• Title/Summary/Keyword: conversion algorithm

Search Result 710, Processing Time 0.025 seconds

Discrete Event Model Conversion Algorithm for Systematic Analysis of Ladder Diagrams in PLCs (PLC 래더다이어그램의 체계적인 분석을 위한 이산사건모델 변환 알고리즘)

  • Kang, Bong-Suk;Cho, Kwang-Hyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.5
    • /
    • pp.401-406
    • /
    • 2002
  • As product lifecycles become shorter, factories are pushed to develop small batches of many different products. The highly flexible control systems has become a necessity. The majority of existing automated industrial systems are controlled by programmable logic controllers(PLCs). In most cases, the control programs for PLCs are developed based on ladder diagrams(LDs). However, it is difficult to debug and maintain those LDs because the synthesis of LD itself mainly depends on the experience of the industrial engineer via trial-and-error methods. Hence, in this paper, we propose a discrete event model conversion algorithm for systematic analysis of LDs. The proposed discrete event model conversion algorithm is illustrated by an example of a conveyor system.

A Study On Male-To-Female Voice Conversion (남녀 음성 변환 기술연구)

  • Choi Jung-Kyu;Kim Jae-Min;Han Min-Su
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.115-118
    • /
    • 2000
  • Voice conversion technology is essential for TTS systems because the construction of speech database takes much effort. In this paper. male-to-female voice conversion technology in Korean LPC TTS system has been studied. In general. the parameters for voice color conversion are categorized into acoustic and prosodic parameters. This paper adopts LSF(Line Spectral Frequency) for acoustic parameter, pitch period and duration for prosodic parameters. In this paper. Pitch period is shortened by the half, duration is shortened by $25\%, and LSFs are shifted linearly for the voice conversion. And the synthesized speech is post-filtered by a bandpass filter. The proposed algorithm is simpler than other algorithms. for example, VQ and Neural Net based methods. And we don't even need to estimate formant information. The MOS(Mean Opinion Socre) test for naturalness shows 2.25 and for female closeness, 3.2. In conclusion, by using the proposed algorithm. male-to-female voice conversion system can be simply implemented with relatively successful results.

  • PDF

Wavelength Assignment Algorithm Considering Maximizing Residual Link in WDM Network with Wavelength Conversion (파장변환을 고려하는 WDM 네트워크에서 잔여 링크의 최대화를 고려하는 파장 할당 알고리즘)

  • Shin Ja-Young;Kim Sung-Chun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.646-653
    • /
    • 2005
  • This paper proposes that wavelength assignment algorithm maximizes residual links considering more real wavelength conversion in the WDM network. The existing algorithms are inefficient that they ignore wavelength conversion ability in each nodes and fixed uniformly wavelength conversion ability on all nodes. Proposed method makes a ring shape that maximize available residual links considering wavelength conversion ability in each nodes. Maximizing residual links can assign a wavelength for any path require. Then blocking probability is reduced by the maximum 19 percent and wavelength conversion number is improved by about 40 percent. These can be showed in performance evaluation.

Voice Color Conversion Based on the Formants and Spectrum Tilt Modification (포먼트 이동과 스펙트럼 기울기의 변환을 이용한 음색 변환)

  • Son Song-Young;Hahn Min-Soo
    • MALSORI
    • /
    • no.45
    • /
    • pp.63-77
    • /
    • 2003
  • The purpose of voice color conversion is to change the speaker identity perceived from the speech signal. In this paper, we propose a new voice color conversion algorithm through the formant shifting and the spectrum-tilt modification in the frequency domain. The basic idea of this technique is to convert the positions of source formants into those of target speaker's formants through interpolation and decimation and to modify the spectrum-tilt by utilizing the information of both speakers' spectrum envelops. The LPC spectrum is adopted to evaluate the position of formant and the information of spectrum-tilt. Our algorithm enables us to convert the speaker identity rather successfully while maintaining good speech quality, since it modifies speech waveforms directly in the frequency domain.

  • PDF

Detection of Gradual Shot Conversion Duration using Histogram Intersection in Compressed Video (압축 영상에서 히스토그램 인터섹션을 이용한 점진적인 장면 전환의 구간 검출)

  • Kwon, Chul-Hyun;Han, Doo-Jin;Lee, Myoung-Ho;Park, Sang-Hui
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.54 no.11
    • /
    • pp.669-672
    • /
    • 2005
  • An algorithm detecting abrupt and gradual shot boundaries is proposed in this Paper. The conventional methods detect abrupt shot boundaries well, but do not show good performance on gradual shot boundaries. The proposed method Is based on the fact that the difference of the characteristic between frames is large when the shot conversion occurs. And the Proposed method detects abrupt and gradual shot boundaries with one algorithm. Moreover, it detects not only position where gradual shot conversion occurs, but also the exact duration where gradual shot conversion occurs.

