WorldWideScience

Sample records for boundary recognition system

  1. Recognition of boundary feedback systems

    DEFF Research Database (Denmark)

    Pedersen, Michael

    1989-01-01

    A system that has been the object of intense research is outlined. In view of that and recent progress of the theory of pseudodifferential boundary operator calculus, the author describes some features that could prove to be interesting in connection with the problems of boundary feedback stabili...... stabilizability. It is shown that it is possible to use the calculus to consider more general feedback systems in a variational setup.......A system that has been the object of intense research is outlined. In view of that and recent progress of the theory of pseudodifferential boundary operator calculus, the author describes some features that could prove to be interesting in connection with the problems of boundary feedback...

  2. Industrial robots with sensors and object recognition systems

    International Nuclear Information System (INIS)

    Koehler, G.W.

    1978-01-01

    The previous development and the present status of industrial robots equipped with sensors and object recognition systems are described. This type of equipment allows flexible automation of many work stations in which industrial robots of the first generation, which are unable to react to changes in their respective environments automatically, apart from their being linked to other machines, could not be used because of the prevailing boundary conditions. A classification system facilitates an overview of the large number of technical solutions now available. The manifold possibilities of application of this equipment are demonstrated by a number of examples. As a result of the present state of development of the components required, and in view also of economic reasons, there is a trend towards special designs for a small number of specific purposes and towards stripped-down object recognition. systems with limited applications. A fitting description is offered of the term 'robot', which is now being used in various contexts, and an indication is made of the capabilities and components a machine to be called robot should have as a minimum. Finally, reference is made to some potential lines of development serving to reduce expediture and accelerate recognition processes. (orig.) [de

  3. A Psychodynamic Perspective of Workplace Bullying: Containment, Boundaries and a Futile Search for Recognition

    Science.gov (United States)

    White, Sheila

    2004-01-01

    This paper presents a psychodynamic perspective of workplace bullying. It focuses on two related psychoanalytical concepts, containment and boundaries. The life cycle theory of bullying builds on these concepts and describes in-depth the evolving relationship between a bully and a victim. The search for recognition by the bully and victim proves…

  4. Rotation-invariant neural pattern recognition system with application to coin recognition.

    Science.gov (United States)

    Fukumi, M; Omatu, S; Takeda, F; Kosaka, T

    1992-01-01

    In pattern recognition, it is often necessary to deal with problems to classify a transformed pattern. A neural pattern recognition system which is insensitive to rotation of input pattern by various degrees is proposed. The system consists of a fixed invariance network with many slabs and a trainable multilayered network. The system was used in a rotation-invariant coin recognition problem to distinguish between a 500 yen coin and a 500 won coin. The results show that the approach works well for variable rotation pattern recognition.

  5. View-Invariant Gait Recognition Through Genetic Template Segmentation

    Science.gov (United States)

    Isaac, Ebenezer R. H. P.; Elias, Susan; Rajagopalan, Srinivasan; Easwarakumar, K. S.

    2017-08-01

    Template-based model-free approach provides by far the most successful solution to the gait recognition problem in literature. Recent work discusses how isolating the head and leg portion of the template increase the performance of a gait recognition system making it robust against covariates like clothing and carrying conditions. However, most involve a manual definition of the boundaries. The method we propose, the genetic template segmentation (GTS), employs the genetic algorithm to automate the boundary selection process. This method was tested on the GEI, GEnI and AEI templates. GEI seems to exhibit the best result when segmented with our approach. Experimental results depict that our approach significantly outperforms the existing implementations of view-invariant gait recognition.

  6. Optimal boundary control and boundary stabilization of hyperbolic systems

    CERN Document Server

    Gugat, Martin

    2015-01-01

    This brief considers recent results on optimal control and stabilization of systems governed by hyperbolic partial differential equations, specifically those in which the control action takes place at the boundary.  The wave equation is used as a typical example of a linear system, through which the author explores initial boundary value problems, concepts of exact controllability, optimal exact control, and boundary stabilization.  Nonlinear systems are also covered, with the Korteweg-de Vries and Burgers Equations serving as standard examples.  To keep the presentation as accessible as possible, the author uses the case of a system with a state that is defined on a finite space interval, so that there are only two boundary points where the system can be controlled.  Graduate and post-graduate students as well as researchers in the field will find this to be an accessible introduction to problems of optimal control and stabilization.

  7. Touchless palmprint recognition systems

    CERN Document Server

    Genovese, Angelo; Scotti, Fabio

    2014-01-01

    This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies in this rapidly evolving field and is one of the first comprehensive books on palmprint recognition systems.It discusses the research literature and the most relevant industrial applications of palmprint biometrics, including the low-cost solutions based on webcams. The steps of biometric recognition are described in detail, including acquisition setups, algorithms, and evaluation procedures. Const

  8. Cognitive object recognition system (CORS)

    Science.gov (United States)

    Raju, Chaitanya; Varadarajan, Karthik Mahesh; Krishnamurthi, Niyant; Xu, Shuli; Biederman, Irving; Kelley, Troy

    2010-04-01

    We have developed a framework, Cognitive Object Recognition System (CORS), inspired by current neurocomputational models and psychophysical research in which multiple recognition algorithms (shape based geometric primitives, 'geons,' and non-geometric feature-based algorithms) are integrated to provide a comprehensive solution to object recognition and landmarking. Objects are defined as a combination of geons, corresponding to their simple parts, and the relations among the parts. However, those objects that are not easily decomposable into geons, such as bushes and trees, are recognized by CORS using "feature-based" algorithms. The unique interaction between these algorithms is a novel approach that combines the effectiveness of both algorithms and takes us closer to a generalized approach to object recognition. CORS allows recognition of objects through a larger range of poses using geometric primitives and performs well under heavy occlusion - about 35% of object surface is sufficient. Furthermore, geon composition of an object allows image understanding and reasoning even with novel objects. With reliable landmarking capability, the system improves vision-based robot navigation in GPS-denied environments. Feasibility of the CORS system was demonstrated with real stereo images captured from a Pioneer robot. The system can currently identify doors, door handles, staircases, trashcans and other relevant landmarks in the indoor environment.

  9. Boundary-value problems with free boundaries for elliptic systems of equations

    CERN Document Server

    Monakhov, V N

    1983-01-01

    This book is concerned with certain classes of nonlinear problems for elliptic systems of partial differential equations: boundary-value problems with free boundaries. The first part has to do with the general theory of boundary-value problems for analytic functions and its applications to hydrodynamics. The second presents the theory of quasiconformal mappings, along with the theory of boundary-value problems for elliptic systems of equations and applications of it to problems in the mechanics of continuous media with free boundaries: problems in subsonic gas dynamics, filtration theory, and problems in elastico-plasticity.

  10. On Mario Bunge's Definition of System and System Boundary

    Science.gov (United States)

    Cavallo, Andrew M.

    2012-01-01

    In this short paper we discuss Mario Bunge's definition of system boundary. It is quickly discovered that Bunge's definition of system and system boundary are both deficient. We thus propose new definitions, which (hopefully) improve the situation. Our definition of system boundary works off the same intuition behind Bunge's.

  11. An audiovisual emotion recognition system

    Science.gov (United States)

    Han, Yi; Wang, Guoyin; Yang, Yong; He, Kun

    2007-12-01

    Human emotions could be expressed by many bio-symbols. Speech and facial expression are two of them. They are both regarded as emotional information which is playing an important role in human-computer interaction. Based on our previous studies on emotion recognition, an audiovisual emotion recognition system is developed and represented in this paper. The system is designed for real-time practice, and is guaranteed by some integrated modules. These modules include speech enhancement for eliminating noises, rapid face detection for locating face from background image, example based shape learning for facial feature alignment, and optical flow based tracking algorithm for facial feature tracking. It is known that irrelevant features and high dimensionality of the data can hurt the performance of classifier. Rough set-based feature selection is a good method for dimension reduction. So 13 speech features out of 37 ones and 10 facial features out of 33 ones are selected to represent emotional information, and 52 audiovisual features are selected due to the synchronization when speech and video fused together. The experiment results have demonstrated that this system performs well in real-time practice and has high recognition rate. Our results also show that the work in multimodules fused recognition will become the trend of emotion recognition in the future.

  12. Automatic anatomy recognition via multiobject oriented active shape models.

    Science.gov (United States)

    Chen, Xinjian; Udupa, Jayaram K; Alavi, Abass; Torigian, Drew A

    2010-12-01

    This paper studies the feasibility of developing an automatic anatomy recognition (AAR) system in clinical radiology and demonstrates its operation on clinical 2D images. The anatomy recognition method described here consists of two main components: (a) multiobject generalization of OASM and (b) object recognition strategies. The OASM algorithm is generalized to multiple objects by including a model for each object and assigning a cost structure specific to each object in the spirit of live wire. The delineation of multiobject boundaries is done in MOASM via a three level dynamic programming algorithm, wherein the first level is at pixel level which aims to find optimal oriented boundary segments between successive landmarks, the second level is at landmark level which aims to find optimal location for the landmarks, and the third level is at the object level which aims to find optimal arrangement of object boundaries over all objects. The object recognition strategy attempts to find that pose vector (consisting of translation, rotation, and scale component) for the multiobject model that yields the smallest total boundary cost for all objects. The delineation and recognition accuracies were evaluated separately utilizing routine clinical chest CT, abdominal CT, and foot MRI data sets. The delineation accuracy was evaluated in terms of true and false positive volume fractions (TPVF and FPVF). The recognition accuracy was assessed (1) in terms of the size of the space of the pose vectors for the model assembly that yielded high delineation accuracy, (2) as a function of the number of objects and objects' distribution and size in the model, (3) in terms of the interdependence between delineation and recognition, and (4) in terms of the closeness of the optimum recognition result to the global optimum. When multiple objects are included in the model, the delineation accuracy in terms of TPVF can be improved to 97%-98% with a low FPVF of 0.1%-0.2%. Typically, a

  13. Image quality assessment for video stream recognition systems

    Science.gov (United States)

    Chernov, Timofey S.; Razumnuy, Nikita P.; Kozharinov, Alexander S.; Nikolaev, Dmitry P.; Arlazarov, Vladimir V.

    2018-04-01

    Recognition and machine vision systems have long been widely used in many disciplines to automate various processes of life and industry. Input images of optical recognition systems can be subjected to a large number of different distortions, especially in uncontrolled or natural shooting conditions, which leads to unpredictable results of recognition systems, making it impossible to assess their reliability. For this reason, it is necessary to perform quality control of the input data of recognition systems, which is facilitated by modern progress in the field of image quality evaluation. In this paper, we investigate the approach to designing optical recognition systems with built-in input image quality estimation modules and feedback, for which the necessary definitions are introduced and a model for describing such systems is constructed. The efficiency of this approach is illustrated by the example of solving the problem of selecting the best frames for recognition in a video stream for a system with limited resources. Experimental results are presented for the system for identity documents recognition, showing a significant increase in the accuracy and speed of the system under simulated conditions of automatic camera focusing, leading to blurring of frames.

  14. Random-Profiles-Based 3D Face Recognition System

    Directory of Open Access Journals (Sweden)

    Joongrock Kim

    2014-03-01

    Full Text Available In this paper, a noble nonintrusive three-dimensional (3D face modeling system for random-profile-based 3D face recognition is presented. Although recent two-dimensional (2D face recognition systems can achieve a reliable recognition rate under certain conditions, their performance is limited by internal and external changes, such as illumination and pose variation. To address these issues, 3D face recognition, which uses 3D face data, has recently received much attention. However, the performance of 3D face recognition highly depends on the precision of acquired 3D face data, while also requiring more computational power and storage capacity than 2D face recognition systems. In this paper, we present a developed nonintrusive 3D face modeling system composed of a stereo vision system and an invisible near-infrared line laser, which can be directly applied to profile-based 3D face recognition. We further propose a novel random-profile-based 3D face recognition method that is memory-efficient and pose-invariant. The experimental results demonstrate that the reconstructed 3D face data consists of more than 50 k 3D point clouds and a reliable recognition rate against pose variation.

  15. SURVEY OF BIOMETRIC SYSTEMS USING IRIS RECOGNITION

    OpenAIRE

    S.PON SANGEETHA; DR.M.KARNAN

    2014-01-01

    The security plays an important role in any type of organization in today’s life. Iris recognition is one of the leading automatic biometric systems in the area of security which is used to identify the individual person. Biometric systems include fingerprints, facial features, voice recognition, hand geometry, handwriting, the eye retina and the most secured one presented in this paper, the iris recognition. Biometric systems has become very famous in security systems because it is not possi...

  16. Hybrid gesture recognition system for short-range use

    Science.gov (United States)

    Minagawa, Akihiro; Fan, Wei; Katsuyama, Yutaka; Takebe, Hiroaki; Ozawa, Noriaki; Hotta, Yoshinobu; Sun, Jun

    2012-03-01

    In recent years, various gesture recognition systems have been studied for use in television and video games[1]. In such systems, motion areas ranging from 1 to 3 meters deep have been evaluated[2]. However, with the burgeoning popularity of small mobile displays, gesture recognition systems capable of operating at much shorter ranges have become necessary. The problems related to such systems are exacerbated by the fact that the camera's field of view is unknown to the user during operation, which imposes several restrictions on his/her actions. To overcome the restrictions generated from such mobile camera devices, and to create a more flexible gesture recognition interface, we propose a hybrid hand gesture system, in which two types of gesture recognition modules are prepared and with which the most appropriate recognition module is selected by a dedicated switching module. The two recognition modules of this system are shape analysis using a boosting approach (detection-based approach)[3] and motion analysis using image frame differences (motion-based approach)(for example, see[4]). We evaluated this system using sample users and classified the resulting errors into three categories: errors that depend on the recognition module, errors caused by incorrect module identification, and errors resulting from user actions. In this paper, we show the results of our investigations and explain the problems related to short-range gesture recognition systems.

  17. Pattern Recognition Methods and Features Selection for Speech Emotion Recognition System.

    Science.gov (United States)

    Partila, Pavol; Voznak, Miroslav; Tovarek, Jaromir

    2015-01-01

    The impact of the classification method and features selection for the speech emotion recognition accuracy is discussed in this paper. Selecting the correct parameters in combination with the classifier is an important part of reducing the complexity of system computing. This step is necessary especially for systems that will be deployed in real-time applications. The reason for the development and improvement of speech emotion recognition systems is wide usability in nowadays automatic voice controlled systems. Berlin database of emotional recordings was used in this experiment. Classification accuracy of artificial neural networks, k-nearest neighbours, and Gaussian mixture model is measured considering the selection of prosodic, spectral, and voice quality features. The purpose was to find an optimal combination of methods and group of features for stress detection in human speech. The research contribution lies in the design of the speech emotion recognition system due to its accuracy and efficiency.

  18. Pattern Recognition Methods and Features Selection for Speech Emotion Recognition System

    Directory of Open Access Journals (Sweden)

    Pavol Partila

    2015-01-01

    Full Text Available The impact of the classification method and features selection for the speech emotion recognition accuracy is discussed in this paper. Selecting the correct parameters in combination with the classifier is an important part of reducing the complexity of system computing. This step is necessary especially for systems that will be deployed in real-time applications. The reason for the development and improvement of speech emotion recognition systems is wide usability in nowadays automatic voice controlled systems. Berlin database of emotional recordings was used in this experiment. Classification accuracy of artificial neural networks, k-nearest neighbours, and Gaussian mixture model is measured considering the selection of prosodic, spectral, and voice quality features. The purpose was to find an optimal combination of methods and group of features for stress detection in human speech. The research contribution lies in the design of the speech emotion recognition system due to its accuracy and efficiency.

  19. Probabilistic Open Set Recognition

    Science.gov (United States)

    Jain, Lalit Prithviraj

    Real-world tasks in computer vision, pattern recognition and machine learning often touch upon the open set recognition problem: multi-class recognition with incomplete knowledge of the world and many unknown inputs. An obvious way to approach such problems is to develop a recognition system that thresholds probabilities to reject unknown classes. Traditional rejection techniques are not about the unknown; they are about the uncertain boundary and rejection around that boundary. Thus traditional techniques only represent the "known unknowns". However, a proper open set recognition algorithm is needed to reduce the risk from the "unknown unknowns". This dissertation examines this concept and finds existing probabilistic multi-class recognition approaches are ineffective for true open set recognition. We hypothesize the cause is due to weak adhoc assumptions combined with closed-world assumptions made by existing calibration techniques. Intuitively, if we could accurately model just the positive data for any known class without overfitting, we could reject the large set of unknown classes even under this assumption of incomplete class knowledge. For this, we formulate the problem as one of modeling positive training data by invoking statistical extreme value theory (EVT) near the decision boundary of positive data with respect to negative data. We provide a new algorithm called the PI-SVM for estimating the unnormalized posterior probability of class inclusion. This dissertation also introduces a new open set recognition model called Compact Abating Probability (CAP), where the probability of class membership decreases in value (abates) as points move from known data toward open space. We show that CAP models improve open set recognition for multiple algorithms. Leveraging the CAP formulation, we go on to describe the novel Weibull-calibrated SVM (W-SVM) algorithm, which combines the useful properties of statistical EVT for score calibration with one-class and binary

  20. Combat Systems Department Employee Recognition System

    National Research Council Canada - National Science Library

    1996-01-01

    This handbook contains two types of information: guidelines and instructions. The guidelines provide a foundation of purpose, assumptions, principles, expectations and attributes the Employee Recognition System is designed to reflect...

  1. Fingerprint recognition system by use of graph matching

    Science.gov (United States)

    Shen, Wei; Shen, Jun; Zheng, Huicheng

    2001-09-01

    Fingerprint recognition is an important subject in biometrics to identify or verify persons by physiological characteristics, and has found wide applications in different domains. In the present paper, we present a finger recognition system that combines singular points and structures. The principal steps of processing in our system are: preprocessing and ridge segmentation, singular point extraction and selection, graph representation, and finger recognition by graphs matching. Our fingerprint recognition system is implemented and tested for many fingerprint images and the experimental result are satisfactory. Different techniques are used in our system, such as fast calculation of orientation field, local fuzzy dynamical thresholding, algebraic analysis of connections and fingerprints representation and matching by graphs. Wed find that for fingerprint database that is not very large, the recognition rate is very high even without using a prior coarse category classification. This system works well for both one-to-few and one-to-many problems.

  2. Research on Face Recognition Based on Embedded System

    Directory of Open Access Journals (Sweden)

    Hong Zhao

    2013-01-01

    Full Text Available Because a number of image feature data to store, complex calculation to execute during the face recognition, therefore the face recognition process was realized only by PCs with high performance. In this paper, the OpenCV facial Haar-like features were used to identify face region; the Principal Component Analysis (PCA was employed in quick extraction of face features and the Euclidean Distance was also adopted in face recognition; as thus, data amount and computational complexity would be reduced effectively in face recognition, and the face recognition could be carried out on embedded platform. Finally, based on Tiny6410 embedded platform, a set of embedded face recognition systems was constructed. The test results showed that the system has stable operation and high recognition rate can be used in portable and mobile identification and authentication.

  3. Mixed basin boundary structures of chaotic systems

    International Nuclear Information System (INIS)

    Rosa, E. Jr.; Ott, E.

    1999-01-01

    Motivated by recent numerical observations on a four-dimensional continuous-time dynamical system, we consider different types of basin boundary structures for chaotic systems. These general structures are essentially mixtures of the previously known types of basin boundaries where the character of the boundary assumes features of the previously known boundary types at different points arbitrarily finely interspersed in the boundary. For example, we discuss situations where an everywhere continuous boundary that is otherwise smooth and differentiable at almost every point has an embedded uncountable, zero Lebesgue measure set of points at which the boundary curve is nondifferentiable. Although the nondifferentiable set is only of zero Lebesgue measure, the curve close-quote s fractal dimension may (depending on parameters) still be greater than one. In addition, we discuss bifurcations from such a mixed boundary to a 'pure' boundary that is a fractal nowhere differentiable curve or surface and to a pure nonfractal boundary that is everywhere smooth. copyright 1999 The American Physical Society

  4. Working with boundaries in systems psychodynamic consulting

    Directory of Open Access Journals (Sweden)

    Henk Struwig

    2012-03-01

    Research purpose: The purpose of the research was to produce a set of theoretical assumptions about organisational boundaries and boundary management in organisations and, from these, to develop a set of hypotheses as a thinking framework for practising consulting psychologists when they work with boundaries from a systems psychodynamic stance. Motivation for the study: The researcher used the belief that organisational boundaries reflect the essence of organisations. Consulting to boundary managers could facilitate a deep understanding of organisational dynamics. Research design, approach and method: The researcher followed a case study design. He used systems psychodynamic discourse analysis. It led to six working hypotheses. Main findings: The primary task of boundary management is to hold the polarities of integration and differentiation and not allow the system to become fragmented or overly integrated. Boundary management is a primary task and an ongoing activity of entire organisations. Practical/managerial implications: Organisations should work actively at effective boundary management and at balancing integration and differentiation. Leaders should become aware of how effective boundary management leads to good holding environments that, in turn, lead to containing difficult emotions in organisations. Contribution/value-add: The researcher provided a boundary-consulting framework in order to assist consultants to balance the conceptual with the practical when they consult.

  5. Model-based vision system for automatic recognition of structures in dental radiographs

    Science.gov (United States)

    Acharya, Raj S.; Samarabandu, Jagath K.; Hausmann, E.; Allen, K. A.

    1991-07-01

    X-ray diagnosis of destructive periodontal disease requires assessing serial radiographs by an expert to determine the change in the distance between cemento-enamel junction (CEJ) and the bone crest. To achieve this without the subjectivity of a human expert, a knowledge based system is proposed to automatically locate the two landmarks which are the CEJ and the level of alveolar crest at its junction with the periodontal ligament space. This work is a part of an ongoing project to automatically measure the distance between CEJ and the bone crest along a line parallel to the axis of the tooth. The approach presented in this paper is based on identifying a prominent feature such as the tooth boundary using local edge detection and edge thresholding to establish a reference and then using model knowledge to process sub-regions in locating the landmarks. Segmentation techniques invoked around these regions consists of a neural-network like hierarchical refinement scheme together with local gradient extraction, multilevel thresholding and ridge tracking. Recognition accuracy is further improved by first locating the easily identifiable parts of the bone surface and the interface between the enamel and the dentine and then extending these boundaries towards the periodontal ligament space and the tooth boundary respectively. The system is realized as a collection of tools (or knowledge sources) for pre-processing, segmentation, primary and secondary feature detection and a control structure based on the blackboard model to coordinate the activities of these tools.

  6. 8th International Conference on Computer Recognition Systems

    CERN Document Server

    Jackowski, Konrad; Kurzynski, Marek; Wozniak, Michał; Zolnierek, Andrzej

    2013-01-01

    The computer recognition systems are nowadays one of the most promising directions in artificial intelligence. This book is the most comprehensive study of this field. It contains a collection of 86 carefully selected articles contributed by experts of pattern recognition. It reports on current research with respect to both methodology and applications. In particular, it includes the following sections: Biometrics Data Stream Classification and Big Data Analytics  Features, learning, and classifiers Image processing and computer vision Medical applications Miscellaneous applications Pattern recognition and image processing in robotics  Speech and word recognition This book is a great reference tool for scientists who deal with the problems of designing computer pattern recognition systems. Its target readers can be the as well researchers as students of computer science, artificial intelligence or robotics.

  7. DEVELOPMENT OF HOLE RECOGNITION SYSTEM FROM STEP FILE

    Directory of Open Access Journals (Sweden)

    C. F. Tan

    2017-11-01

    Full Text Available This paper describes the development of Hole Recognition System (HRS for Computer-Aided Process Planning (CAPP using a neutral data format produced by CAD system. The geometrical data of holes is retrieved from STandard for the Exchange of Product model data (STEP. Rule-based algorithm is used during recognising process. Current implementation of feature recognition is limited to simple hole feat ures. Test results are presented to demonstrate the capabilities of the feature recognition algorithm.

  8. Biometric Features in Person Recognition Systems

    Directory of Open Access Journals (Sweden)

    Edgaras Ivanovas

    2011-03-01

    Full Text Available Lately a lot of research effort is devoted for recognition of a human being using his biometric characteristics. Biometric recognition systems are used in various applications, e. g., identification for state border crossing or firearm, which allows only enrolled persons to use it. In this paper biometric characteristics and their properties are reviewed. Development of high accuracy system requires distinctive and permanent characteristics, whereas development of user friendly system requires collectable and acceptable characteristics. It is showed that properties of biometric characteristics do not influence research effort significantly. Properties of biometric characteristic features and their influence are discussed.Article in Lithuanian

  9. Hierarchical Recognition Scheme for Human Facial Expression Recognition Systems

    Directory of Open Access Journals (Sweden)

    Muhammad Hameed Siddiqi

    2013-12-01

    Full Text Available Over the last decade, human facial expressions recognition (FER has emerged as an important research area. Several factors make FER a challenging research problem. These include varying light conditions in training and test images; need for automatic and accurate face detection before feature extraction; and high similarity among different expressions that makes it difficult to distinguish these expressions with a high accuracy. This work implements a hierarchical linear discriminant analysis-based facial expressions recognition (HL-FER system to tackle these problems. Unlike the previous systems, the HL-FER uses a pre-processing step to eliminate light effects, incorporates a new automatic face detection scheme, employs methods to extract both global and local features, and utilizes a HL-FER to overcome the problem of high similarity among different expressions. Unlike most of the previous works that were evaluated using a single dataset, the performance of the HL-FER is assessed using three publicly available datasets under three different experimental settings: n-fold cross validation based on subjects for each dataset separately; n-fold cross validation rule based on datasets; and, finally, a last set of experiments to assess the effectiveness of each module of the HL-FER separately. Weighted average recognition accuracy of 98.7% across three different datasets, using three classifiers, indicates the success of employing the HL-FER for human FER.

  10. Hierarchical Recognition Scheme for Human Facial Expression Recognition Systems

    Science.gov (United States)

    Siddiqi, Muhammad Hameed; Lee, Sungyoung; Lee, Young-Koo; Khan, Adil Mehmood; Truc, Phan Tran Ho

    2013-01-01

    Over the last decade, human facial expressions recognition (FER) has emerged as an important research area. Several factors make FER a challenging research problem. These include varying light conditions in training and test images; need for automatic and accurate face detection before feature extraction; and high similarity among different expressions that makes it difficult to distinguish these expressions with a high accuracy. This work implements a hierarchical linear discriminant analysis-based facial expressions recognition (HL-FER) system to tackle these problems. Unlike the previous systems, the HL-FER uses a pre-processing step to eliminate light effects, incorporates a new automatic face detection scheme, employs methods to extract both global and local features, and utilizes a HL-FER to overcome the problem of high similarity among different expressions. Unlike most of the previous works that were evaluated using a single dataset, the performance of the HL-FER is assessed using three publicly available datasets under three different experimental settings: n-fold cross validation based on subjects for each dataset separately; n-fold cross validation rule based on datasets; and, finally, a last set of experiments to assess the effectiveness of each module of the HL-FER separately. Weighted average recognition accuracy of 98.7% across three different datasets, using three classifiers, indicates the success of employing the HL-FER for human FER. PMID:24316568

  11. Surface free energy for systems with integrable boundary conditions

    International Nuclear Information System (INIS)

    Goehmann, Frank; Bortz, Michael; Frahm, Holger

    2005-01-01

    The surface free energy is the difference between the free energies for a system with open boundary conditions and the same system with periodic boundary conditions. We use the quantum transfer matrix formalism to express the surface free energy in the thermodynamic limit of systems with integrable boundary conditions as a matrix element of certain projection operators. Specializing to the XXZ spin-1/2 chain we introduce a novel 'finite temperature boundary operator' which characterizes the thermodynamical properties of surfaces related to integrable boundary conditions

  12. Automatic Number Plate Recognition System for IPhone Devices

    Directory of Open Access Journals (Sweden)

    Călin Enăchescu

    2013-06-01

    Full Text Available This paper presents a system for automatic number plate recognition, implemented for devices running the iOS operating system. The methods used for number plate recognition are based on existing methods, but optimized for devices with low hardware resources. To solve the task of automatic number plate recognition we have divided it into the following subtasks: image acquisition, localization of the number plate position on the image and character detection. The first subtask is performed by the camera of an iPhone, the second one is done using image pre-processing methods and template matching. For the character recognition we are using a feed-forward artificial neural network. Each of these methods is presented along with its results.

  13. Automated pattern recognition system for noise analysis

    International Nuclear Information System (INIS)

    Sides, W.H. Jr.; Piety, K.R.

    1980-01-01

    A pattern recognition system was developed at ORNL for on-line monitoring of noise signals from sensors in a nuclear power plant. The system continuousy measures the power spectral density (PSD) values of the signals and the statistical characteristics of the PSDs in unattended operation. Through statistical comparison of current with past PSDs (pattern recognition), the system detects changes in the noise signals. Because the noise signals contain information about the current operational condition of the plant, a change in these signals could indicate a change, either normal or abnormal, in the operational condition

  14. Formal Implementation of a Performance Evaluation Model for the Face Recognition System

    Directory of Open Access Journals (Sweden)

    Yong-Nyuo Shin

    2008-01-01

    Full Text Available Due to usability features, practical applications, and its lack of intrusiveness, face recognition technology, based on information, derived from individuals' facial features, has been attracting considerable attention recently. Reported recognition rates of commercialized face recognition systems cannot be admitted as official recognition rates, as they are based on assumptions that are beneficial to the specific system and face database. Therefore, performance evaluation methods and tools are necessary to objectively measure the accuracy and performance of any face recognition system. In this paper, we propose and formalize a performance evaluation model for the biometric recognition system, implementing an evaluation tool for face recognition systems based on the proposed model. Furthermore, we performed evaluations objectively by providing guidelines for the design and implementation of a performance evaluation system, formalizing the performance test process.

  15. Active Multimodal Sensor System for Target Recognition and Tracking.

    Science.gov (United States)

    Qu, Yufu; Zhang, Guirong; Zou, Zhaofan; Liu, Ziyue; Mao, Jiansen

    2017-06-28

    High accuracy target recognition and tracking systems using a single sensor or a passive multisensor set are susceptible to external interferences and exhibit environmental dependencies. These difficulties stem mainly from limitations to the available imaging frequency bands, and a general lack of coherent diversity of the available target-related data. This paper proposes an active multimodal sensor system for target recognition and tracking, consisting of a visible, an infrared, and a hyperspectral sensor. The system makes full use of its multisensor information collection abilities; furthermore, it can actively control different sensors to collect additional data, according to the needs of the real-time target recognition and tracking processes. This level of integration between hardware collection control and data processing is experimentally shown to effectively improve the accuracy and robustness of the target recognition and tracking system.

  16. Container-code recognition system based on computer vision and deep neural networks

    Science.gov (United States)

    Liu, Yi; Li, Tianjian; Jiang, Li; Liang, Xiaoyao

    2018-04-01

    Automatic container-code recognition system becomes a crucial requirement for ship transportation industry in recent years. In this paper, an automatic container-code recognition system based on computer vision and deep neural networks is proposed. The system consists of two modules, detection module and recognition module. The detection module applies both algorithms based on computer vision and neural networks, and generates a better detection result through combination to avoid the drawbacks of the two methods. The combined detection results are also collected for online training of the neural networks. The recognition module exploits both character segmentation and end-to-end recognition, and outputs the recognition result which passes the verification. When the recognition module generates false recognition, the result will be corrected and collected for online training of the end-to-end recognition sub-module. By combining several algorithms, the system is able to deal with more situations, and the online training mechanism can improve the performance of the neural networks at runtime. The proposed system is able to achieve 93% of overall recognition accuracy.

  17. Neural Mechanisms and Information Processing in Recognition Systems

    Directory of Open Access Journals (Sweden)

    Mamiko Ozaki

    2014-10-01

    Full Text Available Nestmate recognition is a hallmark of social insects. It is based on the match/mismatch of an identity signal carried by members of the society with that of the perceiving individual. While the behavioral response, amicable or aggressive, is very clear, the neural systems underlying recognition are not fully understood. Here we contrast two alternative hypotheses for the neural mechanisms that are responsible for the perception and information processing in recognition. We focus on recognition via chemical signals, as the common modality in social insects. The first, classical, hypothesis states that upon perception of recognition cues by the sensory system the information is passed as is to the antennal lobes and to higher brain centers where the information is deciphered and compared to a neural template. Match or mismatch information is then transferred to some behavior-generating centers where the appropriate response is elicited. An alternative hypothesis, that of “pre-filter mechanism”, posits that the decision as to whether to pass on the information to the central nervous system takes place in the peripheral sensory system. We suggest that, through sensory adaptation, only alien signals are passed on to the brain, specifically to an “aggressive-behavior-switching center”, where the response is generated if the signal is above a certain threshold.

  18. The Boundary-Hopf-Fold Bifurcation in Filippov Systems

    NARCIS (Netherlands)

    Efstathiou, Konstantinos; Liu, Xia; Broer, Henk W.

    2015-01-01

    This paper studies the codimension-3 boundary-Hopf-fold (BHF) bifurcation of planar Filippov systems. Filippov systems consist of at least one discontinuity boundary locally separating the phase space to disjoint components with different dynamics. Such systems find applications in several fields,

  19. Iris Recognition Using Wavelet

    Directory of Open Access Journals (Sweden)

    Khaliq Masood

    2013-08-01

    Full Text Available Biometric systems are getting more attention in the present era. Iris recognition is one of the most secure and authentic among the other biometrics and this field demands more authentic, reliable and fast algorithms to implement these biometric systems in real time. In this paper, an efficient localization technique is presented to identify pupil and iris boundaries using histogram of the iris image. Two small portions of iris have been used for polar transformation to reduce computational time and to increase the efficiency of the system. Wavelet transform is used for feature vector generation. Rotation of iris is compensated without shifts in the iris code. System is tested on Multimedia University Iris Database and results show that proposed system has encouraging performance.

  20. Automated road marking recognition system

    Science.gov (United States)

    Ziyatdinov, R. R.; Shigabiev, R. R.; Talipov, D. N.

    2017-09-01

    Development of the automated road marking recognition systems in existing and future vehicles control systems is an urgent task. One way to implement such systems is the use of neural networks. To test the possibility of using neural network software has been developed with the use of a single-layer perceptron. The resulting system based on neural network has successfully coped with the task both when driving in the daytime and at night.

  1. Enhancement of Iris Recognition System Based on Phase Only Correlation

    Directory of Open Access Journals (Sweden)

    Nuriza Pramita

    2011-08-01

    Full Text Available Iris recognition system is one of biometric based recognition/identification systems. Numerous techniques have been implemented to achieve a good recognition rate, including the ones based on Phase Only Correlation (POC. Significant and higher correlation peaks suggest that the system recognizes iris images of the same subject (person, while lower and unsignificant peaks correspond to recognition of those of difference subjects. Current POC methods have not investigated minimum iris point that can be used to achieve higher correlation peaks. This paper proposed a method that used only one-fourth of full normalized iris size to achieve higher (or at least the same recognition rate. Simulation on CASIA version 1.0 iris image database showed that averaged recognition rate of the proposed method achieved 67%, higher than that of using one-half (56% and full (53% iris point. Furthermore, all (100% POC peak values of the proposed method was higher than that of the method with full iris points.

  2. Automatic TLI recognition system. Part 1: System description

    Energy Technology Data Exchange (ETDEWEB)

    Partin, J.K.; Lassahn, G.D.; Davidson, J.R.

    1994-05-01

    This report describes an automatic target recognition system for fast screening of large amounts of multi-sensor image data, based on low-cost parallel processors. This system uses image data fusion and gives uncertainty estimates. It is relatively low cost, compact, and transportable. The software is easily enhanced to expand the system`s capabilities, and the hardware is easily expandable to increase the system`s speed. This volume gives a general description of the ATR system.

  3. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-01-01

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies. PMID:29695113

  4. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2018-04-01

    Full Text Available Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD method for an iris recognition system (iPAD using a near infrared light (NIR camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED. Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM. Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  5. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor.

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-04-24

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  6. Integrability and boundary conditions of supersymmetric systems

    International Nuclear Information System (INIS)

    Yue Ruihong; Liang Hong

    1996-01-01

    By studying the solutions of the reflection equations, we find out a series of integrable supersymmetric systems with different boundary conditions. The Hamiltonian contains four free parameters which describe the contribution of the boundary terms

  7. Optical-electronic shape recognition system based on synergetic associative memory

    Science.gov (United States)

    Gao, Jun; Bao, Jie; Chen, Dingguo; Yang, Youqing; Yang, Xuedong

    2001-04-01

    This paper presents a novel optical-electronic shape recognition system based on synergetic associative memory. Our shape recognition system is composed of two parts: the first one is feature extraction system; the second is synergetic pattern recognition system. Hough transform is proposed for feature extraction of unrecognized object, with the effects of reducing dimensions and filtering for object distortion and noise, synergetic neural network is proposed for realizing associative memory in order to eliminate spurious states. Then we adopt an approach of optical- electronic realization to our system that can satisfy the demands of real time, high speed and parallelism. In order to realize fast algorithm, we replace the dynamic evolution circuit with adjudge circuit according to the relationship between attention parameters and order parameters, then implement the recognition of some simple images and its validity is proved.

  8. Boundary control of nonlinear coupled heat systems using backstepping

    KAUST Repository

    Bendevis, Paul

    2016-10-20

    A state feedback boundary controller is designed for a 2D coupled PDE system modelling heat transfer in a membrane distillation system for water desalination. Fluid is separated into two compartments with nonlinear coupling at a membrane boundary. The controller sets the temperature on one boundary in order to track a temperature difference across the membrane boundary. The control objective is achieved by an extension of backstepping methods to these coupled equations. Stability of the target system via Lyapunov like methods, and the invertibility of the integral transformation are used to show the stability of the tracking error.

  9. Developing a Credit Recognition System for Chinese Higher Education Institutions

    Science.gov (United States)

    Li, Fuhui

    2015-01-01

    In recent years, a credit recognition system has been developing in Chinese higher education institutions. Much research has been done on this development, but it has been concentrated on system building, barriers/issues and international practices. The relationship between credit recognition system reforms and democratisation of higher education…

  10. Electrooculography-based continuous eye-writing recognition system for efficient assistive communication systems.

    Science.gov (United States)

    Fang, Fuming; Shinozaki, Takahiro

    2018-01-01

    Human-computer interface systems whose input is based on eye movements can serve as a means of communication for patients with locked-in syndrome. Eye-writing is one such system; users can input characters by moving their eyes to follow the lines of the strokes corresponding to characters. Although this input method makes it easy for patients to get started because of their familiarity with handwriting, existing eye-writing systems suffer from slow input rates because they require a pause between input characters to simplify the automatic recognition process. In this paper, we propose a continuous eye-writing recognition system that achieves a rapid input rate because it accepts characters eye-written continuously, with no pauses. For recognition purposes, the proposed system first detects eye movements using electrooculography (EOG), and then a hidden Markov model (HMM) is applied to model the EOG signals and recognize the eye-written characters. Additionally, this paper investigates an EOG adaptation that uses a deep neural network (DNN)-based HMM. Experiments with six participants showed an average input speed of 27.9 character/min using Japanese Katakana as the input target characters. A Katakana character-recognition error rate of only 5.0% was achieved using 13.8 minutes of adaptation data.

  11. Improved pattern recognition systems by hybrid methods

    International Nuclear Information System (INIS)

    Duerr, B.; Haettich, W.; Tropf, H.; Winkler, G.; Fraunhofer-Gesellschaft zur Foerderung der Angewandten Forschung e.V., Karlsruhe

    1978-12-01

    This report describes a combination of statistical and syntactical pattern recongition methods. The hierarchically structured recognition system consists of a conventional statistical classifier, a structural classifier analysing the topological composition of the patterns, a stage reducing the number of hypotheses made by the first two stages, and a mixed stage based on a search for maximum similarity between syntactically generated prototypes and patterns. The stages work on different principles to avoid mistakes made in one stage in the other stages. This concept is applied to the recognition of numerals written without constraints. If no samples are rejected, a recognition rate of 99,5% is obtained. (orig.) [de

  12. Automated Degradation Diagnosis in Character Recognition System Subject to Camera Vibration

    Directory of Open Access Journals (Sweden)

    Chunmei Liu

    2014-01-01

    Full Text Available Degradation diagnosis plays an important role for degraded character processing, which can tell the recognition difficulty of a given degraded character. In this paper, we present a framework for automated degraded character recognition system by statistical syntactic approach using 3D primitive symbol, which is integrated by degradation diagnosis to provide accurate and reliable recognition results. Our contribution is to design the framework to build the character recognition submodels corresponding to degradation subject to camera vibration or out of focus. In each character recognition submodel, statistical syntactic approach using 3D primitive symbol is proposed to improve degraded character recognition performance. In the experiments, we show attractive experimental results, highlighting the system efficiency and recognition performance by statistical syntactic approach using 3D primitive symbol on the degraded character dataset.

  13. 9th International Conference on Computer Recognition Systems

    CERN Document Server

    Jackowski, Konrad; Kurzyński, Marek; Woźniak, Michał; Żołnierek, Andrzej

    2016-01-01

    The computer recognition systems are nowadays one of the most promising directions in artificial intelligence. This book is the most comprehensive study of this field. It contains a collection of 79 carefully selected articles contributed by experts of pattern recognition. It reports on current research with respect to both methodology and applications. In particular, it includes the following sections: Features, learning, and classifiers Biometrics Data Stream Classification and Big Data Analytics Image processing and computer vision Medical applications Applications RGB-D perception: recent developments and applications This book is a great reference tool for scientists who deal with the problems of designing computer pattern recognition systems. Its target readers can be the as well researchers as students of computer science, artificial intelligence or robotics.  .

  14. A system boundary identification method for life cycle assessment

    DEFF Research Database (Denmark)

    Li, Tao; Zhang, Hongchao; Liu, Zhichao

    2014-01-01

    , technical, geographical and temporal dimensions are presented to limit the boundaries of LCA. An algorithm is developed to identify an appropriate boundary by searching the process tree and evaluating the environmental impact contribution of each process while it is added into the studied system...... as processes are added. The two threshold rules and identification methods presented can be used to identify system boundary of LCA. The case study demonstrated that the methodology presented in this paper is an effective tool for the boundary identification....

  15. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  16. Constraints in distortion-invariant target recognition system simulation

    Science.gov (United States)

    Iftekharuddin, Khan M.; Razzaque, Md A.

    2000-11-01

    Automatic target recognition (ATR) is a mature but active research area. In an earlier paper, we proposed a novel ATR approach for recognition of targets varying in fine details, rotation, and translation using a Learning Vector Quantization (LVQ) Neural Network (NN). The proposed approach performed segmentation of multiple objects and the identification of the objects using LVQNN. In this current paper, we extend the previous approach for recognition of targets varying in rotation, translation, scale, and combination of all three distortions. We obtain the analytical results of the system level design to show that the approach performs well with some constraints. The first constraint determines the size of the input images and input filters. The second constraint shows the limits on amount of rotation, translation, and scale of input objects. We present the simulation verification of the constraints using DARPA's Moving and Stationary Target Recognition (MSTAR) images with different depression and pose angles. The simulation results using MSTAR images verify the analytical constraints of the system level design.

  17. Emotion recognition and emergent leadership : Unraveling mediating mechanisms and boundary conditions

    NARCIS (Netherlands)

    Walter, F.; Cole, M.S.; van der Vegt, G.S.; Rubin, R.S.; Bommer, W.H.

    2012-01-01

    This study examines the complex connection between individuals' emotion recognition capability and their emergence as leaders. It is hypothesized that emotion recognition and extraversion interactively relate with an individual's task coordination behavior which, in turn, influences the likelihood

  18. Implementation of age and gender recognition system for intelligent digital signage

    Science.gov (United States)

    Lee, Sang-Heon; Sohn, Myoung-Kyu; Kim, Hyunduk

    2015-12-01

    Intelligent digital signage systems transmit customized advertising and information by analyzing users and customers, unlike existing system that presented advertising in the form of broadcast without regard to type of customers. Currently, development of intelligent digital signage system has been pushed forward vigorously. In this study, we designed a system capable of analyzing gender and age of customers based on image obtained from camera, although there are many different methods for analyzing customers. We conducted age and gender recognition experiments using public database. The age/gender recognition experiments were performed through histogram matching method by extracting Local binary patterns (LBP) features after facial area on input image was normalized. The results of experiment showed that gender recognition rate was as high as approximately 97% on average. Age recognition was conducted based on categorization into 5 age classes. Age recognition rates for women and men were about 67% and 68%, respectively when that conducted separately for different gender.

  19. An artificial odor recognition system is developed for discriminating odors

    Directory of Open Access Journals (Sweden)

    Wisnu Jatmiko

    2002-12-01

    Full Text Available This artificial system consisted of 16 quartz resonator crystals as the sensor array, a frequency modulator and a frequency counter for each sensor that are connected directly to a microcomputer. We have already shown that the artificial odor recognition system with 4 sensors is high enough to discriminate simple odor correctly, however, when it was used to discriminate compound odors, the recognition capability of this system is dropped significantly to be about 40%. Results of experiments show that the developed artificial system with 16 sensors could discriminate compound aroma based on 6 gradient of alcohol concentrations with high recognition rate of 89.9% for non batch processing system, and 82.4% for batch processing of the classes of odors.

  20. The Army word recognition system

    Science.gov (United States)

    Hadden, David R.; Haratz, David

    1977-01-01

    The application of speech recognition technology in the Army command and control area is presented. The problems associated with this program are described as well as as its relevance in terms of the man/machine interactions, voice inflexions, and the amount of training needed to interact with and utilize the automated system.

  1. Increased Efficiency of Face Recognition System using Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Rajani Muraleedharan

    2006-02-01

    Full Text Available This research was inspired by the need of a flexible and cost effective biometric security system. The flexibility of the wireless sensor network makes it a natural choice for data transmission. Swarm intelligence (SI is used to optimize routing in distributed time varying network. In this paper, SI maintains the required bit error rate (BER for varied channel conditions while consuming minimal energy. A specific biometric, the face recognition system, is discussed as an example. Simulation shows that the wireless sensor network is efficient in energy consumption while keeping the transmission accuracy, and the wireless face recognition system is competitive to the traditional wired face recognition system in classification accuracy.

  2. A Malaysian Vehicle License Plate Localization and Recognition System

    Directory of Open Access Journals (Sweden)

    Ganapathy Velappa

    2008-02-01

    Full Text Available Technological intelligence is a highly sought after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and commercial applications. In this paper, a license plate localization and recognition system for vehicles in Malaysia is proposed. This system is developed based on digital images and can be easily applied to commercial car park systems for the use of documenting access of parking services, secure usage of parking houses and also to prevent car theft issues. The proposed license plate localization algorithm is based on a combination of morphological processes with a modified Hough Transform approach and the recognition of the license plates is achieved by the implementation of the feed-forward backpropagation artificial neural network. Experimental results show an average of 95% successful license plate localization and recognition in a total of 589 images captured from a complex outdoor environment.

  3. The NA50 segmented target and vertex recognition system

    International Nuclear Information System (INIS)

    Bellaiche, F.; Cheynis, B.; Contardo, D.; Drapier, O.; Grossiord, J.Y.; Guichard, A.; Haroutunian, R.; Jacquin, M.; Ohlsson-Malek, F.; Pizzi, J.R.

    1997-01-01

    The NA50 segmented target and vertex recognition system is described. The segmented target consists of 7 sub-targets of 1-2 mm thickness. The vertex recognition system used to determine the sub-target where an interaction has occured is based upon quartz elements which produce Cerenkov light when traversed by charged particles from the interaction. The geometrical arrangement of the quartz elements has been optimized for vertex recognition in 208 Pb-Pb collisions at 158 GeV/nucleon. A simple algorithm provides a vertex recognition efficiency of better than 85% for dimuon trigger events collected with a 1 mm sub-target set-up. A method for recognizing interactions of projectile fragments (nuclei and/or groups of nucleons) is presented. The segmented target allows a large target thickness which together with a high beam intensity (∼10 7 ions/s) enables high statistics measurements. (orig.)

  4. Adamantane in Drug Delivery Systems and Surface Recognition.

    Science.gov (United States)

    Štimac, Adela; Šekutor, Marina; Mlinarić-Majerski, Kata; Frkanec, Leo; Frkanec, Ruža

    2017-02-16

    The adamantane moiety is widely applied in design and synthesis of new drug delivery systems and in surface recognition studies. This review focuses on liposomes, cyclodextrins, and dendrimers based on or incorporating adamantane derivatives. Our recent concept of adamantane as an anchor in the lipid bilayer of liposomes has promising applications in the field of targeted drug delivery and surface recognition. The results reported here encourage the development of novel adamantane-based structures and self-assembled supramolecular systems for basic chemical investigations as well as for biomedical application.

  5. Adamantane in Drug Delivery Systems and Surface Recognition

    Directory of Open Access Journals (Sweden)

    Adela Štimac

    2017-02-01

    Full Text Available The adamantane moiety is widely applied in design and synthesis of new drug delivery systems and in surface recognition studies. This review focuses on liposomes, cyclodextrins, and dendrimers based on or incorporating adamantane derivatives. Our recent concept of adamantane as an anchor in the lipid bilayer of liposomes has promising applications in the field of targeted drug delivery and surface recognition. The results reported here encourage the development of novel adamantane-based structures and self-assembled supramolecular systems for basic chemical investigations as well as for biomedical application.

  6. An Evaluation of PC-Based Optical Character Recognition Systems.

    Science.gov (United States)

    Schreier, E. M.; Uslan, M. M.

    1991-01-01

    The review examines six personal computer-based optical character recognition (OCR) systems designed for use by blind and visually impaired people. Considered are OCR components and terms, documentation, scanning and reading, command structure, conversion, unique features, accuracy of recognition, scanning time, speed, and cost. (DB)

  7. Optical character recognition systems for different languages with soft computing

    CERN Document Server

    Chaudhuri, Arindam; Badelia, Pratixa; K Ghosh, Soumya

    2017-01-01

    The book offers a comprehensive survey of soft-computing models for optical character recognition systems. The various techniques, including fuzzy and rough sets, artificial neural networks and genetic algorithms, are tested using real texts written in different languages, such as English, French, German, Latin, Hindi and Gujrati, which have been extracted by publicly available datasets. The simulation studies, which are reported in details here, show that soft-computing based modeling of OCR systems performs consistently better than traditional models. Mainly intended as state-of-the-art survey for postgraduates and researchers in pattern recognition, optical character recognition and soft computing, this book will be useful for professionals in computer vision and image processing alike, dealing with different issues related to optical character recognition.

  8. UNCONSTRAINED HANDWRITING RECOGNITION : LANGUAGE MODELS, PERPLEXITY, AND SYSTEM PERFORMANCE

    NARCIS (Netherlands)

    Marti, U-V.; Bunke, H.

    2004-01-01

    In this paper we present a number of language models and their behavior in the recognition of unconstrained handwritten English sentences. We use the perplexity to compare the different models and their prediction power, and relate it to the performance of a recognition system under different

  9. Exhibits Recognition System for Combining Online Services and Offline Services

    Science.gov (United States)

    Ma, He; Liu, Jianbo; Zhang, Yuan; Wu, Xiaoyu

    2017-10-01

    In order to achieve a more convenient and accurate digital museum navigation, we have developed a real-time and online-to-offline museum exhibits recognition system using image recognition method based on deep learning. In this paper, the client and server of the system are separated and connected through the HTTP. Firstly, by using the client app in the Android mobile phone, the user can take pictures and upload them to the server. Secondly, the features of the picture are extracted using the deep learning network in the server. With the help of the features, the pictures user uploaded are classified with a well-trained SVM. Finally, the classification results are sent to the client and the detailed exhibition’s introduction corresponding to the classification results are shown in the client app. Experimental results demonstrate that the recognition accuracy is close to 100% and the computing time from the image uploading to the exhibit information show is less than 1S. By means of exhibition image recognition algorithm, our implemented exhibits recognition system can combine online detailed exhibition information to the user in the offline exhibition hall so as to achieve better digital navigation.

  10. Automated recognition system for ELM classification in JET

    International Nuclear Information System (INIS)

    Duro, N.; Dormido, R.; Vega, J.; Dormido-Canto, S.; Farias, G.; Sanchez, J.; Vargas, H.; Murari, A.

    2009-01-01

    Edge localized modes (ELMs) are instabilities occurring in the edge of H-mode plasmas. Considerable efforts are being devoted to understanding the physics behind this non-linear phenomenon. A first characterization of ELMs is usually their identification as type I or type III. An automated pattern recognition system has been developed in JET for off-line ELM recognition and classification. The empirical method presented in this paper analyzes each individual ELM instead of starting from a temporal segment containing many ELM bursts. The ELM recognition and isolation is carried out using three signals: Dα, line integrated electron density and stored diamagnetic energy. A reduced set of characteristics (such as diamagnetic energy drop, ELM period or Dα shape) has been extracted to build supervised and unsupervised learning systems for classification purposes. The former are based on support vector machines (SVM). The latter have been developed with hierarchical and K-means clustering methods. The success rate of the classification systems is about 98% for a database of almost 300 ELMs.

  11. Speech recognition systems on the Cell Broadband Engine

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Y; Jones, H; Vaidya, S; Perrone, M; Tydlitat, B; Nanda, A

    2007-04-20

    In this paper we describe our design, implementation, and first results of a prototype connected-phoneme-based speech recognition system on the Cell Broadband Engine{trademark} (Cell/B.E.). Automatic speech recognition decodes speech samples into plain text (other representations are possible) and must process samples at real-time rates. Fortunately, the computational tasks involved in this pipeline are highly data-parallel and can receive significant hardware acceleration from vector-streaming architectures such as the Cell/B.E. Identifying and exploiting these parallelism opportunities is challenging, but also critical to improving system performance. We observed, from our initial performance timings, that a single Cell/B.E. processor can recognize speech from thousands of simultaneous voice channels in real time--a channel density that is orders-of-magnitude greater than the capacity of existing software speech recognizers based on CPUs (central processing units). This result emphasizes the potential for Cell/B.E.-based speech recognition and will likely lead to the future development of production speech systems using Cell/B.E. clusters.

  12. Advances in biometrics for secure human authentication and recognition

    CERN Document Server

    Kisku, Dakshina Ranjan; Sing, Jamuna Kanta

    2013-01-01

    GENERAL BIOMETRICSSecurity and Reliability Assessment for Biometric Systems; Gayatri MirajkarReview of Human Recognition Based on Retinal Images; Amin DehghaniADVANCED TOPICS IN BIOMETRICSVisual Speech as Behavioral Biometric; Preety Singh, Vijay Laxmi, and Manoj Singh GaurHuman Gait Signature for Biometric Authentication; Vijay JohnHand-Based Biometric for Personal Identification Using Correlation Filter Classifier; Mohammed Saigaa , Abdallah Meraoumia , Salim Chitroub, and Ahmed BouridaneOn Deciding the Dynamic Periocular Boundary for Human Recognition; Sambit Bakshi , Pankaj Kumar Sa, and Banshidhar MajhiRetention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System; Nilanjan Dey, Bijurika Nandi, Poulami Das, Achintya Das, and Sheli Sinha ChaudhuriFacial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis; N. G. Chitaliya and A. I. TrivediCASE STUDIES AND LA...

