• Title/Summary/Keyword: FI model

Search Result 165, Processing Time 0.022 seconds

One-shot multi-speaker text-to-speech using RawNet3 speaker representation (RawNet3를 통해 추출한 화자 특성 기반 원샷 다화자 음성합성 시스템)

  • Sohee Han;Jisub Um;Hoirin Kim
    • Phonetics and Speech Sciences
    • /
    • v.16 no.1
    • /
    • pp.67-76
    • /
    • 2024
  • Recent advances in text-to-speech (TTS) technology have significantly improved the quality of synthesized speech, reaching a level where it can closely imitate natural human speech. Especially, TTS models offering various voice characteristics and personalized speech, are widely utilized in fields such as artificial intelligence (AI) tutors, advertising, and video dubbing. Accordingly, in this paper, we propose a one-shot multi-speaker TTS system that can ensure acoustic diversity and synthesize personalized voice by generating speech using unseen target speakers' utterances. The proposed model integrates a speaker encoder into a TTS model consisting of the FastSpeech2 acoustic model and the HiFi-GAN vocoder. The speaker encoder, based on the pre-trained RawNet3, extracts speaker-specific voice features. Furthermore, the proposed approach not only includes an English one-shot multi-speaker TTS but also introduces a Korean one-shot multi-speaker TTS. We evaluate naturalness and speaker similarity of the generated speech using objective and subjective metrics. In the subjective evaluation, the proposed Korean one-shot multi-speaker TTS obtained naturalness mean opinion score (NMOS) of 3.36 and similarity MOS (SMOS) of 3.16. The objective evaluation of the proposed English and Korean one-shot multi-speaker TTS showed a prediction MOS (P-MOS) of 2.54 and 3.74, respectively. These results indicate that the performance of our proposed model is improved over the baseline models in terms of both naturalness and speaker similarity.

A Research on Expansion of Library Service by Using QR Code (QR코드를 활용한 도서관 서비스 확장 방안에 관한 연구)

  • Park, Jin-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.321-347
    • /
    • 2012
  • Recently, the expansion of smart phones, wi-fi. and unlimited service changed our life style from personal computer based to mobile device based. With this trend, a lot of companies and government facilities use QR code as an advertising material, and now the QR code is very popular service in our ordinary life. In the meantime, libraries in abroad and university libraries started using QR code in library service about 2 or 3 years ago, and domestic libraries started using it in service due to the increase of establishment of mobile Library websites. In this research, starting with looking into the literature, I analyzed the examples of the use of QR code in libraries. On the base of it, I drew a QR code library service model, and what needs to be considered for the use of it.

A Study on the Mutual Coexistence between Virtual Reality Bluetooth Devices and WLAN on the Monte-Carlo (몬테카를로 기반의 가상현실 블루투스 기기와 무선랜 사이의 상호 공존 연구)

  • Yun, Hye-Ju;Yu, Chul-Hee;Kim, Byung-Duk;Jo, Young-Do
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • As a communications system and using the wireless devices is increased at the world, the interference among devices at 2.4GHz band become issue. New complex content technology as education, concert, broadcast, thema-park are developed between Virtual Reality technology and tradition. That is expect an annual growth rate of more than 14%. Almost Virtual Reality devices use motion sense or a wireless joystick. Therefore it is necessarily to analyze the coexistence between Virtual Reality devices and Wi-Fi in the ISM band. The interference scenario and propagation of the Extended Hata Model was established to analyze the interference from WLAN into Virtual Reality devices. Through simulation results based on Monte-Carlo principle, separation frequency was obtained to protect WLAN interference from Virtual Reality devices.

