• Title/Summary/Keyword: Local Database

Search Result 628, Processing Time 0.024 seconds

Pitch Contour Conversion Using Slanted Gaussian Normalization Based on Accentual Phrases

  • Lee, Ki-Young;Bae, Myung-Jin;Lee, Ho-Young;Kim, Jong-Kuk
    • Speech Sciences
    • /
    • v.11 no.1
    • /
    • pp.31-42
    • /
    • 2004
  • This paper presents methods using Gaussian normalization for converting pitch contours based on prosodic phrases along with experimental tests on the Korean database of 16 declarative sentences and the first sentences of the story of 'The Three Little Pigs'. We propose a new conversion method using Gaussian normalization to the pitch deviation of pitch contour subtracted by partial declination lines: by using partial declination lines for each accentual phrase of pitch contour, we avoid the problem that a Gaussian normalization using average values and standard deviations of intonational phrase tends to lose individual local variability and thus cannot modify individual characteristics of pitch contour from a source speaker to a target speaker. From the results of the experiments, we show that this slanted Gaussian normalization using these declination lines subtracted from pitch contour of accentual phrases can modify pitch contour more accurately than other methods using Gaussian normalization.

  • PDF

Classification and Resolution of Conflicts for Integration of Heterogeneous Information Based on XML Schema (XML Schema 기반 이질 정보 통합의 충돌 분류와 해결 방안)

  • 권석훈;이경하;이규철
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.55-74
    • /
    • 2003
  • Due to the evolution of computer systems and the proliferation of Internet, numerous information resources have been constructed. The deluge of information makes the need to integrate information, which are distributed on the internet and are handled in heterogeneous systems. Recently, most of the XML -based information integration systems use XML DTD(Document Type Definition) for describing integrated global schema. However, DTD has some limitations in modeling local information resources such as datatypes. Although W3C's XML Schema is more flexible and powerful than XML DTD in specifying integrated global schema, it has more complex problems in resolving conflicts than using DTD. In this paper, we provide a taxonomy of conflict problems in integration information resources using XML Schema, and propose conflict resolution mechanism using XQuery.

  • PDF

Face Recognition Method using LBP and Top-N Block Matching (LBP와 Top-N 블록 매칭을 통한 얼굴 인식 방법)

  • Lee, Jin-Seok;Kim, Dai-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06b
    • /
    • pp.300-301
    • /
    • 2011
  • 본 논문에서는 Local Binary Pattern(LBP)과 Top-N Block Matching을 조합한 얼굴 인식 방법을 제안한다. 실제 상황에서 촬영된 얼굴영상에는 다양한 조명의 변화와 부분적인 가려짐의 영향을 크게 받기 때문에 실제 상황에서의 적용에 어려움이 있다. 따라서 기존의 LBP만을 이용한 얼굴 인식 방법은 좋은 성능을 보여주지 못한다. 이러한 문제를 극복하기 위해서 본 논문에서는 LBP와 Top-N Block Matching을 조합한 얼굴 인식 방법을 제안하였다. 제안된 얼굴 인식 방법이 기존의 LBP만을 사용한 얼굴 인식에 비해서 PF07 Database에서 약 7%의 성능향상이 이루어졌음을 실험을 통해서 보여주고 있다.

Numerical Study on the Performance Characteristics of a Centrifugal Compressor for a R134a Turbo-Chiller (R134a 터보냉동기용 원심압축기의 성능특성에 관한 수치해석적 연구)

  • Lee, Kyoung-Yong;Choi, Young-Seok;Park, Woon-Jean
    • The KSFM Journal of Fluid Machinery
    • /
    • v.7 no.2 s.23
    • /
    • pp.14-20
    • /
    • 2004
  • In this study, the overall performance and the local flow field of the centrifugal compressor with the refrigerant HFC-l34a were numerically studied using CFX-TASCflow. The thermodynamic and transport properties of the refrigerant gas were modeled by REFPROP which is NIST refrigerant properties database. The impacts of a grid qualify, discretization scheme, turbulent model and interaction between a impeller and a cascade diffuser were analyzed comparatively. The results were compared with experimental data and 1-D design results using COMPAL and agreed well with others. The numerical method and data obtained in this study can be applied to the design and modification of centrifugal compressors with real gases

Analysis of mixed feeds and its components with NIRS - possibilities, problems and prospects

  • Tillmann, Peter;Horst, Hartmut;Danier, Juergen;Dieterle, Peter;Philipps, Petra
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1261-1261
    • /
    • 2001
  • Mixed feeds and their components are a very diverse matrix compared to other agricultural products worked on with NIRS classically. On a database of mixed feeds and their components (n=2.500) universal PLS calibrations and “local” calibrations were compared. The results from validation (n=600) show the potential of the calibrations and their limitations. Crude protein, crude fiber, crude fat, sugar and starch are predicted with SEPs of 0.6%, 1%, 0.3%, 1% and 1.5%, respectively. Ash content of 15% and more in several mixed feeds or components as well as rare components limit the use of NIRS for routine analyses.

