• Title/Summary/Keyword: 상관도검출

Search Result 245, Processing Time 0.045 seconds

Automatic Segmentation Using LPC Smoothed Log Amplitude Spectra (LPC Smoothed Log Amplitude Spectra를 이용한 자동 음성 분할)

  • 김도한;이상운;이기정;홍재근
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.795-798
    • /
    • 2000
  • 연속음 인식과 음성 합성을 위해서는 정밀한 음성학적 모델과 연속 음성에 적용 가능한 언어 모델의 개발이 중요하다. 이를 위해서는 음성 데이터 베이스에 대한 인식 단위, 혹은 합성 단위의 분할이 필요한데, 수동음성 분할은 일관성의 유지가 어렵고 긴 시간이 소요되므로 최근에는 자동 분할 기술이 많이 연구되고 있다. 자동 음성 분할 기법으로는 시간 영역이나 주파수 영역특징 벡터의 천이를 분석하는 방법과 특징 벡터간의 상관도를 구하여 경계를 추출하는 방법이 있다. LPC smoothed log amplitude spectra는 음성의 주파수 영역의 특징을 잘 나타내며, 동일 음소 내의 상관도가 서로 다른 음소의 상관도보다 더 크고, 음소의 경계구간에서 급격한 상관도의 변화를 보인다. 이 특성을 이용하여 이웃 프레임에 대한 상관도의 방향성이 특정조건을 만족하는가를 검사하여 음소의 경계를 구하는 방법을 찾았다. 또한 LPC. 이득 인자만으로 묵음 구간을 검출하는 방법을 제시한다. 이렇게 하면 묵음 구간검출과 음소 경계 검출의 일관성을 향상시키고 수행 시간을 단축시킬 수 있다. 제안한 기법으로 허용 오차 20ms 이내에서 연속음성에 대한 음소 경계 검출 실험을 수행한 결과, 수작업으로 행한 경계 검출 지점의 약 88%를 정확히 검출하였다.

  • PDF

적응적 고차상관 처리를 이용한 차량의 주행궤적 검출계

  • 장경영;오재응
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.10a
    • /
    • pp.169-173
    • /
    • 2001
  • 무인 운반차 등의 주행괘적을 검출하기 위해서는, 일반적으로 순간적인 주행속도와 진행방향을 축차적으로 검출하여 이로부터 궤적을 측정하는 방법이 이용되어져 왔으며, 이를 위하여 종래에는 타코미터, 2차 상관법, 공간 필터법 등과 같은 속도 계측 수단과 스티어링 각도 검출기, 자이로등의 회전각 검출 수단을 병용하여야 했다. 본 논문에서는 복수개의 광 선 검출기 군과 이에 대응하는 고차의 상관처리를 이용한 단일계로서 차량의 임의의 궤적을 원호로 근사하여 검출함으로써 곡선 궤적인 경우에도 고정도의 궤적추정이 가능한 새로운 계측법을 제안한다.

A Study on Double Talk Detector of Acoustic Echo Canceller Using A Correlation Function (상관도를 이용한 음향 반향 제거기의 동시통화 검출기에 대한 연구)

  • 이영호;김대경;박장식;손경식
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2000.04a
    • /
    • pp.129-132
    • /
    • 2000
  • 본 논문에서는 음향 반향 제거기의 새로운 동시 통화 검출기를 제안하여 근단화자신호에 의한 적응 필터의 계수 오조정을 줄이고자 하였다. 제안한 동시 통화 검출기는 마이크 입력 신호의전력과 추정 오차 신호와 마이크 입력 신호간의 상호 상관의 비를 이용하여 동시 통화를 검출하는 방법이다. 제안한 동시 통화 검출기는 주변 잡음이 없는 상황에서는 다른 동시 통화 검출기와 비교하여 우수한 성능을 보였다. 그리고 전체적인 음향 반향 제거기의 향상을 가져왔다.

