• Title/Summary/Keyword: Frequency Based Embedding

Search Result 85, Processing Time 0.023 seconds

Comparison between Word Embedding Techniques in Traditional Korean Medicine for Data Analysis: Implementation of a Natural Language Processing Method (한의학 고문헌 데이터 분석을 위한 단어 임베딩 기법 비교: 자연어처리 방법을 적용하여)

  • Oh, Junho
    • Journal of Korean Medical classics
    • /
    • v.32 no.1
    • /
    • pp.61-74
    • /
    • 2019
  • Objectives : The purpose of this study is to help select an appropriate word embedding method when analyzing East Asian traditional medicine texts as data. Methods : Based on prescription data that imply traditional methods in traditional East Asian medicine, we have examined 4 count-based word embedding and 2 prediction-based word embedding methods. In order to intuitively compare these word embedding methods, we proposed a "prescription generating game" and compared its results with those from the application of the 6 methods. Results : When the adjacent vectors are extracted, the count-based word embedding method derives the main herbs that are frequently used in conjunction with each other. On the other hand, in the prediction-based word embedding method, the synonyms of the herbs were derived. Conclusions : Counting based word embedding methods seems to be more effective than prediction-based word embedding methods in analyzing the use of domesticated herbs. Among count-based word embedding methods, the TF-vector method tends to exaggerate the frequency effect, and hence the TF-IDF vector or co-word vector may be a more reasonable choice. Also, the t-score vector may be recommended in search for unusual information that could not be found in frequency. On the other hand, prediction-based embedding seems to be effective when deriving the bases of similar meanings in context.

De-Embedding Method Using 8-Term Error Based on 1-Port Calculation (1-포트 측정을 기반으로 한 8-Term Error De-Embedding 기법)

  • Song, Minsoo;Kim, Kwangho;Nah, Wansoo
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.125-126
    • /
    • 2015
  • 통신 시스템에서의 더 늘어난 대역폭(Band Width)의 수요로 인해 집적회로(Integrated Circuit)에서 더 높은 동작 주파수(Operating Frequency)를 필요로 하게 되었다. 고주파 영역에서는 SRF(Self Resonance Frequency) 문제와 소자 값의 정확성(Accuracy)에 대한 문제 때문에 정수소자(Lumped Element)를 이용하여 해석을 할 수 없으며 이로 인하여 어떠한 회로의 전기적 특성을 평가함에 있어서 전송선로(Transmission Line)를 이용하여 해석을 하는 것은 중요한 역할을 하게 되었다. 이러한 해석을 위해 순수한 내부 특성을 얻기 위하여 디 임베딩(De-Embedding)이라는 기법이 사용되고 있으나, 알려진 몇 가지의 방법들은 인터커넥터 부분을 완벽히 나타내지 못한다. 따라서 본 논문에서는 1-Port 측정을 기반으로 한 8-Term Error을 이용한 디 임베딩(De-Embedding) 방법을 이용하여 넓은 주파수 영역에서의 교정 값을 얻는 방법에 대하여 소개하고자 한다.

  • PDF

Adaptive Image Interpolation Using Pixel Embedding (화소 삽입을 이용한 적응적 영상보간)

  • Han, Kyu-Phil;Oh, Gil-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1393-1401
    • /
    • 2014
  • This paper presents an adaptive image interpolation method using a pixel-based neighbor embedding which is modified from the patch-based neighbor embedding of contemporary super resolution algorithms. Conventional interpolation methods for high resolution detect at least 16-directional edges in order to remove zig-zaging effects and selectively choose the interpolation strategy according to the direction and value of edge. Thus, they require much computation and high complexity. In order to develop a simple interpolation method preserving edge's directional shape, the proposed algorithm adopts the simplest Haar wavelet and suggests a new pixel-based embedding scheme. First, the low-quality image but high resolution, magnified into 1 octave above, is acquired using an adaptive 8-directional interpolation based on the high frequency coefficients of the wavelet transform. Thereafter, the pixel embedding process updates a high resolution pixel of the magnified image with the weighted sum of the best matched pixel value, which is searched at its low resolution image. As the results, the proposed scheme is simple and removes zig-zaging effects without any additional process.

Latent Semantic Analysis Approach for Document Summarization Based on Word Embeddings

  • Al-Sabahi, Kamal;Zuping, Zhang;Kang, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.254-276
    • /
    • 2019
  • Since the amount of information on the internet is growing rapidly, it is not easy for a user to find relevant information for his/her query. To tackle this issue, the researchers are paying much attention to Document Summarization. The key point in any successful document summarizer is a good document representation. The traditional approaches based on word overlapping mostly fail to produce that kind of representation. Word embedding has shown good performance allowing words to match on a semantic level. Naively concatenating word embeddings makes common words dominant which in turn diminish the representation quality. In this paper, we employ word embeddings to improve the weighting schemes for calculating the Latent Semantic Analysis input matrix. Two embedding-based weighting schemes are proposed and then combined to calculate the values of this matrix. They are modified versions of the augment weight and the entropy frequency that combine the strength of traditional weighting schemes and word embedding. The proposed approach is evaluated on three English datasets, DUC 2002, DUC 2004 and Multilingual 2015 Single-document Summarization. Experimental results on the three datasets show that the proposed model achieved competitive performance compared to the state-of-the-art leading to a conclusion that it provides a better document representation and a better document summary as a result.

