• Title/Summary/Keyword: 데이터 오류

Search Result 1,770, Processing Time 0.032 seconds

A Network Analysis of the Research Trends in Fingerprints in Korea (네트워크 분석을 활용한 국내 지문인식연구의 동향분석)

  • Jung, Jinhyo;Lee, Chang-Moo
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.15-30
    • /
    • 2017
  • Since the 1990s, fingerprint recognition has attracted much attention among scholars. There have been numerous studies on fingerprint recognition. However, most of the academic papers have focused mainly on how to make a technical advance of fingerprint recognition. there has been no significant output in the analysis of the research trends in fingerprint recognition. It's essential part to describe the overall structure of fingerprint recognition to make further studies much more efficient and effective. To this end, the primary purpose of this article is to deliver an overview of the research trends on fingerprint recognition based on network analysis. This study analyzed abstracts of the 122 academic journals ranging from 1990 to 2015. For gathering those data, the author took advantage of an academic searchable data base-RISS. After collecting abstracts, cleaning process was carried out and key words were selected by using Krwords and R; co-occurrence symmetric matrix made up of key words was created by Ktitle; and Netminer was employed to analyze closeness centrality. The result achieved from this work included followings: research trends in fingerprint recognition from 1990 to 2000, 2001 to 2005, 2006 to 2010, and 2011 to 2015.

Diurnal Effect Compensation Algorithm for a Backup and Substitute Navigation System of GPS (GPS 백업 및 대체 항법을 위한 지상파 신호의 일변효과 보상 방안)

  • Lee, Young-Kyu;Lee, Chang-Bok;Yang, Sung-Hoon;Lee, Jong-Koo;Kong, Hyun-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12A
    • /
    • pp.1225-1232
    • /
    • 2008
  • In this paper, we describe a compensation method of diurnal effect which is one of the factors giving large effect on the performance when using ground-wave signals like Loran-C for a backup and substitute navigation system of global satellite navigation system such as GPS, and currently many researches of the topics are doing in USA and in Europe. In order to compensate diurnal effect, we find periodic frequency components by using the Least Square Spectral Analysis (LSSA) method at first and then compensate the effect by subtracting the estimated compensation signal, obtained by using the estimated amplitude and phase of the individual frequency component, from the original signal. In this paper, we propose a simple compensation algorithm and analysis the performance through simulations. From the results, it is observed that the amplitude and phase can be estimated with under 5 % and 0.17 % in a somewhat poor receiving situation with 0 dB Signal to Noise Ratio (SNR). Also, we analyze the obtainable performance improvement after compensation by using the measured Loran-C data. From the results, it is observed that we can get about 22 % performance improvement when a moving average with 5 minutes interval is employed.

Development of a Korean Speech Recognition Platform (ECHOS) (한국어 음성인식 플랫폼 (ECHOS) 개발)

  • Kwon Oh-Wook;Kwon Sukbong;Jang Gyucheol;Yun Sungrack;Kim Yong-Rae;Jang Kwang-Dong;Kim Hoi-Rin;Yoo Changdong;Kim Bong-Wan;Lee Yong-Ju
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.8
    • /
    • pp.498-504
    • /
    • 2005
  • We introduce a Korean speech recognition platform (ECHOS) developed for education and research Purposes. ECHOS lowers the entry barrier to speech recognition research and can be used as a reference engine by providing elementary speech recognition modules. It has an easy simple object-oriented architecture, implemented in the C++ language with the standard template library. The input of the ECHOS is digital speech data sampled at 8 or 16 kHz. Its output is the 1-best recognition result. N-best recognition results, and a word graph. The recognition engine is composed of MFCC/PLP feature extraction, HMM-based acoustic modeling, n-gram language modeling, finite state network (FSN)- and lexical tree-based search algorithms. It can handle various tasks from isolated word recognition to large vocabulary continuous speech recognition. We compare the performance of ECHOS and hidden Markov model toolkit (HTK) for validation. In an FSN-based task. ECHOS shows similar word accuracy while the recognition time is doubled because of object-oriented implementation. For a 8000-word continuous speech recognition task, using the lexical tree search algorithm different from the algorithm used in HTK, it increases the word error rate by $40\%$ relatively but reduces the recognition time to half.