  13. Application of Video Recognition Technology in Landslide Monitoring System

    Directory of Open Access Journals (Sweden)

    Qingjia Meng

    2018-01-01

    Full Text Available The video recognition technology is applied to the landslide emergency remote monitoring system. The trajectories of the landslide are identified by this system in this paper. The system of geological disaster monitoring is applied synthetically to realize the analysis of landslide monitoring data and the combination of video recognition technology. Landslide video monitoring system will video image information, time point, network signal strength, power supply through the 4G network transmission to the server. The data is comprehensively analysed though the remote man-machine interface to conduct to achieve the threshold or manual control to determine the front-end video surveillance system. The system is used to identify the target landslide video for intelligent identification. The algorithm is embedded in the intelligent analysis module, and the video frame is identified, detected, analysed, filtered, and morphological treatment. The algorithm based on artificial intelligence and pattern recognition is used to mark the target landslide in the video screen and confirm whether the landslide is normal. The landslide video monitoring system realizes the remote monitoring and control of the mobile side, and provides a quick and easy monitoring technology.

  14. Spoof Detection for Finger-Vein Recognition System Using NIR Camera

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2017-10-01

    Full Text Available Finger-vein recognition, a new and advanced biometrics recognition method, is attracting the attention of researchers because of its advantages such as high recognition performance and lesser likelihood of theft and inaccuracies occurring on account of skin condition defects. However, as reported by previous researchers, it is possible to attack a finger-vein recognition system by using presentation attack (fake finger-vein images. As a result, spoof detection, named as presentation attack detection (PAD, is necessary in such recognition systems. Previous attempts to establish PAD methods primarily focused on designing feature extractors by hand (handcrafted feature extractor based on the observations of the researchers about the difference between real (live and presentation attack finger-vein images. Therefore, the detection performance was limited. Recently, the deep learning framework has been successfully applied in computer vision and delivered superior results compared to traditional handcrafted methods on various computer vision applications such as image-based face recognition, gender recognition and image classification. In this paper, we propose a PAD method for near-infrared (NIR camera-based finger-vein recognition system using convolutional neural network (CNN to enhance the detection ability of previous handcrafted methods. Using the CNN method, we can derive a more suitable feature extractor for PAD than the other handcrafted methods using a training procedure. We further process the extracted image features to enhance the presentation attack finger-vein image detection ability of the CNN method using principal component analysis method (PCA for dimensionality reduction of feature space and support vector machine (SVM for classification. Through extensive experimental results, we confirm that our proposed method is adequate for presentation attack finger-vein image detection and it can deliver superior detection results compared

  15. Spoof Detection for Finger-Vein Recognition System Using NIR Camera.

    Science.gov (United States)

    Nguyen, Dat Tien; Yoon, Hyo Sik; Pham, Tuyen Danh; Park, Kang Ryoung

    2017-10-01

    Finger-vein recognition, a new and advanced biometrics recognition method, is attracting the attention of researchers because of its advantages such as high recognition performance and lesser likelihood of theft and inaccuracies occurring on account of skin condition defects. However, as reported by previous researchers, it is possible to attack a finger-vein recognition system by using presentation attack (fake) finger-vein images. As a result, spoof detection, named as presentation attack detection (PAD), is necessary in such recognition systems. Previous attempts to establish PAD methods primarily focused on designing feature extractors by hand (handcrafted feature extractor) based on the observations of the researchers about the difference between real (live) and presentation attack finger-vein images. Therefore, the detection performance was limited. Recently, the deep learning framework has been successfully applied in computer vision and delivered superior results compared to traditional handcrafted methods on various computer vision applications such as image-based face recognition, gender recognition and image classification. In this paper, we propose a PAD method for near-infrared (NIR) camera-based finger-vein recognition system using convolutional neural network (CNN) to enhance the detection ability of previous handcrafted methods. Using the CNN method, we can derive a more suitable feature extractor for PAD than the other handcrafted methods using a training procedure. We further process the extracted image features to enhance the presentation attack finger-vein image detection ability of the CNN method using principal component analysis method (PCA) for dimensionality reduction of feature space and support vector machine (SVM) for classification. Through extensive experimental results, we confirm that our proposed method is adequate for presentation attack finger-vein image detection and it can deliver superior detection results compared to CNN

  16. System of breast cancer recognition

    International Nuclear Information System (INIS)

    Rozhkova, N.I.

    1984-01-01

    The paper is concerned with the resUlts of the multimodality system of breast cancer recognition using methods, of clinical X-ray and cytological examinations. Altogether 1671 women were examined; breast cancer was detected in 165. Stage 1 was detected in 63 patients, Stage 2 in 34, Stage 3 in 34, and Stage 4 in 8. In 7% of the cases, tumors were inpalpable and could be detected by X-ray only. In 9.9% of the cases, the multicentric nature of tumor growth was established. In 71% tumors had a mixed histological structure. The system of breast cancer recognition provided for accurate diagnosis in 98% of the cases making it possible to avoid surgical intervention in 38%. Good diagnostic results are possible under conditions of a special mammology unit where a roentgenologist working in a close contact with surgeonns working in a close contact with surgeos and morphologists, performs the first stages of diagnosis beginning from clinical examination up to special methods that require X-ray control (paracentesis, ductography, pneumocystography, preoperative marking of the breast and marking of the remote sectors of the breast)

  17. Clonal Selection Based Artificial Immune System for Generalized Pattern Recognition

    Science.gov (United States)

    Huntsberger, Terry

    2011-01-01

    The last two decades has seen a rapid increase in the application of AIS (Artificial Immune Systems) modeled after the human immune system to a wide range of areas including network intrusion detection, job shop scheduling, classification, pattern recognition, and robot control. JPL (Jet Propulsion Laboratory) has developed an integrated pattern recognition/classification system called AISLE (Artificial Immune System for Learning and Exploration) based on biologically inspired models of B-cell dynamics in the immune system. When used for unsupervised or supervised classification, the method scales linearly with the number of dimensions, has performance that is relatively independent of the total size of the dataset, and has been shown to perform as well as traditional clustering methods. When used for pattern recognition, the method efficiently isolates the appropriate matches in the data set. The paper presents the underlying structure of AISLE and the results from a number of experimental studies.

  18. Connected digit speech recognition system for Malayalam language

    Indian Academy of Sciences (India)

    A connected digit speech recognition is important in many applications such as automated banking system, catalogue-dialing, automatic data entry, automated banking system, etc. This paper presents an optimum speaker-independent connected digit recognizer for Malayalam language. The system employs Perceptual ...

  19. Motorcycle Start-stop System based on Intelligent Biometric Voice Recognition

    Science.gov (United States)

    Winda, A.; E Byan, W. R.; Sofyan; Armansyah; Zariantin, D. L.; Josep, B. G.

    2017-03-01

    Current mechanical key in the motorcycle is prone to bulgary, being stolen or misplaced. Intelligent biometric voice recognition as means to replace this mechanism is proposed as an alternative. The proposed system will decide whether the voice is belong to the user or not and the word utter by the user is ‘On’ or ‘Off’. The decision voice will be sent to Arduino in order to start or stop the engine. The recorded voice is processed in order to get some features which later be used as input to the proposed system. The Mel-Frequency Ceptral Coefficient (MFCC) is adopted as a feature extraction technique. The extracted feature is the used as input to the SVM-based identifier. Experimental results confirm the effectiveness of the proposed intelligent voice recognition and word recognition system. It show that the proposed method produces a good training and testing accuracy, 99.31% and 99.43%, respectively. Moreover, the proposed system shows the performance of false rejection rate (FRR) and false acceptance rate (FAR) accuracy of 0.18% and 17.58%, respectively. In the intelligent word recognition shows that the training and testing accuracy are 100% and 96.3%, respectively.

  20. Adamantane in Drug Delivery Systems and Surface Recognition

    OpenAIRE

    Adela Štimac; Marina Šekutor; Kata Mlinarić-Majerski; Leo Frkanec; Ruža Frkanec

    2017-01-01

    The adamantane moiety is widely applied in design and synthesis of new drug delivery systems and in surface recognition studies. This review focuses on liposomes, cyclodextrins, and dendrimers based on or incorporating adamantane derivatives. Our recent concept of adamantane as an anchor in the lipid bilayer of liposomes has promising applications in the field of targeted drug delivery and surface recognition. The results reported here encourage the development of novel adamantane-based struc...

  1. On Assisting a Visual-Facial Affect Recognition System with Keyboard-Stroke Pattern Information

    Science.gov (United States)

    Stathopoulou, I.-O.; Alepis, E.; Tsihrintzis, G. A.; Virvou, M.

    Towards realizing a multimodal affect recognition system, we are considering the advantages of assisting a visual-facial expression recognition system with keyboard-stroke pattern information. Our work is based on the assumption that the visual-facial and keyboard modalities are complementary to each other and that their combination can significantly improve the accuracy in affective user models. Specifically, we present and discuss the development and evaluation process of two corresponding affect recognition subsystems, with emphasis on the recognition of 6 basic emotional states, namely happiness, sadness, surprise, anger and disgust as well as the emotion-less state which we refer to as neutral. We find that emotion recognition by the visual-facial modality can be aided greatly by keyboard-stroke pattern information and the combination of the two modalities can lead to better results towards building a multimodal affect recognition system.

  2. Face recognition system and method using face pattern words and face pattern bytes

    Science.gov (United States)

    Zheng, Yufeng

    2014-12-23

    The present invention provides a novel system and method for identifying individuals and for face recognition utilizing facial features for face identification. The system and method of the invention comprise creating facial features or face patterns called face pattern words and face pattern bytes for face identification. The invention also provides for pattern recognitions for identification other than face recognition. The invention further provides a means for identifying individuals based on visible and/or thermal images of those individuals by utilizing computer software implemented by instructions on a computer or computer system and a computer readable medium containing instructions on a computer system for face recognition and identification.

  3. 2nd International Symposium on Signal Processing and Intelligent Recognition Systems

    CERN Document Server

    Bandyopadhyay, Sanghamitra; Krishnan, Sri; Li, Kuan-Ching; Mosin, Sergey; Ma, Maode

    2016-01-01

    This Edited Volume contains a selection of refereed and revised papers originally presented at the second International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS-2015), December 16-19, 2015, Trivandrum, India. The program committee received 175 submissions. Each paper was peer reviewed by at least three or more independent referees of the program committee and the 59 papers were finally selected. The papers offer stimulating insights into biometrics, digital watermarking, recognition systems, image and video processing, signal and speech processing, pattern recognition, machine learning and knowledge-based systems. The book is directed to the researchers and scientists engaged in various field of signal processing and related areas. .

  4. Features Speech Signature Image Recognition on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Alexander Mikhailovich Alyushin

    2015-12-01

    Full Text Available The algorithms fordynamic spectrograms images recognition, processing and soundspeech signature (SS weredeveloped. The software for mobile phones, thatcan recognize speech signatureswas prepared. The investigation of the SS recognition speed on its boundarytypes was conducted. Recommendations on the boundary types choice in the optimal ratio of recognitionspeed and required space were given.

  5. Contextual System of Symbol Structural Recognition based on an Object-Process Methodology

    OpenAIRE

    Delalandre, Mathieu

    2005-01-01

    We present in this paper a symbol recognition system for the graphic documents. This one is based on a contextual approach for symbol structural recognition exploiting an Object-Process Methodology. It uses a processing library composed of structural recognition processings and contextual evaluation processings. These processings allow our system to deal with the multi-representation of symbols. The different processings are controlled, in an automatic way, by an inference engine during the r...

  6. Free boundary problems in PDEs and particle systems

    CERN Document Server

    Carinci, Gioia; Giardinà, Cristian; Presutti, Errico

    2016-01-01

    In this volume a theory for models of transport in the presence of a free boundary is developed. Macroscopic laws of transport are described by PDE's. When the system is open, there are several mechanisms to couple the system with the external forces. Here a class of systems where the interaction with the exterior takes place in correspondence of a free boundary is considered. Both continuous and discrete models sharing the same structure are analysed. In Part I a free boundary problem related to the Stefan Problem is worked out in all details. For this model a new notion of relaxed solution is proposed for which global existence and uniqueness is proven. It is also shown that this is the hydrodynamic limit of the empirical mass density of the associated particle system. In Part II several other models are discussed. The expectation is that the results proved for the basic model extend to these other cases. All the models discussed in this volume have an interest in problems arising in several research fields...

  7. The A2iA French handwriting recognition system at the Rimes-ICDAR2011 competition

    Science.gov (United States)

    Menasri, Farès; Louradour, Jérôme; Bianne-Bernard, Anne-Laure; Kermorvant, Christopher

    2012-01-01

    This paper describes the system for the recognition of French handwriting submitted by A2iA to the competition organized at ICDAR2011 using the Rimes database. This system is composed of several recognizers based on three different recognition technologies, combined using a novel combination method. A framework multi-word recognition based on weighted finite state transducers is presented, using an explicit word segmentation, a combination of isolated word recognizers and a language model. The system was tested both for isolated word recognition and for multi-word line recognition and submitted to the RIMES-ICDAR2011 competition. This system outperformed all previously proposed systems on these tasks.

  8. A Cooking Recipe Recommendation System with Visual Recognition of Food Ingredients

    Directory of Open Access Journals (Sweden)

    Keiji Yanai

    2014-04-01

    Full Text Available In this paper, we propose a cooking recipe recommendation system which runs on a consumer smartphone as an interactive mobile application. The proposed system employs real-time visual object recognition of food ingredients, and recommends cooking recipes related to the recognized food ingredients. Because of visual recognition, by only pointing a built-in camera on a smartphone to food ingredients, a user can get to know a related cooking recipes instantly. The objective of the proposed system is to assist people who cook to decide a cooking recipe at grocery stores or at a kitchen. In the current implementation, the system can recognize 30 kinds of food ingredient in 0.15 seconds, and it has achieved the 83.93% recognition rate within the top six candidates. By the user study, we confirmed the effectiveness of the proposed system.

  9. A Support System for the Electric Appliance Control Using Pose Recognition

    Science.gov (United States)

    Kawano, Takuya; Yamamoto, Kazuhiko; Kato, Kunihito; Hongo, Hitoshi

    In this paper, we propose an electric appliance control support system for aged and bedridden people using pose recognition. We proposed a pose recognition system that distinguishes between seven poses of the user on the bed. First, the face and arm regions of the user are detected by using the skin color. Our system focuses a recognition region surrounding the face region. Next, the higher order local autocorrelation features within the region are extracted. The linear discriminant analysis creates the coefficient matrix that can optimally distinguish among training data from the seven poses. Our algorithm can recognize the seven poses even if the subject wears different clothes and slightly shifts or slants on the bed. From the experimental results, our system achieved an accuracy rate of over 99 %. Then, we show that it possibles to construct one of a user-friendly system.

  10. Modular Neural Networks and Type-2 Fuzzy Systems for Pattern Recognition

    CERN Document Server

    Melin, Patricia

    2012-01-01

    This book describes hybrid intelligent systems using type-2 fuzzy logic and modular neural networks for pattern recognition applications. Hybrid intelligent systems combine several intelligent computing paradigms, including fuzzy logic, neural networks, and bio-inspired optimization algorithms, which can be used to produce powerful pattern recognition systems. Type-2 fuzzy logic is an extension of traditional type-1 fuzzy logic that enables managing higher levels of uncertainty in complex real world problems, which are of particular importance in the area of pattern recognition. The book is organized in three main parts, each containing a group of chapters built around a similar subject. The first part consists of chapters with the main theme of theory and design algorithms, which are basically chapters that propose new models and concepts, which are the basis for achieving intelligent pattern recognition. The second part contains chapters with the main theme of using type-2 fuzzy models and modular neural ne...

  11. Fingerprint Recognition Using Minutia Score Matching

    OpenAIRE

    J, Ravi.; Raja, K. B.; R, Venugopal. K.

    2010-01-01

    The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person’s life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, which scans the image at the boundary to preserves the quality of the image and extract the minutiae ...

  12. Stability and boundary stabilization of 1-D hyperbolic systems

    CERN Document Server

    Bastin, Georges

    2016-01-01

    This monograph explores the modeling of conservation and balance laws of one-dimensional hyperbolic systems using partial differential equations. It presents typical examples of hyperbolic systems for a wide range of physical engineering applications, allowing readers to understand the concepts in whichever setting is most familiar to them. With these examples, it also illustrates how control boundary conditions may be defined for the most commonly used control devices. The authors begin with the simple case of systems of two linear conservation laws and then consider the stability of systems under more general boundary conditions that may be differential, nonlinear, or switching. They then extend their discussion to the case of nonlinear conservation laws and demonstrate the use of Lyapunov functions in this type of analysis. Systems of balance laws are considered next, starting with the linear variety before they move on to more general cases of nonlinear ones. They go on to show how the problem of boundary...

  13. Analytical determination of distillation boundaries for ternary azeotropic systems

    OpenAIRE

    Marcilla Gomis, Antonio; Reyes Labarta, Juan Antonio; Velasco, Raúl; Serrano Cayuelas, María Dolores; Olaya López, María del Mar

    2009-01-01

    A new straight forward algorithm to calculate distillation boundaries in ternary azeotropic systems has been developed. The proposed method allows, using cubic splines, the calculation of distillation trajectories and the calculation of that corresponding to the searched distillation boundaries. The algorithm is applied to 4 ternary liquid-vapour systems to test its validity. Vicepresidency of Research (University of Alicante) and Generalitat Valenciana (GV/2007/125)

  14. Boundary organizations to boundary chains: Prospects for advancing climate science application

    Directory of Open Access Journals (Sweden)

    Christine J. Kirchhoff

    2015-01-01

    Full Text Available Adapting to climate change requires the production and use of climate information to inform adaptation decisions. By facilitating sustained interaction between science producers, boundary organizations narrow the gap between science and decision-making and foster the co-production of actionable knowledge. While traditional boundary organization approaches focused on intense one-on-one interactions between producers and users increases usability, this approach requires significant time and resources. Forming “boundary chains”, linking complimentary boundary organizations together, may reduce those costs. In this paper, we use longitudinal observations of a boundary chain, interviews and surveys to explore: (1 how producer-user interactions increase understanding and information usability and (2 if and how efficiencies in climate information production, dissemination and use arise as a result of the boundary chain. We find that forming and sustaining an effective boundary chain requires not only interest, commitment and investment from every link in the chain but also a level of non-overlapping mutual dependency and complementary skill sets. In this case, GLISA’s strength in producing scientific information and their credibility as climate scientists and HRWC’s strengths in facilitation, connection with potential information users, and their recognition and reputation in the watershed add value to the boundary chain enabling the boundary chain to accomplish more with greater efficiency than if each organization in the chain tried to work independently. Finally, data show how the boundary chain increased efficiencies in educating potential users about the strengths and limitations of climate science and improving the production, dissemination, and use of climate information.

  15. Non Audio-Video gesture recognition system

    DEFF Research Database (Denmark)

    Craciunescu, Razvan; Mihovska, Albena Dimitrova; Kyriazakos, Sofoklis

    2016-01-01

    Gesture recognition is a topic in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand. Current research focus includes on the emotion...... recognition from the face and hand gesture recognition. Gesture recognition enables humans to communicate with the machine and interact naturally without any mechanical devices. This paper investigates the possibility to use non-audio/video sensors in order to design a low-cost gesture recognition device...

  16. Automatic system for localization and recognition of vehicle plate numbers

    OpenAIRE

    Vázquez, N.; Nakano, M.; Pérez-Meana, H.

    2003-01-01

    This paper proposes a vehicle numbers plate identification system, which extracts the characters features of a plate from a captured image by a digital camera. Then identify the symbols of the number plate using a multilayer neural network. The proposed recognition system consists of two processes: The training process and the recognition process. During the training process, a database is created using 310 vehicular plate images. Then using this database a multilayer neural network is traine...

  17. Arm Motion Recognition and Exercise Coaching System for Remote Interaction

    Directory of Open Access Journals (Sweden)

    Hong Zeng

    2016-01-01

    Full Text Available Arm motion recognition and its related applications have become a promising human computer interaction modal due to the rapid integration of numerical sensors in modern mobile-phones. We implement a mobile-phone-based arm motion recognition and exercise coaching system that can help people carrying mobile-phones to do body exercising anywhere at any time, especially for the persons that have very limited spare time and are constantly traveling across cities. We first design improved k-means algorithm to cluster the collecting 3-axis acceleration and gyroscope data of person actions into basic motions. A learning method based on Hidden Markov Model is then designed to classify and recognize continuous arm motions of both learners and coaches, which also measures the action similarities between the persons. We implement the system on MIUI 2S mobile-phone and evaluate the system performance and its accuracy of recognition.

  18. Implementation of CT and IHT Processors for Invariant Object Recognition System

    Directory of Open Access Journals (Sweden)

    J. Turan jr.

    2004-12-01

    Full Text Available This paper presents PDL or ASIC implementation of key modules ofinvariant object recognition system based on the combination of theIncremental Hough transform (IHT, correlation and rapid transform(RT. The invariant object recognition system was represented partiallyin C++ language for general-purpose processor on personal computer andpartially described in VHDL code for implementation in PLD or ASIC.

  19. Boundary Equations and Regularity Theory for Geometric Variational Systems with Neumann Data

    Science.gov (United States)

    Schikorra, Armin

    2018-02-01

    We study boundary regularity of maps from two-dimensional domains into manifolds which are critical with respect to a generic conformally invariant variational functional and which, at the boundary, intersect perpendicularly with a support manifold. For example, harmonic maps, or H-surfaces, with a partially free boundary condition. In the interior it is known, by the celebrated work of Rivière, that these maps satisfy a system with an antisymmetric potential, from which one can derive the interior regularity of the solution. Avoiding a reflection argument, we show that these maps satisfy along the boundary a system of equations which also exhibits a (nonlocal) antisymmetric potential that combines information from the interior potential and the geometric Neumann boundary condition. We then proceed to show boundary regularity for solutions to such systems.

  20. Method for secure electronic voting system: face recognition based approach

    Science.gov (United States)

    Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran

    2017-06-01

    In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

  1. Using a data fusion-based activity recognition framework to determine surveillance system requirements

    CSIR Research Space (South Africa)

    Le Roux, WH

    2007-07-01

    Full Text Available A technique is proposed to extract system requirements for a maritime area surveillance system, based on an activity recognition framework originally intended for the characterisation, prediction and recognition of intentional actions for threat...

  2. Euro Banknote Recognition System for Blind People.

    Science.gov (United States)

    Dunai Dunai, Larisa; Chillarón Pérez, Mónica; Peris-Fajarnés, Guillermo; Lengua Lengua, Ismael

    2017-01-20

    This paper presents the development of a portable system with the aim of allowing blind people to detect and recognize Euro banknotes. The developed device is based on a Raspberry Pi electronic instrument and a Raspberry Pi camera, Pi NoIR (No Infrared filter) dotted with additional infrared light, which is embedded into a pair of sunglasses that permit blind and visually impaired people to independently handle Euro banknotes, especially when receiving their cash back when shopping. The banknote detection is based on the modified Viola and Jones algorithms, while the banknote value recognition relies on the Speed Up Robust Features (SURF) technique. The accuracies of banknote detection and banknote value recognition are 84% and 97.5%, respectively.

  3. A Cross-Layer Biometric Recognition System for Mobile IoT Devices

    Directory of Open Access Journals (Sweden)

    Shayan Taheri

    2018-02-01

    Full Text Available A biometric recognition system is one of the leading candidates for the current and the next generation of smart visual systems. The visual system is the engine of the surveillance cameras that have great importance for intelligence and security purposes. These surveillance devices can be a target of adversaries for accomplishing various malicious scenarios such as disabling the camera in critical times or the lack of recognition of a criminal. In this work, we propose a cross-layer biometric recognition system that has small computational complexity and is suitable for mobile Internet of Things (IoT devices. Furthermore, due to the involvement of both hardware and software in realizing this system in a decussate and chaining structure, it is easier to locate and provide alternative paths for the system flow in the case of an attack. For security analysis of this system, one of the elements of this system named the advanced encryption standard (AES is infected by four different Hardware Trojansthat target different parts of this module. The purpose of these Trojans is to sabotage the biometric data that are under process by the biometric recognition system. All of the software and the hardware modules of this system are implemented using MATLAB and Verilog HDL, respectively. According to the performance evaluation results, the system shows an acceptable performance in recognizing healthy biometric data. It is able to detect the infected data, as well. With respect to its hardware results, the system may not contribute significantly to the hardware design parameters of a surveillance camera considering all the hardware elements within the device.

  4. Exact boundary controllability of nodal profile for quasilinear hyperbolic systems

    CERN Document Server

    Li, Tatsien; Gu, Qilong

    2016-01-01

    This book provides a comprehensive overview of the exact boundary controllability of nodal profile, a new kind of exact boundary controllability stimulated by some practical applications. This kind of controllability is useful in practice as it does not require any precisely given final state to be attained at a suitable time t=T by means of boundary controls, instead it requires the state to exactly fit any given demand (profile) on one or more nodes after a suitable time t=T by means of boundary controls. In this book we present a general discussion of this kind of controllability for general 1-D first order quasilinear hyperbolic systems and for general 1-D quasilinear wave equations on an interval as well as on a tree-like network using a modular-structure construtive method, suggested in LI Tatsien's monograph "Controllability and Observability for Quasilinear Hyperbolic Systems"(2010), and we establish a complete theory on the local exact boundary controllability of nodal profile for 1-D quasilinear hyp...

  5. Data complexity in pattern recognition

    CERN Document Server

    Kam Ho Tin

    2006-01-01

    Machines capable of automatic pattern recognition have many fascinating uses. Algorithms for supervised classification, where one infers a decision boundary from a set of training examples, are at the core of this capability. This book looks at data complexity and its role in shaping the theories and techniques in different disciplines

  6. Designing a Low-Resolution Face Recognition System for Long-Range Surveillance

    NARCIS (Netherlands)

    Peng, Y.; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.

    2016-01-01

    Most face recognition systems deal well with high-resolution facial images, but perform much worse on low-resolution facial images. In low-resolution face recognition, there is a specific but realistic surveillance scenario: a surveillance camera monitoring a large area. In this scenario, usually

  7. Facial recognition in education system

    Science.gov (United States)

    Krithika, L. B.; Venkatesh, K.; Rathore, S.; Kumar, M. Harish

    2017-11-01

    Human beings exploit emotions comprehensively for conveying messages and their resolution. Emotion detection and face recognition can provide an interface between the individuals and technologies. The most successful applications of recognition analysis are recognition of faces. Many different techniques have been used to recognize the facial expressions and emotion detection handle varying poses. In this paper, we approach an efficient method to recognize the facial expressions to track face points and distances. This can automatically identify observer face movements and face expression in image. This can capture different aspects of emotion and facial expressions.

  8. DEVELOPMENT OF AUTOMATED SPEECH RECOGNITION SYSTEM FOR EGYPTIAN ARABIC PHONE CONVERSATIONS

    Directory of Open Access Journals (Sweden)

    A. N. Romanenko

    2016-07-01

    Full Text Available The paper deals with description of several speech recognition systems for the Egyptian Colloquial Arabic. The research is based on the CALLHOME Egyptian corpus. The description of both systems, classic: based on Hidden Markov and Gaussian Mixture Models, and state-of-the-art: deep neural network acoustic models is given. We have demonstrated the contribution from the usage of speaker-dependent bottleneck features; for their extraction three extractors based on neural networks were trained. For their training three datasets in several languageswere used:Russian, English and differentArabic dialects.We have studied the possibility of application of a small Modern Standard Arabic (MSA corpus to derive phonetic transcriptions. The experiments have shown that application of the extractor obtained on the basis of the Russian dataset enables to increase significantly the quality of the Arabic speech recognition. We have also stated that the usage of phonetic transcriptions based on modern standard Arabic decreases recognition quality. Nevertheless, system operation results remain applicable in practice. In addition, we have carried out the study of obtained models application for the keywords searching problem solution. The systems obtained demonstrate good results as compared to those published before. Some ways to improve speech recognition are offered.

  9. Extending the Capture Volume of an Iris Recognition System Using Wavefront Coding and Super-Resolution.

    Science.gov (United States)

    Hsieh, Sheng-Hsun; Li, Yung-Hui; Tien, Chung-Hao; Chang, Chin-Chen

    2016-12-01

    Iris recognition has gained increasing popularity over the last few decades; however, the stand-off distance in a conventional iris recognition system is too short, which limits its application. In this paper, we propose a novel hardware-software hybrid method to increase the stand-off distance in an iris recognition system. When designing the system hardware, we use an optimized wavefront coding technique to extend the depth of field. To compensate for the blurring of the image caused by wavefront coding, on the software side, the proposed system uses a local patch-based super-resolution method to restore the blurred image to its clear version. The collaborative effect of the new hardware design and software post-processing showed great potential in our experiment. The experimental results showed that such improvement cannot be achieved by using a hardware-or software-only design. The proposed system can increase the capture volume of a conventional iris recognition system by three times and maintain the system's high recognition rate.

  10. Human-inspired sound environment recognition system for assistive vehicles

    Science.gov (United States)

    González Vidal, Eduardo; Fredes Zarricueta, Ernesto; Auat Cheein, Fernando

    2015-02-01

    Objective. The human auditory system acquires environmental information under sound stimuli faster than visual or touch systems, which in turn, allows for faster human responses to such stimuli. It also complements senses such as sight, where direct line-of-view is necessary to identify objects, in the environment recognition process. This work focuses on implementing human reaction to sound stimuli and environment recognition on assistive robotic devices, such as robotic wheelchairs or robotized cars. These vehicles need environment information to ensure safe navigation. Approach. In the field of environment recognition, range sensors (such as LiDAR and ultrasonic systems) and artificial vision devices are widely used; however, these sensors depend on environment constraints (such as lighting variability or color of objects), and sound can provide important information for the characterization of an environment. In this work, we propose a sound-based approach to enhance the environment recognition process, mainly for cases that compromise human integrity, according to the International Classification of Functioning (ICF). Our proposal is based on a neural network implementation that is able to classify up to 15 different environments, each selected according to the ICF considerations on environment factors in the community-based physical activities of people with disabilities. Main results. The accuracy rates in environment classification ranges from 84% to 93%. This classification is later used to constrain assistive vehicle navigation in order to protect the user during daily activities. This work also includes real-time outdoor experimentation (performed on an assistive vehicle) by seven volunteers with different disabilities (but without cognitive impairment and experienced in the use of wheelchairs), statistical validation, comparison with previously published work, and a discussion section where the pros and cons of our system are evaluated. Significance

  11. Improving emotion recognition systems by embedding cardiorespiratory coupling

    International Nuclear Information System (INIS)

    Valenza, Gaetano; Lanatá, Antonio; Scilingo, Enzo Pasquale

    2013-01-01

    This work aims at showing improved performances of an emotion recognition system embedding information gathered from cardiorespiratory (CR) coupling. Here, we propose a novel methodology able to robustly identify up to 25 regions of a two-dimensional space model, namely the well-known circumplex model of affect (CMA). The novelty of embedding CR coupling information in an autonomic nervous system-based feature space better reveals the sympathetic activations upon emotional stimuli. A CR synchrogram analysis was used to quantify such a coupling in terms of number of heartbeats per respiratory period. Physiological data were gathered from 35 healthy subjects emotionally elicited by means of affective pictures of the international affective picture system database. In this study, we finely detected five levels of arousal and five levels of valence as well as the neutral state, whose combinations were used for identifying 25 different affective states in the CMA plane. We show that the inclusion of the bivariate CR measures in a previously developed system based only on monovariate measures of heart rate variability, respiration dynamics and electrodermal response dramatically increases the recognition accuracy of a quadratic discriminant classifier, obtaining more than 90% of correct classification per class. Finally, we propose a comprehensive description of the CR coupling during sympathetic elicitation adapting an existing theoretical nonlinear model with external driving. The theoretical idea behind this model is that the CR system is comprised of weakly coupled self-sustained oscillators that, when exposed to an external perturbation (i.e. sympathetic activity), becomes synchronized and less sensible to input variations. Given the demonstrated role of the CR coupling, this model can constitute a general tool which is easily embedded in other model-based emotion recognition systems. (paper)

  12. Vision-based obstacle recognition system for automated lawn mower robot development

    Science.gov (United States)

    Mohd Zin, Zalhan; Ibrahim, Ratnawati

    2011-06-01

    Digital image processing techniques (DIP) have been widely used in various types of application recently. Classification and recognition of a specific object using vision system require some challenging tasks in the field of image processing and artificial intelligence. The ability and efficiency of vision system to capture and process the images is very important for any intelligent system such as autonomous robot. This paper gives attention to the development of a vision system that could contribute to the development of an automated vision based lawn mower robot. The works involve on the implementation of DIP techniques to detect and recognize three different types of obstacles that usually exist on a football field. The focus was given on the study on different types and sizes of obstacles, the development of vision based obstacle recognition system and the evaluation of the system's performance. Image processing techniques such as image filtering, segmentation, enhancement and edge detection have been applied in the system. The results have shown that the developed system is able to detect and recognize various types of obstacles on a football field with recognition rate of more 80%.

  13. Device-Free Indoor Activity Recognition System

    Directory of Open Access Journals (Sweden)

    Mohammed Abdulaziz Aide Al-qaness

    2016-11-01

    Full Text Available In this paper, we explore the properties of the Channel State Information (CSI of WiFi signals and present a device-free indoor activity recognition system. Our proposed system uses only one ubiquitous router access point and a laptop as a detection point, while the user is free and neither needs to wear sensors nor carry devices. The proposed system recognizes six daily activities, such as walk, crawl, fall, stand, sit, and lie. We have built the prototype with an effective feature extraction method and a fast classification algorithm. The proposed system has been evaluated in a real and complex environment in both line-of-sight (LOS and none-line-of-sight (NLOS scenarios, and the results validate the performance of the proposed system.

  14. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  15. A novel handwritten character recognition system using gradient ...

    Indian Academy of Sciences (India)

    The issues faced by the handwritten character recognition systems are the similarity. ∗ ... tical/structural features have also been successfully used in character ..... The coordinates (xc, yc) of centroid are calculated by equations (4) and (5). xc =.

  16. Euro Banknote Recognition System for Blind People

    Directory of Open Access Journals (Sweden)

    Larisa Dunai Dunai

    2017-01-01

    Full Text Available This paper presents the development of a portable system with the aim of allowing blind people to detect and recognize Euro banknotes. The developed device is based on a Raspberry Pi electronic instrument and a Raspberry Pi camera, Pi NoIR (No Infrared filter dotted with additional infrared light, which is embedded into a pair of sunglasses that permit blind and visually impaired people to independently handle Euro banknotes, especially when receiving their cash back when shopping. The banknote detection is based on the modified Viola and Jones algorithms, while the banknote value recognition relies on the Speed Up Robust Features (SURF technique. The accuracies of banknote detection and banknote value recognition are 84% and 97.5%, respectively.

  17. Implementing an excellence in teaching recognition system: needs analysis and recommendations.

    Science.gov (United States)

    Schindler, Nancy; Corcoran, Julia C; Miller, Megan; Wang, Chih-Hsiung; Roggin, Kevin; Posner, Mitchell; Fryer, Jonathan; DaRosa, Debra A

    2013-01-01

    Teaching awards have been suggested to serve a variety of purposes. The specific characteristics of teaching awards and the associated effectiveness at achieving planned purposes are poorly understood. A needs analysis was performed to inform recommendations for an Excellence in Teaching Recognition System to meet the needs of surgical education leadership. We performed a 2-part needs analysis beginning with a review of the literature. We then, developed, piloted, and administered a survey instrument to General Surgery program leaders. The survey examined the features and perceived effectiveness of existing teaching awards systems. A multi-institution committee of program directors, clerkship directors, and Vice-Chairs of education then met to identify goals and develop recommendations for implementation of an "Excellence in Teaching Recognition System." There is limited evidence demonstrating effectiveness of existing teaching awards in medical education. Evidence supports the ability of such awards to demonstrate value placed on teaching, to inspire faculty to teach, and to contribute to promotion. Survey findings indicate that existing awards strive to achieve these purposes and that educational leaders believe awards have the potential to do this and more. Leaders are moderately satisfied with existing awards for providing recognition and demonstrating value placed on teaching, but they are less satisfied with awards for motivating faculty to participate in teaching or for contributing to promotion. Most departments and institutions honor only a few recipients annually. There is a paucity of literature addressing teaching recognition systems in medical education and little evidence to support the success of such systems in achieving their intended purposes. The ability of awards to affect outcomes such as participation in teaching and promotion may be limited by the small number of recipients for most existing awards. We propose goals for a Teaching Recognition

  18. Research on gesture recognition of augmented reality maintenance guiding system based on improved SVM

    Science.gov (United States)

    Zhao, Shouwei; Zhang, Yong; Zhou, Bin; Ma, Dongxi

    2014-09-01

    Interaction is one of the key techniques of augmented reality (AR) maintenance guiding system. Because of the complexity of the maintenance guiding system's image background and the high dimensionality of gesture characteristics, the whole process of gesture recognition can be divided into three stages which are gesture segmentation, gesture characteristic feature modeling and trick recognition. In segmentation stage, for solving the misrecognition of skin-like region, a segmentation algorithm combing background mode and skin color to preclude some skin-like regions is adopted. In gesture characteristic feature modeling of image attributes stage, plenty of characteristic features are analyzed and acquired, such as structure characteristics, Hu invariant moments features and Fourier descriptor. In trick recognition stage, a classifier based on Support Vector Machine (SVM) is introduced into the augmented reality maintenance guiding process. SVM is a novel learning method based on statistical learning theory, processing academic foundation and excellent learning ability, having a lot of issues in machine learning area and special advantages in dealing with small samples, non-linear pattern recognition at high dimension. The gesture recognition of augmented reality maintenance guiding system is realized by SVM after the granulation of all the characteristic features. The experimental results of the simulation of number gesture recognition and its application in augmented reality maintenance guiding system show that the real-time performance and robustness of gesture recognition of AR maintenance guiding system can be greatly enhanced by improved SVM.

  19. Effects of emotional and perceptual-motor stress on a voice recognition system's accuracy: An applied investigation

    Science.gov (United States)

    Poock, G. K.; Martin, B. J.

    1984-02-01

    This was an applied investigation examining the ability of a speech recognition system to recognize speakers' inputs when the speakers were under different stress levels. Subjects were asked to speak to a voice recognition system under three conditions: (1) normal office environment, (2) emotional stress, and (3) perceptual-motor stress. Results indicate a definite relationship between voice recognition system performance and the type of low stress reference patterns used to achieve recognition.

  20. Boundary conditions for open quantum systems driven far from equilibrium

    Science.gov (United States)

    Frensley, William R.

    1990-07-01

    This is a study of simple kinetic models of open systems, in the sense of systems that can exchange conserved particles with their environment. The system is assumed to be one dimensional and situated between two particle reservoirs. Such a system is readily driven far from equilibrium if the chemical potentials of the reservoirs differ appreciably. The openness of the system modifies the spatial boundary conditions on the single-particle Liouville-von Neumann equation, leading to a non-Hermitian Liouville operator. If the open-system boundary conditions are time reversible, exponentially growing (unphysical) solutions are introduced into the time dependence of the density matrix. This problem is avoided by applying time-irreversible boundary conditions to the Wigner distribution function. These boundary conditions model the external environment as ideal particle reservoirs with properties analogous to those of a blackbody. This time-irreversible model may be numerically evaluated in a discrete approximation and has been applied to the study of a resonant-tunneling semiconductor diode. The physical and mathematical properties of the irreversible kinetic model, in both its discrete and its continuum formulations, are examined in detail. The model demonstrates the distinction in kinetic theory between commutator superoperators, which may become non-Hermitian to describe irreversible behavior, and anticommutator superoperators, which remain Hermitian and are used to evaluate physical observables.

  1. A single-system model predicts recognition memory and repetition priming in amnesia.

    Science.gov (United States)

    Berry, Christopher J; Kessels, Roy P C; Wester, Arie J; Shanks, David R

    2014-08-13

    We challenge the claim that there are distinct neural systems for explicit and implicit memory by demonstrating that a formal single-system model predicts the pattern of recognition memory (explicit) and repetition priming (implicit) in amnesia. In the current investigation, human participants with amnesia categorized pictures of objects at study and then, at test, identified fragmented versions of studied (old) and nonstudied (new) objects (providing a measure of priming), and made a recognition memory judgment (old vs new) for each object. Numerous results in the amnesic patients were predicted in advance by the single-system model, as follows: (1) deficits in recognition memory and priming were evident relative to a control group; (2) items judged as old were identified at greater levels of fragmentation than items judged new, regardless of whether the items were actually old or new; and (3) the magnitude of the priming effect (the identification advantage for old vs new items) overall was greater than that of items judged new. Model evidence measures also favored the single-system model over two formal multiple-systems models. The findings support the single-system model, which explains the pattern of recognition and priming in amnesia primarily as a reduction in the strength of a single dimension of memory strength, rather than a selective explicit memory system deficit. Copyright © 2014 the authors 0270-6474/14/3410963-12$15.00/0.

  2. AN EFFICIENT SELF-UPDATING FACE RECOGNITION SYSTEM FOR PLASTIC SURGERY FACE

    Directory of Open Access Journals (Sweden)

    A. Devi

    2016-08-01

    Full Text Available Facial recognition system is fundamental a computer application for the automatic identification of a person through a digitized image or a video source. The major cause for the overall poor performance is related to the transformations in appearance of the user based on the aspects akin to ageing, beard growth, sun-tan etc. In order to overcome the above drawback, Self-update process has been developed in which, the system learns the biometric attributes of the user every time the user interacts with the system and the information gets updated automatically. The procedures of Plastic surgery yield a skilled and endurable means of enhancing the facial appearance by means of correcting the anomalies in the feature and then treating the facial skin with the aim of getting a youthful look. When plastic surgery is performed on an individual, the features of the face undergo reconstruction either locally or globally. But, the changes which are introduced new by plastic surgery remain hard to get modeled by the available face recognition systems and they deteriorate the performances of the face recognition algorithm. Hence the Facial plastic surgery produces changes in the facial features to larger extent and thereby creates a significant challenge to the face recognition system. This work introduces a fresh Multimodal Biometric approach making use of novel approaches to boost the rate of recognition and security. The proposed method consists of various processes like Face segmentation using Active Appearance Model (AAM, Face Normalization using Kernel Density Estimate/ Point Distribution Model (KDE-PDM, Feature extraction using Local Gabor XOR Patterns (LGXP and Classification using Independent Component Analysis (ICA. Efficient techniques have been used in each phase of the FRAS in order to obtain improved results.

  3. Cross domains Arabic named entity recognition system

    Science.gov (United States)

    Al-Ahmari, S. Saad; Abdullatif Al-Johar, B.

    2016-07-01

    Named Entity Recognition (NER) plays an important role in many Natural Language Processing (NLP) applications such as; Information Extraction (IE), Question Answering (QA), Text Clustering, Text Summarization and Word Sense Disambiguation. This paper presents the development and implementation of domain independent system to recognize three types of Arabic named entities. The system works based on a set of domain independent grammar-rules along with Arabic part of speech tagger in addition to gazetteers and lists of trigger words. The experimental results shown, that the system performed as good as other systems with better results in some cases of cross-domains corpora.

  4. The effect of image resolution on the performance of a face recognition system

    NARCIS (Netherlands)

    Boom, B.J.; Beumer, G.M.; Spreeuwers, Lieuwe Jan; Veldhuis, Raymond N.J.

    2006-01-01

    In this paper we investigate the effect of image resolution on the error rates of a face verification system. We do not restrict ourselves to the face recognition algorithm only, but we also consider the face registration. In our face recognition system, the face registration is done by finding

  5. Boundary Controllability of Nonlinear Fractional Integrodifferential Systems

    Directory of Open Access Journals (Sweden)

    Ahmed HamdyM

    2010-01-01

    Full Text Available Sufficient conditions for boundary controllability of nonlinear fractional integrodifferential systems in Banach space are established. The results are obtained by using fixed point theorems. We also give an application for integropartial differential equations of fractional order.

  6. Boundary entropy of one-dimensional quantum systems at low temperature

    International Nuclear Information System (INIS)

    Friedan, Daniel; Konechny, Anatoly

    2004-01-01

    The boundary β function generates the renormalization group acting on the universality classes of one-dimensional quantum systems with boundary which are critical in the bulk but not critical at the boundary. We prove a gradient formula for the boundary β function, expressing it as the gradient of the boundary entropy s at fixed nonzero temperature. The gradient formula implies that s decreases under renormalization, except at critical points (where it stays constant). At a critical point, the number exp(s) is the 'ground-state degeneracy', g, of Affleck and Ludwig, so we have proved their long-standing conjecture that g decreases under renormalization, from critical point to critical point. The gradient formula also implies that s decreases with temperature, except at critical points, where it is independent of temperature. It remains open whether the boundary entropy is always bounded below

  7. Boundary feedback stabilization of distributed parameter systems

    DEFF Research Database (Denmark)

    Pedersen, Michael

    1988-01-01

    The author introduces the method of pseudo-differential stabilization. He notes that the theory of pseudo-differential boundary operators is a fruitful approach to problems arising in control and stabilization theory of distributed-parameter systems. The basic pseudo-differential calculus can...

  8. Container code recognition in information auto collection system of container inspection

    International Nuclear Information System (INIS)

    Su Jianping; Chen Zhiqiang; Zhang Li; Gao Wenhuan; Kang Kejun

    2003-01-01

    Now custom needs electrical application and automatic detection. Container inspection should not only give the image of the goods, but also auto-attain container's code and weight. Its function and track control, information transfer make up the Information Auto Collection system of Container Inspection. Code Recognition is the point. The article is based on model match, the close property of character, and uses it to recognize. Base on checkout rule, design the adjustment arithmetic, form the whole recognition strategy. This strategy can achieve high recognition ratio and robust property

  9. New Boundary Constraints for Elliptic Systems used in Grid Generation Problems

    Science.gov (United States)

    Kaul, Upender K.; Clancy, Daniel (Technical Monitor)

    2002-01-01

    This paper discusses new boundary constraints for elliptic partial differential equations as used in grid generation problems in generalized curvilinear coordinate systems. These constraints, based on the principle of local conservation of thermal energy in the vicinity of the boundaries, are derived using the Green's Theorem. They uniquely determine the so called decay parameters in the source terms of these elliptic systems. These constraints' are designed for boundary clustered grids where large gradients in physical quantities need to be resolved adequately. It is observed that the present formulation also works satisfactorily for mild clustering. Therefore, a closure for the decay parameter specification for elliptic grid generation problems has been provided resulting in a fully automated elliptic grid generation technique. Thus, there is no need for a parametric study of these decay parameters since the new constraints fix them uniquely. It is also shown that for Neumann type boundary conditions, these boundary constraints uniquely determine the solution to the internal elliptic problem thus eliminating the non-uniqueness of the solution of an internal Neumann boundary value grid generation problem.

  10. A Kinect based sign language recognition system using spatio-temporal features

    Science.gov (United States)

    Memiş, Abbas; Albayrak, Songül

    2013-12-01

    This paper presents a sign language recognition system that uses spatio-temporal features on RGB video images and depth maps for dynamic gestures of Turkish Sign Language. Proposed system uses motion differences and accumulation approach for temporal gesture analysis. Motion accumulation method, which is an effective method for temporal domain analysis of gestures, produces an accumulated motion image by combining differences of successive video frames. Then, 2D Discrete Cosine Transform (DCT) is applied to accumulated motion images and temporal domain features transformed into spatial domain. These processes are performed on both RGB images and depth maps separately. DCT coefficients that represent sign gestures are picked up via zigzag scanning and feature vectors are generated. In order to recognize sign gestures, K-Nearest Neighbor classifier with Manhattan distance is performed. Performance of the proposed sign language recognition system is evaluated on a sign database that contains 1002 isolated dynamic signs belongs to 111 words of Turkish Sign Language (TSL) in three different categories. Proposed sign language recognition system has promising success rates.

  11. Application of the new pattern recognition system in the new e-nose to detecting Chinese spirits

    International Nuclear Information System (INIS)

    Gu Yu; Li Qiang

    2014-01-01

    We present a new pattern recognition system based on moving average and linear discriminant analysis (LDA), which can be used to process the original signal of the new polymer quartz piezoelectric crystal air-sensitive sensor system we designed, called the new e-nose. Using the new e-nose, we obtain the template datum of Chinese spirits via a new pattern recognition system. To verify the effectiveness of the new pattern recognition system, we select three kinds of Chinese spirits to test, our results confirm that the new pattern recognition system can perfectly identify and distinguish between the Chinese spirits. (electromagnetism, optics, acoustics, heat transfer, classical mechanics, and fluid dynamics)

  12. Impact of a voice recognition system on report cycle time and radiologist reading time

    Science.gov (United States)

    Melson, David L.; Brophy, Robert; Blaine, G. James; Jost, R. Gilbert; Brink, Gary S.

    1998-07-01

    Because of its exciting potential to improve clinical service, as well as reduce costs, a voice recognition system for radiological dictation was recently installed at our institution. This system will be clinically successful if it dramatically reduces radiology report turnaround time without substantially affecting radiologist dictation and editing time. This report summarizes an observer study currently under way in which radiologist reporting times using the traditional transcription system and the voice recognition system are compared. Four radiologists are observed interpreting portable intensive care unit (ICU) chest examinations at a workstation in the chest reading area. Data are recorded with the radiologists using the transcription system and using the voice recognition system. The measurements distinguish between time spent performing clerical tasks and time spent actually dictating the report. Editing time and the number of corrections made are recorded. Additionally, statistics are gathered to assess the voice recognition system's impact on the report cycle time -- the time from report dictation to availability of an edited and finalized report -- and the length of reports.

  13. AUTOMATIC SPEECH RECOGNITION SYSTEM CONCERNING THE MOROCCAN DIALECTE (Darija and Tamazight)

    OpenAIRE

    A. EL GHAZI; C. DAOUI; N. IDRISSI

    2012-01-01

    In this work we present an automatic speech recognition system for Moroccan dialect mainly: Darija (Arab dialect) and Tamazight. Many approaches have been used to model the Arabic and Tamazightphonetic units. In this paper, we propose to use the hidden Markov model (HMM) for modeling these phoneticunits. Experimental results show that the proposed approach further improves the recognition.

  14. Mixed problems for linear symmetric hyperbolic systems with characteristic boundary conditions

    International Nuclear Information System (INIS)

    Secchi, P.

    1994-01-01

    We consider the initial-boundary value problem for symmetric hyperbolic systems with characteristic boundary of constant multiplicity. In the linear case we give some results about the existence of regular solutions in suitable functions spaces which take in account the loss of regularity in the normal direction to the characteristic boundary. We also consider the equations of ideal magneto-hydrodynamics under perfectly conducting wall boundary conditions and give some results about the solvability of such mixed problem. (author). 16 refs

  15. The analytical solution for drug delivery system with nonhomogeneous moving boundary condition

    Science.gov (United States)

    Saudi, Muhamad Hakimi; Mahali, Shalela Mohd; Harun, Fatimah Noor

    2017-08-01

    This paper discusses the development and the analytical solution of a mathematical model based on drug release system from a swelling delivery device. The mathematical model is represented by a one-dimensional advection-diffusion equation with nonhomogeneous moving boundary condition. The solution procedures consist of three major steps. Firstly, the application of steady state solution method, which is used to transform the nonhomogeneous moving boundary condition to homogeneous boundary condition. Secondly, the application of the Landau transformation technique that gives a significant impact in removing the advection term in the system of equation and transforming the moving boundary condition to a fixed boundary condition. Thirdly, the used of separation of variables method to find the analytical solution for the resulted initial boundary value problem. The results show that the swelling rate of delivery device and drug release rate is influenced by value of growth factor r.

  16. Exploring Techniques for Vision Based Human Activity Recognition: Methods, Systems, and Evaluation

    Directory of Open Access Journals (Sweden)

    Hong Zhang

    2013-01-01

    Full Text Available With the wide applications of vision based intelligent systems, image and video analysis technologies have attracted the attention of researchers in the computer vision field. In image and video analysis, human activity recognition is an important research direction. By interpreting and understanding human activity, we can recognize and predict the occurrence of crimes and help the police or other agencies react immediately. In the past, a large number of papers have been published on human activity recognition in video and image sequences. In this paper, we provide a comprehensive survey of the recent development of the techniques, including methods, systems, and quantitative evaluation towards the performance of human activity recognition.

  17. An Edge-Based Macao License Plate Recognition System

    Directory of Open Access Journals (Sweden)

    Chi-Man Pun

    2011-04-01

    Full Text Available This paper presents a system to recognize Macao license plates. Sobel edge detector is employed to extract the vertical edges, and an edge composition algorithm is proposed to combine the edges into candidate plate regions. They are further examined on the existence of the character qMq by a verification algorithm. A row separation algorithm is also proposed to cater both one-row and two-row types of plates. Projection analysis and template matching methods are exploited to segment and recognize the characters. Various pre and post processing steps are proposed other than traditional implementation so as to improve the recognition accuracy. This work achieves a high recognition rate of 95%.

  18. A multi-view face recognition system based on cascade face detector and improved Dlib

    Science.gov (United States)

    Zhou, Hongjun; Chen, Pei; Shen, Wei

    2018-03-01

    In this research, we present a framework for multi-view face detect and recognition system based on cascade face detector and improved Dlib. This method is aimed to solve the problems of low efficiency and low accuracy in multi-view face recognition, to build a multi-view face recognition system, and to discover a suitable monitoring scheme. For face detection, the cascade face detector is used to extracted the Haar-like feature from the training samples, and Haar-like feature is used to train a cascade classifier by combining Adaboost algorithm. Next, for face recognition, we proposed an improved distance model based on Dlib to improve the accuracy of multiview face recognition. Furthermore, we applied this proposed method into recognizing face images taken from different viewing directions, including horizontal view, overlooks view, and looking-up view, and researched a suitable monitoring scheme. This method works well for multi-view face recognition, and it is also simulated and tested, showing satisfactory experimental results.

  19. Applications of PCA and SVM-PSO Based Real-Time Face Recognition System

    Directory of Open Access Journals (Sweden)

    Ming-Yuan Shieh

    2014-01-01

    Full Text Available This paper incorporates principal component analysis (PCA with support vector machine-particle swarm optimization (SVM-PSO for developing real-time face recognition systems. The integrated scheme aims to adopt the SVM-PSO method to improve the validity of PCA based image recognition systems on dynamically visual perception. The face recognition for most human-robot interaction applications is accomplished by PCA based method because of its dimensionality reduction. However, PCA based systems are only suitable for processing the faces with the same face expressions and/or under the same view directions. Since the facial feature selection process can be considered as a problem of global combinatorial optimization in machine learning, the SVM-PSO is usually used as an optimal classifier of the system. In this paper, the PSO is used to implement a feature selection, and the SVMs serve as fitness functions of the PSO for classification problems. Experimental results demonstrate that the proposed method simplifies features effectively and obtains higher classification accuracy.

  20. FPGA IMPLEMENTATION OF ADAPTIVE INTEGRATED SPIKING NEURAL NETWORK FOR EFFICIENT IMAGE RECOGNITION SYSTEM

    Directory of Open Access Journals (Sweden)

    T. Pasupathi

    2014-05-01

    Full Text Available Image recognition is a technology which can be used in various applications such as medical image recognition systems, security, defense video tracking, and factory automation. In this paper we present a novel pipelined architecture of an adaptive integrated Artificial Neural Network for image recognition. In our proposed work we have combined the feature of spiking neuron concept with ANN to achieve the efficient architecture for image recognition. The set of training images are trained by ANN and target output has been identified. Real time videos are captured and then converted into frames for testing purpose and the image were recognized. The machine can operate at up to 40 frames/sec using images acquired from the camera. The system has been implemented on XC3S400 SPARTAN-3 Field Programmable Gate Arrays.