A Watermarking Scheme of Lowest Frequency Band Based on the Quad-Tree Algorithm (쿼드트리 알고리즘과 최저주파수대역을 이용한 워터마킹 기법)

  • Jeong, Byong-Soo;Chu, Hyung-Suk;Shin, Soung-Wook;An, Chong-Koo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.11
    • /
    • pp.2027-2032
    • /
    • 2007
  • In this paper, digital watermarking method using quad-tree algorithm and the lowest frequency band is proposed. The proposed algorithm searches the coefficient of the watermark by using quad-tree algorithm and inserts the watermark by the Cox's algorithm. The simulation of the proposed algorithm is implemented about the effect of various weight factors in Cox's algorithm, that of embedding watermark in each subband coefficient (HH, LH, HL), and that of embedding in the lowest frequency band (LL). As a simulation result, the bigger weight factors in Cox's algorithm show strong to noise. The watermarking performance of simultaneously embedding in HH, LH, and HL band is better than that of different cases. In addition, insertion the watermark to the LL band about $30{\sim}60%$ of all watermarks improves the watermarking performance in comparison with the case of not using the LL band.

A "Thru-Short-Open" De-embedding Method for Accurate On-Wafer RF Measurements of Nano-Scale MOSFETs

  • Kim, Ju-Young;Choi, Min-Kwon;Lee, Seong-Hearn
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.1
    • /
    • pp.53-58
    • /
    • 2012
  • A new on-wafer de-embedding method using thru, short and open patterns sequentially is proposed to eliminate the errors of conventional methods. This "thru-short-open" method is based on the removal of the coupling admittance between input and output interconnect dangling legs. The increase of the de-embedding effect of the lossy coupling capacitance on the cutoff frequency in MOSFETs is observed as the gate length is scaled down to 45 nm. This method will be very useful for accurate RF measurements of nano-scale MOSFETs.

Comparison of System Call Sequence Embedding Approaches for Anomaly Detection (이상 탐지를 위한 시스템콜 시퀀스 임베딩 접근 방식 비교)

  • Lee, Keun-Seop;Park, Kyungseon;Kim, Kangseok
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.47-53
    • /
    • 2022
  • Recently, with the change of the intelligent security paradigm, study to apply various information generated from various information security systems to AI-based anomaly detection is increasing. Therefore, in this study, in order to convert log-like time series data into a vector, which is a numerical feature, the CBOW and Skip-gram inference methods of deep learning-based Word2Vec model and statistical method based on the coincidence frequency were used to transform the published ADFA system call data. In relation to this, an experiment was carried out through conversion into various embedding vectors considering the dimension of vector, the length of sequence, and the window size. In addition, the performance of the embedding methods used as well as the detection performance were compared and evaluated through GRU-based anomaly detection model using vectors generated by the embedding model as an input. Compared to the statistical model, it was confirmed that the Skip-gram maintains more stable performance without biasing a specific window size or sequence length, and is more effective in making each event of sequence data into an embedding vector.

Robust video watermarking algorithm for H.264/AVC based on JND model

  • Zhang, Weiwei;Li, Xin;Zhang, Yuzhao;Zhang, Ru;Zheng, Lixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2741-2761
    • /
    • 2017
  • With the purpose of copyright protection for digital video, a novel H.264/AVC watermarking algorithm based on JND model is proposed. Firstly, according to the characteristics of human visual system, a new and more accurate JND model is proposed to determine watermark embedding strength by considering the luminance masking, contrast masking and spatial frequency sensitivity function. Secondly, a new embedding strategy for H.264/AVC watermarking is proposed based on an analysis on the drift error of energy distribution. We argue that more robustness can be achieved if watermarks are embedded in middle and high components of $4{\times}4$ integer DCT since these components are more stable than dc and low components when drift error occurs. Finally, according to different characteristics of middle and high components, the watermarks are embedded using different algorithms, respectively. Experimental results demonstrate that the proposed watermarking algorithm not only meets the imperceptibility and robustness requirements, but also has a high embedding capacity.

An adaptive watermarking for remote sensing images based on maximum entropy and discrete wavelet transformation

  • Yang Hua;Xu Xi;Chengyi Qu;Jinglong Du;Maofeng Weng;Bao Ye
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.192-210
    • /
    • 2024
  • Most frequency-domain remote sensing image watermarking algorithms embed watermarks at random locations, which have negative impact on the watermark invisibility. In this study, we propose an adaptive watermarking scheme for remote sensing images that considers the information complexity to select where to embed watermarks to improve watermark invisibility without affecting algorithm robustness. The scheme converts remote sensing images from RGB to YCbCr color space, performs two-level DWT on luminance Y, and selects the high frequency coefficient of the low frequency component (HHY2) as the watermark embedding domain. To achieve adaptive embedding, HHY2 is divided into several 8*8 blocks, the entropy of each sub-block is calculated, and the block with the maximum entropy is chosen as the watermark embedding location. During embedding phase, the watermark image is also decomposed by two-level DWT, and the resulting high frequency coefficient (HHW2) is then embedded into the block with maximum entropy using α- blending. The experimental results show that the watermarked remote sensing images have high fidelity, indicating good invisibility. Under varying degrees of geometric, cropping, filtering, and noise attacks, the proposed watermarking can always extract high identifiable watermark images. Moreover, it is extremely stable and impervious to attack intensity interference.

Chip Impedance Evaluation Method for UHF RFID Transponder ICs over Absorbed Input Power

  • Yang, Jeen-Mo;Yeo, Jun-Ho
    • ETRI Journal
    • /
    • v.32 no.6
    • /
    • pp.969-971
    • /
    • 2010
  • Based on a de-embedding technique, a new method is proposed which is capable of evaluating chip impedance behavior over absorbed power in flip-chip bonded UHF radio frequency identification transponder ICs. For the de-embedding, four compact co-planar test fixtures, an equivalent circuit for the fixtures, and a parameter extraction procedure for the circuit are developed. The fixtures are designed such that the chip can absorb as much power as possible from a power source without radiating appreciable power. Experimental results show that the proposed modeling method is accurate and produces reliable chip impedance values related with absorbed power.