• Title/Summary/Keyword: 1:1 Verification

Search Result 4,020, Processing Time 0.033 seconds

Utterance Verification and Substitution Error Correction In Korean Connected Digit Recognition (한국어 연결숫자 인식에서의 발화 검증과 대체오류 수정)

  • Jung Du Kyung;Song Hwa Jeon;Jung Ho-Young;Kim Hyung Soon
    • MALSORI
    • /
    • no.45
    • /
    • pp.79-91
    • /
    • 2003
  • Utterance verification aims at rejecting both out-of-vocabulary (OOV) utterances and low-confidence-scored in-vocabulary (IV) utterances. For utterance verification on Korean connected digit recognition task, we investigate several methods to construct filler and anti-digit models. In particular, we propose a substitution error correction method based on 2-best decoding results. In this method, when 1st candidate is rejected, 2nd candidate is selected if it is accepted by a specific hypothesis test, instead of simply rejecting the 1st one. Experimental results show that the proposed method outperforms the conventional log likelihood ratio (LLR) test method.

  • PDF

Utterance Verification using Phone-Level Log-Likelihood Ratio Patterns in Word Spotting Systems (핵심어 인식기에서 단어의 음소레벨 로그 우도 비율의 패턴을 이용한 발화검증 방법)

  • Kim, Chong-Hyon;Kwon, Suk-Bong;Kim, Hoi-Rin
    • Phonetics and Speech Sciences
    • /
    • v.1 no.1
    • /
    • pp.55-62
    • /
    • 2009
  • This paper proposes an improved method to verify a keyword segment that results from a word spotting system. First a baseline word spotting system is implemented. In order to improve performance of the word spotting systems, we use a two-pass structure which consists of a word spotting system and an utterance verification system. Using the basic likelihood ratio test (LRT) based utterance verification system to verify the keywords, there have been certain problems which lead to performance degradation. So, we propose a method which uses phone-level log-likelihood ratios (PLLR) patterns in computing confidence measures for each keyword. The proposed method generates weights according to the PLLR patterns and assigns different weights to each phone in the process of generating confidence measures for the keywords. This proposed method has shown to be more appropriate to word spotting systems and we can achieve improvement in final word spotting accuracy.

  • PDF

Palmprint Verification Using Multi-scale Gradient Orientation Maps

  • Kim, Min-Ki
    • Journal of the Optical Society of Korea
    • /
    • v.15 no.1
    • /
    • pp.15-21
    • /
    • 2011
  • This paper proposes a new approach to palmprint verification based on the gradient, in which a palm image is considered to be a three-dimensional terrain. Principal lines and wrinkles make deep and shallow valleys on a palm landscape. Then the steepest slope direction in each local area is first computed using the Kirsch operator, after which an orientation map is created that represents the dominant slope direction of each pixel. In this study, three orientation maps were made with different scales to represent local and global gradient information. Next, feature matching based on pixel-unit comparison was performed. The experimental results showed that the proposed method is superior to several state-of-the-art methods. In addition, the verification could be greatly improved by fusing orientation maps with different scales.

Enhancing Document Security with Computer Generated Hologram Encryption: Comprehensive Solution for Mobile Verification and Offline Decryption

  • Leehwan Hwang;Seunghyun Lee;Jongsung Choi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.169-175
    • /
    • 2024
  • In this paper, we introduce a novel approach to enhance document security by integrating Computer Generated Hologram(CGH) encryption technology with a system for document encryption, printing, and subsequent verification using a smartphone application. The proposed system enables the encryption of documents using CGH technology and their printing on the edges of the document, simplifying document verification and validation through a smartphone application. Furthermore, the system leverages high-resolution smartphone cameras to perform online verification of the original document and supports offline document decryption, ensuring tamper detection even in environments without internet connectivity. This research contributes to the development of a comprehensive and versatile solution for document security and integrity, with applications in various domains.

The Comparative Analysis Study and Usability Assessment of Fat Suppressed 3D FSPGR T1 Technique and Fat Suppressed Isotropic 3D FSE T1 Technique when Examining MRI of Patient with Triangular Fibrocartilage Complex (TFCC) Tear (삼각 섬유성 연골(TFCC) 손상 환자의 자기공명영상 검사 시 Fat Suppressed 3D FSPGR T1 강조 기법에 대한 Fat Suppressed Isotropic 3D FSE T1 강조 기법의 비교 분석 및 유용성에 관한 평가)

  • Kang, Sung-Jin;Cho, Yong-Keun;Lee, Sung-Soo
    • Journal of the Korean Magnetics Society
    • /
    • v.26 no.3
    • /
    • pp.105-114
    • /
    • 2016
  • In this study, For assessment of triangular fibrocartilage complex (TFCC) injury, we acquired images by fat suppressed 3D fast spoiled gradient recalled T1 and fat suppressed Isotropic 3D fast spin echo T1 techniques. For quantitative evaluation, measured signal to noise ratio and contrast to noise ratio and verified statistical significance between two imaging techniques by Mann-Whitney U verification. And for qualitative evaluation, marked 4-grade scoring (0: non diagnostic, 1: poor, 2: adequate, 3: good) on shape of TFCC, artifacts by partial volumes, description of the lesions by two radiologist, verified coincidence between 2 observer using Kappa-value verification. We used 3.0 Tesla MR equipment and 8-channel RF coil for imaging acquisition. As quantitative evaluation results, signal to noise ratio and contrast to noise ratio value of Isotropic 3D fast spin echo T1 technique is higher in every image sections, also between two imaging techniques by Mann-Whitney U verification was statistically significant (p < 0.05). As qualitative results, observer 1, 2 marked a higher grade on Isotropic 3D FSE T1 technique, coincidence verification of evaluation results between two observers by Kappa-value verification was statistically significant (p < 0.05). As a result, during MRI examination on TFCC injury, fat suppressed Isotropic 3D fast spin echo T1 technique is considered offering more useful information about abnormal lesion of TFCC.