  1. Low-contrast underwater living fish recognition using PCANet

    Science.gov (United States)

    Sun, Xin; Yang, Jianping; Wang, Changgang; Dong, Junyu; Wang, Xinhua

    2018-04-01

    Quantitative and statistical analysis of ocean creatures is critical to ecological and environmental studies. And living fish recognition is one of the most essential requirements for fishery industry. However, light attenuation and scattering phenomenon are present in the underwater environment, which makes underwater images low-contrast and blurry. This paper tries to design a robust framework for accurate fish recognition. The framework introduces a two stage PCA Network to extract abstract features from fish images. On a real-world fish recognition dataset, we use a linear SVM classifier and set penalty coefficients to conquer data unbalanced issue. Feature visualization results show that our method can avoid the feature distortion in boundary regions of underwater image. Experiments results show that the PCA Network can extract discriminate features and achieve promising recognition accuracy. The framework improves the recognition accuracy of underwater living fishes and can be easily applied to marine fishery industry.

  2. A system of automatic speaker recognition on a minicomputer

    International Nuclear Information System (INIS)

    El Chafei, Cherif

    1978-01-01

    This study describes a system of automatic speaker recognition using the pitch of the voice. The pre-treatment consists in the extraction of the speakers' discriminating characteristics taken from the pitch. The programme of recognition gives, firstly, a preselection and then calculates the distance between the speaker's characteristics to be recognized and those of the speakers already recorded. An experience of recognition has been realized. It has been undertaken with 15 speakers and included 566 tests spread over an intermittent period of four months. The discriminating characteristics used offer several interesting qualities. The algorithms concerning the measure of the characteristics on one hand, the speakers' classification on the other hand, are simple. The results obtained in real time with a minicomputer are satisfactory. Furthermore they probably could be improved if we considered other speaker's discriminating characteristics but this was unfortunately not in our possibilities. (author) [fr

  3. Boundary controllability of integrodifferential systems in Banach ...

    Indian Academy of Sciences (India)

    solution to state space system, the control must be taken in a space of ... this paper is to study the boundary controllability of nonlinear integrodifferential systems ... be a linear closed and densely defined operator with Dً'ق E and let ( be a linear ... (iv) For all t 2 ً0; bٹ and u 2 U, TًtقBu 2 DًAق. ... The construction of the bounded.

  4. Slip systems, dislocation boundaries and lattice rotations in deformed metals

    DEFF Research Database (Denmark)

    Winther, Grethe

    2009-01-01

    Metals are polycrystals and consist of grains, which are subdivided on a finer scale upon plastic deformation due to formation of dislocation boundaries. The crystallographic alignment of planar dislocation boundaries in face centred cubic metals, like aluminium and copper, deformed to moderate...... of the mechanical anisotropy of rolled sheets. The rotation of the crystallographic lattice in each grain during deformation also exhibits grain orientation dependence, originating from the slip systems. A combined analysis of dislocation boundaries and lattice rotations concludes that the two phenomena are coupled...

  5. Application of robust face recognition in video surveillance systems

    Science.gov (United States)

    Zhang, De-xin; An, Peng; Zhang, Hao-xiang

    2018-03-01

    In this paper, we propose a video searching system that utilizes face recognition as searching indexing feature. As the applications of video cameras have great increase in recent years, face recognition makes a perfect fit for searching targeted individuals within the vast amount of video data. However, the performance of such searching depends on the quality of face images recorded in the video signals. Since the surveillance video cameras record videos without fixed postures for the object, face occlusion is very common in everyday video. The proposed system builds a model for occluded faces using fuzzy principal component analysis (FPCA), and reconstructs the human faces with the available information. Experimental results show that the system has very high efficiency in processing the real life videos, and it is very robust to various kinds of face occlusions. Hence it can relieve people reviewers from the front of the monitors and greatly enhances the efficiency as well. The proposed system has been installed and applied in various environments and has already demonstrated its power by helping solving real cases.

  6. The nuclear fuel rod character recognition system based on neural network technique

    International Nuclear Information System (INIS)

    Kim, Woong-Ki; Park, Soon-Yong; Lee, Yong-Bum; Kim, Seung-Ho; Lee, Jong-Min; Chien, Sung-Il.

    1994-01-01

    The nuclear fuel rods should be discriminated and managed systematically by numeric characters which are printed at the end part of each rod in the process of producing fuel assembly. The characters are used to examine manufacturing process of the fuel rods in the inspection process of irradiated fuel rod. Therefore automatic character recognition is one of the most important technologies to establish automatic manufacturing process of fuel assembly. In the developed character recognition system, mesh feature set extracted from each character written in the fuel rod is employed to train a neural network based on back-propagation algorithm as a classifier for character recognition system. Performance evaluation has been achieved on a test set which is not included in a training character set. (author)

  7. A Malaysian Vehicle License Plate Localization and Recognition System

    OpenAIRE

    Ganapathy Velappa; Dennis LUI Wen Lik

    2008-01-01

    Technological intelligence is a highly sought after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and commercial applications. In this paper, a license plate localization and recognition system for vehicles in Malaysia is proposed. This system is developed based on digital images and can be easily applied to commercial car park systems for the use of documenting access of parking services,...

  8. The recognition heuristic: a review of theory and tests.

    Science.gov (United States)

    Pachur, Thorsten; Todd, Peter M; Gigerenzer, Gerd; Schooler, Lael J; Goldstein, Daniel G

    2011-01-01

    The recognition heuristic is a prime example of how, by exploiting a match between mind and environment, a simple mental strategy can lead to efficient decision making. The proposal of the heuristic initiated a debate about the processes underlying the use of recognition in decision making. We review research addressing four key aspects of the recognition heuristic: (a) that recognition is often an ecologically valid cue; (b) that people often follow recognition when making inferences; (c) that recognition supersedes further cue knowledge; (d) that its use can produce the less-is-more effect - the phenomenon that lesser states of recognition knowledge can lead to more accurate inferences than more complete states. After we contrast the recognition heuristic to other related concepts, including availability and fluency, we carve out, from the existing findings, some boundary conditions of the use of the recognition heuristic as well as key questions for future research. Moreover, we summarize developments concerning the connection of the recognition heuristic with memory models. We suggest that the recognition heuristic is used adaptively and that, compared to other cues, recognition seems to have a special status in decision making. Finally, we discuss how systematic ignorance is exploited in other cognitive mechanisms (e.g., estimation and preference).

  9. The Recognition Heuristic: A Review of Theory and Tests

    Directory of Open Access Journals (Sweden)

    Thorsten ePachur

    2011-07-01

    Full Text Available The recognition heuristic is a prime example of how, by exploiting a match between mind and environment, a simple mental strategy can lead to efficient decision making. The proposal of the heuristic initiated a debate about the processes underlying the use of recognition in decision making. We review research addressing four key aspects of the recognition heuristic: (a that recognition is often an ecologically valid cue; (b that people often follow recognition when making inferences; (c that recognition supersedes further cue knowledge; (d that its use can produce the less-is-more effect—the phenomenon that lesser states of recognition knowledge can lead to more accurate inferences than more complete states. After we contrast the recognition heuristic to other related concepts, including availability and fluency, we carve out, from the existing findings, some boundary conditions of the use of the recognition heuristic as well as key questions for future research. Moreover, we summarize developments concerning the connection of the recognition heuristic with memory models. We suggest that the recognition heuristic is used adaptively and that, compared to other cues, recognition seems to have a special status in decision making. Finally, we discuss how systematic ignorance is exploited in other cognitive mechanisms (e.g., estimation and preference.

  10. The Recognition Heuristic: A Review of Theory and Tests

    Science.gov (United States)

    Pachur, Thorsten; Todd, Peter M.; Gigerenzer, Gerd; Schooler, Lael J.; Goldstein, Daniel G.

    2011-01-01

    The recognition heuristic is a prime example of how, by exploiting a match between mind and environment, a simple mental strategy can lead to efficient decision making. The proposal of the heuristic initiated a debate about the processes underlying the use of recognition in decision making. We review research addressing four key aspects of the recognition heuristic: (a) that recognition is often an ecologically valid cue; (b) that people often follow recognition when making inferences; (c) that recognition supersedes further cue knowledge; (d) that its use can produce the less-is-more effect – the phenomenon that lesser states of recognition knowledge can lead to more accurate inferences than more complete states. After we contrast the recognition heuristic to other related concepts, including availability and fluency, we carve out, from the existing findings, some boundary conditions of the use of the recognition heuristic as well as key questions for future research. Moreover, we summarize developments concerning the connection of the recognition heuristic with memory models. We suggest that the recognition heuristic is used adaptively and that, compared to other cues, recognition seems to have a special status in decision making. Finally, we discuss how systematic ignorance is exploited in other cognitive mechanisms (e.g., estimation and preference). PMID:21779266

  11. A Massively Parallel Face Recognition System

    Directory of Open Access Journals (Sweden)

    Lahdenoja Olli

    2007-01-01

    Full Text Available We present methods for processing the LBPs (local binary patterns with a massively parallel hardware, especially with CNN-UM (cellular nonlinear network-universal machine. In particular, we present a framework for implementing a massively parallel face recognition system, including a dedicated highly accurate algorithm suitable for various types of platforms (e.g., CNN-UM and digital FPGA. We study in detail a dedicated mixed-mode implementation of the algorithm and estimate its implementation cost in the view of its performance and accuracy restrictions.

  12. A Massively Parallel Face Recognition System

    Directory of Open Access Journals (Sweden)

    Ari Paasio

    2006-12-01

    Full Text Available We present methods for processing the LBPs (local binary patterns with a massively parallel hardware, especially with CNN-UM (cellular nonlinear network-universal machine. In particular, we present a framework for implementing a massively parallel face recognition system, including a dedicated highly accurate algorithm suitable for various types of platforms (e.g., CNN-UM and digital FPGA. We study in detail a dedicated mixed-mode implementation of the algorithm and estimate its implementation cost in the view of its performance and accuracy restrictions.

  13. A novel hybrid biometric electronic voting system: integrating finger print face recognition

    International Nuclear Information System (INIS)

    Najam, S.S.; Shaikh, A.Z.; Naqvi, S.

    2018-01-01

    A novel hybrid design based electronic voting system is proposed, implemented and analyzed. The proposed system uses two voter verification techniques to give better results in comparison to single identification based systems. Finger print and facial recognition based methods are used for voter identification. Cross verification of a voter during an election process provides better accuracy than single parameter identification method. The facial recognition system uses Viola-Jones algorithm along with rectangular Haar feature selection method for detection and extraction of features to develop a biometric template and for feature extraction during the voting process. Cascaded machine learning based classifiers are used for comparing the features for identity verification using GPCA (Generalized Principle Component Analysis) and K-NN (K-Nearest Neighbor). It is accomplished through comparing the Eigen-vectors of the extracted features with the biometric template pre-stored in the election regulatory body database. The results of the proposed system show that the proposed cascaded design based system performs better than the systems using other classifiers or separate schemes i.e. facial or finger print based schemes. The proposed system will be highly useful for real time applications due to the reason that it has 91% accuracy under nominal light in terms of facial recognition. (author)

  14. Performance Assessment of Dynaspeak Speech Recognition System on Inflight Databases

    National Research Council Canada - National Science Library

    Barry, Timothy

    2004-01-01

    .... To aid in the assessment of various commercially available speech recognition systems, several aircraft speech databases have been developed at the Air Force Research Laboratory's Human Effectiveness Directorate...

  15. A Robust and Device-Free System for the Recognition and Classification of Elderly Activities.

    Science.gov (United States)

    Li, Fangmin; Al-Qaness, Mohammed Abdulaziz Aide; Zhang, Yong; Zhao, Bihai; Luan, Xidao

    2016-12-01

    Human activity recognition, tracking and classification is an essential trend in assisted living systems that can help support elderly people with their daily activities. Traditional activity recognition approaches depend on vision-based or sensor-based techniques. Nowadays, a novel promising technique has obtained more attention, namely device-free human activity recognition that neither requires the target object to wear or carry a device nor install cameras in a perceived area. The device-free technique for activity recognition uses only the signals of common wireless local area network (WLAN) devices available everywhere. In this paper, we present a novel elderly activities recognition system by leveraging the fluctuation of the wireless signals caused by human motion. We present an efficient method to select the correct data from the Channel State Information (CSI) streams that were neglected in previous approaches. We apply a Principle Component Analysis method that exposes the useful information from raw CSI. Thereafter, Forest Decision (FD) is adopted to classify the proposed activities and has gained a high accuracy rate. Extensive experiments have been conducted in an indoor environment to test the feasibility of the proposed system with a total of five volunteer users. The evaluation shows that the proposed system is applicable and robust to electromagnetic noise.

  16. Body posture recognition and turning recording system for the care of bed bound patients.

    Science.gov (United States)

    Hsiao, Rong-Shue; Mi, Zhenqiang; Yang, Bo-Ru; Kau, Lih-Jen; Bitew, Mekuanint Agegnehu; Li, Tzu-Yu

    2015-01-01

    This paper proposes body posture recognition and turning recording system for assisting the care of bed bound patients in nursing homes. The system continuously detects the patient's body posture and records the length of time for each body posture. If the patient remains in the same body posture long enough to develop pressure ulcers, the system notifies caregivers to change the patient's body posture. The objective of recording is to provide the log of body turning for querying of patients' family members. In order to accurately detect patient's body posture, we developed a novel pressure sensing pad which contains force sensing resistor sensors. Based on the proposed pressure sensing pad, we developed a bed posture recognition module which includes a bed posture recognition algorithm. The algorithm is based on fuzzy theory. The body posture recognition algorithm can detect the patient's bed posture whether it is right lateral decubitus, left lateral decubitus, or supine. The detected information of patient's body posture can be then transmitted to the server of healthcare center by the communication module to perform the functions of recording and notification. Experimental results showed that the average posture recognition accuracy for our proposed module is 92%.

  17. Cell boundary fault detection system

    Science.gov (United States)

    Archer, Charles Jens [Rochester, MN; Pinnow, Kurt Walter [Rochester, MN; Ratterman, Joseph D [Rochester, MN; Smith, Brian Edward [Rochester, MN

    2009-05-05

    A method determines a nodal fault along the boundary, or face, of a computing cell. Nodes on adjacent cell boundaries communicate with each other, and the communications are analyzed to determine if a node or connection is faulty.

  18. Cross domains Arabic named entity recognition system

    KAUST Repository

    Al-Ahmari, S. Saad

    2016-07-11

    Named Entity Recognition (NER) plays an important role in many Natural Language Processing (NLP) applications such as; Information Extraction (IE), Question Answering (QA), Text Clustering, Text Summarization and Word Sense Disambiguation. This paper presents the development and implementation of domain independent system to recognize three types of Arabic named entities. The system works based on a set of domain independent grammar-rules along with Arabic part of speech tagger in addition to gazetteers and lists of trigger words. The experimental results shown, that the system performed as good as other systems with better results in some cases of cross-domains corpora. © (2016) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.

  19. Cross domains Arabic named entity recognition system

    KAUST Repository

    Al-Ahmari, S. Saad; Abdullatif Al-Johar, B.

    2016-01-01

    Named Entity Recognition (NER) plays an important role in many Natural Language Processing (NLP) applications such as; Information Extraction (IE), Question Answering (QA), Text Clustering, Text Summarization and Word Sense Disambiguation. This paper presents the development and implementation of domain independent system to recognize three types of Arabic named entities. The system works based on a set of domain independent grammar-rules along with Arabic part of speech tagger in addition to gazetteers and lists of trigger words. The experimental results shown, that the system performed as good as other systems with better results in some cases of cross-domains corpora. © (2016) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.

  20. Inside Out: Organizations as Service Systems Equipped with Relational Boundaries

    Directory of Open Access Journals (Sweden)

    María Jimena Crespo Garrido

    2017-04-01

    Full Text Available Currently, literature on organizational boundaries is at the center of a heated debate, characterized by a shift from a transactional approach to a broader immaterial perspective centered on the concept of boundless organizations. However, the overestimation of the effects of contemporary dematerialization on business processes can lead to the progressive neglect of the existence of corporate borders. In light of this consideration, the present work aims at proposing a new type of criterion for defining organizational boundaries, halfway between the conception of the firm’s total openness and total closure. To this end, the authors envisage the use of a new interpretive logic defined as “relational”, resulting from the specification of the systemic view (and as the sum of the logic underlying the viable systems approach (VSA. This approach views the definition of boundaries. Therefore, in the large and intricate scenery of the studies dedicated to organizational boundaries, this work contributes to a better understanding of border selection as an interactive and changeable process capable of pushing organizations towards a greater awareness of their strategic dimension. This paper also offers some insights for future research, suggesting that both scholars and professionals investigate, firstly, new frontiers for the identification of organizational boundaries and, secondly, the possible positive repercussions that new organizational redesign modes could determine for a greater competitive success.

  1. Cell boundary fault detection system

    Science.gov (United States)

    Archer, Charles Jens [Rochester, MN; Pinnow, Kurt Walter [Rochester, MN; Ratterman, Joseph D [Rochester, MN; Smith, Brian Edward [Rochester, MN

    2011-04-19

    An apparatus and program product determine a nodal fault along the boundary, or face, of a computing cell. Nodes on adjacent cell boundaries communicate with each other, and the communications are analyzed to determine if a node or connection is faulty.

  2. Multi-layer cube sampling for liver boundary detection in PET-CT images.

    Science.gov (United States)

    Liu, Xinxin; Yang, Jian; Song, Shuang; Song, Hong; Ai, Danni; Zhu, Jianjun; Jiang, Yurong; Wang, Yongtian

    2018-06-01

    Liver metabolic information is considered as a crucial diagnostic marker for the diagnosis of fever of unknown origin, and liver recognition is the basis of automatic diagnosis of metabolic information extraction. However, the poor quality of PET and CT images is a challenge for information extraction and target recognition in PET-CT images. The existing detection method cannot meet the requirement of liver recognition in PET-CT images, which is the key problem in the big data analysis of PET-CT images. A novel texture feature descriptor called multi-layer cube sampling (MLCS) is developed for liver boundary detection in low-dose CT and PET images. The cube sampling feature is proposed for extracting more texture information, which uses a bi-centric voxel strategy. Neighbour voxels are divided into three regions by the centre voxel and the reference voxel in the histogram, and the voxel distribution information is statistically classified as texture feature. Multi-layer texture features are also used to improve the ability and adaptability of target recognition in volume data. The proposed feature is tested on the PET and CT images for liver boundary detection. For the liver in the volume data, mean detection rate (DR) and mean error rate (ER) reached 95.15 and 7.81% in low-quality PET images, and 83.10 and 21.08% in low-contrast CT images. The experimental results demonstrated that the proposed method is effective and robust for liver boundary detection.

  3. Structural insight into RNA recognition motifs: versatile molecular Lego building blocks for biological systems.

    Science.gov (United States)

    Muto, Yutaka; Yokoyama, Shigeyuki

    2012-01-01

    'RNA recognition motifs (RRMs)' are common domain-folds composed of 80-90 amino-acid residues in eukaryotes, and have been identified in many cellular proteins. At first they were known as RNA binding domains. Through discoveries over the past 20 years, however, the RRMs have been shown to exhibit versatile molecular recognition activities and to behave as molecular Lego building blocks to construct biological systems. Novel RNA/protein recognition modes by RRMs are being identified, and more information about the molecular recognition by RRMs is becoming available. These RNA/protein recognition modes are strongly correlated with their biological significance. In this review, we would like to survey the recent progress on these versatile molecular recognition modules. Copyright © 2012 John Wiley & Sons, Ltd.

  4. Fast words boundaries localization in text fields for low quality document images

    Science.gov (United States)

    Ilin, Dmitry; Novikov, Dmitriy; Polevoy, Dmitry; Nikolaev, Dmitry

    2018-04-01

    The paper examines the problem of word boundaries precise localization in document text zones. Document processing on a mobile device consists of document localization, perspective correction, localization of individual fields, finding words in separate zones, segmentation and recognition. While capturing an image with a mobile digital camera under uncontrolled capturing conditions, digital noise, perspective distortions or glares may occur. Further document processing gets complicated because of its specifics: layout elements, complex background, static text, document security elements, variety of text fonts. However, the problem of word boundaries localization has to be solved at runtime on mobile CPU with limited computing capabilities under specified restrictions. At the moment, there are several groups of methods optimized for different conditions. Methods for the scanned printed text are quick but limited only for images of high quality. Methods for text in the wild have an excessively high computational complexity, thus, are hardly suitable for running on mobile devices as part of the mobile document recognition system. The method presented in this paper solves a more specialized problem than the task of finding text on natural images. It uses local features, a sliding window and a lightweight neural network in order to achieve an optimal algorithm speed-precision ratio. The duration of the algorithm is 12 ms per field running on an ARM processor of a mobile device. The error rate for boundaries localization on a test sample of 8000 fields is 0.3

  5. Anticipatory coarticulation facilitates word recognition in toddlers.

    Science.gov (United States)

    Mahr, Tristan; McMillan, Brianna T M; Saffran, Jenny R; Ellis Weismer, Susan; Edwards, Jan

    2015-09-01

    Children learn from their environments and their caregivers. To capitalize on learning opportunities, young children have to recognize familiar words efficiently by integrating contextual cues across word boundaries. Previous research has shown that adults can use phonetic cues from anticipatory coarticulation during word recognition. We asked whether 18-24 month-olds (n=29) used coarticulatory cues on the word "the" when recognizing the following noun. We performed a looking-while-listening eyetracking experiment to examine word recognition in neutral vs. facilitating coarticulatory conditions. Participants looked to the target image significantly sooner when the determiner contained facilitating coarticulatory cues. These results provide the first evidence that novice word-learners can take advantage of anticipatory sub-phonemic cues during word recognition. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. A Presence-Based Context-Aware Chronic Stress Recognition System

    Directory of Open Access Journals (Sweden)

    Andrej Kos

    2012-11-01

    Full Text Available Stressors encountered in daily life may play an important role in personal well-being. Chronic stress can have a serious long-term impact on our physical as well as our psychological health, due to ongoing increased levels of the chemicals released in the ‘fight or flight’ response. The currently available stress assessment methods are usually not suitable for daily chronic stress measurement. The paper presents a context-aware chronic stress recognition system that addresses this problem. The proposed system obtains contextual data from various mobile sensors and other external sources in order to calculate the impact of ongoing stress. By identifying and visualizing ongoing stress situations of an individual user, he/she is able to modify his/her behavior in order to successfully avoid them. Clinical evaluation of the proposed methodology has been made in parallel by using electrodermal activity sensor. To the best of our knowledge, the system presented herein is the first one that enables recognition of chronic stress situations on the basis of user context.

  7. Man-system interface based on automatic speech recognition: integration to a virtual control desk

    Energy Technology Data Exchange (ETDEWEB)

    Jorge, Carlos Alexandre F.; Mol, Antonio Carlos A.; Pereira, Claudio M.N.A.; Aghina, Mauricio Alves C., E-mail: calexandre@ien.gov.b, E-mail: mol@ien.gov.b, E-mail: cmnap@ien.gov.b, E-mail: mag@ien.gov.b [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil); Nomiya, Diogo V., E-mail: diogonomiya@gmail.co [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil)

    2009-07-01

    This work reports the implementation of a man-system interface based on automatic speech recognition, and its integration to a virtual nuclear power plant control desk. The later is aimed to reproduce a real control desk using virtual reality technology, for operator training and ergonomic evaluation purpose. An automatic speech recognition system was developed to serve as a new interface with users, substituting computer keyboard and mouse. They can operate this virtual control desk in front of a computer monitor or a projection screen through spoken commands. The automatic speech recognition interface developed is based on a well-known signal processing technique named cepstral analysis, and on artificial neural networks. The speech recognition interface is described, along with its integration with the virtual control desk, and results are presented. (author)

  8. Man-system interface based on automatic speech recognition: integration to a virtual control desk

    International Nuclear Information System (INIS)

    Jorge, Carlos Alexandre F.; Mol, Antonio Carlos A.; Pereira, Claudio M.N.A.; Aghina, Mauricio Alves C.; Nomiya, Diogo V.

    2009-01-01

    This work reports the implementation of a man-system interface based on automatic speech recognition, and its integration to a virtual nuclear power plant control desk. The later is aimed to reproduce a real control desk using virtual reality technology, for operator training and ergonomic evaluation purpose. An automatic speech recognition system was developed to serve as a new interface with users, substituting computer keyboard and mouse. They can operate this virtual control desk in front of a computer monitor or a projection screen through spoken commands. The automatic speech recognition interface developed is based on a well-known signal processing technique named cepstral analysis, and on artificial neural networks. The speech recognition interface is described, along with its integration with the virtual control desk, and results are presented. (author)

  9. Fast and Low-Cost Mechatronic Recognition System for Persian Banknotes

    Directory of Open Access Journals (Sweden)

    Majid Behjat

    2014-03-01

    Full Text Available In this paper, we designed a fast and low-cost mechatronic system for recognition of eight current Persian banknotes in circulation. Firstly, we proposed a mechanical solution for avoiding extra processing time caused by detecting the place of banknote and paper angle correction in an input image. We also defined new parameters for feature extraction, including colour features (RGBR values, size features (LWR and texture features (CRLVR value. Then, we used a Multi-Layer Perceptron (MLP neural network in the recognition phase to reduce the necessary processing time. In this research, we collected a perfect database of Persian banknote images (about 4000 double-sided prevalent images. We reached about 99.06% accuracy (average for each side in final banknote recognition by testing 800 different worn, torn and new banknotes which were not part of the initial learning phase. This accuracy could increase to 99.62% in double-sided decision mode. Finally, we designed an ATmega32 microcontroller-based hardware with 16MHz clock frequency for implementation of our proposed system which can recognize sample banknotes at about 480ms and 560ms for single-sided detection and double-sided detection respectively, after image scanning.

  10. Invariant Face recognition Using Infrared Images

    International Nuclear Information System (INIS)

    Zahran, E.G.

    2012-01-01

    Over the past few decades, face recognition has become a rapidly growing research topic due to the increasing demands in many applications of our daily life such as airport surveillance, personal identification in law enforcement, surveillance systems, information safety, securing financial transactions, and computer security. The objective of this thesis is to develop a face recognition system capable of recognizing persons with a high recognition capability, low processing time, and under different illumination conditions, and different facial expressions. The thesis presents a study for the performance of the face recognition system using two techniques; the Principal Component Analysis (PCA), and the Zernike Moments (ZM). The performance of the recognition system is evaluated according to several aspects including the recognition rate, and the processing time. Face recognition systems that use visual images are sensitive to variations in the lighting conditions and facial expressions. The performance of these systems may be degraded under poor illumination conditions or for subjects of various skin colors. Several solutions have been proposed to overcome these limitations. One of these solutions is to work in the Infrared (IR) spectrum. IR images have been suggested as an alternative source of information for detection and recognition of faces, when there is little or no control over lighting conditions. This arises from the fact that these images are formed due to thermal emissions from skin, which is an intrinsic property because these emissions depend on the distribution of blood vessels under the skin. On the other hand IR face recognition systems still have limitations with temperature variations and recognition of persons wearing eye glasses. In this thesis we will fuse IR images with visible images to enhance the performance of face recognition systems. Images are fused using the wavelet transform. Simulation results show that the fusion of visible and

  11. Sudden Event Recognition: A Survey

    Directory of Open Access Journals (Sweden)

    Mohd Asyraf Zulkifley

    2013-08-01

    Full Text Available Event recognition is one of the most active research areas in video surveillance fields. Advancement in event recognition systems mainly aims to provide convenience, safety and an efficient lifestyle for humanity. A precise, accurate and robust approach is necessary to enable event recognition systems to respond to sudden changes in various uncontrolled environments, such as the case of an emergency, physical threat and a fire or bomb alert. The performance of sudden event recognition systems depends heavily on the accuracy of low level processing, like detection, recognition, tracking and machine learning algorithms. This survey aims to detect and characterize a sudden event, which is a subset of an abnormal event in several video surveillance applications. This paper discusses the following in detail: (1 the importance of a sudden event over a general anomalous event; (2 frameworks used in sudden event recognition; (3 the requirements and comparative studies of a sudden event recognition system and (4 various decision-making approaches for sudden event recognition. The advantages and drawbacks of using 3D images from multiple cameras for real-time application are also discussed. The paper concludes with suggestions for future research directions in sudden event recognition.

  12. 42 CFR 403.322 - Termination of agreements for Medicare recognition of State systems.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Termination of agreements for Medicare recognition of State systems. 403.322 Section 403.322 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS SPECIAL PROGRAMS AND PROJECTS Recognition of State...

  13. Source Separation via Spectral Masking for Speech Recognition Systems

    Directory of Open Access Journals (Sweden)

    Gustavo Fernandes Rodrigues

    2012-12-01

    Full Text Available In this paper we present an insight into the use of spectral masking techniques in time-frequency domain, as a preprocessing step for the speech signal recognition. Speech recognition systems have their performance negatively affected in noisy environments or in the presence of other speech signals. The limits of these masking techniques for different levels of the signal-to-noise ratio are discussed. We show the robustness of the spectral masking techniques against four types of noise: white, pink, brown and human speech noise (bubble noise. The main contribution of this work is to analyze the performance limits of recognition systems  using spectral masking. We obtain an increase of 18% on the speech hit rate, when the speech signals were corrupted by other speech signals or bubble noise, with different signal-to-noise ratio of approximately 1, 10 and 20 dB. On the other hand, applying the ideal binary masks to mixtures corrupted by white, pink and brown noise, results an average growth of 9% on the speech hit rate, with the same different signal-to-noise ratio. The experimental results suggest that the masking spectral techniques are more suitable for the case when it is applied a bubble noise, which is produced by human speech, than for the case of applying white, pink and brown noise.

  14. An Evolutionary Approach to Driving Tendency Recognition for Advanced Driver Assistance Systems

    Directory of Open Access Journals (Sweden)

    Lee Jong-Hyun

    2016-01-01

    Full Text Available Driving tendency recognition is important for constructing Advanced Driver Assistance Systems (ADAS. However, it had not been a lot of research using vehicle sensing data, due to the high difficulty to define it. In this paper, we attempt to improve the learning capability of a machine learning method using evolutionary computation. We propose a driving tendency recognition method, with consideration of data characteristics. Comparison of our classification system with conventional methods demonstrated the effectiveness and accuracy over 92% in our system. Our proposed evolutionary approach is confirmed that improve the classification accuracy of the learning method through evolution in the experiment.

  15. A question of fit: reflections on boundaries, organizations and social-ecological systems.

    Science.gov (United States)

    Sternlieb, Faith; Bixler, R Patrick; Huber-Stearns, Heidi; Huayhuaca, Ch'aska

    2013-11-30

    Although there is acknowledgment that the complexity of social-ecological systems governance demands representation from diverse perspectives, there is little agreement in the literature on how to cross both fiat (human-demarcated) and bona fide (physical) boundaries to address such complexities. As a cohort of interdisciplinary scholars, we navigate the boundary between science and practice to address the question of fit regarding the role of organizations in transcending boundaries. We found there is a need to rectify discrepancies between theories about boundaries and theories about organizations. To this end, we propose a conceptual framework to analyze transboundary organizations, an umbrella term to group the literature on boundary organizations, intermediaries and bridging organizations; we introduce this term to illustrate they are not mutually exclusive and to facilitate interdisciplinary research. We first examine social-ecological systems (SES), a framework intended to improve understandings of boundaries and governance. We then continue to unpack the complexity of boundaries and organizations, specifically through important transboundary concepts such as scale and organizational learning. This helps frame our examination of the literature on: 1) boundary organizations; 2) bridging organizations (third-party entities); and 3) intermediaries (distinguished by their position between other actors). Our review identifies a number of discrepancies that pertain to the types of boundaries discussed and the roles assigned to organizations governing SES. Important characteristics have emerged from our review of transboundary organizations including legitimacy, saliency, urgency, and credibility. In developing a conceptual framework, we argue that transboundary organizations: 1) expand upon the boundary spectrum, 2) incorporate transboundary concepts, and 3) hybridize characteristics of boundary, bridging, and intermediary organizations. We conclude with a number

  16. Face Detection and Recognition

    National Research Council Canada - National Science Library

    Jain, Anil K

    2004-01-01

    This report describes research efforts towards developing algorithms for a robust face recognition system to overcome many of the limitations found in existing two-dimensional facial recognition systems...

  17. Agriculture production as a major driver of the Earth system exceeding planetary boundaries

    Directory of Open Access Journals (Sweden)

    Bruce M. Campbell

    2017-12-01

    Full Text Available We explore the role of agriculture in destabilizing the Earth system at the planetary scale, through examining nine planetary boundaries, or "safe limits": land-system change, freshwater use, biogeochemical flows, biosphere integrity, climate change, ocean acidification, stratospheric ozone depletion, atmospheric aerosol loading, and introduction of novel entities. Two planetary boundaries have been fully transgressed, i.e., are at high risk, biosphere integrity and biogeochemical flows, and agriculture has been the major driver of the transgression. Three are in a zone of uncertainty i.e., at increasing risk, with agriculture the major driver of two of those, land-system change and freshwater use, and a significant contributor to the third, climate change. Agriculture is also a significant or major contributor to change for many of those planetary boundaries still in the safe zone. To reduce the role of agriculture in transgressing planetary boundaries, many interventions will be needed, including those in broader food systems.

  18. Auditory signal design for automatic number plate recognition system

    NARCIS (Netherlands)

    Heydra, C.G.; Jansen, R.J.; Van Egmond, R.

    2014-01-01

    This paper focuses on the design of an auditory signal for the Automatic Number Plate Recognition system of Dutch national police. The auditory signal is designed to alert police officers of suspicious cars in their proximity, communicating priority level and location of the suspicious car and

  19. Object Recognition System-on-Chip Using the Support Vector Machines

    Directory of Open Access Journals (Sweden)

    Houzet Dominique

    2005-01-01

    Full Text Available The first aim of this work is to propose the design of a system-on-chip (SoC platform dedicated to digital image and signal processing, which is tuned to implement efficiently multiply-and-accumulate (MAC vector/matrix operations. The second aim of this work is to implement a recent promising neural network method, namely, the support vector machine (SVM used for real-time object recognition, in order to build a vision machine. With such a reconfigurable and programmable SoC platform, it is possible to implement any SVM function dedicated to any object recognition problem. The final aim is to obtain an automatic reconfiguration of the SoC platform, based on the results of the learning phase on an objects' database, which makes it possible to recognize practically any object without manual programming. Recognition can be of any kind that is from image to signal data. Such a system is a general-purpose automatic classifier. Many applications can be considered as a classification problem, but are usually treated specifically in order to optimize the cost of the implemented solution. The cost of our approach is more important than a dedicated one, but in a near future, hundreds of millions of gates will be common and affordable compared to the design cost. What we are proposing here is a general-purpose classification neural network implemented on a reconfigurable SoC platform. The first version presented here is limited in size and thus in object recognition performances, but can be easily upgraded according to technology improvements.

  20. Mechanism for boundary crises in quasiperiodically forced period-doubling systems

    International Nuclear Information System (INIS)

    Kim, Sang-Yoon; Lim, Woochang

    2005-01-01

    We investigate the mechanism for boundary crises in the quasiperiodically forced logistic map which is a representative model for quasiperiodically forced period-doubling systems. For small quasiperiodic forcing ε, a chaotic attractor disappears suddenly via a 'standard' boundary crisis when it collides with the smooth unstable torus. However, when passing a threshold value of ε, a basin boundary metamorphosis occurs, and then the smooth unstable torus is no longer accessible from the interior of the basin of the attractor. For this case, using the rational approximations to the quasiperiodic forcing, it is shown that a nonchaotic attractor (smooth torus or strange nonchaotic attractor) as well as a chaotic attractor is destroyed abruptly through a new type of boundary crisis when it collides with an invariant 'ring-shaped' unstable set which has no counterpart in the unforced case

  1. Mechanism for boundary crises in quasiperiodically forced period-doubling systems

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sang-Yoon [Department of Physics, Kangwon National University, Chunchon, Kangwon-Do 200-701 (Korea, Republic of)]. E-mail: sykim@kangwon.ac.kr; Lim, Woochang [Department of Physics, Kangwon National University, Chunchon, Kangwon-Do 200-701 (Korea, Republic of)]. E-mail: wclim@kwnu.kangwon.ac.kr

    2005-01-10

    We investigate the mechanism for boundary crises in the quasiperiodically forced logistic map which is a representative model for quasiperiodically forced period-doubling systems. For small quasiperiodic forcing {epsilon}, a chaotic attractor disappears suddenly via a 'standard' boundary crisis when it collides with the smooth unstable torus. However, when passing a threshold value of {epsilon}, a basin boundary metamorphosis occurs, and then the smooth unstable torus is no longer accessible from the interior of the basin of the attractor. For this case, using the rational approximations to the quasiperiodic forcing, it is shown that a nonchaotic attractor (smooth torus or strange nonchaotic attractor) as well as a chaotic attractor is destroyed abruptly through a new type of boundary crisis when it collides with an invariant 'ring-shaped' unstable set which has no counterpart in the unforced case.

  2. Speech Recognition

    Directory of Open Access Journals (Sweden)

    Adrian Morariu

    2009-01-01

    Full Text Available This paper presents a method of speech recognition by pattern recognition techniques. Learning consists in determining the unique characteristics of a word (cepstral coefficients by eliminating those characteristics that are different from one word to another. For learning and recognition, the system will build a dictionary of words by determining the characteristics of each word to be used in the recognition. Determining the characteristics of an audio signal consists in the following steps: noise removal, sampling it, applying Hamming window, switching to frequency domain through Fourier transform, calculating the magnitude spectrum, filtering data, determining cepstral coefficients.

  3. New methods in iris recognition.

    Science.gov (United States)

    Daugman, John

    2007-10-01

    This paper presents the following four advances in iris recognition: 1) more disciplined methods for detecting and faithfully modeling the iris inner and outer boundaries with active contours, leading to more flexible embedded coordinate systems; 2) Fourier-based methods for solving problems in iris trigonometry and projective geometry, allowing off-axis gaze to be handled by detecting it and "rotating" the eye into orthographic perspective; 3) statistical inference methods for detecting and excluding eyelashes; and 4) exploration of score normalizations, depending on the amount of iris data that is available in images and the required scale of database search. Statistical results are presented based on 200 billion iris cross-comparisons that were generated from 632500 irises in the United Arab Emirates database to analyze the normalization issues raised in different regions of receiver operating characteristic curves.

  4. Involvement of the intrinsic/default system in movement-related self recognition.

    Science.gov (United States)

    Salomon, Roy; Malach, Rafael; Lamy, Dominique

    2009-10-21

    The question of how people recognize themselves and separate themselves from the environment and others has long intrigued philosophers and scientists. Recent findings have linked regions of the 'default brain' or 'intrinsic system' to self-related processing. We used a paradigm in which subjects had to rely on subtle sensory-motor synchronization differences to determine whether a viewed movement belonged to them or to another person, while stimuli and task demands associated with the "responded self" and "responded other" conditions were precisely matched. Self recognition was associated with enhanced brain activity in several ROIs of the intrinsic system, whereas no differences emerged within the extrinsic system. This self-related effect was found even in cases where the sensory-motor aspects were precisely matched. Control conditions ruled out task difficulty as the source of the differential self-related effects. The findings shed light on the neural systems underlying bodily self recognition.

  5. Bayesian Statistics and Uncertainty Quantification for Safety Boundary Analysis in Complex Systems

    Science.gov (United States)

    He, Yuning; Davies, Misty Dawn

    2014-01-01

    The analysis of a safety-critical system often requires detailed knowledge of safe regions and their highdimensional non-linear boundaries. We present a statistical approach to iteratively detect and characterize the boundaries, which are provided as parameterized shape candidates. Using methods from uncertainty quantification and active learning, we incrementally construct a statistical model from only few simulation runs and obtain statistically sound estimates of the shape parameters for safety boundaries.

  6. A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition

    Directory of Open Access Journals (Sweden)

    Shahram Najam

    2018-01-01

    Full Text Available A novel hybrid design based electronic voting system is proposed, implemented and analyzed. The proposed system uses two voter verification techniques to give better results in comparison to single identification based systems. Finger print and facial recognition based methods are used for voter identification. Cross verification of a voter during an election process provides better accuracy than single parameter identification method. The facial recognition system uses Viola-Jones algorithm along with rectangular Haar feature selection method for detection and extraction of features to develop a biometric template and for feature extraction during the voting process. Cascaded machine learning based classifiers are used for comparing the features for identity verification using GPCA (Generalized Principle Component Analysis and K-NN (K-Nearest Neighbor. It is accomplished through comparing the Eigen-vectors of the extracted features with the biometric template pre-stored in the election regulatory body database. The results of the proposed system show that the proposed cascaded design based system performs better than the systems using other classifiers or separate schemes i.e. facial or finger print based schemes. The proposed system will be highly useful for real time applications due to the reason that it has 91% accuracy under nominal light in terms of facial recognition.

  7. Boundary Spanning in Offshored Information Systems Development Projects

    Science.gov (United States)

    Krishnan, Poornima

    2010-01-01

    Recent growth in offshore outsourcing of information systems (IS) services is accompanied by managing the offshore projects successfully. Much of the project failures can be attributed to geographic and organizational boundaries which create differences in culture, language, work patterns, and decision making processes among the offshore project…

  8. On the stability of boundary layers in gas mantle systems

    International Nuclear Information System (INIS)

    Ohlsson, D.

    1978-10-01

    In this thesis a systematic investigation of the stability properties of the partially ionized boundary regions of gas mantle systems for a large class of dissipative magneto-hydrodynamic modes is presented. In the partially ionized boundary regions of gas mantle systems several strong stabilizing mechanisms arise due to coupling between various dissipative effects in certain parameter regions. The presence of neutral gas strongly enhances the stabilizing effects in a dual fashion. First in an indirect way by cooling the edge region and second in a direct way by enhancing viscous and heat conduction effects. It has, however, to be pointed out that exceptions from this general picture may be found. The stabilizing influence of neutral gas on a large class of electrostatic as well as electromagnetic modes in the boundary regions of gas blanket systems is contrary to what has been found in low density weakly ionized plasmas. In these latter cases presence of neutral gas has even been found to be responsible for the onset of entirely new classes of instabilities. Thus there is no universal stabilizing or destabilizing effect associated with plasma-neutral gas interaction effects. (author)

  9. Introduction and Overview of the Vicens-Reddy Speech Recognition System.

    Science.gov (United States)

    Kameny, Iris; Ritea, H.

    The Vicens-Reddy System is unique in the sense that it approaches the problem of speech recognition as a whole, rather than treating particular aspects of the problems as in previous attempts. For example, where earlier systems treated only segmentation of speech into phoneme groups, or detected phonemes in a given context, the Vicens-Reddy System…

  10. Interactions of the humoral pattern recognition molecule PTX3 with the complement system

    DEFF Research Database (Denmark)

    Doni, Andrea; Garlanda, Cecilia; Bottazzi, Barbara

    2012-01-01

    The innate immune system comprises a cellular and a humoral arm. The long pentraxin PTX3 is a fluid phase pattern recognition molecule, which acts as an essential component of the humoral arm of innate immunity. PTX3 has antibody-like properties including interactions with complement components....... PTX3 interacts with C1q, ficolin-1 and ficolin-2 as well as mannose-binding lectin, recognition molecules in the classical and lectin complement pathways. The formation of these heterocomplexes results in cooperative pathogen recognition and complement activation. Interactions with C4b binding protein...

  11. ISOLATED SPEECH RECOGNITION SYSTEM FOR TAMIL LANGUAGE USING STATISTICAL PATTERN MATCHING AND MACHINE LEARNING TECHNIQUES

    Directory of Open Access Journals (Sweden)

    VIMALA C.

    2015-05-01

    Full Text Available In recent years, speech technology has become a vital part of our daily lives. Various techniques have been proposed for developing Automatic Speech Recognition (ASR system and have achieved great success in many applications. Among them, Template Matching techniques like Dynamic Time Warping (DTW, Statistical Pattern Matching techniques such as Hidden Markov Model (HMM and Gaussian Mixture Models (GMM, Machine Learning techniques such as Neural Networks (NN, Support Vector Machine (SVM, and Decision Trees (DT are most popular. The main objective of this paper is to design and develop a speaker-independent isolated speech recognition system for Tamil language using the above speech recognition techniques. The background of ASR system, the steps involved in ASR, merits and demerits of the conventional and machine learning algorithms and the observations made based on the experiments are presented in this paper. For the above developed system, highest word recognition accuracy is achieved with HMM technique. It offered 100% accuracy during training process and 97.92% for testing process.

  12. The Extraction of Road Boundary from Crowdsourcing Trajectory Using Constrained Delaunay Triangulation

    Directory of Open Access Journals (Sweden)

    YANG Wei

    2017-02-01

    Full Text Available Extraction of road boundary accurately from crowdsourcing trajectory lines is still a hard work.Therefore,this study presented a new approach to use vehicle trajectory lines to extract road boundary.Firstly, constructing constrained Delaunay triangulation within interpolated track lines to calculate road boundary descriptors using triangle edge length and Voronoi cell.Road boundary recognition model was established by integrating the two boundary descriptors.Then,based on seed polygons,a regional growing method was proposed to extract road boundary. Finally, taxi GPS traces in Beijing were used to verify the validity of the novel method, and the results also showed that our method was suitable for GPS traces with disparity density,complex road structure and different time interval.

  13. Iris Recognition for Partially Occluded Images: Methodology and Sensitivity Analysis

    Directory of Open Access Journals (Sweden)

    Poursaberi A

    2007-01-01

    Full Text Available Accurate iris detection is a crucial part of an iris recognition system. One of the main issues in iris segmentation is coping with occlusion that happens due to eyelids and eyelashes. In the literature, some various methods have been suggested to solve the occlusion problem. In this paper, two different segmentations of iris are presented. In the first algorithm, a circle is located around the pupil with an appropriate diameter. The iris area encircled by the circular boundary is used for recognition purposes then. In the second method, again a circle is located around the pupil with a larger diameter. This time, however, only the lower part of the encircled iris area is utilized for individual recognition. Wavelet-based texture features are used in the process. Hamming and harmonic mean distance classifiers are exploited as a mixed classifier in suggested algorithm. It is observed that relying on a smaller but more reliable part of the iris, though reducing the net amount of information, improves the overall performance. Experimental results on CASIA database show that our method has a promising performance with an accuracy of 99.31%. The sensitivity of the proposed method is analyzed versus contrast, illumination, and noise as well, where lower sensitivity to all factors is observed when the lower half of the iris is used for recognition.

  14. Pattern-recognition software detecting the onset of failures in complex systems

    International Nuclear Information System (INIS)

    Mott, J.; King, R.

    1987-01-01

    A very general mathematical framework for embodying learned data from a complex system and combining it with a current observation to estimate the true current state of the system has been implemented using nearly universal pattern-recognition algorithms and applied to surveillance of the EBR-II power plant. In this application the methodology can provide signal validation and replacement of faulty signals on a near-real-time basis for hundreds of plant parameters. The mathematical framework, the pattern-recognition algorithms, examples of the learning and estimating process, and plant operating decisions made using this methodology are discussed. The entire methodology has been reduced to a set of FORTRAN subroutines which are small, fast, robust and executable on a personal computer with a serial link to the system's data acquisition computer, or on the data acquisition computer itself

  15. Two-step calibration method for multi-algorithm score-based face recognition systems by minimizing discrimination loss

    NARCIS (Netherlands)

    Susyanto, N.; Veldhuis, R.N.J.; Spreeuwers, L.J.; Klaassen, C.A.J.; Fierrez, J.; Li, S.Z.; Ross, A.; Veldhuis, R.; Alonso-Fernandez, F.; Bigun, J.

    2016-01-01

    We propose a new method for combining multi-algorithm score-based face recognition systems, which we call the two-step calibration method. Typically, algorithms for face recognition systems produce dependent scores. The two-step method is based on parametric copulas to handle this dependence. Its

  16. Design and implementation of face recognition system based on Windows

    Science.gov (United States)

    Zhang, Min; Liu, Ting; Li, Ailan

    2015-07-01

    In view of the basic Windows login password input way lacking of safety and convenient operation, we will introduce the biometrics technology, face recognition, into the computer to login system. Not only can it encrypt the computer system, also according to the level to identify administrators at all levels. With the enhancement of the system security, user input can neither be a cumbersome nor worry about being stolen password confidential.

  17. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    Science.gov (United States)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  18. Numerical solution of system of boundary value problems using B-spline with free parameter

    Science.gov (United States)

    Gupta, Yogesh

    2017-01-01

    This paper deals with method of B-spline solution for a system of boundary value problems. The differential equations are useful in various fields of science and engineering. Some interesting real life problems involve more than one unknown function. These result in system of simultaneous differential equations. Such systems have been applied to many problems in mathematics, physics, engineering etc. In present paper, B-spline and B-spline with free parameter methods for the solution of a linear system of second-order boundary value problems are presented. The methods utilize the values of cubic B-spline and its derivatives at nodal points together with the equations of the given system and boundary conditions, ensuing into the linear matrix equation.

  19. New pattern recognition system in the e-nose for Chinese spirit identification

    International Nuclear Information System (INIS)

    Zeng Hui; Li Qiang; Gu Yu

    2016-01-01

    This paper presents a new pattern recognition system for Chinese spirit identification by using the polymer quartz piezoelectric crystal sensor based e-nose. The sensors are designed based on quartz crystal microbalance (QCM) principle, and they could capture different vibration frequency signal values for Chinese spirit identification. For each sensor in an 8-channel sensor array, seven characteristic values of the original vibration frequency signal values, i.e., average value (A), root-mean-square value (RMS), shape factor value (S f ), crest factor value (C f ), impulse factor value (I f ), clearance factor value (CL f ), kurtosis factor value (K v ) are first extracted. Then the dimension of the characteristic values is reduced by the principle components analysis (PCA) method. Finally the back propagation (BP) neutral network algorithm is used to recognize Chinese spirits. The experimental results show that the recognition rate of six kinds of Chinese spirits is 93.33% and our proposed new pattern recognition system can identify Chinese spirits effectively. (paper)

  20. Improving a HMM-based off-line handwriting recognition system using MME-PSO optimization

    Science.gov (United States)

    Hamdani, Mahdi; El Abed, Haikal; Hamdani, Tarek M.; Märgner, Volker; Alimi, Adel M.

    2011-01-01

    One of the trivial steps in the development of a classifier is the design of its architecture. This paper presents a new algorithm, Multi Models Evolvement (MME) using Particle Swarm Optimization (PSO). This algorithm is a modified version of the basic PSO, which is used to the unsupervised design of Hidden Markov Model (HMM) based architectures. For instance, the proposed algorithm is applied to an Arabic handwriting recognizer based on discrete probability HMMs. After the optimization of their architectures, HMMs are trained with the Baum- Welch algorithm. The validation of the system is based on the IfN/ENIT database. The performance of the developed approach is compared to the participating systems at the 2005 competition organized on Arabic handwriting recognition on the International Conference on Document Analysis and Recognition (ICDAR). The final system is a combination between an optimized HMM with 6 other HMMs obtained by a simple variation of the number of states. An absolute improvement of 6% of word recognition rate with about 81% is presented. This improvement is achieved comparing to the basic system (ARAB-IfN). The proposed recognizer outperforms also most of the known state-of-the-art systems.

  1. A Human Activity Recognition System Using Skeleton Data from RGBD Sensors.

    Science.gov (United States)

    Cippitelli, Enea; Gasparrini, Samuele; Gambi, Ennio; Spinsante, Susanna

    2016-01-01

    The aim of Active and Assisted Living is to develop tools to promote the ageing in place of elderly people, and human activity recognition algorithms can help to monitor aged people in home environments. Different types of sensors can be used to address this task and the RGBD sensors, especially the ones used for gaming, are cost-effective and provide much information about the environment. This work aims to propose an activity recognition algorithm exploiting skeleton data extracted by RGBD sensors. The system is based on the extraction of key poses to compose a feature vector, and a multiclass Support Vector Machine to perform classification. Computation and association of key poses are carried out using a clustering algorithm, without the need of a learning algorithm. The proposed approach is evaluated on five publicly available datasets for activity recognition, showing promising results especially when applied for the recognition of AAL related actions. Finally, the current applicability of this solution in AAL scenarios and the future improvements needed are discussed.

  2. A Human Activity Recognition System Using Skeleton Data from RGBD Sensors

    Directory of Open Access Journals (Sweden)

    Enea Cippitelli

    2016-01-01

    Full Text Available The aim of Active and Assisted Living is to develop tools to promote the ageing in place of elderly people, and human activity recognition algorithms can help to monitor aged people in home environments. Different types of sensors can be used to address this task and the RGBD sensors, especially the ones used for gaming, are cost-effective and provide much information about the environment. This work aims to propose an activity recognition algorithm exploiting skeleton data extracted by RGBD sensors. The system is based on the extraction of key poses to compose a feature vector, and a multiclass Support Vector Machine to perform classification. Computation and association of key poses are carried out using a clustering algorithm, without the need of a learning algorithm. The proposed approach is evaluated on five publicly available datasets for activity recognition, showing promising results especially when applied for the recognition of AAL related actions. Finally, the current applicability of this solution in AAL scenarios and the future improvements needed are discussed.

  3. Development of Portable Automatic Number Plate Recognition System on Android Mobile Phone

    Science.gov (United States)

    Mutholib, Abdul; Gunawan, Teddy S.; Chebil, Jalel; Kartiwi, Mira

    2013-12-01

    The Automatic Number Plate Recognition (ANPR) System has performed as the main role in various access control and security, such as: tracking of stolen vehicles, traffic violations (speed trap) and parking management system. In this paper, the portable ANPR implemented on android mobile phone is presented. The main challenges in mobile application are including higher coding efficiency, reduced computational complexity, and improved flexibility. Significance efforts are being explored to find suitable and adaptive algorithm for implementation of ANPR on mobile phone. ANPR system for mobile phone need to be optimize due to its limited CPU and memory resources, its ability for geo-tagging image captured using GPS coordinates and its ability to access online database to store the vehicle's information. In this paper, the design of portable ANPR on android mobile phone will be described as follows. First, the graphical user interface (GUI) for capturing image using built-in camera was developed to acquire vehicle plate number in Malaysia. Second, the preprocessing of raw image was done using contrast enhancement. Next, character segmentation using fixed pitch and an optical character recognition (OCR) using neural network were utilized to extract texts and numbers. Both character segmentation and OCR were using Tesseract library from Google Inc. The proposed portable ANPR algorithm was implemented and simulated using Android SDK on a computer. Based on the experimental results, the proposed system can effectively recognize the license plate number at 90.86%. The required processing time to recognize a license plate is only 2 seconds on average. The result is consider good in comparison with the results obtained from previous system that was processed in a desktop PC with the range of result from 91.59% to 98% recognition rate and 0.284 second to 1.5 seconds recognition time.

  4. Military personnel recognition system using texture, colour, and SURF features

    Science.gov (United States)

    Irhebhude, Martins E.; Edirisinghe, Eran A.

    2014-06-01

    This paper presents an automatic, machine vision based, military personnel identification and classification system. Classification is done using a Support Vector Machine (SVM) on sets of Army, Air Force and Navy camouflage uniform personnel datasets. In the proposed system, the arm of service of personnel is recognised by the camouflage of a persons uniform, type of cap and the type of badge/logo. The detailed analysis done include; camouflage cap and plain cap differentiation using gray level co-occurrence matrix (GLCM) texture feature; classification on Army, Air Force and Navy camouflaged uniforms using GLCM texture and colour histogram bin features; plain cap badge classification into Army, Air Force and Navy using Speed Up Robust Feature (SURF). The proposed method recognised camouflage personnel arm of service on sets of data retrieved from google images and selected military websites. Correlation-based Feature Selection (CFS) was used to improve recognition and reduce dimensionality, thereby speeding the classification process. With this method success rates recorded during the analysis include 93.8% for camouflage appearance category, 100%, 90% and 100% rates of plain cap and camouflage cap categories for Army, Air Force and Navy categories, respectively. Accurate recognition was recorded using SURF for the plain cap badge category. Substantial analysis has been carried out and results prove that the proposed method can correctly classify military personnel into various arms of service. We show that the proposed method can be integrated into a face recognition system, which will recognise personnel in addition to determining the arm of service which the personnel belong. Such a system can be used to enhance the security of a military base or facility.

