17 research outputs found

    Face Recognition Using Fixed Spread Radial Basis Function Neural Network

    Get PDF
    This paper presents face recognition using spread fixed spread radial basis function neural network. Acquired image will be going through image processing process. General preprocessing approach is use for normalizing the image. Radial Basis Function Neural Network is use for face recognition and Support Vector Machine is used as the face detector. RBF Neural Networks offer several advantages compared to other neural network architecture such as they can be trained using fast two stages training algorithm and the network possesses the property of best approximation. The output of the network can be optimized by setting suitable values of the center and spread of the RBF but in this paper fixed spread is used as there is only one train image for every user and to limit the output value

    Sliding Window for Radial Basis Function Neural Network Face Detection

    Get PDF
    This paper present a Radial Basis Function Neural Network (RBFNN) face detection using sliding windows. The system will detect faces in a large image where sliding window will run inside the image and identified whether there is a face inside the current window. Face detection is the first step in face recognition system. The purpose is to localize and extract the face region from the background that will be fed into the face recognition system for identification. General preprocessing approach was used for normalizing the image and a Radial Basis Function (RBF) Neural Network was used to distinguish between face and non-face images. RBFNN offer several advantages compared to other neural network architecture such as they can be trained using fast two stages training algorithm and the network possesses the property of best approximation. The output of the network can be optimized by setting suitable values of the center and spread of the RBF. In this paper, a uniform fixed spread value will be used. The performance of the system will be based on the rate of detection and also false negative rate

    Developing a meso-scale non-contact measuring method based on vision system : calibration of CCD camera

    Get PDF
    In developing a vision based measuring system, the camera’s precision has always been the bottleneck, and often being discussed. The combination of digital camera, narrow angle, relatively big distortions and focus to infinity cause some difficulties in camera calibration, as a result none of the existing camera calibration techniques is perfectly suitable for this purpose. This research compared three types of CCD camera calibration techniques namely Bouget’s Calibration Toolbox, Zhang’s Calibration Toolbox and Heikkilla’s Calibration Toolbox. The purpose is to select the most suitable camera calibration technique to fulfill the needs of users according to their desired applications. Aside from camera calibration, optimization of parameters such as effective focal length and coordinate of principle point for intrinsic parameter as well as extrinsic parameters comprises of rotation matrix and translation were performed. Experimental data for both calibration and optimization were collected to further explain the experimental results. Statistical analyses such as T-Test and ANOVA were conducted on the collected data using Minitab and EXCEL software. The results of this research indicated that the best calibration technique (toolbox) for calibrating Omron F500 CCD Camera for the purpose of measuring dimensions of meso-scale component is the Heikkilla’s Calibration Toolbox

    An examination of thermal features' relevance in the task of battery-fault detection

    Get PDF
    Uninterruptible power supplies (UPS), represented by lead-acid batteries, play an important role in various kinds of industries. They protect industrial technologies from being damaged by dangerous interruptions of an electric power supply. Advanced UPS monitoring performed by a complex battery management system (BMS) prevents the UPS from sustaining more serious damage due to its timely and accurate battery-fault detection based on voltage metering. This technique is very advanced and precise but also very expensive on a long-term basis. This article describes an experiment applying infrared thermographic measurements during a long term monitoring and fault detection in UPS. The assumption that the battery overheat implies its damaged state is the leading factor of our experiments. They are based on real measured data on various UPS battery sets and several statistical examinations confirming the high relevancy of the thermal features with mostly over 90% detection accuracy. Such a model can be used as a supplement for lead-acid battery based UPS monitoring to ensure their higher reliability under significantly lower maintenance costs.Web of Science82art. no. 18

    Optimal Pattern Synthesis of Linear Antenna Array Using Grey Wolf Optimization Algorithm

    Get PDF
    The aim of this paper is to introduce the grey wolf optimization (GWO) algorithm to the electromagnetics and antenna community. GWO is a new nature-inspired metaheuristic algorithm inspired by the social hierarchy and hunting behavior of grey wolves. It has potential to exhibit high performance in solving not only unconstrained but also constrained optimization problems. In this work, GWO has been applied to linear antenna arrays for optimal pattern synthesis in the following ways: by optimizing the antenna positions while assuming uniform excitation and by optimizing the antenna current amplitudes while assuming spacing and phase as that of uniform array. GWO is used to achieve an array pattern with minimum side lobe level (SLL) along with null placement in the specified directions. GWO is also applied for the minimization of the first side lobe nearest to the main beam (near side lobe). Various examples are presented that illustrate the application of GWO for linear array optimization and, subsequently, the results are validated by benchmarking with results obtained using other state-of-the-art nature-inspired evolutionary algorithms. The results suggest that optimization of linear antenna arrays using GWO provides considerable enhancements compared to the uniform array and the synthesis obtained from other optimization techniques

    A Hybrid Data Mining Method for Customer Churn Prediction

    Get PDF
    The expenses for attracting new customers are much higher compared to the ones needed to maintain old customers due to the increasing competition and business saturation. So customer retention is one of the leading factors in companies’ marketing. Customer retention requires a churn management, and an effective management requires an exact and effective model for churn prediction. A variety of techniques and methodologies have been used for churn prediction, such as logistic regression, neural networks, genetic algorithm, decision tree etc.. In this article, a hybrid method is presented that predicts customers churn more accurately, using data fusion and feature extraction techniques. After data preparation and feature selection, two algorithms, LOLIMOT and C5.0, were trained with different size of features and performed on test data. Then the outputs of the individual classifiers were combined with weighted voting. The results of applying this method on real data of a telecommunication company proved the effectiveness of the method

    An Architecture for Biometric Electronic Identification Document System Based on Blockchain †

    Get PDF
    This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health services and registration of economic activities, among others. To validate the user authentication, a biometric e-ID system is used to avoid spoofing and related attacks. Also, to validate the document a digital certificate is used with the corresponding public and private key for each citizen by using a user’s PIN. The proposed transaction validation process was implemented on a Blockchain system in order to record and verify the transactions made by all citizens registered in the electoral census, which guarantees security, integrity, scalability, traceability, and no-ambiguity. Additionally, a Blockchain network architecture is presented in a distributed and decentralized way including all the nodes of the network, database and government entities such as national register and notary offices. The results of the application of a new consensus algorithm to our Blockchain network are also presented showing mining time, memory and CPU usage when the number of transactions scales up

    PSO-based algorithm applied to quadcopter micro air vehicle controller design

    Get PDF
    [[abstract]]Due to the rapid development of science and technology in recent times, many effective controllers are designed and applied successfully to complicated systems. The significant task of controller design is to determine optimized control gains in a short period of time. With this purpose in mind, a combination of the particle swarm optimization (PSO)-based algorithm and the evolutionary programming (EP) algorithm is introduced in this article. The benefit of this integration algorithm is the creation of new best-parameters for control design schemes. The proposed controller designs are then demonstrated to have the best performance for nonlinear micro air vehicle models.[[notice]]補正完
    corecore