• Title/Summary/Keyword: Multi-network

Search Result 4,619, Processing Time 0.032 seconds

A Study on the Spoken KOrean-Digit Recognition Using the Neural Netwok (神經網을 利用한 韓國語 數字音 認識에 관한 硏究)

  • Park, Hyun-Hwa;Gahang, Hae Dong;Bae, Keun Sung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.11 no.3
    • /
    • pp.5-13
    • /
    • 1992
  • Taking devantage of the property that Korean digit is a mono-syllable word, we proposed a spoken Korean-digit recognition scheme using the multi-layer perceptron. The spoken Korean-digit is divided into three segments (initial sound, medial vowel, and final consonant) based on the voice starting / ending points and a peak point in the middle of vowel sound. The feature vectors such as cepstrum, reflection coefficients, ${\Delta}$cepstrum and ${\Delta}$energy are extracted from each segment. It has been shown that cepstrum, as an input vector to the neural network, gives higher recognition rate than reflection coefficients. Regression coefficients of cepstrum did not affect as much as we expected on the recognition rate. That is because, it is believed, we extracted features from the selected stationary segments of the input speech signal. With 150 ceptral coefficients obtained from each spoken digit, we achieved correct recognition rate of 97.8%.

  • PDF

Development of Information Strategy Planning Supporting Template for IMS (IMS를 위한 정보화 전략계획 수립지원 Template 개발)

  • 최병욱;이영수;장석호;윤취영
    • Proceedings of the CALSEC Conference
    • /
    • 2002.01a
    • /
    • pp.107-131
    • /
    • 2002
  • Recently, it is an important problem that combines part of sale, technical development etc.. as well as function that is the multi-item and small quantity production environment and production to computer network that supports synthetic efficiency of general corporation activity in manufacturing industry. Integration production information system is developed by these requests and globalization of production system and marketing by tough international competition of various industry product need IMS(Intelligent Manufacturing System) that cope in these change. Therefore, this paper searches analysis method, problem and development way for information system of manufacture field to construct this IMS efficiently, and develops each information strategy planning establishment step, product and integral way of products which is the systematic establishment way of essential information strategy planning in efficient manufacturing information system construction. Also, this paper presents detailed system design methods of each step and templates for efficient methodology of information strategy planning to support IMS efficiently.

  • PDF

Multiagent Enabled Modeling and Implementation of SCM (멀티에이전트 기반 SCM 모델링 및 구현)

  • Kim Tae Woon;Yang Seong Min;Seo Dae Hee
    • The Journal of Information Systems
    • /
    • v.12 no.2
    • /
    • pp.57-72
    • /
    • 2003
  • The purpose of this paper is to propose the modeling of multiagent based SCM and implement the prototype in the Internet environment. SCM process follows the supply chain operations reference (SCOR) model which has been suggested by Supply Chain Counsil. SCOR model has been positioned to become the industry standard for describing and improving operational process in SCM. Five basic processes, plan, source, matte, deliver and return are defined in the SCOR model, through which a company establishes its supply chain competitive objectives. A supply chain is a world wide network of suppliers, factories, warehouses, distribution centers and retailers through which raw materials are acquired, transformed or manufactured and delivered to customers by autonomous or semiautonomous process. With the pressure from the higher standard of customer compliance, a frequent model change, product complexity and globalization, the combination of supply chain process with an advanced infrastructure in terms of multiagent systems have been highly required. Since SCM is fundamentally concerned with coherence among multiple decision makers, a multiagent framework based on explicit communication between constituent agents such as suppliers, manufacturers, and distributors is a natural choice. Multiagent framework is defined to perform different activities within a supply chain. Dynamic and changing functions of supply chain can be dealt with multi-agent by cooperating with other agents. In the areas of inventory management, remote diagnostics, communications with field workers, order fulfillment including tracking and monitoring, stock visibility, real-time shop floor data collection, asset tracking and warehousing, customer-centric supply chain can be applied and implemented utilizing multiagent. In this paper, for the order processing event between the buyer and seller relationship, multiagent were defined corresponding to the SCOR process. A prototype system was developed and implemented on the actual TCP/IP environment for the purchase order processing event. The implementation result assures that multiagent based SCM enhances the speed, visibility, proactiveness and responsiveness of activities in the supply chain.

  • PDF

Development of Interactive Content Services through an Intelligent IoT Mirror System (지능형 IoT 미러 시스템을 활용한 인터랙티브 콘텐츠 서비스 구현)

  • Jung, Wonseok;Seo, Jeongwook
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.472-477
    • /
    • 2018
  • In this paper, we develop interactive content services for preventing depression of users through an intelligent Internet of Things(IoT) mirror system. For interactive content services, an IoT mirror device measures attention and meditation data from an EEG headset device and also measures facial expression data such as "sad", "angery", "disgust", "neutral", " happy", and "surprise" classified by a multi-layer perceptron algorithm through an webcam. Then, it sends the measured data to an oneM2M-compliant IoT server. Based on the collected data in the IoT server, a machine learning model is built to classify three levels of depression (RED, YELLOW, and GREEN) given by a proposed merge labeling method. It was verified that the k-nearest neighbor (k-NN) model could achieve about 93% of accuracy by experimental results. In addition, according to the classified level, a social network service agent sent a corresponding alert message to the family, friends and social workers. Thus, we were able to provide an interactive content service between users and caregivers.