  5. System for automatic crate recognition

    Directory of Open Access Journals (Sweden)

    Radovan Kukla

    2012-01-01

    Full Text Available This contribution describes usage of computer vision and artificial intelligence methods for application. The method solves abuse of reverse vending machine. This topic has been solved as innovation voucher for the South Moravian Region. It was developed by Mendel university in Brno (Department of informatics – Faculty of Business and Economics and Department of Agricultural, Food and Environmental Engineering – Faculty of Agronomy together with the Czech subsidiary of Tomra. The project is focused on a possibility of integration industrial cameras and computers to process recognition of crates in the verse vending machine. The aim was the effective security system that will be able to save hundreds-thousands financial loss. As suitable development and runtime platform there was chosen product ControlWeb and VisionLab developed by Moravian Instruments Inc.

  6. Automatic micropropagation of plants--the vision-system: graph rewriting as pattern recognition

    Science.gov (United States)

    Schwanke, Joerg; Megnet, Roland; Jensch, Peter F.

    1993-03-01

    The automation of plant-micropropagation is necessary to produce high amounts of biomass. Plants have to be dissected on particular cutting-points. A vision-system is needed for the recognition of the cutting-points on the plants. With this background, this contribution is directed to the underlying formalism to determine cutting-points on abstract-plant models. We show the usefulness of pattern recognition by graph-rewriting along with some examples in this context.

  7. Social context predicts recognition systems in ant queens

    DEFF Research Database (Denmark)

    Dreier, Stéphanie Agnès Jeanine; d'Ettorre, Patrizia

    2009-01-01

    Recognition of group-members is a key feature of sociality. Ants use chemical communication to discriminate nestmates from intruders, enhancing kin cooperation and preventing parasitism. The recognition code is embedded in their cuticular chemical profile, which typically varies between colonies....... We predicted that ants might be capable of accurate recognition in unusual situations when few individuals interact repeatedly, as new colonies started by two to three queens. Individual recognition would be favoured by selection when queens establish dominance hierarchies, because repeated fights...... for dominance are costly; but it would not evolve in absence of hierarchies. We previously showed that Pachycondyla co-founding queens, which form dominance hierarchies, have accurate individual recognition based on chemical cues. Here, we used the ant Lasius niger to test the null hypothesis that individual...

  8. Multimodal Biometric System Based on the Recognition of Face and Both Irises

    Directory of Open Access Journals (Sweden)

    Yeong Gon Kim

    2012-09-01

    Full Text Available The performance of unimodal biometric systems (based on a single modality such as face or fingerprint has to contend with various problems, such as illumination variation, skin condition and environmental conditions, and device variations. Therefore, multimodal biometric systems have been used to overcome the limitations of unimodal biometrics and provide high accuracy recognition. In this paper, we propose a new multimodal biometric system based on score level fusion of face and both irises' recognition. Our study has the following novel features. First, the device proposed acquires images of the face and both irises simultaneously. The proposed device consists of a face camera, two iris cameras, near-infrared illuminators and cold mirrors. Second, fast and accurate iris detection is based on two circular edge detections, which are accomplished in the iris image on the basis of the size of the iris detected in the face image. Third, the combined accuracy is enhanced by combining each score for the face and both irises using a support vector machine. The experimental results show that the equal error rate for the proposed method is 0.131%, which is lower than that of face or iris recognition and other fusion methods.

  9. Neuro System Structure for Vehicle Recognition and Count in Floating Bridge Specific Conditions

    Directory of Open Access Journals (Sweden)

    Slobodan Beroš

    2012-10-01

    Full Text Available The paper presents the research of the sophisticated vehiclerecognition and count system based on the application of theneural network. The basic elements of neural network andadaptive logic network for object recognition are discussed. Theadaptive logic network solution ability based on simple digitalcircuits as crucial in real-time applications is pointed out. Thesimulation based on the use of reduced high level noise pictureand a tree 2. 7. software have shown excellent results. The consideredand simulated adaptive neural network based systemwith its good recognition and convergence is a useful real-timesolution for vehicle recognition and count in the floating bridgesevere conditions.

  10. Multi-font printed Mongolian document recognition system

    Science.gov (United States)

    Peng, Liangrui; Liu, Changsong; Ding, Xiaoqing; Wang, Hua; Jin, Jianming

    2009-01-01

    Mongolian is one of the major ethnic languages in China. Large amount of Mongolian printed documents need to be digitized in digital library and various applications. Traditional Mongolian script has unique writing style and multi-font-type variations, which bring challenges to Mongolian OCR research. As traditional Mongolian script has some characteristics, for example, one character may be part of another character, we define the character set for recognition according to the segmented components, and the components are combined into characters by rule-based post-processing module. For character recognition, a method based on visual directional feature and multi-level classifiers is presented. For character segmentation, a scheme is used to find the segmentation point by analyzing the properties of projection and connected components. As Mongolian has different font-types which are categorized into two major groups, the parameter of segmentation is adjusted for each group. A font-type classification method for the two font-type group is introduced. For recognition of Mongolian text mixed with Chinese and English, language identification and relevant character recognition kernels are integrated. Experiments show that the presented methods are effective. The text recognition rate is 96.9% on the test samples from practical documents with multi-font-types and mixed scripts.

  11. Automatic Speech Recognition Systems for the Evaluation of Voice and Speech Disorders in Head and Neck Cancer

    Directory of Open Access Journals (Sweden)

    Andreas Maier

    2010-01-01

    Full Text Available In patients suffering from head and neck cancer, speech intelligibility is often restricted. For assessment and outcome measurements, automatic speech recognition systems have previously been shown to be appropriate for objective and quick evaluation of intelligibility. In this study we investigate the applicability of the method to speech disorders caused by head and neck cancer. Intelligibility was quantified by speech recognition on recordings of a standard text read by 41 German laryngectomized patients with cancer of the larynx or hypopharynx and 49 German patients who had suffered from oral cancer. The speech recognition provides the percentage of correctly recognized words of a sequence, that is, the word recognition rate. Automatic evaluation was compared to perceptual ratings by a panel of experts and to an age-matched control group. Both patient groups showed significantly lower word recognition rates than the control group. Automatic speech recognition yielded word recognition rates which complied with experts' evaluation of intelligibility on a significant level. Automatic speech recognition serves as a good means with low effort to objectify and quantify the most important aspect of pathologic speech—the intelligibility. The system was successfully applied to voice and speech disorders.

  12. Edge detection techniques for iris recognition system

    International Nuclear Information System (INIS)

    Tania, U T; Motakabber, S M A; Ibrahimy, M I

    2013-01-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate

  13. Stress reaction process-based hierarchical recognition algorithm for continuous intrusion events in optical fiber prewarning system

    Science.gov (United States)

    Qu, Hongquan; Yuan, Shijiao; Wang, Yanping; Yang, Dan

    2018-04-01

    To improve the recognition performance of optical fiber prewarning system (OFPS), this study proposed a hierarchical recognition algorithm (HRA). Compared with traditional methods, which employ only a complex algorithm that includes multiple extracted features and complex classifiers to increase the recognition rate with a considerable decrease in recognition speed, HRA takes advantage of the continuity of intrusion events, thereby creating a staged recognition flow inspired by stress reaction. HRA is expected to achieve high-level recognition accuracy with less time consumption. First, this work analyzed the continuity of intrusion events and then presented the algorithm based on the mechanism of stress reaction. Finally, it verified the time consumption through theoretical analysis and experiments, and the recognition accuracy was obtained through experiments. Experiment results show that the processing speed of HRA is 3.3 times faster than that of a traditional complicated algorithm and has a similar recognition rate of 98%. The study is of great significance to fast intrusion event recognition in OFPS.

  14. Optical Pattern Recognition

    Science.gov (United States)

    Yu, Francis T. S.; Jutamulia, Suganda

    2008-10-01

    Contributors; Preface; 1. Pattern recognition with optics Francis T. S. Yu and Don A. Gregory; 2. Hybrid neural networks for nonlinear pattern recognition Taiwei Lu; 3. Wavelets, optics, and pattern recognition Yao Li and Yunglong Sheng; 4. Applications of the fractional Fourier transform to optical pattern recognition David Mendlovic, Zeev Zalesky and Haldum M. Oxaktas; 5. Optical implementation of mathematical morphology Tien-Hsin Chao; 6. Nonlinear optical correlators with improved discrimination capability for object location and recognition Leonid P. Yaroslavsky; 7. Distortion-invariant quadratic filters Gregory Gheen; 8. Composite filter synthesis as applied to pattern recognition Shizhou Yin and Guowen Lu; 9. Iterative procedures in electro-optical pattern recognition Joseph Shamir; 10. Optoelectronic hybrid system for three-dimensional object pattern recognition Guoguang Mu, Mingzhe Lu and Ying Sun; 11. Applications of photrefractive devices in optical pattern recognition Ziangyang Yang; 12. Optical pattern recognition with microlasers Eung-Gi Paek; 13. Optical properties and applications of bacteriorhodopsin Q. Wang Song and Yu-He Zhang; 14. Liquid-crystal spatial light modulators Aris Tanone and Suganda Jutamulia; 15. Representations of fully complex functions on real-time spatial light modulators Robert W. Cohn and Laurence G. Hassbrook; Index.

  15. Automated alignment system for optical wireless communication systems using image recognition.

    Science.gov (United States)

    Brandl, Paul; Weiss, Alexander; Zimmermann, Horst

    2014-07-01

    In this Letter, we describe the realization of a tracked line-of-sight optical wireless communication system for indoor data distribution. We built a laser-based transmitter with adaptive focus and ray steering by a microelectromechanical systems mirror. To execute the alignment procedure, we used a CMOS image sensor at the transmitter side and developed an algorithm for image recognition to localize the receiver's position. The receiver is based on a self-developed optoelectronic integrated chip with low requirements on the receiver optics to make the system economically attractive. With this system, we were able to set up the communication link automatically without any back channel and to perform error-free (bit error rate <10⁻⁹) data transmission over a distance of 3.5 m with a data rate of 3 Gbit/s.

  16. Review of Data Preprocessing Methods for Sign Language Recognition Systems based on Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Zorins Aleksejs

    2016-12-01

    Full Text Available The article presents an introductory analysis of relevant research topic for Latvian deaf society, which is the development of the Latvian Sign Language Recognition System. More specifically the data preprocessing methods are discussed in the paper and several approaches are shown with a focus on systems based on artificial neural networks, which are one of the most successful solutions for sign language recognition task.

  17. Multivariate statistical pattern recognition system for reactor noise analysis

    International Nuclear Information System (INIS)

    Gonzalez, R.C.; Howington, L.C.; Sides, W.H. Jr.; Kryter, R.C.

    1976-01-01

    A multivariate statistical pattern recognition system for reactor noise analysis was developed. The basis of the system is a transformation for decoupling correlated variables and algorithms for inferring probability density functions. The system is adaptable to a variety of statistical properties of the data, and it has learning, tracking, and updating capabilities. System design emphasizes control of the false-alarm rate. The ability of the system to learn normal patterns of reactor behavior and to recognize deviations from these patterns was evaluated by experiments at the ORNL High-Flux Isotope Reactor (HFIR). Power perturbations of less than 0.1 percent of the mean value in selected frequency ranges were detected by the system

  18. Multivariate statistical pattern recognition system for reactor noise analysis

    International Nuclear Information System (INIS)

    Gonzalez, R.C.; Howington, L.C.; Sides, W.H. Jr.; Kryter, R.C.

    1975-01-01

    A multivariate statistical pattern recognition system for reactor noise analysis was developed. The basis of the system is a transformation for decoupling correlated variables and algorithms for inferring probability density functions. The system is adaptable to a variety of statistical properties of the data, and it has learning, tracking, and updating capabilities. System design emphasizes control of the false-alarm rate. The ability of the system to learn normal patterns of reactor behavior and to recognize deviations from these patterns was evaluated by experiments at the ORNL High-Flux Isotope Reactor (HFIR). Power perturbations of less than 0.1 percent of the mean value in selected frequency ranges were detected by the system. 19 references

  19. The boundary structure in the analysis of reversibly interacting systems by sedimentation velocity.

    Science.gov (United States)

    Zhao, Huaying; Balbo, Andrea; Brown, Patrick H; Schuck, Peter

    2011-05-01

    Sedimentation velocity (SV) experiments of heterogeneous interacting systems exhibit characteristic boundary structures that can usually be very easily recognized and quantified. For slowly interacting systems, the boundaries represent concentrations of macromolecular species sedimenting at different rates, and they can be interpreted directly with population models based solely on the mass action law. For fast reactions, migration and chemical reactions are coupled, and different, but equally easily discernable boundary structures appear. However, these features have not been commonly utilized for data analysis, for the lack of an intuitive and computationally simple model. The recently introduced effective particle theory (EPT) provides a suitable framework. Here, we review the motivation and theoretical basis of EPT, and explore practical aspects for its application. We introduce an EPT-based design tool for SV experiments of heterogeneous interactions in the software SEDPHAT. As a practical tool for the first step of data analysis, we describe how the boundary resolution of the sedimentation coefficient distribution c(s) can be further improved with a Bayesian adjustment of maximum entropy regularization to the case of heterogeneous interactions between molecules that have been previously studied separately. This can facilitate extracting the characteristic boundary features by integration of c(s). In a second step, these are assembled into isotherms as a function of total loading concentrations and fitted with EPT. Methods for addressing concentration errors in isotherms are discussed. Finally, in an experimental model system of alpha-chymotrypsin interacting with soybean trypsin inhibitor, we show that EPT provides an excellent description of the experimental sedimentation boundary structure of fast interacting systems. Published by Elsevier Inc.

  20. Architecture of top down, parallel pattern recognition system TOPS and its application to the MR head images

    International Nuclear Information System (INIS)

    Matsunoshita, Jun-ichi; Akamatsu, Shigeo; Yamamoto, Shinji.

    1993-01-01

    This paper describes about the system architecture of a new image recognition system TOPS (top-down parallel pattern recognition system), and its application to the automatic extraction of brain organs (cerebrum, cerebellum, brain stem) from 3D-MRI images. Main concepts of TOPS are as follows: (1) TOPS is the top-down type recognition system, which allows parallel models in each level of hierarchy structure. (2) TOPS allows parallel image processing algorithms for one purpose (for example, for extraction of one special organ). This results in multiple candidates for one purpose, and judgment to get unique solution for it will be made at upper level of hierarchy structure. (author)

  1. A Vision-Based Counting and Recognition System for Flying Insects in Intelligent Agriculture

    Directory of Open Access Journals (Sweden)

    Yuanhong Zhong

    2018-05-01

    Full Text Available Rapid and accurate counting and recognition of flying insects are of great importance, especially for pest control. Traditional manual identification and counting of flying insects is labor intensive and inefficient. In this study, a vision-based counting and classification system for flying insects is designed and implemented. The system is constructed as follows: firstly, a yellow sticky trap is installed in the surveillance area to trap flying insects and a camera is set up to collect real-time images. Then the detection and coarse counting method based on You Only Look Once (YOLO object detection, the classification method and fine counting based on Support Vector Machines (SVM using global features are designed. Finally, the insect counting and recognition system is implemented on Raspberry PI. Six species of flying insects including bee, fly, mosquito, moth, chafer and fruit fly are selected to assess the effectiveness of the system. Compared with the conventional methods, the test results show promising performance. The average counting accuracy is 92.50% and average classifying accuracy is 90.18% on Raspberry PI. The proposed system is easy-to-use and provides efficient and accurate recognition data, therefore, it can be used for intelligent agriculture applications.

  2. An introduction to application-independent evaluation of speaker recognition systems

    NARCIS (Netherlands)

    Leeuwen, D.A. van; Brümmer, N.

    2007-01-01

    In the evaluation of speaker recognition systems - an important part of speaker classification [1], the trade-off between missed speakers and false alarms has always been an important diagnostic tool. NIST has defined the task of speaker detection with the associated Detection Cost Function (DCF) to

  3. High-speed cell recognition algorithm for ultrafast flow cytometer imaging system

    Science.gov (United States)

    Zhao, Wanyue; Wang, Chao; Chen, Hongwei; Chen, Minghua; Yang, Sigang

    2018-04-01

    An optical time-stretch flow imaging system enables high-throughput examination of cells/particles with unprecedented high speed and resolution. A significant amount of raw image data is produced. A high-speed cell recognition algorithm is, therefore, highly demanded to analyze large amounts of data efficiently. A high-speed cell recognition algorithm consisting of two-stage cascaded detection and Gaussian mixture model (GMM) classification is proposed. The first stage of detection extracts cell regions. The second stage integrates distance transform and the watershed algorithm to separate clustered cells. Finally, the cells detected are classified by GMM. We compared the performance of our algorithm with support vector machine. Results show that our algorithm increases the running speed by over 150% without sacrificing the recognition accuracy. This algorithm provides a promising solution for high-throughput and automated cell imaging and classification in the ultrafast flow cytometer imaging platform.

  4. Iris analysis for biometric recognition systems

    CERN Document Server

    Bodade, Rajesh M

    2014-01-01

    The book presents three most significant areas in Biometrics and Pattern Recognition. A step-by-step approach for design and implementation of Dual Tree Complex Wavelet Transform (DTCWT) plus Rotated Complex Wavelet Filters (RCWF) is discussed in detail. In addition to the above, the book provides detailed analysis of iris images and two methods of iris segmentation. It also discusses simplified study of some subspace-based methods and distance measures for iris recognition backed by empirical studies and statistical success verifications.

  5. Flexible Piezoelectric Sensor-Based Gait Recognition

    Directory of Open Access Journals (Sweden)

    Youngsu Cha

    2018-02-01

    Full Text Available Most motion recognition research has required tight-fitting suits for precise sensing. However, tight-suit systems have difficulty adapting to real applications, because people normally wear loose clothes. In this paper, we propose a gait recognition system with flexible piezoelectric sensors in loose clothing. The gait recognition system does not directly sense lower-body angles. It does, however, detect the transition between standing and walking. Specifically, we use the signals from the flexible sensors attached to the knee and hip parts on loose pants. We detect the periodic motion component using the discrete time Fourier series from the signal during walking. We adapt the gait detection method to a real-time patient motion and posture monitoring system. In the monitoring system, the gait recognition operates well. Finally, we test the gait recognition system with 10 subjects, for which the proposed system successfully detects walking with a success rate over 93 %.

  6. Approaches for the accurate definition of geological time boundaries

    Science.gov (United States)

    Schaltegger, Urs; Baresel, Björn; Ovtcharova, Maria; Goudemand, Nicolas; Bucher, Hugo

    2015-04-01

    Which strategies lead to the most precise and accurate date of a given geological boundary? Geological units are usually defined by the occurrence of characteristic taxa and hence boundaries between these geological units correspond to dramatic faunal and/or floral turnovers and they are primarily defined using first or last occurrences of index species, or ideally by the separation interval between two consecutive, characteristic associations of fossil taxa. These boundaries need to be defined in a way that enables their worldwide recognition and correlation across different stratigraphic successions, using tools as different as bio-, magneto-, and chemo-stratigraphy, and astrochronology. Sedimentary sequences can be dated in numerical terms by applying high-precision chemical-abrasion, isotope-dilution, thermal-ionization mass spectrometry (CA-ID-TIMS) U-Pb age determination to zircon (ZrSiO4) in intercalated volcanic ashes. But, though volcanic activity is common in geological history, ashes are not necessarily close to the boundary we would like to date precisely and accurately. In addition, U-Pb zircon data sets may be very complex and difficult to interpret in terms of the age of ash deposition. To overcome these difficulties we use a multi-proxy approach we applied to the precise and accurate dating of the Permo-Triassic and Early-Middle Triassic boundaries in South China. a) Dense sampling of ashes across the critical time interval and a sufficiently large number of analysed zircons per ash sample can guarantee the recognition of all system complexities. Geochronological datasets from U-Pb dating of volcanic zircon may indeed combine effects of i) post-crystallization Pb loss from percolation of hydrothermal fluids (even using chemical abrasion), with ii) age dispersion from prolonged residence of earlier crystallized zircon in the magmatic system. As a result, U-Pb dates of individual zircons are both apparently younger and older than the depositional age

  7. The beauty of simple models: Themes in recognition heuristic research

    Directory of Open Access Journals (Sweden)

    Daniel G. Goldstein

    2011-07-01

    Full Text Available The advantage of models that do not use flexible parameters is that one can precisely show to what degree they predict behavior, and in what situations. In three issues of this journal, the recognition heuristic has been examined carefully from many points of view. We comment here on four themes, the use of optimization models to understand the rationality of heuristics, the generalization of the recognition input beyond a binary judgment, new conditions for less-is-more effects, and the importance of specifying boundary conditions for cognitive heuristics.

  8. Initial-boundary value problems associated with the Ablowitz-Ladik system

    Science.gov (United States)

    Xia, Baoqiang; Fokas, A. S.

    2018-02-01

    We employ the Ablowitz-Ladik system as an illustrative example in order to demonstrate how to analyze initial-boundary value problems for integrable nonlinear differential-difference equations via the unified transform (Fokas method). In particular, we express the solutions of the integrable discrete nonlinear Schrödinger and integrable discrete modified Korteweg-de Vries equations in terms of the solutions of appropriate matrix Riemann-Hilbert problems. We also discuss in detail, for both the above discrete integrable equations, the associated global relations and the process of eliminating of the unknown boundary values.

  9. Novel Blind Recognition Algorithm of Frame Synchronization Words Based on Soft-Decision in Digital Communication Systems.

    Science.gov (United States)

    Qin, Jiangyi; Huang, Zhiping; Liu, Chunwu; Su, Shaojing; Zhou, Jing

    2015-01-01

    A novel blind recognition algorithm of frame synchronization words is proposed to recognize the frame synchronization words parameters in digital communication systems. In this paper, a blind recognition method of frame synchronization words based on the hard-decision is deduced in detail. And the standards of parameter recognition are given. Comparing with the blind recognition based on the hard-decision, utilizing the soft-decision can improve the accuracy of blind recognition. Therefore, combining with the characteristics of Quadrature Phase Shift Keying (QPSK) signal, an improved blind recognition algorithm based on the soft-decision is proposed. Meanwhile, the improved algorithm can be extended to other signal modulation forms. Then, the complete blind recognition steps of the hard-decision algorithm and the soft-decision algorithm are given in detail. Finally, the simulation results show that both the hard-decision algorithm and the soft-decision algorithm can recognize the parameters of frame synchronization words blindly. What's more, the improved algorithm can enhance the accuracy of blind recognition obviously.

  10. The neuro-immunological interface in an evolutionary perspective: the dynamic relationship between effector and recognition systems.

    Science.gov (United States)

    Ottaviani, E; Valensin, S; Franceschi, C

    1998-04-16

    The evolutionary perspective indicates that an immune-neuroendocrine effector system integrating innate immunity, stress and inflammation is present in invertebrates. This defense network, centered on the macrophage and exerting primitive and highly promiscuous recognition units, is very effective, ancestral and appears to have been conserved throughout evolution from invertebrates to higher vertebrates. It would seem that there was a "big bang" in the recognition system of lower vertebrates, and T and B cell repertoires, MHC and antibodies suddenly appeared. We argue that this phenomenon is the counterpart of the increasing complexity of the internal circuitry and recognition units in the effector system. The immediate consequences were a progressive enlargement of the pathogen repertoire and new problems regarding self/not-self discrimination. Probably not by chance, a new organ appeared, capable of purging cells able of excessive self recognition. This organ, the thymus, appears to be the result of a well known evolutionary strategy of re-using pre-existing material (neuroendocrine cells and mediators constituting the thymic microenvironment). This bricolage at an organ level is similar to the effect we have already described at the level of molecules and functions of the defense network, and has a general counterpart at genetic level. Thus, in vertebrates, the conserved immune-neuroendocrine effector system remains of fundamental importance in defense against pathogens, while its efficiency has increased through synergy with the new, clonotipical recognition repertoire.

  11. Intelligent Automatic Right-Left Sign Lamp Based on Brain Signal Recognition System

    Science.gov (United States)

    Winda, A.; Sofyan; Sthevany; Vincent, R. S.

    2017-12-01

    Comfort as a part of the human factor, plays important roles in nowadays advanced automotive technology. Many of the current technologies go in the direction of automotive driver assistance features. However, many of the driver assistance features still require physical movement by human to enable the features. In this work, the proposed method is used in order to make certain feature to be functioning without any physical movement, instead human just need to think about it in their mind. In this work, brain signal is recorded and processed in order to be used as input to the recognition system. Right-Left sign lamp based on the brain signal recognition system can potentially replace the button or switch of the specific device in order to make the lamp work. The system then will decide whether the signal is ‘Right’ or ‘Left’. The decision of the Right-Left side of brain signal recognition will be sent to a processing board in order to activate the automotive relay, which will be used to activate the sign lamp. Furthermore, the intelligent system approach is used to develop authorized model based on the brain signal. Particularly Support Vector Machines (SVMs)-based classification system is used in the proposed system to recognize the Left-Right of the brain signal. Experimental results confirm the effectiveness of the proposed intelligent Automatic brain signal-based Right-Left sign lamp access control system. The signal is processed by Linear Prediction Coefficient (LPC) and Support Vector Machines (SVMs), and the resulting experiment shows the training and testing accuracy of 100% and 80%, respectively.

  12. Pattern-recognition system application to EBR-II plant-life extension

    International Nuclear Information System (INIS)

    King, R.W.; Radtke, W.H.; Mott, J.E.

    1988-01-01

    A computer-based pattern-recognition system, the System State Analyzer (SSA), is being used as part of the EBR-II plant-life extension program for detection of degradation and other abnormalities in plant systems. The SSA is used for surveillance of the EBR-II primary system instrumentation, primary sodium pumps, and plant heat balances. Early results of this surveillance indicate that the SSA can detect instrumentation degradation and system performance degradation over varying time intervals, and can provide derived signal values to replace signals from failed critical sensors. These results are being used in planning for extended-life operation of EBR-II

  13. Performance Evaluation of Speech Recognition Systems as a Next-Generation Pilot-Vehicle Interface Technology

    Science.gov (United States)

    Arthur, Jarvis J., III; Shelton, Kevin J.; Prinzel, Lawrence J., III; Bailey, Randall E.

    2016-01-01

    During the flight trials known as Gulfstream-V Synthetic Vision Systems Integrated Technology Evaluation (GV-SITE), a Speech Recognition System (SRS) was used by the evaluation pilots. The SRS system was intended to be an intuitive interface for display control (rather than knobs, buttons, etc.). This paper describes the performance of the current "state of the art" Speech Recognition System (SRS). The commercially available technology was evaluated as an application for possible inclusion in commercial aircraft flight decks as a crew-to-vehicle interface. Specifically, the technology is to be used as an interface from aircrew to the onboard displays, controls, and flight management tasks. A flight test of a SRS as well as a laboratory test was conducted.

  14. Camera-laser fusion sensor system and environmental recognition for humanoids in disaster scenarios

    International Nuclear Information System (INIS)

    Lee, Inho; Oh, Jaesung; Oh, Jun-Ho; Kim, Inhyeok

    2017-01-01

    This research aims to develop a vision sensor system and a recognition algorithm to enable a humanoid to operate autonomously in a disaster environment. In disaster response scenarios, humanoid robots that perform manipulation and locomotion tasks must identify the objects in the environment from those challenged by the call by the United States’ Defense Advanced Research Projects Agency, e.g., doors, valves, drills, debris, uneven terrains, and stairs, among others. In order for a humanoid to undertake a number of tasks, we con- struct a camera–laser fusion system and develop an environmental recognition algorithm. Laser distance sensor and motor are used to obtain 3D cloud data. We project the 3D cloud data onto a 2D image according to the intrinsic parameters of the camera and the distortion model of the lens. In this manner, our fusion sensor system performs functions such as those performed by the RGB-D sensor gener- ally used in segmentation research. Our recognition algorithm is based on super-pixel segmentation and random sampling. The proposed approach clusters the unorganized cloud data according to geometric characteristics, namely, proximity and co-planarity. To assess the feasibility of our system and algorithm, we utilize the humanoid robot, DRC-HUBO, and the results are demonstrated in the accompanying video.

  15. Camera-laser fusion sensor system and environmental recognition for humanoids in disaster scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Inho [Institute for Human and Machine Cognition (IHMC), Florida (United States); Oh, Jaesung; Oh, Jun-Ho [Korea Advanced Institute of Science and Technology (KAIST), Daejeon (Korea, Republic of); Kim, Inhyeok [NAVER Green Factory, Seongnam (Korea, Republic of)

    2017-06-15

    This research aims to develop a vision sensor system and a recognition algorithm to enable a humanoid to operate autonomously in a disaster environment. In disaster response scenarios, humanoid robots that perform manipulation and locomotion tasks must identify the objects in the environment from those challenged by the call by the United States’ Defense Advanced Research Projects Agency, e.g., doors, valves, drills, debris, uneven terrains, and stairs, among others. In order for a humanoid to undertake a number of tasks, we con- struct a camera–laser fusion system and develop an environmental recognition algorithm. Laser distance sensor and motor are used to obtain 3D cloud data. We project the 3D cloud data onto a 2D image according to the intrinsic parameters of the camera and the distortion model of the lens. In this manner, our fusion sensor system performs functions such as those performed by the RGB-D sensor gener- ally used in segmentation research. Our recognition algorithm is based on super-pixel segmentation and random sampling. The proposed approach clusters the unorganized cloud data according to geometric characteristics, namely, proximity and co-planarity. To assess the feasibility of our system and algorithm, we utilize the humanoid robot, DRC-HUBO, and the results are demonstrated in the accompanying video.

  16. From birdsong to human speech recognition: bayesian inference on a hierarchy of nonlinear dynamical systems.

    Science.gov (United States)

    Yildiz, Izzet B; von Kriegstein, Katharina; Kiebel, Stefan J

    2013-01-01

    Our knowledge about the computational mechanisms underlying human learning and recognition of sound sequences, especially speech, is still very limited. One difficulty in deciphering the exact means by which humans recognize speech is that there are scarce experimental findings at a neuronal, microscopic level. Here, we show that our neuronal-computational understanding of speech learning and recognition may be vastly improved by looking at an animal model, i.e., the songbird, which faces the same challenge as humans: to learn and decode complex auditory input, in an online fashion. Motivated by striking similarities between the human and songbird neural recognition systems at the macroscopic level, we assumed that the human brain uses the same computational principles at a microscopic level and translated a birdsong model into a novel human sound learning and recognition model with an emphasis on speech. We show that the resulting Bayesian model with a hierarchy of nonlinear dynamical systems can learn speech samples such as words rapidly and recognize them robustly, even in adverse conditions. In addition, we show that recognition can be performed even when words are spoken by different speakers and with different accents-an everyday situation in which current state-of-the-art speech recognition models often fail. The model can also be used to qualitatively explain behavioral data on human speech learning and derive predictions for future experiments.

  17. From birdsong to human speech recognition: bayesian inference on a hierarchy of nonlinear dynamical systems.

    Directory of Open Access Journals (Sweden)

    Izzet B Yildiz

    Full Text Available Our knowledge about the computational mechanisms underlying human learning and recognition of sound sequences, especially speech, is still very limited. One difficulty in deciphering the exact means by which humans recognize speech is that there are scarce experimental findings at a neuronal, microscopic level. Here, we show that our neuronal-computational understanding of speech learning and recognition may be vastly improved by looking at an animal model, i.e., the songbird, which faces the same challenge as humans: to learn and decode complex auditory input, in an online fashion. Motivated by striking similarities between the human and songbird neural recognition systems at the macroscopic level, we assumed that the human brain uses the same computational principles at a microscopic level and translated a birdsong model into a novel human sound learning and recognition model with an emphasis on speech. We show that the resulting Bayesian model with a hierarchy of nonlinear dynamical systems can learn speech samples such as words rapidly and recognize them robustly, even in adverse conditions. In addition, we show that recognition can be performed even when words are spoken by different speakers and with different accents-an everyday situation in which current state-of-the-art speech recognition models often fail. The model can also be used to qualitatively explain behavioral data on human speech learning and derive predictions for future experiments.

  18. The use of open and machine vision technologies for development of gesture recognition intelligent systems

    Science.gov (United States)

    Cherkasov, Kirill V.; Gavrilova, Irina V.; Chernova, Elena V.; Dokolin, Andrey S.

    2018-05-01

    The article is devoted to reflection of separate aspects of intellectual system gesture recognition development. The peculiarity of the system is its intellectual block which completely based on open technologies: OpenCV library and Microsoft Cognitive Toolkit (CNTK) platform. The article presents the rationale for the choice of such set of tools, as well as the functional scheme of the system and the hierarchy of its modules. Experiments have shown that the system correctly recognizes about 85% of images received from sensors. The authors assume that the improvement of the algorithmic block of the system will increase the accuracy of gesture recognition up to 95%.

  19. Entrance C - New Automatic Number Plate Recognition System

    CERN Multimedia

    2013-01-01

    Entrance C (Satigny) is now equipped with a latest-generation Automatic Number Plate Recognition (ANPR) system and a fast-action road gate.   During the month of August, Entrance C will be continuously open from 7.00 a.m. to 7.00 p.m. (working days only). The security guards will open the gate as usual from 7.00 a.m. to 9.00 a.m. and from 5.00 p.m. to 7.00 p.m. For the rest of the working day (9.00 a.m. to 5.00 p.m.) the gate will operate automatically. Please observe the following points:       Stop at the STOP sign on the ground     Position yourself next to the card reader for optimal recognition     Motorcyclists must use their CERN card     Cyclists may not activate the gate and should use the bicycle turnstile     Keep a safe distance from the vehicle in front of you   If access is denied, please check that your vehicle regist...

  20. A Human Activity Recognition System Based on Dynamic Clustering of Skeleton Data

    Directory of Open Access Journals (Sweden)

    Alessandro Manzi

    2017-05-01

    Full Text Available Human activity recognition is an important area in computer vision, with its wide range of applications including ambient assisted living. In this paper, an activity recognition system based on skeleton data extracted from a depth camera is presented. The system makes use of machine learning techniques to classify the actions that are described with a set of a few basic postures. The training phase creates several models related to the number of clustered postures by means of a multiclass Support Vector Machine (SVM, trained with Sequential Minimal Optimization (SMO. The classification phase adopts the X-means algorithm to find the optimal number of clusters dynamically. The contribution of the paper is twofold. The first aim is to perform activity recognition employing features based on a small number of informative postures, extracted independently from each activity instance; secondly, it aims to assess the minimum number of frames needed for an adequate classification. The system is evaluated on two publicly available datasets, the Cornell Activity Dataset (CAD-60 and the Telecommunication Systems Team (TST Fall detection dataset. The number of clusters needed to model each instance ranges from two to four elements. The proposed approach reaches excellent performances using only about 4 s of input data (~100 frames and outperforms the state of the art when it uses approximately 500 frames on the CAD-60 dataset. The results are promising for the test in real context.

  1. A Human Activity Recognition System Based on Dynamic Clustering of Skeleton Data.

    Science.gov (United States)

    Manzi, Alessandro; Dario, Paolo; Cavallo, Filippo

    2017-05-11

    Human activity recognition is an important area in computer vision, with its wide range of applications including ambient assisted living. In this paper, an activity recognition system based on skeleton data extracted from a depth camera is presented. The system makes use of machine learning techniques to classify the actions that are described with a set of a few basic postures. The training phase creates several models related to the number of clustered postures by means of a multiclass Support Vector Machine (SVM), trained with Sequential Minimal Optimization (SMO). The classification phase adopts the X-means algorithm to find the optimal number of clusters dynamically. The contribution of the paper is twofold. The first aim is to perform activity recognition employing features based on a small number of informative postures, extracted independently from each activity instance; secondly, it aims to assess the minimum number of frames needed for an adequate classification. The system is evaluated on two publicly available datasets, the Cornell Activity Dataset (CAD-60) and the Telecommunication Systems Team (TST) Fall detection dataset. The number of clusters needed to model each instance ranges from two to four elements. The proposed approach reaches excellent performances using only about 4 s of input data (~100 frames) and outperforms the state of the art when it uses approximately 500 frames on the CAD-60 dataset. The results are promising for the test in real context.

  2. Cherry Picking Robot Vision Recognition System Based on OpenCV

    Directory of Open Access Journals (Sweden)

    Zhang Qi Rong

    2016-01-01

    Full Text Available Through OpenCV function, the cherry in a natural environment image after image preprocessing, color recognition, threshold segmentation, morphological filtering, edge detection, circle Hough transform, you can draw the cherry’s center and circular contour, to carry out the purpose of the machine picking. The system is simple and effective.

  3. A study on the development of automatic economic profit and loss calculation system for maritime boundary delimitation

    International Nuclear Information System (INIS)

    Kwak, G; Kim, K; Park, Y

    2014-01-01

    As the maritime boundary delimitation is important for the purpose of securing marine resources, in addition to the aspect of maritime security, interest in maritime boundary delimitation to help national benefits are increasing over the world. In Korea, the importance of maritime boundary delimitation with the neighbouring countries is also increasing in practice. The quantity of obtainable marine resources depending on maritime boundary acts as an important factor for maritime boundary delimitation. Accordingly, a study is required to calculate quantity of our obtainable marine resources depending on maritime boundary delimitation. This study intends to calculate obtainable marine resources depending on various maritime boundary scenarios insisted by several countries. It mainly aims at developing a GIS-based automation system to be utilized for decision making of the maritime boundary delimitation. For this target, it has designed a module using spatial analysis technique to automatically calculate profit and loss waters area of each country upon maritime boundary and another module to estimate economic profits and losses obtained by each country using the calculated waters area and pricing information of the marine resources. By linking both the designed modules, it has implemented an automatic economic profit and loss calculation system for the GIS-based maritime boundary delimitation. The system developed from this study automatically calculate quantity of the obtainable marine resources of a country for the maritime boundary to be added and created in the future. Thus, it is expected to support decision making for the maritime boundary negotiators

  4. A study on the development of automatic economic profit and loss calculation system for maritime boundary delimitation

    Science.gov (United States)

    Kwak, G.; Kim, K.; Park, Y.

    2014-02-01

    As the maritime boundary delimitation is important for the purpose of securing marine resources, in addition to the aspect of maritime security, interest in maritime boundary delimitation to help national benefits are increasing over the world. In Korea, the importance of maritime boundary delimitation with the neighbouring countries is also increasing in practice. The quantity of obtainable marine resources depending on maritime boundary acts as an important factor for maritime boundary delimitation. Accordingly, a study is required to calculate quantity of our obtainable marine resources depending on maritime boundary delimitation. This study intends to calculate obtainable marine resources depending on various maritime boundary scenarios insisted by several countries. It mainly aims at developing a GIS-based automation system to be utilized for decision making of the maritime boundary delimitation. For this target, it has designed a module using spatial analysis technique to automatically calculate profit and loss waters area of each country upon maritime boundary and another module to estimate economic profits and losses obtained by each country using the calculated waters area and pricing information of the marine resources. By linking both the designed modules, it has implemented an automatic economic profit and loss calculation system for the GIS-based maritime boundary delimitation. The system developed from this study automatically calculate quantity of the obtainable marine resources of a country for the maritime boundary to be added and created in the future. Thus, it is expected to support decision making for the maritime boundary negotiators.

  5. A Biometric Face Recognition System Using an Algorithm Based on the Principal Component Analysis Technique

    Directory of Open Access Journals (Sweden)

    Gheorghe Gîlcă

    2015-06-01

    Full Text Available This article deals with a recognition system using an algorithm based on the Principal Component Analysis (PCA technique. The recognition system consists only of a PC and an integrated video camera. The algorithm is developed in MATLAB language and calculates the eigenfaces considered as features of the face. The PCA technique is based on the matching between the facial test image and the training prototype vectors. The mathcing score between the facial test image and the training prototype vectors is calculated between their coefficient vectors. If the matching is high, we have the best recognition. The results of the algorithm based on the PCA technique are very good, even if the person looks from one side at the video camera.

  6. New Boundary-Driven Twist States in Systems with Broken Spatial Inversion Symmetry

    Science.gov (United States)

    Hals, Kjetil M. D.; Everschor-Sitte, Karin

    2017-09-01

    A full description of a magnetic sample includes a correct treatment of the boundary conditions (BCs). This is in particular important in thin film systems, where even bulk properties might be modified by the properties of the boundary of the sample. We study generic ferromagnets with broken spatial inversion symmetry and derive the general micromagnetic BCs of a system with Dzyaloshinskii-Moriya interaction (DMI). We demonstrate that the BCs require the full tensorial structure of the third-rank DMI tensor and not just the antisymmetric part, which is usually taken into account. Specifically, we study systems with C∞ v symmetry and explore the consequences of the DMI. Interestingly, we find that the DMI already in the simplest case of a ferromagnetic thin film leads to a purely boundary-driven magnetic twist state at the edges of the sample. The twist state represents a new type of DMI-induced spin structure, which is completely independent of the internal DMI field. We estimate the size of the texture-induced magnetoresistance effect being in the range of that of domain walls.

  7. Kernel learning algorithms for face recognition

    CERN Document Server

    Li, Jun-Bao; Pan, Jeng-Shyang

    2013-01-01

    Kernel Learning Algorithms for Face Recognition covers the framework of kernel based face recognition. This book discusses the advanced kernel learning algorithms and its application on face recognition. This book also focuses on the theoretical deviation, the system framework and experiments involving kernel based face recognition. Included within are algorithms of kernel based face recognition, and also the feasibility of the kernel based face recognition method. This book provides researchers in pattern recognition and machine learning area with advanced face recognition methods and its new

  8. Intelligent color recognition system using micro-controller

    International Nuclear Information System (INIS)

    Mohd Ashhar Khalid; Khairiah Yazid; Nur Aira Abd Rahman; Azaman Ahmad

    2006-01-01

    Color is widely used in categorizing the quality of products as well as a marker for automatic selection and discrimination of products. Most of color recognizing process is done manually and due to the fact that human perceived color differently, different of opinion frequently occur. This paper deals with the development of an intelligent color recognition system used for discriminating the ripeness of oil palm fruits into three categories namely ripe, under-ripe and un-ripe. In deciding the categories of fruit a sample belong, a technique of decision making similar to human thinking called neural network has been implemented. Implementation of neural network using a micro-controller is not so common, due to a limited capability in floating point calculation. To overcome the problem, a floating-point co-processor specially designed for micro-controller is used. The paper will report the system design and the network training and implementation methods. The effectiveness of the system compared to human decision method is also reported. (Author)

  9. Novel Blind Recognition Algorithm of Frame Synchronization Words Based on Soft-Decision in Digital Communication Systems.

    Directory of Open Access Journals (Sweden)

    Jiangyi Qin

    Full Text Available A novel blind recognition algorithm of frame synchronization words is proposed to recognize the frame synchronization words parameters in digital communication systems. In this paper, a blind recognition method of frame synchronization words based on the hard-decision is deduced in detail. And the standards of parameter recognition are given. Comparing with the blind recognition based on the hard-decision, utilizing the soft-decision can improve the accuracy of blind recognition. Therefore, combining with the characteristics of Quadrature Phase Shift Keying (QPSK signal, an improved blind recognition algorithm based on the soft-decision is proposed. Meanwhile, the improved algorithm can be extended to other signal modulation forms. Then, the complete blind recognition steps of the hard-decision algorithm and the soft-decision algorithm are given in detail. Finally, the simulation results show that both the hard-decision algorithm and the soft-decision algorithm can recognize the parameters of frame synchronization words blindly. What's more, the improved algorithm can enhance the accuracy of blind recognition obviously.

  10. Online handwritten mathematical expression recognition

    Science.gov (United States)

    Büyükbayrak, Hakan; Yanikoglu, Berrin; Erçil, Aytül

    2007-01-01

    We describe a system for recognizing online, handwritten mathematical expressions. The system is designed with a user-interface for writing scientific articles, supporting the recognition of basic mathematical expressions as well as integrals, summations, matrices etc. A feed-forward neural network recognizes symbols which are assumed to be single-stroke and a recursive algorithm parses the expression by combining neural network output and the structure of the expression. Preliminary results show that writer-dependent recognition rates are very high (99.8%) while writer-independent symbol recognition rates are lower (75%). The interface associated with the proposed system integrates the built-in recognition capabilities of the Microsoft's Tablet PC API for recognizing textual input and supports conversion of hand-drawn figures into PNG format. This enables the user to enter text, mathematics and draw figures in a single interface. After recognition, all output is combined into one LATEX code and compiled into a PDF file.

  11. High-accuracy and robust face recognition system based on optical parallel correlator using a temporal image sequence

    Science.gov (United States)

    Watanabe, Eriko; Ishikawa, Mami; Ohta, Maiko; Kodate, Kashiko

    2005-09-01

    Face recognition is used in a wide range of security systems, such as monitoring credit card use, searching for individuals with street cameras via Internet and maintaining immigration control. There are still many technical subjects under study. For instance, the number of images that can be stored is limited under the current system, and the rate of recognition must be improved to account for photo shots taken at different angles under various conditions. We implemented a fully automatic Fast Face Recognition Optical Correlator (FARCO) system by using a 1000 frame/s optical parallel correlator designed and assembled by us. Operational speed for the 1: N (i.e. matching a pair of images among N, where N refers to the number of images in the database) identification experiment (4000 face images) amounts to less than 1.5 seconds, including the pre/post processing. From trial 1: N identification experiments using FARCO, we acquired low error rates of 2.6% False Reject Rate and 1.3% False Accept Rate. By making the most of the high-speed data-processing capability of this system, much more robustness can be achieved for various recognition conditions when large-category data are registered for a single person. We propose a face recognition algorithm for the FARCO while employing a temporal image sequence of moving images. Applying this algorithm to a natural posture, a two times higher recognition rate scored compared with our conventional system. The system has high potential for future use in a variety of purposes such as search for criminal suspects by use of street and airport video cameras, registration of babies at hospitals or handling of an immeasurable number of images in a database.

  12. Evaluating a voice recognition system: finding the right product for your department.

    Science.gov (United States)

    Freeh, M; Dewey, M; Brigham, L

    2001-06-01

    The Department of Radiology at the University of Utah Health Sciences Center has been in the process of transitioning from the traditional film-based department to a digital imaging department for the past 2 years. The department is now transitioning from the traditional method of dictating reports (dictation by radiologist to transcription to review and signing by radiologist) to a voice recognition system. The transition to digital operations will not be complete until we have the ability to directly interface the dictation process with the image review process. Voice recognition technology has advanced to the level where it can and should be an integral part of the new way of working in radiology and is an integral part of an efficient digital imaging department. The transition to voice recognition requires the task of identifying the product and the company that will best meet a department's needs. This report introduces the methods we used to evaluate the vendors and the products available as we made our purchasing decision. We discuss our evaluation method and provide a checklist that can be used by other departments to assist with their evaluation process. The criteria used in the evaluation process fall into the following major categories: user operations, technical infrastructure, medical dictionary, system interfaces, service support, cost, and company strength. Conclusions drawn from our evaluation process will be detailed, with the intention being to shorten the process for others as they embark on a similar venture. As more and more organizations investigate the many products and services that are now being offered to enhance the operations of a radiology department, it becomes increasingly important that solid methods are used to most effectively evaluate the new products. This report should help others complete the task of evaluating a voice recognition system and may be adaptable to other products as well.

  13. Multi-Modal Activity Recognition Systems with Minimal Training Data and Unobtrusive Environmental Instrumentations

    OpenAIRE

    Bauer, Gerald

    2014-01-01

    The recognition of day-to-day activities is still a very challenging and important research topic. During recent years, a lot of research has gone into designing and realizing smart environ- ments in different application areas such as health care, maintenance, sports or smart homes. As a result, a large amount of sensor modalities were developed, different types of activity and context recognition services were implemented and the resulting systems were benchmarked using state-of-the-art eva...

  14. A Novel Model-Based Driving Behavior Recognition System Using Motion Sensors

    Directory of Open Access Journals (Sweden)

    Minglin Wu

    2016-10-01

    Full Text Available In this article, a novel driving behavior recognition system based on a specific physical model and motion sensory data is developed to promote traffic safety. Based on the theory of rigid body kinematics, we build a specific physical model to reveal the data change rule during the vehicle moving process. In this work, we adopt a nine-axis motion sensor including a three-axis accelerometer, a three-axis gyroscope and a three-axis magnetometer, and apply a Kalman filter for noise elimination and an adaptive time window for data extraction. Based on the feature extraction guided by the built physical model, various classifiers are accomplished to recognize different driving behaviors. Leveraging the system, normal driving behaviors (such as accelerating, braking, lane changing and turning with caution and aggressive driving behaviors (such as accelerating, braking, lane changing and turning with a sudden can be classified with a high accuracy of 93.25%. Compared with traditional driving behavior recognition methods using machine learning only, the proposed system possesses a solid theoretical basis, performs better and has good prospects.

  15. A Russian Keyword Spotting System Based on Large Vocabulary Continuous Speech Recognition and Linguistic Knowledge

    Directory of Open Access Journals (Sweden)

    Valentin Smirnov

    2016-01-01

    Full Text Available The paper describes the key concepts of a word spotting system for Russian based on large vocabulary continuous speech recognition. Key algorithms and system settings are described, including the pronunciation variation algorithm, and the experimental results on the real-life telecom data are provided. The description of system architecture and the user interface is provided. The system is based on CMU Sphinx open-source speech recognition platform and on the linguistic models and algorithms developed by Speech Drive LLC. The effective combination of baseline statistic methods, real-world training data, and the intensive use of linguistic knowledge led to a quality result applicable to industrial use.

  16. Predicting Performance of a Face Recognition System Based on Image Quality

    NARCIS (Netherlands)

    Dutta, A.

    2015-01-01

    In this dissertation, we focus on several aspects of models that aim to predict performance of a face recognition system. Performance prediction models are commonly based on the following two types of performance predictor features: a) image quality features; and b) features derived solely from

  17. Evaluation of iris recognition system for wavefront-guided laser in situ keratomileusis for myopic astigmatism.

    Science.gov (United States)

    Ghosh, Sudipta; Couper, Terry A; Lamoureux, Ecosse; Jhanji, Vishal; Taylor, Hugh R; Vajpayee, Rasik B

    2008-02-01

    To evaluate the visual and refractive outcomes of wavefront-guided laser in situ keratomileusis (LASIK) using an iris recognition system for the correction of myopic astigmatism. Centre for Eye Research Australia, Melbourne Excimer Laser Research Group, and Royal Victorian Eye and Ear Hospital, East Melbourne, Victoria, Australia. A comparative analysis of wavefront-guided LASIK was performed with an iris recognition system (iris recognition group) and without iris recognition (control group). The main parameters were uncorrected visual acuity (UCVA), best spectacle-corrected visual acuity, amount of residual cylinder, manifest spherical equivalent (SE), and the index of success using the Alpins method of astigmatism analysis 1 and 3 months postoperatively. A P value less than 0.05 was considered statistically significant. Preoperatively, the mean SE was -4.32 diopters (D) +/- 1.59 (SD) in the iris recognition group (100 eyes) and -4.55 +/- 1.87 D in the control group (98 eyes) (P = .84). At 3 months, the mean SE was -0.05 +/- 0.21 D and -0.20 +/- 0.40 D, respectively (P = .001), and an SE within +/-0.50 D of emmetropia was achieved in 92.0% and 85.7% of eyes, respectively (P = .07). At 3 months, the UCVA was 20/20 or better in 90.0% and 76.5% of eyes, respectively. A statistically significant difference in the amount of astigmatic correction was seen between the 2 groups (P = .00 and P = .01 at 1 and 3 months, respectively). The index of success was 98.0% in the iris recognition group and 81.6% in the control group (P = .03). Iris recognition software may achieve better visual and refractive outcomes in wavefront-guided LASIK for myopic astigmatism.

  18. A high-order doubly asymptotic open boundary for scalar waves in semi-infinite layered systems

    International Nuclear Information System (INIS)

    Prempramote, S; Song, Ch; Birk, C

    2010-01-01

    Wave propagation in semi-infinite layered systems is of interest in earthquake engineering, acoustics, electromagnetism, etc. The numerical modelling of this problem is particularly challenging as evanescent waves exist below the cut-off frequency. Most of the high-order transmitting boundaries are unable to model the evanescent waves. As a result, spurious reflection occurs at late time. In this paper, a high-order doubly asymptotic open boundary is developed for scalar waves propagating in semi-infinite layered systems. It is derived from the equation of dynamic stiffness matrix obtained in the scaled boundary finite-element method in the frequency domain. A continued-fraction solution of the dynamic stiffness matrix is determined recursively by satisfying the scaled boundary finite-element equation at both high- and low-frequency limits. In the time domain, the continued-fraction solution permits the force-displacement relationship to be formulated as a system of first-order ordinary differential equations. Standard time-step schemes in structural dynamics can be directly applied to evaluate the response history. Examples of a semi-infinite homogeneous layer and a semi-infinite two-layered system are investigated herein. The displacement results obtained from the open boundary converge rapidly as the order of continued fractions increases. Accurate results are obtained at early time and late time.

  19. Indoor navigation by image recognition

    Science.gov (United States)

    Choi, Io Teng; Leong, Chi Chong; Hong, Ka Wo; Pun, Chi-Man

    2017-07-01

    With the progress of smartphones hardware, it is simple on smartphone using image recognition technique such as face detection. In addition, indoor navigation system development is much slower than outdoor navigation system. Hence, this research proves a usage of image recognition technique for navigation in indoor environment. In this paper, we introduced an indoor navigation application that uses the indoor environment features to locate user's location and a route calculating algorithm to generate an appropriate path for user. The application is implemented on Android smartphone rather than iPhone. Yet, the application design can also be applied on iOS because the design is implemented without using special features only for Android. We found that digital navigation system provides better and clearer location information than paper map. Also, the indoor environment is ideal for Image recognition processing. Hence, the results motivate us to design an indoor navigation system using image recognition.

  20. A study on infinite number of integrals of motion in classically integrable system with boundary: Pt.1

    International Nuclear Information System (INIS)

    Chen Yixin; Luo Xudong

    1998-01-01

    By the zero curvature condition in classically integrable system, the generating functions for integrals of motion and equations for solving K +- matrices are obtained in two-dimensional integrable systems on a finite interval with independent boundary conditions on each end. Classically integrable boundary conditions will be found by solving K +- matrices. The authors develop a Hamiltonian method in classically integrable system with independent boundary conditions on each end. The result can be applied to more integrable systems than those associated with E.K. Sklyanin's approach

  1. Hardware/Software Co-Design of a Traffic Sign Recognition System Using Zynq FPGAs

    Directory of Open Access Journals (Sweden)

    Yan Han

    2015-12-01

    Full Text Available Traffic sign recognition (TSR, taken as an important component of an intelligent vehicle system, has been an emerging research topic in recent years. In this paper, a traffic sign detection system based on color segmentation, speeded-up robust features (SURF detection and the k-nearest neighbor classifier is introduced. The proposed system benefits from the SURF detection algorithm, which achieves invariance to rotated, skewed and occluded signs. In addition to the accuracy and robustness issues, a TSR system should target a real-time implementation on an embedded system. Therefore, a hardware/software co-design architecture for a Zynq-7000 FPGA is presented as a major objective of this work. The sign detection operations are accelerated by programmable hardware logic that searches the potential candidates for sign classification. Sign recognition and classification uses a feature extraction and matching algorithm, which is implemented as a software component that runs on the embedded ARM CPU.