Radio Beacon-based Seamless Indoor and Outdoor Positioning for Personal Navigation Systems (개인 휴대용 네비게이션을 위한 라디오 비컨 기반 실내외 연속측위 시스템)

  • Kim, Sang-Kyoon;Jang, Yoon-Ho;Bae, Sang-Jun;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.84-92
    • /
    • 2009
  • In this paper, using the received signal strength of radio beacon such as Wi-Fi, Bluetooth, CDMA and GPS signal from the satellite, we propose the system of positioning which considered indoor and outdoor based on the Place Lab. Conventional Place Lab utilize the various positioning parameters to estimate the indoor location. However, this conventional system has limitations with respect to the range and efficiency of usage. Therefore, we defined the converged model of multisensor data and re-organized the Place Lab to overcome the limitation of a conventional system. Proposed system uses the radio beacon signal and GPS signal together to estimate the location. Furthermore, it provides the seamless PNS service with many mobile devices because this system realized by the OSGi bundle. This proposed system has evaluated the performance with SAMSUNG T*OMNIA SCH-M490 smart phone and the result shows the system is able to support the PNS service.

  • PDF

Design and Implementation of Prototype Anti-disaster Remote Control Robot Model using Smart Phone (스마트폰을 이용한 방재용 원격 조정 로봇의 프로토 타입 모델 설계 및 구현)

  • Choi, Sung-Jai
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.221-227
    • /
    • 2014
  • This paper presented a design which was a minimized remote control robot. This remote control robot was created for preventing life damage from conflagrations, nuclear events and HF gas accidents. This robot's system based smart phone that had camera and GPS systems. When fire came out, The robot figured out that how big fire was, where the fire was started and various aspects of situations. And The robot broadcasted the informations to smart phone using mobile application and wi-fi camera. By doing these, the fire mans could more accurate and be easier to plan a strategy for saving life. The body of robot are 2 parts. One is a car and the other one is a remote controller. By the power, 1step to 10steps, of grabbing remote controller could change the car's speed to move. Also, The prototype robot was already confirmed its utility itself.

Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration

  • Nandhini, Uma;TamilSelvan, Latha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3916-3936
    • /
    • 2014
  • Smartphone applications like games, image processing, e-commerce and social networking are gaining exponential growth, with the ubiquity of cellular services. This demands increased computational power and storage from mobile devices with a sufficiently high bandwidth for mobile internet service. But mobile nodes are highly constrained in the processing and storage, along with the battery power, which further restrains their dependability. Adopting the unlimited storage and computing power offered by cloud servers, it is possible to overcome and turn these issues into a favorable opportunity for the growth of mobile cloud computing. As the mobile internet data traffic is predicted to grow at the rate of around 65 percent yearly, even advanced services like 3G and 4G for mobile communication will fail to accommodate such exponential growth of data. On the other hand, developers extend popular applications with high end graphics leading to smart phones, manufactured with multicore processors and graphics processing units making them unaffordable. Therefore, to address the need of resource constrained mobile nodes and bandwidth constrained cellular networks, the computations can be migrated to resourceful servers connected to cloud. The server now acts as a bridge that should enable the participating mobile nodes to offload their computations through Wi-Fi directly to the virtualized server. Our proposed model enables an on-demand service offloading with a decision support system that identifies the capabilities of the client's hardware and software resources in judging the requirements for offloading. Further, the node's location, context and security capabilities are estimated to facilitate adaptive migration.

Study on the Inclusion Behavior of Sulfobutylether-β-Cyclodextrin with Perphenazine by Flow Injection Chemiluminescence

  • Shen, Minxia;Lv, Hairu;Song, Zhenghua
    • Bulletin of the Korean Chemical Society
    • /
    • v.34 no.11
    • /
    • pp.3199-3205
    • /
    • 2013
  • The inclusion behavior of sulfobutylether-${\beta}$-cyclodextrin (SBE-${\beta}$-CD) with perphenazine (PPH) was first studied by flow injection (FI)-chemiluminescence (CL) analysis with proposed $lg[(I_0-I_s)/I_s]=lgK_{P-CD}+nlg[C_{PPH}]$ model and molecular docking. Results showed that a 1:1 complex of SBE-${\beta}$-CD/PPH could online form, with the formation constant $K_{P-CD}$ of $2.57{\times}10^7Lmol^{-1}$ at 298 K. The thermodynamic parameters showed that the inclusion behavior of SBE-${\beta}$-CD/PPH was a spontaneous process by hydrophobic interaction. The molecular docking results revealed PPH entered into the larger cavity of SBE-${\beta}$-CD with two hydrogen bonds. Based on the linear relationship of the decrement of luminol/SBE-${\beta}$-CD/PPH CL intensity against the logarithm of PPH concentration ranging from 0.03 to 30.0 ng $mL^{-1}$, the present FI-CL analysis using luminol/SBE-${\beta}$-CD/PPH system was successfully applied to PPH determination in biological fluids and tablets with recoveries from 94.5 to 105.6% and RSDs less than 2.6% (n = 5).