Masked cross self-attentive encoding based speaker embedding for speaker verification (화자 검증을 위한 마스킹된 교차 자기주의 인코딩 기반 화자 임베딩)

  • Seo, Soonshin;Kim, Ji-Hwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.5
    • /
    • pp.497-504
    • /
    • 2020
  • Constructing speaker embeddings in speaker verification is an important issue. In general, a self-attention mechanism has been applied for speaker embedding encoding. Previous studies focused on training the self-attention in a high-level layer, such as the last pooling layer. In this case, the effect of low-level layers is not well represented in the speaker embedding encoding. In this study, we propose Masked Cross Self-Attentive Encoding (MCSAE) using ResNet. It focuses on training the features of both high-level and low-level layers. Based on multi-layer aggregation, the output features of each residual layer are used for the MCSAE. In the MCSAE, the interdependence of each input features is trained by cross self-attention module. A random masking regularization module is also applied to prevent overfitting problem. The MCSAE enhances the weight of frames representing the speaker information. Then, the output features are concatenated and encoded in the speaker embedding. Therefore, a more informative speaker embedding is encoded by using the MCSAE. The experimental results showed an equal error rate of 2.63 % using the VoxCeleb1 evaluation dataset. It improved performance compared with the previous self-attentive encoding and state-of-the-art methods.

3D Digital Design Optimization Process Considering Constructability of Freeform Structure (비정형 구조물의 시공성을 고려한 3차원 디지털 설계 최적화 프로세스)

  • Ryu, Han-Guk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.5
    • /
    • pp.35-43
    • /
    • 2013
  • Nowadays the widely used media in architecture include visualizations, animations and three-dimensional models. 3D digital methods using active CAM(Computer Aided Manufacturing) and CNC(Computerized Numerical Control) imaging have been developed for accurate shape and 3D measurements in freeform buildings. In contrast to a conventional building using auto CAD system and others, the proposed digital optimization method is based on a combination of 3D numerical data and parametric 3D model for design and construction. The objective of this paper is therefore to present digital optimization process for constructability of freeform building. The method can be useful in the effective implementation of an error-proofing process of freeform building during design and construction phase. 3D digital coordinate data can be used effectively to identify correct size of structural and finish members and installation location of each members in construction field. In addition, architects, engineers and contractors can evaluate design, materials, constructability and identify error-proofing opportunities. Other project participants can also include representatives from all levels of management, departments as well as workers and key subcontractors' personnel, if necessary. The 3D digital optimization process is therefore appropriate to serious variations in freeform shape. For future study, the developed digital optimization method is necessary to be carried out to verify the robustness and accuracy for constructability in construction field.

A Study on the Digital Filter Design for Radio Astronomy Using FPGA (FPGA를 이용한 전파천문용 디지털 필터 설계에 관한 기본연구)

  • Jung, Gu-Young;Roh, Duk-Gyoo;Oh, Se-Jin;Yeom, Jae-Hwan;Kang, Yong-Woo;Lee, Chang-Hoon;Chung, Hyun0Soo;Kim, Kwang-Dong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.1
    • /
    • pp.62-74
    • /
    • 2008
  • In this paper, we would like to propose the design of symmetric digital filter core in order to use in the radio astronomy. The function of FIR filter core would be designed by VHDL code required at the Data Acquisition System (DAS) of Korean VLBI Network (KVN) based on the FPGA chip of Vertex-4 SX55 model of Xilinx company. The designed digital filter has the symmetric structure to increase the effectiveness of system by sharing the digital filter coefficient. The SFFU(Symmetric FIR Filter Unit) use the parallel processing method to perform the data processing efficiently by using the constrained system clock. In this paper, therefore, for the effective design of SFFU, the Unified Synthesis software ISE Foundation and Core Generator which has excellent GUI environment were used to overall IP core synthesis and experiments. Through the synthesis results of digital filter core, we verified the resource usage is less than 40% such as Slice LUT and achieved the maximum operation frequency is more than 260MHz. We also confirmed the SFFU would be well operated without error according to the SFFU simulation result using the Modelsim 6.1a of Mentor Graphics Company. To verify the function of SFFU, we carried out the additional simulation experiments using the pseudo signal to the Matlab software. From the comparison experimental results of simulation and the designed digital FIR filter, we confirmed the FIR filter was well performed with filter's basic function. So we verified the effectiveness of the designed FIR digital filter with symmetric structure using FPGA and VHDL.