  2. Electrolarynx Voice Recognition Utilizing Pulse Coupled Neural Network

    Directory of Open Access Journals (Sweden)

    Fatchul Arifin

    2010-08-01

    Full Text Available The laryngectomies patient has no ability to speak normally because their vocal chords have been removed. The easiest option for the patient to speak again is by using electrolarynx speech. This tool is placed on the lower chin. Vibration of the neck while speaking is used to produce sound. Meanwhile, the technology of "voice recognition" has been growing very rapidly. It is expected that the technology of "voice recognition" can also be used by laryngectomies patients who use electrolarynx.This paper describes a system for electrolarynx speech recognition. Two main parts of the system are feature extraction and pattern recognition. The Pulse Coupled Neural Network – PCNN is used to extract the feature and characteristic of electrolarynx speech. Varying of β (one of PCNN parameter also was conducted. Multi layer perceptron is used to recognize the sound patterns. There are two kinds of recognition conducted in this paper: speech recognition and speaker recognition. The speech recognition recognizes specific speech from every people. Meanwhile, speaker recognition recognizes specific speech from specific person. The system ran well. The "electrolarynx speech recognition" has been tested by recognizing of “A” and "not A" voice. The results showed that the system had 94.4% validation. Meanwhile, the electrolarynx speaker recognition has been tested by recognizing of “saya” voice from some different speakers. The results showed that the system had 92.2% validation. Meanwhile, the best β parameter of PCNN for electrolarynx recognition is 3.

  3. Opportunity recognition: delineating the process and motivators for serial entrepreneurs

    Directory of Open Access Journals (Sweden)

    Boris Urban

    2011-04-01

    Full Text Available Opportunity recognition is a fundamental research issue in entrepreneurship which this paper empirically investigates for serial entrepreneurs. Initially key definitions and boundary conditions of opportunity recognition are explored to elucidate the relevant motivators driving serial entrepreneurs. After operationalising the various concepts, data is collected by surveying serial entrepreneurs (n= 77 based on pre-determined selection criteria. Since the study’s objective is to build solid theory on these new phenomena, descriptive analysis on the empirical results is provided. To test the hypotheses inferential statistics employing parametric and non-parametric tests are used. The findings reveal that the opportunity recognition behaviours are manifest among serial entrepreneurs, with few significant differences on how many new, major businesses have been pursued, or whether they can be said to be successes.

  4. PALESTINE AUTOMOTIVE LICENSE IDENTITY RECOGNITION FOR INTELLIGENT PARKING SYSTEM

    Directory of Open Access Journals (Sweden)

    ANEES ABU SNEINEH

    2017-05-01

    Full Text Available Providing employees with protection and security is one of the key concerns of any organization. This goal can be implemented mainly by managing and protecting employees’ cars in the parking area. Therefore, a parking area must be managed and organized with smart technologies and tools that can be applied and integrated in an intelligent parking system. This paper presents the tools based on image recognition technology that can be used to effectively control various parts of a parking system. An intelligent automotive parking system is effectively implemented by integrating image processing technologies and an Arduino controller. Results show that intelligent parking is successfully implemented based on car ID image capture to meet the need for managing and organizing car parking systems.

  5. Fusing Facial Features for Face Recognition

    Directory of Open Access Journals (Sweden)

    Jamal Ahmad Dargham

    2012-06-01

    Full Text Available Face recognition is an important biometric method because of its potential applications in many fields, such as access control, surveillance, and human-computer interaction. In this paper, a face recognition system that fuses the outputs of three face recognition systems based on Gabor jets is presented. The first system uses the magnitude, the second uses the phase, and the third uses the phase-weighted magnitude of the jets. The jets are generated from facial landmarks selected using three selection methods. It was found out that fusing the facial features gives better recognition rate than either facial feature used individually regardless of the landmark selection method.

  6. High-emulation mask recognition with high-resolution hyperspectral video capture system

    Science.gov (United States)

    Feng, Jiao; Fang, Xiaojing; Li, Shoufeng; Wang, Yongjin

    2014-11-01

    We present a method for distinguishing human face from high-emulation mask, which is increasingly used by criminals for activities such as stealing card numbers and passwords on ATM. Traditional facial recognition technique is difficult to detect such camouflaged criminals. In this paper, we use the high-resolution hyperspectral video capture system to detect high-emulation mask. A RGB camera is used for traditional facial recognition. A prism and a gray scale camera are used to capture spectral information of the observed face. Experiments show that mask made of silica gel has different spectral reflectance compared with the human skin. As multispectral image offers additional spectral information about physical characteristics, high-emulation mask can be easily recognized.

  7. An Extreme Learning Machine-Based Neuromorphic Tactile Sensing System for Texture Recognition.

    Science.gov (United States)

    Rasouli, Mahdi; Chen, Yi; Basu, Arindam; Kukreja, Sunil L; Thakor, Nitish V

    2018-04-01

    Despite significant advances in computational algorithms and development of tactile sensors, artificial tactile sensing is strikingly less efficient and capable than the human tactile perception. Inspired by efficiency of biological systems, we aim to develop a neuromorphic system for tactile pattern recognition. We particularly target texture recognition as it is one of the most necessary and challenging tasks for artificial sensory systems. Our system consists of a piezoresistive fabric material as the sensor to emulate skin, an interface that produces spike patterns to mimic neural signals from mechanoreceptors, and an extreme learning machine (ELM) chip to analyze spiking activity. Benefiting from intrinsic advantages of biologically inspired event-driven systems and massively parallel and energy-efficient processing capabilities of the ELM chip, the proposed architecture offers a fast and energy-efficient alternative for processing tactile information. Moreover, it provides the opportunity for the development of low-cost tactile modules for large-area applications by integration of sensors and processing circuits. We demonstrate the recognition capability of our system in a texture discrimination task, where it achieves a classification accuracy of 92% for categorization of ten graded textures. Our results confirm that there exists a tradeoff between response time and classification accuracy (and information transfer rate). A faster decision can be achieved at early time steps or by using a shorter time window. This, however, results in deterioration of the classification accuracy and information transfer rate. We further observe that there exists a tradeoff between the classification accuracy and the input spike rate (and thus energy consumption). Our work substantiates the importance of development of efficient sparse codes for encoding sensory data to improve the energy efficiency. These results have a significance for a wide range of wearable, robotic

  8. Compact holographic optical neural network system for real-time pattern recognition

    Science.gov (United States)

    Lu, Taiwei; Mintzer, David T.; Kostrzewski, Andrew A.; Lin, Freddie S.

    1996-08-01

    One of the important characteristics of artificial neural networks is their capability for massive interconnection and parallel processing. Recently, specialized electronic neural network processors and VLSI neural chips have been introduced in the commercial market. The number of parallel channels they can handle is limited because of the limited parallel interconnections that can be implemented with 1D electronic wires. High-resolution pattern recognition problems can require a large number of neurons for parallel processing of an image. This paper describes a holographic optical neural network (HONN) that is based on high- resolution volume holographic materials and is capable of performing massive 3D parallel interconnection of tens of thousands of neurons. A HONN with more than 16,000 neurons packaged in an attache case has been developed. Rotation- shift-scale-invariant pattern recognition operations have been demonstrated with this system. System parameters such as the signal-to-noise ratio, dynamic range, and processing speed are discussed.

  9. A REVIEW: OPTICAL CHARACTER RECOGNITION

    OpenAIRE

    Swati Tomar*1 & Amit Kishore2

    2018-01-01

    This paper presents detailed review in the field of Optical Character Recognition. Various techniques are determine that have been proposed to realize the center of character recognition in an optical character recognition system. Even though, sufficient studies and papers are describes the techniques for converting textual content from a paper document into machine readable form. Optical character recognition is a process where the computer understands automatically the image of handwritten ...

  10. Analytic approximations to nonlinear boundary value problems modeling beam-type nano-electromechanical systems

    Energy Technology Data Exchange (ETDEWEB)

    Zou, Li [Dalian Univ. of Technology, Dalian City (China). State Key Lab. of Structural Analysis for Industrial Equipment; Liang, Songxin; Li, Yawei [Dalian Univ. of Technology, Dalian City (China). School of Mathematical Sciences; Jeffrey, David J. [Univ. of Western Ontario, London (Canada). Dept. of Applied Mathematics

    2017-06-01

    Nonlinear boundary value problems arise frequently in physical and mechanical sciences. An effective analytic approach with two parameters is first proposed for solving nonlinear boundary value problems. It is demonstrated that solutions given by the two-parameter method are more accurate than solutions given by the Adomian decomposition method (ADM). It is further demonstrated that solutions given by the ADM can also be recovered from the solutions given by the two-parameter method. The effectiveness of this method is demonstrated by solving some nonlinear boundary value problems modeling beam-type nano-electromechanical systems.

  11. A Classification Framework for Large-Scale Face Recognition Systems

    OpenAIRE

    Zhou, Ziheng; Deravi, Farzin

    2009-01-01

    This paper presents a generic classification framework for large-scale face recognition systems. Within the framework, a data sampling strategy is proposed to tackle the data imbalance when image pairs are sampled from thousands of face images for preparing a training dataset. A modified kernel Fisher discriminant classifier is proposed to make it computationally feasible to train the kernel-based classification method using tens of thousands of training samples. The framework is tested in an...

  12. More than a boundary shift: Perceptual adaptation to foreign-accented speech reshapes the internal structure of phonetic categories.

    Science.gov (United States)

    Xie, Xin; Theodore, Rachel M; Myers, Emily B

    2017-01-01

    The literature on perceptual learning for speech shows that listeners use lexical information to disambiguate phonetically ambiguous speech sounds and that they maintain this new mapping for later recognition of ambiguous sounds for a given talker. Evidence for this kind of perceptual reorganization has focused on phonetic category boundary shifts. Here, we asked whether listeners adjust both category boundaries and internal category structure in rapid adaptation to foreign accents. We investigated the perceptual learning of Mandarin-accented productions of word-final voiced stops in English. After exposure to a Mandarin speaker's productions, native-English listeners' adaptation to the talker was tested in 3 ways: a cross-modal priming task to assess spoken word recognition (Experiment 1), a category identification task to assess shifts in the phonetic boundary (Experiment 2), and a goodness rating task to assess internal category structure (Experiment 3). Following exposure, both category boundary and internal category structure were adjusted; moreover, these prelexical changes facilitated subsequent word recognition. Together, the results demonstrate that listeners' sensitivity to acoustic-phonetic detail in the accented input promoted a dynamic, comprehensive reorganization of their perceptual response as a consequence of exposure to the accented input. We suggest that an examination of internal category structure is important for a complete account of the mechanisms of perceptual learning. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  13. Foundations for a syntatic pattern recognition system for genomic DNA sequences

    Energy Technology Data Exchange (ETDEWEB)

    Searles, D.B.

    1993-03-01

    The goal of the proposed work is the creation of a software system that will perform sophisticated pattern recognition and related functions at a level of abstraction and with expressive power beyond current general-purpose pattern-matching systems for biological sequences; and with a more uniform language, environment, and graphical user interface, and with greater flexibility, extensibility, embeddability, and ability to incorporate other algorithms, than current special-purpose analytic software.

  14. Object Recognition System in Remote Controlled Weapon Station using SIFT and SURF Methods

    Directory of Open Access Journals (Sweden)

    Midriem Mirdanies

    2013-12-01

    Full Text Available Object recognition system using computer vision that is implemented on Remote Controlled Weapon Station (RCWS is discussed. This system will make it easier to identify and shoot targeted object automatically. Algorithm was created to recognize real time multiple objects using two methods i.e. Scale Invariant Feature Transform (SIFT and Speeded Up Robust Features (SURF combined with K-Nearest Neighbors (KNN and Random Sample Consensus (RANSAC for verification. The algorithm is designed to improve object detection to be more robust and to minimize the processing time required. Objects are registered on the system consisting of the armored personnel carrier, tanks, bus, sedan, big foot, and police jeep. In addition, object selection can use mouse to shoot another object that has not been registered on the system. Kinect™ is used to capture RGB images and to find the coordinates x, y, and z of the object. The programming language used is C with visual studio IDE 2010 and opencv libraries. Object recognition program is divided into three parts: 1 reading image from kinect™ and simulation results, 2 object recognition process, and 3 transfer of the object data to the ballistic computer. Communication between programs is performed using shared memory. The detected object data is sent to the ballistic computer via Local Area Network (LAN using winsock for ballistic calculation, and then the motor control system moves the direction of the weapon model to the desired object. The experimental results show that the SIFT method is more suitable because more accurate and faster than SURF with the average processing time to detect one object is 430.2 ms, two object is 618.4 ms, three objects is 682.4 ms, and four objects is 756.2 ms. Object recognition program is able to recognize multi-objects and the data of the identified object can be processed by the ballistic computer in realtime.

  15. Theoretical Aspects of the Patterns Recognition Statistical Theory Used for Developing the Diagnosis Algorithms for Complicated Technical Systems

    Science.gov (United States)

    Obozov, A. A.; Serpik, I. N.; Mihalchenko, G. S.; Fedyaeva, G. A.

    2017-01-01

    In the article, the problem of application of the pattern recognition (a relatively young area of engineering cybernetics) for analysis of complicated technical systems is examined. It is shown that the application of a statistical approach for hard distinguishable situations could be the most effective. The different recognition algorithms are based on Bayes approach, which estimates posteriori probabilities of a certain event and an assumed error. Application of the statistical approach to pattern recognition is possible for solving the problem of technical diagnosis complicated systems and particularly big powered marine diesel engines.

  16. Speech recognition by means of a three-integrated-circuit set

    Energy Technology Data Exchange (ETDEWEB)

    Zoicas, A.

    1983-11-03

    The author uses pattern recognition methods for detecting word boundaries, and monitors incoming speech at 12 millisecond intervals. Frequency is divided into eight bands and analysis is achieved in an analogue interface integrated circuit, a pipeline digital processor and a control integrated circuit. Applications are suggested, including speech input to personal computers. 3 references.

  17. A field study of the accuracy and reliability of a biometric iris recognition system.

    Science.gov (United States)

    Latman, Neal S; Herb, Emily

    2013-06-01

    The iris of the eye appears to satisfy the criteria for a good anatomical characteristic for use in a biometric system. The purpose of this study was to evaluate a biometric iris recognition system: Mobile-Eyes™. The enrollment, verification, and identification applications were evaluated in a field study for accuracy and reliability using both irises of 277 subjects. Independent variables included a wide range of subject demographics, ambient light, and ambient temperature. A sub-set of 35 subjects had alcohol-induced nystagmus. There were 2710 identification and verification attempts, which resulted in 1,501,340 and 5540 iris comparisons respectively. In this study, the system successfully enrolled all subjects on the first attempt. All 277 subjects were successfully verified and identified on the first day of enrollment. None of the current or prior eye conditions prevented enrollment, verification, or identification. All 35 subjects with alcohol-induced nystagmus were successfully verified and identified. There were no false verifications or false identifications. Two conditions were identified that potentially could circumvent the use of iris recognitions systems in general. The Mobile-Eyes™ iris recognition system exhibited accurate and reliable enrollment, verification, and identification applications in this study. It may have special applications in subjects with nystagmus. Copyright © 2012 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.

  18. Ferroelectric properties of tungsten bronze morphotropic phase boundary systems

    International Nuclear Information System (INIS)

    Oliver, J.R.; Neurgaonkar, R.R.; Cross, L.E.; Pennsylvania State Univ., University Park, PA

    1989-01-01

    Tungsten bronze ferroelectrics which have a morphotropic phase boundary (MPB) can have a number or enhanced dielectric, piezoelectric, and electrooptic properties compared to more conventional ferroelectric materials. The structural and ferroelectric properties of several MPB bronze systems are presented, including data from sintered and hot-pressed ceramics, epitaxial thin films, and bulk single crystals. Included among these are three systems which had not been previously identified as morphotropic. The potential advantages and limitations of these MPB systems are discussed, along with considerations of the appropriate growth methods for their possible utilization in optical, piezoelectric, or pyroelectric device applications

  19. Common polymorphism in the oxytocin receptor gene (OXTR) is associated with human social recognition skills.

    Science.gov (United States)

    Skuse, David H; Lori, Adriana; Cubells, Joseph F; Lee, Irene; Conneely, Karen N; Puura, Kaija; Lehtimäki, Terho; Binder, Elisabeth B; Young, Larry J

    2014-02-04

    The neuropeptides oxytocin and vasopressin are evolutionarily conserved regulators of social perception and behavior. Evidence is building that they are critically involved in the development of social recognition skills within rodent species, primates, and humans. We investigated whether common polymorphisms in the genes encoding the oxytocin and vasopressin 1a receptors influence social memory for faces. Our sample comprised 198 families, from the United Kingdom and Finland, in whom a single child had been diagnosed with high-functioning autism. Previous research has shown that impaired social perception, characteristic of autism, extends to the first-degree relatives of autistic individuals, implying heritable risk. Assessments of face recognition memory, discrimination of facial emotions, and direction of gaze detection were standardized for age (7-60 y) and sex. A common SNP in the oxytocin receptor (rs237887) was strongly associated with recognition memory in combined probands, parents, and siblings after correction for multiple comparisons. Homozygotes for the ancestral A allele had impairments in the range -0.6 to -1.15 SD scores, irrespective of their diagnostic status. Our findings imply that a critical role for the oxytocin system in social recognition has been conserved across perceptual boundaries through evolution, from olfaction in rodents to visual memory in humans.

  20. DYNAMIC SURFACE BOUNDARY-CONDITIONS - A SIMPLE BOUNDARY MODEL FOR MOLECULAR-DYNAMICS SIMULATIONS

    NARCIS (Netherlands)

    JUFFER, AH; BERENDSEN, HJC

    1993-01-01

    A simple model for the treatment of boundaries in molecular dynamics simulations is presented. The method involves the positioning of boundary atoms on a surface that surrounds a system of interest. The boundary atoms interact with the inner region and represent the effect of atoms outside the

  1. PALESTINE AUTOMOTIVE LICENSE IDENTITY RECOGNITION FOR INTELLIGENT PARKING SYSTEM

    OpenAIRE

    ANEES ABU SNEINEH; WAEL A. SALAH

    2017-01-01

    Providing employees with protection and security is one of the key concerns of any organization. This goal can be implemented mainly by managing and protecting employees’ cars in the parking area. Therefore, a parking area must be managed and organized with smart technologies and tools that can be applied and integrated in an intelligent parking system. This paper presents the tools based on image recognition technology that can be used to effectively control various parts of a parking sys...

  2. Development of remote handling system based on 3-D shape recognition technique

    International Nuclear Information System (INIS)

    Tomizuka, Chiaki; Takeuchi, Yutaka

    2006-01-01

    In a nuclear facility, the maintenance and repair activities must be done remotely in a radioactive environment. Fuji Electric Systems Co., Ltd. has developed a remote handling system based on 3-D recognition technique. The system recognizes the pose and position of the target to manipulate, and visualizes the scene with the target in 3-D, enabling an operator to handle it easily. This paper introduces the concept and the key features of this system. (author)

  3. Recognition in Programmes for Children with Special Needs

    Directory of Open Access Journals (Sweden)

    Marjeta Šmid

    2016-09-01

    Full Text Available The purpose of this article is to examine the factors that affect the inclusion of pupils in programmes for children with special needs from the perspective of the theory of recognition. The concept of recognition, which includes three aspects of social justice (economic, cultural and political, argues that the institutional arrangements that prevent ‘parity of participation’ in the school social life of the children with special needs are affected not only by economic distribution but also by the patterns of cultural values. A review of the literature shows that the arrangements of education of children with special needs are influenced primarily by the patterns of cultural values of capability and inferiority, as well as stereotypical images of children with special needs. Due to the significant emphasis on learning skills for academic knowledge and grades, less attention is dedicated to factors of recognition and representational character, making it impossible to improve some meaningful elements of inclusion. Any participation of pupils in activities, the voices of the children, visibility of the children due to achievements and the problems of arbitrariness in determining boundaries between programmes are some such elements. Moreover, aided by theories, the actions that could contribute to better inclusion are reviewed. An effective approach to changes would be the creation of transformative conditions for the recognition and balancing of redistribution, recognition, and representation.

  4. Classical system boundaries cannot be determined within quantum Darwinism

    Science.gov (United States)

    Fields, Chris

    Multiple observers who interact with environmental encodings of the states of a macroscopic quantum system S as required by quantum Darwinism cannot demonstrate that they are jointly observing S without a joint a priori assumption of a classical boundary separating S from its environment E. Quantum Darwinism cannot, therefore, be regarded as providing a purely quantum-mechanical explanation of the "emergence" of classicality.

  5. Interacting with mobile devices by fusion eye and hand gestures recognition systems based on decision tree approach

    Science.gov (United States)

    Elleuch, Hanene; Wali, Ali; Samet, Anis; Alimi, Adel M.

    2017-03-01

    Two systems of eyes and hand gestures recognition are used to control mobile devices. Based on a real-time video streaming captured from the device's camera, the first system recognizes the motion of user's eyes and the second one detects the static hand gestures. To avoid any confusion between natural and intentional movements we developed a system to fuse the decision coming from eyes and hands gesture recognition systems. The phase of fusion was based on decision tree approach. We conducted a study on 5 volunteers and the results that our system is robust and competitive.

  6. An automatic speech recognition system with speaker-independent identification support

    Science.gov (United States)

    Caranica, Alexandru; Burileanu, Corneliu

    2015-02-01

    The novelty of this work relies on the application of an open source research software toolkit (CMU Sphinx) to train, build and evaluate a speech recognition system, with speaker-independent support, for voice-controlled hardware applications. Moreover, we propose to use the trained acoustic model to successfully decode offline voice commands on embedded hardware, such as an ARMv6 low-cost SoC, Raspberry PI. This type of single-board computer, mainly used for educational and research activities, can serve as a proof-of-concept software and hardware stack for low cost voice automation systems.

  7. Development of a System for Automatic Recognition of Speech

    Directory of Open Access Journals (Sweden)

    Roman Jarina

    2003-01-01

    Full Text Available The article gives a review of a research on processing and automatic recognition of speech signals (ARR at the Department of Telecommunications of the Faculty of Electrical Engineering, University of iilina. On-going research is oriented to speech parametrization using 2-dimensional cepstral analysis, and to an application of HMMs and neural networks for speech recognition in Slovak language. The article summarizes achieved results and outlines future orientation of our research in automatic speech recognition.

  8. Real-time image restoration for iris recognition systems.

    Science.gov (United States)

    Kang, Byung Jun; Park, Kang Ryoung

    2007-12-01

    In the field of biometrics, it has been reported that iris recognition techniques have shown high levels of accuracy because unique patterns of the human iris, which has very many degrees of freedom, are used. However, because conventional iris cameras have small depth-of-field (DOF) areas, input iris images can easily be blurred, which can lead to lower recognition performance, since iris patterns are transformed by the blurring caused by optical defocusing. To overcome these problems, an autofocusing camera can be used. However, this inevitably increases the cost, size, and complexity of the system. Therefore, we propose a new real-time iris image-restoration method, which can increase the camera's DOF without requiring any additional hardware. This paper presents five novelties as compared to previous works: 1) by excluding eyelash and eyelid regions, it is possible to obtain more accurate focus scores from input iris images; 2) the parameter of the point spread function (PSF) can be estimated in terms of camera optics and measured focus scores; therefore, parameter estimation is more accurate than it has been in previous research; 3) because the PSF parameter can be obtained by using a predetermined equation, iris image restoration can be done in real-time; 4) by using a constrained least square (CLS) restoration filter that considers noise, performance can be greatly enhanced; and 5) restoration accuracy can also be enhanced by estimating the weight value of the noise-regularization term of the CLS filter according to the amount of image blurring. Experimental results showed that iris recognition errors when using the proposed restoration method were greatly reduced as compared to those results achieved without restoration or those achieved using previous iris-restoration methods.

  9. Authentication: From Passwords to Biometrics: An implementation of a speaker recognition system on Android

    OpenAIRE

    Heimark, Erlend

    2012-01-01

    We implement a biometric authentication system on the Android platform, which is based on text-dependent speaker recognition. The Android version used in the application is Android 4.0. The application makes use of the Modular Audio Recognition Framework, from which many of the algorithms are adapted in the processes of preprocessing and feature extraction. In addition, we employ the Dynamic Time Warping (DTW) algorithm for the comparison of different voice features. A training procedure is i...

  10. A Review on Video-Based Human Activity Recognition

    Directory of Open Access Journals (Sweden)

    Shian-Ru Ke

    2013-06-01

    Full Text Available This review article surveys extensively the current progresses made toward video-based human activity recognition. Three aspects for human activity recognition are addressed including core technology, human activity recognition systems, and applications from low-level to high-level representation. In the core technology, three critical processing stages are thoroughly discussed mainly: human object segmentation, feature extraction and representation, activity detection and classification algorithms. In the human activity recognition systems, three main types are mentioned, including single person activity recognition, multiple people interaction and crowd behavior, and abnormal activity recognition. Finally the domains of applications are discussed in detail, specifically, on surveillance environments, entertainment environments and healthcare systems. Our survey, which aims to provide a comprehensive state-of-the-art review of the field, also addresses several challenges associated with these systems and applications. Moreover, in this survey, various applications are discussed in great detail, specifically, a survey on the applications in healthcare monitoring systems.

  11. Gait recognition based on integral outline

    Science.gov (United States)

    Ming, Guan; Fang, Lv

    2017-02-01

    Biometric identification technology replaces traditional security technology, which has become a trend, and gait recognition also has become a hot spot of research because its feature is difficult to imitate and theft. This paper presents a gait recognition system based on integral outline of human body. The system has three important aspects: the preprocessing of gait image, feature extraction and classification. Finally, using a method of polling to evaluate the performance of the system, and summarizing the problems existing in the gait recognition and the direction of development in the future.

  12. Point spread function engineering for iris recognition system design.

    Science.gov (United States)

    Ashok, Amit; Neifeld, Mark A

    2010-04-01

    Undersampling in the detector array degrades the performance of iris-recognition imaging systems. We find that an undersampling of 8 x 8 reduces the iris-recognition performance by nearly a factor of 4 (on CASIA iris database), as measured by the false rejection ratio (FRR) metric. We employ optical point spread function (PSF) engineering via a Zernike phase mask in conjunction with multiple subpixel shifted image measurements (frames) to mitigate the effect of undersampling. A task-specific optimization framework is used to engineer the optical PSF and optimize the postprocessing parameters to minimize the FRR. The optimized Zernike phase enhanced lens (ZPEL) imager design with one frame yields an improvement of nearly 33% relative to a thin observation module by bounded optics (TOMBO) imager with one frame. With four frames the optimized ZPEL imager achieves a FRR equal to that of the conventional imager without undersampling. Further, the ZPEL imager design using 16 frames yields a FRR that is actually 15% lower than that obtained with the conventional imager without undersampling.

  13. Markov Models for Handwriting Recognition

    CERN Document Server

    Plotz, Thomas

    2011-01-01

    Since their first inception, automatic reading systems have evolved substantially, yet the recognition of handwriting remains an open research problem due to its substantial variation in appearance. With the introduction of Markovian models to the field, a promising modeling and recognition paradigm was established for automatic handwriting recognition. However, no standard procedures for building Markov model-based recognizers have yet been established. This text provides a comprehensive overview of the application of Markov models in the field of handwriting recognition, covering both hidden

  14. Slip patterns and preferred dislocation boundary planes

    DEFF Research Database (Denmark)

    Winther, G.

    2003-01-01

    The planes of deformation induced extended planar dislocation boundaries are analysed in two different co-ordinate systems, namely the macroscopic system defined by the deformation axes and the crystallographic system given by the crystallographic lattice. The analysis covers single and polycryst......The planes of deformation induced extended planar dislocation boundaries are analysed in two different co-ordinate systems, namely the macroscopic system defined by the deformation axes and the crystallographic system given by the crystallographic lattice. The analysis covers single...... and polycrystals of fcc metals in three deformation modes (rolling, tension and torsion). In the macroscopic system, boundaries lie close to the macroscopically most stressed planes. In the crystallographic system, the boundary plane depends on the grain/crystal orientation. The boundary planes in both co......-ordinate systems are rationalised based on the slip. The more the slip is concentrated on a slip plane, the closer the boundaries lie to this. The macroscopic preference arises from the macroscopic directionality of the slip. The established relations are applied to (a) prediction of boundary planes from slip...

  15. Pupil dilation during recognition memory: Isolating unexpected recognition from judgment uncertainty.

    Science.gov (United States)

    Mill, Ravi D; O'Connor, Akira R; Dobbins, Ian G

    2016-09-01

    Optimally discriminating familiar from novel stimuli demands a decision-making process informed by prior expectations. Here we demonstrate that pupillary dilation (PD) responses during recognition memory decisions are modulated by expectations, and more specifically, that pupil dilation increases for unexpected compared to expected recognition. Furthermore, multi-level modeling demonstrated that the time course of the dilation during each individual trial contains separable early and late dilation components, with the early amplitude capturing unexpected recognition, and the later trailing slope reflecting general judgment uncertainty or effort. This is the first demonstration that the early dilation response during recognition is dependent upon observer expectations and that separate recognition expectation and judgment uncertainty components are present in the dilation time course of every trial. The findings provide novel insights into adaptive memory-linked orienting mechanisms as well as the general cognitive underpinnings of the pupillary index of autonomic nervous system activity. Copyright © 2016 Elsevier B.V. All rights reserved.

  16. Data structures, computer graphics, and pattern recognition

    CERN Document Server

    Klinger, A; Kunii, T L

    1977-01-01

    Data Structures, Computer Graphics, and Pattern Recognition focuses on the computer graphics and pattern recognition applications of data structures methodology.This book presents design related principles and research aspects of the computer graphics, system design, data management, and pattern recognition tasks. The topics include the data structure design, concise structuring of geometric data for computer aided design, and data structures for pattern recognition algorithms. The survey of data structures for computer graphics systems, application of relational data structures in computer gr

  17. Nonintrusive Finger-Vein Recognition System Using NIR Image Sensor and Accuracy Analyses According to Various Factors

    Directory of Open Access Journals (Sweden)

    Tuyen Danh Pham

    2015-07-01

    Full Text Available Biometrics is a technology that enables an individual person to be identified based on human physiological and behavioral characteristics. Among biometrics technologies, face recognition has been widely used because of its advantages in terms of convenience and non-contact operation. However, its performance is affected by factors such as variation in the illumination, facial expression, and head pose. Therefore, fingerprint and iris recognitions are preferred alternatives. However, the performance of the former can be adversely affected by the skin condition, including scarring and dryness. In addition, the latter has the disadvantages of high cost, large system size, and inconvenience to the user, who has to align their eyes with the iris camera. In an attempt to overcome these problems, finger-vein recognition has been vigorously researched, but an analysis of its accuracies according to various factors has not received much attention. Therefore, we propose a nonintrusive finger-vein recognition system using a near infrared (NIR image sensor and analyze its accuracies considering various factors. The experimental results obtained with three databases showed that our system can be operated in real applications with high accuracy; and the dissimilarity of the finger-veins of different people is larger than that of the finger types and hands.

  18. Nonintrusive Finger-Vein Recognition System Using NIR Image Sensor and Accuracy Analyses According to Various Factors.

    Science.gov (United States)

    Pham, Tuyen Danh; Park, Young Ho; Nguyen, Dat Tien; Kwon, Seung Yong; Park, Kang Ryoung

    2015-07-13

    Biometrics is a technology that enables an individual person to be identified based on human physiological and behavioral characteristics. Among biometrics technologies, face recognition has been widely used because of its advantages in terms of convenience and non-contact operation. However, its performance is affected by factors such as variation in the illumination, facial expression, and head pose. Therefore, fingerprint and iris recognitions are preferred alternatives. However, the performance of the former can be adversely affected by the skin condition, including scarring and dryness. In addition, the latter has the disadvantages of high cost, large system size, and inconvenience to the user, who has to align their eyes with the iris camera. In an attempt to overcome these problems, finger-vein recognition has been vigorously researched, but an analysis of its accuracies according to various factors has not received much attention. Therefore, we propose a nonintrusive finger-vein recognition system using a near infrared (NIR) image sensor and analyze its accuracies considering various factors. The experimental results obtained with three databases showed that our system can be operated in real applications with high accuracy; and the dissimilarity of the finger-veins of different people is larger than that of the finger types and hands.

  19. Atmospheric Boundary Layer Modeling for Combined Meteorology and Air Quality Systems

    Science.gov (United States)

    Atmospheric Eulerian grid models for mesoscale and larger applications require sub-grid models for turbulent vertical exchange processes, particularly within the Planetary Boundary Layer (PSL). In combined meteorology and air quality modeling systems consistent PSL modeling of wi...

  20. Pipeline Structural Damage Detection Using Self-Sensing Technology and PNN-Based Pattern Recognition

    International Nuclear Information System (INIS)

    Lee, Chang Gil; Park, Woong Ki; Park, Seung Hee

    2011-01-01

    In a structure, damage can occur at several scales from micro-cracking to corrosion or loose bolts. This makes the identification of damage difficult with one mode of sensing. Hence, a multi-mode actuated sensing system is proposed based on a self-sensing circuit using a piezoelectric sensor. In the self sensing-based multi-mode actuated sensing, one mode provides a wide frequency-band structural response from the self-sensed impedance measurement and the other mode provides a specific frequency-induced structural wavelet response from the self-sensed guided wave measurement. In this study, an experimental study on the pipeline system is carried out to verify the effectiveness and the robustness of the proposed structural health monitoring approach. Different types of structural damage are artificially inflicted on the pipeline system. To classify the multiple types of structural damage, a supervised learning-based statistical pattern recognition is implemented by composing a two-dimensional space using the damage indices extracted from the impedance and guided wave features. For more systematic damage classification, several control parameters to determine an optimal decision boundary for the supervised learning-based pattern recognition are optimized. Finally, further research issues will be discussed for real-world implementation of the proposed approach

  1. Molecular recognition at methyl methacrylate/n-butyl acrylate (MMA/nBA) monomer unit boundaries of phospholipids at p-MMA/nBA copolymer surfaces.

    Science.gov (United States)

    Yu, Min; Urban, Marek W; Sheng, Yinghong; Leszczynski, Jerzy

    2008-09-16

    Lipid structural features and their interactions with proteins provide a useful vehicle for further advances in membrane proteins research. To mimic one of potential lipid-protein interactions we synthesized poly(methyl methacrylate/ n-butyl acrylate) (p-MMA/nBA) colloidal particles that were stabilized by phospholipid (PLs). Upon the particle coalescence, PL stratification resulted in the formation of surface localized ionic clusters (SLICs). These entities are capable of recognizing MMA/nBA monomer interfaces along the p-MMA/nBA copolymer backbone and form crystalline SLICs at the monomer interface. By utilizing attenuated total reflectance Fourier transform infrared (ATR FT-IR) spectroscopy and selected area electron diffraction (SAD) combined with ab initio calculations, studies were conducted that identified the origin of SLICs as well as their structural features formed on the surface of p-MMA/nBA copolymer films stabilized by 1,2-dilauroyl-sn-glycero-3-phosphocholine (DLPC) PL. Specific entities responsible for SLIC formation are selective noncovalent bonds of anionic phosphate and cationic quaternary ammonium segments of DLPC that interact with two neighboring carbonyl groups of nBA and MMA monomers of the p-MMA/nBA polymer backbone. To the best of our knowledge this is the first example of molecular recognition facilitated by coalescence of copolymer colloidal particles and the ability of PLs to form SLICs at the boundaries of the neighboring MMA and nBA monomer units of the p-MMA/nBA chain. The dominating noncovalent bonds responsible for the molecular recognition is a combination of H-bonding and electrostatic interactions.

  2. Asymptotic behaviour of solutions of the first boundary-value problem for strongly hyperbolic systems near a conical point at the boundary of the domain

    International Nuclear Information System (INIS)

    Hung, Nguyen M

    1999-01-01

    An existence and uniqueness theorem for generalized solutions of the first initial-boundary-value problem for strongly hyperbolic systems in bounded domains is established. The question of estimates in Sobolev spaces of the derivatives with respect to time of the generalized solution is discussed. It is shown that the smoothness of generalized solutions with respect to time is independent of the structure of the boundary of the domain but depends on the coefficients of the right-hand side. Results on the smoothness of the generalized solution and its asymptotic behaviour in a neighbourhood of a conical boundary point are also obtained

  3. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    Science.gov (United States)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  4. Boundary methods for mode estimation

    Science.gov (United States)

    Pierson, William E., Jr.; Ulug, Batuhan; Ahalt, Stanley C.

    1999-08-01

    This paper investigates the use of Boundary Methods (BMs), a collection of tools used for distribution analysis, as a method for estimating the number of modes associated with a given data set. Model order information of this type is required by several pattern recognition applications. The BM technique provides a novel approach to this parameter estimation problem and is comparable in terms of both accuracy and computations to other popular mode estimation techniques currently found in the literature and automatic target recognition applications. This paper explains the methodology used in the BM approach to mode estimation. Also, this paper quickly reviews other common mode estimation techniques and describes the empirical investigation used to explore the relationship of the BM technique to other mode estimation techniques. Specifically, the accuracy and computational efficiency of the BM technique are compared quantitatively to the a mixture of Gaussian (MOG) approach and a k-means approach to model order estimation. The stopping criteria of the MOG and k-means techniques is the Akaike Information Criteria (AIC).

  5. Solutions Stability of Initial Boundary Problem, Modeling of Dynamics of Some Discrete Continuum Mechanical System

    Directory of Open Access Journals (Sweden)

    D. A. Eliseev

    2015-01-01

    Full Text Available The solution stability of an initial boundary problem for a linear hybrid system of differential equations, which models the rotation of a rigid body with two elastic rods located in the same plane is studied in the paper. To an axis passing through the mass center of the rigid body perpendicularly to the rods location plane is applied the stabilizing moment proportional to the angle of the system rotation, derivative of the angle, integral of the angle. The external moment provides a feedback. A method of studying the behavior of solutions of the initial boundary problem is proposed. This method allows to exclude from the hybrid system of differential equations partial differential equations, which describe the dynamics of distributed elements of a mechanical system. It allows us to build one equation for an angle of the system rotation. Its characteristic equation defines the stability of solutions of all the system. In the space of feedback-coefficients the areas that provide the asymptotic stability of solutions of the initial boundary problem are built up.

  6. Implementation theory of distortion-invariant pattern recognition for optical and digital signal processing systems

    Science.gov (United States)

    Lhamon, Michael Earl

    A pattern recognition system which uses complex correlation filter banks requires proportionally more computational effort than single-real valued filters. This introduces increased computation burden but also introduces a higher level of parallelism, that common computing platforms fail to identify. As a result, we consider algorithm mapping to both optical and digital processors. For digital implementation, we develop computationally efficient pattern recognition algorithms, referred to as, vector inner product operators that require less computational effort than traditional fast Fourier methods. These algorithms do not need correlation and they map readily onto parallel digital architectures, which imply new architectures for optical processors. These filters exploit circulant-symmetric matrix structures of the training set data representing a variety of distortions. By using the same mathematical basis as with the vector inner product operations, we are able to extend the capabilities of more traditional correlation filtering to what we refer to as "Super Images". These "Super Images" are used to morphologically transform a complicated input scene into a predetermined dot pattern. The orientation of the dot pattern is related to the rotational distortion of the object of interest. The optical implementation of "Super Images" yields feature reduction necessary for using other techniques, such as artificial neural networks. We propose a parallel digital signal processor architecture based on specific pattern recognition algorithms but general enough to be applicable to other similar problems. Such an architecture is classified as a data flow architecture. Instead of mapping an algorithm to an architecture, we propose mapping the DSP architecture to a class of pattern recognition algorithms. Today's optical processing systems have difficulties implementing full complex filter structures. Typically, optical systems (like the 4f correlators) are limited to phase

  7. Improved RGB-D-T based Face Recognition

    DEFF Research Database (Denmark)

    Oliu Simon, Marc; Corneanu, Ciprian; Nasrollahi, Kamal

    2016-01-01

    years. At the same time a multimodal facial recognition is a promising approach. This paper combines the latest successes in both directions by applying deep learning Convolutional Neural Networks (CNN) to the multimodal RGB-D-T based facial recognition problem outperforming previously published results......Reliable facial recognition systems are of crucial importance in various applications from entertainment to security. Thanks to the deep-learning concepts introduced in the field, a significant improvement in the performance of the unimodal facial recognition systems has been observed in the recent...

  8. Infinite number of integrals of motion in classically integrable system with boundary: Pt.2

    International Nuclear Information System (INIS)

    Chen Yixin; Luo Xudong

    1998-01-01

    In Affine Toda field theory, links among three generating functions for integrals of motion derived from Part (I) are studied, and some classically integrable boundary conditions are obtained. An infinite number of integrals of motion are calculated in ZMS model with quasi-periodic condition. The authors find the classically integrable boundary conditions and K +- matrices of ZMS model with independent boundary conditions on each end. It is identified that an infinite number of integrals of motion does exist and one of them is the Hamiltonian, so this system is completely integrable

  9. First-principle proof of the modified collision boundary conditions for the hard-sphere system

    International Nuclear Information System (INIS)

    Tessarotto, Massimo; Cremaschini, Claudio

    2014-01-01

    A fundamental issue lying at the foundation of classical statistical mechanics is the determination of the collision boundary conditions that characterize the dynamical evolution of multi-particle probability density functions (PDF) and are applicable to systems of hard-spheres undergoing multiple elastic collisions. In this paper it is proved that, when the deterministic N-body PDF is included in the class of admissible solutions of the Liouville equation, the customary form of collision boundary conditions adopted in previous literature becomes physically inconsistent and must actually be replaced by suitably modified collision boundary conditions.

  10. Two-dimensional shape recognition using oriented-polar representation

    Science.gov (United States)

    Hu, Neng-Chung; Yu, Kuo-Kan; Hsu, Yung-Li

    1997-10-01

    To deal with such a problem as object recognition of position, scale, and rotation invariance (PSRI), we utilize some PSRI properties of images obtained from objects, for example, the centroid of the image. The corresponding position of the centroid to the boundary of the image is invariant in spite of rotation, scale, and translation of the image. To obtain the information of the image, we use the technique similar to Radon transform, called the oriented-polar representation of a 2D image. In this representation, two specific points, the centroid and the weighted mean point, are selected to form an initial ray, then the image is sampled with N angularly equispaced rays departing from the initial rays. Each ray contains a number of intersections and the distance information obtained from the centroid to the intersections. The shape recognition algorithm is based on the least total error of these two items of information. Together with a simple noise removal and a typical backpropagation neural network, this algorithm is simple, but the PSRI is achieved with a high recognition rate.

  11. Explicit formulation for natural frequencies of double-beam system with arbitrary boundary conditions

    Energy Technology Data Exchange (ETDEWEB)

    Mirzabeigy, Alborz; Madoliat, Reza [Iran University of Science and Technology, Narmak, Tehran (Iran, Islamic Republic of); Dabbagh, Vahid [University of Malaya, Kuala Lumpur (Malaysia)

    2017-02-15

    In this paper, free transverse vibration of two parallel beams connected through Winkler type elastic layer is investigated. Euler- Bernoulli beam hypothesis has been applied and it is assumed that boundary conditions of upper and lower beams are similar while arbitrary without any limitation even for non-ideal boundary conditions. Material properties and cross-section geometry of beams could be different from each other. The motion of the system is described by a homogeneous set of two partial differential equations, which is solved by using the classical Bernoulli-Fourier method. Explicit expressions are derived for the natural frequencies. In order to verify accuracy of results, the problem once again solved using modified Adomian decomposition method. Comparison between results indicates excellent accuracy of proposed formulation for any arbitrary boundary conditions. Derived explicit formulation is simplest method to determine natural frequencies of double-beam systems with high level of accuracy in comparison with other methods in literature.

  12. A neural network based artificial vision system for licence plate recognition.

    Science.gov (United States)

    Draghici, S

    1997-02-01

    This paper presents a neural network based artificial vision system able to analyze the image of a car given by a camera, locate the registration plate and recognize the registration number of the car. The paper describes in detail various practical problems encountered in implementing this particular application and the solutions used to solve them. The main features of the system presented are: controlled stability-plasticity behavior, controlled reliability threshold, both off-line and on-line learning, self assessment of the output reliability and high reliability based on high level multiple feedback. The system has been designed using a modular approach. Sub-modules can be upgraded and/or substituted independently, thus making the system potentially suitable in a large variety of vision applications. The OCR engine was designed as an interchangeable plug-in module. This allows the user to choose an OCR engine which is suited to the particular application and to upgrade it easily in the future. At present, there are several versions of this OCR engine. One of them is based on a fully connected feedforward artificial neural network with sigmoidal activation functions. This network can be trained with various training algorithms such as error backpropagation. An alternative OCR engine is based on the constraint based decomposition (CBD) training architecture. The system has showed the following performances (on average) on real-world data: successful plate location and segmentation about 99%, successful character recognition about 98% and successful recognition of complete registration plates about 80%.

  13. Neuropeptide S interacts with the basolateral amygdala noradrenergic system in facilitating object recognition memory consolidation.

    Science.gov (United States)

    Han, Ren-Wen; Xu, Hong-Jiao; Zhang, Rui-San; Wang, Pei; Chang, Min; Peng, Ya-Li; Deng, Ke-Yu; Wang, Rui

    2014-01-01

    The noradrenergic activity in the basolateral amygdala (BLA) was reported to be involved in the regulation of object recognition memory. As the BLA expresses high density of receptors for Neuropeptide S (NPS), we investigated whether the BLA is involved in mediating NPS's effects on object recognition memory consolidation and whether such effects require noradrenergic activity. Intracerebroventricular infusion of NPS (1nmol) post training facilitated 24-h memory in a mouse novel object recognition task. The memory-enhancing effect of NPS could be blocked by the β-adrenoceptor antagonist propranolol. Furthermore, post-training intra-BLA infusions of NPS (0.5nmol/side) improved 24-h memory for objects, which was impaired by co-administration of propranolol (0.5μg/side). Taken together, these results indicate that NPS interacts with the BLA noradrenergic system in improving object recognition memory during consolidation. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Face Prediction Model for an Automatic Age-invariant Face Recognition System

    OpenAIRE

    Yadav, Poonam

    2015-01-01

    07.11.14 KB. Emailed author re copyright. Author says that copyright is retained by author. Ok to add to spiral Automated face recognition and identi cation softwares are becoming part of our daily life; it nds its abode not only with Facebooks auto photo tagging, Apples iPhoto, Googles Picasa, Microsofts Kinect, but also in Homeland Security Departments dedicated biometric face detection systems. Most of these automatic face identification systems fail where the e ects of aging come into...

  15. NutriNet: A Deep Learning Food and Drink Image Recognition System for Dietary Assessment.

    Science.gov (United States)

    Mezgec, Simon; Koroušić Seljak, Barbara

    2017-06-27

    Automatic food image recognition systems are alleviating the process of food-intake estimation and dietary assessment. However, due to the nature of food images, their recognition is a particularly challenging task, which is why traditional approaches in the field have achieved a low classification accuracy. Deep neural networks have outperformed such solutions, and we present a novel approach to the problem of food and drink image detection and recognition that uses a newly-defined deep convolutional neural network architecture, called NutriNet. This architecture was tuned on a recognition dataset containing 225,953 512 × 512 pixel images of 520 different food and drink items from a broad spectrum of food groups, on which we achieved a classification accuracy of 86 . 72 % , along with an accuracy of 94 . 47 % on a detection dataset containing 130 , 517 images. We also performed a real-world test on a dataset of self-acquired images, combined with images from Parkinson's disease patients, all taken using a smartphone camera, achieving a top-five accuracy of 55 % , which is an encouraging result for real-world images. Additionally, we tested NutriNet on the University of Milano-Bicocca 2016 (UNIMIB2016) food image dataset, on which we improved upon the provided baseline recognition result. An online training component was implemented to continually fine-tune the food and drink recognition model on new images. The model is being used in practice as part of a mobile app for the dietary assessment of Parkinson's disease patients.

  16. A Depth Video Sensor-Based Life-Logging Human Activity Recognition System for Elderly Care in Smart Indoor Environments

    Directory of Open Access Journals (Sweden)

    Ahmad Jalal

    2014-07-01

    Full Text Available Recent advancements in depth video sensors technologies have made human activity recognition (HAR realizable for elderly monitoring applications. Although conventional HAR utilizes RGB video sensors, HAR could be greatly improved with depth video sensors which produce depth or distance information. In this paper, a depth-based life logging HAR system is designed to recognize the daily activities of elderly people and turn these environments into an intelligent living space. Initially, a depth imaging sensor is used to capture depth silhouettes. Based on these silhouettes, human skeletons with joint information are produced which are further used for activity recognition and generating their life logs. The life-logging system is divided into two processes. Firstly, the training system includes data collection using a depth camera, feature extraction and training for each activity via Hidden Markov Models. Secondly, after training, the recognition engine starts to recognize the learned activities and produces life logs. The system was evaluated using life logging features against principal component and independent component features and achieved satisfactory recognition rates against the conventional approaches. Experiments conducted on the smart indoor activity datasets and the MSRDailyActivity3D dataset show promising results. The proposed system is directly applicable to any elderly monitoring system, such as monitoring healthcare problems for elderly people, or examining the indoor activities of people at home, office or hospital.

  17. A depth video sensor-based life-logging human activity recognition system for elderly care in smart indoor environments.

    Science.gov (United States)

    Jalal, Ahmad; Kamal, Shaharyar; Kim, Daijin

    2014-07-02

    Recent advancements in depth video sensors technologies have made human activity recognition (HAR) realizable for elderly monitoring applications. Although conventional HAR utilizes RGB video sensors, HAR could be greatly improved with depth video sensors which produce depth or distance information. In this paper, a depth-based life logging HAR system is designed to recognize the daily activities of elderly people and turn these environments into an intelligent living space. Initially, a depth imaging sensor is used to capture depth silhouettes. Based on these silhouettes, human skeletons with joint information are produced which are further used for activity recognition and generating their life logs. The life-logging system is divided into two processes. Firstly, the training system includes data collection using a depth camera, feature extraction and training for each activity via Hidden Markov Models. Secondly, after training, the recognition engine starts to recognize the learned activities and produces life logs. The system was evaluated using life logging features against principal component and independent component features and achieved satisfactory recognition rates against the conventional approaches. Experiments conducted on the smart indoor activity datasets and the MSRDailyActivity3D dataset show promising results. The proposed system is directly applicable to any elderly monitoring system, such as monitoring healthcare problems for elderly people, or examining the indoor activities of people at home, office or hospital.

  18. Simple test system for single molecule recognition force microscopy

    International Nuclear Information System (INIS)

    Riener, Christian K.; Stroh, Cordula M.; Ebner, Andreas; Klampfl, Christian; Gall, Alex A.; Romanin, Christoph; Lyubchenko, Yuri L.; Hinterdorfer, Peter; Gruber, Hermann J.

    2003-01-01

    We have established an easy-to-use test system for detecting receptor-ligand interactions on the single molecule level using atomic force microscopy (AFM). For this, avidin-biotin, probably the best characterized receptor-ligand pair, was chosen. AFM sensors were prepared containing tethered biotin molecules at sufficiently low surface concentrations appropriate for single molecule studies. A biotin tether, consisting of a 6 nm poly(ethylene glycol) (PEG) chain and a functional succinimide group at the other end, was newly synthesized and covalently coupled to amine-functionalized AFM tips. In particular, PEG 800 diamine was glutarylated, the mono-adduct NH 2 -PEG-COOH was isolated by ion exchange chromatography and reacted with biotin succinimidylester to give biotin-PEG-COOH which was then activated as N-hydroxysuccinimide (NHS) ester to give the biotin-PEG-NHS conjugate which was coupled to the aminofunctionalized AFM tip. The motional freedom provided by PEG allows for free rotation of the biotin molecule on the AFM sensor and for specific binding to avidin which had been adsorbed to mica surfaces via electrostatic interactions. Specific avidin-biotin recognition events were discriminated from nonspecific tip-mica adhesion by their typical unbinding force (∼40 pN at 1.4 nN/s loading rate), unbinding length (<13 nm), the characteristic nonlinear force-distance relation of the PEG linker, and by specific block with excess of free d-biotin. The convenience of the test system allowed to evaluate, and compare, different methods and conditions of tip aminofunctionalization with respect to specific binding and nonspecific adhesion. It is concluded that this system is well suited as calibration or start-up kit for single molecule recognition force microscopy

  19. Arrhythmia Classification Based on Multi-Domain Feature Extraction for an ECG Recognition System

    Directory of Open Access Journals (Sweden)

    Hongqiang Li

    2016-10-01

    Full Text Available Automatic recognition of arrhythmias is particularly important in the diagnosis of heart diseases. This study presents an electrocardiogram (ECG recognition system based on multi-domain feature extraction to classify ECG beats. An improved wavelet threshold method for ECG signal pre-processing is applied to remove noise interference. A novel multi-domain feature extraction method is proposed; this method employs kernel-independent component analysis in nonlinear feature extraction and uses discrete wavelet transform to extract frequency domain features. The proposed system utilises a support vector machine classifier optimized with a genetic algorithm to recognize different types of heartbeats. An ECG acquisition experimental platform, in which ECG beats are collected as ECG data for classification, is constructed to demonstrate the effectiveness of the system in ECG beat classification. The presented system, when applied to the MIT-BIH arrhythmia database, achieves a high classification accuracy of 98.8%. Experimental results based on the ECG acquisition experimental platform show that the system obtains a satisfactory classification accuracy of 97.3% and is able to classify ECG beats efficiently for the automatic identification of cardiac arrhythmias.

  20. K/T boundary stratigraphy: Evidence for multiple impacts and a possible comet stream

    Science.gov (United States)

    Shoemaker, E. M.; Izett, G. A.

    1992-01-01

    A critical set of observations bearing on the K/T boundary events were obtained from several dozen sites in western North America. Thin strata at and adjacent to the K/T boundary are locally preserved in association with coal beds at these sites. The strata were laid down in local shallow basins that were either intermittently flooded or occupied by very shallow ponds. Detailed examination of the stratigraphy at numerous sites led to the recognition of two distinct strata at the boundary. From the time that the two strata were first recognized, E.M. Shoemaker has maintained that they record two impact events. We report some of the evidence that supports this conclusion.

  1. Agriculture production as a major driver of the earth system exceeding planetary boundaries

    DEFF Research Database (Denmark)

    Campbell, Bruce Morgan; Beare, Douglas J.; Bennett, Elena M.

    2017-01-01

    We explore the role of agriculture in destabilizing the Earth system at the planetary scale, through examining nine planetary boundaries, or “safe limits”: land-system change, freshwater use, biogeochemical flows, biosphere integrity, climate change, ocean acidification, stratospheric ozone...

  2. The effect of grain boundary chemistry on the slip transmission process through grain boundaries in Ni3Al

    International Nuclear Information System (INIS)

    Robertson, I.M.; Lee, T.C.; Subramanian, R.; Birnbaum, H.K.

    1992-01-01

    This paper reports on the conditions established in disordered FCC systems for predicting the slip system that will be activated by a grain boundary to relieve a local stress concentration that have been applied to the ordered FCC alloy Ni 3 Al. The slip transfer behavior in hypo-stoichiometric Ni 3 Al with (0.2 at. %B) and without boron was directly observed by performing the deformation experiments in situ in the transmission electron microscope. In the boron-free and boron-doped alloys, lattice dislocations were incorporated in the grain boundary, but did not show evidence of dissociation to grain boundary dislocations or of movement in the grain boundary plane. The stress concentration associated with the dislocation pileup at the grain boundary are relieved by the emission of dislocations from the grain boundary in the boron-doped alloy. The slip system initiated in the adjoining grain obeyed the conditions established for disordered FCC systems. In the boron-free alloy, the primary stress relief mechanism was grain-boundary cracking, although dislocation emission from the grain boundary also occurred and accompanied intergranular crack advance

  3. Ethical aspects of face recognition systems in public places.

    NARCIS (Netherlands)

    Brey, Philip A.E.