Smart Jewelry System for Health Management based on IoT (사물인터넷 기반 건강관리 스마트 주얼리 시스템)

  • Kang, Yun-Jeong;Yin, Li;Choi, DongOun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1494-1502
    • /
    • 2016
  • With the increasing availability of medical sensors and Internet of Things(IoT) devices for personal use, considering the interaction with users, it is planned to add intelligent function design to the fashionable jewelry, and develop composite multi-function intelligent jewelry through sensors identification. By means of IoT technology, while possessing communication function of intelligent jewelry, the function of intelligent jewelry can be expanded to the linkage network. In order to rapidly manage the mass data produced by intelligent jewelry sensors based on IoT, an intelligent jewelry system for health management is designed and an ontology model of intelligent jewelry system based on IoT is worked out. After the state of the services through the smart phone application is shown. The application provides a personalized service to the user and to determine the risk to show the guide lines according to the disease.

Performance Analysis of Adaptive Radio Activation in Dual-Radio Aggregation System (이중 무선 인터페이스 결합 시스템을 위한 적응적 인터페이스 활성화 기법의 성능 분석)

  • Mulya Saputra, Yuris;Yun, Ji-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1901-1907
    • /
    • 2015
  • Today's smartphones and user devices are equipped with multiple radio interfaces increasingly. Aggregating theses multiple radio interfaces and using them concurrently will increase a user's communication speed immediately, but at the expense of increased power consumption. In this paper, we develop a mathematical performance model of an adaptive radio activation scheme by which a radio interface is activated only when needed for performance increase and deactivated otherwise. The developed model shows that the adaptive scheme reduces delay significantly and almost halves power consumption below a certain level of traffic input.

Analytical Modelling and Heuristic Algorithm for Object Transfer Latency in the Internet of Things (사물인터넷에서 객체전송지연을 계산하기 위한 수리적 모델링 및 휴리스틱 알고리즘의 개발)

  • Lee, Yong-Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.1-6
    • /
    • 2020
  • This paper aims to integrate the previous models about mean object transfer latency in one framework and analyze the result through the computational experience. The analytical object transfer latency model assumes the multiple packet losses and the Internet of Things(IoT) environment including multi-hop wireless network, where fast re-transmission is not possible due to small window. The model also considers the initial congestion window size and the multiple packet loss in one congestion window. Performance evaluation shows that the lower and upper bounds of the mean object transfer latency are almost the same when both transfer object size and packet loss rate are small. However, as packet loss rate increases, the size of the initial congestion window and the round-trip time affect the upper and lower bounds of the mean object transfer latency.

Software Development Education through Developing a usable Multiplayer Online Game (다중 사용자 온라인 게임 개발을 통한 소프트웨어 개발 교육)

  • Yoon, Ilmi;Ng, Gary;Kwon, Oh Young
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.4 no.2
    • /
    • pp.38-45
    • /
    • 2012
  • Building a game has been used as effective and attractive way of teaching computer science. Building a usable Multi-player Game is requires important aspects of technology, teamwork and software engineering principles. The whole class was structured in to several teams and students needed to join one or two teams. Each team presented their progress, discussed future milestones and troubleshoots, updated documents for clearer communication and utilized SVN(Subversion) throughout the semester. Unlike usual class setting, all students worked collaboratively together like one company to achieve the goal. In one semester, students started from concept design and completed a working Multiplayer Online Game called "deBugger" (Fall 2009), and "World of Balance" (Fall 2011), while learning game design, 3D graphics, Game Engine, Server-client architecture, Game Protocol, network programming, database, Software Engineering principles, and large application development as a team project.

  • PDF

Design and Implementation of Public key-based Video Conference System for Authentication and Encryption (공개키기반 사용자인증과 암호화를 적용한 영상회의 시스템 설계 및 구현)

  • Jung Yong-Deug;Lee Sang-Hun;Jin Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.971-980
    • /
    • 2004
  • This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the trans portation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information; while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based en-cryption key.

Next-Generation File Transfer Protocol Which support concurrent file transmissions effectively in Internet (인터넷에서 동시 파일 전송을 효과적으로 지원하는 NFTP의 설계 및 구현)

  • Choi, Jae-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.90-95
    • /
    • 2002
  • Though the FTP(File Transfer Protocol) has been used widely and stable, It has the structural weakness that can't support current file transmissions so that we have to wait the completion of previous file transmission when try to transmit another file. If try to transmit multiple files concurrently using this FTP, It has to forking multiple FTP servers and clients in each user's PC and ISP's host machine it would result in the waist of memory, resource of network and the high workload of system. In order to solving previous problem, in this paper I have designed the new model of FTP which based on multi-thread and created NFTP(Next-Generation FTP)protocol so that may reduce the workload of system and support current file transmission effectively. I have implemented NFTP and also applied to real service, as a result It have provided reliable service by reducing the workload of system and saved the waiting time which would happened.