• Title/Summary/Keyword: all token

Search Result 62, Processing Time 0.023 seconds

Characteristics of accurate token and all token diadochokinesis in patients with normal pressure hydrocephalus (정상압 수두증 환자와 정상 노인의 조음교대운동 수행력 비교)

  • Seong Hee Yoon;Ki-Su Park;Kyunghun Kang;Janghyeok Yoon;Ji-Wan Ha
    • Phonetics and Speech Sciences
    • /
    • v.16 no.1
    • /
    • pp.57-65
    • /
    • 2024
  • Normal pressure hydrocephalus (NPH) is a condition wherein the cerebrospinal pressure in the brain is within the normal range, but the cerebrospinal fluid increases above the normal level, causing ventriculomegaly. In patients with NPH, the articulatory system exhibits reduced mobility and range, which may affect diadochokinesis (DDK) and speech intelligibility. In this study, we investigated the characteristics of DDK, including accurate-token DDK and all-token DDK including inaccurate tokens, in patients with NPH and healthy elderly adults (HE). We also examined the classification accuracy of DDK between the two groups. Finally, we investigated whether there was a correlation between speech intelligibility and DDKs in the NPH group. The results showed that NPH and HE groups differed significantly in both accurate-token DDK and all-token DDK, and their classification accuracy was relatively high. However, there was no correlation between speech intelligibility and DDK. The findings suggest that the DDK is a useful method for sensitively assessing speech motor performance in patients with NPH.

How to design the token reinforcement based on token economy for blockchain model

  • Yoo, Soonduck
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.157-164
    • /
    • 2020
  • The reinforcement of the token, which is based on the token economy currently applied in blockchain-based cryptography, plays a critical role in forming the cryptographic-related ecosystem. Therefore, in this paper, it was investigated the reinforcement principle of token supporting the Token economy for blockchain model. In order to create a healthy ecosystem based on the reinforcement system principle, it is necessary to find ways to secure scalability by seeking consensus between the participants and the market economy structure so that it can generate an influx of more participants than seeking to maximize profits of certain people. Desirable behavior is defined as an action required by ecosystem participants that have the property of making the token ecosystem sustainable, and to do so, each individual receives appropriate incentives (rewards) when taking this action, ultimately encouraging voluntary participation and action by all participants in the ecosystem to optimize the interests of both individuals and participants. The expected benefit of this study may contribute to the establishment of various business models based on the principle of the reinforcement system.

A Study on DNN-based STT Error Correction

  • Jong-Eon Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.171-176
    • /
    • 2023
  • This study is about a speech recognition error correction system designed to detect and correct speech recognition errors before natural language processing to increase the success rate of intent analysis in natural language processing with optimal efficiency in various service domains. An encoder is constructed to embedded the correct speech token and one or more error speech tokens corresponding to the correct speech token so that they are all located in a dense vector space for each correct token with similar vector values. One or more utterance tokens within a preset Manhattan distance based on the correct utterance token in the dense vector space for each embedded correct utterance token are detected through an error detector, and the correct answer closest to the detected error utterance token is based on the Manhattan distance. Errors are corrected by extracting the utterance token as the correct answer.

Asymptotic performance analysis and adaptive control of large-scale token-passing networks (대규모 토큰-패싱 네트웍의 점근적 성능분석 및 적응제어)

  • 심광현;임종태
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.37-42
    • /
    • 1992
  • The main purpose of the paper is to derive asymptotic formulae for performance characteristics(throughput, delay) of large-scale token-passing network with buffered stations and to optimize the buffer capacity with respect to the probability of data generation. We consider two versions of token-passing network: uniform and nonuniform token-passing time interval. All results obtained are supported by simulations.

  • PDF

Modelingof Prioritized Token Ring (우선순위 토큰링의 모델링)

  • 채기준
    • Journal of the Korea Society for Simulation
    • /
    • v.2 no.1
    • /
    • pp.46-54
    • /
    • 1993
  • Analytic and simulation models for prioritized token ring are presented in this paper. Its protocol is based on prioritized token ring with reservation (R-PTR). Since the protocol of the R-PTR is simple and the performance of the R-PTR is not inferior to that of the IEEE-PTR under almost all traffic load environments, we use the R-PTR as our token ring model. By using the properties of Markovian process, the expressions for average throughput and average packet transmission delay are derived. The results obtained from the analytic model are compared with that of the discrete event simulation model.

