• Title/Summary/Keyword: 어휘 분석

Search Result 861, Processing Time 0.032 seconds

Speech Synthesis for the Korean large Vocabulary Through the Waveform Analysis in Time Domains and Evauation of Synthesized Speech Quality (시간영역에서의 파형분석에 의한 무제한 어휘 합성 및 음절 유형별 규칙합성음 음질평가)

  • Kang, Chan-Hee;Chin, Yong-Ohk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.13 no.1
    • /
    • pp.71-83
    • /
    • 1994
  • This paper deals with the improvement of the synthesized speech quality and naturality in the Korean TTS(Text-to-Speech) system. We had extracted the parameters(table2) such as its amplitude, duration and pitch period in a syllable through the analysis of speech waveforms(table1) in the time domain and synthesized syllables using them. To the frequencies of the Korean pronunciation large vocabulary dictionary we had synthesized speeches selected 229 syllables such as V types are 19, CV types are 80. VC types are 30 and CVC types are 100. According to the 4 Korean syllable types from the data format dictionary(table3) we had tested each 15 syllables with the objective MOS(Mean Opinion Score) evaluation method about the 4 items i.e., intelligibility, clearness, loudness, and naturality after selecting random group without the knowledge of them. As the results of experiments the qualities of them are very clear and we can control the prosodic elements such as durations, accents and pitch periods (fig9, 10, 11, 12).

  • PDF

Speech syntheis engine for TTS (TTS 적용을 위한 음성합성엔진)

  • 이희만;김지영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.6
    • /
    • pp.1443-1453
    • /
    • 1998
  • This paper presents the speech synthesis engine that converts the character strings kept in a computer memory into the synthesized speech sounds with enhancing the intelligibility and the naturalness by adapting the waveform processing method. The speech engine using demisyllable speech segments receives command streams for pitch modification, duration and energy control. The command based engine isolates the high level processing of text normalization, letter-to-sound and the lexical analysis and the low level processing of signal filtering and pitch processing. The TTS(Text-to-Speech) system implemented by using the speech synthesis engine has three independent object modules of the Text-Normalizer, the Commander and the said Speech Synthesis Engine those of which are easily replaced by other compatible modules. The architecture separating the high level and the low level processing has the advantage of the expandibility and the portability because of the mix-and-match nature.

  • PDF

Wordnet Extension for IT terminology Using Web Search (웹 검색을 활용한 워드넷에서의 IT 전문 용어 확장)

  • Park, Kyeong-Kook;Lee, Kwang-Mo;Kim, Yu-Seop
    • Annual Conference on Human and Language Technology
    • /
    • 2007.10a
    • /
    • pp.189-193
    • /
    • 2007
  • In this paper, we designed a methodology to expand the WordNet. We added unknown terms like IT technical terms to the existing WordNet by using web search. The WordNet is an online taxonomy representing the relationships among terms, but it usually showed limitation to contain new technical terminologies. That's why we tried to expand the WordNet. Firstly, when we met unregistered terms in WordNet, we built a query of those terms for web search. Given a web search results, we tried to find out terms with a high-level relatedness with the unregistered terms. We used the Korean Morphological Analyzer to score the relatedness between terms and located the unregistered term as a hyponym of terms with high score of relatedness.

  • PDF

A Malicious Comments Detection Technique on the Internet using Sentiment Analysis and SVM (감성분석과 SVM을 이용한 인터넷 악성댓글 탐지 기법)

  • Hong, Jinju;Kim, Sehan;Park, Jeawon;Choi, Jaehyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.2
    • /
    • pp.260-267
    • /
    • 2016
  • The Internet has brought lots of changes to us sharing information mutually. However, as all social symptom have double-sided character, it has serious social problem. Vicious users have been taking advantage of anonymity on the Internet, stating comments aggressively for defamation, personal attacks, privacy violation and more. Malicious comments on the Internet are creating the biggest problem regarding unlawful acts and insults which occur on the Internet. In order to solve the issues, several studies have been done to efficiently manage the comments. However, there are limitations to recognize modified malicious vocabulary in previous research. So, in this paper, we propose a malicious comments detection technique by improving limitation of previous studies. The experimental result has shown accuracy of 87.8% providing higher accuracy as compared to previous studies done.

Development of a G-machine Based Translator for a Lazy Functional Programming Language Miranda (지연함수언어 Miranda의 G-기계 기반 번역기 개발)

  • Lee, Jong-Hui;Choe, Gwan-Deok;Yun, Yeong-U;Gang, Byeong-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.733-745
    • /
    • 1995
  • This study is aimed at construction of a translator for a functional programming language. For this goal we define a functional programming language which has lazy semantics and develop a translator for it. The execution model selected is the G-machine-based combinator graph reduction. The translator is composed of 4 phases and translates a source program to a C program. The first phase of the translator translates a source program to a enriched lambda- calculus graph, the second phase transforms a lambda-calculus graph into supercombinators, the third phase translates supercombiantors to a G program and the last phase translates the G program to a C program. The final result of the translator, a C program, is compiled to an executable program by C compiler. The translator is implemented in C using compiler development tools such as TACC and Lex, under the UNIX environments. In this paper we present the design and implementation techniques for developing the translator and show results by executing some test problems.