Conversion of Oblique Ionogram between Jeju and Icheon to Vertical Equivalent at Mid-point (제주-이천간 전리층 사입사 데이터의 등가 직입사 변환)

  • You, Moon-Hee;Lee, Hwan-Sang;Jeong, Cheol-Oh;Jo, Jin-Ho;Lee, Yong-Min
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.3
    • /
    • pp.1-5
    • /
    • 2013
  • In this paper, we present a conversion algorithm of the oblique ionogram obtained from Jeju and Icheon to the equivalent vertical ionogram of the path mid-point, based on some equivalence theorems between the vertical sounding and the oblique sounding for the ionosphere. And in order to verify the conversion algorithm under the condition of no vertical ionosonde at the mid-point on the test path, the equivalent vertical ionograms are compared to the real vertical ionograms measured adjacently in space-time. The comparison results show that the conversion algorithm performs well for the short-path oblique ionogram and the equivalent vertical ionograms could be applied to get the electron density profiles at the mid-point.

The Fast Correlative Vector Direction Finder Conversion (직접 변환을 이용한 고속 상관형 벡터 방향탐지기)

  • Park, Cheol-Sun;Kim, Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.16-23
    • /
    • 2006
  • This paper presents the development of the fast Direction Finder using direct conversion method, which can intercept for short pulse signal of less' than 1 msec. in RF Down Converter, and CVDF(Correlative Vector Direction Finding) algorithm, which estimates DoA (Direction of Arrival). The configuration and characteristics of direction finder using 5-channel equi-spaced circular array antenna are presented and the direct conversion techniques for removing tuning time using I/Q demodulator are described. The CRLB of our model is derived, the principles of 2 kind of CVDF algorithm are explained and their characteristics are compared with CRLB w.r.t the number of samples and spacing ratio. The RF Down Converter prototype using direct conversion method is manufactured, the 2 kind of CVDF algorithm are applied and their performance are analyzed. Finally it is confirmed the LSE based CVDF algorithm is better than correlation-coefficient based except for ambiguity protection capabilities.

Improved Tooth Detection Method for using Morphological Characteristic (형태학적 특징을 이용한 향상된 치아 검출 방법)

  • Na, Sung Dae;Lee, Gihyoun;Lee, Jyung Hyun;Kim, Myoung Nam
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.10
    • /
    • pp.1171-1181
    • /
    • 2014
  • In this paper, we propose improved methods which are image conversion and extraction method of watershed seed using morphological characteristic of teeth on complement image. Conventional tooth segmentation methods are occurred low detection ratio at molar region and over, overlap segmentation owing to specular reflection and morphological feature of molars. Therefore, in order to solve the problems of the conventional methods, we propose the image conversion method and improved extraction method of watershed seed. First, the image conversion method is performed using RGB, HSI space of tooth image for to extract boundary and seed of watershed efficiently. Second, watershed seed is reconstructed using morphological characteristic of teeth. Last, individual tooth segmentation is performed using proposed seed of watershed by watershed algorithm. Therefore, as a result of comparison with marker controlled watershed algorithm and the proposed method, we confirmed higher detection ratio and accuracy than marker controlled watershed algorithm.

New Power Analysis Attack on The Masking Type Conversion Algorithm (마스킹 형태 변환 알고리즘에 대한 새로운 전력 분석 공격)

  • Cho, Young-In;Kim, Hee-Seok;Han, Dong-Guk;Hong, Seok-Hie;Kang, Ju-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.1
    • /
    • pp.159-168
    • /
    • 2010
  • In the recent years, power analysis attacks were widely investigated, and so various countermeasures have been proposed. In the case of block ciphers, masking methods that blind the intermediate results in the algorithm computations(encryption, decryption, and key-schedule) are well-known. The type conversion of masking is unavoidable since Boolean operation and Arithmetic operation are performed together in block cipher. Messerges proposed a masking type conversion algorithm resistant general power analysis attack and then it's vulnerability was reported. We present that some of exiting attacks have some practical problems and propose a new power analysis attack on Messerges's algorithm. After we propose the strengthen DPA and CPA attack on the masking type conversion algorithm, we show that our proposed attack is a practical threat as the simulation results.