  • PDF

Fault Detection and Diagnosis for Induction Motors Using Variance, Cross-correlation and Wavelets (웨이블렛 계수의 분산과 상관도를 이용한 유도전동기의 고장 검출 및 진단)

  • Tuan, Do Van;Cho, Sang-Jin;Chong, Ui-Pil
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.19 no.7
    • /
    • pp.726-735
    • /
    • 2009
  • In this paper, we propose an approach to signal model-based fault detection and diagnosis system for induction motors. The current fault detection techniques used in the industry are limit checking techniques, which are simple but cannot predict the types of faults and the initiation of the faults. The system consists of two consecutive processes: fault detection process and fault diagnosis process. In the fault detection process, the system extracts the significant features from sound signals using combination of variance, cross-correlation and wavelet. Consequently, the pattern classification technique is applied to the fault diagnosis process to recognize the system faults based on faulty symptoms. The sounds generated from different kinds of typical motor's faults such as motor unbalance, bearing misalignment and bearing loose are examined. We propose two approaches for fault detection and diagnosis system that are waveletand-variance-based and wavelet-and-crosscorrelation-based approaches. The results of our experiment show more than 95 and 78 percent accuracy for fault classification, respectively.

Low Complexity Residual Symbol Timing Offset Method for Mobile OFDM System (OFDM 기반의 이동통신 시스템에서 낮은 복잡도를 가지는 잔여 시간동기 오차 검출 기법)

  • Kim, Byung-Kyu;You, Young-Hwan
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2013.06a
    • /
    • pp.225-226
    • /
    • 2013
  • 본 논문은 OFDM (Orthogonal Frequency Division Multiplexing)기반의 LTE (Long Term Evolution)하향링크 시스템에서 PS (Primary Synchronization)신호를 이용한 잔여 시간동기 오차를 검출 기법을 제안한다. 제안된 잔여 시간동기 오차 검출 기법은 기존의 잔여 시간동기 오차 검출 기법과 달리, 수신된 PS 신호간의 상호상관 값을 이용하여 잔여 시간동기오차를 검출한다. 제안된 기법은 기존의 기법보다 낮은 복잡도를 가지며, 비슷한 성능을 보여주며 이는 컴퓨터 모의실험을 비교하였다.

  • PDF

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria (상관도와 임계치 방식을 이용한 다중검출 비대칭 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.726-734
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.

Asymmetric public-key watermarking based on correlation method (상관도 검출기반의 비대칭 공개 키 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.151-159
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At theresults, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

  • PDF

Secure Asymmetric Watermarking Based on Correlation Detection (상관도 검출기반의 안전한 비대칭 워터마킹)

  • Li De;Kim JongWeon;Choi JongUk
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.379-386
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, has method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At the results, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

A Secure Asymmetric Watermarking to the Public Key Attack (공개키 공격에 안전한 비대칭 워터마킹)

  • Li, De;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.173-180
    • /
    • 2008
  • In this paper, we proposed an algorithm for an effective public key and private key generation to implement a secure asymmetric watermarking system against the public key attack. The public key and private key generation is based on the linear transformation using a special matrix and the keys are designed to be able to have high correlation value. We also proposed a counter plan of public key attack. This method uses a multiple public key generation and distribution. As the results, the correlation value between the public key and the private key is high in the watermarked image. After the public key attack. this can detect the correlation by using other public key.

  • PDF

Fast LFM Target Detection Method with Robustness for Doppler Shift in Narrow-Band Sonar Systems (협대역 소나시스템에서 도플러 천이에 강인한 고속 LFM 표적 검출기법)

  • Choi, Sang-Moon;Do, Dae-Won;Kim, Woo-Sik;Lee, Dong-Hun;Kim, Hyung-Moon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.8
    • /
    • pp.114-125
    • /
    • 2014
  • In a conventional sonar system, which uses LFM signal for detecting targets with varying speed, the results of multiple LFM Doppler correlators are aligned and the maximum alined result are selected as a test cell for detecting targets. As the number of the LFM Doppler correlators are increased for accurate target detection, as the required computational complexity and the memory are also increased. This fact makes it difficult to implement the accurate LFM target detector. In this paper, we propose a new fast target detection which is robust for the variation of target speed. Because the proposed method uses the summation of alined results of large numbers of LFM Doppler correlators, the proposed method increase SNR and provide robust SNR for the variation of target speed. And the proposed method can provide very fast target detection by implementing the process, the summation of alined results of large numbers of LFM Doppler correlators, as one summation filter.