    2004-01-01

    This essay examines ethical aspects of the use of facial recognition technology for surveillance purposes in public and semipublic areas, focusing particularly on the balance between security and privacy and civil liberties. As a case study, the FaceIt facial recognition engine of Identix

  4. Sign Language Recognition System using Neural Network for Digital Hardware Implementation

    International Nuclear Information System (INIS)

    Vargas, Lorena P; Barba, Leiner; Torres, C O; Mattos, L

    2011-01-01

    This work presents an image pattern recognition system using neural network for the identification of sign language to deaf people. The system has several stored image that show the specific symbol in this kind of language, which is employed to teach a multilayer neural network using a back propagation algorithm. Initially, the images are processed to adapt them and to improve the performance of discriminating of the network, including in this process of filtering, reduction and elimination noise algorithms as well as edge detection. The system is evaluated using the signs without including movement in their representation.

  5. Individual recognition of social rank and social memory performance depends on a functional circadian system.

    Science.gov (United States)

    Müller, L; Weinert, D

    2016-11-01

    In a natural environment, social abilities of an animal are important for its survival. Particularly, it must recognize its own social rank and the social rank of a conspecific and have a good social memory. While the role of the circadian system for object and spatial recognition and memory is well known, the impact of the social rank and circadian disruptions on social recognition and memory were not investigated so far. In the present study, individual recognition of social rank and social memory performance of Djungarian hamsters revealing different circadian phenotypes were investigated. Wild type (WT) animals show a clear and well-synchronized daily activity rhythm, whereas in arrhythmic (AR) hamsters, the suprachiasmatic nuclei (SCN) do not generate a circadian signal. The aim of the study was to investigate putative consequences of these deteriorations in the circadian system for animalś cognitive abilities. Hamsters were bred and kept under standardized housing conditions with food and water ad libitum and a 14l/10 D lighting regimen. Experimental animals were assigned to different groups (WT and AR) according to their activity pattern obtained by means of infrared motion sensors. Before the experiments, the animals were given to develop a dominant-subordinate relationship in a dyadic encounter. Experiment 1 dealt with individual recognition of social rank. Subordinate and dominant hamsters were tested in an open arena for their behavioral responses towards a familiar (known from the agonistic encounters) or an unfamiliar hamster (from another agonistic encounter) which had the same or an opposite social rank. The investigation time depended on the social rank of the WT subject hamster and its familiarity with the stimulus animal. Both subordinate and dominant WT hamsters preferred an unfamiliar subordinate stimulus animal. In contrast, neither subordinate nor dominant AR hamsters preferred any of the stimulus animals. Thus, disruptions in circadian

  6. Methodology for identifying boundaries of systems important to safety in CANDU nuclear power plants

    International Nuclear Information System (INIS)

    Therrien, S.; Komljenovic, D.; Therrien, P.; Ruest, C.; Prevost, P.; Vaillancourt, R.

    2007-01-01

    This paper presents a methodology developed to identify the boundaries of the systems important to safety (SIS) at the Gentilly-2 Nuclear Power Plant (NPP), Hydro-Quebec. The SIS boundaries identification considers nuclear safety only. Components that are not identified as important to safety are systematically identified as related to safety. A global assessment process such as WANO/INPO AP-913 'Equipment Reliability Process' will be needed to implement adequate changes in the management rules of those components. The paper depicts results in applying the methodology to the Shutdown Systems 1 and 2 (SDS 1, 2), and to the Emergency Core Cooling System (ECCS). This validation process enabled fine tuning the methodology, performing a better estimate of the effort required to evaluate a system, and identifying components important to safety of these systems. (author)

  7. Computer versus paper system for recognition and management of sepsis in surgical intensive care.

    Science.gov (United States)

    Croft, Chasen A; Moore, Frederick A; Efron, Philip A; Marker, Peggy S; Gabrielli, Andrea; Westhoff, Lynn S; Lottenberg, Lawrence; Jordan, Janeen; Klink, Victoria; Sailors, R Matthew; McKinley, Bruce A

    2014-02-01

    A system to provide surveillance, diagnosis, and protocolized management of surgical intensive care unit (SICU) sepsis was undertaken as a performance improvement project. A system for sepsis management was implemented for SICU patients using paper followed by a computerized system. The hypothesis was that the computerized system would be associated with improved process and outcomes. A system was designed to provide early recognition and guide patient-specific management of sepsis including (1) modified early warning signs-sepsis recognition score (MEWS-SRS; summative point score of ranges of vital signs, mental status, white blood cell count; after every 4 hours) by bedside nurse; (2) suspected site assessment (vascular access, lung, abdomen, urinary tract, soft tissue, other) at bedside by physician or extender; (3) sepsis management protocol (replicable, point-of-care decisions) at bedside by nurse, physician, and extender. The system was implemented first using paper and then a computerized system. Sepsis severity was defined using standard criteria. In January to May 2012, a paper system was used to manage 77 consecutive sepsis encounters (3.9 ± 0.5 cases per week) in 65 patients (77% male; age, 53 ± 2 years). In June to December 2012, a computerized system was used to manage 132 consecutive sepsis encounters (4.4 ± 0.4 cases per week) in 119 patients (63% male; age, 58 ± 2 years). MEWS-SRS elicited 683 site assessments, and 201 had sepsis diagnosis and protocol management. The predominant site of infection was abdomen (paper, 58%; computer, 53%). Recognition of early sepsis tended to occur more using the computerized system (paper, 23%; computer, 35%). Hospital mortality rate for surgical ICU sepsis (paper, 20%; computer, 14%) was less with the computerized system. A computerized sepsis management system improves care process and outcome. Early sepsis is recognized and managed with greater frequency compared with severe sepsis or septic shock. The system

  8. IoT-Based Image Recognition System for Smart Home-Delivered Meal Services

    Directory of Open Access Journals (Sweden)

    Hsiao-Ting Tseng

    2017-07-01

    Full Text Available Population ageing is an important global issue. The Taiwanese government has used various Internet of Things (IoT applications in the “10-year long-term care program 2.0”. It is expected that the efficiency and effectiveness of long-term care services will be improved through IoT support. Home-delivered meal services for the elderly are important for home-based long-term care services. To ensure that the right meals are delivered to the right recipient at the right time, the runners need to take a picture of the meal recipient when the meal is delivered. This study uses the IoT-based image recognition system to design an integrated service to improve the management of image recognition. The core technology of this IoT-based image recognition system is statistical histogram-based k-means clustering for image segmentation. However, this method is time-consuming. Therefore, we proposed using the statistical histogram to obtain a probability density function of pixels of a figure and segmenting these with weighting for the same intensity. This aims to increase the computational performance and achieve the same results as k-means clustering. We combined histogram and k-means clustering in order to overcome the high computational cost for k-means clustering. The results indicate that the proposed method is significantly faster than k-means clustering by more than 10 times.

  9. Solution of a Problem Linear Plane Elasticity with Mixed Boundary Conditions by the Method of Boundary Integrals

    Directory of Open Access Journals (Sweden)

    Nahed S. Hussein

    2014-01-01

    Full Text Available A numerical boundary integral scheme is proposed for the solution to the system of …eld equations of plane. The stresses are prescribed on one-half of the circle, while the displacements are given. The considered problem with mixed boundary conditions in the circle is replaced by two problems with homogeneous boundary conditions, one of each type, having a common solution. The equations are reduced to a system of boundary integral equations, which is then discretized in the usual way, and the problem at this stage is reduced to the solution to a rectangular linear system of algebraic equations. The unknowns in this system of equations are the boundary values of four harmonic functions which define the full elastic solution and the unknown boundary values of stresses or displacements on proper parts of the boundary. On the basis of the obtained results, it is inferred that a stress component has a singularity at each of the two separation points, thought to be of logarithmic type. The results are discussed and boundary plots are given. We have also calculated the unknown functions in the bulk directly from the given boundary conditions using the boundary collocation method. The obtained results in the bulk are discussed and three-dimensional plots are given. A tentative form for the singular solution is proposed and the corresponding singular stresses and displacements are plotted in the bulk. The form of the singular tangential stress is seen to be compatible with the boundary values obtained earlier. The efficiency of the used numerical schemes is discussed.

  10. Complete Vision-Based Traffic Sign Recognition Supported by an I2V Communication System

    Directory of Open Access Journals (Sweden)

    Miguel Gavilán

    2012-01-01

    Full Text Available This paper presents a complete traffic sign recognition system based on vision sensor onboard a moving vehicle which detects and recognizes up to one hundred of the most important road signs, including circular and triangular signs. A restricted Hough transform is used as detection method from the information extracted in contour images, while the proposed recognition system is based on Support Vector Machines (SVM. A novel solution to the problem of discarding detected signs that do not pertain to the host road is proposed. For that purpose infrastructure-to-vehicle (I2V communication and a stereo vision sensor are used. Furthermore, the outputs provided by the vision sensor and the data supplied by the CAN Bus and a GPS sensor are combined to obtain the global position of the detected traffic signs, which is used to identify a traffic sign in the I2V communication. This paper presents plenty of tests in real driving conditions, both day and night, in which an average detection rate over 95% and an average recognition rate around 93% were obtained with an average runtime of 35 ms that allows real-time performance.

  11. Complete vision-based traffic sign recognition supported by an I2V communication system.

    Science.gov (United States)

    García-Garrido, Miguel A; Ocaña, Manuel; Llorca, David F; Arroyo, Estefanía; Pozuelo, Jorge; Gavilán, Miguel

    2012-01-01

    This paper presents a complete traffic sign recognition system based on vision sensor onboard a moving vehicle which detects and recognizes up to one hundred of the most important road signs, including circular and triangular signs. A restricted Hough transform is used as detection method from the information extracted in contour images, while the proposed recognition system is based on Support Vector Machines (SVM). A novel solution to the problem of discarding detected signs that do not pertain to the host road is proposed. For that purpose infrastructure-to-vehicle (I2V) communication and a stereo vision sensor are used. Furthermore, the outputs provided by the vision sensor and the data supplied by the CAN Bus and a GPS sensor are combined to obtain the global position of the detected traffic signs, which is used to identify a traffic sign in the I2V communication. This paper presents plenty of tests in real driving conditions, both day and night, in which an average detection rate over 95% and an average recognition rate around 93% were obtained with an average runtime of 35 ms that allows real-time performance.

  12. Estimating anisotropic diffusion of neutrons near the boundary of a pebble bed random system

    Energy Technology Data Exchange (ETDEWEB)

    Vasques, R. [Department of Mathematics, Center for Computational Engineering Science, RWTH Aachen University, Schinkel Strasse 2, D-52062 Aachen (Germany)

    2013-07-01

    Due to the arrangement of the pebbles in a Pebble Bed Reactor (PBR) core, if a neutron is located close to a boundary wall, its path length probability distribution function in directions of flight parallel to the wall is significantly different than in other directions. Hence, anisotropic diffusion of neutrons near the boundaries arises. We describe an analysis of neutron transport in a simplified 3-D pebble bed random system, in which we investigate the anisotropic diffusion of neutrons born near one of the system's boundary walls. While this simplified system does not model the actual physical process that takes place near the boundaries of a PBR core, the present work paves the road to a formulation that may enable more accurate diffusion simulations of such problems to be performed in the future. Monte Carlo codes have been developed for (i) deriving realizations of the 3-D random system, and (ii) performing 3-D neutron transport inside the heterogeneous model; numerical results are presented for three different choices of parameters. These numerical results are used to assess the accuracy of estimates for the mean-squared displacement of neutrons obtained with the diffusion approximations of the Atomic Mix Model and of the recently introduced [1] Non-Classical Theory with angular-dependent path length distribution. The Non-Classical Theory makes use of a Generalized Linear Boltzmann Equation in which the locations of the scattering centers in the system are correlated and the distance to collision is not exponentially distributed. We show that the results predicted using the Non-Classical Theory successfully model the anisotropic behavior of the neutrons in the random system, and more closely agree with experiment than the results predicted by the Atomic Mix Model. (authors)

  13. Estimating anisotropic diffusion of neutrons near the boundary of a pebble bed random system

    International Nuclear Information System (INIS)

    Vasques, R.

    2013-01-01

    Due to the arrangement of the pebbles in a Pebble Bed Reactor (PBR) core, if a neutron is located close to a boundary wall, its path length probability distribution function in directions of flight parallel to the wall is significantly different than in other directions. Hence, anisotropic diffusion of neutrons near the boundaries arises. We describe an analysis of neutron transport in a simplified 3-D pebble bed random system, in which we investigate the anisotropic diffusion of neutrons born near one of the system's boundary walls. While this simplified system does not model the actual physical process that takes place near the boundaries of a PBR core, the present work paves the road to a formulation that may enable more accurate diffusion simulations of such problems to be performed in the future. Monte Carlo codes have been developed for (i) deriving realizations of the 3-D random system, and (ii) performing 3-D neutron transport inside the heterogeneous model; numerical results are presented for three different choices of parameters. These numerical results are used to assess the accuracy of estimates for the mean-squared displacement of neutrons obtained with the diffusion approximations of the Atomic Mix Model and of the recently introduced [1] Non-Classical Theory with angular-dependent path length distribution. The Non-Classical Theory makes use of a Generalized Linear Boltzmann Equation in which the locations of the scattering centers in the system are correlated and the distance to collision is not exponentially distributed. We show that the results predicted using the Non-Classical Theory successfully model the anisotropic behavior of the neutrons in the random system, and more closely agree with experiment than the results predicted by the Atomic Mix Model. (authors)

  14. A Robust and Fast Computation Touchless Palm Print Recognition System Using LHEAT and the IFkNCN Classifier

    Directory of Open Access Journals (Sweden)

    Haryati Jaafar

    2015-01-01

    Full Text Available Mobile implementation is a current trend in biometric design. This paper proposes a new approach to palm print recognition, in which smart phones are used to capture palm print images at a distance. A touchless system was developed because of public demand for privacy and sanitation. Robust hand tracking, image enhancement, and fast computation processing algorithms are required for effective touchless and mobile-based recognition. In this project, hand tracking and the region of interest (ROI extraction method were discussed. A sliding neighborhood operation with local histogram equalization, followed by a local adaptive thresholding or LHEAT approach, was proposed in the image enhancement stage to manage low-quality palm print images. To accelerate the recognition process, a new classifier, improved fuzzy-based k nearest centroid neighbor (IFkNCN, was implemented. By removing outliers and reducing the amount of training data, this classifier exhibited faster computation. Our experimental results demonstrate that a touchless palm print system using LHEAT and IFkNCN achieves a promising recognition rate of 98.64%.

  15. Case-Based Policy and Goal Recognition

    Science.gov (United States)

    2015-09-30

    Policy and Goal Recognizer (PaGR), a case- based system for multiagent keyhole recognition. PaGR is a knowledge recognition component within a decision...However, unlike our agent in the BVR domain, these recognition agents have access to perfect information. Single-agent keyhole plan recognition can be...listed below: 1. Facing Target 2. Closing on Target 3. Target Range 4. Within a Target’s Weapon Range 5. Has Target within Weapon Range 6. Is in Danger

  16. Paradigms in object recognition

    International Nuclear Information System (INIS)

    Mutihac, R.; Mutihac, R.C.

    1999-09-01

    A broad range of approaches has been proposed and applied for the complex and rather difficult task of object recognition that involves the determination of object characteristics and object classification into one of many a priori object types. Our paper revises briefly the three main different paradigms in pattern recognition, namely Bayesian statistics, neural networks, and expert systems. (author)

  17. Window Size Impact in Human Activity Recognition

    Directory of Open Access Journals (Sweden)

    Oresti Banos

    2014-04-01

    Full Text Available Signal segmentation is a crucial stage in the activity recognition process; however, this has been rarely and vaguely characterized so far. Windowing approaches are normally used for segmentation, but no clear consensus exists on which window size should be preferably employed. In fact, most designs normally rely on figures used in previous works, but with no strict studies that support them. Intuitively, decreasing the window size allows for a faster activity detection, as well as reduced resources and energy needs. On the contrary, large data windows are normally considered for the recognition of complex activities. In this work, we present an extensive study to fairly characterize the windowing procedure, to determine its impact within the activity recognition process and to help clarify some of the habitual assumptions made during the recognition system design. To that end, some of the most widely used activity recognition procedures are evaluated for a wide range of window sizes and activities. From the evaluation, the interval 1–2 s proves to provide the best trade-off between recognition speed and accuracy. The study, specifically intended for on-body activity recognition systems, further provides designers with a set of guidelines devised to facilitate the system definition and configuration according to the particular application requirements and target activities.

  18. Stability result of the Timoshenko system with delay and boundary feedback

    KAUST Repository

    Said-Houari, Belkacem; Soufyane, Abdelaziz

    2012-01-01

    Our interest in this paper is to analyse the asymptotic behaviour of a Timoshenko beam system together with two boundary controls, with delay terms in the first and second equation. Assuming the weights of the delay are small enough, we show that the system is well-posed using the semigroup theory. Furthermore, we introduce a Lyapunov functional that gives the exponential decay of the total energy. © 2012 The author.

  19. Stability result of the Timoshenko system with delay and boundary feedback

    KAUST Repository

    Said-Houari, Belkacem

    2012-01-06

    Our interest in this paper is to analyse the asymptotic behaviour of a Timoshenko beam system together with two boundary controls, with delay terms in the first and second equation. Assuming the weights of the delay are small enough, we show that the system is well-posed using the semigroup theory. Furthermore, we introduce a Lyapunov functional that gives the exponential decay of the total energy. © 2012 The author.

  20. Business model for sensor-based fall recognition systems.

    Science.gov (United States)

    Fachinger, Uwe; Schöpke, Birte

    2014-01-01

    AAL systems require, in addition to sophisticated and reliable technology, adequate business models for their launch and sustainable establishment. This paper presents the basic features of alternative business models for a sensor-based fall recognition system which was developed within the context of the "Lower Saxony Research Network Design of Environments for Ageing" (GAL). The models were developed parallel to the R&D process with successive adaptation and concretization. An overview of the basic features (i.e. nine partial models) of the business model is given and the mutual exclusive alternatives for each partial model are presented. The partial models are interconnected and the combinations of compatible alternatives lead to consistent alternative business models. However, in the current state, only initial concepts of alternative business models can be deduced. The next step will be to gather additional information to work out more detailed models.

  1. Use of digital speech recognition in diagnostics radiology

    International Nuclear Information System (INIS)

    Arndt, H.; Stockheim, D.; Mutze, S.; Petersein, J.; Gregor, P.; Hamm, B.

    1999-01-01

    Purpose: Applicability and benefits of digital speech recognition in diagnostic radiology were tested using the speech recognition system SP 6000. Methods: The speech recognition system SP 6000 was integrated into the network of the institute and connected to the existing Radiological Information System (RIS). Three subjects used this system for writing 2305 findings from dictation. After the recognition process the date, length of dictation, time required for checking/correction, kind of examination and error rate were recorded for every dictation. With the same subjects, a correlation was performed with 625 conventionally written finding. Results: After an 1-hour initial training the average error rates were 8.4 to 13.3%. The first adaptation of the speech recognition system (after nine days) decreased the average error rates to 2.4 to 10.7% due to the ability of the program to learn. The 2 nd and 3 rd adaptations resulted only in small changes of the error rate. An individual comparison of the error rate developments in the same kind of investigation showed the relative independence of the error rate on the individual user. Conclusion: The results show that the speech recognition system SP 6000 can be evaluated as an advantageous alternative for quickly recording radiological findings. A comparison between manually writing and dictating the findings verifies the individual differences of the writing speeds and shows the advantage of the application of voice recognition when faced with normal keyboard performance. (orig.) [de

  2. Development of micro tensile testing method in an FIB system for evaluating grain boundary strength

    International Nuclear Information System (INIS)

    Fujii, Katsuhiko; Fukuya, Koji

    2010-01-01

    A micro tensile testing method for evaluating grain boundary strength was developed. Specimens of 2 x 2 x 10μm having one grain boundary were made by focused ion beam (FIB) micro-processing and tensioned in an FIB system in situ. The load was measured from the deflection of the silicon cantilever. The method was applied to aged and unaged Fe-Mn-P alloy specimens with different level of grain boundary phosphorus segregation. The load at intergranular fracture decreased with increasing phosphorus segregation. (author)

  3. Optical Character Recognition.

    Science.gov (United States)

    Converso, L.; Hocek, S.

    1990-01-01

    This paper describes computer-based optical character recognition (OCR) systems, focusing on their components (the computer, the scanner, the OCR, and the output device); how the systems work; and features to consider in selecting a system. A list of 26 questions to ask to evaluate systems for potential purchase is included. (JDD)

  4. Haar-like Features for Robust Real-Time Face Recognition

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.

    2013-01-01

    Face recognition is still a very challenging task when the input face image is noisy, occluded by some obstacles, of very low-resolution, not facing the camera, and not properly illuminated. These problems make the feature extraction and consequently the face recognition system unstable....... The proposed system in this paper introduces the novel idea of using Haar-like features, which have commonly been used for object detection, along with a probabilistic classifier for face recognition. The proposed system is simple, real-time, effective and robust against most of the mentioned problems....... Experimental results on public databases show that the proposed system indeed outperforms the state-of-the-art face recognition systems....

  5. Social recognition is context dependent in single male prairie voles

    Science.gov (United States)

    Zheng, Da-Jiang; Foley, Lauren; Rehman, Asad; Ophir, Alexander G.

    2013-01-01

    Single males might benefit from knowing the identity of neighbouring males when establishing and defending boundaries. Similarly, males should discriminate between individual females if this leads to more reproductive opportunities. Contextual social cues may alter the value of learning identity. Knowing the identity of competitors that intrude into an animal’s territory may be more salient than knowing the identity of individuals on whose territory an animal is trespassing. Hence, social and environmental context could affect social recognition in many ways. Here we test social recognition of socially monogamous single male prairie voles, Microtus ochrogaster. In experiment 1 we tested recognition of male or female conspecifics and found that males discriminated between different males but not between different females. In experiment 2 we asked whether recognition of males is influenced when males are tested in their own cage (familiar), in a clean cage (neutral) or in the home cage of another male (unfamiliar). Although focal males discriminated between male conspecifics in all three contexts, individual variation in recognition was lower when males were tested in their home cage (in the presence of familiar social cues) compared to when the context lacked social cues (neutral). Experiment 1 indicates that selective pressures may have operated to enhance male territorial behaviour and indiscriminate mate selection. Experiment 2 suggests that the presence of a conspecific cue heightens social recognition and that home-field advantages might extend to social cognition. Taken together, our results indicate social recognition depends on the social and possibly territorial context. PMID:24273328

  6. The Hide-and-Seek of Grain Boundaries from Moiré Pattern Fringe of Two-Dimensional Graphene

    Science.gov (United States)

    Kim, Jung Hwa; Kim, Kwanpyo; Lee, Zonghoon

    2015-01-01

    Grain boundaries (GBs) commonly exist in crystalline materials and affect various properties of materials. The facile identification of GBs is one of the significant requirements for systematical study of polycrystalline materials including recently emerging two-dimensional materials. Previous observations of GBs have been performed by various tools including high resolution transmission electron microscopy. However, a method to easily identify GBs, especially in the case of low-angle GBs, has not yet been well established. In this paper, we choose graphene bilayers with a GB as a model system and investigate the effects of interlayer rotations to the identification of GBs. We provide a critical condition between adjacent moiré fringe spacings, which determines the possibility of GB recognition. In addition, for monolayer graphene with a grain boundary, we demonstrate that low-angle GBs can be distinguished easily by inducing moiré patterns deliberately with an artificial reference overlay. PMID:26216628

  7. Towards evidence-based, quality-controlled health promotion: the Dutch recognition system for health promotion interventions.

    NARCIS (Netherlands)

    Brug, J.; Dale, D. van; Lanting, L.; Kremers, S.; Veenhof, C.; Leurs, M.; Yperen, T. van; Kok, G.

    2010-01-01

    Registration or recognition systems for best-practice health promotion interventions may contribute to better quality assurance and control in health promotion practice. In the Netherlands, such a system has been developed and is being implemented aiming to provide policy makers and professionals

  8. Applied learning-based color tone mapping for face recognition in video surveillance system

    Science.gov (United States)

    Yew, Chuu Tian; Suandi, Shahrel Azmin

    2012-04-01

    In this paper, we present an applied learning-based color tone mapping technique for video surveillance system. This technique can be applied onto both color and grayscale surveillance images. The basic idea is to learn the color or intensity statistics from a training dataset of photorealistic images of the candidates appeared in the surveillance images, and remap the color or intensity of the input image so that the color or intensity statistics match those in the training dataset. It is well known that the difference in commercial surveillance cameras models, and signal processing chipsets used by different manufacturers will cause the color and intensity of the images to differ from one another, thus creating additional challenges for face recognition in video surveillance system. Using Multi-Class Support Vector Machines as the classifier on a publicly available video surveillance camera database, namely SCface database, this approach is validated and compared to the results of using holistic approach on grayscale images. The results show that this technique is suitable to improve the color or intensity quality of video surveillance system for face recognition.

  9. Target recognition and scene interpretation in image/video understanding systems based on network-symbolic models

    Science.gov (United States)

    Kuvich, Gary

    2004-08-01

    Vision is only a part of a system that converts visual information into knowledge structures. These structures drive the vision process, resolving ambiguity and uncertainty via feedback, and provide image understanding, which is an interpretation of visual information in terms of these knowledge models. These mechanisms provide a reliable recognition if the object is occluded or cannot be recognized as a whole. It is hard to split the entire system apart, and reliable solutions to the target recognition problems are possible only within the solution of a more generic Image Understanding Problem. Brain reduces informational and computational complexities, using implicit symbolic coding of features, hierarchical compression, and selective processing of visual information. Biologically inspired Network-Symbolic representation, where both systematic structural/logical methods and neural/statistical methods are parts of a single mechanism, is the most feasible for such models. It converts visual information into relational Network-Symbolic structures, avoiding artificial precise computations of 3-dimensional models. Network-Symbolic Transformations derive abstract structures, which allows for invariant recognition of an object as exemplar of a class. Active vision helps creating consistent models. Attention, separation of figure from ground and perceptual grouping are special kinds of network-symbolic transformations. Such Image/Video Understanding Systems will be reliably recognizing targets.

  10. A system level boundary scan controller board for VME applications [to CERN experiments

    CERN Document Server

    Cardoso, N; Da Silva, J C

    2000-01-01

    This work is the result of a collaboration between INESC and LIP in the CMS experiment being conducted at CERN. The collaboration addresses the application of boundary scan test at system level namely the development of a VME boundary scan controller (BSC) board prototype and the corresponding software. This prototype uses the MTM bus existing in the VME64* backplane to apply the 1149.1 test vectors to a system composed of nineteen boards, called here units under test (UUTs). A top-down approach is used to describe our work. The paper begins with some insights about the experiment being conducted at CERN, proceed with system level considerations concerning our work and with some details about the BSC board. The results obtained so far and the proposed work is reviewed in the end of this contribution. (11 refs).

  11. Integrable systems on so(4) related to XXX spin chains with boundaries

    International Nuclear Information System (INIS)

    Tsiganov, A V; Goremykin, O V

    2004-01-01

    We consider two-site XXX Heisenberg magnets with different boundary conditions, which are integrable systems on so(4) possessing additional cubic and quartic integrals of motion. The separated variables for these models are constructed using the Sklyanin method

  12. A Spoken English Recognition Expert System.

    Science.gov (United States)

    1983-09-01

    34Speech Recognition by Computer," Scientific American. New York: Scientific American, April 1981: 64-76. 16. Marcus, Mitchell P. A Theo of Syntactic...prob)...) Pcssible words for voice decoder to choose from are: gents dishes issues itches ewes folks foes comunications units eunichs error * farce

  13. Optimization Methods in Emotion Recognition System

    Directory of Open Access Journals (Sweden)

    L. Povoda

    2016-09-01

    Full Text Available Emotions play big role in our everyday communication and contain important information. This work describes a novel method of automatic emotion recognition from textual data. The method is based on well-known data mining techniques, novel approach based on parallel run of SVM (Support Vector Machine classifiers, text preprocessing and 3 optimization methods: sequential elimination of attributes, parameter optimization based on token groups, and method of extending train data sets during practical testing and production release final tuning. We outperformed current state of the art methods and the results were validated on bigger data sets (3346 manually labelled samples which is less prone to overfitting when compared to related works. The accuracy achieved in this work is 86.89% for recognition of 5 emotional classes. The experiments were performed in the real world helpdesk environment, was processing Czech language but the proposed methodology is general and can be applied to many different languages.

  14. Scaling of localization length of a quasi 1D system with longitudinal boundary roughness

    International Nuclear Information System (INIS)

    Abhijit Kar Gupta; Sen, A.K.

    1994-08-01

    We introduce irregularities on one of the longitudinal boundaries of a quasi 1D strip which has no bulk disorder. We calculate the localization length of such a system within the scope of tight-binding formalism and see how it behaves with the roughness introduced on the boundary and with the strip-width. We find that localization length scales with a composite one parameter. (author). 6 refs, 4 figs

  15. Design and Implementation of Behavior Recognition System Based on Convolutional Neural Network

    Directory of Open Access Journals (Sweden)

    Yu Bo

    2017-01-01

    Full Text Available We build a set of human behavior recognition system based on the convolution neural network constructed for the specific human behavior in public places. Firstly, video of human behavior data set will be segmented into images, then we process the images by the method of background subtraction to extract moving foreground characters of body. Secondly, the training data sets are trained into the designed convolution neural network, and the depth learning network is constructed by stochastic gradient descent. Finally, the various behaviors of samples are classified and identified with the obtained network model, and the recognition results are compared with the current mainstream methods. The result show that the convolution neural network can study human behavior model automatically and identify human’s behaviors without any manually annotated trainings.

  16. Contralateral comparison of wavefront-guided LASIK surgery with iris recognition versus without iris recognition using the MEL80 Excimer laser system.

    Science.gov (United States)

    Wu, Fang; Yang, Yabo; Dougherty, Paul J

    2009-05-01

    To compare outcomes in wavefront-guided LASIK performed with iris recognition software versus without iris recognition software in different eyes of the same patient. A randomised, prospective study of 104 myopic eyes of 52 patients undergoing LASIK surgery with the MEL80 excimer laser system was performed. Iris recognition software was used in one eye of each patient (study group) and not used in the other eye (control group). Higher order aberrations (HOAs), contrast sensitivity, uncorrected vision (UCV), visual acuity (VA) and corneal topography were measured and recorded pre-operatively and at one month and three months post-operatively for each eye. The mean post-operative sphere and cylinder between groups was similar, however the post-operative angles of error (AE) by refraction were significantly smaller in the study group compared to the control group both in arithmetic and absolute means (p = 0.03, p = 0.01). The mean logMAR UCV was significantly better in the study group than in the control group at one month (p = 0.01). The mean logMAR VA was significantly better in the study group than in control group at both one and three months (p = 0.01, p = 0.03). In addition, mean trefoil, total third-order aberration, total fourth-order aberration and the total scotopic root-mean-square (RMS) HOAs were significantly less in the study group than those in the control group at the third (p = 0.01, p = 0.05, p = 0.04, p = 0.02). By three months, the contrast sensitivity had recovered in both groups but the study group performed better at 2.6, 4.2 and 6.6 cpd (cycles per degree) than the control group (p = 0.01, p iris recognition results in better VA, lower mean higher-order aberrations, lower refractive post-operative angles of error and better contrast sensitivity at three months post-operatively than LASIK performed without iris recognition.

  17. Functional Requirements for Fab-7 Boundary Activity in the Bithorax Complex

    Science.gov (United States)

    Wolle, Daniel; Cleard, Fabienne; Aoki, Tsutomu; Deshpande, Girish; Karch, Francois

    2015-01-01

    Chromatin boundaries are architectural elements that determine the three-dimensional folding of the chromatin fiber and organize the chromosome into independent units of genetic activity. The Fab-7 boundary from the Drosophila bithorax complex (BX-C) is required for the parasegment-specific expression of the Abd-B gene. We have used a replacement strategy to identify sequences that are necessary and sufficient for Fab-7 boundary function in the BX-C. Fab-7 boundary activity is known to depend on factors that are stage specific, and we describe a novel ∼700-kDa complex, the late boundary complex (LBC), that binds to Fab-7 sequences that have insulator functions in late embryos and adults. We show that the LBC is enriched in nuclear extracts from late, but not early, embryos and that it contains three insulator proteins, GAF, Mod(mdg4), and E(y)2. Its DNA binding properties are unusual in that it requires a minimal sequence of >65 bp; however, other than a GAGA motif, the three Fab-7 LBC recognition elements display few sequence similarities. Finally, we show that mutations which abrogate LBC binding in vitro inactivate the Fab-7 boundary in the BX-C. PMID:26303531

  18. Functional Requirements for Fab-7 Boundary Activity in the Bithorax Complex.

    Science.gov (United States)

    Wolle, Daniel; Cleard, Fabienne; Aoki, Tsutomu; Deshpande, Girish; Schedl, Paul; Karch, Francois

    2015-11-01

    Chromatin boundaries are architectural elements that determine the three-dimensional folding of the chromatin fiber and organize the chromosome into independent units of genetic activity. The Fab-7 boundary from the Drosophila bithorax complex (BX-C) is required for the parasegment-specific expression of the Abd-B gene. We have used a replacement strategy to identify sequences that are necessary and sufficient for Fab-7 boundary function in the BX-C. Fab-7 boundary activity is known to depend on factors that are stage specific, and we describe a novel ∼700-kDa complex, the late boundary complex (LBC), that binds to Fab-7 sequences that have insulator functions in late embryos and adults. We show that the LBC is enriched in nuclear extracts from late, but not early, embryos and that it contains three insulator proteins, GAF, Mod(mdg4), and E(y)2. Its DNA binding properties are unusual in that it requires a minimal sequence of >65 bp; however, other than a GAGA motif, the three Fab-7 LBC recognition elements display few sequence similarities. Finally, we show that mutations which abrogate LBC binding in vitro inactivate the Fab-7 boundary in the BX-C. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  19. WORD LEVEL DISCRIMINATIVE TRAINING FOR HANDWRITTEN WORD RECOGNITION

    NARCIS (Netherlands)

    Chen, W.; Gader, P.

    2004-01-01

    Word level training refers to the process of learning the parameters of a word recognition system based on word level criteria functions. Previously, researchers trained lexicon­driven handwritten word recognition systems at the character level individually. These systems generally use statistical

  20. Automated target recognition and tracking using an optical pattern recognition neural network

    Science.gov (United States)

    Chao, Tien-Hsin

    1991-01-01

    The on-going development of an automatic target recognition and tracking system at the Jet Propulsion Laboratory is presented. This system is an optical pattern recognition neural network (OPRNN) that is an integration of an innovative optical parallel processor and a feature extraction based neural net training algorithm. The parallel optical processor provides high speed and vast parallelism as well as full shift invariance. The neural network algorithm enables simultaneous discrimination of multiple noisy targets in spite of their scales, rotations, perspectives, and various deformations. This fully developed OPRNN system can be effectively utilized for the automated spacecraft recognition and tracking that will lead to success in the Automated Rendezvous and Capture (AR&C) of the unmanned Cargo Transfer Vehicle (CTV). One of the most powerful optical parallel processors for automatic target recognition is the multichannel correlator. With the inherent advantages of parallel processing capability and shift invariance, multiple objects can be simultaneously recognized and tracked using this multichannel correlator. This target tracking capability can be greatly enhanced by utilizing a powerful feature extraction based neural network training algorithm such as the neocognitron. The OPRNN, currently under investigation at JPL, is constructed with an optical multichannel correlator where holographic filters have been prepared using the neocognitron training algorithm. The computation speed of the neocognitron-type OPRNN is up to 10(exp 14) analog connections/sec that enabling the OPRNN to outperform its state-of-the-art electronics counterpart by at least two orders of magnitude.

  1. The effect of system boundaries on the mean free path for confined gases

    Directory of Open Access Journals (Sweden)

    Sooraj K. Prabha

    2013-10-01

    Full Text Available The mean free path of rarefied gases is accurately determined using Molecular Dynamics simulations. The simulations are carried out on isothermal argon gas (Lennard-Jones fluid over a range of rarefaction levels under various confinements (unbounded gas, parallel reflective wall and explicit solid platinum wall bounded gas in a nanoscale domain. The system is also analyzed independently in constitutive sub-systems to calculate the corresponding local mean free paths. Our studies which predominate in the transition regime substantiate the boundary limiting effect on mean free paths owing to the sharp diminution in molecular free paths near the planar boundaries. These studies provide insight to the transport phenomena of rarefied gases through nanochannels which have established their potential in microscale and nanoscale heat transfer applications.

  2. A NEW STRATEGY FOR IMPROVING FEATURE SETS IN A DISCRETE HMM­BASED HANDWRITING RECOGNITION SYSTEM

    NARCIS (Netherlands)

    Grandidier, F.; Sabourin, R.; Suen, C.Y.; Gilloux, M.

    2004-01-01

    In this paper we introduce a new strategy for improving a discrete HMM­based handwriting recognition system, by integrating several information sources from specialized feature sets. For a given system, the basic idea is to keep the most discriminative features, and to replace the others with new

  3. Template protection and its implementation in 3D face recognition systems

    Science.gov (United States)

    Zhou, Xuebing

    2007-04-01

    As biometric recognition systems are widely applied in various application areas, security and privacy risks have recently attracted the attention of the biometric community. Template protection techniques prevent stored reference data from revealing private biometric information and enhance the security of biometrics systems against attacks such as identity theft and cross matching. This paper concentrates on a template protection algorithm that merges methods from cryptography, error correction coding and biometrics. The key component of the algorithm is to convert biometric templates into binary vectors. It is shown that the binary vectors should be robust, uniformly distributed, statistically independent and collision-free so that authentication performance can be optimized and information leakage can be avoided. Depending on statistical character of the biometric template, different approaches for transforming biometric templates into compact binary vectors are presented. The proposed methods are integrated into a 3D face recognition system and tested on the 3D facial images of the FRGC database. It is shown that the resulting binary vectors provide an authentication performance that is similar to the original 3D face templates. A high security level is achieved with reasonable false acceptance and false rejection rates of the system, based on an efficient statistical analysis. The algorithm estimates the statistical character of biometric templates from a number of biometric samples in the enrollment database. For the FRGC 3D face database, the small distinction of robustness and discriminative power between the classification results under the assumption of uniquely distributed templates and the ones under the assumption of Gaussian distributed templates is shown in our tests.

  4. Sistema audiovisual para reconocimiento de comandos Audiovisual system for recognition of commands

    Directory of Open Access Journals (Sweden)

    Alexander Ceballos

    2011-08-01

    Full Text Available Se presenta el desarrollo de un sistema automático de reconocimiento audiovisual del habla enfocado en el reconocimiento de comandos. La representación del audio se realizó mediante los coeficientes cepstrales de Mel y las primeras dos derivadas temporales. Para la caracterización del vídeo se hizo seguimiento automático de características visuales de alto nivel a través de toda la secuencia. Para la inicialización automática del algoritmo se emplearon transformaciones de color y contornos activos con información de flujo del vector gradiente ("GVF snakes" sobre la región labial, mientras que para el seguimiento se usaron medidas de similitud entre vecindarios y restricciones morfológicas definidas en el estándar MPEG-4. Inicialmente, se presenta el diseño del sistema de reconocimiento automático del habla, empleando únicamente información de audio (ASR, mediante Modelos Ocultos de Markov (HMMs y un enfoque de palabra aislada; posteriormente, se muestra el diseño de los sistemas empleando únicamente características de vídeo (VSR, y empleando características de audio y vídeo combinadas (AVSR. Al final se comparan los resultados de los tres sistemas para una base de datos propia en español y francés, y se muestra la influencia del ruido acústico, mostrando que el sistema de AVSR es más robusto que ASR y VSR.We present the development of an automatic audiovisual speech recognition system focused on the recognition of commands. Signal audio representation was done using Mel cepstral coefficients and their first and second order time derivatives. In order to characterize the video signal, a set of high-level visual features was tracked throughout the sequences. Automatic initialization of the algorithm was performed using color transformations and active contour models based on Gradient Vector Flow (GVF Snakes on the lip region, whereas visual tracking used similarity measures across neighborhoods and morphological

  5. Unvoiced Speech Recognition Using Tissue-Conductive Acoustic Sensor

    Directory of Open Access Journals (Sweden)

    Heracleous Panikos

    2007-01-01

    Full Text Available We present the use of stethoscope and silicon NAM (nonaudible murmur microphones in automatic speech recognition. NAM microphones are special acoustic sensors, which are attached behind the talker's ear and can capture not only normal (audible speech, but also very quietly uttered speech (nonaudible murmur. As a result, NAM microphones can be applied in automatic speech recognition systems when privacy is desired in human-machine communication. Moreover, NAM microphones show robustness against noise and they might be used in special systems (speech recognition, speech transform, etc. for sound-impaired people. Using adaptation techniques and a small amount of training data, we achieved for a 20 k dictation task a word accuracy for nonaudible murmur recognition in a clean environment. In this paper, we also investigate nonaudible murmur recognition in noisy environments and the effect of the Lombard reflex on nonaudible murmur recognition. We also propose three methods to integrate audible speech and nonaudible murmur recognition using a stethoscope NAM microphone with very promising results.

  6. Gaze Estimation for Off-Angle Iris Recognition Based on the Biometric Eye Model

    Energy Technology Data Exchange (ETDEWEB)

    Karakaya, Mahmut [ORNL; Barstow, Del R [ORNL; Santos-Villalobos, Hector J [ORNL; Thompson, Joseph W [ORNL; Bolme, David S [ORNL; Boehnen, Chris Bensing [ORNL

    2013-01-01

    Iris recognition is among the highest accuracy biometrics. However, its accuracy relies on controlled high quality capture data and is negatively affected by several factors such as angle, occlusion, and dilation. Non-ideal iris recognition is a new research focus in biometrics. In this paper, we present a gaze estimation method designed for use in an off-angle iris recognition framework based on the ANONYMIZED biometric eye model. Gaze estimation is an important prerequisite step to correct an off-angle iris images. To achieve the accurate frontal reconstruction of an off-angle iris image, we first need to estimate the eye gaze direction from elliptical features of an iris image. Typically additional information such as well-controlled light sources, head mounted equipment, and multiple cameras are not available. Our approach utilizes only the iris and pupil boundary segmentation allowing it to be applicable to all iris capture hardware. We compare the boundaries with a look-up-table generated by using our biologically inspired biometric eye model and find the closest feature point in the look-up-table to estimate the gaze. Based on the results from real images, the proposed method shows effectiveness in gaze estimation accuracy for our biometric eye model with an average error of approximately 3.5 degrees over a 50 degree range.

  7. [Neurological disease and facial recognition].

    Science.gov (United States)

    Kawamura, Mitsuru; Sugimoto, Azusa; Kobayakawa, Mutsutaka; Tsuruya, Natsuko

    2012-07-01

    To discuss the neurological basis of facial recognition, we present our case reports of impaired recognition and a review of previous literature. First, we present a case of infarction and discuss prosopagnosia, which has had a large impact on face recognition research. From a study of patient symptoms, we assume that prosopagnosia may be caused by unilateral right occipitotemporal lesion and right cerebral dominance of facial recognition. Further, circumscribed lesion and degenerative disease may also cause progressive prosopagnosia. Apperceptive prosopagnosia is observed in patients with posterior cortical atrophy (PCA), pathologically considered as Alzheimer's disease, and associative prosopagnosia in frontotemporal lobar degeneration (FTLD). Second, we discuss face recognition as part of communication. Patients with Parkinson disease show social cognitive impairments, such as difficulty in facial expression recognition and deficits in theory of mind as detected by the reading the mind in the eyes test. Pathological and functional imaging studies indicate that social cognitive impairment in Parkinson disease is possibly related to damages in the amygdalae and surrounding limbic system. The social cognitive deficits can be observed in the early stages of Parkinson disease, and even in the prodromal stage, for example, patients with rapid eye movement (REM) sleep behavior disorder (RBD) show impairment in facial expression recognition. Further, patients with myotonic dystrophy type 1 (DM 1), which is a multisystem disease that mainly affects the muscles, show social cognitive impairment similar to that of Parkinson disease. Our previous study showed that facial expression recognition impairment of DM 1 patients is associated with lesion in the amygdalae and insulae. Our study results indicate that behaviors and personality traits in DM 1 patients, which are revealed by social cognitive impairment, are attributable to dysfunction of the limbic system.

  8. Application of Business Process Management to drive the deployment of a speech recognition system in a healthcare organization.

    Science.gov (United States)

    González Sánchez, María José; Framiñán Torres, José Manuel; Parra Calderón, Carlos Luis; Del Río Ortega, Juan Antonio; Vigil Martín, Eduardo; Nieto Cervera, Jaime

    2008-01-01

    We present a methodology based on Business Process Management to guide the development of a speech recognition system in a hospital in Spain. The methodology eases the deployment of the system by 1) involving the clinical staff in the process, 2) providing the IT professionals with a description of the process and its requirements, 3) assessing advantages and disadvantages of the speech recognition system, as well as its impact in the organisation, and 4) help reorganising the healthcare process before implementing the new technology in order to identify how it can better contribute to the overall objective of the organisation.

  9. Star pattern recognition algorithm aided by inertial information

    Science.gov (United States)

    Liu, Bao; Wang, Ke-dong; Zhang, Chao

    2011-08-01

    Star pattern recognition is one of the key problems of the celestial navigation. The traditional star pattern recognition approaches, such as the triangle algorithm and the star angular distance algorithm, are a kind of all-sky matching method whose recognition speed is slow and recognition success rate is not high. Therefore, the real time and reliability of CNS (Celestial Navigation System) is reduced to some extent, especially for the maneuvering spacecraft. However, if the direction of the camera optical axis can be estimated by other navigation systems such as INS (Inertial Navigation System), the star pattern recognition can be fulfilled in the vicinity of the estimated direction of the optical axis. The benefits of the INS-aided star pattern recognition algorithm include at least the improved matching speed and the improved success rate. In this paper, the direction of the camera optical axis, the local matching sky, and the projection of stars on the image plane are estimated by the aiding of INS firstly. Then, the local star catalog for the star pattern recognition is established in real time dynamically. The star images extracted in the camera plane are matched in the local sky. Compared to the traditional all-sky star pattern recognition algorithms, the memory of storing the star catalog is reduced significantly. Finally, the INS-aided star pattern recognition algorithm is validated by simulations. The results of simulations show that the algorithm's computation time is reduced sharply and its matching success rate is improved greatly.

  10. Grain boundary segregation and intergranular failure

    International Nuclear Information System (INIS)

    White, C.L.

    1980-01-01

    Trace elements and impurities often segregate strongly to grain boundaries in metals and alloys. Concentrations of these elements at grain boundaries are often 10 3 to 10 5 times as great as their overall concentration in the alloy. Because of such segregation, certain trace elements can exert a disproportionate influence on material properties. One frequently observed consequence of trace element segregation to grain boundaries is the occurrence of grain boundary failure and low ductility. Less well known are incidences of improved ductility and inhibition of grain boundary fracture resulting from trace element segregation to grain boundaries in certain systems. An overview of trace element segregation and intergranular failure in a variety of alloy systems as well as preliminary results from studies on Al 3% Li will be presented

  11. A Development of Hybrid Drug Information System Using Image Recognition

    Directory of Open Access Journals (Sweden)

    HwaMin Lee

    2015-04-01

    Full Text Available In order to prevent drug abuse or misuse cases and avoid over-prescriptions, it is necessary for medicine taker to be provided with detailed information about the medicine. In this paper, we propose a drug information system and develop an application to provide information through drug image recognition using a smartphone. We designed a contents-based drug image search algorithm using the color, shape and imprint of drug. Our convenient application can provide users with detailed information about drugs and prevent drug misuse.

  12. Material recognition with the Medipix photon counting colour X-ray system

    Energy Technology Data Exchange (ETDEWEB)

    Norlin, B. E-mail: borje.norlin@mh.se; Manuilskiy, A.; Nilsson, H.-E.; Froejdh, C

    2004-09-21

    An energy sensitive imaging system like Medipix1 has proved to be promising in distinguishing different materials in an X-ray image of an object. We propose a general method utilising X-ray energy information for material recognition. For objects where the thickness of the materials is unknown, a convenient material parameter to identify is K={alpha}{sub 1}/{alpha}{sub 2}, which is the ratio of the logarithms of the measured transmissions ln(t{sub 1})/ln(t{sub 2}). If a database of the parameter K for different materials and energies is created, this method can be used for material recognition independent of the thickness of the materials. Series of images of an object consisting of aluminium and silicon were taken with different energy thresholds. The X-ray absorption for silicon and aluminium is very similar for the range 40-60 keV and only differs for lower energies. The results show that it is possible to distinguish between aluminium and silicon on images achieved by Medipix1 using a standard dental source. By decreasing the spatial resolution a better contrast between the materials was achieved. The resolution of contrasts shown by the histograms was close to the limit of the system due to the statistical noise of the signal.

  13. Lagrangian and Hamiltonian Formulation of Transmission Line Systems with Boundary Energy Flow

    NARCIS (Netherlands)

    Jeltsema, Dimitri; Schaft, Arjan J. van der

    The classical Lagrangian and Hamiltonian formulation of an electrical transmission line is reviewed and extended to allow for varying boundary conditions, The method is based on the definition of an infinite-dimensional analogue of the affine Lagrangian and Hamiltonian input-output systems

  14. Hybrid methodological approach to context-dependent speech recognition

    Directory of Open Access Journals (Sweden)

    Dragiša Mišković

    2017-01-01

    Full Text Available Although the importance of contextual information in speech recognition has been acknowledged for a long time now, it has remained clearly underutilized even in state-of-the-art speech recognition systems. This article introduces a novel, methodologically hybrid approach to the research question of context-dependent speech recognition in human–machine interaction. To the extent that it is hybrid, the approach integrates aspects of both statistical and representational paradigms. We extend the standard statistical pattern-matching approach with a cognitively inspired and analytically tractable model with explanatory power. This methodological extension allows for accounting for contextual information which is otherwise unavailable in speech recognition systems, and using it to improve post-processing of recognition hypotheses. The article introduces an algorithm for evaluation of recognition hypotheses, illustrates it for concrete interaction domains, and discusses its implementation within two prototype conversational agents.

  15. HMM Adaptation for Improving a Human Activity Recognition System

    Directory of Open Access Journals (Sweden)

    Rubén San-Segundo

    2016-09-01

    Full Text Available When developing a fully automatic system for evaluating motor activities performed by a person, it is necessary to segment and recognize the different activities in order to focus the analysis. This process must be carried out by a Human Activity Recognition (HAR system. This paper proposes a user adaptation technique for improving a HAR system based on Hidden Markov Models (HMMs. This system segments and recognizes six different physical activities (walking, walking upstairs, walking downstairs, sitting, standing and lying down using inertial signals from a smartphone. The system is composed of a feature extractor for obtaining the most relevant characteristics from the inertial signals, a module for training the six HMMs (one per activity, and the last module for segmenting new activity sequences using these models. The user adaptation technique consists of a Maximum A Posteriori (MAP approach that adapts the activity HMMs to the user, using some activity examples from this specific user. The main results on a public dataset have reported a significant relative error rate reduction of more than 30%. In conclusion, adapting a HAR system to the user who is performing the physical activities provides significant improvement in the system’s performance.

  16. Towards PLDA-RBM based speaker recognition in mobile environment: Designing stacked/deep PLDA-RBM systems

    DEFF Research Database (Denmark)

    Nautsch, Andreas; Hao, Hong; Stafylakis, Themos

    2016-01-01

    recognition: two deep architectures are presented and examined, which aim at suppressing channel effects and recovering speaker-discriminative information on back-ends trained on a small dataset. Experiments are carried out on the MOBIO SRE'13 database, which is a challenging and publicly available dataset...... for mobile speaker recognition with limited amounts of training data. The experiments show that the proposed system outperforms the baseline i-vector/PLDA approach by relative gains of 31% on female and 9% on male speakers in terms of half total error rate....

  17. Attraction Basins as Gauges of Robustness against Boundary Conditions in Biological Complex Systems

    Science.gov (United States)

    Demongeot, Jacques; Goles, Eric; Morvan, Michel; Noual, Mathilde; Sené, Sylvain

    2010-01-01

    One fundamental concept in the context of biological systems on which researches have flourished in the past decade is that of the apparent robustness of these systems, i.e., their ability to resist to perturbations or constraints induced by external or boundary elements such as electromagnetic fields acting on neural networks, micro-RNAs acting on genetic networks and even hormone flows acting both on neural and genetic networks. Recent studies have shown the importance of addressing the question of the environmental robustness of biological networks such as neural and genetic networks. In some cases, external regulatory elements can be given a relevant formal representation by assimilating them to or modeling them by boundary conditions. This article presents a generic mathematical approach to understand the influence of boundary elements on the dynamics of regulation networks, considering their attraction basins as gauges of their robustness. The application of this method on a real genetic regulation network will point out a mathematical explanation of a biological phenomenon which has only been observed experimentally until now, namely the necessity of the presence of gibberellin for the flower of the plant Arabidopsis thaliana to develop normally. PMID:20700525

  18. Attraction basins as gauges of robustness against boundary conditions in biological complex systems.

    Directory of Open Access Journals (Sweden)

    Jacques Demongeot

    Full Text Available One fundamental concept in the context of biological systems on which researches have flourished in the past decade is that of the apparent robustness of these systems, i.e., their ability to resist to perturbations or constraints induced by external or boundary elements such as electromagnetic fields acting on neural networks, micro-RNAs acting on genetic networks and even hormone flows acting both on neural and genetic networks. Recent studies have shown the importance of addressing the question of the environmental robustness of biological networks such as neural and genetic networks. In some cases, external regulatory elements can be given a relevant formal representation by assimilating them to or modeling them by boundary conditions. This article presents a generic mathematical approach to understand the influence of boundary elements on the dynamics of regulation networks, considering their attraction basins as gauges of their robustness. The application of this method on a real genetic regulation network will point out a mathematical explanation of a biological phenomenon which has only been observed experimentally until now, namely the necessity of the presence of gibberellin for the flower of the plant Arabidopsis thaliana to develop normally.

  19. Confinement dynamics and boundary condition studies in the Reversed Field Pinch

    International Nuclear Information System (INIS)

    Schoenberg, K.F.; Ingraham, J.C.; Moses, R.W. Jr.

    1988-01-01

    The study of confinement dynamics, including investigation of the boundary conditions required for plasma sustainment, are central to the development of the Reversed Field Pinch (RFP) concept. Recently, several insights into confinement have emerged from a detailed investigation RFP electron and ion dynamics. These insights derive from the recognition that both magnetohydrodynamic (MHD) and electron kinetic effects play an important and coupled role in RFP stability, sustainment, and confinement. In this paper, we summarize the results of confinement studies on the ZT-40M experiment, and boundary condition studies on the Wisconsin non-circular RFP experiment. A brief description of the newly commissioned Madison Symmetric Torus (MST) is also presented. 28 refs., 3 figs

  20. Pedestrian recognition using automotive radar sensors

    OpenAIRE

    A. Bartsch; F. Fitzek; R. H. Rasshofer

    2012-01-01

    The application of modern series production automotive radar sensors to pedestrian recognition is an important topic in research on future driver assistance systems. The aim of this paper is to understand the potential and limits of such sensors in pedestrian recognition. This knowledge could be used to develop next generation radar sensors with improved pedestrian recognition capabilities. A new raw radar data signal processing algorithm is proposed that allows deep insight...