  • PDF

Development of Collaborative Filtering based User Recommender Systems for Water Leisure Boat Model Design (수상레저용 보트 설계를 위한 협력적 필터링 기반 사용자 추천시스템 개발)

  • Oh, Joong-Duk;Park, Chan-Hong;Kim, Chong-Soo;Seong, Hyeon-Kyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.413-416
    • /
    • 2014
  • Recently, demand for various leisure sports gradually increases, as people's sense of values changes into leisure-centered one according to the change of given social circumstance and the change of customer needs all over the world. The actual condition is that an interest and participation rate especially in water leports during the summer increases. And needs for various hull design of standardized boat for water leisure increase. Therefore, this paper is intended to develop a recommendation system to design a boat for water leisure by using the collaborative filtering technique in order to make it possible to actively cope with the change of various customer needs for hull design. To this end, emotion relating to kayak design was selected through consumer survey, and emotion was derived by factor analysis and assessment, and then a kayak design layout in the aspect of customer's emotional preference was presented. Besides, an analysis was made according to the elements such as hull, body, and propulsion system of kayak in order to select emotional words according to the kayak design reflecting user's preference, and then a boat model for water leisure in conformance with user's preference was presented.

  • PDF

Comparative Analysis of Fashion Characteristics on the Cover of Domestic Licensed Fashion Magazines - Focused on ELLE, VOGUE, W - (국내 라이선스 패션잡지 표지에 나타난 패션특성의 비교분석 - ELLE, VOGUE, W를 중심으로 -)

  • Lee, Hyunji;Lee, Kyunghee
    • Fashion & Textile Research Journal
    • /
    • v.21 no.1
    • /
    • pp.1-12
    • /
    • 2019
  • The purpose of this study is to examine the fashion characteristics of fashion magazine cover by comparing and analyzing the formative characteristics of fashion, visual design characteristics and illustration vocabulary on the cover of 3 fashion magazines. The data analysis criteria consisted of the formative elements of fashion (fashion design element, fashion coordination element) and visual design element (color, illustration lexical layout, model photograph type). Data analysis methods were statistical analysis, stepwise lexical analysis, and content analysis. The results of the study are as follows. First, the formative characteristics of fashion on the cover of fashion magazines show that ELLE is a feminine and elegant characteristics, VOGUE is a modern, chic and mannish characteristics, and W is avant-garde and neutral characteristics. Second, visual design characteristics on the cover of fashion magazines, ELLE and VOGUE use modern and simple modern sensibility by using monotonous background color and background color number, and W showed original image characteristic by using various colors. Third, as a result of the illustration lexical analysis on the cover of fashion magazines, 4 core keywords of trend, star, event, and life appeared in 3 magazines in common. Elle differentiates by innovation, Vogue by discrimination, W by reconstruction.

Predicate Recognition Method using BiLSTM Model and Morpheme Features (BiLSTM 모델과 형태소 자질을 이용한 서술어 인식 방법)

  • Nam, Chung-Hyeon;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.24-29
    • /
    • 2022
  • Semantic role labeling task used in various natural language processing fields, such as information extraction and question answering systems, is the task of identifying the arugments for a given sentence and predicate. Predicate used as semantic role labeling input are extracted using lexical analysis results such as POS-tagging, but the problem is that predicate can't extract all linguistic patterns because predicate in korean language has various patterns, depending on the meaning of sentence. In this paper, we propose a korean predicate recognition method using neural network model with pre-trained embedding models and lexical features. The experiments compare the performance on the hyper parameters of models and with or without the use of embedding models and lexical features. As a result, we confirm that the performance of the proposed neural network model was 92.63%.

A Study on Elementary School Teachers' Needs for Access Points for Picture Books (초등학교 교사의 그림책 접근점 요구에 관한 연구)

  • Kim, Hyemi;Kim, Soojung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.233-258
    • /
    • 2022
  • The purpose of this study is to identify elementary school teachers' needs for access points when searching for picture books to be used as teaching media, and suggest ways to improve DLS(Digital Library System) in school libraries. To achieve this purpose, the study examined the access points provided by OPAC(Online Public Access Catalog) systems in seven domestic and foreign libraries. In addition, it conducted an online survey with elementary school teachers, and a total of 220 responses were finally analyzed. It was found that the most needed access points were topic, grade/age, content, subject/chapter, and cross-curricula learning topics, etc. Based on the results, this study suggests providing the most needed access points in DLS, developing controlled vocabulary tools, and improving system functions or the interface to enhance accessibility to picture books.

Development of a Malicious URL Machine Learning Detection Model Reflecting the Main Feature of URLs (URL 주요특징을 고려한 악성URL 머신러닝 탐지모델 개발)

  • Kim, Youngjun;Lee, Jaewoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1786-1793
    • /
    • 2022
  • Cyber-attacks such as smishing and hacking mail exploiting COVID-19, political and social issues, have recently been continuous. Machine learning and deep learning technology research are conducted to prevent any damage due to cyber-attacks inducing malicious links to breach personal data. It has been concluded as a lack of basis to judge the attacks to be malicious in previous studies since the features of data set were excessively simple. In this paper, nine main features of three types, "URL Days", "URL Word", and "URL Abnormal", were proposed in addition to lexical features of URL which have been reflected in previous research. F1-Score and accuracy index were measured through four different types of machine learning algorithms. An improvement of 0.9% in a result and the highest value, 98.5%, were examined in F1-Score and accuracy through comparatively analyzing an existing research. These outcomes proved the main features contribute to elevating the values in both accuracy and performance.