  • PDF

Student Understanding of Scale: From Additive to Multiplicative Reasoning in the Constriction of Scale Representation by Ordering Objects in a Number Line (척도개념의 이해: 수학적 구조 조사로 과학교과에 나오는 물질의 크기를 표현하는 학생들의 이해도 분석)

  • Park, Eun-Jung
    • Journal of The Korean Association For Science Education
    • /
    • v.34 no.4
    • /
    • pp.335-347
    • /
    • 2014
  • Size/scale is a central idea in the science curriculum, providing explanations for various phenomena. However, few studies have been conducted to explore student understanding of this concept and to suggest instructional approaches in scientific contexts. In contrast, there have been more studies in mathematics, regarding the use of number lines to relate the nature of numbers to operation and representation of magnitude. In order to better understand variations in student conceptions of size/scale in scientific contexts and explain learning difficulties including alternative conceptions, this study suggests an approach that links mathematics with the analysis of student conceptions of size/scale, i.e. the analysis of mathematical structure and reasoning for a number line. In addition, data ranging from high school to college students facilitate the interpretation of conceptual complexity in terms of mathematical development of a number line. In this sense, findings from this study better explain the following by mathematical reasoning: (1) varied student conceptions, (2) key aspects of each conception, and (3) potential cognitive dimensions interpreting the size/scale concepts. Results of this study help us to understand the troublesomeness of learning size/scale and provide a direction for developing curriculum and instruction for better understanding.

Development of the EM wave Absorber for Improving the Performance of Hi-Pass System in ITS (ITS에 있어서 Hi-Pass 시스템의 성능 개선을 위한 전파흡수체의 개발)

  • Kim, Dong Il;Kim, Jeong Chang;Joo, Yang Ick
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1505-1510
    • /
    • 2014
  • High-Pass (ETC ; Electronic Toll Collection) system is one of the basic elements, which adopts a wireless communication method using 5.8 GHz and can realize a part of ITS (Intelligent Traffic System). On the other hand, communication errors occur frequently in Hi-Pass system due to signal erros, multi-path reflection, and/or system-to-system interferences. To solve these problems, an EM (Electro-Magnetic) wave absorber can be used. To solve these Problems, we fabricated some samples in the different composition ratios of Carbon, Sendust, and CPE, and it was confirmed that the optimum composition ratio of Carbon : Sendust : CPE is 10 : 40 : 50 wt.%. The complex relative permittivity and complex relative permeability were derived by using the measured data. In addition, the optimum design parameters for the absorber were determined by simulation. Then the absorption abilities were calculated by changing the thickness of the EM wave absorbers. As a result, the optimum thickness of the developed EM wave absorber was 2.85 mm with absorption ability over 22.4 dB at 5.8 GHz. Futhermore, the EM wave absorber was fabricated based on the simulated and designed values. The measured values agreed well with the simulated ones. Therefore, it was clearly shown that the developed EM wave absorber in this paper is to be applied in actual situations.

Advanced Optimization of Reliability Based on Cost Factor and Deploying On-Line Safety Instrumented System Supporting Tool (비용 요소에 근거한 신뢰도 최적화 및 On-Line SIS 지원 도구 연구)

  • Lulu, Addis;Park, Myeongnam;Kim, Hyunseung;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.21 no.2
    • /
    • pp.32-40
    • /
    • 2017
  • Safety Instrumented Systems (SIS) have wide application area. They are of vital importance at process plants to detect the onset of hazardous events, for instance, a release of some hazardous material, and for mitigating their consequences to humans, material assets, and the environment. The integrated safety systems, where electrical, electronic, and/or programmable electronic (E/E/PE) devices interact with mechanical, pneumatic, and hydraulic systems are governed by international safety standards like IEC 61508. IEC 61508 organises its requirements according to a Safety Life Cycle (SLC). Fulfilling these requirements following the SLC can be complex without the aid of SIS supporting tools. This paper presents simple SIS support tool which can greatly help the user to implement the design phase of the safety lifecycle. This tool is modelled in the form of Android application which can be integrated with a Web-based data reading and modifying system. This tool can reduce the computation time spent on the design phase of the SLC and reduce the possible errors which can arise in the process. In addition, this paper presents an optimization approach to SISs based on cost measures. The multi-objective genetic algorithm has been used for the optimization to search for the best combinations of solutions without enumeration of all the solution space.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.