  1. 8 CFR 1292.2 - Organizations qualified for recognition; requests for recognition; withdrawal of recognition...

    Science.gov (United States)

    2010-01-01

    ...; requests for recognition; withdrawal of recognition; accreditation of representatives; roster. 1292.2...; requests for recognition; withdrawal of recognition; accreditation of representatives; roster. (a) Qualifications of organizations. A non-profit religious, charitable, social service, or similar organization...

  2. Threshold models of recognition and the recognition heuristic

    Directory of Open Access Journals (Sweden)

    Edgar Erdfelder

    2011-02-01

    Full Text Available According to the recognition heuristic (RH theory, decisions follow the recognition principle: Given a high validity of the recognition cue, people should prefer recognized choice options compared to unrecognized ones. Assuming that the memory strength of choice options is strongly correlated with both the choice criterion and recognition judgments, the RH is a reasonable strategy that approximates optimal decisions with a minimum of cognitive effort (Davis-Stober, Dana, and Budescu, 2010. However, theories of recognition memory are not generally compatible with this assumption. For example, some threshold models of recognition presume that recognition judgments can arise from two types of cognitive states: (1 certainty states in which judgments are almost perfectly correlated with memory strength and (2 uncertainty states in which recognition judgments reflect guessing rather than differences in memory strength. We report an experiment designed to test the prediction that the RH applies to certainty states only. Our results show that memory states rather than recognition judgments affect use of recognition information in binary decisions.

  3. Real-time embedded face recognition for smart home

    NARCIS (Netherlands)

    Zuo, F.; With, de P.H.N.

    2005-01-01

    We propose a near real-time face recognition system for embedding in consumer applications. The system is embedded in a networked home environment and enables personalized services by automatic identification of users. The aim of our research is to design and build a face recognition system that is

  4. Research on a Small Signal Stability Region Boundary Model of the Interconnected Power System with Large-Scale Wind Power

    Directory of Open Access Journals (Sweden)

    Wenying Liu

    2015-03-01

    Full Text Available For the interconnected power system with large-scale wind power, the problem of the small signal stability has become the bottleneck of restricting the sending-out of wind power as well as the security and stability of the whole power system. Around this issue, this paper establishes a small signal stability region boundary model of the interconnected power system with large-scale wind power based on catastrophe theory, providing a new method for analyzing the small signal stability. Firstly, we analyzed the typical characteristics and the mathematic model of the interconnected power system with wind power and pointed out that conventional methods can’t directly identify the topological properties of small signal stability region boundaries. For this problem, adopting catastrophe theory, we established a small signal stability region boundary model of the interconnected power system with large-scale wind power in two-dimensional power injection space and extended it to multiple dimensions to obtain the boundary model in multidimensional power injection space. Thirdly, we analyzed qualitatively the topological property’s changes of the small signal stability region boundary caused by large-scale wind power integration. Finally, we built simulation models by DIgSILENT/PowerFactory software and the final simulation results verified the correctness and effectiveness of the proposed model.

  5. Type I interferon production during herpes simplex virus infection is controlled by cell-type-specific viral recognition through Toll-like receptor 9, the mitochondrial antiviral signaling protein pathway, and novel recognition systems

    DEFF Research Database (Denmark)

    Rasmussen, Simon Brandtoft; Sørensen, Louise Nørgaard; Malmgaard, Lene

    2007-01-01

    Recognition of viruses by germ line-encoded pattern recognition receptors of the innate immune system is essential for rapid production of type I interferon (IFN) and early antiviral defense. We investigated the mechanisms of viral recognition governing production of type I IFN during herpes...... simplex virus (HSV) infection. We show that early production of IFN in vivo is mediated through Toll-like receptor 9 (TLR9) and plasmacytoid dendritic cells, whereas the subsequent alpha/beta IFN (IFN-alpha/beta) response is derived from several cell types and induced independently of TLR9...

  6. Iris recognition in the presence of ocular disease.

    Science.gov (United States)

    Aslam, Tariq Mehmood; Tan, Shi Zhuan; Dhillon, Baljean

    2009-05-06

    Iris recognition systems are among the most accurate of all biometric technologies with immense potential for use in worldwide security applications. This study examined the effect of eye pathology on iris recognition and in particular whether eye disease could cause iris recognition systems to fail. The experiment involved a prospective cohort of 54 patients with anterior segment eye disease who were seen at the acute referral unit of the Princess Alexandra Eye Pavilion in Edinburgh. Iris camera images were obtained from patients before treatment was commenced and again at follow-up appointments after treatment had been given. The principal outcome measure was that of mathematical difference in the iris recognition templates obtained from patients' eyes before and after treatment of the eye disease. Results showed that the performance of iris recognition was remarkably resilient to most ophthalmic disease states, including corneal oedema, iridotomies (laser puncture of iris) and conjunctivitis. Problems were, however, encountered in some patients with acute inflammation of the iris (iritis/anterior uveitis). The effects of a subject developing anterior uveitis may cause current recognition systems to fail. Those developing and deploying iris recognition should be aware of the potential problems that this could cause to this key biometric technology.

  7. Automated Field-of-View, Illumination, and Recognition Algorithm Design of a Vision System for Pick-and-Place Considering Colour Information in Illumination and Images.

    Science.gov (United States)

    Chen, Yibing; Ogata, Taiki; Ueyama, Tsuyoshi; Takada, Toshiyuki; Ota, Jun

    2018-05-22

    Machine vision is playing an increasingly important role in industrial applications, and the automated design of image recognition systems has been a subject of intense research. This study has proposed a system for automatically designing the field-of-view (FOV) of a camera, the illumination strength and the parameters in a recognition algorithm. We formulated the design problem as an optimisation problem and used an experiment based on a hierarchical algorithm to solve it. The evaluation experiments using translucent plastics objects showed that the use of the proposed system resulted in an effective solution with a wide FOV, recognition of all objects and 0.32 mm and 0.4° maximal positional and angular errors when all the RGB (red, green and blue) for illumination and R channel image for recognition were used. Though all the RGB illumination and grey scale images also provided recognition of all the objects, only a narrow FOV was selected. Moreover, full recognition was not achieved by using only G illumination and a grey-scale image. The results showed that the proposed method can automatically design the FOV, illumination and parameters in the recognition algorithm and that tuning all the RGB illumination is desirable even when single-channel or grey-scale images are used for recognition.

  8. Hybrid Radar Emitter Recognition Based on Rough k-Means Classifier and Relevance Vector Machine

    Science.gov (United States)

    Yang, Zhutian; Wu, Zhilu; Yin, Zhendong; Quan, Taifan; Sun, Hongjian

    2013-01-01

    Due to the increasing complexity of electromagnetic signals, there exists a significant challenge for recognizing radar emitter signals. In this paper, a hybrid recognition approach is presented that classifies radar emitter signals by exploiting the different separability of samples. The proposed approach comprises two steps, namely the primary signal recognition and the advanced signal recognition. In the former step, a novel rough k-means classifier, which comprises three regions, i.e., certain area, rough area and uncertain area, is proposed to cluster the samples of radar emitter signals. In the latter step, the samples within the rough boundary are used to train the relevance vector machine (RVM). Then RVM is used to recognize the samples in the uncertain area; therefore, the classification accuracy is improved. Simulation results show that, for recognizing radar emitter signals, the proposed hybrid recognition approach is more accurate, and presents lower computational complexity than traditional approaches. PMID:23344380

  9. Quadcopter Control Using Speech Recognition

    Science.gov (United States)

    Malik, H.; Darma, S.; Soekirno, S.

    2018-04-01

    This research reported a comparison from a success rate of speech recognition systems that used two types of databases they were existing databases and new databases, that were implemented into quadcopter as motion control. Speech recognition system was using Mel frequency cepstral coefficient method (MFCC) as feature extraction that was trained using recursive neural network method (RNN). MFCC method was one of the feature extraction methods that most used for speech recognition. This method has a success rate of 80% - 95%. Existing database was used to measure the success rate of RNN method. The new database was created using Indonesian language and then the success rate was compared with results from an existing database. Sound input from the microphone was processed on a DSP module with MFCC method to get the characteristic values. Then, the characteristic values were trained using the RNN which result was a command. The command became a control input to the single board computer (SBC) which result was the movement of the quadcopter. On SBC, we used robot operating system (ROS) as the kernel (Operating System).

  10. Increasing the information acquisition volume in iris recognition systems.

    Science.gov (United States)

    Barwick, D Shane

    2008-09-10

    A significant hurdle for the widespread adoption of iris recognition in security applications is that the typically small imaging volume for eye placement results in systems that are not user friendly. Separable cubic phase plates at the lens pupil have been shown to ameliorate this disadvantage by increasing the depth of field. However, these phase masks have limitations on how efficiently they can capture the information-bearing spatial frequencies in iris images. The performance gains in information acquisition that can be achieved by more general, nonseparable phase masks is demonstrated. A detailed design method is presented, and simulations using representative designs allow for performance comparisons.

  11. Development of ecological monitoring systems for near-boundary regions of Russia and Kazakhstan in the 'Integration' Federal program framework

    International Nuclear Information System (INIS)

    Valyaev, A.N.; Kiselev, V.P.; Gerasimenko, N.N.; Dzhamanbalin, K.K.

    2003-01-01

    The present paper is devoted to description of basic works carrying out within framework of the International project 'Ecological monitoring of Russia and Kazakhstan boundary regions'. In 2002 the works were conducted by three directions: preparation of necessary boundary areas' electronic maps; overview of existing information sources (Kostanai and Chelyabinsk cities are as an example); implementation of ecological information data bases structures on boundary areas. The geographic information system MapInfo was selected in the capacity of geo-information system. The implementation information-simulating complex is planing as open developing system. In the framework of the complex the combined operation of a set of different-scale special-purpose information, simulating and geo-information systems have been provided

  12. Cost-Sensitive Learning for Emotion Robust Speaker Recognition

    Directory of Open Access Journals (Sweden)

    Dongdong Li

    2014-01-01

    Full Text Available In the field of information security, voice is one of the most important parts in biometrics. Especially, with the development of voice communication through the Internet or telephone system, huge voice data resources are accessed. In speaker recognition, voiceprint can be applied as the unique password for the user to prove his/her identity. However, speech with various emotions can cause an unacceptably high error rate and aggravate the performance of speaker recognition system. This paper deals with this problem by introducing a cost-sensitive learning technology to reweight the probability of test affective utterances in the pitch envelop level, which can enhance the robustness in emotion-dependent speaker recognition effectively. Based on that technology, a new architecture of recognition system as well as its components is proposed in this paper. The experiment conducted on the Mandarin Affective Speech Corpus shows that an improvement of 8% identification rate over the traditional speaker recognition is achieved.

  13. Cost-sensitive learning for emotion robust speaker recognition.

    Science.gov (United States)

    Li, Dongdong; Yang, Yingchun; Dai, Weihui

    2014-01-01

    In the field of information security, voice is one of the most important parts in biometrics. Especially, with the development of voice communication through the Internet or telephone system, huge voice data resources are accessed. In speaker recognition, voiceprint can be applied as the unique password for the user to prove his/her identity. However, speech with various emotions can cause an unacceptably high error rate and aggravate the performance of speaker recognition system. This paper deals with this problem by introducing a cost-sensitive learning technology to reweight the probability of test affective utterances in the pitch envelop level, which can enhance the robustness in emotion-dependent speaker recognition effectively. Based on that technology, a new architecture of recognition system as well as its components is proposed in this paper. The experiment conducted on the Mandarin Affective Speech Corpus shows that an improvement of 8% identification rate over the traditional speaker recognition is achieved.

  14. Support vector machine for automatic pain recognition

    Science.gov (United States)

    Monwar, Md Maruf; Rezaei, Siamak

    2009-02-01

    Facial expressions are a key index of emotion and the interpretation of such expressions of emotion is critical to everyday social functioning. In this paper, we present an efficient video analysis technique for recognition of a specific expression, pain, from human faces. We employ an automatic face detector which detects face from the stored video frame using skin color modeling technique. For pain recognition, location and shape features of the detected faces are computed. These features are then used as inputs to a support vector machine (SVM) for classification. We compare the results with neural network based and eigenimage based automatic pain recognition systems. The experiment results indicate that using support vector machine as classifier can certainly improve the performance of automatic pain recognition system.

  15. Face recognition in the thermal infrared domain

    Science.gov (United States)

    Kowalski, M.; Grudzień, A.; Palka, N.; Szustakowski, M.

    2017-10-01

    Biometrics refers to unique human characteristics. Each unique characteristic may be used to label and describe individuals and for automatic recognition of a person based on physiological or behavioural properties. One of the most natural and the most popular biometric trait is a face. The most common research methods on face recognition are based on visible light. State-of-the-art face recognition systems operating in the visible light spectrum achieve very high level of recognition accuracy under controlled environmental conditions. Thermal infrared imagery seems to be a promising alternative or complement to visible range imaging due to its relatively high resistance to illumination changes. A thermal infrared image of the human face presents its unique heat-signature and can be used for recognition. The characteristics of thermal images maintain advantages over visible light images, and can be used to improve algorithms of human face recognition in several aspects. Mid-wavelength or far-wavelength infrared also referred to as thermal infrared seems to be promising alternatives. We present the study on 1:1 recognition in thermal infrared domain. The two approaches we are considering are stand-off face verification of non-moving person as well as stop-less face verification on-the-move. The paper presents methodology of our studies and challenges for face recognition systems in the thermal infrared domain.

  16. Similarity measures for face recognition

    CERN Document Server

    Vezzetti, Enrico

    2015-01-01

    Face recognition has several applications, including security, such as (authentication and identification of device users and criminal suspects), and in medicine (corrective surgery and diagnosis). Facial recognition programs rely on algorithms that can compare and compute the similarity between two sets of images. This eBook explains some of the similarity measures used in facial recognition systems in a single volume. Readers will learn about various measures including Minkowski distances, Mahalanobis distances, Hansdorff distances, cosine-based distances, among other methods. The book also summarizes errors that may occur in face recognition methods. Computer scientists "facing face" and looking to select and test different methods of computing similarities will benefit from this book. The book is also useful tool for students undertaking computer vision courses.

  17. Unvoiced Speech Recognition Using Tissue-Conductive Acoustic Sensor

    Directory of Open Access Journals (Sweden)

    Hiroshi Saruwatari

    2007-01-01

    Full Text Available We present the use of stethoscope and silicon NAM (nonaudible murmur microphones in automatic speech recognition. NAM microphones are special acoustic sensors, which are attached behind the talker's ear and can capture not only normal (audible speech, but also very quietly uttered speech (nonaudible murmur. As a result, NAM microphones can be applied in automatic speech recognition systems when privacy is desired in human-machine communication. Moreover, NAM microphones show robustness against noise and they might be used in special systems (speech recognition, speech transform, etc. for sound-impaired people. Using adaptation techniques and a small amount of training data, we achieved for a 20 k dictation task a 93.9% word accuracy for nonaudible murmur recognition in a clean environment. In this paper, we also investigate nonaudible murmur recognition in noisy environments and the effect of the Lombard reflex on nonaudible murmur recognition. We also propose three methods to integrate audible speech and nonaudible murmur recognition using a stethoscope NAM microphone with very promising results.

  18. The Boundary Function Method. Fundamentals

    Science.gov (United States)

    Kot, V. A.

    2017-03-01

    The boundary function method is proposed for solving applied problems of mathematical physics in the region defined by a partial differential equation of the general form involving constant or variable coefficients with a Dirichlet, Neumann, or Robin boundary condition. In this method, the desired function is defined by a power polynomial, and a boundary function represented in the form of the desired function or its derivative at one of the boundary points is introduced. Different sequences of boundary equations have been set up with the use of differential operators. Systems of linear algebraic equations constructed on the basis of these sequences allow one to determine the coefficients of a power polynomial. Constitutive equations have been derived for initial boundary-value problems of all the main types. With these equations, an initial boundary-value problem is transformed into the Cauchy problem for the boundary function. The determination of the boundary function by its derivative with respect to the time coordinate completes the solution of the problem.

  19. Textual emotion recognition for enhancing enterprise computing

    Science.gov (United States)

    Quan, Changqin; Ren, Fuji

    2016-05-01

    The growing interest in affective computing (AC) brings a lot of valuable research topics that can meet different application demands in enterprise systems. The present study explores a sub area of AC techniques - textual emotion recognition for enhancing enterprise computing. Multi-label emotion recognition in text is able to provide a more comprehensive understanding of emotions than single label emotion recognition. A representation of 'emotion state in text' is proposed to encompass the multidimensional emotions in text. It ensures the description in a formal way of the configurations of basic emotions as well as of the relations between them. Our method allows recognition of the emotions for the words bear indirect emotions, emotion ambiguity and multiple emotions. We further investigate the effect of word order for emotional expression by comparing the performances of bag-of-words model and sequence model for multi-label sentence emotion recognition. The experiments show that the classification results under sequence model are better than under bag-of-words model. And homogeneous Markov model showed promising results of multi-label sentence emotion recognition. This emotion recognition system is able to provide a convenient way to acquire valuable emotion information and to improve enterprise competitive ability in many aspects.

  20. Fluid pipeline system leak detection based on neural network and pattern recognition

    International Nuclear Information System (INIS)

    Tang Xiujia

    1998-01-01

    The mechanism of the stress wave propagation along the pipeline system of NPP, caused by turbulent ejection from pipeline leakage, is researched. A series of characteristic index are described in time domain or frequency domain, and compress numerical algorithm is developed for original data compression. A back propagation neural networks (BPNN) with the input matrix composed by stress wave characteristics in time domain or frequency domain is first proposed to classify various situations of the pipeline, in order to detect the leakage in the fluid flow pipelines. The capability of the new method had been demonstrated by experiments and finally used to design a handy instrument for the pipeline leakage detection. Usually a pipeline system has many inner branches and often in adjusting dynamic condition, it is difficult for traditional pipeline diagnosis facilities to identify the difference between inner pipeline operation and pipeline fault. The author first proposed pipeline wave propagation identification by pattern recognition to diagnose pipeline leak. A series of pattern primitives such as peaks, valleys, horizon lines, capstan peaks, dominant relations, slave relations, etc., are used to extract features of the negative pressure wave form. The context-free grammar of symbolic representation of the negative wave form is used, and a negative wave form parsing system with application to structural pattern recognition based on the representation is first proposed to detect and localize leaks of the fluid pipelines

  1. Speech emotion recognition methods: A literature review

    Science.gov (United States)

    Basharirad, Babak; Moradhaseli, Mohammadreza

    2017-10-01

    Recently, attention of the emotional speech signals research has been boosted in human machine interfaces due to availability of high computation capability. There are many systems proposed in the literature to identify the emotional state through speech. Selection of suitable feature sets, design of a proper classifications methods and prepare an appropriate dataset are the main key issues of speech emotion recognition systems. This paper critically analyzed the current available approaches of speech emotion recognition methods based on the three evaluating parameters (feature set, classification of features, accurately usage). In addition, this paper also evaluates the performance and limitations of available methods. Furthermore, it highlights the current promising direction for improvement of speech emotion recognition systems.

  2. A food recognition system for diabetic patients based on an optimized bag-of-features model.

    Science.gov (United States)

    Anthimopoulos, Marios M; Gianola, Lauro; Scarnato, Luca; Diem, Peter; Mougiakakou, Stavroula G

    2014-07-01

    Computer vision-based food recognition could be used to estimate a meal's carbohydrate content for diabetic patients. This study proposes a methodology for automatic food recognition, based on the bag-of-features (BoF) model. An extensive technical investigation was conducted for the identification and optimization of the best performing components involved in the BoF architecture, as well as the estimation of the corresponding parameters. For the design and evaluation of the prototype system, a visual dataset with nearly 5000 food images was created and organized into 11 classes. The optimized system computes dense local features, using the scale-invariant feature transform on the HSV color space, builds a visual dictionary of 10000 visual words by using the hierarchical k-means clustering and finally classifies the food images with a linear support vector machine classifier. The system achieved classification accuracy of the order of 78%, thus proving the feasibility of the proposed approach in a very challenging image dataset.

  3. Efficient CEPSTRAL Normalization for Robust Speech Recognition

    National Research Council Canada - National Science Library

    Liu, Fu-Hua; Stern, Richard M; Huang, Xuedong; Acero, Alejandro

    1993-01-01

    In this paper we describe and compare the performance of a series of cepstrum-based procedures that enable the CMU SPHINX-II speech recognition system to maintain a high level of recognition accuracy...

  4. An Intelligent Systems Approach to Automated Object Recognition: A Preliminary Study

    Science.gov (United States)

    Maddox, Brian G.; Swadley, Casey L.

    2002-01-01

    Attempts at fully automated object recognition systems have met with varying levels of success over the years. However, none of the systems have achieved high enough accuracy rates to be run unattended. One of the reasons for this may be that they are designed from the computer's point of view and rely mainly on image-processing methods. A better solution to this problem may be to make use of modern advances in computational intelligence and distributed processing to try to mimic how the human brain is thought to recognize objects. As humans combine cognitive processes with detection techniques, such a system would combine traditional image-processing techniques with computer-based intelligence to determine the identity of various objects in a scene.

  5. New neural-networks-based 3D object recognition system

    Science.gov (United States)

    Abolmaesumi, Purang; Jahed, M.

    1997-09-01

    Three-dimensional object recognition has always been one of the challenging fields in computer vision. In recent years, Ulman and Basri (1991) have proposed that this task can be done by using a database of 2-D views of the objects. The main problem in their proposed system is that the correspondent points should be known to interpolate the views. On the other hand, their system should have a supervisor to decide which class does the represented view belong to. In this paper, we propose a new momentum-Fourier descriptor that is invariant to scale, translation, and rotation. This descriptor provides the input feature vectors to our proposed system. By using the Dystal network, we show that the objects can be classified with over 95% precision. We have used this system to classify the objects like cube, cone, sphere, torus, and cylinder. Because of the nature of the Dystal network, this system reaches to its stable point by a single representation of the view to the system. This system can also classify the similar views to a single class (e.g., for the cube, the system generated 9 different classes for 50 different input views), which can be used to select an optimum database of training views. The system is also very flexible to the noise and deformed views.

  6. Automatic Speech Recognition Systems for the Evaluation of Voice and Speech Disorders in Head and Neck Cancer

    OpenAIRE

    Andreas Maier; Tino Haderlein; Florian Stelzle; Elmar Nöth; Emeka Nkenke; Frank Rosanowski; Anne Schützenberger; Maria Schuster

    2010-01-01

    In patients suffering from head and neck cancer, speech intelligibility is often restricted. For assessment and outcome measurements, automatic speech recognition systems have previously been shown to be appropriate for objective and quick evaluation of intelligibility. In this study we investigate the applicability of the method to speech disorders caused by head and neck cancer. Intelligibility was quantified by speech recognition on recordings of a standard text read by 41 German laryngect...

  7. Performance Study of the First 2D Prototype of Vertically Integrated Pattern Recognition Associative Memory (VIPRAM)

    Energy Technology Data Exchange (ETDEWEB)

    Deptuch, Gregory [Fermilab; Hoff, James [Fermilab; Jindariani, Sergo [Fermilab; Liu, Tiehui [Fermilab; Olsen, Jamieson [Fermilab; Tran, Nhan [Fermilab; Joshi, Siddhartha [Northwestern U.; Li, Dawei [Northwestern U.; Ogrenci-Memik, Seda [Northwestern U.

    2017-09-24

    Extremely fast pattern recognition capabilities are necessary to find and fit billions of tracks at the hardware trigger level produced every second anticipated at high luminosity LHC (HL-LHC) running conditions. Associative Memory (AM) based approaches for fast pattern recognition have been proposed as a potential solution to the tracking trigger. However, at the HL-LHC, there is much less time available and speed performance must be improved over previous systems while maintaining a comparable number of patterns. The Vertically Integrated Pattern Recognition Associative Memory (VIPRAM) Project aims to achieve the target pattern density and performance goal using 3DIC technology. The first step taken in the VIPRAM work was the development of a 2D prototype (protoVIPRAM00) in which the associative memory building blocks were designed to be compatible with the 3D integration. In this paper, we present the results from extensive performance studies of the protoVIPRAM00 chip in both realistic HL-LHC and extreme conditions. Results indicate that the chip operates at the design frequency of 100 MHz with perfect correctness in realistic conditions and conclude that the building blocks are ready for 3D stacking. We also present performance boundary characterization of the chip under extreme conditions.

  8. An automatic system for Turkish word recognition using Discrete Wavelet Neural Network based on adaptive entropy

    International Nuclear Information System (INIS)

    Avci, E.

    2007-01-01

    In this paper, an automatic system is presented for word recognition using real Turkish word signals. This paper especially deals with combination of the feature extraction and classification from real Turkish word signals. A Discrete Wavelet Neural Network (DWNN) model is used, which consists of two layers: discrete wavelet layer and multi-layer perceptron. The discrete wavelet layer is used for adaptive feature extraction in the time-frequency domain and is composed of Discrete Wavelet Transform (DWT) and wavelet entropy. The multi-layer perceptron used for classification is a feed-forward neural network. The performance of the used system is evaluated by using noisy Turkish word signals. Test results showing the effectiveness of the proposed automatic system are presented in this paper. The rate of correct recognition is about 92.5% for the sample speech signals. (author)

  9. Using Face Recognition System in Ship Protection Process

    Directory of Open Access Journals (Sweden)

    Miroslav Bača

    2006-03-01

    Full Text Available The process of security improvement is a huge problem especiallyin large ships. Terrorist attacks and everyday threatsagainst life and property destroy transport and tourist companies,especially large tourist ships. Every person on a ship can berecognized and identified using something that the personknows or by means of something the person possesses. The bestresults will be obtained by using a combination of the person'sknowledge with one biometric characteristic. Analyzing theproblem of biometrics in ITS security we can conclude that facerecognition process supported by one or two traditional biometriccharacteristics can give very good results regarding ship security.In this paper we will describe a biometric system basedon face recognition. Special focus will be given to crew member'sbiometric security in crisis situation like kidnapping, robbelyor illness.

  10. Embedded palmprint recognition system using OMAP 3530.

    Science.gov (United States)

    Shen, Linlin; Wu, Shipei; Zheng, Songhao; Ji, Zhen

    2012-01-01

    We have proposed in this paper an embedded palmprint recognition system using the dual-core OMAP 3530 platform. An improved algorithm based on palm code was proposed first. In this method, a Gabor wavelet is first convolved with the palmprint image to produce a response image, where local binary patterns are then applied to code the relation among the magnitude of wavelet response at the central pixel with that of its neighbors. The method is fully tested using the public PolyU palmprint database. While palm code achieves only about 89% accuracy, over 96% accuracy is achieved by the proposed G-LBP approach. The proposed algorithm was then deployed to the DSP processor of OMAP 3530 and work together with the ARM processor for feature extraction. When complicated algorithms run on the DSP processor, the ARM processor can focus on image capture, user interface and peripheral control. Integrated with an image sensing module and central processing board, the designed device can achieve accurate and real time performance.

  11. Distributed Tuning of Boundary Resources

    DEFF Research Database (Denmark)

    Eaton, Ben; Elaluf-Calderwood, Silvia; Sørensen, Carsten

    2015-01-01

    in the context of a paradoxical tension between the logic of generative and democratic innovations and the logic of infrastructural control. Boundary resources play a critical role in managing the tension as a firm that owns the infrastructure can secure its control over the service system while independent...... firms can participate in the service system. In this study, we explore the evolution of boundary resources. Drawing on Pickering’s (1993) and Barrett et al.’s (2012) conceptualizations of tuning, the paper seeks to forward our understanding of how heterogeneous actors engage in the tuning of boundary...

  12. Divergent short- and long-term effects of acute stress in object recognition memory are mediated by endogenous opioid system activation.

    Science.gov (United States)

    Nava-Mesa, Mauricio O; Lamprea, Marisol R; Múnera, Alejandro

    2013-11-01

    Acute stress induces short-term object recognition memory impairment and elicits endogenous opioid system activation. The aim of this study was thus to evaluate whether opiate system activation mediates the acute stress-induced object recognition memory changes. Adult male Wistar rats were trained in an object recognition task designed to test both short- and long-term memory. Subjects were randomly assigned to receive an intraperitoneal injection of saline, 1 mg/kg naltrexone or 3 mg/kg naltrexone, four and a half hours before the sample trial. Five minutes after the injection, half the subjects were submitted to movement restraint during four hours while the other half remained in their home cages. Non-stressed subjects receiving saline (control) performed adequately during the short-term memory test, while stressed subjects receiving saline displayed impaired performance. Naltrexone prevented such deleterious effect, in spite of the fact that it had no intrinsic effect on short-term object recognition memory. Stressed subjects receiving saline and non-stressed subjects receiving naltrexone performed adequately during the long-term memory test; however, control subjects as well as stressed subjects receiving a high dose of naltrexone performed poorly. Control subjects' dissociated performance during both memory tests suggests that the short-term memory test induced a retroactive interference effect mediated through light opioid system activation; such effect was prevented either by low dose naltrexone administration or by strongly activating the opioid system through acute stress. Both short-term memory retrieval impairment and long-term memory improvement observed in stressed subjects may have been mediated through strong opioid system activation, since they were prevented by high dose naltrexone administration. Therefore, the activation of the opioid system plays a dual modulating role in object recognition memory. Copyright © 2013 Elsevier Inc. All rights

  13. A Vehicle Steering Recognition System Based on Low-Cost Smartphone Sensors

    Directory of Open Access Journals (Sweden)

    Xinhua Liu

    2017-03-01

    Full Text Available Recognizing how a vehicle is steered and then alerting drivers in real time is of utmost importance to the vehicle and driver’s safety, since fatal accidents are often caused by dangerous vehicle maneuvers, such as rapid turns, fast lane-changes, etc. Existing solutions using video or in-vehicle sensors have been employed to identify dangerous vehicle maneuvers, but these methods are subject to the effects of the environmental elements or the hardware is very costly. In the mobile computing era, smartphones have become key tools to develop innovative mobile context-aware systems. In this paper, we present a recognition system for dangerous vehicle steering based on the low-cost sensors found in a smartphone: i.e., the gyroscope and the accelerometer. To identify vehicle steering maneuvers, we focus on the vehicle’s angular velocity, which is characterized by gyroscope data from a smartphone mounted in the vehicle. Three steering maneuvers including turns, lane-changes and U-turns are defined, and a vehicle angular velocity matching algorithm based on Fast Dynamic Time Warping (FastDTW is adopted to recognize the vehicle steering. The results of extensive experiments show that the average accuracy rate of the presented recognition reaches 95%, which implies that the proposed smartphone-based method is suitable for recognizing dangerous vehicle steering maneuvers.

  14. Performance improvement of 64-QAM coherent optical communication system by optimizing symbol decision boundary based on support vector machine

    Science.gov (United States)

    Chen, Wei; Zhang, Junfeng; Gao, Mingyi; Shen, Gangxiang

    2018-03-01

    High-order modulation signals are suited for high-capacity communication systems because of their high spectral efficiency, but they are more vulnerable to various impairments. For the signals that experience degradation, when symbol points overlap on the constellation diagram, the original linear decision boundary cannot be used to distinguish the classification of symbol. Therefore, it is advantageous to create an optimum symbol decision boundary for the degraded signals. In this work, we experimentally demonstrated the 64-quadrature-amplitude modulation (64-QAM) coherent optical communication system using support-vector machine (SVM) decision boundary algorithm to create the optimum symbol decision boundary for improving the system performance. We investigated the influence of various impairments on the 64-QAM coherent optical communication systems, such as the impairments caused by modulator nonlinearity, phase skew between in-phase (I) arm and quadrature-phase (Q) arm of the modulator, fiber Kerr nonlinearity and amplified spontaneous emission (ASE) noise. We measured the bit-error-ratio (BER) performance of 75-Gb/s 64-QAM signals in the back-to-back and 50-km transmission. By using SVM to optimize symbol decision boundary, the impairments caused by I/Q phase skew of the modulator, fiber Kerr nonlinearity and ASE noise are greatly mitigated.

  15. Involvement of the oxytocin system in the bed nucleus of the stria terminalis in the sex-specific regulation of social recognition

    Science.gov (United States)

    Dumais, Kelly M.; Alonso, Andrea G.; Immormino, Marisa A.; Bredewold, Remco; Veenema, Alexa H.

    2015-01-01

    Sex differences in the oxytocin (OT) system in the brain may explain why OT often regulates social behaviors in sex-specific ways. However, a link between sex differences in the OT system and sex-specific regulation of social behavior has not been tested. Here, we determined whether sex differences in the OT receptor (OTR) or in OT release in the posterior bed nucleus of the stria terminalis (pBNST) mediates sex-specific regulation of social recognition in rats. We recently showed that, compared to female rats, male rats have a three-fold higher OTR binding density in the pBNST, a sexually dimorphic area implicated in the regulation of social behaviors. We now demonstrate that OTR antagonist (5 ng/0.5 μl/side) administration into the pBNST impairs social recognition in both sexes, while OT (100 pg/0.5 μl/side) administration into the pBNST prolongs the duration of social recognition in males only. These effects seem specific to social recognition, as neither treatment altered total social investigation time in either sex. Moreover, baseline OT release in the pBNST, as measured with in vivo microdialysis, did not differ between the sexes. However, males showed higher OT release in the pBNST during social recognition compared to females. These findings suggest a sex-specific role of the OT system in the pBNST in the regulation of social recognition. PMID:26630388

  16. Involvement of the oxytocin system in the bed nucleus of the stria terminalis in the sex-specific regulation of social recognition.

    Science.gov (United States)

    Dumais, Kelly M; Alonso, Andrea G; Immormino, Marisa A; Bredewold, Remco; Veenema, Alexa H

    2016-02-01

    Sex differences in the oxytocin (OT) system in the brain may explain why OT often regulates social behaviors in sex-specific ways. However, a link between sex differences in the OT system and sex-specific regulation of social behavior has not been tested. Here, we determined whether sex differences in the OT receptor (OTR) or in OT release in the posterior bed nucleus of the stria terminalis (pBNST) mediates sex-specific regulation of social recognition in rats. We recently showed that, compared to female rats, male rats have a three-fold higher OTR binding density in the pBNST, a sexually dimorphic area implicated in the regulation of social behaviors. We now demonstrate that OTR antagonist (5 ng/0.5 μl/side) administration into the pBNST impairs social recognition in both sexes, while OT (100 pg/0.5 μl/side) administration into the pBNST prolongs the duration of social recognition in males only. These effects seem specific to social recognition, as neither treatment altered total social investigation time in either sex. Moreover, baseline OT release in the pBNST, as measured with in vivo microdialysis, did not differ between the sexes. However, males showed higher OT release in the pBNST during social recognition compared to females. These findings suggest a sex-specific role of the OT system in the pBNST in the regulation of social recognition. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Effects from magnetic boundary conditions in superconducting-magnetic proximity systems

    Directory of Open Access Journals (Sweden)

    Thomas E. Baker

    2016-05-01

    Full Text Available A superconductor-magnetic proximity system displays singlet-triplet pair correlations in the magnetization as a function of inhomogeneities of the magnetic profile. We discuss how the magnetic boundary conditions affects differently the curvature and winding number of rotating magnetizations in the three commonly used structures to generate long range triplet components: an exchange spring, a helical structure and a misaligned magnetic multilayer. We conclude that the choice of the system is dictated by the goal one wishes to achieve in designing a spintronic device but note that only the exchange spring presently offers an experimentally realizable magnetic profile that is tunable.

  18. Traffic sign recognition with deep convolutional neural networks

    OpenAIRE

    Karamatić, Boris

    2016-01-01

    The problem of detection and recognition of traffic signs is becoming an important problem when it comes to the development of self driving cars and advanced driver assistance systems. In this thesis we will develop a system for detection and recognition of traffic signs. For the problem of detection we will use aggregate channel features and for the problem of recognition we will use a deep convolutional neural network. We will describe how convolutional neural networks work, how they are co...

  19. Quality based approach for adaptive face recognition

    Science.gov (United States)

    Abboud, Ali J.; Sellahewa, Harin; Jassim, Sabah A.

    2009-05-01

    Recent advances in biometric technology have pushed towards more robust and reliable systems. We aim to build systems that have low recognition errors and are less affected by variation in recording conditions. Recognition errors are often attributed to the usage of low quality biometric samples. Hence, there is a need to develop new intelligent techniques and strategies to automatically measure/quantify the quality of biometric image samples and if necessary restore image quality according to the need of the intended application. In this paper, we present no-reference image quality measures in the spatial domain that have impact on face recognition. The first is called symmetrical adaptive local quality index (SALQI) and the second is called middle halve (MH). Also, an adaptive strategy has been developed to select the best way to restore the image quality, called symmetrical adaptive histogram equalization (SAHE). The main benefits of using quality measures for adaptive strategy are: (1) avoidance of excessive unnecessary enhancement procedures that may cause undesired artifacts, and (2) reduced computational complexity which is essential for real time applications. We test the success of the proposed measures and adaptive approach for a wavelet-based face recognition system that uses the nearest neighborhood classifier. We shall demonstrate noticeable improvements in the performance of adaptive face recognition system over the corresponding non-adaptive scheme.

  20. Boltzmann’s Six-Moment One-Dimensional Nonlinear System Equations with the Maxwell-Auzhan Boundary Conditions

    Directory of Open Access Journals (Sweden)

    A. Sakabekov

    2016-01-01

    Full Text Available We prove existence and uniqueness of the solution of the problem with initial and Maxwell-Auzhan boundary conditions for nonstationary nonlinear one-dimensional Boltzmann’s six-moment system equations in space of functions continuous in time and summable in square by a spatial variable. In order to obtain a priori estimation of the initial and boundary value problem for nonstationary nonlinear one-dimensional Boltzmann’s six-moment system equations we get the integral equality and then use the spherical representation of vector. Then we obtain the initial value problem for Riccati equation. We have managed to obtain a particular solution of this equation in an explicit form.

  1. An Examination of the Effect of Boundary Layer Ingestion on Turboelectric Distributed Propulsion Systems

    Science.gov (United States)

    Felder, James L.; Kim, Huyn Dae; Brown, Gerald V.; Chu, Julio

    2011-01-01

    A Turboelectric Distributed Propulsion (TeDP) system differs from other propulsion systems by the use of electrical power to transmit power from the turbine to the fan. Electrical power can be efficiently transmitted over longer distances and with complex topologies. Also the use of power inverters allows the generator and motors speeds to be independent of one another. This decoupling allows the aircraft designer to place the core engines and the fans in locations most advantageous for each. The result can be very different installation environments for the different devices. Thus the installation effects on this system can be quite different than conventional turbofans where the fan and core both see the same installed environments. This paper examines a propulsion system consisting of two superconducting generators, each driven by a turboshaft engine located so that their inlets ingest freestream air, superconducting electrical transmission lines, and an array of superconducting motor driven fan positioned across the upper/rear fuselage area of a hybrid wing body aircraft in a continuous nacelle that ingests all of the upper fuselage boundary layer. The effect of ingesting the boundary layer on the design of the system with a range of design pressure ratios is examined. Also the impact of ingesting the boundary layer on off-design performance is examined. The results show that when examining different design fan pressure ratios it is important to recalculate of the boundary layer mass-average Pt and MN up the height for each inlet height during convergence of the design point for each fan design pressure ratio examined. Correct estimation of off-design performance is dependent on the height of the column of air measured from the aircraft surface immediately prior to any external diffusion that will flow through the fan propulsors. The mass-averaged Pt and MN calculated for this column of air determine the Pt and MN seen by the propulsor inlet. Since the height

  2. Pattern recognition

    CERN Document Server

    Theodoridis, Sergios

    2003-01-01

    Pattern recognition is a scientific discipline that is becoming increasingly important in the age of automation and information handling and retrieval. Patter Recognition, 2e covers the entire spectrum of pattern recognition applications, from image analysis to speech recognition and communications. This book presents cutting-edge material on neural networks, - a set of linked microprocessors that can form associations and uses pattern recognition to ""learn"" -and enhances student motivation by approaching pattern recognition from the designer's point of view. A direct result of more than 10

  3. Determining system boundaries on commercial broiler chicken production system using ISO 14040/14044 guideline: A case Study

    Science.gov (United States)

    Sidek, ‘A. A.; Suffian, S. A.; Al-Hazza, M. H. F.; Yusof, H. M.

    2018-01-01

    The demand of poultry product in Malaysia market shows an escalation throughout the year and expected to increase in the future. The expansion of poultry production has led to environmental concern in relation to their operational impact to environmentAt present, assessment of waste management of poultry production in Malaysia is lacking. A case study research was conducted in a commercial broiler farm to identify and assess the system boundaries in the lifecycle supply chain of broiler chicken production using ISO 14040/44 guidelines. ISO 14040/44 standard includes Life Cycle Assessment (LCA) framework guidelines to evaluate environmental influence associated with a product/process throughout its life span. All attributes associated with broiler operation is defined and the system boundaries is determined to identify possible inputs and outputs in the case study. This paper discuss the initial stage in the LCA process, which set the context of the research and prepare for the stage of Life Cycle Inventory.

  4. Dynamic Programming Algorithms in Speech Recognition

    Directory of Open Access Journals (Sweden)

    Titus Felix FURTUNA

    2008-01-01

    Full Text Available In a system of speech recognition containing words, the recognition requires the comparison between the entry signal of the word and the various words of the dictionary. The problem can be solved efficiently by a dynamic comparison algorithm whose goal is to put in optimal correspondence the temporal scales of the two words. An algorithm of this type is Dynamic Time Warping. This paper presents two alternatives for implementation of the algorithm designed for recognition of the isolated words.

  5. Regularization of the Boundary-Saddle-Node Bifurcation

    Directory of Open Access Journals (Sweden)

    Xia Liu

    2018-01-01

    Full Text Available In this paper we treat a particular class of planar Filippov systems which consist of two smooth systems that are separated by a discontinuity boundary. In such systems one vector field undergoes a saddle-node bifurcation while the other vector field is transversal to the boundary. The boundary-saddle-node (BSN bifurcation occurs at a critical value when the saddle-node point is located on the discontinuity boundary. We derive a local topological normal form for the BSN bifurcation and study its local dynamics by applying the classical Filippov’s convex method and a novel regularization approach. In fact, by the regularization approach a given Filippov system is approximated by a piecewise-smooth continuous system. Moreover, the regularization process produces a singular perturbation problem where the original discontinuous set becomes a center manifold. Thus, the regularization enables us to make use of the established theories for continuous systems and slow-fast systems to study the local behavior around the BSN bifurcation.

  6. An analog VLSI real time optical character recognition system based on a neural architecture

    International Nuclear Information System (INIS)

    Bo, G.; Caviglia, D.; Valle, M.

    1999-01-01

    In this paper a real time Optical Character Recognition system is presented: it is based on a feature extraction module and a neural network classifier which have been designed and fabricated in analog VLSI technology. Experimental results validate the circuit functionality. The results obtained from a validation based on a mixed approach (i.e., an approach based on both experimental and simulation results) confirm the soundness and reliability of the system

  7. An analog VLSI real time optical character recognition system based on a neural architecture

    Energy Technology Data Exchange (ETDEWEB)

    Bo, G.; Caviglia, D.; Valle, M. [Genoa Univ. (Italy). Dip. of Biophysical and Electronic Engineering

    1999-03-01

    In this paper a real time Optical Character Recognition system is presented: it is based on a feature extraction module and a neural network classifier which have been designed and fabricated in analog VLSI technology. Experimental results validate the circuit functionality. The results obtained from a validation based on a mixed approach (i.e., an approach based on both experimental and simulation results) confirm the soundness and reliability of the system.

  8. Regularity of pointwise boundary control systems

    DEFF Research Database (Denmark)

    Pedersen, Michael

    1992-01-01

    We will in these notes address some problems arising in "real-life" control application, namely problems concerning distributional control inputs on the boundary of the spatial domain. We extend the classical variational approach and give easily checkable sufficient conditions for the solutions...

  9. Singular boundary perturbations of distributed systems

    DEFF Research Database (Denmark)

    Pedersen, Michael

    1990-01-01

    Some problems arising in real-life control applications are addressed--namely, problems concerning non-smooth control inputs on the boundary of the spatial domain. The classical variational approach is extended, and sufficient conditions are given for the solutions to continuous functions of time...

  10. Pengoperasian Beban Listrik Fase Tunggal Terkendali Melalui Minimum System Berbasis Mikrokontroler Dan Sensor Voice Recognition (Vr)

    OpenAIRE

    Goeritno, Arief; Ginting, Sandy Ferdiansyah; Yatim, Rakhmad

    2017-01-01

    Minimum system berbasis mikrokontroler dan sensor voice recognition (VR) sebagai pengendali aktuator telah digunakan untuk pengoperasian beban listrik fase tunggal. Minimum system adalah suatu sistem yang tersusun melalui 2 (dua) tahapan, yaitu (a) diagram rangkaian dan bentuk fisis board dan (b) pengawatan terintegrasi terhadap minimum system pada sistem mikrokontroler ATmega16. Keberadaan sistem mikrokontroler pada minimum system perlu program tertanam melalui pemrograman berbasis bahasa ...

  11. Terahertz Imaging for Biomedical Applications Pattern Recognition and Tomographic Reconstruction

    CERN Document Server

    Yin, Xiaoxia; Abbott, Derek

    2012-01-01

    Terahertz Imaging for Biomedical Applications: Pattern Recognition and Tomographic Reconstruction presents the necessary algorithms needed to assist screening, diagnosis, and treatment, and these algorithms will play a critical role in the accurate detection of abnormalities present in biomedical imaging. Terahertz biomedical imaging has become an area of interest due to its ability to simultaneously acquire both image and spectral information. Terahertz imaging systems are being commercialized with an increasing number of trials performed in a biomedical setting. Terahertz tomographic imaging and detection technology contributes to the ability to identify opaque objects with clear boundaries,and would be useful to both in vivo and ex vivo environments. This book also: Introduces terahertz radiation techniques and provides a number of topical examples of signal and image processing, as well as machine learning Presents the most recent developments in an emerging field, terahertz radiation Utilizes new methods...

  12. Explicit homoclinic tube solutions and chaos for Zakharov system with periodic boundary

    International Nuclear Information System (INIS)

    Dai Zhengde; Huang Jian; Jiang Murong

    2006-01-01

    In this Letter, the explicit homoclinic tube solutions for Zakharov system with periodic boundary conditions, and even constraints, are exhibited. The results show that there exist two family homoclinic tube solutions depending on parameters (a,p), which asymptotic to a periodic cycle of one dimension. The structures of homoclinic tubes have been investigated

  13. Novel approaches to improve iris recognition system performance based on local quality evaluation and feature fusion.

    Science.gov (United States)

    Chen, Ying; Liu, Yuanning; Zhu, Xiaodong; Chen, Huiling; He, Fei; Pang, Yutong

    2014-01-01

    For building a new iris template, this paper proposes a strategy to fuse different portions of iris based on machine learning method to evaluate local quality of iris. There are three novelties compared to previous work. Firstly, the normalized segmented iris is divided into multitracks and then each track is estimated individually to analyze the recognition accuracy rate (RAR). Secondly, six local quality evaluation parameters are adopted to analyze texture information of each track. Besides, particle swarm optimization (PSO) is employed to get the weights of these evaluation parameters and corresponding weighted coefficients of different tracks. Finally, all tracks' information is fused according to the weights of different tracks. The experimental results based on subsets of three public and one private iris image databases demonstrate three contributions of this paper. (1) Our experimental results prove that partial iris image cannot completely replace the entire iris image for iris recognition system in several ways. (2) The proposed quality evaluation algorithm is a self-adaptive algorithm, and it can automatically optimize the parameters according to iris image samples' own characteristics. (3) Our feature information fusion strategy can effectively improve the performance of iris recognition system.

  14. Automated recognition system for power quality disturbances

    Science.gov (United States)

    Abdelgalil, Tarek

    The application of deregulation policies in electric power systems has resulted in the necessity to quantify the quality of electric power. This fact highlights the need for a new monitoring strategy which is capable of tracking, detecting, classifying power quality disturbances, and then identifying the source of the disturbance. The objective of this work is to design an efficient and reliable power quality monitoring strategy that uses the advances in signal processing and pattern recognition to overcome the deficiencies that exist in power quality monitoring devices. The purposed monitoring strategy has two stages. The first stage is to detect, track, and classify any power quality violation by the use of on-line measurements. In the second stage, the source of the classified power quality disturbance must be identified. In the first stage, an adaptive linear combiner is used to detect power quality disturbances. Then, the Teager Energy Operator and Hilbert Transform are utilized for power quality event tracking. After the Fourier, Wavelet, and Walsh Transforms are employed for the feature extraction, two approaches are then exploited to classify the different power quality disturbances. The first approach depends on comparing the disturbance to be classified with a stored set of signatures for different power quality disturbances. The comparison is developed by using Hidden Markov Models and Dynamic Time Warping. The second approach depends on employing an inductive inference to generate the classification rules directly from the data. In the second stage of the new monitoring strategy, only the problem of identifying the location of the switched capacitor which initiates the transients is investigated. The Total Least Square-Estimation of Signal Parameters via Rotational Invariance Technique is adopted to estimate the amplitudes and frequencies of the various modes contained in the voltage signal measured at the facility entrance. After extracting the

  15. Subgroup report on grain boundary and interphase boundary structure and properties

    International Nuclear Information System (INIS)

    Balluffi, R.W.; Cannon, R.M.; Clarke, D.R.; Heuer, A.H.; Ho, P.S.; Kear, B.H.; Vitek, V.; Weertman, J.R.; White, C.L.

    1979-01-01

    In many high temperature structural applications, the performance characteristics of a materials system are largely controlled by the properties of its grain and interphase boundaries. Failure in creep and fatigue frequently occurs by cavitation, or cracking along grain boundaries. In a few special cases, this failure problem has been overcome by directional alignment of grain and interphase boundaries by various types of metallurgical processing such as directional solidification and directional recrystallization. A good example is to be found in the application of directionally aligned structures in high performance gas-turbine airfoils. However, where fine, equiaxed grain structures are desirable, other methods of controlling grain boundary properties have been developed. Important among these has been the introduction of improvements in primary melting practices, designed to control important impurities. This is of decisive importance because even traces of certain impurity elements present in grain boundaries in high temperature materials can seriously affect properties. Impurities are deleterious and need to be removed. However, in certain cases, (e.g., creep fracture) controlled impurity additions can be beneficial and result in improved properties

  16. Evaluating music emotion recognition

    DEFF Research Database (Denmark)

    Sturm, Bob L.

    2013-01-01

    A fundamental problem with nearly all work in music genre recognition (MGR)is that evaluation lacks validity with respect to the principal goals of MGR. This problem also occurs in the evaluation of music emotion recognition (MER). Standard approaches to evaluation, though easy to implement, do...... not reliably differentiate between recognizing genre or emotion from music, or by virtue of confounding factors in signals (e.g., equalization). We demonstrate such problems for evaluating an MER system, and conclude with recommendations....

  17. Dielectric and ferroelectric sensing based on molecular recognition in Cu(1,10-phenlothroline)2SeO4.(diol) systems

    Science.gov (United States)

    Ye, Heng-Yun; Liao, Wei-Qiang; Zhou, Qionghua; Zhang, Yi; Wang, Jinlan; You, Yu-Meng; Wang, Jin-Yun; Chen, Zhong-Ning; Li, Peng-Fei; Fu, Da-Wei; Huang, Songping D.; Xiong, Ren-Gen

    2017-02-01

    The process of molecular recognition is the assembly of two or more molecules through weak interactions. Information in the process of molecular recognition can be transmitted to us via physical signals, which may find applications in sensing and switching. The conventional signals are mainly limited to light signal. Here, we describe the recognition of diols with Cu(1,10-phenlothroline)2SeO4 and the transduction of discrete recognition events into dielectric and/or ferroelectric signals. We observe that systems of Cu(1,10-phenlothroline)2SeO4.(diol) exhibit significant dielectric and/or ferroelectric dependence on different diol molecules. The compounds including ethane-1,2-diol or propane-1,2-diol just show small temperature-dependent dielectric anomalies and no reversible polarization, while the compound including ethane-1,3-diol shows giant temperature-dependent dielectric anomalies as well as ferroelectric reversible spontaneous polarization. This finding shows that dielectricity and/or ferroelectricity has the potential to be used for signalling molecular recognition.

  18. Face Recognition using Artificial Neural Network | Endeshaw | Zede ...

    African Journals Online (AJOL)

    Face recognition (FR) is one of the biometric methods to identify the individuals by the features of face. Two Face Recognition Systems (FRS) based on Artificial Neural Network (ANN) have been proposed in this paper based on feature extraction techniques. In the first system, Principal Component Analysis (PCA) has been ...

  19. EBSD analysis of subgrain boundaries and dislocation slip systems in Antarctic and Greenland ice

    Science.gov (United States)

    Weikusat, Ilka; Kuiper, Ernst-Jan N.; Pennock, Gill M.; Kipfstuhl, Sepp; Drury, Martyn R.

    2017-09-01

    Ice has a very high plastic anisotropy with easy dislocation glide on basal planes, while glide on non-basal planes is much harder. Basal glide involves dislocations with the Burgers vector b = 〈a〉, while glide on non-basal planes can involve dislocations with b = 〈a〉, b = [c], and b = 〈c + a〉. During the natural ductile flow of polar ice sheets, most of the deformation is expected to occur by basal slip accommodated by other processes, including non-basal slip and grain boundary processes. However, the importance of different accommodating processes is controversial. The recent application of micro-diffraction analysis methods to ice, such as X-ray Laue diffraction and electron backscattered diffraction (EBSD), has demonstrated that subgrain boundaries indicative of non-basal slip are present in naturally deformed ice, although so far the available data sets are limited. In this study we present an analysis of a large number of subgrain boundaries in ice core samples from one depth level from two deep ice cores from Antarctica (EPICA-DML deep ice core at 656 m of depth) and Greenland (NEEM deep ice core at 719 m of depth). EBSD provides information for the characterization of subgrain boundary types and on the dislocations that are likely to be present along the boundary. EBSD analyses, in combination with light microscopy measurements, are presented and interpreted in terms of the dislocation slip systems. The most common subgrain boundaries are indicative of basal 〈a〉 slip with an almost equal occurrence of subgrain boundaries indicative of prism [c] or 〈c + a〉 slip on prism and/or pyramidal planes. A few subgrain boundaries are indicative of prism 〈a〉 slip or slip of 〈a〉 screw dislocations on the basal plane. In addition to these classical polygonization processes that involve the recovery of dislocations into boundaries, alternative mechanisms are discussed for the formation of subgrain boundaries that are not related to the

  20. A real time mobile-based face recognition with fisherface methods

    Science.gov (United States)

    Arisandi, D.; Syahputra, M. F.; Putri, I. L.; Purnamawati, S.; Rahmat, R. F.; Sari, P. P.

    2018-03-01

    Face Recognition is a field research in Computer Vision that study about learning face and determine the identity of the face from a picture sent to the system. By utilizing this face recognition technology, learning process about people’s identity between students in a university will become simpler. With this technology, student won’t need to browse student directory in university’s server site and look for the person with certain face trait. To obtain this goal, face recognition application use image processing methods consist of two phase, pre-processing phase and recognition phase. In pre-processing phase, system will process input image into the best image for recognition phase. Purpose of this pre-processing phase is to reduce noise and increase signal in image. Next, to recognize face phase, we use Fisherface Methods. This methods is chosen because of its advantage that would help system of its limited data. Therefore from experiment the accuracy of face recognition using fisherface is 90%.

  1. An optimal control method for fluid structure interaction systems via adjoint boundary pressure

    Science.gov (United States)

    Chirco, L.; Da Vià, R.; Manservisi, S.

