• Title/Summary/Keyword: Single Token

Search Result 32, Processing Time 0.019 seconds

The Stability and Variability based on Vowels in Voice Quality Analysis (음질 분석에 있어서 모음에 따른 안정성과 변이성)

  • Choi, Seong Hee;Choi, Chul-Hee
    • Phonetics and Speech Sciences
    • /
    • v.7 no.1
    • /
    • pp.79-86
    • /
    • 2015
  • This study explored the vowel effect on acoustic perturbation measures in voice quality analysis. For this study, the perturbation parameters (%jitter, %shimmer) and noise parameter (SNR) were measured with 7 Korean vowels (/a/, /ɛ/, /i/, /o/, /u/, /ɯ/, /ʌ/) using CSpeech with 50 Korean normal young adults (24 males and 26 females). A significant vowel effect was found only in %shimmer and in particular, low-back /a/vowel was significantly different from other vowels in %shimmer. The least perturbation and noise were exhibited on high-back /ɯ/ and /o/ vowel, respectively. Based on tongue height, a significant higher %shimmer was demonstrated on low vowels than high vowels. In addition, back vowels in tongue advancement and rounded vowels in lip rounding showed significantly less perturbation and noise. The least variability of perturbation and noise within individuals was demonstrated on the vowel /i/ in three repeated measures. However, there was no significant difference among 3 token measures in single session among vowels tested except the vowel /o/. Consequently, the vowel /a/ commonly used in acoustic perturbation measures exhibited higher perturbation and noise whereas higher stability and less variability were demonstrated on the high-back vowel /u/. These results suggested that the Korean high-back vowel /u/ can be more appropriate and reliable for perturbation acoustic measures.

A Brokered Authentication Scheme Based on Smart-Card for Multi-Server Authentication (다중서버 인증을 위한 스마트카드 기반 중재 인증 기법 연구)

  • Kim, Myungsun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.190-198
    • /
    • 2013
  • Since the facilities for the remote users tend to be deployed in distributed manner, authentication schemes for multi-server communication settings, which provide various web services, are required for real-world applications. A typical way to authenticate a remote user relies on password authentication mostly. However, this method is vulnerable to attacks and inconvenient as the system requires users to maintain different identities and corresponding passwords. On the other hand, the user can make use of a single password for all servers, but she may be exposed to variants of malicious attacks. In this paper, we propose an efficient and secure authentication scheme based on a brokered authentication along with smart-cards in multi-server environment. Further we show that our scheme is secure against possible attacks and analyze its performance with respect to communication and computational cost.

A Fog-based IoT Service Interoperability System using Blockchain in Cloud Environment (클라우드 환경에서 블록체인을 이용한 포그 기반 IoT 서비스 상호운용 시스템)

  • Kim, Mi Sun;Park, Yong Suk;Seo, Jae Hyun
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.39-53
    • /
    • 2022
  • Cloud of Things (CoT) can provide IoT applications with unlimited storage functions and processing power supported by cloud services. However, in a centralized cloud of things, it can create a single point of failure that can lead to bottleneck problems, outages of the CoT network. In this paper, to solve the problem of centralized cloud of things and interoperate between different service domains, we propose an IoT service interoperability system using distributed fog computing and blockchain technology. Distributed fog is used to provide real-time data processing and services in fog systems located at a geographically close distance to IoT devices, and to enable service interoperability between each fog using smart contracts and distributed ledgers of the blockchain. The proposed system provides services within a region close to the distributed fog entrusted with the service from the cloud, and it is possible to access the services of other fogs without going through the cloud even between fogs. In addition, by sharing a service right token issuance information between the cloud and fog nodes using a blockchain network, the integrity of the token can be guaranteed and reliable service interoperability between fog nodes can be performed.

