Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Intelligence and Information Systems
Journal Basic Information
Journal DOI :
Korea Inteligent Information System Society
Editor in Chief :
Volume & Issues
Volume 12, Issue 4 - Dec 2006
Volume 12, Issue 3 - Sep 2006
Volume 12, Issue 2 - Jun 2006
Volume 12, Issue 1 - Mar 2006
Selecting the target year
Recognition of Resident Registration Card using ART2-based RBF Network and face Verification
Kim Kwang-Baek ; Kim Young-Ju ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 1~15
In Korea, a resident registration card has various personal information such as a present address, a resident registration number, a face picture and a fingerprint. A plastic-type resident card currently used is easy to forge or alter and tricks of forgery grow to be high-degree as time goes on. So, whether a resident card is forged or not is difficult to judge by only an examination with the naked eye. This paper proposed an automatic recognition method of a resident card which recognizes a resident registration number by using a refined ART2-based RBF network newly proposed and authenticates a face picture by a template image matching method. The proposed method, first, extracts areas including a resident registration number and the date of issue from a resident card image by applying Sobel masking, median filtering and horizontal smearing operations to the image in turn. To improve the extraction of individual codes from extracted areas, the original image is binarized by using a high-frequency passing filter and CDM masking is applied to the binaried image fur making image information of individual codes better. Lastly, individual codes, which are targets of recognition, are extracted by applying 4-directional contour tracking algorithm to extracted areas in the binarized image. And this paper proposed a refined ART2-based RBF network to recognize individual codes, which applies ART2 as the loaming structure of the middle layer and dynamicaly adjusts a teaming rate in the teaming of the middle and the output layers by using a fuzzy control method to improve the performance of teaming. Also, for the precise judgement of forgey of a resident card, the proposed method supports a face authentication by using a face template database and a template image matching method. For performance evaluation of the proposed method, this paper maked metamorphoses of an original image of resident card such as a forgey of face picture, an addition of noise, variations of contrast variations of intensity and image blurring, and applied these images with original images to experiments. The results of experiment showed that the proposed method is excellent in the recognition of individual codes and the face authentication fur the automatic recognition of a resident card.
A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm
Kim Kwang-Baek ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 17~31
In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.
De-interlacing and Block Code Generation For Outsole Model Recognition In Moving Picture
Kim Cheol-Ki ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 33~41
This paper presents a method that automatically recognizes products into model type, which it flows with the conveyor belt. The specific interlaced image are occurred by moving image when we use the NTSC based camera. It is impossible to process interlaced images, so a suitable post-processing is required. For the purpose of this processing, after it remove interlaced images using de-interlacing method, it leads rectangle region of object by thresholding. And then, after rectangle region is separated into several blocks through edge detection, we calculate pixel numbers per each block, re-classify using its average, and classify products into model type. Through experiments, we know that the proposed method represent high classification ratio.
Admission Consultation System based on Intelligent Multi-Agent System
Choi Dong-Oun ; Kim Soo-Yong ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 43~55
Cyber education fields have been changed a lot with the internee development. One of them is the field of consultation for university admission. As for the business of university admission, there were two ways applicants handed in their applications directly to school which they applied to and to each place to receive applications or sent them through FAX. Recently, highlighted is the internee environment to receive the application for admission which integrated organically the two ways. This paper aims to design and implement a multi-consulting-agent system having intelligence which helps applicants make their right applications for colleges or universities through internet system after guiding a proper department to them.
An Integrated Methodology of Knowledge-based Rules with Fuzzy Logic for Material Handling Equipment Selection
Cho Chi-Woon ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 57~73
This paper describes a methodology for automating the material handling equipment (MHE) evaluation and selection processes by combining knowledge-based rules and fuzzy multi-criteria decision making approach. The methodology is proposed to solve the MHE selection problems under fuzzy environment. At the primary stage, the most appropriate MHE type among the alternatives for each material flow link is searched. Knowledge-based rules are employed to retrieve the alternatives for each material flow link. To consider and compare the alternatives, multiple design factors are considered. These factors include both quantitative and qualitative measures. The qualitative measures are converted to numerical measures using fuzzy logic. The concept of fuzzy logic is applied to evaluation matrices used for the selection of the most suitable MHE through a fuzzy linguistic approach. Thus, this paper demonstrates the potential applicability of fuzzy theory in the MHE applications and provides a systemic guidance in the decision-making process.