  • PDF

AN EXPERT SYSTEM FOR SETTING AND COORDINATION OF PROTECTIVE RELAYS (보호계전기의 정정 협조 전문가 시스템)

  • Lee, Seung-Jae;Kim, Ki-Hwa;Cho, Young-Ik;Yoon, Sang-Hyun;Yoon, Man-Chul;Lee, Sang-Ok
    • Proceedings of the KIEE Conference
    • /
    • 1991.07a
    • /
    • pp.358-362
    • /
    • 1991
  • This paper describes enhancements made on PROSET, an, expert system which can perform setting and coordination of protective relays used in the ultra-high voltage transmission systems. Enhancements include the friendly and convenient environment for rulebase management and system manipulation, expanded setting capability, and faster processing speed which have been achieved through adoption of the new rule representation, rule order independent IE, rulebase editor, local database generator, Interface to PSS/E fault program, RB expansion etc.

  • PDF

Power control in Ad Hoc network using ZigBee/IEEE802.15.4 Standard (ZigBee/IEEE802.15.4 표준을 사용하는 Ad Hoc 네트워크 상의 전력 통제)

  • Kirubakaran K.;Lee Jae-Kwang
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper an intrusion detection system technique of wireless Ad Hoc network is explained and the advantage of making them work in IEEE 802.15.4/ZigBee wireless standard is also discussed. The methodology that is mentioned here is intrusion detection architecture based on a local intrusion database [1]. An ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Due to increased connectivity (especially on the Internet), and the vast spectrum of financial possibilities that are opening up, more and more systems are subject to attack by intruders. An ideal IDS should able to detect an anomaly caused by the intruders quickly so that the misbehaving node/nodes can be identified and appropriate actions (e.g. punish or avoid misbehaving nodes) can be taken so that further damage to the network is minimized

  • PDF

Fingerprint Identification Based on Hierarchical Triangulation

  • Elmouhtadi, Meryam;El Fkihi, Sanaa;Aboutajdine, Driss
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.435-447
    • /
    • 2018
  • Fingerprint-based biometric identification is one of the most interesting automatic systems for identifying individuals. Owing to the poor sensing environment and poor quality of skin, biometrics remains a challenging problem. The main contribution of this paper is to propose a new approach to recognizing a person's fingerprint using the fingerprint's local characteristics. The proposed approach introduces the barycenter notion applied to triangles formed by the Delaunay triangulation once the extraction of minutiae is achieved. This ensures the exact location of similar triangles generated by the Delaunay triangulation in the recognition process. The results of an experiment conducted on a challenging public database (i.e., FVC2004) show significant improvement with regard to fingerprint identification compared to simple Delaunay triangulation, and the obtained results are very encouraging.

Weighted filter bank analysis and model adaptation for improving the recognition performance of partially corrupted speech (부분 손상된 음성의 인식성능 향상을 위한 가중 필터뱅크 분석 및 모델 적응)

  • Cho Hoon-Young;Oh Yung-Hwan
    • MALSORI
    • /
    • no.44
    • /
    • pp.157-169
    • /
    • 2002
  • We propose a weighted filter bank analysis and model adaptation (WFBA-MA) scheme to improve the utilization of uncorrupted or less severely corrupted frequency regions for robust speech recognition. A weighted met frequency cepstral coefficient is obtained by weighting log filter bank energies with reliability coefficients and hidden Markov models are also modified to reflect the local reliabilities. Experimental results on TIDIGITS database corrupted by band-limited noises and car noise indicated that the proposed WFBA-MA scheme utilizes the uncorrupted speech information well, significantly improving recognition performance in comparison to multi-band speech recognition systems.

  • PDF

Detecting Location and Depth of Cracks in Rotor using Critical Speed (임계속도를 이용한 로터의 결함 위치와 크기 판별)

  • Kim, Heung-Su;Jo, Maeng-Hyo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.5
    • /
    • pp.39-45
    • /
    • 2006
  • Structural health monitoring has been conducted by non-destructive evaluation method when a turbine rotor system of an aircraft engine has cracks. Local stiffness of a turbine rotor system is degraded and critical speed is changed due to the presence of cracks in rotor. Critical speed which is affected by location and depth of crack, is obtained using compliance matrix of cracked rotor. The database of the obtained critical speed is used to evaluate structural health monitoring of a rotor system of a gas turbine engine.