A Study on the protection of personal information using a Virtual IDs in an anonymous bulletin board (익명 게시판 환경에서 가상 아이디를 이용한 개인정보보호에 관한 연구)

  • Min, So-Yeon;Jang, Seung-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4214-4223
    • /
    • 2012
  • The argument related to the use of real and anonymous names on the Internet bulletin board has recently become a main issue. When using real names, it is possible to violate free discussion and privacy. Also, when using anonymous names, it is possible to have the reverse function of the Internet in regard to the use of malicious replies or the distribution of false ideas. Therefore, this paper has made it possible to prevent the spread of the user's personal information and execute the single log-in process by using the XML-token method which is one of the SSO technologies. Also, by issuing virtual IDs and forming the path when establishing tokens, the anonymous bulletin board which provides anonymity with a conditional tracing process has been suggested. After analyzing the performance of visitor numbers at authentication time, the anonymous bulletin board based on the group signature method showed the average response rate of 0.72 seconds, 0.18 seconds, which was suggested scheme. In the authentication time 4-5 times faster response speed, respectively. Also, since the suggested system does not have to provide a single authentication process or make the user provide his or her signature, the level of user's convenience seems to be much higher. Such a result shows that the system suggested on the anonymous bulletin board has a more appropriate level of user's convenience.

Fuzzy Colored Timed Petri Nets for Context Inference (상황 추론을 위한 Fuzzy Colored Timed Petri Net)

  • Lee Keon-Myung;Lee Kyung-Mi;Hwang Kyung-Soon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.3
    • /
    • pp.291-296
    • /
    • 2006
  • In context-aware computing environment, some context is characterized by a single event, but many other contexts are determined by a sequence of events which happen with some timing constraints. Therefore context inference could be conducted by monitoring the sequence of event occurrence along with checking their conformance with timing constraints. Some context could be described with fuzzy concepts instead of concrete concepts. Multiple entities may interact with a service system in the context-aware environments, and thus the context inference mechanism should be equipped to handle multiple entities in the same situation. This paper proposes a context inference model which is based on the so-called fuzzy colored timed Petri net. The model represents and handles the sequential occurrence of some events along with involving timing constraints, deals with the multiple entities using the colored Petri net model, and employs the concept of fuzzy tokens to manage the fuzzy concepts.

Study on bibliography of "Zhouyi cantong qi(周易參同契)" and the Book of Annotation ("주역참동계(周易參同契)"와 주석서에 대한 서지학적(書誌學的) 연구)

  • Im, Myung-Jin;Kim, Byung-Soo;Kang, Jung-Soo
    • Journal of Haehwa Medicine
    • /
    • v.19 no.2
    • /
    • pp.25-33
    • /
    • 2011
  • Daoism is a very important subject that consists of oriental medicine(traditional east asia medicine). Among the many scriptures, The Zhouyi cantong qi (周易參同契, Token for Joining the Three in Accordance with the Book of Changes) is the main Chinese alchemical scripture. This book is composed with three kinds of subject, Zhouyi(周易, the Book of Changes), the Huanglao(黃老) Tradition and alchemy(鍊金, 爐火). The author's name is not signed but is concealed in the text. According to the traditional account, the legendary Han immortal from Guiji (會稽, in present-day Zhejiang, 古 浙江), Wei Boyang(魏伯陽), wrote it in the period between Emperor Shun and Emperor Huan of the Eastern Han (126-127 BC), after reading the Longhu jing (龍虎經, Scripture of the Dragon and Tiger). Later he transmitted it to Xu Congshi(徐從事), who appended a commentary, and to Chunyu Shutong(淳于叔通), who first circulated it in the world. While some features of this account provide significant details - especially about the reputed date of the text and about its formation having taken place in stages - the received Cantong qi(參同契) actually is not the product of a single generation of authors, but the result of several centuries of textual accretions as well as theory of three co-authorship by Wei Boyang(魏伯陽), Xu Congshi(徐從事), Chunyu Shutong(淳于叔通). It has over 6000 characters in four-word or five-word verses. Some parts of the book are in styles of prose and poem. Many scholars explain the title "cantongqi(參同契)", saying that "Can(參)" means three, "Tong(同)" means correspondence, and "Qi(契)" means unification. Through images of hexagrams of the Book of Changes, the book illustrates the thought of the Huanglao(黃老) Tradition and alchemy. Wei Boyang(魏伯陽) theorizes his own experience unifying the way of intercourse of Yin and Yang in the Book of Changes, the cultivation of spirit through spontaneity of the Huanglao(黃老) Tradition and the elixir refining of alchemy.