    2017-11-01

    In recent year, in spite of the computational complexity, Fluid-structure interaction (FSI) problems have been widely studied due to their applicability in science and engineering. Fluid-structure interaction systems consist of one or more solid structures that deform by interacting with a surrounding fluid flow. FSI simulations evaluate the tensional state of the mechanical component and take into account the effects of the solid deformations on the motion of the interior fluids. The inverse FSI problem can be described as the achievement of a certain objective by changing some design parameters such as forces, boundary conditions and geometrical domain shapes. In this paper we would like to study the inverse FSI problem by using an optimal control approach. In particular we propose a pressure boundary optimal control method based on Lagrangian multipliers and adjoint variables. The objective is the minimization of a solid domain displacement matching functional obtained by finding the optimal pressure on the inlet boundary. The optimality system is derived from the first order necessary conditions by taking the Fréchet derivatives of the Lagrangian with respect to all the variables involved. The optimal solution is then obtained through a standard steepest descent algorithm applied to the optimality system. The approach presented in this work is general and could be used to assess other objective functionals and controls. In order to support the proposed approach we perform a few numerical tests where the fluid pressure on the domain inlet controls the displacement that occurs in a well defined region of the solid domain.

  2. Robust and Effective Component-based Banknote Recognition for the Blind.

    Science.gov (United States)

    Hasanuzzaman, Faiz M; Yang, Xiaodong; Tian, Yingli

    2012-11-01

    We develop a novel camera-based computer vision technology to automatically recognize banknotes for assisting visually impaired people. Our banknote recognition system is robust and effective with the following features: 1) high accuracy: high true recognition rate and low false recognition rate, 2) robustness: handles a variety of currency designs and bills in various conditions, 3) high efficiency: recognizes banknotes quickly, and 4) ease of use: helps blind users to aim the target for image capture. To make the system robust to a variety of conditions including occlusion, rotation, scaling, cluttered background, illumination change, viewpoint variation, and worn or wrinkled bills, we propose a component-based framework by using Speeded Up Robust Features (SURF). Furthermore, we employ the spatial relationship of matched SURF features to detect if there is a bill in the camera view. This process largely alleviates false recognition and can guide the user to correctly aim at the bill to be recognized. The robustness and generalizability of the proposed system is evaluated on a dataset including both positive images (with U.S. banknotes) and negative images (no U.S. banknotes) collected under a variety of conditions. The proposed algorithm, achieves 100% true recognition rate and 0% false recognition rate. Our banknote recognition system is also tested by blind users.

  3. On the Use of Evolutionary Algorithms to Improve the Robustness of Continuous Speech Recognition Systems in Adverse Conditions

    Directory of Open Access Journals (Sweden)

    Sid-Ahmed Selouani

    2003-07-01

    Full Text Available Limiting the decrease in performance due to acoustic environment changes remains a major challenge for continuous speech recognition (CSR systems. We propose a novel approach which combines the Karhunen-Loève transform (KLT in the mel-frequency domain with a genetic algorithm (GA to enhance the data representing corrupted speech. The idea consists of projecting noisy speech parameters onto the space generated by the genetically optimized principal axis issued from the KLT. The enhanced parameters increase the recognition rate for highly interfering noise environments. The proposed hybrid technique, when included in the front-end of an HTK-based CSR system, outperforms that of the conventional recognition process in severe interfering car noise environments for a wide range of signal-to-noise ratios (SNRs varying from 16 dB to −4 dB. We also showed the effectiveness of the KLT-GA method in recognizing speech subject to telephone channel degradations.

  4. Implementation of a Tour Guide Robot System Using RFID Technology and Viterbi Algorithm-Based HMM for Speech Recognition

    Directory of Open Access Journals (Sweden)

    Neng-Sheng Pai

    2014-01-01

    Full Text Available This paper applied speech recognition and RFID technologies to develop an omni-directional mobile robot into a robot with voice control and guide introduction functions. For speech recognition, the speech signals were captured by short-time processing. The speaker first recorded the isolated words for the robot to create speech database of specific speakers. After the speech pre-processing of this speech database, the feature parameters of cepstrum and delta-cepstrum were obtained using linear predictive coefficient (LPC. Then, the Hidden Markov Model (HMM was used for model training of the speech database, and the Viterbi algorithm was used to find an optimal state sequence as the reference sample for speech recognition. The trained reference model was put into the industrial computer on the robot platform, and the user entered the isolated words to be tested. After processing by the same reference model and comparing with previous reference model, the path of the maximum total probability in various models found using the Viterbi algorithm in the recognition was the recognition result. Finally, the speech recognition and RFID systems were achieved in an actual environment to prove its feasibility and stability, and implemented into the omni-directional mobile robot.

  5. Sensor-Based Activity Recognition with Dynamically Added Context

    Directory of Open Access Journals (Sweden)

    Jiahui Wen

    2015-08-01

    Full Text Available An activity recognition system essentially processes raw sensor data and maps them into latent activity classes. Most of the previous systems are built with supervised learning techniques and pre-defined data sources, and result in static models. However, in realistic and dynamic environments, original data sources may fail and new data sources become available, a robust activity recognition system should be able to perform evolution automatically with dynamic sensor availability in dynamic environments. In this paper, we propose methods that automatically incorporate dynamically available data sources to adapt and refine the recognition system at run-time. The system is built upon ensemble classifiers which can automatically choose the features with the most discriminative power. Extensive experimental results with publicly available datasets demonstrate the effectiveness of our methods.

  6. Comparing grapheme-based and phoneme-based speech recognition for Afrikaans

    CSIR Research Space (South Africa)

    Basson, WD

    2012-11-01

    Full Text Available This paper compares the recognition accuracy of a phoneme-based automatic speech recognition system with that of a grapheme-based system, using Afrikaans as case study. The first system is developed using a conventional pronunciation dictionary...

  7. Facial Emotion Recognition Using Context Based Multimodal Approach

    Directory of Open Access Journals (Sweden)

    Priya Metri

    2011-12-01

    Full Text Available Emotions play a crucial role in person to person interaction. In recent years, there has been a growing interest in improving all aspects of interaction between humans and computers. The ability to understand human emotions is desirable for the computer in several applications especially by observing facial expressions. This paper explores a ways of human-computer interaction that enable the computer to be more aware of the user’s emotional expressions we present a approach for the emotion recognition from a facial expression, hand and body posture. Our model uses multimodal emotion recognition system in which we use two different models for facial expression recognition and for hand and body posture recognition and then combining the result of both classifiers using a third classifier which give the resulting emotion . Multimodal system gives more accurate result than a signal or bimodal system

  8. 8 CFR 292.2 - Organizations qualified for recognition; requests for recognition; withdrawal of recognition...

    Science.gov (United States)

    2010-01-01

    ...; requests for recognition; withdrawal of recognition; accreditation of representatives; roster. 292.2...; withdrawal of recognition; accreditation of representatives; roster. (a) Qualifications of organizations. A non-profit religious, charitable, social service, or similar organization established in the United...

  9. Intelligent Image Recognition System for Marine Fouling Using Softmax Transfer Learning and Deep Convolutional Neural Networks

    Directory of Open Access Journals (Sweden)

    C. S. Chin

    2017-01-01

    Full Text Available The control of biofouling on marine vessels is challenging and costly. Early detection before hull performance is significantly affected is desirable, especially if “grooming” is an option. Here, a system is described to detect marine fouling at an early stage of development. In this study, an image of fouling can be transferred wirelessly via a mobile network for analysis. The proposed system utilizes transfer learning and deep convolutional neural network (CNN to perform image recognition on the fouling image by classifying the detected fouling species and the density of fouling on the surface. Transfer learning using Google’s Inception V3 model with Softmax at last layer was carried out on a fouling database of 10 categories and 1825 images. Experimental results gave acceptable accuracies for fouling detection and recognition.

  10. Kazakh Traditional Dance Gesture Recognition

    Science.gov (United States)

    Nussipbekov, A. K.; Amirgaliyev, E. N.; Hahn, Minsoo

    2014-04-01

    Full body gesture recognition is an important and interdisciplinary research field which is widely used in many application spheres including dance gesture recognition. The rapid growth of technology in recent years brought a lot of contribution in this domain. However it is still challenging task. In this paper we implement Kazakh traditional dance gesture recognition. We use Microsoft Kinect camera to obtain human skeleton and depth information. Then we apply tree-structured Bayesian network and Expectation Maximization algorithm with K-means clustering to calculate conditional linear Gaussians for classifying poses. And finally we use Hidden Markov Model to detect dance gestures. Our main contribution is that we extend Kinect skeleton by adding headwear as a new skeleton joint which is calculated from depth image. This novelty allows us to significantly improve the accuracy of head gesture recognition of a dancer which in turn plays considerable role in whole body gesture recognition. Experimental results show the efficiency of the proposed method and that its performance is comparable to the state-of-the-art system performances.

  11. Haar-like Rectangular Features for Biometric Recognition

    DEFF Research Database (Denmark)

    Nasrollahi, Kamal; Moeslund, Thomas B.; Rashidi, Maryam

    2013-01-01

    Developing a reliable, fast, and robust biometric recognition system is still a challenging task. This is because the inputs to these systems can be noisy, occluded, poorly illuminated, rotated, and of very low-resolutions. This paper proposes a probabilistic classifier using Haar-like features......, which mostly have been used for detection, for biometric recognition. The proposed system has been tested for three different biometrics: ear, iris, and hand vein patterns and it is shown that it is robust against most of the mentioned degradations and it outperforms state-of-the-art systems...

  12. Pattern recognition and classification an introduction

    CERN Document Server

    Dougherty, Geoff

    2012-01-01

    The use of pattern recognition and classification is fundamental to many of the automated electronic systems in use today. However, despite the existence of a number of notable books in the field, the subject remains very challenging, especially for the beginner. Pattern Recognition and Classification presents a comprehensive introduction to the core concepts involved in automated pattern recognition. It is designed to be accessible to newcomers from varied backgrounds, but it will also be useful to researchers and professionals in image and signal processing and analysis, and in computer visi

  13. Primitive Based Action Representation and recognition

    DEFF Research Database (Denmark)

    Baby, Sanmohan

    The presented work is aimed at designing a system that will model and recognize actions and its interaction with objects. Such a system is aimed at facilitating robot task learning. Activity modeling and recognition is very important for its potential applications in surveillance, human-machine i......The presented work is aimed at designing a system that will model and recognize actions and its interaction with objects. Such a system is aimed at facilitating robot task learning. Activity modeling and recognition is very important for its potential applications in surveillance, human......-machine interface, entertainment, biomechanics etc. Recent developments in neuroscience suggest that all actions are a compositions of smaller units called primitives. Current works based on primitives for action recognition uses a supervised framework for specifying the primitives. We propose a method to extract...... primitives automatically. These primitives are to be used to generate actions based on certain rules for combining. These rules are expressed as a stochastic context free grammar. A model merging approach is adopted to learn a Hidden Markov Model to t the observed data sequences. The states of the HMM...

  14. Financial and workflow analysis of radiology reporting processes in the planning phase of implementation of a speech recognition system

    Science.gov (United States)

    Whang, Tom; Ratib, Osman M.; Umamoto, Kathleen; Grant, Edward G.; McCoy, Michael J.

    2002-05-01

    The goal of this study is to determine the financial value and workflow improvements achievable by replacing traditional transcription services with a speech recognition system in a large, university hospital setting. Workflow metrics were measured at two hospitals, one of which exclusively uses a transcription service (UCLA Medical Center), and the other which exclusively uses speech recognition (West Los Angeles VA Hospital). Workflow metrics include time spent per report (the sum of time spent interpreting, dictating, reviewing, and editing), transcription turnaround, and total report turnaround. Compared to traditional transcription, speech recognition resulted in radiologists spending 13-32% more time per report, but it also resulted in reduction of report turnaround time by 22-62% and reduction of marginal cost per report by 94%. The model developed here helps justify the introduction of a speech recognition system by showing that the benefits of reduced operating costs and decreased turnaround time outweigh the cost of increased time spent per report. Whether the ultimate goal is to achieve a financial objective or to improve operational efficiency, it is important to conduct a thorough analysis of workflow before implementation.

  15. Recognition of social identity in ants

    Directory of Open Access Journals (Sweden)

    Nick eBos

    2012-03-01

    Full Text Available Recognizing the identity of others, from the individual to the group level, is a hallmark of society. Ants, and other social insects, have evolved advanced societies characterized by efficient social recognition systems. Colony identity is mediated by colony specific signature mixtures, a blend of hydrocarbons present on the cuticle of every individual (the label. Recognition occurs when an ant encounters another individual, and compares the label it perceives to an internal representation of its own colony odor (the template. A mismatch between label and template leads to rejection of the encountered individual. Although advances have been made in our understanding of how the label is produced and acquired, contradictory evidence exists about information processing of recognition cues. Here, we review the literature on template acquisition in ants and address how and when the template is formed, where in the nervous system it is localized, and the possible role of learning. We combine seemingly contradictory evidence in to a novel, parsimonious theory for the information processing of nestmate recognition cues.

  16. Recognition and management of idiopathic systemic capillary leak syndrome: an evidence-based review.

    Science.gov (United States)

    Baloch, Noor Ul-Ain; Bikak, Marvi; Rehman, Abdul; Rahman, Omar

    2018-05-01

    Idiopathic systemic capillary leak syndrome (SCLS) is a unique disorder characterized by episodes of massive systemic leak of intravascular fluid leading to volume depletion and shock. A typical attack of SCLS consists of prodromal, leak and post-leak phases. Complications, such as compartment syndrome and pulmonary edema, usually develop during the leak and post-leak phases respectively. Judicious intravenous hydration and early use of vasopressors is the cornerstone of management in such cases. Areas covered: The purpose of the present review is to provide an up-to-date, evidence-based review of our understanding of SCLS and its management in the light of currently available evidence. Idiopathic SCLS was first described in 1960 and, since then, more than 250 cases have been reported. A large number of cases have been reported over the past one decade, most likely due to improved recognition. In the acute care setting, most patients with SCLS are managed as per the Surviving Sepsis guidelines and receive aggressive volume resuscitation - which is not the optimal management strategy for such patients. There is a need to raise awareness amongst physicians and clinicians in order to improve recognition of this disorder and ensure its appropriate management.

  17. IMPROVEMENT OF ACCURACY OF RADIATIVE HEAT TRANSFER DIFFERENTIAL APPROXIMATION METHOD FOR MULTI DIMENSIONAL SYSTEMS BY MEANS OF AUTO-ADAPTABLE BOUNDARY CONDITIONS

    Directory of Open Access Journals (Sweden)

    K. V. Dobrego

    2015-01-01

    Full Text Available Differential approximation is derived from radiation transfer equation by averaging over the solid angle. It is one of the more effective methods for engineering calculations of radia- tive heat transfer in complex three-dimensional thermal power systems with selective and scattering media. The new method for improvement of accuracy of the differential approximation based on using of auto-adaptable boundary conditions is introduced in the paper. The  efficiency  of  the  named  method  is  proved  for  the  test  2D-systems.  Self-consistent auto-adaptable boundary conditions taking into consideration the nonorthogonal component of the incident to the boundary radiation flux are formulated. It is demonstrated that taking in- to consideration of the non- orthogonal incident flux in multi-dimensional systems, such as furnaces, boilers, combustion chambers improves the accuracy of the radiant flux simulations and to more extend in the zones adjacent to the edges of the chamber.Test simulations utilizing the differential approximation method with traditional boundary conditions, new self-consistent boundary conditions and “precise” discrete ordinates method were performed. The mean square errors of the resulting radiative fluxes calculated along the boundary of rectangular and triangular test areas were decreased 1.5–2 times by using auto- adaptable boundary conditions. Radiation flux gaps in the corner points of non-symmetric sys- tems are revealed by using auto-adaptable boundary conditions which can not be obtained by using the conventional boundary conditions.

  18. Formation of multiple stoichiometric phases in binary systems by combined bulk and grain boundary diffusion: Experiments and model

    International Nuclear Information System (INIS)

    Svoboda, J.; Fischer, F.D.; Schillinger, W.

    2013-01-01

    The thermodynamic extremal principle has been used by the authors to treat the evolution of binary and multicomponent systems under the assumption that all phases are nearly stoichiometric. Up to now only bulk diffusion has been taken into account. The concept is now extended to combined bulk and grain boundary diffusion possible in each newly formed phase. The grains are approximated by cylinders allowing interface diffusion along the top and bottom of the grains and grain boundary diffusion along the mantle with different interface/grain boundary diffusion coefficients. A consistent analysis yields an effective diffusion coefficient taking into account the combined interface/grain boundary and bulk diffusion of each individual component. The current concept is applied to the Cu–Sn couple which has been studied by a number of researchers. The results of simulations are compared with experiments at 200 °C on solid systems reported in the literature as well as with our experiments at 250 °C with liquid Sn.

  19. System and method for free-boundary surface extraction

    KAUST Repository

    Algarni, Marei

    2017-10-26

    A method of extracting surfaces in three-dimensional data includes receiving as inputs three-dimensional data and a seed point p located on a surface to be extracted. The method further includes propagating a front outwardly from the seed point p and extracting a plurality of ridge curves based on the propagated front. A surface boundary is detected based on a comparison of distances between adjacent ridge curves and the desired surface is extracted based on the detected surface boundary.

  20. Degraded character recognition based on gradient pattern

    Science.gov (United States)

    Babu, D. R. Ramesh; Ravishankar, M.; Kumar, Manish; Wadera, Kevin; Raj, Aakash

    2010-02-01

    Degraded character recognition is a challenging problem in the field of Optical Character Recognition (OCR). The performance of an optical character recognition depends upon printed quality of the input documents. Many OCRs have been designed which correctly identifies the fine printed documents. But, very few reported work has been found on the recognition of the degraded documents. The efficiency of the OCRs system decreases if the input image is degraded. In this paper, a novel approach based on gradient pattern for recognizing degraded printed character is proposed. The approach makes use of gradient pattern of an individual character for recognition. Experiments were conducted on character image that is either digitally written or a degraded character extracted from historical documents and the results are found to be satisfactory.

  1. LeadMine: a grammar and dictionary driven approach to entity recognition

    Science.gov (United States)

    2015-01-01

    Background Chemical entity recognition has traditionally been performed by machine learning approaches. Here we describe an approach using grammars and dictionaries. This approach has the advantage that the entities found can be directly related to a given grammar or dictionary, which allows the type of an entity to be known and, if an entity is misannotated, indicates which resource should be corrected. As recognition is driven by what is expected, if spelling errors occur, they can be corrected. Correcting such errors is highly useful when attempting to lookup an entity in a database or, in the case of chemical names, converting them to structures. Results Our system uses a mixture of expertly curated grammars and dictionaries, as well as dictionaries automatically derived from public resources. We show that the heuristics developed to filter our dictionary of trivial chemical names (from PubChem) yields a better performing dictionary than the previously published Jochem dictionary. Our final system performs post-processing steps to modify the boundaries of entities and to detect abbreviations. These steps are shown to significantly improve performance (2.6% and 4.0% F1-score respectively). Our complete system, with incremental post-BioCreative workshop improvements, achieves 89.9% precision and 85.4% recall (87.6% F1-score) on the CHEMDNER test set. Conclusions Grammar and dictionary approaches can produce results at least as good as the current state of the art in machine learning approaches. While machine learning approaches are commonly thought of as "black box" systems, our approach directly links the output entities to the input dictionaries and grammars. Our approach also allows correction of errors in detected entities, which can assist with entity resolution. PMID:25810776

  2. Face Recognition in Humans and Machines

    Science.gov (United States)

    O'Toole, Alice; Tistarelli, Massimo

    The study of human face recognition by psychologists and neuroscientists has run parallel to the development of automatic face recognition technologies by computer scientists and engineers. In both cases, there are analogous steps of data acquisition, image processing, and the formation of representations that can support the complex and diverse tasks we accomplish with faces. These processes can be understood and compared in the context of their neural and computational implementations. In this chapter, we present the essential elements of face recognition by humans and machines, taking a perspective that spans psychological, neural, and computational approaches. From the human side, we overview the methods and techniques used in the neurobiology of face recognition, the underlying neural architecture of the system, the role of visual attention, and the nature of the representations that emerges. From the computational side, we discuss face recognition technologies and the strategies they use to overcome challenges to robust operation over viewing parameters. Finally, we conclude the chapter with a look at some recent studies that compare human and machine performances at face recognition.

  3. An Introduction to Face Recognition Technology

    Directory of Open Access Journals (Sweden)

    Shang-Hung Lin

    2000-01-01

    Full Text Available Recently face recognition is attracting much attention in the society of network multimedia information access.  Areas such as network security, content indexing and retrieval, and video compression benefits from face recognition technology because "people" are the center of attention in a lot of video.  Network access control via face recognition not only makes hackers virtually impossible to steal one's "password", but also increases the user-friendliness in human-computer interaction.  Indexing and/or retrieving video data based on the appearances of particular persons will be useful for users such as news reporters, political scientists, and moviegoers.  For the applications of videophone and teleconferencing, the assistance of face recognition also provides a more efficient coding scheme.  In this paper, we give an introductory course of this new information processing technology.  The paper shows the readers the generic framework for the face recognition system, and the variants that are frequently encountered by the face recognizer.  Several famous face recognition algorithms, such as eigenfaces and neural networks, will also be explained.

  4. Electrostatic interactions in finite systems treated with periodic boundary conditions: application to linear-scaling density functional theory.

    Science.gov (United States)

    Hine, Nicholas D M; Dziedzic, Jacek; Haynes, Peter D; Skylaris, Chris-Kriton

    2011-11-28

    We present a comparison of methods for treating the electrostatic interactions of finite, isolated systems within periodic boundary conditions (PBCs), within density functional theory (DFT), with particular emphasis on linear-scaling (LS) DFT. Often, PBCs are not physically realistic but are an unavoidable consequence of the choice of basis set and the efficacy of using Fourier transforms to compute the Hartree potential. In such cases the effects of PBCs on the calculations need to be avoided, so that the results obtained represent the open rather than the periodic boundary. The very large systems encountered in LS-DFT make the demands of the supercell approximation for isolated systems more difficult to manage, and we show cases where the open boundary (infinite cell) result cannot be obtained from extrapolation of calculations from periodic cells of increasing size. We discuss, implement, and test three very different approaches for overcoming or circumventing the effects of PBCs: truncation of the Coulomb interaction combined with padding of the simulation cell, approaches based on the minimum image convention, and the explicit use of open boundary conditions (OBCs). We have implemented these approaches in the ONETEP LS-DFT program and applied them to a range of systems, including a polar nanorod and a protein. We compare their accuracy, complexity, and rate of convergence with simulation cell size. We demonstrate that corrective approaches within PBCs can achieve the OBC result more efficiently and accurately than pure OBC approaches.

  5. Weak Thermocline Mixing in the North Pacific Low-Latitude Western Boundary Current System

    Science.gov (United States)

    Liu, Zhiyu; Lian, Qiang; Zhang, Fangtao; Wang, Lei; Li, Mingming; Bai, Xiaolin; Wang, Jianing; Wang, Fan

    2017-10-01

    Despite its potential importance in the global climate system, mixing properties of the North Pacific low-latitude western boundary current system (LLWBC) remained unsampled until very recently. We report here on the first measurements of turbulence microstructure associated with these currents, made in the western boundary region of the tropical North Pacific east of the Philippines. The results suggest that thermocline mixing in the North Pacific LLWBC is generally weak with the diapycnal diffusivity κρ˜O(10-6) m2 s-1. This is consistent with predictions from internal wave-wave interaction theory that mixing due to internal wave breaking is significantly reduced at low latitudes. Enhanced mixing is found to be associated with a permanent cyclonic eddy, the Mindanao Eddy, but mainly at its south and north flanks. There, κρ is elevated by an order of magnitude due to eddy-induced geostrophic shear. Mixing in the eddy core is at the background level with no indication of enhancement.

  6. A Robust Multimodal Bio metric Authentication Scheme with Voice and Face Recognition

    International Nuclear Information System (INIS)

    Kasban, H.

    2017-01-01

    This paper proposes a multimodal biometric scheme for human authentication based on fusion of voice and face recognition. For voice recognition, three categories of features (statistical coefficients, cepstral coefficients and voice timbre) are used and compared. The voice identification modality is carried out using Gaussian Mixture Model (GMM). For face recognition, three recognition methods (Eigenface, Linear Discriminate Analysis (LDA), and Gabor filter) are used and compared. The combination of voice and face biometrics systems into a single multimodal biometrics system is performed using features fusion and scores fusion. This study shows that the best results are obtained using all the features (cepstral coefficients, statistical coefficients and voice timbre features) for voice recognition, LDA face recognition method and scores fusion for the multimodal biometrics system

  7. Quantum Gravitational Effects on the Boundary

    Science.gov (United States)

    James, F.; Park, I. Y.

    2018-04-01

    Quantum gravitational effects might hold the key to some of the outstanding problems in theoretical physics. We analyze the perturbative quantum effects on the boundary of a gravitational system and the Dirichlet boundary condition imposed at the classical level. Our analysis reveals that for a black hole solution, there is a contradiction between the quantum effects and the Dirichlet boundary condition: the black hole solution of the one-particle-irreducible action no longer satisfies the Dirichlet boundary condition as would be expected without going into details. The analysis also suggests that the tension between the Dirichlet boundary condition and loop effects is connected with a certain mechanism of information storage on the boundary.

  8. Human Iris Recognition System using Wavelet Transform and LVQ

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Kwan Yong; Lim, Shin Young [Electronics and Telecommunications Research Institute (Korea); Cho, Seong Won [Hongik University (Korea)

    2000-07-01

    The popular methods to check the identity of individuals include passwords and ID cards. These conventional methods for user identification and authentication are not altogether reliable because they can be stolen and forgotten. As an alternative of the existing methods, biometric technology has been paid much attention for the last few decades. In this paper, we propose an efficient system for recognizing the identity of a living person by analyzing iris patterns which have a high level of stability and distinctiveness than other biometric measurements. The proposed system is based on wavelet transform and a competitive neural network with the improved mechanisms. After preprocessing the iris data acquired through a CCD camera, feature vectors are extracted by using Haar wavelet transform. LVQ(Learning Vector Quantization) is exploited to classify these feature vectors. We improve the overall performance of the proposed system by optimizing the size of feature vectors and by introducing an efficient initialization of the weight vectors and a new method for determining the winner in order to increase the recognition accuracy of LVQ. From the experiments, we confirmed that the proposed system has a great potential of being applied to real applications in an efficient and effective way. (author). 14 refs., 13 figs., 7 tabs.

  9. Single-Walled Carbon Nanotubes as Fluorescence Biosensors for Pathogen Recognition in Water Systems

    Directory of Open Access Journals (Sweden)

    Venkata K. K. Upadhyayula

    2008-01-01

    Full Text Available The possibility of using single-walled carbon nanotubes (SWCNTs aggregates as fluorescence sensors for pathogen recognition in drinking water treatment applications has been studied. Batch adsorption study is conducted to adsorb large concentrations of Staphylococcus aureus aureus SH 1000 and Escherichia coli pKV-11 on single-walled carbon nanotubes. Subsequently the immobilized bacteria are detected with confocal microscopy by coating the nanotubes with fluorescence emitting antibodies. The Freundlich adsorption equilibrium constant (k for S.aureus and E.coli determined from batch adsorption study was found to be 9×108 and 2×108 ml/g, respectively. The visualization of bacterial cells adsorbed on fluorescently modified carbon nanotubes is also clearly seen. The results indicate that hydrophobic single-walled carbon nanotubes have excellent bacterial adsorption capacity and fluorescent detection capability. This is an important advancement in designing fluorescence biosensors for pathogen recognition in water systems.

  10. Graphic Symbol Recognition using Graph Based Signature and Bayesian Network Classifier

    OpenAIRE

    Luqman, Muhammad Muzzamil; Brouard, Thierry; Ramel, Jean-Yves

    2010-01-01

    We present a new approach for recognition of complex graphic symbols in technical documents. Graphic symbol recognition is a well known challenge in the field of document image analysis and is at heart of most graphic recognition systems. Our method uses structural approach for symbol representation and statistical classifier for symbol recognition. In our system we represent symbols by their graph based signatures: a graphic symbol is vectorized and is converted to an attributed relational g...

  11. Applications of pattern recognition theory in diagnostics of nuclear power plants

    International Nuclear Information System (INIS)

    Cech, J.

    1982-01-01

    The questions are discussed of the application of the theory of pattern recognition in the diagnostics of nuclear power plants. For the future use of recognition systems in the diagnostics of nuclear power plants it is obvious that like with other complex systems, optimal models will have to be used which will organize the optimal recognition algorithm. The conclusion is presented that for the needs of nuclear power plants special systems will be more suitable for pattern recognition than digital computers which are flexible and adaptible but have a lower decision rate, an insufficient working memory, complicated programs, etc. (Z.M.)

  12. Analysis of Feature Extraction Methods for Speaker Dependent Speech Recognition

    Directory of Open Access Journals (Sweden)

    Gurpreet Kaur

    2017-02-01

    Full Text Available Speech recognition is about what is being said, irrespective of who is saying. Speech recognition is a growing field. Major progress is taking place on the technology of automatic speech recognition (ASR. Still, there are lots of barriers in this field in terms of recognition rate, background noise, speaker variability, speaking rate, accent etc. Speech recognition rate mainly depends on the selection of features and feature extraction methods. This paper outlines the feature extraction techniques for speaker dependent speech recognition for isolated words. A brief survey of different feature extraction techniques like Mel-Frequency Cepstral Coefficients (MFCC, Linear Predictive Coding Coefficients (LPCC, Perceptual Linear Prediction (PLP, Relative Spectra Perceptual linear Predictive (RASTA-PLP analysis are presented and evaluation is done. Speech recognition has various applications from daily use to commercial use. We have made a speaker dependent system and this system can be useful in many areas like controlling a patient vehicle using simple commands.

  13. Perceived Task-Difficulty Recognition from Log-File Information for the Use in Adaptive Intelligent Tutoring Systems

    Science.gov (United States)

    Janning, Ruth; Schatten, Carlotta; Schmidt-Thieme, Lars

    2016-01-01

    Recognising students' emotion, affect or cognition is a relatively young field and still a challenging task in the area of intelligent tutoring systems. There are several ways to use the output of these recognition tasks within the system. The approach most often mentioned in the literature is using it for giving feedback to the students. The…

  14. EBSD analysis of subgrain boundaries and dislocation slip systems in Antarctic and Greenland ice

    Directory of Open Access Journals (Sweden)

    I. Weikusat

    2017-09-01

    Full Text Available Ice has a very high plastic anisotropy with easy dislocation glide on basal planes, while glide on non-basal planes is much harder. Basal glide involves dislocations with the Burgers vector b = 〈a〉, while glide on non-basal planes can involve dislocations with b = 〈a〉, b = [c], and b = 〈c + a〉. During the natural ductile flow of polar ice sheets, most of the deformation is expected to occur by basal slip accommodated by other processes, including non-basal slip and grain boundary processes. However, the importance of different accommodating processes is controversial. The recent application of micro-diffraction analysis methods to ice, such as X-ray Laue diffraction and electron backscattered diffraction (EBSD, has demonstrated that subgrain boundaries indicative of non-basal slip are present in naturally deformed ice, although so far the available data sets are limited. In this study we present an analysis of a large number of subgrain boundaries in ice core samples from one depth level from two deep ice cores from Antarctica (EPICA-DML deep ice core at 656 m of depth and Greenland (NEEM deep ice core at 719 m of depth. EBSD provides information for the characterization of subgrain boundary types and on the dislocations that are likely to be present along the boundary. EBSD analyses, in combination with light microscopy measurements, are presented and interpreted in terms of the dislocation slip systems. The most common subgrain boundaries are indicative of basal 〈a〉 slip with an almost equal occurrence of subgrain boundaries indicative of prism [c] or 〈c + a〉 slip on prism and/or pyramidal planes. A few subgrain boundaries are indicative of prism 〈a〉 slip or slip of 〈a〉 screw dislocations on the basal plane. In addition to these classical polygonization processes that involve the recovery of dislocations into boundaries, alternative mechanisms are discussed for the formation of subgrain

  15. A freely-available authoring system for browser-based CALL with speech recognition

    Directory of Open Access Journals (Sweden)

    Myles O'Brien

    2017-06-01

    Full Text Available A system for authoring browser-based CALL material incorporating Google speech recognition has been developed and made freely available for download. The system provides a teacher with a simple way to set up CALL material, including an optional image, sound or video, which will elicit spoken (and/or typed answers from the user and check them against a list of specified permitted answers, giving feedback with hints when necessary. The teacher needs no HTML or Javascript expertise, just the facilities and ability to edit text files and upload to the Internet. The structure and functioning of the system are explained in detail, and some suggestions are given for practical use. Finally, some of its limitations are described.

  16. Face averages enhance user recognition for smartphone security.

    Science.gov (United States)

    Robertson, David J; Kramer, Robin S S; Burton, A Mike

    2015-01-01

    Our recognition of familiar faces is excellent, and generalises across viewing conditions. However, unfamiliar face recognition is much poorer. For this reason, automatic face recognition systems might benefit from incorporating the advantages of familiarity. Here we put this to the test using the face verification system available on a popular smartphone (the Samsung Galaxy). In two experiments we tested the recognition performance of the smartphone when it was encoded with an individual's 'face-average'--a representation derived from theories of human face perception. This technique significantly improved performance for both unconstrained celebrity images (Experiment 1) and for real faces (Experiment 2): users could unlock their phones more reliably when the device stored an average of the user's face than when they stored a single image. This advantage was consistent across a wide variety of everyday viewing conditions. Furthermore, the benefit did not reduce the rejection of imposter faces. This benefit is brought about solely by consideration of suitable representations for automatic face recognition, and we argue that this is just as important as development of matching algorithms themselves. We propose that this representation could significantly improve recognition rates in everyday settings.

  17. Sistem Kontrol Akses Berbasis Real Time Face Recognition dan Gender Information

    Directory of Open Access Journals (Sweden)

    Putri Nurmala

    2015-06-01

    Full Text Available Face recognition and gender information is a computer application for automatically identifying or verifying a person's face from a camera to capture a person's face. It is usually used in access control systemsand it can be compared to other biometrics such as finger print identification system or iris. Many of face recognition algorithms have been developed in recent years. Face recognition system and gender information inthis system based on the Principal Component Analysis method (PCA. Computational method has a simple and fast compared with the use of the method requires a lot of learning, such as artificial neural network. In thisaccess control system, relay used and Arduino controller. In this essay focuses on face recognition and gender - based information in real time using the method of Principal Component Analysis ( PCA . The result achievedfrom the application design is the identification of a person’s face with gender using PCA. The results achieved by the application is face recognition system using PCA can obtain good results the 85 % success rate in face recognition with face images that have been tested by a few people and a fairly high degree of accuracy.

  18. Control Volume Analysis of Boundary Layer Ingesting Propulsion Systems With or Without Shock Wave Ahead of the Inlet

    Science.gov (United States)

    Kim, Hyun Dae; Felder, James L.

    2011-01-01

    The performance benefit of boundary layer or wake ingestion on marine and air vehicles has been well documented and explored. In this article, a quasi-one-dimensional boundary layer ingestion (BLI) benefit analysis for subsonic and transonic propulsion systems is performed using a control volume of a ducted propulsion system that ingests the boundary layer developed by the external airframe surface. To illustrate the BLI benefit, a relationship between the amount of BLI and the net thrust is established and analyzed for two propulsor types. One propulsor is an electric fan, and the other is a pure turbojet. These engines can be modeled as a turbofan with an infinite bypass ratio for the electric fan, and with a zero bypass ratio for the pure turbojet. The analysis considers two flow processes: a boundary layer being ingested by an aircraft inlet and a shock wave sitting in front of the inlet. Though the two processes are completely unrelated, both represent a loss of total pressure and velocity. In real applications, it is possible to have both processes occurring in front of the inlet of a transonic vehicle. Preliminary analysis indicates that the electrically driven propulsion system benefits most from the boundary layer ingestion and the presence of transonic shock waves, whereas the benefit for the turbojet engine is near zero or negative depending on the amount of total temperature rise across the engine.

  19. Man machine interface based on speech recognition

    International Nuclear Information System (INIS)

    Jorge, Carlos A.F.; Aghina, Mauricio A.C.; Mol, Antonio C.A.; Pereira, Claudio M.N.A.

    2007-01-01

    This work reports the development of a Man Machine Interface based on speech recognition. The system must recognize spoken commands, and execute the desired tasks, without manual interventions of operators. The range of applications goes from the execution of commands in an industrial plant's control room, to navigation and interaction in virtual environments. Results are reported for isolated word recognition, the isolated words corresponding to the spoken commands. For the pre-processing stage, relevant parameters are extracted from the speech signals, using the cepstral analysis technique, that are used for isolated word recognition, and corresponds to the inputs of an artificial neural network, that performs recognition tasks. (author)

  20. Compact Acoustic Models for Embedded Speech Recognition

    Directory of Open Access Journals (Sweden)

    Lévy Christophe

    2009-01-01

    Full Text Available Speech recognition applications are known to require a significant amount of resources. However, embedded speech recognition only authorizes few KB of memory, few MIPS, and small amount of training data. In order to fit the resource constraints of embedded applications, an approach based on a semicontinuous HMM system using state-independent acoustic modelling is proposed. A transformation is computed and applied to the global model in order to obtain each HMM state-dependent probability density functions, authorizing to store only the transformation parameters. This approach is evaluated on two tasks: digit and voice-command recognition. A fast adaptation technique of acoustic models is also proposed. In order to significantly reduce computational costs, the adaptation is performed only on the global model (using related speaker recognition adaptation techniques with no need for state-dependent data. The whole approach results in a relative gain of more than 20% compared to a basic HMM-based system fitting the constraints.

  1. Speech Recognition for the iCub Platform

    Directory of Open Access Journals (Sweden)

    Bertrand Higy

    2018-02-01

    Full Text Available This paper describes open source software (available at https://github.com/robotology/natural-speech to build automatic speech recognition (ASR systems and run them within the YARP platform. The toolkit is designed (i to allow non-ASR experts to easily create their own ASR system and run it on iCub and (ii to build deep learning-based models specifically addressing the main challenges an ASR system faces in the context of verbal human–iCub interactions. The toolkit mostly consists of Python, C++ code and shell scripts integrated in YARP. As additional contribution, a second codebase (written in Matlab is provided for more expert ASR users who want to experiment with bio-inspired and developmental learning-inspired ASR systems. Specifically, we provide code for two distinct kinds of speech recognition: “articulatory” and “unsupervised” speech recognition. The first is largely inspired by influential neurobiological theories of speech perception which assume speech perception to be mediated by brain motor cortex activities. Our articulatory systems have been shown to outperform strong deep learning-based baselines. The second type of recognition systems, the “unsupervised” systems, do not use any supervised information (contrary to most ASR systems, including our articulatory systems. To some extent, they mimic an infant who has to discover the basic speech units of a language by herself. In addition, we provide resources consisting of pre-trained deep learning models for ASR, and a 2.5-h speech dataset of spoken commands, the VoCub dataset, which can be used to adapt an ASR system to the typical acoustic environments in which iCub operates.

  2. Chromoproteinoids and their ability to form boundary

    International Nuclear Information System (INIS)

    Heinz, B.

    1992-01-01

    Model systems for boundary structures and cellular systems, particularly when they are a result of natural simulation experiments, are always valuable for the study of the ''Origins of Life''. Lyophilization of chromoproteinoids - peptide like molecules containing prosthetic groups - leads to the formation of boundary structures

  3. A recurrent dynamic model for correspondence-based face recognition.

    Science.gov (United States)

    Wolfrum, Philipp; Wolff, Christian; Lücke, Jörg; von der Malsburg, Christoph

    2008-12-29

    Our aim here is to create a fully neural, functionally competitive, and correspondence-based model for invariant face recognition. By recurrently integrating information about feature similarities, spatial feature relations, and facial structure stored in memory, the system evaluates face identity ("what"-information) and face position ("where"-information) using explicit representations for both. The network consists of three functional layers of processing, (1) an input layer for image representation, (2) a middle layer for recurrent information integration, and (3) a gallery layer for memory storage. Each layer consists of cortical columns as functional building blocks that are modeled in accordance with recent experimental findings. In numerical simulations we apply the system to standard benchmark databases for face recognition. We find that recognition rates of our biologically inspired approach lie in the same range as recognition rates of recent and purely functionally motivated systems.

  4. Pattern recognition of state variables by neural networks

    International Nuclear Information System (INIS)

    Faria, Eduardo Fernandes; Pereira, Claubia

    1996-01-01

    An artificial intelligence system based on artificial neural networks can be used to classify predefined events and emergency procedures. These systems are being used in different areas. In the nuclear reactors safety, the goal is the classification of events whose data can be processed and recognized by neural networks. In this works we present a preliminary simple system, using neural networks in the recognition of patterns the recognition of variables which define a situation. (author)

  5. Prediction of dislocation boundary characteristics

    DEFF Research Database (Denmark)

    Winther, Grethe

    Plastic deformation of both fcc and bcc metals of medium to high stacking fault energy is known to result in dislocation patterning in the form of cells and extended planar dislocation boundaries. The latter align with specific crystallographic planes, which depend on the crystallographic......) and it is found that to a large extent the dislocations screen each other’s elastic stress fields [3]. The present contribution aims at advancing the previous theoretical analysis of a boundary on a known crystallographic plane to actual prediction of this plane as well as other boundary characteristics....... Crystal plasticity calculations combined with the hypothesis that these boundaries separate domains with local differences in the slip system activity are introduced to address precise prediction of the experimentally observed boundaries. The presentation will focus on two cases from fcc metals...

  6. Robust speaker recognition in noisy environments

    CERN Document Server

    Rao, K Sreenivasa

    2014-01-01

    This book discusses speaker recognition methods to deal with realistic variable noisy environments. The text covers authentication systems for; robust noisy background environments, functions in real time and incorporated in mobile devices. The book focuses on different approaches to enhance the accuracy of speaker recognition in presence of varying background environments. The authors examine: (a) Feature compensation using multiple background models, (b) Feature mapping using data-driven stochastic models, (c) Design of super vector- based GMM-SVM framework for robust speaker recognition, (d) Total variability modeling (i-vectors) in a discriminative framework and (e) Boosting method to fuse evidences from multiple SVM models.

  7. Behaviour of boundary functions for quantum billiards

    International Nuclear Information System (INIS)

    Baecker, A; Fuerstberger, S; Schubert, R; Steiner, F

    2002-01-01

    We study the behaviour of the normal derivative of eigenfunctions of the Helmholtz equation inside billiards with Dirichlet boundary condition. These boundary functions are of particular importance because they uniquely determine the eigenfunctions inside the billiard and also other physical quantities of interest. Therefore, they form a reduced representation of the quantum system, analogous to the Poincare section of the classical system. For the normal derivatives we introduce an equivalent to the standard Green function and derive an integral equation on the boundary. Based on this integral equation we compute the first two terms of the mean asymptotic behaviour of the boundary functions for large energies. The first term is universal and independent of the shape of the billiard. The second one is proportional to the curvature of the boundary. The asymptotic behaviour is compared with numerical results for the stadium billiard, different limacon billiards and the circle billiard, and good agreement is found. Furthermore, we derive an asymptotic completeness relation for the boundary functions

  8. Improving entrepreneurial opportunity recognition through web content analytics

    Science.gov (United States)

    Bakar, Muhamad Shahbani Abu; Azmi, Azwiyati

    2017-10-01

    The ability to recognize and develop an opportunity into a venture defines an entrepreneur. Research in opportunity recognition has been robust and focuses more on explaining the processes involved in opportunity recognition. Factors such as prior knowledge, cognitive and creative capabilities are shown to affect opportunity recognition in entrepreneurs. Prior knowledge in areas such as customer problems, ways to serve the market, and technology has been shows in various studies to be a factor that facilitates entrepreneurs to identify and recognize opportunities. Findings from research also shows that experienced entrepreneurs search and scan for information to discover opportunities. Searching and scanning for information has also been shown to help novice entrepreneurs who lack prior knowledge to narrow this gap and enable them to better identify and recognize opportunities. There is less focus in research on finding empirically proven techniques and methods to develop and enhance opportunity recognition in student entrepreneurs. This is important as the country pushes for more graduate entrepreneurs that can drive the economy. This paper aims to discuss Opportunity Recognition Support System (ORSS), an information support system to help especially student entrepreneurs in identifying and recognizing business opportunities. The ORSS aims to provide the necessary knowledge to student entrepreneurs to be able to better identify and recognize opportunities. Applying design research, theories in opportunity recognition are applied to identify the requirements for the support system and the requirements in turn dictate the design of the support system. The paper proposes the use of web content mining and analytics as two core components and techniques for the support system. Web content mining can mine the vast knowledge repositories available on the internet and analytics can provide entrepreneurs with further insights into the information needed to recognize

  9. Speech Acquisition and Automatic Speech Recognition for Integrated Spacesuit Audio Systems

    Science.gov (United States)

    Huang, Yiteng; Chen, Jingdong; Chen, Shaoyan

    2010-01-01

    A voice-command human-machine interface system has been developed for spacesuit extravehicular activity (EVA) missions. A multichannel acoustic signal processing method has been created for distant speech acquisition in noisy and reverberant environments. This technology reduces noise by exploiting differences in the statistical nature of signal (i.e., speech) and noise that exists in the spatial and temporal domains. As a result, the automatic speech recognition (ASR) accuracy can be improved to the level at which crewmembers would find the speech interface useful. The developed speech human/machine interface will enable both crewmember usability and operational efficiency. It can enjoy a fast rate of data/text entry, small overall size, and can be lightweight. In addition, this design will free the hands and eyes of a suited crewmember. The system components and steps include beam forming/multi-channel noise reduction, single-channel noise reduction, speech feature extraction, feature transformation and normalization, feature compression, model adaption, ASR HMM (Hidden Markov Model) training, and ASR decoding. A state-of-the-art phoneme recognizer can obtain an accuracy rate of 65 percent when the training and testing data are free of noise. When it is used in spacesuits, the rate drops to about 33 percent. With the developed microphone array speech-processing technologies, the performance is improved and the phoneme recognition accuracy rate rises to 44 percent. The recognizer can be further improved by combining the microphone array and HMM model adaptation techniques and using speech samples collected from inside spacesuits. In addition, arithmetic complexity models for the major HMMbased ASR components were developed. They can help real-time ASR system designers select proper tasks when in the face of constraints in computational resources.

  10. Enhancing spoken connected-digit recognition accuracy by error ...

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    nition systems have gained acceptable accuracy levels, the accuracy of recognition of current connected ... bar code and ISBN1 library code to name a few. ..... Kopec G, Bush M 1985 Network-based connected-digit recognition. IEEE Trans.

  11. Ferroelectric domain continuity over grain boundaries

    DEFF Research Database (Denmark)

    Mantri, Sukriti; Oddershede, Jette; Damjanovic, Dragan

    2017-01-01

    Formation and mobility of domain walls in ferroelectric materials is responsible for many of their electrical and mechanical properties. Domain wall continuity across grain boundaries has been observed since the 1950's and is speculated to affect the grain boundary-domain interactions, thereby...... impacting macroscopic ferroelectric properties in polycrystalline systems. However detailed studies of such correlated domain structures across grain boundaries are limited. In this work, we have developed the mathematical requirements for domain wall plane matching at grain boundaries of any given...... orientation. We have also incorporated the effect of grain boundary ferroelectric polarization charge created when any two domains meet at the grain boundary plane. The probability of domain wall continuity for three specific grain misorientations is studied. Use of this knowledge to optimize processing...

  12. N13 - based reactor coolant pressure boundary leakage system

    International Nuclear Information System (INIS)

    Dissing, E.; Marbaeck, L.; Sandell, S.; Svansson, L.

    1980-05-01

    A system for the monitoring of leakage of coolant from the reactor coolant pressure boundary and auxiliary systems to the reactor containment, based on the detection of the N13 content in the atmosphere, has been tested. N13 is produced from the oxyegen of the reactor water via the recoil photon nuclear process H1 + 016 + He4. The generation of N13 is therefore independent of fuel element leakage and of the corrosion product content in the water. In the US AEC regulatory guide 1.45 has a leakage increase of 4 liter/ min been suggested as the response limit. The experiments carried out in Ringhals indicate, that with the accomplishment of minor improvements in the installation, a 4 liter/min leakage to the containment will give rise to a signal with a random error range of +- 0.25 liter/min, 99.7 % confidence level. (author)

  13. Medical Named Entity Recognition for Indonesian Language Using Word Representations

    Science.gov (United States)

    Rahman, Arief

    2018-03-01

    Nowadays, Named Entity Recognition (NER) system is used in medical texts to obtain important medical information, like diseases, symptoms, and drugs. While most NER systems are applied to formal medical texts, informal ones like those from social media (also called semi-formal texts) are starting to get recognition as a gold mine for medical information. We propose a theoretical Named Entity Recognition (NER) model for semi-formal medical texts in our medical knowledge management system by comparing two kinds of word representations: cluster-based word representation and distributed representation.

  14. Pedestrian recognition using automotive radar sensors

    Science.gov (United States)

    Bartsch, A.; Fitzek, F.; Rasshofer, R. H.

    2012-09-01

    The application of modern series production automotive radar sensors to pedestrian recognition is an important topic in research on future driver assistance systems. The aim of this paper is to understand the potential and limits of such sensors in pedestrian recognition. This knowledge could be used to develop next generation radar sensors with improved pedestrian recognition capabilities. A new raw radar data signal processing algorithm is proposed that allows deep insights into the object classification process. The impact of raw radar data properties can be directly observed in every layer of the classification system by avoiding machine learning and tracking. This gives information on the limiting factors of raw radar data in terms of classification decision making. To accomplish the very challenging distinction between pedestrians and static objects, five significant and stable object features from the spatial distribution and Doppler information are found. Experimental results with data from a 77 GHz automotive radar sensor show that over 95% of pedestrians can be classified correctly under optimal conditions, which is compareable to modern machine learning systems. The impact of the pedestrian's direction of movement, occlusion, antenna beam elevation angle, linear vehicle movement, and other factors are investigated and discussed. The results show that under real life conditions, radar only based pedestrian recognition is limited due to insufficient Doppler frequency and spatial resolution as well as antenna side lobe effects.

  15. Chemical Entity Recognition and Resolution to ChEBI

    Science.gov (United States)

    Grego, Tiago; Pesquita, Catia; Bastos, Hugo P.; Couto, Francisco M.

    2012-01-01

    Chemical entities are ubiquitous through the biomedical literature and the development of text-mining systems that can efficiently identify those entities are required. Due to the lack of available corpora and data resources, the community has focused its efforts in the development of gene and protein named entity recognition systems, but with the release of ChEBI and the availability of an annotated corpus, this task can be addressed. We developed a machine-learning-based method for chemical entity recognition and a lexical-similarity-based method for chemical entity resolution and compared them with Whatizit, a popular-dictionary-based method. Our methods outperformed the dictionary-based method in all tasks, yielding an improvement in F-measure of 20% for the entity recognition task, 2–5% for the entity-resolution task, and 15% for combined entity recognition and resolution tasks. PMID:25937941

  16. Electrolyte system strategies for anionic isotachophoresis with electrospray-ionization mass-spectrometric detection. 2. Isotachophoresis in moving-boundary systems

    Czech Academy of Sciences Publication Activity Database

    Gebauer, Petr; Malá, Zdeňka; Boček, Petr

    2013-01-01

    Roč. 34, č. 24 (2013), s. 3245-3251 ISSN 0173-0835 R&D Project s: GA ČR(CZ) GA13-05762S Institutional support: RVO:68081715 Keywords : electrolyte systems * ESI-MS detection * isotachophoresis * moving-boundary electrophoresis Subject RIV: CB - Analytical Chemistry, Separation Impact factor: 3.161, year: 2013

  17. Science beyond boundary: are premature discoveries things of the past?

    Science.gov (United States)

    Singh, Rama S

    2016-06-01

    Mendel's name more than of any other draws our attention to the personal side in terms of success and failure in science. Mendel lived 19 years after presenting his research findings and died without receiving any recognition for his work. Are premature discoveries things of the past, you may ask? I review the material basis of science in terms of science boundary and field accessibility and analyze the possibility of premature discoveries in different fields of science such as, for example, physics and biology. I conclude that science has reached a stage where progress is being made mostly by pushing the boundary of the known from inside than by leaping across boundaries. As more researchers become engaged in science, and as more publications become open access, on-line, and interactive, the probability of an important discovery remaining buried and going unrecognized would become exceedingly small. Of course, as examples from physics show, a new theory or an important idea can always lie low, unrecognized until it becomes re-discovered and popularized by other researchers. Thus, premature discoveries will become less likely but not forbidden.

  18. Color constancy in 3D-2D face recognition

    Science.gov (United States)

    Meyer, Manuel; Riess, Christian; Angelopoulou, Elli; Evangelopoulos, Georgios; Kakadiaris, Ioannis A.

    2013-05-01

    Face is one of the most popular biometric modalities. However, up to now, color is rarely actively used in face recognition. Yet, it is well-known that when a person recognizes a face, color cues can become as important as shape, especially when combined with the ability of people to identify the color of objects independent of illuminant color variations. In this paper, we examine the feasibility and effect of explicitly embedding illuminant color information in face recognition systems. We empirically examine the theoretical maximum gain of including known illuminant color to a 3D-2D face recognition system. We also investigate the impact of using computational color constancy methods for estimating the illuminant color, which is then incorporated into the face recognition framework. Our experiments show that under close-to-ideal illumination estimates, one can improve face recognition rates by 16%. When the illuminant color is algorithmically estimated, the improvement is approximately 5%. These results suggest that color constancy has a positive impact on face recognition, but the accuracy of the illuminant color estimate has a considerable effect on its benefits.

  19. An Improved Multispectral Palmprint Recognition System Using Autoencoder with Regularized Extreme Learning Machine

    Directory of Open Access Journals (Sweden)

    Abdu Gumaei

    2018-01-01

    Full Text Available Multispectral palmprint recognition system (MPRS is an essential technology for effective human identification and verification tasks. To improve the accuracy and performance of MPRS, a novel approach based on autoencoder (AE and regularized extreme learning machine (RELM is proposed in this paper. The proposed approach is intended to make the recognition faster by reducing the number of palmprint features without degrading the accuracy of classifier. To achieve this objective, first, the region of interest (ROI from palmprint images is extracted by David Zhang’s method. Second, an efficient normalized Gist (NGist descriptor is used for palmprint feature extraction. Then, the dimensionality of extracted features is reduced using optimized AE. Finally, the reduced features are fed to the RELM for classification. A comprehensive set of experiments are conducted on the benchmark MS-PolyU dataset. The results were significantly high compared to the state-of-the-art approaches, and the robustness and efficiency of the proposed approach are revealed.

  20. Using speech recognition to enhance the Tongue Drive System functionality in computer access.

    Science.gov (United States)

    Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless tongue operated assistive technology (AT), which can enable people with severe physical disabilities to access computers and drive powered wheelchairs using their volitional tongue movements. TDS offers six discrete commands, simultaneously available to the users, for pointing and typing as a substitute for mouse and keyboard in computer access, respectively. To enhance the TDS performance in typing, we have added a microphone, an audio codec, and a wireless audio link to its readily available 3-axial magnetic sensor array, and combined it with a commercially available speech recognition software, the Dragon Naturally Speaking, which is regarded as one of the most efficient ways for text entry. Our preliminary evaluations indicate that the combined TDS and speech recognition technologies can provide end users with significantly higher performance than using each technology alone, particularly in completing tasks that require both pointing and text entry, such as web surfing.