-FPGA integrated system showed 8.5 times of the power efficiency compared to systems using CPU only.