Inverse Document Frequency-Based Word Embedding of Unseen Words for Question Answering Systems (질의응답 시스템에서 처음 보는 단어의 역문헌빈도 기반 단어 임베딩 기법)

  • Lee, Wooin;Song, Gwangho;Shim, Kyuseok
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.902-909
    • /
    • 2016
  • Question answering system (QA system) is a system that finds an actual answer to the question posed by a user, whereas a typical search engine would only find the links to the relevant documents. Recent works related to the open domain QA systems are receiving much attention in the fields of natural language processing, artificial intelligence, and data mining. However, the prior works on QA systems simply replace all words that are not in the training data with a single token, even though such unseen words are likely to play crucial roles in differentiating the candidate answers from the actual answers. In this paper, we propose a method to compute vectors of such unseen words by taking into account the context in which the words have occurred. Next, we also propose a model which utilizes inverse document frequencies (IDF) to efficiently process unseen words by expanding the system's vocabulary. Finally, we validate that the proposed method and model improve the performance of a QA system through experiments.

Document Classification Methodology Using Autoencoder-based Keywords Embedding

  • Seobin Yoon;Namgyu Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.9
    • /
    • pp.35-46
    • /
    • 2023
  • In this study, we propose a Dual Approach methodology to enhance the accuracy of document classifiers by utilizing both contextual and keyword information. Firstly, contextual information is extracted using Google's BERT, a pre-trained language model known for its outstanding performance in various natural language understanding tasks. Specifically, we employ KoBERT, a pre-trained model on the Korean corpus, to extract contextual information in the form of the CLS token. Secondly, keyword information is generated for each document by encoding the set of keywords into a single vector using an Autoencoder. We applied the proposed approach to 40,130 documents related to healthcare and medicine from the National R&D Projects database of the National Science and Technology Information Service (NTIS). The experimental results demonstrate that the proposed methodology outperforms existing methods that rely solely on document or word information in terms of accuracy for document classification.

Performance of Full Duplex Switched Ethenlet Systems with a Dual Traffic Regulator for Avionic Data Buses (이중 트래픽 조절기능이 있는 항공데이터버스용 전이중 이더넷 교환시스템의 성능 분석)

  • Kim, Seung-Hwan;Yoon, Chong-Ho;Park, Pu-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.89-96
    • /
    • 2009
  • As increasing the number of digital control devices installed on aircrafts and their transmission speed, various digital data buses have been introduced to provide reliable and high-speed characteristics. These characteristics of avionics data bus are highly related on the fault-tolerant performance which can make minimize jitter and loss during data transfer. In this paper, we concerned about a new traffic shaping scheme for increasing the reliability of Avionics Full Duplex Switched Ethernet (AFDX) systems based on ARINC 664 standard. We note that the conventional AFDX with a single regulator per virtual link system may produce aggregated traffics as the number of virtual links increasing. The aggregated traffic results in large jitters among frames. To remedy for the jitter and loss of data, we propose a dual regulator scheme for the AFDX system. The purpose of the additional regulator is to additionally regulate aggregated traffics from a number of per virtual link regulators. Using NS-2 simulator, we show that the proposed scheme provides a better performance than the single regulator one. It is worthwhile note that the proposed AFDX with Dual Regulator scheme can be employed to not only aircraft networks but other QoS sensitive networks for robot and industrial control systems.

An Aggregate Fairness Marker without Per Flow Management for Fairness Improvement of Assured Service in DiffServ (DiffServ 방식의 Assured Service 에서 플로별 관리 없이 Fairness향상을 위한 Aggregate Fairness Marker)

  • Park, Ji-Hoon;Hur, Kyeong;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.613-627
    • /
    • 2004
  • In this paper, we propose an Aggregate Fairness Maker (ARM) required for an Edge router to improve fairness of throughput among the flows of Assured Service in DiffServ with different round trip time (RTT) and we propose a user flow Three Color Marker (uf-TCM) as a flow marker that marks packets from the flow as green, yellow, or red. A yellow packet is the packet that consumes loss token in uf-TCM as well as that is demoted green packet in AM due to disobey the aggregate traffic profile. The proposed AFH promotes yellow packet to green packet or demotes green packet to yellow packet through the fair method without per-flow management, and it improves the feirness of throughput among the flows as well as link utilization. A yellow packet and a red packet have the same drop precedence at Core Router in our scheme. So we can use the RIO buffer management scheme. We evaluated the performance of our proposed AFM and the REDP Marker that was proposed to improve fairness without per-flow management. Simulation results show that, compared with the REDP marker, proposed AFM can improve performance of throughput fairness among the flows with different RTT and link utilization under the over-provisioning, exact-provisioning, and under-provisioning network environments at Multiple DiffServ domains as well as at Single DiffServ domain.