  • PDF

Applying Token Tagging to Augment Dataset for Automatic Program Repair

  • Hu, Huimin;Lee, Byungjeong
    • Journal of Information Processing Systems
    • /
    • v.18 no.5
    • /
    • pp.628-636
    • /
    • 2022
  • Automatic program repair (APR) techniques focus on automatically repairing bugs in programs and providing correct patches for developers, which have been investigated for decades. However, most studies have limitations in repairing complex bugs. To overcome these limitations, we developed an approach that augments datasets by utilizing token tagging and applying machine learning techniques for APR. First, to alleviate the data insufficiency problem, we augmented datasets by extracting all the methods (buggy and non-buggy methods) in the program source code and conducting token tagging on non-buggy methods. Second, we fed the preprocessed code into the model as an input for training. Finally, we evaluated the performance of the proposed approach by comparing it with the baselines. The results show that the proposed approach is efficient for augmenting datasets using token tagging and is promising for APR.

Token's function and role for securing ecosystem

  • Yoo, Soonduck
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.128-134
    • /
    • 2020
  • The purpose of this study is to investigate the role and function of tokens to form a healthy blockchain-based ecosystem. Tokens must be constructed in a way that enhances their desired behavior to grow into a healthy token economy. The actions required of ecosystem participants in designing tokens should enable each individual to receive appropriate incentives (rewards) and encourage voluntary participation in taking this action. Also, all ecosystem participants must design to make the token ecosystem self-sustainable by generating profits. For example, in Bitcoin's proof-of-work method, mining is designed as a desirable behavior. Token-based services should be designed to induce multiple engagements, to design penalties for undesirable behavior, and to take into account evolutionary development potentials. Besides, the economic value of the entire token ecosystem will increase if the value that is designed and designed to take into account the revolutionary Innovation Possibility is greater than the reward amount paid to tokens. This study will contribute to presenting relevant service model by presenting how to design tokens and criteria when establishing blockchain-based service model. Future research is needed to discover new facts through a detailed comparative analysis between Tokennomics models.

New Transient Request with Loose Ordering for Token Coherence Protocol (토큰 코히런스 프로토콜을 위한 경서열 트렌지언트 요청 처리 방법)

  • Park, Yun Kyung;Kim, Dae Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.10
    • /
    • pp.615-619
    • /
    • 2005
  • Token coherence protocol has many good reasons against snooping/directory-based protocol in terms of latency, bandwidth, and complexity. Token counting easily maintains correctness of the protocol without global ordering of request which is basis of other dominant cache coherence protocols. But this lack of global ordering causes starvation which is not happening in snooping/directory-based protocols. Token coherence protocol solves this problem by providing an emergency mechanism called persistent request. It enforces other processors in the competition (or accessing same shared memory block, to give up their tokens to feed a starving processor. However, as the number of processors grows in a system, the frequency of starvation occurrence increases. In other words, the situation where persistent request occurs becomes too frequent to be emergent. As the frequency of persistent requests increases, not only the cost of each persistent matters since it is based on broadcasting to all processors, but also the increased traffic of persistent requests will saturate the bandwidth of multiprocessor interconnection network. This paper proposes a new request mechanism that defines order of requests to reduce occurrence of persistent requests. This ordering mechanism has been designed to be decentralized since centralized mechanism in both snooping-based protocol and directory-based protocol is one of primary reasons why token coherence protocol has advantage in terms of latency and bandwidth against these two dominant Protocols.

Development of communication delay model for Profibus token pssing Protocol (Profibus token pass ing protocol의 통신지연 모델 개발)

  • Kim, H. H.;Lee, K. C.;Lee, S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.470-473
    • /
    • 2002
  • Most networks for automation are tuned to an expected traffic at their design stage. During their actual operations, however, the networks experience considerable changes in traffic from time to time. These traffic changes caused by common events like machine failure and production schedule change may adversely affect the network performance and, in turn, the performance of the connected devices. This paper presents communication delay model for Profibus token passing protocol, and introduces TTR selection methods to maintain a uniform level of network performance at all stations under changing network traffic.

  • PDF

Modifying Inappropriate Behaviors of Nursery School Children through Token and Social Reinforcement (토오컨강화와 사회적강화를 이용한 유아원 아동의 부적절한 학습행동의 수정)

  • Kim, Jin Sook
    • Korean Journal of Child Studies
    • /
    • v.8 no.2
    • /
    • pp.61-71
    • /
    • 1987
  • The effects of token and social reinforcement on inappropriate study behaviors of nursery school children were investigated. The subjects were three nursery school boys, and the target behaviors were : 1) out-of-seat behaviors, 2) bothering other children, and 3) disruptive behaviors. The ABAB(Reversal) design was used in this experiment. It consisted of four periods : baseline, reinforcement I, reversal, and reinforcement II. During the reinforcement period, social reinforcement as well as token reinforcement was applied. In all three subjects, inappropriate study behaviors decreased during the reinforcement periods (I, II), and increased during the reversal period, showing the effects of token and social reinforcement. The subjects showed stability in three post-experimental tests, indicating that modification of inappropriate study behaviors was being maintained.

  • PDF