Operational Concept of the NEXTSat-1 for Science Mission and Space Core Technology Verification

  • Shin, Goo-Hwan;Chae, Jang-Soo;Lee, Sang-Hyun;Min, Kyung-Wook;Sohn, Jong-Dae;Jeong, Woong-Seob;Moon, Bong-Gon
    • Journal of Astronomy and Space Sciences
    • /
    • v.31 no.1
    • /
    • pp.67-72
    • /
    • 2014
  • The next generation small satellite-1 (NEXTSat-1) program has been kicked off in 2012, and it will be launched in 2016 for the science missions and the verification of space core technologies. The payloads for these science missions are the Instrument for the Study of Space Storms (ISSS) and NIR Imaging Spectrometer for Star formation history (NISS). The ISSS and the NISS have been developed by Korea Advanced Institute of Science and Technology (KAIST) and Korea Astronomy and Space science Institute (KASI) respectively. The ISSS detects plasma densities and particle fluxes of 10 MeV energy range near the Earth and the NISS uses spectrometer. In order to verify the spacecraft core technologies in the space, the total of 7 space core technologies (SCT) will be applied to the NEXTSat-1 for space verification and those are under development. Thus, the operation modes for the ISSS and the NISS for space science missions and 7 SCTs for technology missions are analyzed for the required operation time during the NEXTSat-1's mission life time of 2 years. In this paper, the operational concept of the NEXTSat-1's science missions as well as the verification of space core technologies are presented considering constraints of volume, mass, and power after launch.

Development of PLC modules for the safety verification of chemical processes (공정의 안전 검증을 위한 PLC 모듈 개발)

  • Jeong, Sang-Hun;Lee, Kwang-Soon;Moon, Il
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.2 no.1
    • /
    • pp.53-59
    • /
    • 1996
  • An automatic verification method has been studied to determine the safety and operability of programmable logic controller (PLC) based systems. For the systematic and efficient verification, we have developed a conversion method from relay ladder logic (RLL) to the verification system description. RLL is a common representation used to document PLC programs for the sequential logic of the system such as the safety interlocks and the startup/shutdown procedures. Once the modules are developed, complex RLLs can be represented by the combination of modules. As a result we can verify complex PLC systems using the verification method including RLL modules. The developed modules are used to verify alarm systems and show that the method is valid.

  • PDF

System requirement verification process and facilitating template (시스템 요구사항 검증 절차 및 수행 템플릿)

  • Jang, Jae Deuck;Lee, Jae Chon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.2 no.2
    • /
    • pp.33-38
    • /
    • 2006
  • It is well known that efficient management and thorough implementation of stakeholder requirements is vital for a successful development of a large-scale and complex system. Equally important is to make sure that all the requirements be correctly realized in the developed system. For the purpose, verification requirements are derived with traceability from the system requirements. This paper discusses a step by step process for constructing the requirements verification model which includes : 1) the schema modeling both requirements and their traceability; 2) the template documenting the verification requirements; 3) the verification model constructed from the schema; and 4) the test and evaluation plan that can be printed automatically.

  • PDF

Development of Probability Based Defect Verification Algorithm for Automatic Visual Inspection (자동외관검사를 위한 확률기반 불량 확인 알고리즘 개발)

  • Kim, Youngheub;Ryu, Sun-Joong
    • Journal of the Semiconductor & Display Technology
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • The visual inspection of electronic parts consists of two steps: automatic visual inspection and verification inspection. In the stage of a verification inspection, the human inspector sequentially inspects all the areas which detected in the automatic inspection. In this study, we propose an algorithm to determine the order of verification inspection by Bayes inference well known in the field of machine learning. This is a method of prioritizing a region estimated to have a high probability of defect using experience data of past inspection. This algorithm was applied to the visual inspection of ultraviolet filters to verify its effectiveness. As a result of the comparison experiment, it was confirmed that the verification inspection can be completed 30% of the conventional method by adapting proposed algorithm.

  • PDF

CDMA2000 lx Compliant Mobile Station Modem Design and Verification (CDMA2000 1x 이동국 모뎀의 설계 및 검정)

  • Gwon, Yun-Ju;Kim, Cheol-Jin;Im, Jun-Hyeok;Kim, Gyeong-Ho;Lee, Gyeong-Ha;Han, Tae-Hui;Kim, Yong-Seok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.6
    • /
    • pp.69-77
    • /
    • 2002
  • In this paper, we present the CDMA2000 1x compliant mobile station modem chip (SCom5010) implemented in a 0.18${\mu}{\textrm}{m}$ CMOS technology.[1] ARM940T cached processor. TeakLite DSP core, and other peripheral blocks are integrated with the baseband modem chip. Also we show novel verification methodologies and explain how this chip can be used as an emulation processor.