Protocol-Aware Radio Frequency Jamming inWi-Fi and Commercial Wireless Networks

  • Hussain, Abid;Saqib, Nazar Abbas;Qamar, Usman;Zia, Muhammad;Mahmood, Hassan
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.397-406
    • /
    • 2014
  • Radio frequency (RF) jamming is a denial of service attack targeted at wireless networks. In resource-hungry scenarios with constant traffic demand, jamming can create connectivity problems and seriously affect communication. Therefore, the vulnerabilities of wireless networks must be studied. In this study, we investigate a particular type of RF jamming that exploits the semantics of physical (PHY) and medium access control (MAC) layer protocols. This can be extended to any wireless communication network whose protocol characteristics and operating frequencies are known to the attacker. We propose two efficient jamming techniques: A low-data-rate random jamming and a shot-noise based protocol-aware RF jamming. Both techniques use shot-noise pulses to disrupt ongoing transmission ensuring they are energy efficient, and they significantly reduce the detection probability of the jammer. Further, we derived the tight upper bound on the duration and the number of shot-noise pulses for Wi-Fi, GSM, and WiMax networks. The proposed model takes consider the channel access mechanism employed at the MAC layer, data transmission rate, PHY/MAC layer modulation and channel coding schemes. Moreover, we analyze the effect of different packet sizes on the proposed jamming methodologies. The proposed jamming attack models have been experimentally evaluated for 802.11b networks on an actual testbed environment by transmitting data packets of varying sizes. The achieved results clearly demonstrate a considerable increase in the overall jamming efficiency of the proposed protocol-aware jammer in terms of packet delivery ratio, energy expenditure and detection probabilities over contemporary jamming methods provided in the literature.

The Effective Application Management Using Characteristics of Tizen Wearable Platform (타이젠 웨어러블 플랫폼의 특성을 이용한 효율적인 어플리케이션 관리)

  • Ham, Dong-eup
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.318-321
    • /
    • 2017
  • Most of wearable platforms(i. e. Samsung Gear, Android Wear) are using most of Tizen mobile platform features without any changes. However wearable devices have unique characteristics due to wearable type, small battery, screen shape, poor network and relative short but frequent user interfaces. In general, a wearable device has a process to be paired with the mobile device, which includes capability exchange that includes information such as device model name, network capability (3G, LTE, Wi-Fi and so on), manufacturer and supported languages. In other word, a wearable device depends heavily on the companion device (i. e. phone, tablet), so wearable platform should consider this. In this paper, we provide the effective application management mechanism using these characteristics of wearable platform to enhance user experience and to reduce sluggish of wearable platform.

  • PDF

An Accuracy Assessment Scheme through Entropy Analysis in BLE-based Indoor Positioning Systems (BLE 기반 실내 측위 시스템에서 엔트로피 분석을 통한 정확도 평가 기법)

  • Pi, Kyung-Joon;Min, Hong;Han, Kyoungho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.117-123
    • /
    • 2022
  • Unlike the satellite-based outdoor positioning system, the indoor positioning system utilizes various wireless technologies such as BLE, Wi-Fi, and UWB. BLE-based beacon technology can measure the user's location by periodically broadcasting predefined device ID and location information and using RSSI from the receiving device. Existing BLE-based indoor positioning system studies have many studies comparing the error between the user's actual location and the estimated location at a single point. In this paper, we propose a technique to evaluate the positioning accuracy according to the movement path or area by applying the entropy analysis model. In addition, simulation results show that calculated entropy results for different paths can be compared to assess which path is more accurate.