A Negotiation Method based on Consignor's Agent for Optimal Shipment Cargo
Kim Hyun-Soo ; Choi Hyung-Rim ; Park Nam-Kyu ; Cho Jae-Hyung ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 75~93
The ship selection by consignors has two steps to carry their cargo. The first step is to select according to time schedule of ships and amount of cargo, and the second one is re-selection by concentrating different consignors' cargo into a unit that can be carried by single ship. Up to now, these steps are usually done by hands leading to inefficiency. The purpose of our paper is to form a logistics chain to minimize the overall sum of logistics cost by selecting ships for consignors' cargo using negotiation methodology between agents. Through concentration and distribution of cargo, maximization of global profit derived from searching optimal point in trade-off between inventory cost and freight rate cost. It is settled by the negotiation between consignors. In the experiments, two methods of the first-step of ship selection: EPDS(Earliest Possible Departure-Date Scheduling) and LPDS(Latest Possible Departure-Date Scheduling) coupled with the second-step ship concentration method using the negotiation were shown. From this, we deduced inventory cost, freight rates and logistics cost according SBF(Scheduling Bundle Factor) and analyzed the result. We found it will minimize the total logistics cost if we use negotiation method with EPDS.
Region-based Shape Descriptor with Moving a Vision Center for Image Representation
Kim Seon-Jong ; Kim Young-In ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 95~105
This paper proposes a novel approach to represent the image by using shape descriptor having an information of area. The proposed descriptor is a set of vectors, consists of radius, area and direction parameters in the concentrated center point. Due to the area parameter, we know our descriptor can obtain the information of area. Also, we give an extended shape descriptor to get more detailed representation. To do this, we move the center point of our vision to that point for region of interest. By doing so about all of region of interest, we can get our descriptor for detailed information of the image. From more detailed descriptor, it's natural that it's more efficient fur representation, retrievals and so on. We make it the normalized pattern and expand to improve its quality. The proposed method is invariant to scale, position and rotation. The results show that it can be used efficiently for image representation as we can see in retrievals of silhouette images.
Generalized Binary Second-order Recurrent Neural Networks Equivalent to Regular Grammars
Jung Soon-Ho ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 107~123
We propose the Generalized Binary Second-order Recurrent Neural Networks(GBSRNNf) being equivalent to regular grammars and ?how the implementation of lexical analyzer recognizing the regular languages by using it. All the equivalent representations of regular grammars can be implemented in circuits by using GSBRNN, since it has binary-valued components and shows the structural relationship of a regular grammar. For a regular grammar with the number of symbols m, the number of terminals p, the number of nonterminals q, and the length of input string k, the size of the corresponding GBSRNN is
and its parallel processing time is O(k) and its sequential processing time,
A Study on Yard Operation in Container Terminal
Kim Kap-Hwan ; Kim Jae-Joong ; Ryu Kwang-Ryel ; Park Nam-Kyu ; Choi Hyung-Rim ; Jeon Su-Min ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 125~137
One of the important tactical problems for the efficient operation of container terminals is to determine the usage of storage space There are two different strategies for stacking containers; mixing strategy, in which outbound containers and inbound containers are mixed in the same block, and segregating strategy, in which outbound containers and inbound containers are stacked in blocks different from each other The performance of space allocation strategies also depends on the types of handling equipment in the yard and the number of handling equipment allocated to each block. A simulation model is developed considering various handling characteristics of yard cranes. Performances of various space and equipment allocation strategies are evaluated by using the simulation model.
A New Dynamic Auction Mechanism in the Supply Chain: N-Bilateral Optimized Combinatorial Auction (N-BOCA)
Choi Jin-Ho ; Chang Yong-Sik ; Han In-Goo ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 139~161
In this paper, we introduce a new combinatorial auction mechanism - N-Bilateral Optimized Combinatorial Auction (N-BOCA). N-BOCA is a flexible iterative combinatorial auction model that offers optimized trading for multi-suppliers and multi-purchasers in the supply chain. We design the N-BOCA system from the perspectives of architecture, protocol, and trading strategy. Under the given N-BOCA architecture and protocol, auctioneers and bidders have diverse decision strategies f3r winner determination. This needs flexible modeling environments. Hence, we propose an optimization modeling agent for bid and auctioneer selection. The agent has the capability to automatic model formulation for Integer Programming modeling. Finally, we show the viability of N-BOCA through prototype and experiments. The results say both higher allocation efficiency and effectiveness compared with 1-to-N general combinatorial auction mechanisms.
Design of Ubiquitous Referral Marketing A Business Model and Method
Lee Kyoung-Jun ; Lee Jong-Chul ;
Journal of Intelligence and Information Systems , volume 12, issue 1, 2006, Pages 163~175
This paper provides a corporation's marketing strategy under a ubiquitous computing environment: a WOM(word-of-mouth) marketing using RFID(Radio Frequency Identification) technology and a business model which facilitates the word-of-mouth marketing. To this end, we examine the word-of-mouth communication effects on consumers' life, changes in corporations' attitude toward word-of-mouth marketing, and the difficulties that corporations have in conducting word-of-mouth marketing. The business model this paper suggests makes seamless business-to-consumer and consumer-to-consumer networking possible using the RFID technology and facilitates the word-of-mouth marketing through incentive system of each economic player.